Data-driven emerging technologies Topics: artificial intelligence, IoT, algorithms, facial recognition, blockchain, automated decision making, machine learning, data for good. Example: What is the impact of AI and other data-driven technologies in the exercise of rights of most vulnerable groups? How to implement them to further advance their inclusion and avoid further harm? Cybersecurity policy, standards and norms Topics: Cybersecurity Best Practices, Norms, Cybercrime, Cyberattacks, Capacity Development, Confidence-building measures, CERTs, cybersecurity awareness Example: What is the role of cybersecurity norms, do they need to be strengthened, and how can their implementation be assessed? Security, stability and resilience of the Internet infrastructure, systems and devices Topics: IoT, DNS, DNS abuse, DNS security, Internet standards, Internet protocols, encryption, content blocking and filtering, IPv6 adoption, routing security Example: How can best practices at all layers (transport, DNS, security, applications and services) inform and support governments’ engagement around Internet reliability and stability? Digital Safety to enable a healthy and empowering digital environment for all Topics: Human rights, digital safety, child online safety, CSAM, hate speech, terrorist violent and extremist content (TVEC), platforms, freedom of expression Example: How can a digital environment be created that enables human interaction and communication while ensuring the ability to participate and to access information, freedom of expression, and the privacy and safety of individuals? Trust, Media and Democracy Topics: disinformation, misinformation, “fake news”, terrorist violent and extremist content (TVEC), deep fakes, hate speech, freedom of expression, democracy, election interference, hacking, platforms Example: The proliferation of disinformation and misinformation (e.g. “fake news” and deep fakes) poses threats to the integrity of journalism and the decisions that people make based on that information. How can technology play a role in tackling them and restoring trust? Trust and identity Topics: facial recognition, biometrics, digital identity, decentralized identities, certified identities, blockchain, bias, e-banking, e-health, artificial intelligence, AI, business models Example: How can regulatory approaches stimulate innovation and maximize community benefit, while mitigating associated risks around the use of Artificial Intelligence? Formal methods of AI verification Topics: use case constraints, system stability/safety, robustness, loss of control prevention, fault diagnosis Example: How to establish guaranteed constraint satisfaction associated with the particular use case (e.g., what is allowed when it comes to cancer therapy AI support)? What measures must be integrated into an AI system to maintain safety when some of the control functions are lost?