Cyber attacks require distributed deterrence involving private and public actors. Can the classics of international law help?
Filtered results
This special issue brings together the best policy-oriented papers presented at the 2017 Association of Internet Researchers (AoIR) conference in Tartu, Estonia.
This paper examines three historical imaginaries associated with encryption, considering how they are intertwined in contemporary policy debates.
This paper is part of Australian internet policy , a special issue of Internet Policy Review guest-edited by Angela Daly and Julian Thomas. Part I: The Data Retention Act In April 2015, the Australian government passed the Telecommunications (Interception and Access) Amendment (Data Retention) Act , which requires Internet Service Providers (ISPs
Focusing on different democratic ways of negotiating online privacy the authors identify several governance modes, including the currently prevailing protectionist mode.
The internet and its regulation are the result of continuous conflicts. By analysing policy fields as fields of struggle, this essay proposes to observe processes of discursive institutionalisation to uncover core conflicts inscribed into internet policy.
The Russian 'dictatorship-of-the-law' paradigm is all but over: it is deploying online, with potentially harmful consequences for Russia's attempts to attract foreign investments in the internet sector, and for users' rights online.