Regulation by states, or self-regulation by companies themselves? There is almost no field of Internet governance that does not involve this debate. The well-known example in the telecom market is, of course, service costs: business opts for an open...
 20 Jan 2012

Blog post
The workshop will take place on Friday, 14th June 2019 at the Bina Nusantara University in Jakarta, Indonesia. The event expects to gather attendees from the region to discuss personal data and privacy, and take a look at case studies, related to peo...
 14 Jun 2019

Event
The second Western Balkans Digital Summit will bring together more than 3 000 participants to take regional digital co-operation to the next level. Senior representatives from governments, international institutions, businesses, community organisatio...
 3 Apr 2019

Event
Have you seen the recent 10-year challenge on social media - people posting their personal photos from 2008 and 2018 side by side? Our collective data consciousness increased after Cambridge Analytica, so the probable purpose of this meme was quickly...
 30 Jan 2019

Blog post
Low and middle income countries are rolling out sophisticated digital identification systems. Will they be a panacea for social and economic inclusion, or are they another way to control people’s personal information? For generations, peopl...
 21 Jan 2019

Blog post
How can you participate in this dialogue? Switzerland invites states, the private sector, the tech community, civil society, academia, cybersecurity experts and other interested parties to participate in this dialogue either by joining online disc...
 1 Oct 2018

Event
An interactive online capacity development programme Internet governance (IG) has become one of the most important policy areas of our time. Topics like privacy protection, human rights online, and cybersecurity are increasingly in the focus of gl...

Course
The Geneva Internet L@w Summer School, organised by the Univesity of Geneva, will be held on 18–29 June 2018, in Geneva, Switzerland. The schoolwill give students the opportunity to gain hands-on experience in the framework of an Inter...
 18 Jun 2018

Event
In the USA, the Clarifying Lawful Overseas Use of Data Act (CLOUD Act) is proposing to establish a new framework for authorities to access data stored abroad and thus amend the Stored Communications Act (SCA). We look at the salient features of the b...
 20 Mar 2018

Blog post
The EU General Data Protection Regulation (GDPR) is now only months away from entering into force (May 2018). There have been numerous debates as to how it will change the landscape of data protection in the EU and beyond. But looking at the broader ...
 13 Nov 2017

Blog post
The European Union’s General Data Protection Regulation will take effect one year from now - on 25 May 2018. In this post, two central questions are tackled: Who will be affected by the new rules, and what does the regulation apply to? Simply put,...
 30 May 2017

Blog post
(with contributions from Aida Mahmutović) The fight over personal data transfers between the European Union (EU) and the USA is not over. Earlier this month, a second legal challenge directed at the Privacy Shield framework was raised. After be...
 18 Nov 2016

Blog post
The Asian Forum on Global Governance is an annual event jointly organised by the Observer Research Foundation and ZEIT-Stiftung. The forum is aimed at exploring challenges facing the global community. It provides participants with a platform to discu...
 16 Oct 2016

Event
Nine months after the invalidation of the Safe Harbour Agreement, the European Commission (EC) confirmed that the new EU-US Privacy Shield affords adequate protection to the privacy of EU citi­zens. The framework imposes stronger obligations on US co...
 16 Sep 2016

Blog post
The critical Internet infrastructure is no longer a dry tech-geek topic. It has drawn attention from the wider Internet community through discussions on Internet names and numbers (domain names such as .amazon, .wine), the Internet of Things (self-...

Course
Internet governance (IG) may be more important to you than you realise. Have you been reading and worrying about cybersecurity threats? Does online surveillance concern you and your colleagues? These are important IG issues. Learning more about IG...

Course
Today’s headlines often feature the word ‘cyber’, reporting on threats related to the virtual world: online child abuse, stolen credit cards and virtual identities, malware and viruses, botnets and denial-of-service attacks on corporate or government...

Course
Diplo’s webinar on the Apple-FBI case, on 17 March (watch the recording), evolved into a Socratic dialogue on the core concepts and underlying assumptions of the case. The lively debate inspired us to create a series of posts that argue the mai...
 30 Mar 2016

Blog post
Diplo’s webinar on the Apple-FBI case, on 17 March (watch the recording), evolved into a Socratic dialogue on the core concepts and underlying assumptions of the case. The lively debate inspired us to create a series of posts that argue the mai...
 28 Mar 2016

Blog post
Diplo’s webinar on the Apple-FBI case, on 17 March (watch the recording), evolved into a Socratic dialogue on the core concepts and underlying assumptions of the case. The lively debate inspired us to create a series of posts that argue the mai...
 27 Mar 2016

Blog post
Diplo’s webinar on the Apple-FBI case, on 17 March (watch the recording), evolved into a Socratic dialogue on the core concepts and underlying assumptions of the case. The lively debate inspired us to create a series of posts that argue the main dile...
 24 Mar 2016

Blog post
Diplo’s webinar on the Apple-FBI case, on 17 March (watch the recording), evolved into a Socratic dialogue on the core concepts and underlying assumptions of the case. The lively debate inspired us to create a series of posts that argue the mai...
 22 Mar 2016

Blog post
Reflections on 2015 and predictions for 2016 Digital politics are quite predictable. We know this from experience: six years of making annual predictions of policy developments in the digital field. With the exception of the Snowden revelations in...
 20 Jan 2016

Blog post
The digital policy developments in September were dominated by the UN Summit to adopt the post-2015 development agenda, and the USA-China meeting from which a cyber arms deal emerged. Other developments were also important, such as the non-binding op...
 2 Oct 2015

Blog post
Cybersecurity, the global IG architecture, the IANA transition process, privacy and data protection, and the responsibility of Internet intermediaries ranked high on the digital policy agenda during the summer months, the IG Barometer for July and Au...
 27 Aug 2015

Blog post
June proved to be another intensive month for cybersecurity, privacy, data protection, and net neutrality. The IG Barometer revealed that new cybersecurity attacks, the anticipated announcement of the Special Rapporteur on the Right to Privacy, and c...
 2 Jul 2015

Blog post
The IG Barometer for March showed that the past few weeks were more intensive for online privacy and data protection, net neutrality, jurisdiction, and the IANA transition process, compared to previous weeks. Speaking during the March IG briefing,...
 9 Apr 2015

Blog post
UNESCO’s CONNECTing the Dots conference continued yesterday afternoon with eight break-out sessions on access, privacy, freedom of expression and ethics. We followed the second break-out session on privacy (break-out session 7), in which the p...
 5 Mar 2015

Blog post
[Update] The Rapporteur's summary of the panel discussion, including the speakers' complete interventions, is available. UNESCO’s CONNECTing the Dots conference is currently under way in Paris (3-4 March). Its aim is to discuss the fir...
 4 Mar 2015

Blog post
[Update] Read the conference's outcome document, adopted during the final plenary session [Update] Report from Day 2: Build a legacy for future generations, connect bridges - some suggestions for future action made during the Options for Future...
 4 Mar 2015

Event
Though not as eventful and as dynamic as January, a few major events in February increased the pressure on policy areas like net neutrality, cybersecurity, and the IANA stewardship transition, as February’s IG barometer showed. A useful tool to tr...
 2 Mar 2015

Blog post
Last Monday, in Philadelphia, about 13 000 representatives of law enforcement agencies from around the world met at the 120th Annual International Association of Chiefs of Police Conference and Law Enforcement Education and Technology Exhibition. ...
 28 Oct 2013

Blog post
When Brazil speaks on Internet governance (IG) everybody listens. Conference audiences shift from browsing the Net and look at the podium. The buzz in the room is replaced by an almost reverent silence. Every word is carefully heard. Brazil is a swin...
 20 Sep 2013

Blog post
One of this year’s ISOC NGL courses at DiploFoundation offered its students a pretty neat, and, one can say, once in a lifetime chance to ‘hang out’ with Vint Cerf, Google’s chief Internet Evangelist and often referred to as o...
 3 Aug 2012

Blog post
Diplo is pleased to announce a new call for applications for the following courses, which form part of the Advanced Phase of the Internet Governance Capacity Building Programme: Cybersecurity E-participation History of Internet ...
 14 May 2012

Blog post

Description:

The rapid rise of the Internet has encouraged the use of open, real-time, and linked data to help understand
and improve development processes.The advancement of data use for development without an Internet governance framework, however, raises the importance of inclusion of the most marginalized, as well as privacy and security. This paper will examine such issues, as well as the role inter-governmental organisations can play in helping to encourage the use of data while supporting the protection of privacy and security.

Source: 
Internet governance research paper
 Keisha Taylor , 2010
 
Printer Friendly and PDF

Description:

We are witnessing an extreme proliferation of the social networks, which can be seen in two ways: an expansion of social network websites, and an increase in the number of people who are starting to use them. The author describes the risks associated with social networks, mostly associated with user's privacy, and the responsibility for those risks. This paper also analyses whether the rules proscribed so that social network providers can distance themselves from possible abuses are really designed to help the users be safe.

Source: 
Internet governance research paper
 Maša Kojić , 2010
 
Printer Friendly and PDF
If there are clouds, there might be rain--And it is raining, it is pouring... I know there are a lot of scary stories out there--you probably have a favorite one yourself (mine is the Pixar debacle where the award-winning movie Toy Story was almost ...
 2 Dec 2011

Blog post
The courses offer in-depth understanding of a wide range of topics. They take place on Diplo’s e-learning platform, supported by Web 2.0 interactive tools, allowing participants to learn and participate in a flexible, convenient way. The rich ...
 13 Jun 2011

Event
'Your 37 friends are waiting', says the Facebook e-mail which I have just received. They’re waiting for me to accept their friend request. That is, for me to share personal information, photos of me and my loved ones, and other bits of info which six...
 16 Oct 2010

Blog post
Subscribe to Privacy