Difference between revisions of "SCOTT:D22.3"

From its-wiki.no

Jump to: navigation, search
(Suggested TOC)
Line 1: Line 1:
{{Deliverable|SCOTT|SCOTT:WP22|SCOTT:T22.3|Trust technologies advances|M24|Public|UiO|Maunya Doroudi Moghadam}}
{{Deliverable|SCOTT|SCOTT:WP22|SCOTT:T22.3|Trust technologies advances|M24|Public|UiO|Toktam Ramezani}}
=Suggested TOC=
=Suggested TOC=
1. Introduction and Background
1. Introduction and Background

Revision as of 11:11, 13 January 2020

Deliverable SCOTT:D22.3

SCOTT:D22.3 of SCOTT is part of SCOTT:WP22 in Task SCOTT:T22.3

Title: Trust technologies advances

The deliverable is Public, due date is month M24.

Lead partner of this deliverable is UiO, main and responsible editor is Toktam Ramezani

this page was created by Form:Deliverable, and can be edited by Special:FormEdit/Deliverable/SCOTT:D22.3

The deliverable is found here:

Suggested TOC

1. Introduction and Background

  • Business perception (technology partner, trusted entity, trust provider)
  • Trust in products "get what you expect"

In business relations, IoT and autonomous processes break up the boarders between companies

Societal trust

  • North-South trust (trust in our governments in the Nordics)

Novel services

  • in principle intrusive privacy - data, AI and profiling is a threat on privacy
  • customer awareness is raising, also thanks to the GDPR

Trust techn

  • Trust in remote management

2. Trust Labels

  • Digital Europe.org
  • Trust label
  • Privacy labelling
    • technology (security and privacy functionality)
    • approach (factors and combination)
  • envisaged example
  • way ahead (from ideas to market)

3. Towards Trusted Societies

3.1 Counterfy/Handling... security
society under stress, cybercrime, IoT attacks, threats, societal aspects: trust in digital systems
3.2 IoT- and Cybersecurity
3.3 Societal Security
Facebook and other show distrust in digital, results in misstrust
autnomous cars, spread between marketing announcement and technology capability -> misstrust,
focus on empowering the people by building digital capacity, making technology transparent (see presentation on http://DigI.Basicinternet.no/Publications for societal security)

4. Conclusions