Can robots replace diplomats?
Article by Joana Lopes | Illustration by Matilde Morri Can robots replace diplomats? You might be thinking how strange and bizarre this question is. But is it really? The main question of this article took inspiration from a TED talk of the former French Ambassador to Sweden, David Cvach,...
A Post-Privacy World? Big Data and the Privacy Paradox
Article by Anna Groh | Illustration by Francesco Moretti Forecasting the future – a useful gift that mankind could only dream of, until today. Indeed, in the age of digitalization, the rise of the internet and AI, forecasting the future is no longer just a dream. Interestingly, we are...
Social Media & Social Movements: Partners in Crime?
Article by Anna Groh | Illustration by Niccolò Cedeno 2017: The hashtag #MeToo goes viral on social media, breaking the national silence around the issue of sexual harassment. This eventually resulted in the firings of several men in high-power positions and changes to federal law (North, 2019). According to...
Are social media a zero-sum game?
Article by Alessia Petrucci | Illustration by Armadilly Comics ”Not everything that can be counted counts and not everything that counts can be counted.” (William Bruce Cameron) I am not going to lie. Something that happened to a friend some days ago pushed me to write this article. Long...
Why the new coronavirus is an asset for terrorists
Article by Joana Lopes | Illustration by Tommaso Bisagni Let’s consider the following argument: The coronavirus crisis has put the world in lockdown. Terrorists want to provoke mass causalities. Therefore, terrorist activity will decrease. This reasoning is a fallacy, for many reasons. For example, there are multiple types of...
Why mass surveillance is an undesirable method for counter-terrorism
Article by Joana Lopes | Illustration by Beatrice Bandiera The field of security and intelligence, especially the area of counter-terrorism, is no exception to the current technological advances: technology development, surveillance included, is an asset for both the perpetrators and counter-terrorism authorities. The use of the internet and artificial...