The Reasons Why Standards and Technical Organisations need Greater Diversity


For some people the topic of this blog post they may find unnecessary because either they think these are non-issues or ideologically driven as some sort of social justice warrior (SJW) agenda. Hopefully, I endeavour in this post not come across like that but raise new ideas and viewpoints and widen the conversion about why as groups of people and companies connected to standards and technical organisations need to consider greater diversity. Firstly, I will not be naming any organisations in this post because of this not a call-out to name and shame. Secondly, I do realise quite a few organisations already have plans in place to broaden the diversity of their workforce already either through their members or their support staff. Finally, these ideas came about from my attendance of meetings, conferences and workshops where I kept thinking to myself the majority of the time the make-up of these are mostly older men who have been around for twenty plus years and they littl…

Review of ideas and thoughts from Meetings and Conferences


This post is to give an overview along with a review of ideas and thoughts from meetings and conferences I have attended as part of my work for C3L. These include the 'UK Internet Governance Forum 18'; ETSI CYBER Group meetings; ETSI QKD;  ETSI USER Group meetings and the ETSI ITS Workshop 2019. The aim here is give some information about these meetings and groups to give some insight to the work C3L does along with viewpoints about the current industrial landscape.

UK Internet Governance Forum 18

The 2018 edition of the United Kingdom Internet Governance Forum (IGF) took place on 22 November in London (I observed via the online webinar) and focused on the topic of 'Solutions for The Digital Age'. The UK IGF represents a platform for collaborative partnerships with the mandate of providing a local forum in the UK to engage industry, government, parliament, academia and civil society in discussions on Internet Governance issues. In the future greater use of Di…

Call for Participation - Live Webinar "User Centric approach in the digital ecosystem"

Tuesday, April 16, 2019 @ 4:30 pm CET / 10:30 am EDT / 2:30 UTC
Two experts from the ETSI Special Committee USER, will present results of their work on future solutions for a new role of users and consequently providers. This presentation, based on the results of two surveys and the analysis of several use cases, introduces a generic model for this new approach. The webinar also introduces the concepts of composition of services and of “as a service”, including the definition of profiles. A special attention has been drawn on security, data protection, privacy and Quality of Experience. Register now at: Speakers:  Jean-Yves Monfort, Vice Chair of the ETSI Special Committee USER and a member of AFUTT (French association of telecommunications users) and Noemie Simoni, expert in the committee and Emeritus Professor.

Call for Participation - Smart Cities "Capturing the Citizens Requirements"

If you are able it would only take between five to ten minutes to complete this survey for the ETSI Smart City Task Force. They would like as many people as possible to complete the survey. They would like to cover a diverse selection of views, from every interested category of stakeholder, to ensure they can assess what citizens need, and how these needs can be met. Their Report will reflect the views expressed. 


Their open survey will gather the requirements of all stakeholders in the Smart Cities community, with the intention to ensure a participation of citizens as well as representatives of cities, service operators, solution providers, etc.

Ghost in the Shell - What it can tell us about Cybersecurity


Unless you are familiar with anime and manga the title "Ghost in the Shell" (GitS) the title won't mean much so first a brief explanation. GitS is a media franchise which originally started as a serialised manga before being made in to an anime movie which led to it becoming known worldwide. It exits within the genre of science fiction and specially cyberpunk. The themes the series has touched include robotics, sentient Artificial Intelligence (AI), human augmentation, transferring human consciousness to a machine, an individuals identify and more. So what the question within GitS what relates to cybersecurity throughout the series you have the hacking of technically augmented humans, systems, along with themes of information manipulation and surveillance.

Lessons we can learn from GitS about Cybersecurity:

Tools can be turned against you: One premises of the GitS franchise is a super powerful intelligent combat robot or AI that was effective against any enemy,…

Applying Anthropology to Online Communities


This post is the last one in this on applying anthropology series. When it comes to tacking online issues and problems there is a need to understand the types of people who carry out these acts. This requires intelligence of the threats to be collected and because it is about gathering this information from people anthropology based methods can aid in this endeavour. By being able to understand online communities it enables companies, NGOs and law enforcement to tackle crime (cyber/online), hate-groups and extremists/terrorists. 

TheInternet has facilitated the online interactions of dispersed groups of people with shared interests. These online groups exhibit a wide range of characteristics and serve a variety of purposes, from small groups engaged in tightly focused discussions of specific topics, to complex created worlds with hundreds of simultaneous participants, to millions of users linked by an interest in markets or exchange networks for goods and informat…

Smart devices Use Cases and cybersecurity


The number of all ways on and internet connected number of smart devices is growing year on year. Though while we have slowly begun to tackle the issue of cybersecurity around smart devices the potential problems and concerns regarding smart devices continue to emerge. Some of these problems  have come about due to increasing number of devices that are on the market along with the need to comply with ew regulation such as GDPR and the upcoming EU ePrivacy Regulation. This post will aim to highlight some of the use cases of smart devices and how these led to cybersecurity, data protection and privacy concerns. 

Use Cases

Home based Smart Appliances: The new wave of connected appliances has made it possible, to provide a cost effective path to meaningful functionality for end customers, along with remote diagnostics, management and analytics for manufacturers. Connectivity will enable better user experience, proactive alerts and even safety notifications. Manufacturers will le…