Safe European Home? do we need a closed European Internet? Bill Thompson | School of Information Management Information and Society.

Slides:



Advertisements
Similar presentations
Csc Markup Internet Regulation - Internet Regulation is putting up laws on the internet, limiting the freedom of the internet. Sometime last.
Advertisements

CSC CONNOR HUNT. SOCIETAL TOPCS WEEKS 7 AND 8 Internet Regulation - Internet Regulation is putting up laws on the internet, limiting the freedom.
Certification Authority. Overview  Identifying CA Hierarchy Design Requirements  Common CA Hierarchy Designs  Documenting Legal Requirements  Analyzing.
Challenges to freedom of expression The right to freedom of expression is a “foundation right” in society. It protects the right to: -Express ourselves.
E-Government Policies, Strategies and Implementation Jamal Shahin Institute for European Studies, Vrije Universiteit Brussel 15:00 – 15:20, 21 December.
Computers and Law - Srishti Mehra – Team 2. What is Computer Law? Cross over of a number of legal areas affecting: Design and use of computers and software.
Toward a Ubiquitous E-Democracy Powered by a Universal PKI Political Reform through Internet Power.
Creating a Secured and Trusted Information Sphere in Different Markets Giuseppe Contino.
Jae-Hyun Seong Comp. 450 May  What is Internet?  Why do people use the Internet?  Why do people want to censor the Internet?  Why do people.
Alter – Information Systems 4th ed. © 2002 Prentice Hall 1 E-Business Security.
 area of law that deals with protecting the rights of those who create original works  Also called as confidential information.  It is called “intellectual”
Jonathan Reichardt. Internet Regulation Internet regulations censor data on the internet monitor IP addresses. The Internet Society wants to stop regulations.
Israel Securities Authority MAGNA – Electronic filing Natan Herscovitz, CIO December 2004.
Internet Safety Basics Being responsible -- and safer -- online Visit age-appropriate sites Minimize chatting with strangers. Think critically about.
Freenet. Anonymity  Napster, Gnutella, Kazaa do not provide anonymity  Users know who they are downloading from  Others know who sent a query  Freenet.
Final Exam Part 1. Internet Regulation Internet regulation according to internet society states that it is about restricting or controlling certain pieces.
LEVADA-CENTERLEVADA-CENTER “From opinions to understanding” LEVADA-CENTERLEVADA-CENTER.
Sarah Breton CSC December 13, Societal Topics Weeks 7 & 8  Internet Regulation : Internet regulation is restricting specific aspects of.
African Declaration on Internet Rights and Freedoms Presentation by: Edetaen Ojo Media Rights Agenda, Nigeria.
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
No one questions that Microsoft can write great software. Customers want to know if we can be innovative, scalable, reliable in the cloud. (1996) 450M+
Reducing Crime in Cyberspace: A Privacy Industry View Stephanie Perrin Adam Shostack Zero-Knowledge Systems, Inc.
MOBILE DEVICE SECURITY. WHAT IS MOBILE DEVICE SECURITY? Mobile Devices  Smartphones  Laptops  Tablets  USB Memory  Portable Media Player  Handheld.
Nine Elements of Digital Citizenship BH. Nine elements is identified to create a digital citizenship. Digital Access: full electronic participation in.
C4- Social, Legal, and Ethical Issues in the Digital Firm
Copyright © 2006 CyberRAVE LLC. All rights reserved. 1 Virtual Private Network Service Grid A Fixed-to-Mobile Secure Communications Framework Managed Security.
1 International Forum on Trade Facilitation May 2003 Trade Facilitation, Security Concerns and the Postal Industry Thomas E. Leavey Director General, UPU.
ICT business statistics and ICT sector: Uzbekistan’s experience Prepared by Mukhsina Khusanova.
IT in the Swedish public sector Britta Johansson
CS 4001Mary Jean Harrold1 Class 24 ŸFreedom of speech in cyberspace ŸAssign ŸAssignment 8—due today ŸTerm paper—due 11/20.
INTERNET- A BOON OR A CURSE AYUSHI PRADHAN. WHAT IS IT? Internet or INTERnational NETwork is a network of networks that crisscrosses the globe and even.
Vulnerabilities in peer to peer communications Web Security Sravan Kunnuri.
Matters of Conceptualization and Security in the Building of One-stop-shop e-Government Solutions in Europe: Experiences from the European OneStopGov project.
Logo Add Your Company Slogan China Financial Certification Authority Third-party certification authority Team 13 :吉露露、吴莹莹、潘韦韦 ( CFCA )
The Liberal Order or Empire? Security co-binding: together against common threats. Forced to stay together? Penetrated hegemony: leadership role for the.
Jessica Lavoie CSC 101 November 27, Societal Topics Weeks 7 and 8 Internet Regulation Internet regulation is restricting or controlling access to.
Chapter 11 Interorganizational and International Information Systems.
Are You a Good Digital Citizen? By Abby Buchanan Image from Microsoft Clip Art.
Challenges to freedom of expression The right to freedom of expression is a “foundation right” in society. Defined in Universal Declaration of Human Rights.
Security Overview  System protection requirements areas  Types of information protection  Information Architecture dimensions  Public Key Infrastructure.
Web is public space. So, when we are connected to it we have to follow some rules. What is illegal Offline is illegal Online!!! Internet gives us opportunities.
Chapter 9: The Internet and World Wide Web Two contrasting views: Media Critic Marshall McCLuhan: the Internet would help create a “global village” of.
Jeopardy: Digital Citizenship Please use presentation mode!
COMP1321 Networks in Organisations Richard Henson March 2014.
$20 billion business 230 million printers sold  170 million inkjet  60 million laserjet #1 in ink, laser, scanners, designjet, print servers Consistent.
Law Online: An Introduction Richard Warner Chicago-Kent College of Law
Software Industry Issues Mark Lange Microsoft EMEA March 1, 2005.
Final review Our final exam will be held on Wednesday, May 3rd from 4:00 to 5:50 in room 109 WWH.
The European Union. The European Union is a group of countries around Europe which have joined together to form political and economic agreements There.
AUP, Netiquette, Copyright & Fair Use Wilkes University – Internet Literacy for Educators Cathy W. Dowd Spring 2009.
CSC 104 December 13,2012. Internet Regulation: States that it is about restricting or controlling certain pieces of information. This consisting of censorship.
Issues and Problems Concerning the Internet Copyright ◦ Users pass off as others work and post it as their own work without giving credit to the source.
Norwegian e-health infrastructure based on XML, ebXML and PKI Øyvind Gjørven Rikstrygdeverket (RTV)/ National Insurance Administration.
1 EDI, Supply Chain Management, and Global Information Systems Chapter 11.
Tiffanie Donovan CSC /27/12. Societal Topics-Weeks 7 & 8 Internet Regulation Internet regulation has the operation of keeping people from viewing.
Richard Harris DG Information Society European Commission EICTA - PHARE Business support programme Brussels, 5 December 2001 “EU Policy for electronic.
Digital Citizenship. What is a Digital Citizen? Digital Citizens are people who use technology often and appropriately. Digital Citizens are people who.
Code & Other Laws of Cyberspace Reviewed by Thuy Nguyen November 17 th 2005 By Lawrence Lessig.
MIS 2000 Social Implications of IST. Outline Law & Ethics Accountability and Liability Information Rights Privacy Computer Abuse and Crime Intellectual.
Access : connection to the Internet account : an arrangement you have with a company or Internet provider to use a service they provide. browse : to look.
Laws and Codes for the Internet: a Continental European Legal Perspective Fernando Galindo Faculty of Law University of Zaragoza Belfast,
1 “Media and Sovereignty: The Global Information Revolution and Its Challenge to State Power” Monroe E. Price, Ch. 36, pp (Excerpted from Price,
New approach in EU Accession Negotiations: Rule of Law Brussels, May 2013 Sandra Pernar Government of the Republic of Croatia Office for Cooperation.
Web bugs are tiny graphic files embedded in messages and Web pages that are designed to monitor who is reading the message or Web page and.
Can We Trust the Computer? FIRE, Chapter 4. What Can Go Wrong? What are the risks and reasons for computer failures? How much risk must or should we accept?
4th SG13 Regional Workshop for Africa on “Future Networks for a better Africa: IMT-2020, Trust, Cloud Computing and Big Data” (Accra, Ghana, March.
University of Zaragoza
THE FUTURE EVOLUTION OF CIVIL SOCIETY IN THE EUROPEAN UNION BY 2030
Slide 1 The State of the State in Cyberspace The Hybrid Regulation of Global Data Protection Ralf Bendrath University of Bremen Collaborative Research.
Presentation transcript:

Safe European Home? do we need a closed European Internet? Bill Thompson | School of Information Management Information and Society Seminars Priestley Hall, Beckett Park Campus Wednesday 19 th March, 12pm – 1pm, Room PRG10

© 2003 Bill Thompson Who am I? Programmer and developer Teacher Writer/Journalist/Commentator Advisor and policy-maker Technocultural critic

© 2003 Bill Thompson Thesis The Internet is free The Internet is ungovernable Cyberspace is outside the real world Only markets and individuals can determine online limits This is the ‘Californian ideology’ Richard Barbrook/Andy Cameron West Coast libertarianism+free market economic

© 2003 Bill Thompson Antithesis The Internet was built one way It can be built other ways too Code is law - Lessig Protocols and programs determine what happens Programs are a means of control The network has no essential nature Control and regulation are possible

© 2003 Bill Thompson Synthesis Today’s network is promiscuous Any code can run; any data can move Tomorrow’s network will be regulated Architectures of control Trusted computer platforms and networks Signed code, authorised data, verifiable identity Who signs, rules Corporations? Governments? Individuals?

© 2003 Bill Thompson Why this matters “After the correct political line has been laid down, organizational work decides everything, including the fate of the political line itself, its success or failure.” from the report of Joseph Stalin to the 17th Congress of the Communist Party of the Soviet Union, “After the correct laws and regulations have been laid down, programming work decides everything.” Bill Thompson, LMU

© 2003 Bill Thompson Network History The Internet Created 1983 (ARPANet 1969) End-to-end architecture TCP/IP (v4) controls data transmission Academic/military/government network Until 1990’s Commercial involvement propelled Net forward Web invented 1990, grew from 1994

© 2003 Bill Thompson Network Hegemony The Net embodies liberal values All nodes visible Peering and routing No authentication or approval required These left it open to colonisation Dominant culture online is US This amounts to hegemony – Gramsci Today’s Internet is not culturally neutral

© 2003 Bill Thompson Network Fidelity Existing systems are promiscuous A processor will run any code given An application will accept any data Creates vulnerabilities Technical: bugs Programming: viruses Cultural: spam Economic: Napster

© 2003 Bill Thompson Network Control Architectures of control are emerging Internet Protocol version 6 (IPv6) Includes authentication, identification Trusted Computing Platform Alliance (TCPA) Processors will only run signed/validated code Applications will only read signed/validated content Public Key Infrastructure (PKI) A certificate rich Internet Map online persona to offline person

© 2003 Bill Thompson Network Borders Trusted networks enable Identification of individuals and processors Effective management of data flows Mapping of online structures onto real world systems The result: We can build borders in cyberspace We can assert the primacy of the real world We can extend state sovereignty to online

© 2003 Bill Thompson So… Resist US cultural imperialism Counter US hegemony Build borders around the European network Assert EU law on data protection Establish EU approach to copyright Enforce EU regulations on commercial Establish a safe European home

© 2003 Bill Thompson Why do this? It’s going to happen anyway Media corporations want control Digital Rights Management Laws are being passed to give them that control Digital Millennium Copyright Act; European Union Copyright Directive Hardware and software has control features built in Windows XP Product Activation If we don’t engage then corporations will do it alone We will lose all chance of democratic control The market will decide. And markets do not serve the public interest

© 2003 Bill Thompson Network democracy Online democracy Not e-democracy but democratising ‘e’ Build structures and bodies to govern the net Local, regional, national and global Not one law but many laws Not one network but many Not one online culture but many Internet regulation that reflects the new borders

© 2003 Bill Thompson Network sovereignty Give each state power Regulate network data flows Control network use Monitor online activity In open societies this will be permissive Greater freedom online Freedom from spam, viruses, unsolicited porn

© 2003 Bill Thompson Working for the Clampdown Closed societies will use the power too Limit access to news and information Control use of the network Monitor activity and punish dissent This is a necessary price But on a regulated network pressure can be exerted Offer trade concessions in return for net liberalisation On a regulated network it is not all or none

© 2003 Bill Thompson The Next 5.5 Billion There are approx 600m Internet users Today’s network serves 180m US citizens The rest of us put up with what they want Tomorrow’s network must serve all of us Six billion users Asserting local control can start in Europe Birthplace of the Web Larger online population than US

© 2003 Bill Thompson Tomorrow’s Internet Serving the many, not the few Local variation, cultural differences Controlled by the people, not the companies Democratic accountability Legal framework for regulation Part of the real world, not a virtual space Overcome the myth of cyberspace

© 2003 Bill Thompson Issues How can we be sure trusted systems will succeed? What’s wrong with US hegemony and the Californian ideology anyway? Aren’t governments as bad as corporations? Who can have faith in the EU to govern anything, never mind the network? Aren’t you just a whining socialist weenie?

© 2003 Bill Thompson Thank you