SlideShare una empresa de Scribd logo
1 de 34
Descargar para leer sin conexión
7 November 2018
Internet Governance
Gergana Petrova
External Relations
RIPE NCC
Gergana Petrova | 7 November 2018 !2
Who Runs the Internet?
The short answer is:
NO ONE!
Gergana Petrova | 7 November 2018
The Multi-stakeholder Model
Internet
Governance
Governments,
National and International
Organisations
The Private Sector
(Businesses)
The Technical

Community
Academia
Civil Society and
Internet Users
Gergana Petrova | 7 November 2018 !4
What will we cover?
• What is the multi-stakeholder model?
• What are the main principles for policy
making?
• What are the key arguments and dilemmas?
• Why should you get involved?
• How can you get involved?
Gergana Petrova | 7 November 2018 !5
The History
“[the Internet] is inherently
extra-national, inherently anti-
sovereign and your [states’]
sovereignty cannot apply to
us. We’ve got to figure things
out ourselves.”
John Perry Barlow, 1996
Things have changed…
Gergana Petrova | 7 November 2018 !6
• Social norms worked well in the beginning of the Internet
• Self-regulation still works in a group with strong community
ties, by applying peer pressure or exclusion (e.g. Wikipedia)
• ISPs try to self-regulate by imposing standards of behaviour
for their customers
• Should ISPs make decisions in lieu of legal authorities?
Should they judge what is acceptable content?
• Self-regulation doesn’t always work, e.g. IoT market
Self-regulation
consumers
want low
prices
manufacturers
save costs on
security
Gergana Petrova | 7 November 2018 !7
Definitions
“Internet governance (IG) is the development and
application by governments, the private sector and
civil society, in their respective roles, of shared
principles, norms, rules, decision-making procedures,
and programmes that shape the evolution and use
of the Internet.”
World Summit on the Information Society (WSIS), 2005
Gergana Petrova | 7 November 2018
The Multi-stakeholder Model
Internet
Governance
Governments,
National and International
Organisations
The Private Sector
(Businesses)
The Technical

Community
Academia
Civil Society and
Internet Users
Gergana Petrova | 7 November 2018 !9
Main Principles for Policy Making
• Promote the open, distributed and
interconnected nature of the Internet
- Maintain technological neutrality
• Encourage multi-stakeholder co-operation in
policy development processes
• Ensure transparency, fair process, and
accountability
• See NetMundial, OECD, Council of Europe,
etc.
- http://content.netmundial.br/internet-governance-principles/
Gergana Petrova | 7 November 2018 !10
What are the dilemmas?
Internet
hasn’t introduced
anything new to
governance. Our
rights haven’t
changed.
Existing laws
can be applied with
minor
amendments.
The Internet is a
fundamentally different
communication system,
separated from
geographical reality.
Cyberspace is
different than real
space and requires a
new form of
governance.
Gergana Petrova | 7 November 2018 !11
Centralised vs Decentralised Views
We want a one-
stop-shop for IG issues
preferably within an
international
organisation
Small
countries have
limited human and
financial resources to
follow IG
discussions
We want a multi-
stakeholder approach
The Internet is
too complex to be
placed under single
governance umbrella
or organisation
IG Webinar | 4 September 2018 !12
Small Differences that Matter
Cybersecurity
(protecting Internet
infrastructure)
Information
Security
(political and social stability)
Cyber
security
Information
Security
Gergana Petrova | 7 November 2018 !13
Take the Poll!
Go to www.menti.com and use the code 71 75 00
Who should be responsible for removing content,
or making content inaccessible, on the Internet?
Content should not be censored at all
Access providers (ISPs, telcos)
Content platforms (Facebook, etc)
Law enforcement agencies / courts
I can’t decide
Gergana Petrova | 7 November 2018 !14
Take the Poll!
Go to www.menti.com and use
the code 84 56 07
Should technology companies be
asked to create backdoors (write
new software or modify existing
software) at the request of law
enforcement agencies to fight
serious crime?
Yes
No
I can’t decide
Security is
always
excessive… until
it’s not enough!
Gergana Petrova | 7 November 2018 !15
Take the Poll!
Go to www.menti.com and use the code 77 08 58
How much of your personal data should be available in
WHOIS?
All (name, contact details, address)
My name and email
My name
None
Privacy may help protect
owners from spam and identity theft… but it
would mean that users and law enforcement have to get
a court order (lengthy process) to obtain their
information
Gergana Petrova | 7 November 2018 !16
Take the Poll!
Go to www.menti.com and use the code 38 33 51
Who is to blame for ransomeware attacks such as
Wannacry?
Government/ law enforcement
The ICT industry (in this case, Microsoft)
CEO level at affected businesses
IT/security departments
Internet users
Noone to blame; part of life
Gergana Petrova | 7 November 2018 !17
• Provides contact between technical experts,
governments and other affected parties
• When regulation is necessary, it’s better if experts are
heard
• Regulation affects how you run your business
• What can you do?
• EU consultations (https://ec.europa.eu/info/consultations_en)
• Your national government’s consultations
• Join the discussion on the RIPE Cooperation Working Group!
https://www.ripe.net/participate/ripe/wg/coop
Why and how to get involved?
Gergana Petrova | 7 November 2018 !18
• “A forum for multi-stakeholder dialogue on public
policy issues related to the Internet”
• Issues like sustainability, robustness, security, stability
and development of the Internet
• Open and inclusive dialogue and the exchange of
ideas
• Share best practices and experiences
• Identify emerging issues and bring them to the
attention of the relevant bodies and the public
• Contribute to capacity building for IG
Internet Governance Forum (IGF)
Gergana Petrova | 7 November 2018 !19
https://www.intgovforum.org
Next IGF: 12-14 November, Paris
Cybersecurity
DiversityInclusionCritical Internet Resources
Digital economy
Trade and sustainable development
Human rights
Ethics
Access
Virtual Reality
Inclusive development
BigData
Internet of Things
Artificial Intelligence
New technologies
Multistakeholder cooperation
Internet shutdowns
Blockchain
Openaccess
Data ProtectionCERTs
Trust
Fake news
Media literacy
Hate speech
Digital economy
National security
Digital currencies
Cyber threats
GDPR
Gender digital divide
Net neutrality
5G
Right to be forgotten
Privacy
Machine learning
Zero rating
IPv6
IPv4
CGN
Gergana Petrova | 7 November 2018 !20
• Enabling participation of
• women
• the new generation
• people with disabilities
• Connecting small islands or developing
countries
• Challenges and opportunities of a multilingual
Internet
• Internet shutdowns
Inclusion, diversity, access
Gergana Petrova | 7 November 2018 !21
• Submarine cables, and IXPs
• The road ahead for ICANN with new data
protection regulations
• Public policies on IPv6 deployment
• Carrier Grade NAT (CGN) issues
• Different attitudes towards the freedom to use
encryption
• State led interference in encrypted systems
Critical Internet Resources
Gergana Petrova | 7 November 2018 !22
• Improving cybersecurity incident response
• Balancing security with issues such as
openness and privacy
• Legal and other challenges with cross-border
criminal investigations
• International cooperation between CERTs
(Computer Emergency Response Team)
Cybersecurity
Gergana Petrova | 7 November 2018 !23
• Sustainable development
• The sharing/gig economy
• Job automation
• Barriers to the adoption of e-commerce
• Main critique from civil society: a lot of the
discussion is not very open
Digital economy and trade
Gergana Petrova | 7 November 2018 !24
• The role of internet intermediaries in the
protection of human rights of users (such as the
right of privacy, freedom of expression etc)
• Roles and responsibilities of online platforms
• Best practises around notifying about data
breaches
• Regulations in this space will impact operators
• The Internet as utility
Human Rights and Ethics
Gergana Petrova | 7 November 2018 !25
• Getting governments involved in IG
• NRIs (National and Regional Initiatives) stress
the importance of IG
• The value of local and sub regional initiatives,
NOGs (Network Operator Groups) etc
• The lack of hierarchy talks makes IG more
accessible and relevant for people
• Helping define common regional positions
Multistakeholder cooperation
Gergana Petrova | 7 November 2018 !26
• IoT sessions, for example IoT identifiers -
moving away from the idea of IP addresses
• Artificial Intelligence (AI)
• Big data
• Blockchain
• Virtual Reality (VR)
• Fake news
New technologies
Gergana Petrova | 7 November 2018 !27
Regional IGFs
• EuroDIG: 5-6 June 2018, Tbilisi, Georgia
• SEEDIG: 23-24 May 2018, Ljubljana, Slovenia
Multiple National IGFs
• Albania, Armenia, Austria, Azerbaijan, Bosnia and
Herzegovina, Belarus, Croatia, Denmark, Finland,
Georgia, Germany, Italy, Macedonia, Malta, Moldova,
Netherlands, Poland, Portugal, Russia, Slovenia, Spain,
Switzerland, UK, Ukraine
• Multiple Youth IGFs
IGF Initiatives
Gergana Petrova | 7 November 2018 !28
The Future
“We are having Internet
Governance discussions and
meetings and a very large
number of people are
discussing the future of the
Internet who have no clue as
to what the Internet is except
that it is important and that
they have to be involved.”
- Steve Crocker
Gergana Petrova | 7 November 2018 !29
An Introduction to Internet Governance
By Diplo Foundation:
https://www.diplomacy.edu/sites/default/files/
An%20Introduction%20to%20IG_6th%20edition.pdf
Gergana Petrova | 7 November 2018 !30
The History of Internet Governance
By Wolfgang Kleinwächter:
https://www.youtube.com/watch?v=5QUrkRtC2Js
Gergana Petrova | 7 November 2018 !31
IGF Participation
2006 2007 2008 2009 2010 2011 2012 2013 2014 2015 2016 2017
2219
2000
2137
2403
2632
1630
2000
14511480
1300
2100
1300
2014 2015 2016 2017
29% 28%
22%
16%
29%
19%
44%
41%
11%
18%
10%
16%
Technical Community Civil Society Governments
Gergana Petrova | 7 November 2018 !32
What will it be?
• Successful IGFs in
France, Germany
• Business and
government interest
rejuvenated
• Increased commitment
to “multi-stakeholder”
approach
• Support continues to
diminish for IGF events
• States re-assert
unilateral regulation of
Internet
• Globally, governments
look to international
organisations to govern
Questions
gpetrova@ripe.net
Gergana Petrova | 7 November 2018 !34
More Information
WSIS Declaration of Principles:
http://www.itu.int/net/wsis/docs/geneva/official/dop.html
WSIS 10+ Years Review:
https://www.internetsociety.org/wp-content/uploads/2017/08/WSISplus10-Overview.pdf
Principles for Internet Policy Making:
https://www.oecd.org/internet/ieconomy/oecd-principles-for-internet-policy-making.pdf
CircleID’s Internet Governance pieces:
http://www.circleid.com/topics/internet_governance
A Brief Guide to the History of the Internet:
http://www.investintech.com/content/historyinternet/]
Internet Fragmentation: An Overview
http://www3.weforum.org/docs/
WEF_FII_Internet_Fragmentation_An_Overview_2016.pdf

Más contenido relacionado

La actualidad más candente

La actualidad más candente (20)

Network security
Network securityNetwork security
Network security
 
CYBER SECURITY
CYBER SECURITYCYBER SECURITY
CYBER SECURITY
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
 
VULNERABILITY ( CYBER SECURITY )
VULNERABILITY ( CYBER SECURITY )VULNERABILITY ( CYBER SECURITY )
VULNERABILITY ( CYBER SECURITY )
 
introduction to cyber law and cyber crime
introduction to cyber law and cyber crimeintroduction to cyber law and cyber crime
introduction to cyber law and cyber crime
 
Cyber threats
Cyber threatsCyber threats
Cyber threats
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber security ppt
Cyber security pptCyber security ppt
Cyber security ppt
 
IoT Security
IoT SecurityIoT Security
IoT Security
 
Cyber security 07
Cyber security 07Cyber security 07
Cyber security 07
 
Cyber security
Cyber securityCyber security
Cyber security
 
Ethical Hacking Tools
Ethical Hacking ToolsEthical Hacking Tools
Ethical Hacking Tools
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
 
1. introduction to cyber security
1. introduction to cyber security1. introduction to cyber security
1. introduction to cyber security
 
Iot cyber security
Iot cyber securityIot cyber security
Iot cyber security
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Introduction to IoT Security
Introduction to IoT SecurityIntroduction to IoT Security
Introduction to IoT Security
 
Firewall and its types and function
Firewall and its types and functionFirewall and its types and function
Firewall and its types and function
 

Similar a Internet Governance

The RIR System & Internet Governance
The RIR System & Internet GovernanceThe RIR System & Internet Governance
The RIR System & Internet GovernanceRIPE NCC
 
Introduction to Internet Governance
Introduction to Internet GovernanceIntroduction to Internet Governance
Introduction to Internet GovernanceRIPE NCC
 
RIPE NCC and Internet Governance
RIPE NCC and Internet GovernanceRIPE NCC and Internet Governance
RIPE NCC and Internet GovernanceRIPE NCC
 
e-SIDES workshop at ICT 2018, Vienna 5/12/2018
e-SIDES workshop at ICT 2018, Vienna 5/12/2018e-SIDES workshop at ICT 2018, Vienna 5/12/2018
e-SIDES workshop at ICT 2018, Vienna 5/12/2018e-SIDES.eu
 
Future of value of data interim summary aug 2018-compressed
Future of value of data   interim summary aug 2018-compressedFuture of value of data   interim summary aug 2018-compressed
Future of value of data interim summary aug 2018-compressedFuture Agenda
 
ISOC and GSMA: Shared Futures, Global Opportunities
ISOC and GSMA: Shared Futures, Global OpportunitiesISOC and GSMA: Shared Futures, Global Opportunities
ISOC and GSMA: Shared Futures, Global OpportunitiesInternet Society
 
GEC+ 2016: Ainsley Lloyd
GEC+ 2016: Ainsley LloydGEC+ 2016: Ainsley Lloyd
GEC+ 2016: Ainsley LloydPeter Komives
 
The rise of privacy & personal data in the IT business - Claudia Jelea
The rise of privacy & personal data in the IT business - Claudia JeleaThe rise of privacy & personal data in the IT business - Claudia Jelea
The rise of privacy & personal data in the IT business - Claudia JeleaITCamp
 
ITCamp 2016: The rise of privacy and personal data in the IT business
ITCamp 2016: The rise of privacy and personal data in the IT businessITCamp 2016: The rise of privacy and personal data in the IT business
ITCamp 2016: The rise of privacy and personal data in the IT businessclaudiajelea
 
Privacy Regulations and Your Digital Setup
Privacy Regulations and Your Digital SetupPrivacy Regulations and Your Digital Setup
Privacy Regulations and Your Digital SetupPiwik PRO
 
Discovery, Risk, and Insight in a Metadata-Driven World Webinar
Discovery, Risk, and Insight in a Metadata-Driven World WebinarDiscovery, Risk, and Insight in a Metadata-Driven World Webinar
Discovery, Risk, and Insight in a Metadata-Driven World WebinarConcept Searching, Inc
 
e-SIDES and Ethical AI
e-SIDES and Ethical AIe-SIDES and Ethical AI
e-SIDES and Ethical AIIDC4EU
 
GIP-November-2016-briefing-final.ppt, Internet governance
GIP-November-2016-briefing-final.ppt, Internet governanceGIP-November-2016-briefing-final.ppt, Internet governance
GIP-November-2016-briefing-final.ppt, Internet governanceStorianJames1
 
Industry 4.0 Plymouth Manufacturing Group
Industry 4.0 Plymouth Manufacturing Group Industry 4.0 Plymouth Manufacturing Group
Industry 4.0 Plymouth Manufacturing Group Digital Catapult
 
GCCS-privacy-PP-final presentation-3-1.pptx
GCCS-privacy-PP-final presentation-3-1.pptxGCCS-privacy-PP-final presentation-3-1.pptx
GCCS-privacy-PP-final presentation-3-1.pptxMuhammadAbdullah311866
 
Concept paper-on-igf-2013-bali -indonesia-from-nepal-s-perspective-docx
Concept paper-on-igf-2013-bali -indonesia-from-nepal-s-perspective-docxConcept paper-on-igf-2013-bali -indonesia-from-nepal-s-perspective-docx
Concept paper-on-igf-2013-bali -indonesia-from-nepal-s-perspective-docxShreedeep Rayamajhi
 

Similar a Internet Governance (20)

The RIR System & Internet Governance
The RIR System & Internet GovernanceThe RIR System & Internet Governance
The RIR System & Internet Governance
 
Introduction to Internet Governance
Introduction to Internet GovernanceIntroduction to Internet Governance
Introduction to Internet Governance
 
RIPE NCC and Internet Governance
RIPE NCC and Internet GovernanceRIPE NCC and Internet Governance
RIPE NCC and Internet Governance
 
e-SIDES workshop at ICT 2018, Vienna 5/12/2018
e-SIDES workshop at ICT 2018, Vienna 5/12/2018e-SIDES workshop at ICT 2018, Vienna 5/12/2018
e-SIDES workshop at ICT 2018, Vienna 5/12/2018
 
Future of value of data interim summary aug 2018-compressed
Future of value of data   interim summary aug 2018-compressedFuture of value of data   interim summary aug 2018-compressed
Future of value of data interim summary aug 2018-compressed
 
All Things Digital
All Things DigitalAll Things Digital
All Things Digital
 
Persiapan IGF 2018
Persiapan IGF 2018Persiapan IGF 2018
Persiapan IGF 2018
 
Blockchain for Marketing & Insights
Blockchain for Marketing & InsightsBlockchain for Marketing & Insights
Blockchain for Marketing & Insights
 
ISOC and GSMA: Shared Futures, Global Opportunities
ISOC and GSMA: Shared Futures, Global OpportunitiesISOC and GSMA: Shared Futures, Global Opportunities
ISOC and GSMA: Shared Futures, Global Opportunities
 
GEC+ 2016: Ainsley Lloyd
GEC+ 2016: Ainsley LloydGEC+ 2016: Ainsley Lloyd
GEC+ 2016: Ainsley Lloyd
 
The rise of privacy & personal data in the IT business - Claudia Jelea
The rise of privacy & personal data in the IT business - Claudia JeleaThe rise of privacy & personal data in the IT business - Claudia Jelea
The rise of privacy & personal data in the IT business - Claudia Jelea
 
ITCamp 2016: The rise of privacy and personal data in the IT business
ITCamp 2016: The rise of privacy and personal data in the IT businessITCamp 2016: The rise of privacy and personal data in the IT business
ITCamp 2016: The rise of privacy and personal data in the IT business
 
Privacy Regulations and Your Digital Setup
Privacy Regulations and Your Digital SetupPrivacy Regulations and Your Digital Setup
Privacy Regulations and Your Digital Setup
 
Dutton china-sjtu-2015
Dutton china-sjtu-2015Dutton china-sjtu-2015
Dutton china-sjtu-2015
 
Discovery, Risk, and Insight in a Metadata-Driven World Webinar
Discovery, Risk, and Insight in a Metadata-Driven World WebinarDiscovery, Risk, and Insight in a Metadata-Driven World Webinar
Discovery, Risk, and Insight in a Metadata-Driven World Webinar
 
e-SIDES and Ethical AI
e-SIDES and Ethical AIe-SIDES and Ethical AI
e-SIDES and Ethical AI
 
GIP-November-2016-briefing-final.ppt, Internet governance
GIP-November-2016-briefing-final.ppt, Internet governanceGIP-November-2016-briefing-final.ppt, Internet governance
GIP-November-2016-briefing-final.ppt, Internet governance
 
Industry 4.0 Plymouth Manufacturing Group
Industry 4.0 Plymouth Manufacturing Group Industry 4.0 Plymouth Manufacturing Group
Industry 4.0 Plymouth Manufacturing Group
 
GCCS-privacy-PP-final presentation-3-1.pptx
GCCS-privacy-PP-final presentation-3-1.pptxGCCS-privacy-PP-final presentation-3-1.pptx
GCCS-privacy-PP-final presentation-3-1.pptx
 
Concept paper-on-igf-2013-bali -indonesia-from-nepal-s-perspective-docx
Concept paper-on-igf-2013-bali -indonesia-from-nepal-s-perspective-docxConcept paper-on-igf-2013-bali -indonesia-from-nepal-s-perspective-docx
Concept paper-on-igf-2013-bali -indonesia-from-nepal-s-perspective-docx
 

Más de RIPE NCC

Navigating IP Addresses: Insights from your Regional Internet Registry
Navigating IP Addresses: Insights from your Regional Internet RegistryNavigating IP Addresses: Insights from your Regional Internet Registry
Navigating IP Addresses: Insights from your Regional Internet RegistryRIPE NCC
 
Traces of Power: Internet Governance and Climate Action
Traces of Power: Internet Governance and Climate ActionTraces of Power: Internet Governance and Climate Action
Traces of Power: Internet Governance and Climate ActionRIPE NCC
 
Governing Environmental Sustainability in Tech
Governing Environmental Sustainability in TechGoverning Environmental Sustainability in Tech
Governing Environmental Sustainability in TechRIPE NCC
 
Gerardo-Viviers-RPKI-presentation-DKNOG14.pdf
Gerardo-Viviers-RPKI-presentation-DKNOG14.pdfGerardo-Viviers-RPKI-presentation-DKNOG14.pdf
Gerardo-Viviers-RPKI-presentation-DKNOG14.pdfRIPE NCC
 
LIA HESTINA - Minimising impact before incidents occur with RIPE Atlas and RIS
LIA HESTINA - Minimising impact before incidents occur with RIPE Atlas and RISLIA HESTINA - Minimising impact before incidents occur with RIPE Atlas and RIS
LIA HESTINA - Minimising impact before incidents occur with RIPE Atlas and RISRIPE NCC
 
Intro to RIPE and RIPE NCC: RIPE Atlas workshop
Intro to RIPE and RIPE NCC: RIPE Atlas workshopIntro to RIPE and RIPE NCC: RIPE Atlas workshop
Intro to RIPE and RIPE NCC: RIPE Atlas workshopRIPE NCC
 
IGF UA - Dialog with I_ organisations - Alena Muavska RIPE NCC.pdf
IGF UA - Dialog with I_ organisations - Alena Muavska RIPE NCC.pdfIGF UA - Dialog with I_ organisations - Alena Muavska RIPE NCC.pdf
IGF UA - Dialog with I_ organisations - Alena Muavska RIPE NCC.pdfRIPE NCC
 
Opportunities for Youth in IG - Alena Muravska RIPE NCC.pdf
Opportunities for Youth in IG - Alena Muravska RIPE NCC.pdfOpportunities for Youth in IG - Alena Muravska RIPE NCC.pdf
Opportunities for Youth in IG - Alena Muravska RIPE NCC.pdfRIPE NCC
 
RIPE NCC Internet Measurement Tools
RIPE NCC Internet Measurement ToolsRIPE NCC Internet Measurement Tools
RIPE NCC Internet Measurement ToolsRIPE NCC
 
IPv6 in Central Europe and the Baltics
IPv6 in Central Europe and the BalticsIPv6 in Central Europe and the Baltics
IPv6 in Central Europe and the BalticsRIPE NCC
 
RPKI For Routing Security
RPKI For Routing SecurityRPKI For Routing Security
RPKI For Routing SecurityRIPE NCC
 
SEEDIG 8 - Alena Muravska RIPE NCC.pdf
SEEDIG 8 - Alena Muravska RIPE NCC.pdfSEEDIG 8 - Alena Muravska RIPE NCC.pdf
SEEDIG 8 - Alena Muravska RIPE NCC.pdfRIPE NCC
 
Know Your Network: Why Every Network Operator Should Host RIPE Atlas
Know Your Network: Why Every Network Operator Should Host RIPE AtlasKnow Your Network: Why Every Network Operator Should Host RIPE Atlas
Know Your Network: Why Every Network Operator Should Host RIPE AtlasRIPE NCC
 
Minimising Impact When Incidents Occur With RIPE Atlas
Minimising Impact When Incidents Occur With RIPE AtlasMinimising Impact When Incidents Occur With RIPE Atlas
Minimising Impact When Incidents Occur With RIPE AtlasRIPE NCC
 
RIPE NCC Internet Measurement Services
RIPE NCC Internet Measurement ServicesRIPE NCC Internet Measurement Services
RIPE NCC Internet Measurement ServicesRIPE NCC
 
Spotting Latency Issues with RIPE Atlas
Spotting Latency Issues with RIPE AtlasSpotting Latency Issues with RIPE Atlas
Spotting Latency Issues with RIPE AtlasRIPE NCC
 
Spotting Latency Issues with RIPE Atlas
Spotting Latency Issues with RIPE AtlasSpotting Latency Issues with RIPE Atlas
Spotting Latency Issues with RIPE AtlasRIPE NCC
 
Spotting Latency Issues with RIPE Atlas
Spotting Latency Issues with RIPE AtlasSpotting Latency Issues with RIPE Atlas
Spotting Latency Issues with RIPE AtlasRIPE NCC
 
111 views of Swiss Internet Infrastructure
111 views of Swiss Internet Infrastructure111 views of Swiss Internet Infrastructure
111 views of Swiss Internet InfrastructureRIPE NCC
 
The RIPE NCC’s View of IPv6 in Sweden
The RIPE NCC’s View of IPv6 in SwedenThe RIPE NCC’s View of IPv6 in Sweden
The RIPE NCC’s View of IPv6 in SwedenRIPE NCC
 

Más de RIPE NCC (20)

Navigating IP Addresses: Insights from your Regional Internet Registry
Navigating IP Addresses: Insights from your Regional Internet RegistryNavigating IP Addresses: Insights from your Regional Internet Registry
Navigating IP Addresses: Insights from your Regional Internet Registry
 
Traces of Power: Internet Governance and Climate Action
Traces of Power: Internet Governance and Climate ActionTraces of Power: Internet Governance and Climate Action
Traces of Power: Internet Governance and Climate Action
 
Governing Environmental Sustainability in Tech
Governing Environmental Sustainability in TechGoverning Environmental Sustainability in Tech
Governing Environmental Sustainability in Tech
 
Gerardo-Viviers-RPKI-presentation-DKNOG14.pdf
Gerardo-Viviers-RPKI-presentation-DKNOG14.pdfGerardo-Viviers-RPKI-presentation-DKNOG14.pdf
Gerardo-Viviers-RPKI-presentation-DKNOG14.pdf
 
LIA HESTINA - Minimising impact before incidents occur with RIPE Atlas and RIS
LIA HESTINA - Minimising impact before incidents occur with RIPE Atlas and RISLIA HESTINA - Minimising impact before incidents occur with RIPE Atlas and RIS
LIA HESTINA - Minimising impact before incidents occur with RIPE Atlas and RIS
 
Intro to RIPE and RIPE NCC: RIPE Atlas workshop
Intro to RIPE and RIPE NCC: RIPE Atlas workshopIntro to RIPE and RIPE NCC: RIPE Atlas workshop
Intro to RIPE and RIPE NCC: RIPE Atlas workshop
 
IGF UA - Dialog with I_ organisations - Alena Muavska RIPE NCC.pdf
IGF UA - Dialog with I_ organisations - Alena Muavska RIPE NCC.pdfIGF UA - Dialog with I_ organisations - Alena Muavska RIPE NCC.pdf
IGF UA - Dialog with I_ organisations - Alena Muavska RIPE NCC.pdf
 
Opportunities for Youth in IG - Alena Muravska RIPE NCC.pdf
Opportunities for Youth in IG - Alena Muravska RIPE NCC.pdfOpportunities for Youth in IG - Alena Muravska RIPE NCC.pdf
Opportunities for Youth in IG - Alena Muravska RIPE NCC.pdf
 
RIPE NCC Internet Measurement Tools
RIPE NCC Internet Measurement ToolsRIPE NCC Internet Measurement Tools
RIPE NCC Internet Measurement Tools
 
IPv6 in Central Europe and the Baltics
IPv6 in Central Europe and the BalticsIPv6 in Central Europe and the Baltics
IPv6 in Central Europe and the Baltics
 
RPKI For Routing Security
RPKI For Routing SecurityRPKI For Routing Security
RPKI For Routing Security
 
SEEDIG 8 - Alena Muravska RIPE NCC.pdf
SEEDIG 8 - Alena Muravska RIPE NCC.pdfSEEDIG 8 - Alena Muravska RIPE NCC.pdf
SEEDIG 8 - Alena Muravska RIPE NCC.pdf
 
Know Your Network: Why Every Network Operator Should Host RIPE Atlas
Know Your Network: Why Every Network Operator Should Host RIPE AtlasKnow Your Network: Why Every Network Operator Should Host RIPE Atlas
Know Your Network: Why Every Network Operator Should Host RIPE Atlas
 
Minimising Impact When Incidents Occur With RIPE Atlas
Minimising Impact When Incidents Occur With RIPE AtlasMinimising Impact When Incidents Occur With RIPE Atlas
Minimising Impact When Incidents Occur With RIPE Atlas
 
RIPE NCC Internet Measurement Services
RIPE NCC Internet Measurement ServicesRIPE NCC Internet Measurement Services
RIPE NCC Internet Measurement Services
 
Spotting Latency Issues with RIPE Atlas
Spotting Latency Issues with RIPE AtlasSpotting Latency Issues with RIPE Atlas
Spotting Latency Issues with RIPE Atlas
 
Spotting Latency Issues with RIPE Atlas
Spotting Latency Issues with RIPE AtlasSpotting Latency Issues with RIPE Atlas
Spotting Latency Issues with RIPE Atlas
 
Spotting Latency Issues with RIPE Atlas
Spotting Latency Issues with RIPE AtlasSpotting Latency Issues with RIPE Atlas
Spotting Latency Issues with RIPE Atlas
 
111 views of Swiss Internet Infrastructure
111 views of Swiss Internet Infrastructure111 views of Swiss Internet Infrastructure
111 views of Swiss Internet Infrastructure
 
The RIPE NCC’s View of IPv6 in Sweden
The RIPE NCC’s View of IPv6 in SwedenThe RIPE NCC’s View of IPv6 in Sweden
The RIPE NCC’s View of IPv6 in Sweden
 

Último

DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfMounikaPolabathina
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersRaghuram Pandurangan
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfPrecisely
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESmohitsingh558521
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 

Último (20)

DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdf
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 

Internet Governance

  • 1. 7 November 2018 Internet Governance Gergana Petrova External Relations RIPE NCC
  • 2. Gergana Petrova | 7 November 2018 !2 Who Runs the Internet? The short answer is: NO ONE!
  • 3. Gergana Petrova | 7 November 2018 The Multi-stakeholder Model Internet Governance Governments, National and International Organisations The Private Sector (Businesses) The Technical
 Community Academia Civil Society and Internet Users
  • 4. Gergana Petrova | 7 November 2018 !4 What will we cover? • What is the multi-stakeholder model? • What are the main principles for policy making? • What are the key arguments and dilemmas? • Why should you get involved? • How can you get involved?
  • 5. Gergana Petrova | 7 November 2018 !5 The History “[the Internet] is inherently extra-national, inherently anti- sovereign and your [states’] sovereignty cannot apply to us. We’ve got to figure things out ourselves.” John Perry Barlow, 1996 Things have changed…
  • 6. Gergana Petrova | 7 November 2018 !6 • Social norms worked well in the beginning of the Internet • Self-regulation still works in a group with strong community ties, by applying peer pressure or exclusion (e.g. Wikipedia) • ISPs try to self-regulate by imposing standards of behaviour for their customers • Should ISPs make decisions in lieu of legal authorities? Should they judge what is acceptable content? • Self-regulation doesn’t always work, e.g. IoT market Self-regulation consumers want low prices manufacturers save costs on security
  • 7. Gergana Petrova | 7 November 2018 !7 Definitions “Internet governance (IG) is the development and application by governments, the private sector and civil society, in their respective roles, of shared principles, norms, rules, decision-making procedures, and programmes that shape the evolution and use of the Internet.” World Summit on the Information Society (WSIS), 2005
  • 8. Gergana Petrova | 7 November 2018 The Multi-stakeholder Model Internet Governance Governments, National and International Organisations The Private Sector (Businesses) The Technical
 Community Academia Civil Society and Internet Users
  • 9. Gergana Petrova | 7 November 2018 !9 Main Principles for Policy Making • Promote the open, distributed and interconnected nature of the Internet - Maintain technological neutrality • Encourage multi-stakeholder co-operation in policy development processes • Ensure transparency, fair process, and accountability • See NetMundial, OECD, Council of Europe, etc. - http://content.netmundial.br/internet-governance-principles/
  • 10. Gergana Petrova | 7 November 2018 !10 What are the dilemmas? Internet hasn’t introduced anything new to governance. Our rights haven’t changed. Existing laws can be applied with minor amendments. The Internet is a fundamentally different communication system, separated from geographical reality. Cyberspace is different than real space and requires a new form of governance.
  • 11. Gergana Petrova | 7 November 2018 !11 Centralised vs Decentralised Views We want a one- stop-shop for IG issues preferably within an international organisation Small countries have limited human and financial resources to follow IG discussions We want a multi- stakeholder approach The Internet is too complex to be placed under single governance umbrella or organisation
  • 12. IG Webinar | 4 September 2018 !12 Small Differences that Matter Cybersecurity (protecting Internet infrastructure) Information Security (political and social stability) Cyber security Information Security
  • 13. Gergana Petrova | 7 November 2018 !13 Take the Poll! Go to www.menti.com and use the code 71 75 00 Who should be responsible for removing content, or making content inaccessible, on the Internet? Content should not be censored at all Access providers (ISPs, telcos) Content platforms (Facebook, etc) Law enforcement agencies / courts I can’t decide
  • 14. Gergana Petrova | 7 November 2018 !14 Take the Poll! Go to www.menti.com and use the code 84 56 07 Should technology companies be asked to create backdoors (write new software or modify existing software) at the request of law enforcement agencies to fight serious crime? Yes No I can’t decide Security is always excessive… until it’s not enough!
  • 15. Gergana Petrova | 7 November 2018 !15 Take the Poll! Go to www.menti.com and use the code 77 08 58 How much of your personal data should be available in WHOIS? All (name, contact details, address) My name and email My name None Privacy may help protect owners from spam and identity theft… but it would mean that users and law enforcement have to get a court order (lengthy process) to obtain their information
  • 16. Gergana Petrova | 7 November 2018 !16 Take the Poll! Go to www.menti.com and use the code 38 33 51 Who is to blame for ransomeware attacks such as Wannacry? Government/ law enforcement The ICT industry (in this case, Microsoft) CEO level at affected businesses IT/security departments Internet users Noone to blame; part of life
  • 17. Gergana Petrova | 7 November 2018 !17 • Provides contact between technical experts, governments and other affected parties • When regulation is necessary, it’s better if experts are heard • Regulation affects how you run your business • What can you do? • EU consultations (https://ec.europa.eu/info/consultations_en) • Your national government’s consultations • Join the discussion on the RIPE Cooperation Working Group! https://www.ripe.net/participate/ripe/wg/coop Why and how to get involved?
  • 18. Gergana Petrova | 7 November 2018 !18 • “A forum for multi-stakeholder dialogue on public policy issues related to the Internet” • Issues like sustainability, robustness, security, stability and development of the Internet • Open and inclusive dialogue and the exchange of ideas • Share best practices and experiences • Identify emerging issues and bring them to the attention of the relevant bodies and the public • Contribute to capacity building for IG Internet Governance Forum (IGF)
  • 19. Gergana Petrova | 7 November 2018 !19 https://www.intgovforum.org Next IGF: 12-14 November, Paris Cybersecurity DiversityInclusionCritical Internet Resources Digital economy Trade and sustainable development Human rights Ethics Access Virtual Reality Inclusive development BigData Internet of Things Artificial Intelligence New technologies Multistakeholder cooperation Internet shutdowns Blockchain Openaccess Data ProtectionCERTs Trust Fake news Media literacy Hate speech Digital economy National security Digital currencies Cyber threats GDPR Gender digital divide Net neutrality 5G Right to be forgotten Privacy Machine learning Zero rating IPv6 IPv4 CGN
  • 20. Gergana Petrova | 7 November 2018 !20 • Enabling participation of • women • the new generation • people with disabilities • Connecting small islands or developing countries • Challenges and opportunities of a multilingual Internet • Internet shutdowns Inclusion, diversity, access
  • 21. Gergana Petrova | 7 November 2018 !21 • Submarine cables, and IXPs • The road ahead for ICANN with new data protection regulations • Public policies on IPv6 deployment • Carrier Grade NAT (CGN) issues • Different attitudes towards the freedom to use encryption • State led interference in encrypted systems Critical Internet Resources
  • 22. Gergana Petrova | 7 November 2018 !22 • Improving cybersecurity incident response • Balancing security with issues such as openness and privacy • Legal and other challenges with cross-border criminal investigations • International cooperation between CERTs (Computer Emergency Response Team) Cybersecurity
  • 23. Gergana Petrova | 7 November 2018 !23 • Sustainable development • The sharing/gig economy • Job automation • Barriers to the adoption of e-commerce • Main critique from civil society: a lot of the discussion is not very open Digital economy and trade
  • 24. Gergana Petrova | 7 November 2018 !24 • The role of internet intermediaries in the protection of human rights of users (such as the right of privacy, freedom of expression etc) • Roles and responsibilities of online platforms • Best practises around notifying about data breaches • Regulations in this space will impact operators • The Internet as utility Human Rights and Ethics
  • 25. Gergana Petrova | 7 November 2018 !25 • Getting governments involved in IG • NRIs (National and Regional Initiatives) stress the importance of IG • The value of local and sub regional initiatives, NOGs (Network Operator Groups) etc • The lack of hierarchy talks makes IG more accessible and relevant for people • Helping define common regional positions Multistakeholder cooperation
  • 26. Gergana Petrova | 7 November 2018 !26 • IoT sessions, for example IoT identifiers - moving away from the idea of IP addresses • Artificial Intelligence (AI) • Big data • Blockchain • Virtual Reality (VR) • Fake news New technologies
  • 27. Gergana Petrova | 7 November 2018 !27 Regional IGFs • EuroDIG: 5-6 June 2018, Tbilisi, Georgia • SEEDIG: 23-24 May 2018, Ljubljana, Slovenia Multiple National IGFs • Albania, Armenia, Austria, Azerbaijan, Bosnia and Herzegovina, Belarus, Croatia, Denmark, Finland, Georgia, Germany, Italy, Macedonia, Malta, Moldova, Netherlands, Poland, Portugal, Russia, Slovenia, Spain, Switzerland, UK, Ukraine • Multiple Youth IGFs IGF Initiatives
  • 28. Gergana Petrova | 7 November 2018 !28 The Future “We are having Internet Governance discussions and meetings and a very large number of people are discussing the future of the Internet who have no clue as to what the Internet is except that it is important and that they have to be involved.” - Steve Crocker
  • 29. Gergana Petrova | 7 November 2018 !29 An Introduction to Internet Governance By Diplo Foundation: https://www.diplomacy.edu/sites/default/files/ An%20Introduction%20to%20IG_6th%20edition.pdf
  • 30. Gergana Petrova | 7 November 2018 !30 The History of Internet Governance By Wolfgang Kleinwächter: https://www.youtube.com/watch?v=5QUrkRtC2Js
  • 31. Gergana Petrova | 7 November 2018 !31 IGF Participation 2006 2007 2008 2009 2010 2011 2012 2013 2014 2015 2016 2017 2219 2000 2137 2403 2632 1630 2000 14511480 1300 2100 1300 2014 2015 2016 2017 29% 28% 22% 16% 29% 19% 44% 41% 11% 18% 10% 16% Technical Community Civil Society Governments
  • 32. Gergana Petrova | 7 November 2018 !32 What will it be? • Successful IGFs in France, Germany • Business and government interest rejuvenated • Increased commitment to “multi-stakeholder” approach • Support continues to diminish for IGF events • States re-assert unilateral regulation of Internet • Globally, governments look to international organisations to govern
  • 34. Gergana Petrova | 7 November 2018 !34 More Information WSIS Declaration of Principles: http://www.itu.int/net/wsis/docs/geneva/official/dop.html WSIS 10+ Years Review: https://www.internetsociety.org/wp-content/uploads/2017/08/WSISplus10-Overview.pdf Principles for Internet Policy Making: https://www.oecd.org/internet/ieconomy/oecd-principles-for-internet-policy-making.pdf CircleID’s Internet Governance pieces: http://www.circleid.com/topics/internet_governance A Brief Guide to the History of the Internet: http://www.investintech.com/content/historyinternet/] Internet Fragmentation: An Overview http://www3.weforum.org/docs/ WEF_FII_Internet_Fragmentation_An_Overview_2016.pdf