Cyber attacks require distributed deterrence involving private and public actors. Can the classics of international law help?
News and Research articles on United States National Security Agency (NSA)
Is Bitcoin a fair and reliable currency? Contrary to what its proponents might hope, Bitcoin is far from fulfilling their expectations.
This special issue brings together the best policy-oriented papers presented at the 2017 Association of Internet Researchers (AoIR) conference in Tartu, Estonia.
This paper examines three historical imaginaries associated with encryption, considering how they are intertwined in contemporary policy debates.
This paper explores how four approaches to cyber security are constructed, motivated and justified by different values such as privacy, economic order and national security and what this means for the actors involved.
This paper is part of Australian internet policy, a special issue of Internet Policy Review guest-edited by Angela Daly and Julian Thomas. Part I: The Data Retention Act In April 2015, the Australian government passed the Telecommunications (Interception and Access) Amendment (Data Retention) Act, which requires Internet Service Providers (ISPs) and telecommunications providers to store information about their subscribers’ online activity for a period of two years. The data retention rules apply to metadata – loosely defined as information that is not the 'content' of a communication. Generally, service providers must keep identifying information about their subscribers, including billing …
This paper provides qualitative analysis of Google’s and Microsoft’s policies and examines case studies to enhance understanding about the privacy role of information intermediaries in self-regulatory arrangements.
Disclosing and concealing: internet governance, information control and the management of visibility
Datafication leads to subtle forms of governance; this article explores them by drawing on science and technology studies as well as sociologies of visibility.
Focusing on different democratic ways of negotiating online privacy the authors identify several governance modes, including the currently prevailing protectionist mode.
The internet and its regulation are the result of continuous conflicts. By analysing policy fields as fields of struggle, this essay proposes to observe processes of discursive institutionalisation to uncover core conflicts inscribed into internet policy.
Short overview by reporter Monika Ermert on the many pending and newly announced surveillance cases before the European Court of Human Rights, as well as national courts.
The “Post-Snowden Crypto conference” last week pondered over repairing or replacing core parts of the net, the morale of cryptography and the nihilism of the surveilled society.
The Russian 'dictatorship-of-the-law' paradigm is all but over: it is deploying online, with potentially harmful consequences for Russia's attempts to attract foreign investments in the internet sector, and for users' rights online.