|
Blogs, Articles, Reports Information1 #121697 Suggest / cite other blogs, articles, reports about the conference that you would like to see included in the map here. | |
+Citavimą (27) - CitavimąPridėti citatąList by: CiterankMapLink[5] How do you preserve what’s best about the Web?
Cituoja: Tom Burn - Media and Communication Director, Tokyo Cituojamas: David Price 12:29 PM 26 October 2011 GMT URL:
| Ištrauka - We need an internet that’s open, stable and secure. So how do you ensure cyberspace is a welcoming place for all its users, from hobbyists to scientists, from democratic activists to photographic artists? Where does government have a role? Some would say the emergence of the internet has rendered the state less relevant as an actor. There are no national borders in cyberspace, or at least, they’re harder to define. That doesn’t change the fact, however, that those who need the internet, who want to carry on finding new possibilities from its use, live in the UK. They live in Japan. They live in every country in the world, so borders are relevant, in the sense that they define who we have a duty to serve. As governments, we have a responsibility to enable our citizens to carry on using the internet, to carry on expanding its possibilities. There are lots of questions we need to ask ourselves. For example, do we need new legislation to protect cyberspace? Or can we use the same principles embedded in existing law? Cyberspace is a new way of communicating, but the principles of legal protection are the same. |
Link[8] Where’s India on cyberspace treaty?
Cituoja: Hindustan Times Cituojamas: David Price 12:43 PM 26 October 2011 GMT URL:
| Ištrauka - India, being a major player in Information Technology while belonging to the developing world and a leading democracy at that, could actually play an incredibly constructive role in helping stitching together what at the moment is a very polarized debate. Since the Arab Spring, a part of the world has been saying ‘this is fantastic, let’s have more of it.’ But another part sees it as a clear threat.
India is unique in that it speaks to both the worlds. It also has issues of cyber terrorism to highlight. British government departments receive 20,000 email attacks a month and hacking by foreign governments and corporations has cost the economy £27 billion, Maj Gen Jonathan Shaw, the country’s head of cyber security, has warned.
Last year, the American and British governments were shocked to find some of their communications routed through the Chinese telecoms network.
The London conference is the first step in what is hoped will become a structured debate on cyberspace, and is expected to be followed by more such conferences in other parts of the world. |
Link[17] Can China's economy thrive with a censored Internet?
Cituoja: Michael Schuman - Time, The Curious Capitalist Cituojamas: David Price 10:55 AM 27 October 2011 GMT URL:
| Ištrauka - There are two Internets in the world today. The first is the one you are probably using right now to read this post, through which you can connect with people around the world, surf for whatever information you want and blog at will. This Internet is a key tool for businesses to enhance productivity, for people to educate themselves about the world and for new ideas to bounce briskly from place to place. Then there is the second version of the Internet. The one here in China. The authoritarian government is fearful of the free Internet and has put in place all sorts of methods of controlling what people can read, say and access on the web. Major international sites, including Twitter, Facebook and YouTube, are completely blocked here. Certain searches are impossible, emails are monitored, many web pages simply won't open, and others open so slowly (like this blog) that only the most patient or determined will endure the wait. |
Link[22] Why a cybersecurity treaty is a pipe dream
Cituoja: Adam Segal, Matthew Waxman Cituojamas: David Price 5:00 PM 1 November 2011 GMT
Citerank: (12) 123204Bleak prospects for a global, comprehensive cybersecurity treaty959C6EF, 123212Different interests will pull the parties apartDifferent interests among powerful states – stemming from different strategic priorities, internal politics, public-private relationships and vulnerabilities – will continue to pull them apart on how cyberspace should be used, regulated, and secured.1198CE71, 123215Should the laws of war and self-defence apply to cyber attacksShould the international laws of war and self-defence apply to cyber attacks?8FFB597, 123216Do states have a right to block information from citizens?8FFB597, 123217What roles (if any) should private actors play in Internet governance?What roles (if any) should private actors in Internet governance?8FFB597, 123220Defining cybersecurity8FFB597, 123221Protection of computer networks from damage and theftThe United States, United Kingdom and their like-minded allies emphasize the protection of computer networks from damage and theft when defining cybersecurity.959C6EF, 123222Information securityRussia, China and their partners emphasize information security when defining cybersecurity, which to them means controlling content and communication or social networking tools that may threaten regime stability.959C6EF, 123231Joint policy declarations with allies959C6EF, 123232Accept that legal gray zones will remain959C6EF, 123233Focus dialogue on focus confidence-building measures959C6EF, 123234Cultivate technical partnerships with developing states959C6EF URL:
| Ištrauka - Adam Segal is the Ira A. Lipman Senior Fellow for Counterterrorism and National Security Studies at the Council on Foreign Relations. Matthew Waxman, also a fellow at the Council on Foreign Relations, is Associate Professor at Columbia Law School and member of the Hoover Institution Task Force on National Security and Law. |
|
|