Collective projects

Collective projects

Acceptance of "no gate crossing point solutions"

For the traveller it would be ideal to cross borders without being slowed down. It is indeed likely that, in the next 10 years or so, technologies make it possible to implement "no gate crossing point solutions" that allow for seamless crossing of borders and security checks for the vast majority of travellers who meet the conditions of entry, and make sure that those who do not fulfil such conditions are refused entry.

Addressing Advanced Cyber Security Threats and Threat Actors

Over the past decade, we have seen that cyber attacks have become increasingly sophisticated, stealthy, targeted and multi-faceted which may leverage zero-day exploits and highly creative interdisciplinary attack methods.

Detecting and responding to such attacks by a highly motivated, skilled and well-funded attacker has however been proven highly challenging.

As our society is becoming increasingly dependent on (critical) cyber infrastructure, new technologies are needed to increase our detection and response capabilities.

Privacy, Data Protection, Digital Identities

The use of modern telecommunications and on-line services involve users' personal information.. For example, using search engines exposes the query terms used, which can be both sensitive and identifying, as illustrated by the exposure of search terms; social networking services expect users to reveal their social connections, messages and preferences, that could lead to direct privacy violation if exposed. Browsing the web also leaves traces of where users have gone, their interests, and their actions - meta-data that can be used to profile individuals.

Cybersecurity PPP: Addressing Advanced Cyber Security Threats and Threat Actors

Over the past decade, we have seen that cyber attacks have become increasingly sophisticated, stealthy, targeted and multi-faceted which may leverage zero-day exploits and highly creative interdisciplinary attack methods.

Detecting and responding to such attacks by a highly motivated, skilled and well-funded attacker has however been proven highly challenging.

As our society is becoming increasingly dependent on (critical) cyber infrastructure, new technologies are needed to increase our detection and response capabilities.

Cybersecurity PPP: Privacy, Data Protection, Digital Identities

The use of modern telecommunications and on-line services involve users' personal information.. For example, using search engines exposes the query terms used, which can be both sensitive and identifying, as illustrated by the exposure of search terms; social networking services expect users to reveal their social connections, messages and preferences, that could lead to direct privacy violation if exposed. Browsing the web also leaves traces of where users have gone, their interests, and their actions - meta-data that can be used to profile individuals.

João Havelange Research Scholarship on Football

The João Havelange Research Scholarship was set up by FIFA in honour of their former President, Dr. João Havelange, who stepped down from his role in 1998. Aimed at promoting football-related academic research, the João Havelange Scholarship is awarded to researchers holding a university degree or equivalent in one of the following areas of study: Law, Economics, Sociology, Ethics, Geography, History and Medicine.

Subscribe to Collective projects