Skip to main content
  • Utility Menu
  • Search

cyberlawprogramhujilogo
The Federmann Cyber Security Research Center – Cyber Law Program

  • https://www.facebook.com/HUJICyberLaw
  • https://twitter.com/HUJICyberLaw
  • https://www.linkedin.com/in/federmann-cyber-law-program/
  • https://www.youtube.com/channel/UCN44F32RgFrdix_grZYiGcA
  • Subscribe
  • Contact Us
  • Home
  • About
    • About The Center
    • Funders and Partners
    • Galleries
    • Newsroom
  • People
    • Faculty
    • Research Associates
    • Research Fellows
    • Visiting Scholars
    • Administration
    • Advisory Board
    • Past Members
  • The Clinic
    • About the Clinic
    • Activity of the Clinic
    • Database
    • People of the Clinic
  • Research
    • Current Research
    • Individual Research
    • Research Fellows Program
    • Research Groups
      • Cyber-Conflicts in the Middle-East
      • Regulation of Cyber Security Standards for Private Market
      • The Internet of Things – Chevruta Study Group
    • Past Research
    • Law and Cyberspace
  • Resources
    • Cyber Centers and Relevant Links
    • Calls for Funding
    • Blogs
    • Courses
    • Employment @ CyberLaw
    • Lex Cybernetica Podcast
  • Events
    • Upcoming Conferences
    • Cyberlaw Program Workshop
    • CyberLunch
    • Ethics & Technology
    • The Future is Here
  • Publications
    • Cyberlaw Blogospace
    • Newsletters

HUJI Federmann Cyber Security Summit Meeting

Date: 

Wed, 13/05/2020 - 15:00 to 18:00

Location: 

Zoom meeting

15:00 - Opening Remarks – Yuval Shany and David Hay

15:15-18:00 – Lectures:

15:15-16:00 Fabiana Di Porto – From "Best Available Disclosures" BADs to DEDs "Best Ever Disclosures". Simplifying Disclosure Regulation Through Algorithms (Presentation)

16:00-16:40 Saar Tochner – Avoiding impossibilities in well-defined systems using regulations (Presentation)

16:40-17:20 Ayelet Mizrahi – Congestion Attacks in Payment Channel Networks

17:20-18:00 Yahli Shereshvesky – Are All Soldiers created Equal? – On the Equal Application of the Law to Military Enhanced Soldiers (Presentation)

Register Here.

LATEST NEWS

New Publications:

The Network of Online Stolen Data Markets: How Vendor Flows Connect Digital Marketplaces, David Maimon et al. 

International Regulation of Cyberattacks, Yuval Shany & Tal Mimran

Information Sharing as a Critical Best Practice for the Sustainability of Cyber Peace, Deborah Housen-Couriel

 

Enhanced Self-Regulation: The Case of Facebook's Content Governance, Rotem Medzini

Insuring Evolving Technologies, Asaf Lubin

Online Disclosure of Sexual Victimization: A Systematic Review, Tamar Berenblum

Cyber Checks and Balances, Elad Gil

 

BlogPost:

The Council of Europe Convention on Artificial Intelligence: The Future Is Here?

Dating intermediaries’ liability – the online dating site perspective

A New Sheriff in Town? A closer look at the Facebook Oversight Board and its proposed new legal model

 

Podcast:

Encryption Rights

Online Hate Speech

 

More >

Admin Login
OpenScholar

The Hebrew University websites utilize cookies to enhance user experience and analyze site usage. By continuing to browse these sites, you consent to our use of cookies.