Nome |
# |
ORIGINAL, COPY, DIGITAL ORIGINAL THE PATH TOWARD VIRTUAL MUSEUMS, file e0c31c11-415f-4599-e053-1705fe0aef77
|
2.088
|
ICTs and Older Persons: Responsible use of the cyberspace: tips and hints for Seniors, file e0c31c0f-d80a-4599-e053-1705fe0aef77
|
996
|
Being Doctor in Cultural Studies, file e0c31c10-c740-4599-e053-1705fe0aef77
|
989
|
THE CULTURAL SIDE OF LIFE MATTERS?, file e0c31c12-c3a6-4599-e053-1705fe0aef77
|
915
|
From "Cyber" Security to Cyber Safety, Security and Disaster Management, file e0c31c0a-f40f-4599-e053-1705fe0aef77
|
866
|
Heritage "values" in the decision making process, file e0c31c0b-85ef-4599-e053-1705fe0aef77
|
746
|
Ethical and Moral aspects in UAV and artificial intelligence, file e0c31c0c-7567-4599-e053-1705fe0aef77
|
696
|
ICTs for Safety & Security: International case study, file e0c31c0d-495a-4599-e053-1705fe0aef77
|
648
|
National Languages and "Minoritized" Languages in a Long-Term Perspective, file e0c31c0c-34b7-4599-e053-1705fe0aef77
|
616
|
Cybertechnology: Use, abuse and misuse, file e0c31c0e-dc06-4599-e053-1705fe0aef77
|
579
|
WSIS Forum 2019: High-Level Track Outcomes and Executive Brief, file e0c31c0d-4958-4599-e053-1705fe0aef77
|
481
|
High-Level Track Outcomes - Cyber Safety, Cyber Security, Disaster recovery, file e0c31c0a-f40d-4599-e053-1705fe0aef77
|
416
|
Museums Exhibitions in the Age oif Digital Communication, file e0c31c0b-b8da-4599-e053-1705fe0aef77
|
372
|
21STCENTURY CYBER WARFARE, file e0c31c0b-ce6c-4599-e053-1705fe0aef77
|
333
|
Is ethics evaporating in the cyber era? Part 2: Feeling Framed, file d2131415-cbce-435b-886a-e8acb56da50c
|
318
|
Thematic Workshop: ICTs for Safety, Security and Disaster Recovery, file e0c31c0b-c682-4599-e053-1705fe0aef77
|
289
|
Fighting against petty crimes: new methods to prevent, investigate and mitigate high impact petty crimes, file e0c31c0c-3668-4599-e053-1705fe0aef77
|
285
|
The Smart Value platform, file e0c31c0b-2e90-4599-e053-1705fe0aef77
|
281
|
Human factors, resilience, and cyber/hybrid threats, file 680a8e6b-2bc3-4e4d-ab94-7aa2395b515f
|
264
|
SMART CITES: beyond cyber security, file e0c31c08-afb1-4599-e053-1705fe0aef77
|
258
|
African Heritage: A True Asset, file e0c31c09-6884-4599-e053-1705fe0aef77
|
197
|
The Sakhalin declaration on Internet and Socio - Cultural transformations, file e0c31c08-b023-4599-e053-1705fe0aef77
|
170
|
High-Level Track Outcomes - Cyber Safety, Cyber Security, Disaster recovery, file e0c31c0a-f40c-4599-e053-1705fe0aef77
|
159
|
Human Factors: feeling safe, file e0c31c0c-7569-4599-e053-1705fe0aef77
|
156
|
On Culture in a Worldwide Information Society, file e0c31c0c-501a-4599-e053-1705fe0aef77
|
153
|
From Citizens to eCitizens - From Services to eServices, file e0c31c08-a9b0-4599-e053-1705fe0aef77
|
150
|
Improving Border Check Point Security, file e0c31c0c-366c-4599-e053-1705fe0aef77
|
115
|
Is the Internet a melting pot?, file e0c31c08-aa9b-4599-e053-1705fe0aef77
|
113
|
Fostering the Culture of Cyber Security, file e0c31c0f-fcc7-4599-e053-1705fe0aef77
|
111
|
Hybrid threats: defence line from the grassroots, file e0c31c10-a4a0-4599-e053-1705fe0aef77
|
110
|
Once upon a time there was the age of "cultural tourism", file e0c31c0d-89bd-4599-e053-1705fe0aef77
|
106
|
Thematic Workshop: ICTs for Safety, Security and Disaster Recovery, file e0c31c0b-c683-4599-e053-1705fe0aef77
|
100
|
WSIS Forum - High Level Statements, file e0c31c0a-4b26-4599-e053-1705fe0aef77
|
97
|
Making cultural heritage alive: the role of cultural mediators, file e0c31c08-b546-4599-e053-1705fe0aef77
|
89
|
Cyberlaws privacy and data ownership, file e0c31c0a-ed2f-4599-e053-1705fe0aef77
|
89
|
My data are still mine?, file e0c31c0a-4d6c-4599-e053-1705fe0aef77
|
87
|
National Languages and “minoritized” languages in a long-term perspective, file e0c31c0a-f118-4599-e053-1705fe0aef77
|
80
|
Cyberlaws privacy and data ownership, file e0c31c0a-ee44-4599-e053-1705fe0aef77
|
74
|
TAS: Risk Analysis & Clustered Sensors, file e0c31c0b-edc2-4599-e053-1705fe0aef77
|
69
|
Soft but still concerns, file e0c31c11-9241-4599-e053-1705fe0aef77
|
58
|
Round Table on Cyberlaw, Cybercrime & Cybersecurity, file e0c31c12-7872-4599-e053-1705fe0aef77
|
58
|
The impact of digital transitions on society and economy, file e0c31c12-72ce-4599-e053-1705fe0aef77
|
57
|
TAS: TRUST ASSESSMENT SYSTEM, file e0c31c0c-0fba-4599-e053-1705fe0aef77
|
55
|
New media and education, file e0c31c0b-62c4-4599-e053-1705fe0aef77
|
50
|
. . . 1984 won’t be like “1984” ?, file e0c31c0c-0fbb-4599-e053-1705fe0aef77
|
46
|
Metaverse: Emerging Trends and Its Regulation, file 2a5c9c05-275a-4b02-a469-35ac0596ed13
|
44
|
Risks in a global perspective - Risk Assessment and Management:
New technologies and solutions thanks to an interdisciplinary approach, file e0c31c08-b027-4599-e053-1705fe0aef77
|
44
|
Cyber Resilience, its Relevance, and Cyber Capacity Building, file e58a23eb-208e-4ae9-be32-511a85c59d4d
|
44
|
Metaverse and shared immersive virtual realities, file 3cfba9a3-9a07-4ba0-a884-1def518f6068
|
41
|
Sustainable development inclusivity and multilingualism: the challenge, file e0c31c0c-7565-4599-e053-1705fe0aef77
|
40
|
THE 4TH INTERNATIONAL CULTURE INDUSTRY SUMMIT - OPENING ADDRESS, file e0c31c08-ccd8-4599-e053-1705fe0aef77
|
37
|
Axiology in the domain of heritage: The concept of „Values” and Culture Industry, file e0c31c08-a9b4-4599-e053-1705fe0aef77
|
35
|
International Conference on Homeland
Security, file e0c31c12-815e-4599-e053-1705fe0aef77
|
34
|
Heritage and Tourism: In the age of digital transition and pandemic, file e0c31c11-c2f8-4599-e053-1705fe0aef77
|
33
|
Citizens in the Digital Age: ICTs safety & security, file e0c31c08-b686-4599-e053-1705fe0aef77
|
30
|
THE 4TH INTERNATIONAL CULTURE INDUSTRY SUMMIT (ICIS 2015) &THE 8TH GANSU INTERNATIONAL CULTURE EXPO - OPENING ADDRESS, file e0c31c08-a9b7-4599-e053-1705fe0aef77
|
28
|
Does eContent talk to the heart?, file e0c31c08-b547-4599-e053-1705fe0aef77
|
26
|
Rethinking the role of ICTs - Digital transformation and Culture enjoyment continuity, file e0c31c11-c2f9-4599-e053-1705fe0aef77
|
25
|
WSIS Forum 2021 Highlights and Key Achievements, file e0c31c12-7fbd-4599-e053-1705fe0aef77
|
24
|
Leading the change or missing the opportunity ?, file e0c31c0f-cee4-4599-e053-1705fe0aef77
|
23
|
Heritage "values" in the decision making process, file e0c31c0b-8e23-4599-e053-1705fe0aef77
|
22
|
Outcomes of "The Impact of digital transition on society and economy", file e0c31c11-1065-4599-e053-1705fe0aef77
|
22
|
From Ingsoc to Skynet it is not only science fiction: From novels and science fiction to quasi-reality, file e0c31c11-83c0-4599-e053-1705fe0aef77
|
19
|
Big Data & Machine Learning Data Analytics & New Trends, file cef2f840-c1f7-4832-a13f-45753ccb6313
|
18
|
Troisième conférence inTernaTionale DiversiTé linguisTique eT culTurelle Dans le cyberespace - Rapport Final, file e0c31c08-b025-4599-e053-1705fe0aef77
|
18
|
Cyber trends and Languages, file e0c31c0f-31d4-4599-e053-1705fe0aef77
|
18
|
Building confidence and security in the use of ICTs, file e0c31c0f-d80c-4599-e053-1705fe0aef77
|
18
|
Reversing Cyber Loneliness, file 1efbac97-1cca-48cf-ab70-edb788ac3439
|
17
|
THE 4TH INTERNATIONAL CULTURE INDUSTRY SUMMIT (ICIS 2015) &THE 8TH GANSU INTERNATIONAL CULTURE EXPO - OPENING ADDRESS, file e0c31c08-a9b8-4599-e053-1705fe0aef77
|
15
|
THE MOSCOW DECLARATION ON DIGITAL INFORMATION PRESERVATION, file e0c31c08-b026-4599-e053-1705fe0aef77
|
14
|
ICCC Opening Address, file e0c31c0e-f63e-4599-e053-1705fe0aef77
|
14
|
ICCC Opening speech, file e0c31c12-8165-4599-e053-1705fe0aef77
|
14
|
Outcome "Round Table on Cyberlaw, Cybercrime & Cybersecurity", file e0c31c10-f998-4599-e053-1705fe0aef77
|
13
|
Axiology in the domain of heritage: The concept of „Values” and its potential impact, file e0c31c08-b01d-4599-e053-1705fe0aef77
|
12
|
SMART CITES: beyond cyber security, file e0c31c08-b31b-4599-e053-1705fe0aef77
|
12
|
It is all gold that glitters? The "New normal", file 51b66625-80e9-4d14-9c10-2e2de998aeec
|
11
|
Digital entrapment: tangible and intangible impact, file 6a898b53-aa94-40da-8bed-0a11a9b7a6a9
|
11
|
Arctic: Cultural Identity, Technology, Values, file e0c31c08-b020-4599-e053-1705fe0aef77
|
11
|
UNDERSTANDING OVERTOURISM “DRIVERS”, file e0c31c10-9156-4599-e053-1705fe0aef77
|
11
|
Evaporating Privacy In Digital Ecosystem, file e0c31c12-8fa2-4599-e053-1705fe0aef77
|
10
|
Need for Today’s Time Data Economy & Connected Challenges, file 656040e6-c429-42d6-adb6-0affe75c7962
|
9
|
Does eContent talk to the heart?, file e0c31c08-b315-4599-e053-1705fe0aef77
|
9
|
Does eContent talk to the heart?, file e0c31c08-a97f-4599-e053-1705fe0aef77
|
8
|
Museum exposition in the age of digital communication, file e0c31c09-6885-4599-e053-1705fe0aef77
|
8
|
ICCC Opening Ceremony, file 4c6b161e-d81d-46e7-834e-3cfb92ca05e0
|
7
|
Heritage and Tourism: In the age of digital transition and pandemic, file 2961ca9d-9490-4366-8eff-cd5470fd1fde
|
6
|
Reversing Cyber Loneliness, file 102ea42b-deeb-40ba-81ae-b12540d3de41
|
5
|
Hyderabad Declaration on Internet for Social Good (I4SG), file 064b65ea-6506-460d-a78a-a64afd871dcf
|
4
|
THE DIGITAL TRANSFORMATION “NEW NORMAL”, file 0ddfa342-f2b1-4851-a643-11f8f1c3f976
|
4
|
THE 4TH INTERNATIONAL CULTURE INDUSTRY SUMMIT (ICIS 2015) &THE 8TH GANSU INTERNATIONAL CULTURE EXPO - OPENING ADDRESS, file e0c31c08-afb2-4599-e053-1705fe0aef77
|
4
|
2023 ICCC Opening Ceremony, file 69cb501f-3842-41bc-9ef0-add8757ec668
|
3
|
Risks in a global perspective - Risk Assessment and Management:
New technologies and solutions thanks to an interdisciplinary approach, file e0c31c08-b31a-4599-e053-1705fe0aef77
|
3
|
Fostering the Culture of Cyber Security, file e0c31c0e-dc08-4599-e053-1705fe0aef77
|
3
|
Is ethics evaporating in the cyber era? Part 1: Setting the scene, file 1721bdcb-cc83-4a27-86fd-22d30c546e9a
|
2
|
Human Factor, Resilience & Cyber/Hybrid Influence, file 3176ea2a-1a7a-4458-ad98-661fc91eb458
|
2
|
Can cyber technology be resilient and green?, file c268b9c7-cd6f-4683-83a5-bfdc256c98e4
|
2
|
European Legislation and Cultural Heritage - A growing challange for sustainable Cultural Heritage management and use, file e0c31c08-4189-4599-e053-1705fe0aef77
|
2
|
ICTs for Safety & Security, file e0c31c0a-c63b-4599-e053-1705fe0aef77
|
2
|
Is ethics evaporating in the cyber era? Part 2: Feeling Framed, file e0c31c12-8174-4599-e053-1705fe0aef77
|
2
|
e-Democracy: Toward a New model of (Inter)active Society, file e0c31c12-c310-4599-e053-1705fe0aef77
|
2
|
Totale |
15.880 |