Dear all,
Florian and I worked today on 2.1. It is mature enough to be reviewed by you. Please do not change the narrative without a coordination, but any small changes or comments are more than welcome.
Thank you all,
Best, Soheil
--
Director Sustainable Computing Lab https://www.sustainablecomputing.eu https://www.sustainablecomputing.eu/ Institute for Information Systems and New Media, Vienna University of Economics and Business (WU Wien) https://nm.wu.ac.at/human https://nm.wu.ac.at/human Lecturer Department of Philosophy, University of Vienna
Dear all,
I updated the impact section 2.2. and 2.3. I would like to ask you to 1. review the text in track changes 2. provide input in the following:
* exploitation table: who owns which project outcome? + add 1-2 possible exploitation measures per outcome (in general, not per partner) * communication table: please add 3-4 key messages of the project for industry, citizens, regulators, other. * Summary tables in 2.3: please add what specific need each project output aims to cover+ expected result.
Filling in those aspects is beyond my expertise, so your input is necessary to finalise the section.
Many thanks!
Met vriendelijke groet/ Kind regards,
Irene
dr.Irene KAMARA
Assistant Professor Cybersecurity Governance
Tilburg Institute for Law, Technology, and Society (TILT)/Tilburg Law School PO Box 90153 5000 LE Tilburg, The Netherlands e: i.kamara@uvt.nlhttps://email.campus.uvt.nl/owa/i.kamara@uvt.nl w: https://www.tilburguniversity.edu/nl/webwijs/show/i.kamara/
t: kamara_irene
___________________________
See my latest publications:
Drechsler, Laura and Kamara, Irene, Essential Equivalence as a Benchmark for International Data Transfers After Schrems II (July 7, 2021). "Research Handbook on EU data protection" Kosta, Eleni and Leenes, Ronald (eds.) Edward Elgar Publishing Ltd., Forthcoming, Available at SSRN: https://ssrn.com/abstract=3881875 or http://dx.doi.org/10.2139/ssrn.3881875
Kamara, Irene, Misaligned Union laws? A comparative analysis of certification in the Cybersecurity Act and the General Data Protection Regulation (June 1, 2020). In D. Hallinan, R. Leenes, & P. De Hert (Eds.) (2020), Privacy and data protection: Artificial intelligence Hart Publishing., Tilburg Law School Research Paper, Available at SSRN: https://ssrn.com/abstract=3732846
________________________________ From: EU-CONSENTiNG_consortium eu-consenting_consortium-bounces@alice.wu.ac.at on behalf of Soheil Human soheil.human@wu.ac.at Sent: Monday, October 18, 2021 7:42 PM To: eu-consenting_consortium@alice.wu.ac.at eu-consenting_consortium@alice.wu.ac.at Subject: [Eu-consenting_consortium] Subsection 2.1.
Dear all,
Florian and I worked today on 2.1. It is mature enough to be reviewed by you. Please do not change the narrative without a coordination, but any small changes or comments are more than welcome.
Thank you all,
Best, Soheil
--
Director Sustainable Computing Lab https://www.sustainablecomputing.euhttps://www.sustainablecomputing.eu/
Institute for Information Systems and New Media, Vienna University of Economics and Business (WU Wien) https://nm.wu.ac.at/human
Lecturer Department of Philosophy, University of Vienna
eu-consenting_consortium@alice.wu.ac.at