Welcome to the Globethics.net Library!

 

  • Performing Internet Governance: The Case Study of Youth Participation in The Internet Governance Forum

    Daskal, Efrat; Orlova, Anna (Association of Internet Researchers, 2019-11-05)
    The Internet Governance Forum (IGF) is a multi-stakeholder forum that has convened annually since 2006 to debate issues of internet governance. It is shaped by three kinds of politics: representation, agenda setting, and principles. This study focuses on the politics of representation by analyzing the case study of youth participation in the IGF. Due to financial, political and educational limitations, minority groups, including youth, are often excluded from participating. Since 2006, several institutionalized efforts have been made to get youth involved, though the effectiveness of these efforts is still unclear. To assess these youth related initiatives and to analyze the political processes that enable young people to construct youth representation at the IGF, this study asks, what are the characteristics of youth participation at the IGF? To answer this question, we used several research methods: content analysis of all youth-related materials from IGF meetings (n=35 documents), in-depth interviews with key activists who participated in the IGF (n=5), and participant observations conducted during IGF Mexico in December, 2016. The results are organized according to three themes: (1) the ideal vision of how and why young people should participate in the IGF, (2) the financial and educational difficulties youth in particular encounter when trying to engage in the IGF that diminish their ability to participate, and (3) the future of youth participation in the IGF. Based on these results, we conclude by discussing the socio-political meaning of representation in the IGF.
  • Interactions and Policy-Making: Civil Society Perspectives on the Multistakeholder Internet Governance Process in India

    Agur, Colin; Subramanian, Ramesh; Belair-Gagnon, Valerie (ScholarlyCommons, 2015-11-01)
    This paper examines India’s experience in developing national Internet policy by focusing on interactions among stakeholders in the Internet governance process. The paper begins by tracing the history of telecom policies in India along with the development of its IT sector as well as its civil society. It identifies the tensions, opportunities and threats that India has experienced in its Internet policy-making. It then reviews India’s legislative and policy history from the IT Act of 2000 onward, noting the intentions and limitations of India’s framework of Internet governance. A notable aspect of the paper involves a series of interviews with civil society stakeholders involved in India’s Internet governance debates. These interviews are used to identify patterns of interaction among different stakeholders, and to understand the underlying power dynamics in India’s policy-making process.
  • CLOUD COMPUTING AND INFORMATION POLICY 1 Cloud Computing and Information Policy: Computing in a Policy Cloud? Forthcoming in the Journal of Information Technology and Politics, 5(3).

    The Pennsylvania State University CiteSeerX Archives; Paul T. Jaeger; Jimmy Lin; Justin M. Grimes (2010-03-20)
    Cloud computing is a computing platform that resides in a large data center and is able to dynamically provide servers the ability to address a wide range of needs, ranging from scientific research to e-commerce. The provision of computing resources as if it were a utility such as electricity, while potentially revolutionary as a computing service, presents many major problems of information policy, including issues of privacy, security, reliability, access, and regulation. This paper explores the nature and potential of cloud computing, the policy issues raised, and research questions related to cloud computing and policy. Ultimately, the policy issues raised by cloud computing are examined as a part of larger issues of public policy attempting to respond to rapid technological evolution.
  • Cyberwarfare and Terrorism

    Andr??s, Steven (2014-01-21)
    Intensive study in specific areas of homeland security and cybersecurity with regards to nation-state cyberwarfare
 and terrorism. This course addresses the challenges involved in information warfare and information security as it
 pertains to domestic and international security challenges. This semester's course will focus on state-sponsored as
 well as transnational cyber-warfare and touch briefly on industrial espionage.
 Homeland Security encompasses a grouping of diverse missions and functions that are performed by a wide variety
 of organizations on the local, state, federal and international levels. Cyber Security is a very young and poorly
 understood realm within Homeland Security, and there are many definitions for what is and what is not cyber security.
 This niche is very rapidly evolving and it is likely that material presented in this semester will no longer be interesting
 in future semesters. Given our time allowance within fifteen weeks, what we will cover in this course are few key
 examples that best exemplifies the study of cyber security.
 The purpose of this class is NOT to train the student in "how to hack computers." True cyber security information
 warriors hone their craft over decades in traditional education, chat rooms, conferences, and hacking competitions.
 You will not leave this course a better computer hacker than when you started. You will, however, be a more informed
 participant of the Internet and can use this new depth of knowledge to pursue opportunities in CNA/CND or IA
 (computer network attack, computer network defense, information assurance). You will learn how to discern plausible
 cyber security threats from the improbable. And you will learn the current state of what is possible with cyber attack,
 attribution, defense, and policy.
  • A criminology-based perspective of the use of Big Data for law enforcement purposes

    Teodoro Martínez, Emma,; Moner Vall, Albert; Universitat Autònoma de Barcelona. Facultat de Dret (2018)
    Nowadays the development of Big Data technologies has attracted significant attention within the field of Digital Criminology. Particularly the uses of Big Data technologies for law enforcement purposes poses relevant challenges in terms of fundamental rights violations, as the General Data Protection Regulation – Regulation 2016/679 – and the Directive 2016/680 reflect. Privacy, data protection, non-discrimination are some of the fundamental rights that could be potentially jeopardize by the implementation of Big Data technologies. This paper presents an analysis of the risks and challenges that Big Data technology applications' entail in terms of potential violations of fundamental rights within the context of EU Security Research Projects from a criminology-based perspective. The aim of the analysis is to provide a set of recommendations and specific measures to guarantee and better protect those fundamental rights that could be at stake when dealing with Big Data technology applications within the context of the security domain.

عرض المزيد