Text Competition, Consumer Choice and Trust Metrics IAG-CCT Call 18 April 2014 I. Possible overlapping metrics II. Metrics for discussion.

Slides:



Advertisements
Similar presentations
1 ICANNs Contractual Compliance Program David Giza, Senior Director, Contractual Compliance Stacy Burnette, Director, Contractual Compliance ICANN Policy.
Advertisements

WHOIS – Data Elements – making a Difference ICANN Carthage Meeting October 2003 Marilyn Cade, Director AT&T Commercial and Business Constituency (BC)
ICANN Plan for Enhancing Internet Security, Stability and Resiliency.
ICANN SSAC, Cairo Nov 2008 Page 1 Summary of Fast Flux Dave Piscitello ICANN SSAC.
The OWASP Foundation Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under.
Preparing Data for Quantitative Analysis
CASL Computer Programs Provisions and Challenges in Specific Vertical Sectors Michael Fekete (Osler) Howard Fohr (BlackBerry Limited) April 30, 2014.
Text Competition, Consumer Choice and Trust Metrics IAG-CCT Call 18 June 2014 I. Update on metric evaluation II. Baselines collected to date III. New metrics.
Cairo 2 November Agenda  Guidebook overview  Supporting and explanatory materials  Guidebook Module detail  Probable timelines 2.
Domain Name Registrant Data: The Privacy Questions Alan Davidson Center for Democracy and Technology
Web Defacement Anh Nguyen May 6 th, Organization Introduction How Hackers Deface Web Pages Solutions to Web Defacement Conclusions 2.
The ICH E5 Question and Answer Document Status and Content Robert T. O’Neill, Ph.D. Director, Office of Biostatistics, CDER, FDA Presented at the 4th Kitasato-Harvard.
SAM for Mobile Device Management Presenter Name. of employees spend at least some portion of their time working outside their office. Mobility is the.
Introduction to ICANN’s new gTLD program. A practical example: the Dot Deloitte case. Jan Corstens, Partner, Deloitte WIPO Moscow, 9 Dec 2011.
Copyright © 2004 by South-Western, a division of Thomson Learning, Inc. All rights reserved. Marketing Research, Decision-Support Systems, and Sales Forecasting.
Data Protection Act. Lesson Objectives To understand the data protection act.
Implementation Recommendation Team (IRT) Proposal Comments Sue Todd, Director, Product Management Monday 11 May 2009, San Francisco.
Domain Name System | DNSSEC. 2  Internet Protocol address uniquely identifies laptops or phones or other devices  The Domain Name System matches IP.
Norman SecureSurf Protect your users when surfing the Internet.
Internal Auditing and Outsourcing
RAA Update and WHOIS Validation Workshop Moderated by: Volker Greimann, Gray Chynoweth, Kurt Pritz 12 March 2012.
The Marketing Survey How to construct a survey
Internet Safety Part II CyberBullying. Judson Independent School District … strives to provide a safe, positive learning environment for students in our.
General Awareness Training
Report of the WIPO Internet Domain Name Process. Genesis USG White Paper, June 5, 1998: –“The U.S. Government will seek international support to call.
Consumer Trust, Consumer Choice & Competition Presenter: Steve DelBianco Chair: Rosemary Sinclair.
Real and Virtual Identities Francis Gurry Assistant Director General World Intellectual Property Organization (WIPO)
1 Building the Knowledge Base. 2 New Parameters In crossing international borders, a firm encounters parameters not found in domestic business. Examples.
Security considerations for mobile devices in GoRTT
CRISP Requirements Discussion draft-ietf-crisp-requirements-02.txt Andrew Newton 55 th IETF, November 19, 2002 Atlanta, GA.
In Dec-2010 ICANN Board requested advice from ALAC, GAC, GNSO and ccNSO on definition, measures, and 3- year targets, for competition, consumer trust,
Service Transition & Planning Service Validation & Testing
© 2012-Robert G Parker May 24, 2012 Page: 1 © 2012-Robert G Parker May 24, 2012 Page: 1 © 2012-Robert G Parker May 24, 2012 Page: 1 © 2012-Robert G Parker.
Update from ICANN staff on SSR Activities Greg Rattray Tuesday 21 st 2010.
ITU Workshop: “Radio-Activity Safety and Security Threats Protection and Telemedical Support for Irradiated People” Telebiometrics: Enhancing Telepresence.
Text. #ICANN49 Data & Metrics for Policy Making Working Group Thursday 27 March 2014 – 08:00.
Managing Data Against Insider Threats Dr. John D. Johnson, CISSP.
INTERACTIVE ANALYSIS OF COMPUTER CRIMES PRESENTED FOR CS-689 ON 10/12/2000 BY NAGAKALYANA ESKALA.
Location, Location, Location: The Emerging Crisis in Wireless Data Privacy Ari Schwartz & Alan Davidson Center for Democracy and Technology
The Data Protection Act What Data is Held on Individuals? By institutions: –Criminal information, –Educational information; –Medical Information;
The Framework for Privacy Policies in the UK: Is telling people what information is gathered about them part of the framework? Does it need to be? Emma.
The ccTLD Governance Project ITU ccTLD Workshop March 2003 Professor Michael Geist University of Ottawa, Faculty of Law Technology Counsel, Osler, Hoskin.
IRTP Part D PDP WG Items for Review. Items for Review Policy Development Process WG Charter GNSO WG Guidelines.
Deloitte Forensic Forensic Technology Conference of Regulatory Officers - CORO November 2012.
Consumer Trust, Consumer Choice & Competition Presenter: Steve DelBianco WG Chair: Rosemary Sinclair.
What is Network and Security Research? Network and Security Research, or Information Communication Technology (ICT) Research involves: the collection,
Fundamentals of Information Systems, Sixth Edition Chapter 5 Electronic and Mobile Commerce and Enterprise Systems.
FIRMA April 2010 DATA BREACHES & PRIVACY Christine M. Farquhar Managing Director, Compliance J.P. Morgan U.S. Private Banking.
1 1 The GNSO Role in Internet Governance Presented by: Chuck Gomes Date: 13 May 2010.
1 Policy Types l Program l Issue Specific l System l Overall l Most Generic User Policies should be publicized l Internal Operations Policies should be.
Securing Passwords Against Dictionary Attacks Presented By Chad Frommeyer.
New gTLD Program Reviews Karen Lentz | GAC Session | 20 October 2015.
Governmental Advisory Committee Public Safety Working Group 1.
Developing a Global Vision through Marketing Research Chapter 9 Matakuliah: J0474 International Marketing Tahun: 2009.
Confidential and proprietary US Proposed Whois Legislation Fraudulent Online Identity Sanctions Act (“FOISA”)
Law Enforcement Recommendations for RAA ammendment ICANN Brussels 2010 Protective Marking : Protect.
Update on Consumer Choice, Competition and Innovation (CCI) WG Rosemary Sinclair.
LEGAL IMPLICATION OF THE USE OF COMPUTER Lower Sixth Computing Lesson Prepared by: T.Fina.
Introduction to the Australian Privacy Principles & the OAIC’s regulatory approach Privacy Awareness Week 2016.
WHAT IS IDENTITY THEFT?  Identity thieves take your personal information and use it to harm you in various ways, including these:  User names, passwords,
Margie Milam, Senior Director 27 March 2014 Privacy/Proxy Accreditation Survey Results.
Copyright © 2004 by South-Western, a division of Thomson Learning, Inc. All rights reserved. Marketing Research, Decision-Support Systems, and Sales Forecasting.
GAC SESSION 7: PSWG Update. PUBLIC SAFETY WORKING GROUP (PSWG) – UPDATE TO THE GAC Agenda Item 7 | ICANN 56 | 28 June 2016.
Data Collection Techniques
MGMT 452 Corporate Social Responsibility
Procurement: Use of Metrics
Update on ICANN Domain Name Registrant Work
Enforcement and Policy Challenges in Health Information Privacy
Neopay Practical Guides #2 PSD2 (Should I be worried?)
The Domain Abuse Activity Reporting System (DAAR)
Presentation transcript:

Text Competition, Consumer Choice and Trust Metrics IAG-CCT Call 18 April 2014 I. Possible overlapping metrics II. Metrics for discussion

Text Possible overlapping metrics 2.3: Biennial surveys of perceived consumer choice in DNS, relative to experience before the gTLD expansion. 2.13: Biennial survey of perceived consumer choice relative to experiences before the gTLD expansion. Survey should assess public awareness of new gTLDs. Survey should also measure costs of defensive or duplicate registrations. Survey should assess motivations, intent, and satisfaction with new gTLDs. Both are related to end-user surveys and will require multiple questions to get to a metric measuring users’ understanding of TLD eligibility restrictions and perceived consumer choice. o Suggestion: Combine with other metrics related to end-user survey for a single report measuring broad end user understanding and use of the DNS.

Text Possible overlapping metrics 2.9: Relative share of new gTLD registrations already having the same domain in legacy TLDs prior to expansion. 2.10: Automated analysis or online survey to determine the number of “duplicate” registrations in new gTLDs. Same metric but with different methodologies. Given that we can likely find reliable data in an automated and reliable way (measuring exact matches in second-level domains across gTLDs), the survey questions may only provide a glimpse into registrants’ attitudes toward duplicate registrations.

Text Possible overlapping metrics 9.1: Are end-user software applications capable of implementing all of the new gTLDs; Can browsers and DNS clients in end-user systems resolve all new gTLDs 9.2: Which browsers or other end-user applications require plugins or user-installed enhancements in order to use new gTLDs Both are derived from the same questions regarding the accessibility of all new gTLDs to end users. 9.2 drills further into 9.1 as whether applications and software are incapable of resolving new gTLDs unless users install necessary fixes.

Text 1.14: Quantity and Relative Incidence of Domain Takedowns. This metric relies on voluntary self-reporting (either by RRs or governments/LEA), which may be difficult to gather. Also raises question of why those domains are being taken down and whether raw numbers provide context for trends in either direction.

Text 1.18: Quantity and relative incidence of detected botnets and malware distributed using new gTLDs. Potential sources: Spamhaus: DROP lists botnets and malware ShadowServer: Tracks botnets and malware and has historic data Malware Domain List: Historic data to 2009 APWG: May collect some of this data May be sensitivities surrounding definitions of botnets and malware and metrics used to measure their relative incidence. Would require securing outside expertise to conduct detailed analysis.

Text 1.19: Quantity and relative incidence of sites found to be dealing in or distributing identities and account information used in identity fraud. Research has found that stolen identities are not distributed via sites but rather underground chat rooms or other networks. May be able to measure instance of sites collecting identities, but this might mirror the information in metrics (on phishing, malware and botnets.)

Text : Growth in use of hosted pages (i.e. Facebook)/QR codes/URL shortening services Data sources: Comscore has some U.S./Europe-centric data on mobile phone usage (QR codes) More representative global data available for desktop computer users on hosted pages and URL shorteners Costs vary but can do snapshot reports or provide access to subscription service Other market research firms for comparison: Nielsen Online, Alexa Data is available, but further consideration needed about contextualization and use of data.

Text 5.6: Growth of Software Defined Networking (SDN) as alternative to the DNS Unclear how SDN is an alternative to DNS Is this related to the use of apps/QR codes/URL shorteners, which are covered under ?

Text 6.1: Number of consumer complaints to government agencies related to confusing or misleading domain names What is meant by “confusing or misleading” domain names? Difficult to obtain measurable and statistically valid data. Econsumer.gov (an initiative of the International Consumer Protection and Enforcement Network) tracks complaints from its 29 member countries

Text 6.2: Number of complaints to police agencies alleging fraud or misrepresentation based on – or traced to – domain names Some data available, but it may not be a very complete global picture nor enough to determine a statistically valid answer. o Disparate reports from various national law enforcement agencies, consumer reporting groups, and corporate risk analysis firms. o Law enforcement can’t easily or accurately classify a domain as being an intentional or consequential instrument of a crime.

Text 6.3: Number of fraud investigations where WHOIS information positively assisted investigation and identification of offending parties Feedback indicated that LEA would be unwilling to share this type of information for fear of exposing investigation techniques.

Text 8.2: How many registries are subject to Compliance activity based on reported breaches of RAA? Is this meant to track miscategorized complaints about RAA breaches, but which then are correctly treated as Ry compliance issues? Compliance does not initiate enforcement activity on a registry based on a complaint about a registrar.

Text Data security breach reports collected per 2013 RAA 3.20 Registry agreement 2.18: ICANN may receive complaints on insufficient protection of personal data Is the metric meant to measure ICANN compliance’s response to potential violations of applicable national laws? Applicable national laws Further define “applicable national law” to determine LEA input, i.e. tax laws, identity theft, pornography, etc. WIPO indexes a subset of cases that reference national laws – but ultimately these cases are tracked as UDRP decisions in other metrics 1.13: Quantity of Compliance Concerns regarding Applicable National Laws, including reported data security breaches.