Changes

Jump to navigation Jump to search
2,035 bytes added ,  16:35, 14 February 2022
m
no edit summary
Line 127: Line 127:  
<p>The European Interoperability Framework (EIF) is part of the Communication (COM(2017)134) from the European Commission adopted on 23 March 2017. The framework gives specific guidance on how to set up interoperable digital public services.</p>
 
<p>The European Interoperability Framework (EIF) is part of the Communication (COM(2017)134) from the European Commission adopted on 23 March 2017. The framework gives specific guidance on how to set up interoperable digital public services.</p>
 
<p class="recco">Recommended by the Office of the CIO of Canada, Treasury Board of Canada Secretariat, a GC Data Community partner</p>
 
<p class="recco">Recommended by the Office of the CIO of Canada, Treasury Board of Canada Secretariat, a GC Data Community partner</p>
 +
 +
[https://www.ineteconomics.org/perspectives/blog/hijacked-and-paying-the-price-why-ransomware-gangs-should-be-designated-as-terrorists Hijacked and Paying the Price - Why Ransomware Gangs Should be Designated as Terrorists]</h3>
 +
<p class="author">Melissa Hathaway</p>
 +
<p>(In English) Ransomware gangs have been causing extensive damage. It’s time that the government takes them more seriously.</p>
 +
<p class="recco">Recommended by the GC Data Community</p>
    
<h3 style="text-decoration:none;">[https://towardsdatascience.com/how-i-would-learn-data-science-if-i-had-to-start-over-f3bf0d27ca87 How I Would Learn Data Science (If I Had to Start Over)]</h3>
 
<h3 style="text-decoration:none;">[https://towardsdatascience.com/how-i-would-learn-data-science-if-i-had-to-start-over-f3bf0d27ca87 How I Would Learn Data Science (If I Had to Start Over)]</h3>
<p class="author">by Ken Jee, on Towards Data Science</p>
+
<p class="author">Ken Jee, on Towards Data Science</p>
 
<p>(In English) Lessons learned from my data science journey.</p>
 
<p>(In English) Lessons learned from my data science journey.</p>
 
<p class="recco">Recommended by Agriculture and Agri-Food Canada, a GC Data Community partner</p>
 
<p class="recco">Recommended by Agriculture and Agri-Food Canada, a GC Data Community partner</p>
Line 137: Line 142:  
<p>(In French - original title: <strong>Le projet de loi 95 : De la volonté de l’État québécois de permettre un accès et une utilisation optimale de ses données</strong>) In the research world, this reform has been desired for a long time, notably by the Chief Scientist of Quebec and the research funds, for whom access to these data will be of great use.</p>
 
<p>(In French - original title: <strong>Le projet de loi 95 : De la volonté de l’État québécois de permettre un accès et une utilisation optimale de ses données</strong>) In the research world, this reform has been desired for a long time, notably by the Chief Scientist of Quebec and the research funds, for whom access to these data will be of great use.</p>
 
<p class="recco">Recommended by the Office of the CIO of Canada, Treasury Board of Canada Secretariat, a GC Data Community partner</p>
 
<p class="recco">Recommended by the Office of the CIO of Canada, Treasury Board of Canada Secretariat, a GC Data Community partner</p>
 +
 +
[https://www.cigionline.org/publications/patching-our-digital-future-unsustainable-and-dangerous/ Patching Our Digital Future Is Unsustainable and Dangerous]</h3>
 +
<p class="author">Melissa Hathaway</p>
 +
<p>(In English) In recent years, the world has witnessed an alarming number of high-profile cyber incidents, harmful information and communications technology (ICT) practices, and internationally wrongful acts through the misuse of ICTs. Over the last 30 years, a unique and strategic vulnerability has been brought to society — by allowing poorly coded or engineered, commercial-off-the-shelf products to permeate and power every aspect of our connected society. These products and services are prepackaged with exploitable weaknesses and have become the soft underbelly of government systems, critical infrastructures and services, as well as business and household operations. The resulting global cyber insecurity poses an increasing risk to public health, safety and prosperity. It is critical to become much more strategic about how new digital technologies are designed and deployed, and hold manufacturers of these technologies accountable for the digital security and safety of their products. The technology industry has fielded vulnerable products quickly — now, it is crucial to work together to reduce the risks created and heal our digital environment as fast as society can. This paper was first published as part of CIGI’s recent essay series, Governing Cyber Space during a Crisis in Trust.</p>
 +
<p class="recco">Recommended by the GC Data Community</p>
    
<h3 style="text-decoration:none;">[https://www.stateofopendata.od4d.net/ State of Open Data]</h3>
 
<h3 style="text-decoration:none;">[https://www.stateofopendata.od4d.net/ State of Open Data]</h3>
2,600

edits

Navigation menu

GCwiki