Search form

By on 20 Jun, 2014 | From the channel/s: E-tools, Internet Governance, Webinars

Cryptocurrencies are set to take the online world by storm, as their popularity and use, and understanding of their advantages and limitations increases. Giant companies like Apple and PayPal have already indicated their plans to integrate cryptocurrencies as a payment method, and more are likely to follow, with Bitcoin emerging as one of the most popular electronic currencies.

By on 19 Jun, 2014 | From the channel/s: Internet Governance

Trust (or the lack thereof) is a frequent theme in public debates. It is often seen as a monolithic concept. However, we trust different people for  different reasons, and in different ways. Sometimes we trust that people can do something (competences). In other situations our trust focuses on their intentions. This text is about trust in online space. It is inspired by discussions at the WSIS+10 high level dialogue on cybersecurity and trust

By on 12 Jun, 2014 | From the channel/s: Diplomacy

One of the key moments of the NSA-affair from a German perspective was the revelation that the phone of German chancellor Angela Merkel had been tapped. She reacted by stating that "spying among friends, that cannot be" and bemoaned a loss of trust.  

By on 12 Jun, 2014 | From the channel/s: Diplo Blog

Margarita Griffith is Learning Officer for the America Zone Office of the International Federation of Red Cross and Red Crescent Societies (IFRC) in Panama.

By on 09 Jun, 2014 | From the channel/s: E-tools

The cryptocurrency story is a continuation of the long-running saga of economics, markets, and commodity exchange in human society. With the constant rise of the global network, we have witnessed many global services becoming widely accepted and in a way changing (by adding to) our experience of mutual interaction, for example global mailing services, Internet aggregators, social networks, and file sharing, just to name a few.

By on 06 Jun, 2014 | From the channel/s: Diplomacy, Webinars

This is the second blog post in a series looking at diplomatic law, privileges and immunities. The blogs are written by Diplo lecturer Alan Franklin in follow-up to his 20 May webinar. In case you missed it, Part one looked at breaches of the VCCR and VCDR in relation to interception of communitcation.

By on 05 Jun, 2014 | From the channel/s: E-Diplomacy

If Benjamin Franklin, the first diplomat to represent the US, were able to time-travel his way here, he might choose to paraphrase himself: “either tweet something worth reading, or do something worth tweeting.”

By on 02 Jun, 2014 | From the channel/s: Internet Governance, Webinars

At the April Geneva webinar-briefing on Internet Governance we focused on the final preparations for the #NETmundial and reflected on other key developments of the month; we then looked into the main events scheduled for May.

By on 25 May, 2014 | From the channel/s: Webinars

Diplo lecturer Alan Franklin's webinar on 20 May stimulated intensive discussion about whether diplomatic law actually is complied with (the conventional viewpoint) or whether it is 'honoured in the breach' (the more realistic viewpoint).

The main topics of discussion were:

By on 23 May, 2014 | From the channel/s: Diplomacy

Last week I was struck by a photo I spotted on Facebook: three graduates of our 2008 Master/Postgraduate Diploma in Contemporary Diplomacy happened to meet up in New York.


Scroll to Top