<div><br></div><div><br><div class="gmail_quote"><div dir="ltr" class="gmail_attr">---------- Forwarded message ---------<br>From: <strong class="gmail_sendername" dir="auto">Academia</strong> <span dir="auto"><<a href="mailto:updates@academia-mail.com">updates@academia-mail.com</a>></span><br>Date: Wed, Dec 18, 2019 at 8:50 PM<br>Subject: [PDF] "Report "Global Internet Governance and International Security in the Field of..."<br>To:  <<a href="mailto:carolina.rossini@gmail.com">carolina.rossini@gmail.com</a>><br></div><br><br><u></u>















<div style="width:100%!important;min-width:100%;box-sizing:border-box;color:#000;font-family:Helvetica,Arial,sans-serif;font-weight:normal;text-align:left;line-height:150%;font-size:16px;margin:0;padding:0">

<table style="background-color:white;border-spacing:0;border-collapse:collapse;vertical-align:top;text-align:left;height:100%;width:100%;color:#000;font-family:Helvetica,Arial,sans-serif;font-weight:normal;line-height:150%;font-size:16px;margin:0;padding:0"><tbody><tr style="vertical-align:top;text-align:left;padding:0"><td align="center" valign="top" style="word-wrap:break-word;border-collapse:collapse!important;vertical-align:top;text-align:left;color:#000;font-family:Helvetica,Arial,sans-serif;font-weight:normal;line-height:150%;font-size:16px;word-break:break-word;margin:0;padding:0"><center style="width:100%;min-width:600px">

<u></u><u></u><u></u><center style="width:100%;min-width:600px"><table style="border-spacing:0;border-collapse:collapse;vertical-align:top;text-align:left;width:auto;margin:0px;padding:0"><tbody><tr style="vertical-align:top;text-align:left;padding:0"><td style="word-wrap:break-word;border-collapse:collapse!important;vertical-align:top;text-align:left;color:#000;font-family:Helvetica,Arial,sans-serif;font-weight:normal;line-height:150%;font-size:16px;word-break:break-word;margin:0;padding:0"><table style="border-spacing:0;border-collapse:collapse;vertical-align:top;text-align:left;padding:0"><tbody><tr style="vertical-align:top;text-align:left;padding:0"><td style="background-color:inherit;word-wrap:break-word;border-collapse:collapse!important;vertical-align:top;text-align:center;color:#fefefe;font-family:Helvetica,Arial,sans-serif;font-weight:normal;line-height:150%;font-size:16px;word-break:break-word;margin:0;padding:0;border:none"><a style="color:#fefefe;font-family:Helvetica,Arial,sans-serif;font-weight:bold;text-align:center;line-height:150%;text-decoration:none;font-size:16px;display:inline-block;border-radius:3px;margin:0;padding:0px;border:none" title="Academia.edu" href="https://www.academia.edu/t/qmNL-Nxy8YNn-m4FCt/" target="_blank"><img alt="Academia.edu" style="max-width:265px;width:auto;height:auto;outline:none;text-decoration:none;clear:both;display:block;border:none" src="http://a.academia-assets.com/assets/emails/inky/academia_logo_40px_padding@2x-056bcb9e2e000c47b30cc7f6fb3d803ad22322f340bf1987565b815a8987ccbf.png"></a></td></tr></tbody></table></td></tr></tbody></table></center><u></u><u></u><u></u><table style="border-spacing:0;border-collapse:collapse;vertical-align:top;text-align:left;padding:0">

<tbody><tr style="vertical-align:top;text-align:left;padding:0"><td class="m_-733403298027857195container-row" style="width:600px;word-wrap:break-word;border-collapse:collapse!important;vertical-align:top;text-align:left;color:#000;font-family:Helvetica,Arial,sans-serif;font-weight:normal;line-height:150%;font-size:16px;word-break:break-word;margin:0 0 12px;padding:0 8px">

<hr style="margin:0px;border:1px solid #ddd">

<br>Dear Carolina,<br><br><p style="color:#000;font-family:Helvetica,Arial,sans-serif;font-weight:normal;text-align:left;line-height:150%;font-size:16px;margin:0 0 10px;padding:0">You read the paper "<a href="https://www.academia.edu/keypass/OEczYnBzeHlPdTBOd2F0ZWdTaWVHRFp0MDZ4SFhPa3Y2a1FjNTY2a2RTMD0tLVBXbkYxcSs1dkh0T2ZYMHpsZ0NxR3c9PQ==--d03a163fc79480bbdd158e352a4f07e5283c6a74/t/qmNL-Nxy8YNn-m4FCt/resource/work/8740454/Brazil_and_Cybersecurity_in_the_Aftermath_of_the_Snowden_Revelations_Konrad_Adenauer_Foundation_2014_?email_work_card=interaction_paper" style="color:#1e88e5;font-family:Helvetica,Arial,sans-serif;font-weight:normal;text-align:left;line-height:150%;text-decoration:none;margin:0;padding:0" target="_blank">Brazil and Cybersecurity in the Aftermath of the Snowden Revelations [Konrad...</a>". A related Internet Governance paper was uploaded to Academia.</p>

</td></tr>

<tr style="vertical-align:top;text-align:left;padding:0"><td class="m_-733403298027857195container-row" style="width:600px;word-wrap:break-word;border-collapse:collapse!important;vertical-align:top;text-align:left;color:#000;font-family:Helvetica,Arial,sans-serif;font-weight:normal;line-height:150%;font-size:16px;word-break:break-word;margin:0;padding:0 4px">



<table style="width:100%;border-spacing:0;border-collapse:separate;vertical-align:top;text-align:left;border-radius:20px;overflow:hidden;padding:0;border:1px solid #ddd">

<tbody><tr style="vertical-align:top;text-align:left;padding:0"><td style="width:100%;word-wrap:break-word;border-collapse:collapse!important;vertical-align:top;text-align:left;color:#000;font-family:Helvetica,Arial,sans-serif;font-weight:normal;line-height:150%;font-size:16px;word-break:break-word;margin:0;padding:24px"><table style="width:100%;border-spacing:0;border-collapse:collapse;vertical-align:top;text-align:left;padding:0">

<tbody><tr style="width:100%;vertical-align:top;text-align:left;padding:0">

<td style="word-wrap:break-word;border-collapse:collapse!important;vertical-align:top;text-align:left;color:#000;font-family:Helvetica,Arial,sans-serif;font-weight:normal;line-height:150%;font-size:16px;word-break:break-word;margin:0;padding:0"><table style="border-spacing:0;border-collapse:collapse;vertical-align:top;text-align:left;padding:0">

<tbody><tr style="vertical-align:top;text-align:left;padding:0"><td style="word-wrap:break-word;border-collapse:collapse!important;vertical-align:top;text-align:left;color:#000;font-family:Helvetica,Arial,sans-serif;font-weight:normal;line-height:150%;font-size:16px;word-break:break-word;overflow:hidden;text-overflow:ellipsis;margin:0;padding:0"><a href="https://www.academia.edu/keypass/OEczYnBzeHlPdTBOd2F0ZWdTaWVHRFp0MDZ4SFhPa3Y2a1FjNTY2a2RTMD0tLVBXbkYxcSs1dkh0T2ZYMHpsZ0NxR3c9PQ==--d03a163fc79480bbdd158e352a4f07e5283c6a74/t/qmNL-Nxy8YNn-m4FCt/resource/work/18751246/Report_Global_Internet_Governance_and_International_Security_in_the_Field_of_the_ICT_Use_?email_work_card=title" style="color:#333;font-family:Georgia,Times,'Times New Roman',serif;font-weight:normal;text-align:left;line-height:1.3em;text-decoration:none;display:block;font-size:24px;margin:0 0 10px;padding:0" target="_blank">Report "Global Internet Governance and International Security in the Field of the ICT Use"</a></td></tr>

<tr style="vertical-align:top;text-align:left;padding:0"><td style="word-wrap:break-word;border-collapse:collapse!important;vertical-align:top;text-align:left;color:#000;font-family:Helvetica,Arial,sans-serif;font-weight:normal;line-height:150%;font-size:16px;word-break:break-word;margin:0;padding:0"><a href="http://mgimo.academia.edu/keypass/OEczYnBzeHlPdTBOd2F0ZWdTaWVHRFp0MDZ4SFhPa3Y2a1FjNTY2a2RTMD0tLVBXbkYxcSs1dkh0T2ZYMHpsZ0NxR3c9PQ==--d03a163fc79480bbdd158e352a4f07e5283c6a74/t/qmNL-Nxy8YNn-m4FCt/OlegDemidov" style="color:#000000;font-family:Helvetica;font-weight:bold;text-align:left;line-height:20px;text-decoration:none;font-size:12px;letter-spacing:0.4px;margin:0;padding:0" target="_blank"><img width="28" height="28" alt="" border="0" src="https://0.academia-photos.com/1335120/491356/11987666/s65_oleg.demidov.jpg" style="outline:none;text-decoration:none;width:auto;max-width:100%;clear:both;display:inline;vertical-align:middle;height:20px;border-radius:50%;font-family:Helvetica;font-weight:bold;letter-spacing:0.4px;color:#000000;border:none"> Oleg Demidov</a></td></tr>

<tr style="vertical-align:top;text-align:left;padding:0"><td style="word-wrap:break-word;border-collapse:collapse!important;vertical-align:top;text-align:left;color:#000;font-family:Helvetica,Arial,sans-serif;font-weight:normal;line-height:150%;font-size:16px;word-break:break-word;margin:0;padding:0"><div style="margin-top:8px!important;margin-bottom:12px!important;font-size:13px;overflow:hidden;margin-right:4px;font-family:'Helvetica Neue',sans-serif;line-height:20px;color:#595959">66 Views </div></td></tr>

</tbody></table></td>

<td class="m_-733403298027857195work-card-thumbnail-container" style="max-height:165px;word-wrap:break-word;border-collapse:collapse!important;vertical-align:top;text-align:left;color:#000;font-family:Helvetica,Arial,sans-serif;font-weight:normal;line-height:150%;font-size:16px;word-break:break-word;width:94px;margin:0;padding:0"><a href="https://www.academia.edu/keypass/OEczYnBzeHlPdTBOd2F0ZWdTaWVHRFp0MDZ4SFhPa3Y2a1FjNTY2a2RTMD0tLVBXbkYxcSs1dkh0T2ZYMHpsZ0NxR3c9PQ==--d03a163fc79480bbdd158e352a4f07e5283c6a74/t/qmNL-Nxy8YNn-m4FCt/resource/work/18751246/Report_Global_Internet_Governance_and_International_Security_in_the_Field_of_the_ICT_Use_?email_work_card=thumbnail" style="color:#1e88e5;font-family:Helvetica,Arial,sans-serif;font-weight:normal;text-align:left;line-height:150%;text-decoration:none;margin:0;padding:0" target="_blank"><img width="92" height="120" style="display:inline;width:92px;outline:none;text-decoration:none;max-width:100%;clear:both;border-radius:8px;vertical-align:middle;text-align:center;margin:0 0 8px;padding:0 1px;border-color:#ededed #ededed #e1e1e1;border-style:solid;border-width:1px" alt="Paper Thumbnail" src="https://imgv2-1-f.scribdassets.com/img/document/290631067/111x142/f774a3ff3a/1448115652"><div style="margin-top:4px!important;font-size:12px;text-align:center;color:#595959;line-height:20px;font-family:'Helvetica Neue',sans-serif">93 Pages</div></a></td>

</tr>

<tr style="vertical-align:top;text-align:left;padding:0"><td style="word-wrap:break-word;border-collapse:collapse!important;vertical-align:top;text-align:left;color:#000;font-family:Helvetica,Arial,sans-serif;font-weight:normal;line-height:150%;font-size:16px;word-break:break-word;margin:0;padding:0"><table style="border-spacing:0;border-collapse:collapse;vertical-align:top;text-align:left;padding:0"><tbody><tr style="vertical-align:top;text-align:left;padding:0">

<td style="word-wrap:break-word;border-collapse:collapse!important;vertical-align:top;text-align:left;color:#000;font-family:Helvetica,Arial,sans-serif;font-weight:normal;line-height:150%;font-size:16px;word-break:break-word;margin:0;padding:0 12px 0 0"><div style="max-width:160px;word-break:normal;word-wrap:normal;display:flex!important"><a href="https://www.academia.edu/keypass/OEczYnBzeHlPdTBOd2F0ZWdTaWVHRFp0MDZ4SFhPa3Y2a1FjNTY2a2RTMD0tLVBXbkYxcSs1dkh0T2ZYMHpsZ0NxR3c9PQ==--d03a163fc79480bbdd158e352a4f07e5283c6a74/t/qmNL-Nxy8YNn-m4FCt/resource/work/18751246/Report_Global_Internet_Governance_and_International_Security_in_the_Field_of_the_ICT_Use_?auto=download" style="color:#ffffff;font-family:'Helvetica Neue',sans-serif;font-weight:700;text-align:center;line-height:20px;text-decoration:none;border-radius:18px;background-color:#0954d3;font-size:14px;display:block;white-space:nowrap;margin:0;padding:8px 16px;border:none" target="_blank">Download</a></div></td>

<td style="word-wrap:break-word;border-collapse:collapse!important;vertical-align:top;text-align:left;color:#000;font-family:Helvetica,Arial,sans-serif;font-weight:normal;line-height:150%;font-size:16px;word-break:break-word;margin:0;padding:0"><div style="max-width:160px;word-break:normal;word-wrap:normal;display:flex!important"><a href="https://www.academia.edu/keypass/OEczYnBzeHlPdTBOd2F0ZWdTaWVHRFp0MDZ4SFhPa3Y2a1FjNTY2a2RTMD0tLVBXbkYxcSs1dkh0T2ZYMHpsZ0NxR3c9PQ==--d03a163fc79480bbdd158e352a4f07e5283c6a74/t/qmNL-Nxy8YNn-m4FCt/resource/work/18751246/Report_Global_Internet_Governance_and_International_Security_in_the_Field_of_the_ICT_Use_?auto=bookmark" style="color:#0954d3;font-family:'Helvetica Neue',sans-serif;font-weight:700;text-align:center;line-height:20px;text-decoration:none;border-radius:18px;background-color:#eaf0fc;font-size:14px;display:block;white-space:nowrap;margin:0;padding:8px 16px;border:none" target="_blank">Save to Library</a></div></td>



</tr></tbody></table></td></tr>

</tbody></table></td></tr>

<tr style="background-color:#f8f8f8!important;vertical-align:top;text-align:left;padding:0"><td style="word-wrap:break-word;border-collapse:collapse!important;vertical-align:top;text-align:left;color:#000;font-family:Helvetica,Arial,sans-serif;font-weight:normal;line-height:150%;font-size:16px;word-break:break-word;margin:0;padding:16px 24px 20px"><table style="border-spacing:0;border-collapse:collapse;vertical-align:top;text-align:left;padding:0">

<tbody><tr style="vertical-align:top;text-align:left;padding:0"><td style="word-wrap:break-word;border-collapse:collapse!important;vertical-align:top;text-align:left;color:#0954d3;font-family:'Helvetica Neue',sans-serif;font-weight:700;line-height:1em;font-size:11px;word-break:break-word;display:block;letter-spacing:0.7px;text-transform:uppercase;margin:0;padding:0 0 12px">ABSTRACT</td></tr>

<tr style="vertical-align:top;text-align:left;padding:0"><td style="word-wrap:break-word;border-collapse:collapse!important;vertical-align:top;text-align:left;color:#333;font-family:'Helvetica Neue',sans-serif;font-weight:normal;line-height:1.4em;font-size:15px;word-break:break-word;max-height:88px;overflow:hidden;text-overflow:ellipsis;margin:0;padding:4px 0 0">The Report “Global Internet Governance and International Security in the Field of ICT Use” was prepared by the PIR Center’s Consultant Oleg Demidov with contribution from the Working Group on International Information Security and Global Internet Governance under the PIR Center’s Advisory Board. The PIR Center is a...</td></tr>

<tr style="vertical-align:top;text-align:left;padding:0"><td style="word-wrap:break-word;border-collapse:collapse!important;vertical-align:top;text-align:left;color:#000;font-family:Helvetica,Arial,sans-serif;font-weight:normal;line-height:150%;font-size:16px;word-break:break-word;margin:0;padding:0"><table style="width:100%;border-spacing:0;border-collapse:collapse;vertical-align:top;text-align:left;padding:0"><tbody><tr style="vertical-align:top;text-align:left;padding:0"><td height="12px" style="word-wrap:break-word;border-collapse:collapse!important;vertical-align:top;text-align:left;color:#000;font-family:Helvetica,Arial,sans-serif;font-weight:normal;line-height:150%;font-size:16px;word-break:break-word;margin:0;padding:0"></td></tr></tbody></table></td></tr>

<tr style="vertical-align:top;text-align:left;padding:0"><td class="m_-733403298027857195research-interest" style="word-wrap:break-word;border-collapse:collapse!important;vertical-align:top;text-align:left;color:#0954d3;font-family:'Helvetica Neue',sans-serif;font-weight:700;line-height:1.2em;font-size:13px;word-break:break-word;overflow:hidden;text-overflow:ellipsis;white-space:nowrap;display:block;margin:0;padding:0">Cyberlaw • Cyber Warfare • Cyber Security • Internet Governance + 2 more</td></tr>

</tbody></table></td></tr>

</tbody></table>

<table style="width:100%;border-spacing:0;border-collapse:collapse;vertical-align:top;text-align:left;padding:0"><tbody><tr style="vertical-align:top;text-align:left;padding:0"><td height="24px" style="word-wrap:break-word;border-collapse:collapse!important;vertical-align:top;text-align:left;color:#000;font-family:Helvetica,Arial,sans-serif;font-weight:normal;line-height:150%;font-size:16px;word-break:break-word;margin:0;padding:0"></td></tr></tbody></table>

<table cellpadding="0px" style="width:100%;border-spacing:0;border-collapse:collapse;vertical-align:top;text-align:left;margin:0px;padding:0"><tbody><tr style="vertical-align:top;text-align:left;padding:0"><td style="word-wrap:break-word;border-collapse:collapse!important;vertical-align:top;text-align:left;color:#000;font-family:Helvetica,Arial,sans-serif;font-weight:normal;line-height:150%;font-size:16px;word-break:break-word;margin:0;padding:0"><center style="width:100%;min-width:600px"><table cellpadding="0px" style="width:100%;border-spacing:0;border-collapse:collapse;vertical-align:top;text-align:center;box-sizing:border-box;padding:0"><tbody><tr style="vertical-align:top;text-align:left;padding:0"><td style="background-color:inherit;word-wrap:break-word;border-collapse:collapse!important;vertical-align:top;text-align:left;color:#fefefe;font-family:Helvetica,Arial,sans-serif;font-weight:normal;line-height:150%;font-size:16px;word-break:break-word;width:60%;box-sizing:border-box;margin:0;padding:0;border:inherit solid #1e88e5" valign="middle"><center style="width:100%;min-width:600px"><a href="https://www.academia.edu/keypass/OEczYnBzeHlPdTBOd2F0ZWdTaWVHRFp0MDZ4SFhPa3Y2a1FjNTY2a2RTMD0tLVBXbkYxcSs1dkh0T2ZYMHpsZ0NxR3c9PQ==--d03a163fc79480bbdd158e352a4f07e5283c6a74/t/qmNL-Nxy8YNn-m4FCt/resource/work/18751246/Report_Global_Internet_Governance_and_International_Security_in_the_Field_of_the_ICT_Use_?email_work_card=view-paper&auto_download=true" style="color:#fefefe;font-family:Helvetica,Arial,sans-serif;font-weight:bold;text-align:center;line-height:150%;text-decoration:none;font-size:16px;display:inline-block;border-radius:3px;background-color:#0954d3;width:60%;box-sizing:border-box;margin:0;padding:12px 0px;border:0 solid #1e88e5" target="_blank">View Paper ▸</a></center></td></tr></tbody></table></center></td></tr></tbody></table>

<table style="width:100%;border-spacing:0;border-collapse:collapse;vertical-align:top;text-align:left;padding:0"><tbody><tr style="vertical-align:top;text-align:left;padding:0"><td height="12px" style="word-wrap:break-word;border-collapse:collapse!important;vertical-align:top;text-align:left;color:#000;font-family:Helvetica,Arial,sans-serif;font-weight:normal;line-height:150%;font-size:16px;word-break:break-word;margin:0;padding:0"></td></tr></tbody></table>

<a href="https://www.academia.edu/keypass/OEczYnBzeHlPdTBOd2F0ZWdTaWVHRFp0MDZ4SFhPa3Y2a1FjNTY2a2RTMD0tLVBXbkYxcSs1dkh0T2ZYMHpsZ0NxR3c9PQ==--d03a163fc79480bbdd158e352a4f07e5283c6a74/t/qmNL-Nxy8YNn-m4FCt/?related_work=8740454&show_related_work_survey=true&source_work=18751246" style="font-size:16px!important;color:#1e88e5;font-family:Helvetica,Arial,sans-serif;font-weight:normal;text-align:left;line-height:150%;text-decoration:none;margin:0;padding:0" target="_blank"><center style="width:100%;min-width:600px">Not a good recommendation?</center></a><table style="border-spacing:0;border-collapse:collapse;vertical-align:top;text-align:left;padding:0"><tbody><tr style="vertical-align:top;text-align:left;padding:0"><td height="36px" style="word-wrap:break-word;border-collapse:collapse!important;vertical-align:top;text-align:left;color:#000;font-family:Helvetica,Arial,sans-serif;font-weight:normal;line-height:150%;font-size:16px;word-break:break-word;margin:0;padding:0"></td></tr></tbody></table>

</td></tr>

<tr style="vertical-align:top;text-align:left;padding:0"><td style="word-wrap:break-word;border-collapse:collapse!important;vertical-align:top;text-align:left;color:#000;font-family:Helvetica,Arial,sans-serif;font-weight:normal;line-height:150%;font-size:16px;word-break:break-word;margin:0;padding:0"><hr style="margin:0px;border:1px solid #ddd"></td></tr>

<tr style="vertical-align:top;text-align:left;padding:0"><td style="word-wrap:break-word;border-collapse:collapse!important;vertical-align:top;text-align:left;color:#000;font-family:Helvetica,Arial,sans-serif;font-weight:normal;line-height:150%;font-size:16px;word-break:break-word;margin:0;padding:0">

<br><a href="https://academia.app.link/xzTUSeHxQX" style="color:#1e88e5;font-family:Helvetica,Arial,sans-serif;font-weight:normal;text-align:left;line-height:150%;text-decoration:none;margin:0;padding:0" target="_blank"><center style="width:100%;min-width:600px"><img style="width:120px;outline:none;text-decoration:none;max-width:100%;clear:both;display:block;border:none" src="http://a.academia-assets.com/assets/emails/inky/app-store-badge@2x-3ad2e3750d86db6142789208ebd5b76d0ae638c865f1885304596103bf751995.jpg" alt="App store badge@2x"></center></a>

</td></tr>

</tbody></table>

<u></u><u></u><table style="background-color:transparent!important;border-spacing:0;border-collapse:collapse;vertical-align:top;text-align:left;padding:0"><tbody><tr style="vertical-align:top;text-align:left;padding:0"><td style="word-wrap:break-word;border-collapse:collapse!important;vertical-align:top;text-align:left;color:#000;font-family:Helvetica,Arial,sans-serif;font-weight:normal;line-height:150%;font-size:16px;word-break:break-word;margin:0;padding:0">

<br><p style="font-size:11px!important;color:#999!important;text-align:center;font-family:Helvetica,Arial,sans-serif;font-weight:normal;line-height:150%;margin:0 0 10px;padding:0"><a style="color:#999;font-family:Helvetica,Arial,sans-serif;font-weight:normal;text-align:left;line-height:150%;text-decoration:none;margin:0;padding:0">580 California St., Suite 400, San Francisco, CA, 94104</a></p>

<p style="font-size:11px!important;text-align:center;color:#000;font-family:Helvetica,Arial,sans-serif;font-weight:normal;line-height:150%;margin:0 0 10px;padding:0"><a href="https://www.academia.edu/keypass/OEczYnBzeHlPdTBOd2F0ZWdTaWVHRFp0MDZ4SFhPa3Y2a1FjNTY2a2RTMD0tLVBXbkYxcSs1dkh0T2ZYMHpsZ0NxR3c9PQ==--d03a163fc79480bbdd158e352a4f07e5283c6a74/t/qmNL-Nxy8YNn-m4FCt/unsubscribe/related_work_suggestions" style="color:#999!important;font-family:Helvetica,Arial,sans-serif;font-weight:normal;text-align:left;line-height:150%;text-decoration:none;margin:0;padding:0" target="_blank">Unsubscribe</a>   <a href="https://www.academia.edu/t/qmNL-Nxy8YNn-m4FCt/privacy" style="color:#999!important;font-family:Helvetica,Arial,sans-serif;font-weight:normal;text-align:left;line-height:150%;text-decoration:none;margin:0;padding:0" target="_blank">Privacy Policy</a>   <a href="https://www.academia.edu/t/qmNL-Nxy8YNn-m4FCt/terms" style="color:#999!important;font-family:Helvetica,Arial,sans-serif;font-weight:normal;text-align:left;line-height:150%;text-decoration:none;margin:0;padding:0" target="_blank">Terms of Service</a>   </p>

<p style="font-size:11px!important;color:#999!important;text-align:center;font-family:Helvetica,Arial,sans-serif;font-weight:normal;line-height:150%;margin:0 0 10px;padding:0"><span>© 2019 Academia</span></p>

</td></tr></tbody></table>

</center></td></tr></tbody></table>

<div style="display:none;white-space:nowrap;font:15px courier">                                                            </div>

<img border="0" height="1" src="https://www.academia.edu/t/qmNL-Nxy8YNn-m4FCt/images/clear.gif" width="1" style="outline:none;text-decoration:none;width:auto;max-width:100%;clear:both;display:block">

</div>



</div></div>-- <br><div dir="ltr" class="gmail_signature" data-smartmail="gmail_signature"><div dir="ltr"><div><div dir="ltr"><div><div dir="ltr"><div><div dir="ltr"><div dir="ltr"><div dir="ltr"><div dir="ltr"><div style="background-color:rgb(255,255,255)"><div dir="ltr" style="font-family:arial;font-size:small"><br></div><div dir="ltr"><div style="font-family:sans-serif;font-size:12.8px"><div style="font-family:Arial,Helvetica,sans-serif;font-size:small"><font face="arial, sans-serif" color="#073763"><b>__<br>Carolina A. Rossini, JD, LLM, MBA</b></font><div><div><font face="arial, sans-serif"><i>Skype:</i><font color="#0000ff"> carolina.rossini_2 </font><font color="#000000">| Twitter: </font><font color="#0000ff">@carolinarossini</font></font></div></div><div><a href="https://www.linkedin.com/in/carolinarossini/" style="color:rgb(17,85,204)" target="_blank">https://www.linkedin.com/in/carolinarossini/</a></div><div><br></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div>