How to cover an election? We are accustomed to TV marathons, but we are increasingly getting news through online newspapers, live blogs and updates of the results via Twitter. In between, the classi...
Events -
Encryption, trojans, backdoor: cyber-security has become mainstream news. What’s at stake? Why is cyber-war such a hot topic? And how is it that abstruse technological issues have become items on ...
Is there such a thing as the ‘right’ to be forgotten? The European Court of Justice and European Commission think so. Should there be? Badly defined, it might threaten freedom of knowledge and i...
The ins and outs of corporate communication and storytelling in the wake of the case study Eni vs Report.
The concerns raised by hardware security are increasing more and more as attackers expand their scope outside the pure realm of software. While certainly representing an advanced threat, hardware at...
The terrible triangle: tyrants, terrorists and native reform in the Arab world
#ijf16talk by Iyad El-Baghdadi. Moderated by Barbara Serra.
It's time to propose new models to filter the massive overflow of news and re-establish a relationship of trust between journalists and readers. It's time for a leisurely revolution.
Italian organised crime is a global problem, yet all syndicates maintain strongholds in their local area. Three newsrooms - Grandangolo in Agrigento (Sicily), Il Dispaccio in Reggio Calabria, CORRE...
Hackers and journalists: attempts at dialogue and the fundamentals of technology and security
Hackers and journalists: attempts at dialogue and the fundamentals of technology and security. Concepts, terminology, doubts and misunderstandings. This session includes a detailed overview of the ...
We are witnessing a return of nationalisms in Europe. Right-wing movements with radical and populist identity and xenophobic tendencies are now seated in the European Parliament and in 2015 the elec...