Welcome to the Globethics.net Library!
أقسام مستودع جامعة طيبة الرقمي
حدد مجتمع لاستعراض حاوياته.
مضاف حديثاً
-
Performing Internet Governance: The Case Study of Youth Participation in The Internet Governance ForumThe Internet Governance Forum (IGF) is a multi-stakeholder forum that has convened annually since 2006 to debate issues of internet governance. It is shaped by three kinds of politics: representation, agenda setting, and principles. This study focuses on the politics of representation by analyzing the case study of youth participation in the IGF. Due to financial, political and educational limitations, minority groups, including youth, are often excluded from participating. Since 2006, several institutionalized efforts have been made to get youth involved, though the effectiveness of these efforts is still unclear. To assess these youth related initiatives and to analyze the political processes that enable young people to construct youth representation at the IGF, this study asks, what are the characteristics of youth participation at the IGF? To answer this question, we used several research methods: content analysis of all youth-related materials from IGF meetings (n=35 documents), in-depth interviews with key activists who participated in the IGF (n=5), and participant observations conducted during IGF Mexico in December, 2016. The results are organized according to three themes: (1) the ideal vision of how and why young people should participate in the IGF, (2) the financial and educational difficulties youth in particular encounter when trying to engage in the IGF that diminish their ability to participate, and (3) the future of youth participation in the IGF. Based on these results, we conclude by discussing the socio-political meaning of representation in the IGF.
-
Interactions and Policy-Making: Civil Society Perspectives on the Multistakeholder Internet Governance Process in IndiaThis paper examines India’s experience in developing national Internet policy by focusing on interactions among stakeholders in the Internet governance process. The paper begins by tracing the history of telecom policies in India along with the development of its IT sector as well as its civil society. It identifies the tensions, opportunities and threats that India has experienced in its Internet policy-making. It then reviews India’s legislative and policy history from the IT Act of 2000 onward, noting the intentions and limitations of India’s framework of Internet governance. A notable aspect of the paper involves a series of interviews with civil society stakeholders involved in India’s Internet governance debates. These interviews are used to identify patterns of interaction among different stakeholders, and to understand the underlying power dynamics in India’s policy-making process.
-
CLOUD COMPUTING AND INFORMATION POLICY 1 Cloud Computing and Information Policy: Computing in a Policy Cloud? Forthcoming in the Journal of Information Technology and Politics, 5(3).Cloud computing is a computing platform that resides in a large data center and is able to dynamically provide servers the ability to address a wide range of needs, ranging from scientific research to e-commerce. The provision of computing resources as if it were a utility such as electricity, while potentially revolutionary as a computing service, presents many major problems of information policy, including issues of privacy, security, reliability, access, and regulation. This paper explores the nature and potential of cloud computing, the policy issues raised, and research questions related to cloud computing and policy. Ultimately, the policy issues raised by cloud computing are examined as a part of larger issues of public policy attempting to respond to rapid technological evolution.
-
Cyberwarfare and TerrorismIntensive study in specific areas of homeland security and cybersecurity with regards to nation-state cyberwarfare and terrorism. This course addresses the challenges involved in information warfare and information security as it pertains to domestic and international security challenges. This semester's course will focus on state-sponsored as well as transnational cyber-warfare and touch briefly on industrial espionage. Homeland Security encompasses a grouping of diverse missions and functions that are performed by a wide variety of organizations on the local, state, federal and international levels. Cyber Security is a very young and poorly understood realm within Homeland Security, and there are many definitions for what is and what is not cyber security. This niche is very rapidly evolving and it is likely that material presented in this semester will no longer be interesting in future semesters. Given our time allowance within fifteen weeks, what we will cover in this course are few key examples that best exemplifies the study of cyber security. The purpose of this class is NOT to train the student in "how to hack computers." True cyber security information warriors hone their craft over decades in traditional education, chat rooms, conferences, and hacking competitions. You will not leave this course a better computer hacker than when you started. You will, however, be a more informed participant of the Internet and can use this new depth of knowledge to pursue opportunities in CNA/CND or IA (computer network attack, computer network defense, information assurance). You will learn how to discern plausible cyber security threats from the improbable. And you will learn the current state of what is possible with cyber attack, attribution, defense, and policy.
-
A criminology-based perspective of the use of Big Data for law enforcement purposesNowadays the development of Big Data technologies has attracted significant attention within the field of Digital Criminology. Particularly the uses of Big Data technologies for law enforcement purposes poses relevant challenges in terms of fundamental rights violations, as the General Data Protection Regulation – Regulation 2016/679 – and the Directive 2016/680 reflect. Privacy, data protection, non-discrimination are some of the fundamental rights that could be potentially jeopardize by the implementation of Big Data technologies. This paper presents an analysis of the risks and challenges that Big Data technology applications' entail in terms of potential violations of fundamental rights within the context of EU Security Research Projects from a criminology-based perspective. The aim of the analysis is to provide a set of recommendations and specific measures to guarantee and better protect those fundamental rights that could be at stake when dealing with Big Data technology applications within the context of the security domain.