Cyber attacks require distributed deterrence involving private and public actors. Can the classics of international law help?
Filtered results
This special issue brings together the best policy-oriented papers presented at the 2017 Association of Internet Researchers (AoIR) conference in Tartu, Estonia.
This special issue on 'Regulating the sharing economy' includes five papers and an editorial which each contribute to knowledge by linking the social and economic aspects of sharing economy practices to regulatory norms and mechanisms.
This paper is part of Regulating the sharing economy , a special issue of Internet Policy Review guest-edited by Kristofer Erickson and Inge Sørensen. Disclaimer: This study was completed with the support of the German service sector union ver.di. We would like to thank the participating platforms and their communities for the opportunity to
Hacktivists 1.0 were Anonymous mask wearing outsiders. Subsequent generations are made up of insiders who use privacy enhancing technologies to hide their identities, to keep power under control or to disengage.
By retracing the stages of development of a 'peer-to-peer cloud' storage service, Francesca Musiani argues that decentralised network architectures are internet governance 'in practice'.