Ambassador Asoke Mukerji’s diplomatic career spans 37 years, from 1978-2015. As India’s Ambassador and Permanent Representative to the United Nations in New York (2013-2015) he oversaw India’s negotiations on Agenda 2030 on Sustainable Development, f...

People
One could say that the wish list for cyber-peace was already written in 2015, when states agreed on some rules of behaviour in cyberspace - including that existing international law applies to it. Are we good to go? Not so fast. The devil is in the d...
 4 Dec 2019

Blog post
In December of last year, New York City was the place for diplomats to write a long list of New Year cyber-wishes, which came in the form of resolutions that established the first UN Open-Ended Working Group on Developments in the Field of ICTs in th...
 4 Dec 2019

Blog post
In December 2018, the United Nations General Assembly (UNGA) approved the creation of two distinct groups to further explore issues related to responsible state behaviour in cyberspace: an Open-Ended Working Group (OEWG) and a new Group of Government...
 20 Mar 2019

Blog post
The Geneva Internet Platform (GIP) organised a webinar entitled ‘What is responsible behaviour in cyberspace?’ within the framework of the Geneva Dialogue on Responsible Behaviour in Cyberspace. The webinar explored how responsible behaviour in cyber...
 30 Oct 2018

Blog post
While cyberspace and information and communications technology (ICT) can deliver significant benefits to society, the growing use of ICT by state and non-state actors for malicious purposes – threatening not only peace and security but also the entir...
 25 Oct 2018

Event
An interactive online capacity development programme Internet governance (IG) has become one of the most important policy areas of our time. Topics like privacy protection, human rights online, and cybersecurity are increasingly in the focus of gl...

Course

Description:

The comic brings a worrying, yet realistic and educative story that follows a life of a cyber vulnerability, from its inception to its deployment for an actual cyberattack.

Source: 
Cybersecurity
 Vladimir Radunovic, Vladimir Veljasevic , 2018
 

Resource text:

Printer Friendly and PDF
Microsoft has acknowledged that ‘the world needs new international rules to protect the public from nation state threats in cyberspace, and that ‘in short, the world needs a Digital Geneva Convention’. Mr Brad Smith, President and Chief Legal Offi...
 15 Mar 2018

Blog post
Today’s headlines often feature the word ‘cyber’, reporting on threats related to the virtual world: online child abuse, stolen credit cards and virtual identities, malware and viruses, botnets and denial-of-service attacks on corporate or government...

Topic page
Internet governance (IG) may be more important to you than you realise. Have you been reading and worrying about cybersecurity threats? Does online surveillance concern you and your colleagues? These are important IG issues. Learning more about IG...

Course
Today’s headlines often feature the word ‘cyber’, reporting on threats related to the virtual world: online child abuse, stolen credit cards and virtual identities, malware and viruses, botnets and denial-of-service attacks on corporate or government...

Course
Cyberspace has become an essential component of modern society, yet its merits are accompanied by threats. A growing number of reported cyber-incidents demand governments to come up with a strategic response to counter cyber-threats. This includes bu...
 5 May 2016

Blog post
What are the terms of the social contract that governs the behaviour of citizens, corporations, and governments in cyberspace, and how do we find the right balance between freedom, security, and economic growth in relation to cyberspace? These were ...
 18 Apr 2015

Blog post
In recent weeks the Chinese government has delivered strong messages about internet sovereignty to both international and domestic audiences. Despite confirming its commitment to working with the rest of the international community “to create a...
 24 Jun 2014

Blog post

Description:

Peacetime Regime for State Activities in Cyberspace (ed by Katharine Ziolkowski)  covers in a multi-disciplinary approach the technical, legal, policy and diplomacy aspects of State activities in cyberspace during peacetime. It consists of 23 chapters of academic nature, elaborated by 24 authors specialised in the respective areas of expertise. Diplo's Dr Jovan Kurbalija contributed this chapter on E-diplomacy and Diplomatic Law in the Internet Era.

Source: 
Other
 Dr Jovan Kurbalija , 2013
 

Resource text:

Printer Friendly and PDF
The publication covers in a multi-disciplinary approach the technical, legal, policy and diplomacy aspects of State activities in cyberspace during peacetime. It consists of 23 chapters of academic nature, elaborated by 24 authors specialised in the ...
Author: Katharina Ziolkowski (ed)

Books

Description:

This paper discusses cybersecurity in Fiji and offers recommendations to challenges such as the vulnerability of systems due to lack of a cybersecurity framework. The poorly framed laws and lack of appropriate policies.

Source: 
Internet governance research paper
 Salanieta Tamanikaiwaimaro , 2010
 
Printer Friendly and PDF

Description:

This paper comes on the eve of the millennium development goals deadline of 2015 which acknowledges ICT as the enabler for speeding towards the finish line. The quest is to explore whether we are all speeding towards a clearly defined goal, given our varied capacities and affinities.

Source: 
Internet governance research paper
 Felix Samakande , 2010
 
Printer Friendly and PDF

Description:

This paper discusses whether IT is functioning mainly as an instrument of states in their quest for power and wealth or is principally operating as a transformative agent by market forces and various sectors of civil society.

Source: 
Modern Diplomacy. Ed J. Kurbalija (1998)
 Richard Falk , 1998

Resource text:

Printer Friendly and PDF

Description:

In his paper, Richard Falk reflects on the application of information technology on diplomacy, and discusses the challenge of converting information technology to ‘knowledge technology’, and subsequently to ‘wisdom technology’. Yet, the ‘crossroads in human experience’ brings many challenges and dangers which the author analyses. 

Source: 
Knowledge and Diplomacy. Ed by J. Kurbalija (2002)
 Richard Falk , 2002

Resource text:

Printer Friendly and PDF
Subscribe to Cyberspace