Multi-Stakeholder Governance and the Internet Governance Forum

Total Page:16

File Type:pdf, Size:1020Kb

Multi-Stakeholder Governance and the Internet Governance Forum Multi-Stakeholder Governance and the Internet Governance Forum Multi-Stakeholder GOVERNANCE and the Internet Governance Forum Jeremy Malcolm TERMINUS PRESS PERTH 2008 For Dominica Published in Australia by Terminus Press c 2008 Jeremy Malcolm. All rights reserved. ! First online edition 2008 10 9 8 7 6 5 4 3 2 1 Cover design by Lisa Emmanuel Cover illustration by Matt Britt This book was typeset using the LATEX typesetting system. The body text is set in 9 on 11pt Palatino type. National Library of Australia Cataloguing-in-Publication entry Author: Malcolm, Jeremy. Title: Multi-stakeholder governance and the Internet Governance Forum / Jeremy Malcolm. ISBN: 9780980508406 (pbk.) 9780980508413 (online) Notes: Includes index. Bibliography. Subjects: Internet–Government policy. Internet–Management. Internet–International cooperation. Dewey Number: 004.678 Contents List of Figures viii List of Tables viii Table of Statutes and International Instruments ix Table of Cases xiii Glossary xv Preface xxvii 1 Introduction 1 1.1 The hacker ethos . 3 1.2 Genesis of the Internet . 5 1.3 Technical and social architecture . 8 Shaking the architecture’s foundations . 9 Internet culture . 16 1.4 Governance mechanisms . 18 Rules . 21 Norms . 22 Markets . 23 Architecture . 25 Networks . 25 2 Internet governance as it was 29 2.1 Technical coordination . 31 Historical development . 31 Current arrangements . 38 Criticisms . 46 2.2 Standards development . 50 Standards bodies . 51 Criticisms . 65 2.3 Public policy governance . 69 v Internet-related public policy issues . 70 Criticisms . 89 2.4 Governance mechanisms revisited . 91 3 The international system 97 3.1 International law and international relations . 98 International law . 98 International relations . 100 3.2 Actors in international law . 103 Governments . 105 The private sector . 116 Civil society . 122 New medievalism . 129 3.3 Sources of international law . 132 Hard law . 133 Soft law . 136 Private law . 141 3.4 Limitations of international law . 144 The legitimacy of authority . 145 Jurisdiction . 157 Universality . 164 3.5 Internet governance as law . 175 4 Designing a governance network 181 4.1 Anarchistic . 183 Anarchy and the Internet . 184 Anarchistic Internet governance . 191 Criticisms . 194 4.2 Hierarchical . 196 Bureaucracy . 197 Oligarchy . 198 Meritocracy . 201 Hybrid models . 206 Anarchistic–hierarchical Internet governance . 221 Criticisms . 225 4.3 Democratic . 226 Representation . 229 Consent . 240 Transparency and accountability . 260 Inclusion . 266 Criticisms . 282 4.4 Consensual . 291 Consensus between stakeholder groups . 293 Deliberative consensus . 297 Consensus in Internet governance . 302 Criticisms . 311 4.5 Multi-stakeholder public policy development . 319 vi 5 Reform of Internet governance 321 5.1 WSIS . 322 Processes . 324 First phase . 329 WGIG . 334 Second phase . 342 5.2 IGF . 353 Preparations . 355 The First Meeting . 366 Outcomes . 379 The Second Meeting . 384 5.3 Regional initiatives . 395 CGI.br . 397 5.4 Other proposals . 398 Anarchistic . 399 Hierarchical . 401 Democratic . 404 Consensual . 407 5.5 The need for further reform . 412 6 The IGF’s report card 415 6.1 Other organisations as models . 417 6.2 Role . 420 Policy-setting . 423 Coordination . 431 Development . 441 6.3 Structure . 442 Existing structures . 444 Structural reform . 462 6.4 Processes . 474 Representation . 475 Consent . 482 Transparency and accountability . 493 Inclusion . 504 6.5 A new IGF . 513 A Comparison of other organisations 523 Bibliography 533 vii Index 595 List of Figures 2.1 Internet governance organisations . 39 4.1 Conceptions of democracy . 243 4.2 Tools for online democracy . 280 5.1 Substantive issues for the IGF . 362 List of Tables 2.1 Public policy issues . 70 2.2 Governance types and mechanisms . 92 6.1 Organisations comparable to the IGF . 420 viii Table of Statutes and International Instruments Aarhus Convention, 25 Jun 1998, 1998 SD No 46 (entry into force 30 Oct 2001), 125, 409 Agreement on Trade-Related Aspects of Intellectual Property Rights, 15 Apr 1994, 1995 ATS No 38 (entry into force for Australia 19 May 1995), 78, 108, 117, 132 Anticybersquatting Protection Act 1999 (US) 113 Stat 1501, Public Law 106-113, 77 Berne Convention for the Protection of Literary and Artistic Works, 9 Sep 1886, as revised 13 Nov 1908, completed 20 Mar 1914, revised 2 Jun 1928 and revised 26 Jun 1948, 1969 ATS No 13 (entry into force for Australia 1 Jun 1969), 77 Broadcasting Services Act 1992 (Cth), 81, 207 Charter of the United Nations, 26 June 1945, 1945 ATS No 1 (entry into force for Australia 1 November 1945), 106, 107, 127 Constitution of the Commonwealth of Massachusetts, 25 Oct 1780, 230 Constitution of the Islamic Republic of Afghanistan, 4 Jan 2004, 174 Constitution of the United States of America, 17 Sep 1787, 134 Controlling the Assault of Non-Solicited Pornography and Marketing Act 2003 117 Stat 2699 Public Law 108-187, 76 Convention on the Elimination of All Forms of Discrimination against Women, 18 Dec 1979, 1983 ATS No 9 (entry into force for Australia 27 Aug 1983), 148 Convention on the Recognition and Enforcement of Foreign Arbitral Awards, 10 Jun 1958, 1975 ATS No 25 (entry into force for Australia 24 Jun 1975), 159 Copyright Act 1968 (Cth), 77, 78 Corporations Act 2001 (Cth), 230 Council of Europe Cybercrime Convention, 23 Nov 2001, 2003 S Treaty Doc No 108-11, 73, 175 Cybercrime Act 2001 (Cth), 73 Decree No 4,829 of 3 Sep 2003 (Brazil), DOU of 4 Sep 2003, Section I, p 24, 397 Digital Millennium Copyright Act 1998 (US) 112 Stat 2860, Public Law 105-304, ix 78 Disability Convention, 6 Dec 2006, A/61/611 (not yet in force), 437, 519 EEX Convention, 27 Sep 1968, OJ L/299/32, 159, 163 EVEX Convention, 16 Sep 1988, 159 Electronic Transactions Act 2001 (Cth), 89, 139 Extradition Act 1988 (Cth), 160 Foreign Judgments Act 1991 (Cth), 160, 166 Hague Convention on Choice of Law Agreements, 30 Jun 2005, 89, 159, 164 ILO Constitution, 9 Oct 1946, 1948 ATS No 8 (entry into force 20 Apr 1948), 111, 112 International Covenant on Civil and Political Rights, 16 Dec 1966, 1980 ATS No 23 (entry into force for Australia (except Article 41) 13 Nov 1980), 79, 82, 99, 138, 166, 171, 172, 235 International Covenant on Economic, Social and Cultural Rights, 16 Dec 1966, 1976 ATS No 5 (entry into force for Australia 10 Mar 1976), 138, 235, 287 Louisiana Revised Statutes (LA), 90 Metric Convention, 20 May 1875, 1947 ATS No 22 (entry into force 20 Dec 1875), 140 Mine Ban Treaty, 18 Sep 1997, 1999 ATS No 3 (entry into force for Australia 1 Sep 1999), 124, 437, 519 Optional Protocol to the Convention on the Rights of the Child, 25 May 2000, 2007 ATS No 6 (entry into force for Australia 8 Feb 2007), 74 Paris Convention for the Protection of Industrial Property, 20 Mar 1883, as revised 14 Dec 1900, 2 Jun 1911, 6 Nov 1925, 2 Jun 1934, 31 Oct 1958, and 14 Jul 1967, 1972 ATS No 12 (entry into force for Australia of substantive provisions 27 Sep 1975), 77 Privacy Act 1988 (Cth), 82 Rome Convention, 26 Oct 1961, 1992 ATS No 29 (entry into force for Australia 30 Sep 1992), 77, 159 Single European Act, 17 Feb 1986, 1987 O.J (L 169) 1, 25 ILM 506, 114 Spam Act 2003 (Cth), 75, 177, 207 Statute of the International Court of Justice, 26 Jun 1945, 1975 ATS No 50 (entry into force for Australia 1 Nov 1945), 107, 133, 157, 165 Telecommunications Act 1997 (Cth), 45, 207–210, 290 Treaty Establishing a Constitution for Europe, 29 Oct 2004, 150 Treaty of Amsterdam, 2 Oct 1997, 1997 OJ (C 340) 1, 37 ILM 56, 114 Treaty of Nice, 26 Feb 2001, 2001 OJ (C 80) 1, 114, 115 Treaty on European Union, 7 Feb 1992, 1992 O J (C 191), 31 ILM 253, 113, 114 UN Convention on the Use of Electronic Communications in International Con- tracts, 23 Nov 2005, 89 UN Framework Convention on Climate Change, 9 May 1992, 1994 ATS No 2 (entry into force 21 Mar 2004), 408 Vienna Convention on the Law of Treaties, 23 May 1969, 1974 ATS No 2 (entry into force 27 Jan 1980), 136, 166 WIPO Copyright Treaty, 20 Dec 1996, 77 WIPO Performances and Phonograms Treaty, 20 Dec 1996, 77 x WTO Agreement, 15 Apr 2004, 1995 ATS No 8 (entry into force 1 Jan 1995), 110 xi Table.
Recommended publications
  • E-Commerce Web Application Using Paypal Payment Gate- Way
    AKM Mahfuzul Haque E-COMMERCE WEB APPLICATION USING PAYPAL PAYMENT GATE- WAY Technology and Communication 2017 ACKNOWLEDGEMENT I would like to thank God for showing me the way of my success. I am indebted to my parents (Mr. Karam Ali and Mrs. Khaleda Akhter) for their significant effort to support me all the way from my childhood until now. Their happiness is my suc- cess. My deepest gratitude goes to my thesis supervisor Dr. Ghodrat Moghadam- pour who has given his best to help me to complete my thesis. His guidance is excellent, and without his assistance, it would be quite difficult to fulfill my thesis. It is an honor to thank the Head of Degree Programme Dr. Seppo Mäkinen who is always friendly and helpful to me. It is my pleasure to thank all the teachers and staffs of Vaasa University of Applied Sciences who has made a great support for my whole study period. Haque AKM Mahfuzul May 2017 VAASAN AMMATTIKORKEAKOULU UNIVERSITY OF APPLIED SCIENCES INFORMATION TECHNOLOGY ABSTRACT Author AKM Mahfuzul Haque Title E-commerce Web Application Using PayPal Payment Gateway Year 2017 Language English Pages 82 Name of Supervisor Dr. Ghodrat Moghadampour The main idea of the thesis was to develop an E-commerce Web Application by using payment gateway (PayPal payment technology) for an online shop which was developed by ASP.NET framework (version 4.6.2) and Microsoft SQL server management studio, where a seller (Owner of the Web shop) will be able to put all the products in the online shop, and a customer who is a buyer will be able to buy items through online payment.This application has two different views: Public view and Administrator (in short Admin) view.
    [Show full text]
  • SEARCH CONTENT File P3 OPTIMISATION Why Aussie Websites Are How Do Aussie Websites Missing Prime Content Fare? P10 Opportunities P9
    Edition 5, Nov 2015 BEHIND THE DOT state of the .au domain ONLINE SUCCESS Our nation’s best websites - 8 common traits p8 zone ahead A comprehensive analysis of the WEBSITE .au zone SEARCH CONTENT file p3 OPTIMISATION Why Aussie websites are How do Aussie websites missing prime content fare? p10 opportunities p9 @AusRegistry_au ausregistry.com.au Behind the Dot - State of the .au Domain is a quarterly magazine presenting .au statistics, expert commentary, analysis, industry related articles and feature stories. Publisher: AusRegistry Editor in Chief: George Pongas Managing Editor: Maggie Whitnall Regular Contributors: Maggie Whitnall, Alison Coffa, Michael Korjen, Adrian Kinderis, George Pongas, Jo Lim Data Analysis: Penelope Green Account Management and Circulation: Courtney Fabian Creative Director: Michelle O’Reilly ____________ Advertising Sales: [email protected] Contents DEPARTMENTS CHARTS & TABLES Under the Microscope ........................................................................1 .au Domains Under Management .......................................................1 An overview of the number of .au domains currently under .au Monthly Creates ............................................................................1 management (open 2LDs), monthly registrations, renewals by age of domain and APTLD statistics. Renewal Rates by Domain Age ...........................................................2 .au Research and Surveys ....................................................................2 Domain Numbers
    [Show full text]
  • Kirjoituspohja VTT Science
    IENCE C • •S T S E C Small world for dynamic wireless cyber-physical N O H I N systems S O I V Dissertation L • O S 142 G T Y H • R Industries and consumer markets are today increasingly using G I E L VTT SCIEN CE S H E G services exposed from wireless sensor and actuator networks, A I R H C cyber-physical machine-to-machine systems. The motivation for H the research arises from problems detected in the remote 1 4 2 interaction with embedded devices over dynamic wireless networks in such systems. The selected approach is based on the application of the small- world paradigm to cyber-physical systems. It is here assumed that the concept of small world, "six degrees of separation", can be expanded to also cover communication with wireless embedded devices in cyber-physical systems context. The main contributions are the technical enablers referred to as dynamic communication spaces, dynamic M2M service spaces, configuration and remote use of services, communication overlay, access systems selection, integrated mobility, secure ad hoc networking, situated opportunistic communication, hierarchical networking for small-world networks, and short-cuts for network optimization. The enablers have been evaluated as separate technical methods and means by means of experiments and/or simulations. According to the evaluations, the enablers seem to work well as separate building blocks and that they can be combined to expand the concept of small world to also cover communication with embedded devices. Wireless short-cuts can improve the scalability and efficiency of dynamic wireless networking and weak links are essential in the neighbour discovery process.
    [Show full text]
  • Ubuntu Kung Fu
    Prepared exclusively for Alison Tyler Download at Boykma.Com What readers are saying about Ubuntu Kung Fu Ubuntu Kung Fu is excellent. The tips are fun and the hope of discov- ering hidden gems makes it a worthwhile task. John Southern Former editor of Linux Magazine I enjoyed Ubuntu Kung Fu and learned some new things. I would rec- ommend this book—nice tips and a lot of fun to be had. Carthik Sharma Creator of the Ubuntu Blog (http://ubuntu.wordpress.com) Wow! There are some great tips here! I have used Ubuntu since April 2005, starting with version 5.04. I found much in this book to inspire me and to teach me, and it answered lingering questions I didn’t know I had. The book is a good resource that I will gladly recommend to both newcomers and veteran users. Matthew Helmke Administrator, Ubuntu Forums Ubuntu Kung Fu is a fantastic compendium of useful, uncommon Ubuntu knowledge. Eric Hewitt Consultant, LiveLogic, LLC Prepared exclusively for Alison Tyler Download at Boykma.Com Ubuntu Kung Fu Tips, Tricks, Hints, and Hacks Keir Thomas The Pragmatic Bookshelf Raleigh, North Carolina Dallas, Texas Prepared exclusively for Alison Tyler Download at Boykma.Com Many of the designations used by manufacturers and sellers to distinguish their prod- ucts are claimed as trademarks. Where those designations appear in this book, and The Pragmatic Programmers, LLC was aware of a trademark claim, the designations have been printed in initial capital letters or in all capitals. The Pragmatic Starter Kit, The Pragmatic Programmer, Pragmatic Programming, Pragmatic Bookshelf and the linking g device are trademarks of The Pragmatic Programmers, LLC.
    [Show full text]
  • Economic Factors in the Allocation of IP Addresses
    Economic factors in the allocation of IP addresses Dr. Milton Mueller, Syracuse University School of Information Studies, USA and XS4All Professor, Technische Universiteit Delft, Netherlands. With the assistance of Youngseek Kim, Ph.D. candidate, Syracuse University School of Information Studies 1 SUMMARY This study reviews the economic rationale for IP allocation policies and argues that conservation is still a valid concern for IPv6 due to the large basic unit of IPv6 allocation. According to the study, current RIR policies provide few incentives to reclaim unused or under-utilized resources. The study concludes that it is possible to have a much more liberal policy for the initial stage of IPv6 allocation, provided it is associated with efficient reclamation policies and incentives, which incentives should be economic. After analysis of the IPv6 fee structure charged by the RIRs and brief discussion of the routing scalability issue of IPv6, the paper proposes a Transferable Address Block Lease (TABL) model as a market-oriented allocation mechanism. The TABL model employs two economic techniques: (1) fees related to the size of the IPv6 address blocks and (2) transferability. TABLs would be an additional option, not a replacement for needs-based allocations, and confined to the mid range of IP address blocks (/48 - /32). The paper discusses auctions as a method of making initial allocations and concludes that they would not be advisable. The chief advantage of TABL is that it makes addresses available to anyone who wants them in the quantity they need, thus increases end users’ control over their own network destiny and reduce their switching costs to change providers.
    [Show full text]
  • Direct E-Democracy and Political Party Websites: in the United States and Sweden
    Rochester Institute of Technology RIT Scholar Works Theses 5-1-2015 Direct E-Democracy and Political Party Websites: In the United States and Sweden Kirk M. Winans Follow this and additional works at: https://scholarworks.rit.edu/theses Recommended Citation Winans, Kirk M., "Direct E-Democracy and Political Party Websites: In the United States and Sweden" (2015). Thesis. Rochester Institute of Technology. Accessed from This Thesis is brought to you for free and open access by RIT Scholar Works. It has been accepted for inclusion in Theses by an authorized administrator of RIT Scholar Works. For more information, please contact [email protected]. Running head: E-DEMOCRACY AND POLITICAL PARTY WEBSITES Direct E-Democracy and Political Party Websites: In the United States and Sweden by Kirk M. Winans Thesis Submitted in Partial Fulfillment of the Graduation Requirements for the Degree of Master of Science Science, Technology and Public Policy Department of Public Policy College of Liberal Arts Rochester Institute of Technology May 1, 2015 E-DEMOCRACY AND POLITICAL PARTY WEBSITES Direct E-Democracy and Political Party Websites: In the United States and Sweden A thesis submitted to The Public Policy Department at Rochester Institute of Technology By Kirk M. Winans Under the faculty guidance of Franz Foltz, Ph.D. Submitted by: Kirk M. Winans Signature Date Accepted by: Dr. Franz Foltz Thesis Advisor, Graduate Coordinator Signature Date Associate Professor, Dept. of STS/Public Policy Rochester Institute of Technology Dr. Rudy Pugliese Committee Member Signature Date Professor, School of Communication Rochester Institute of Technology Dr. Ryan Garcia Committee Member Signature Date Assistant Professor, Dept.
    [Show full text]
  • Regulatory Consultation: a MENA-OECD Practitioners' Guide
    Regulatory Consultation A MENA-OECD PRACTITIONERS’ GUIDE FOR ENGAGING STAKEHOLDERS IN THE RULE-MAKING PROCESS Regulatory Consultation.indd 1 09-Nov-2012 5:45:09 PM ACKNOWLEDGEMENTS Acknowledgements. This guide is based on the work of the regional initiative of the MENA-OECD Governance Programme and the 2011 OECD publication: “Regulatory Consultation in the Palestinian Authority” which has been prepared in cooperation with the Palestinian Authority within the framework of the MENA-OECD Initiative. In addition, this guide refers to the upcoming OECD progress report on the implementation of regulatory reform in MENA countries and summarises the outcomes of the policy dialogue organised by the MENA-OECD Working Group IV on Regulatory Reform. The OECD Secretariat owes special thanks to the Palestinian Authority in completing the above-mentioned 2011 OECD publication: Minister Ali Jarbawi; Deputy Minister of Justice, Khalil Karaja Al-Rifai; Mousa Abu Zeid, President of General Personnel Council; Head of the Secretariat of the Council of Ministers, Naim Abu Al Hommos; Acting Head of the Diwan al-Fatwa wa’ Tashri’, Ali Abu Diak; he Legal Adviser of the President, Office of the President, Hasan Al-Ori and the Special Advisor to the Minister and Head of Aid Management and Coordination Directorate of the Ministry of Planning and Administrative Development, Mr. Estephan Salameh. The OECD is grateful to the delegates of the regional working groups of the MENA-OECD Governance Programme for their active engagement in completing the work and discussing the Guide’s key findings: the Working Group IV on Regulatory Reform, chaired by Tunisia and co- chaired by Canada, France and Italy, the Working Group II, chaired by the United Arab Emirates and co-chaired by Italy and South Korea as well as of the MENA-OECD Governance Programme.
    [Show full text]
  • Chapter 7: Protecting the Integrity of the Internet
    7 Protecting the Integrity of the Internet Introduction 7.1 This chapter discusses current and future initiatives for promoting a more secure Internet environment. In particular, it considers the role of the Australian Communications and Media Authority (ACMA), Internet Service Providers (ISPs), and Domain Name Registrars and Resellers in promoting greater resilience within the Australian Internet networks. 7.2 The chapter focuses on six key issues: the effectiveness of the Australian Internet Security Initiative (AISI) to detect and drive the remediation of bots; the role of ISPs in the AISI and the proposed Internet industry e- security code of practice; remediation of infected computers; ACMA‟s capacity to respond to the threat of compromised websites; ACMA‟s spam reporting initiative and the role of ISPs under the Spam Code of Practice; and e-security and the Domain Name Registration System. Australian Internet Security Initiative 7.3 The ACMA is a statutory authority within the Australian Government portfolio of Broadband, Communications and the Digital Economy. The 128 HACKERS, FRAUDSTERS AND BOTNETS: TACKLING THE PROBLEM OF CYBER CRIME ACMA is responsible for regulating broadcasting, the Internet, radio communications and telecommunications.1 7.4 The ACMA developed the AISI in 2005. The AISI identifies computers operating on the Australian Internet that have been infected by malware and are able to be controlled for illegal activities.2 The Committee was told that AISI has been progressively expanded over time and has attracted international interest.3 7.5 As noted previously in this report, 99 per cent of spam is sent from botnets.4 Spam email is one of the primary vectors of malware and the dissemination of scams and phishing attacks on end users.
    [Show full text]
  • Freedom of Information: a Comparative Legal Survey
    JeXo C[dZ[b ^h i]Z AVl J^[_cfehjWdY[e\j^[h_]^jje Egd\gVbbZ9^gZXidgl^i]6GI>8A:&.!<adWVa 8VbeV^\c [dg ;gZZ :megZhh^dc! V aZVY^c\ _d\ehcWj_edehj^[h_]^jjeadem_iWd ^ciZgcVi^dcVa ]jbVc g^\]ih C<D WVhZY ^c _dYh[Wi_d]boYedijWdjh[\hW_d_dj^[ AdcYdc! V edh^i^dc ]Z ]Vh ]ZaY [dg hdbZ iZc nZVgh# >c i]Vi XVeVX^in! ]Z ]Vh ldg`ZY cekj^ie\Z[l[befc[djfhWYj_j_ed[hi" ZmiZch^kZan dc [gZZYdb d[ ZmegZhh^dc VcY g^\]i id ^c[dgbVi^dc ^hhjZh ^c 6h^V! 6[g^XV! Y_l_bieY_[jo"WYWZ[c_Yi"j^[c[Z_WWdZ :jgdeZ! i]Z B^YYaZ :Vhi VcY AVi^c 6bZg^XV! ]el[hdc[dji$M^Wj_ij^_ih_]^j"_i_j gjcc^c\ igV^c^c\ hZb^cVgh! Xg^i^fj^c\ aVlh! iV`^c\XVhZhidWdi]cVi^dcVaVcY^ciZgcVi^dcVa h[WbboWh_]^jWdZ^em^Wl[]el[hdc[dji WdY^Zh! VYk^h^c\ C<Dh VcY \dkZgcbZcih! VcY ZkZc ldg`^c\ l^i] d[ÒX^Vah id egZeVgZ iek]^jje]_l[[\\[Yjje_j5J^[i[Wh[ YgV[ig^\]iid^c[dgbVi^dcaVlh#>cVYY^i^dcid iec[e\j^[gk[ij_edij^_iXeeai[[ai ]^h ldg` l^i] 6GI>8A:&.! ]Z ]Vh egdk^YZY ZmeZgi^hZ dc i]ZhZ ^hhjZh id V l^YZ gVc\Z jeWZZh[ii"fhel_Z_d]WdWYY[ii_Xb[ d[ VXidgh ^cXajY^c\ i]Z LdgaY 7Vc`! kVg^djh JCVcYdi]Zg^ciZg\dkZgcbZciVaWdY^Zh!VcY WYYekdje\j^[bWmWdZfhWYj_Y[h[]WhZ_d] cjbZgdjh C<Dh# Eg^dg id _d^c^c\ 6GI>8A: \h[[Zece\_d\ehcWj_ed"WdZWdWdWboi_i &.!IdWnBZcYZaldg`ZY^c]jbVcg^\]ihVcY ^ciZgcVi^dcVa YZkZadebZci! ^cXajY^c\ Vh V e\m^Wj_imeha_d]WdZm^o$ hZc^dg ]jbVc g^\]ih XdchjaiVci l^i] Dm[Vb 8VcVYVVcYVhV]jbVcg^\]iheda^XnVcVanhi 68dbeVgVi^kZAZ\VaHjgkZn Vi i]Z 8VcVY^Vc >ciZgcVi^dcVa 9ZkZadebZci ;gZZYdbd[>c[dgbVi^dc/ 6\ZcXn8>96# ÆJ^[\h[[Ôeme\_d\ehcWj_edWdZ_Z[Wi IdWn BZcYZa ]Vh ejWa^h]ZY l^YZan! b_[iWjj^[^[Whje\j^[l[hodej_ede\ 6 8dbeVgVi^kZ AZ\Va HjgkZn Xdcig^Wji^c\ id cjbZgdjh 6GI>8A: &.
    [Show full text]
  • The Future of Internet Governance: Should the United States Relinquish Its Authority Over ICANN?
    The Future of Internet Governance: Should the United States Relinquish Its Authority over ICANN? Lennard G. Kruger Specialist in Science and Technology Policy September 1, 2016 Congressional Research Service 7-5700 www.crs.gov R44022 The Future of Internet Governance: Should the U.S. Relinquish Its Authority over ICANN Summary Currently, the U.S. government retains limited authority over the Internet’s domain name system, primarily through the Internet Assigned Numbers Authority (IANA) functions contract between the National Telecommunications and Information Administration (NTIA) and the Internet Corporation for Assigned Names and Numbers (ICANN). By virtue of the IANA functions contract, the NTIA exerts a legacy authority and stewardship over ICANN, and arguably has more influence over ICANN and the domain name system (DNS) than other national governments. Currently the IANA functions contract with NTIA expires on September 30, 2016. However, NTIA has the flexibility to extend the contract for any period through September 2019. On March 14, 2014, NTIA announced the intention to transition its stewardship role and procedural authority over key Internet domain name functions to the global Internet multistakeholder community. To accomplish this transition, NTIA asked ICANN to convene interested global Internet stakeholders to develop a transition proposal. NTIA stated that it would not accept any transition proposal that would replace the NTIA role with a government-led or an intergovernmental organization solution. For two years, Internet stakeholders were engaged in a process to develop a transition proposal that will meet NTIA’s criteria. On March 10, 2016, the ICANN Board formally accepted the multistakeholder community’s transition plan and transmitted that plan to NTIA for approval.
    [Show full text]
  • The Regional Internet Registry System Leslie Nobile
    “How It Works” The Regional Internet Registry System Leslie Nobile v Overview • The Regional Internet Registry System • Internet Number Resource Primer: IPv4, IPv6 and ASNs • Significant happenings at the RIR • IPv4 Depletion and IPv6 Transition • IPv4 transfer market • Increase in fraudulent activity • RIR Tools, technologies, etc. 2 The Regional Internet Registry System 3 Brief History Internet Number Resource Administration • 1980s to 1990s • Administration of names, numbers, and protocols contracted by US DoD to ISI/Jon Postel (eventually called IANA) • Registration/support of this function contracted to SRI International and then to Network Solutions • Regionalization begins - Regional Internet Registry system Jon Postel forms • IP number resource administration split off from domain name administration • US Govt separates administration of commercial Internet (InterNIC) from the military Internet (DDN NIC) 4 What is an RIR? A Regional Internet Registry (RIR) manages the allocation and registration of Internet number resources in a particular region of the world and maintains a unique registry of all IP numbers issued. *Number resources include IP addresses (IPv4 and IPv6) and autonomous system (AS) numbers 5 Who Are the RIRs? 6 Core Functions of an RIR Manage, distribute -Maintain directory -Support Internet and register Internet services including infrastructure through Number Resources Whois and routing technical coordination (IPv4 & IPv6 registries addresses and Autonomous System -Facilitate community numbers (ASNs) -Provide
    [Show full text]
  • Challenging Conventional Wisdom: Development Implications of Trade in Services Liberalization
    UNITED NATIONS CONFERENCE ON TRADE AND DEVELOPMENT TRADE, POVERTY AND CROSS-CUTTING DEVELOPMENT ISSUES STUDY SERIES NO. 2 Challenging Conventional Wisdom: Development Implications of Trade in Services Liberalization Luis Abugattas Majluf and Simonetta Zarrilli Division on International Trade in Goods and Services, and Commodities UNCTAD UNITED NATIONS New York and Geneva, 2007 NOTE Luis Abugattas Majluf and Simonetta Zarrilli are staff members of the Division on International Trade in Goods and Services, and Commodities of the UNCTAD secretariat. Part of this study draws on policy-relevant research undertaken at UNCTAD on the assessment of trade in services liberalization and its development implications. The views expressed in this study are those of the authors and do not necessarily reflect the views of the United Nations. The designations employed and the presentation of the material do not imply the expression of any opinion whatsoever on the part of the United Nations Secretariat concerning the legal status of any country, territory, city or area, or of its authorities, or concerning the delimitation of its frontiers or boundaries. Material in this publication may be freely quoted or reprinted, but acknowledgement is requested, together with a reference to the document number. It would be appreciated if a copy of the publication containing the quotation or reprint were sent to the UNCTAD secretariat: Chief Trade Analysis Branch Division on International Trade in Goods and Services, and Commodities United Nations Conference on Trade and Development Palais des Nations CH-1211 Geneva Series Editor: Khalilur Rahman Chief, Trade Analysis Branch DITC/UNCTAD UNCTAD/DITC/TAB/POV/2006/1 UNITED NATIONS PUBLICATION ISSN 1815-7742 © Copyright United Nations 2007 All rights reserved ii ABSTRACT The implications of trade in services liberalization on poverty alleviation, on welfare and on the overall development prospects of developing countries remain at the hearth of the debate on the interlinkages between trade and development.
    [Show full text]