Session
Organizer 1: Aicha Jeridi, Africa Civil Society for the Information Society
Speaker 1: Serge parfait Goma, Civil Society, African Group
Speaker 2: Cisse KANE, Civil Society, African Group
Speaker 3: Aicha Jeridi, Civil Society, African Group
Aicha Jeridi
Cisse Kane
Amine Hacha
Panel - 90 Min
Serge Parfait Goma. Civil society/IT manager at AUF and ISOC Congo Brazaville Chapter
Malaku Girma /Academia PHD Candidate and lecturer in Addis Abbaba University
Hgo Daffala / Organiser of Youth IGF in Sudan and specialist In Cybersecurity.
Mohamed Farahat is is human rights lawyer legal trainer and legal and political researcher currently as programs director in EFRR
Mario Solis Burgos. Nordic IT sourcing Association : People centered Development and innovation , Mentor , education in Euro digital futures,Spain
Session speakers have been selected to represent a diversity of backgrounds, and belonging to diverse stakeholders groups.they represent Academia, legal ,internet infrastructure experts , and Civil society Activists.They also have been selected from different continents with diverse background and different countries , which willbe reflected in the experience they screen during the workshop.
This panel will be divided into three parts, looking at the threats of mobile applications on children, asses their impact and gravity and depict Government policies together with oter stakeholders in confronting the challenge.Each speaker will give his perspective in regards to the threat and perception of child protection policie priority and mechanisms to overcome this issue.
Part I: The growing threat to children in cyber space , its origins and main issues (5 minutes)
The floor is given to the speakers to answer the questions and add their input (5 minutes each one)
Part II: How do you assess the protection policies criteria from a legal, Academic, Civil society and cyber security expert perspectives ? What should each stakeholder add to the list of protection measures?
Part III Q/A , engaging the audience and getting their feedback
Introduction (2 minutes)
Part I: The growing threat to children in cyber space , its origins and main issues (5 minutes)
The floor is given to the speakers to answer the questions and add their input (5 minutes each one)
Part II: How do you assess the protection policies criteria from a legal, Academic, Civil society and cyber security expert perspectives ? What should each stakeholder add to the list of protection measures?
The floor is given to the speakers to answer the questions and add their input (5 minutes each)
Part III: Audience Q&A (20 minutes)
Wrap up (3minutes)
Final recommendations and conclusion of the spreakers (2 minutes each)
it is hard to imagine the world before internet , a generation of digital natives grown up with ubiquitous connectivity where neither borders nor barriers to communication can be imposed.internet has unleashed also a revolution in ICT technologie swhich became avilable for a growing number of users uncluding children.these latters do not have most of the times the needed knowledge to secure themselves , their identities and their rights of privacy.in this regard, governments and civil socitie sare still not setting the issue into their agenda , as it could be the threat of terroism or the importance of securing etrade exchanges.a considerable attention should be given to the dangers tragetting children online , to their origins and should also alarm all stakeholders to take serious steps towards action and effecient policies of change and protection.
The opportunity for Q&A will extend to remote participants, who will be given the opportunity to ask questions via the IGF online forum.
Both the onsite moderator and remote moderator are entitled to communicate the most crucial and relevant questions from remote participants to the speakers.
introduced as interventions.
At the beginning of the session , The moderator onsite will ask remote
participants to be precise and concise in asking their questions and certainly relevant to the topic in discussion and avoid sending comments . moderator, assisted by the rapporteur, will then be responsible for
monitoring at what point remote questions enter the queue, signalling to the onsite moderator, and reading the questions out loud in a dedicated
microphone.