Management of the internet by the principle of the multistakeholder governance model has survived attempts of replacing it with inter-government management. What additional principles are useful to guide global internet governance and enhance ICANN’s legitimacy, seen in light of recent challenges? Are the disagreements over global internet governance also about diverging understandings of the goals in internet governance?
News and Research articles on Wikileaks
This special issue brings together the best policy-oriented papers presented at the 2017 Association of Internet Researchers (AoIR) conference in Tartu, Estonia.
The ‘lawful’ intrusion or interference with information communication infrastructures poses challenges to democratic freedoms in Australia.
Speaking of 'disruption of journalism' when talking about big data leaks is "so 2010", finds researcher Stefan Baack. Every major leak since the Afghan war logs has followed the same pattern.
Hacktivists 1.0 were Anonymous mask wearing outsiders. Subsequent generations are made up of insiders who use privacy enhancing technologies to hide their identities, to keep power under control or to disengage.
Civil disobedience is a familiar and well established phenomenon in Western societies. Currently, this concept of political action is challenged by new practices evolving on and around the internet. This paper focusses on the question of whether several forms of digital civil disobedience are legitimate.
Private actors in the information technology sector are currently playing an increasingly important role in content mediation, as well as in regulation of online forms of expression, with implications for both internet rights and economic freedom. The latest Google Transparency Report (Google, 2013) released on January 24, 2013, sends a clear and somewhat disquieting message to the advocates of a more transparent internet governance worldwide. Several governments in the European Union are submitting a steadily increasing number of requests to the giant of online information search, with two purposes: the acquisition of several types of sensitive information about internet users – including …