academy of ict essentials for government leaders session 3: dimensions of internet governance abuse...
TRANSCRIPT
Academy of ICT Essentials for Government Leaders
Session 3: Dimensions of Internet GovernanceAbuse of the Internet
ANG Peng Hwa
Nanyang Technological University [email protected]
Internet Governance
Organized by UN Asian and Pacific Training Centre for Information and Communication
Technology for Development (UN-APCICT)
Academy of ICT Essentials for Government Leaders
Agenda
Learning Objectives: The Internet has characteristics that allow it to be used for dark purposes and so users should be aware of these uses.
Learning Outcomes: To be aware of the more common abuses of the Internet and the actions that can be taken.
Academy of ICT Essentials for Government Leaders
Agenda
What’s Special About the InternetInternet-related Mischiefs
Child PornographyConsumer FraudCopyright infringementDefamation
Internet MischiefsSpam, scams, phishing,Cyberbullying, cyberstalking, identity theftInvasion of privacy
Academy of ICT Essentials for Government Leaders
What’s Special About the Internet
AnonymityCulture of Anarchy and Lawlessness
John Perry Barlow’s Declaration of Independence for Cyberspace:
"Governments of the Industrial World, you weary giants of flesh and steel, I come from Cyber-space,the new home of Mind. On behalf of the future, I ask you of the past to leave us alone. You are not welcome among us. You have no sover-eignty where we gather."
Capability for Networking
Academy of ICT Essentials for Government Leaders
Potential for Minorities to Form
Academy of ICT Essentials for Government Leaders
Barefooters.org
Academy of ICT Essentials for Government Leaders
Harm and Mischief: Child Pornography
Easier to obtain and disseminate child pornInternational cooperation to crackdown
Operation Cathedral 1999 and Operation Ore 2002 . . ., Operation Spade 2013
Simultaneous multi-country raids, sharing of information
Academy of ICT Essentials for Government Leaders
Harm and Mischief: Consumer Fraud Liberalising offline laws
Amending licensing auction laws in Singapore and Commonwealth to allow online auction
Battling online consumer fraud, international cooperationAnnual international Internet sweeps of con-
sumerfraud by ICPEN (International Consumer Protection and Enforcement Network)
Academy of ICT Essentials for Government Leaders
Copyright
Easy to pirate and plagiarise informationDomain names as trademarks?
Note that in the USA, many academics are in favour of less restrictive copyright rules
Academy of ICT Essentials for Government Leaders
Defamation
Balancing individual’s interest in reputation vs culture of freedom to speak on the Internet
Need for immunity provision for third-party content—intermediary liability provision Global best practice: Website/Forum owner
should not be held liable for content posted by others provided the owner acts "reasonably" af-terbeing given notice of the defamatory content
Academy of ICT Essentials for Government Leaders
Harm and Mischief: Spam, Scams, Malicious Code, Phishing
Spam(Unsolicited bulk commercial email)Wastes bandwidthPoses security issues—code can be
embedded Scams, Malicious Code and Phishing Phishing:
Academy of ICT Essentials for Government Leaders
Harm and Mischief: Cyberbullying, Cyberstalking, ID Theft
Laws being drawn up to address harms resulting from online use
Also to be considered is Internet addiction, which is excessive use of the Internet to the detriment of schoolworkKorea has a counselling service to
address Internet addiction Revenge porn
Academy of ICT Essentials for Government Leaders
Privacy
2 models:1. EU: privacy is a human right;
comprehensive legislation2. US: privacy is a legal right that can be
contracted away; fragmented legislation
Academy of ICT Essentials for Government Leaders
Can Anything Be Done: Cyber-community Norms
Netiquette Customs, norms and rules of conduct
Community-administered sanctions Isolate, expel norm violators
Should be encouraged by government
Academy of ICT Essentials for Government Leaders
Can Anything Be Done:Self-Help
Sydney Olympic Committee 2000 hired Copyright Control Services to patrol the Internet for unauthorised sites disseminating news about the OlympicsMoscow TV6 forced to stop broadcasting over the
InternetOnline patrolling has since been done for
Olympic events
Academy of ICT Essentials for Government Leaders
Exercise: Take one area and recommend changes to the law:
1. Child pornography
2. Consumer fraud
3. Anti-spam
4. Scams, malicious code and phishing
5. Cyberstalking
6. ID theft
7. Copyright
8. Defamation
9. Privacy
Academy of ICT Essentials for Government Leaders
Can Anything Be Done:International Law
Ad-hoc cooperation on investigating and prosecuting cybercrimes Operation Cathedral, International Consumer
SweepInternational consensus on cybercrimes
Council of Europe Convention on CybercrimeDynamic Coalitions at the Internet
Governance ForumA loose grouping of interested stakeholders
around a significant issue
Academy of ICT Essentials for Government Leaders
Summary
Process of regulation must be transparent, multistakeholder, democratic
4 modes of regulation MarketSocial normsArchitectureGovernment regulation (including self-regulation)
Consider best practiceConsult widely
Academy of ICT Essentials for Government Leaders
Exercise: Changing Internet Rules in IranWhat laws must be changed in order to make
the Internet more effective in Iran?Eg e-commerce, immunity provisions
What laws need to be implemented in order to make the Internet safer?