Who Runs the Internet? the Global Multi-Stakeholder Model of Internet Governance

Total Page:16

File Type:pdf, Size:1020Kb

Who Runs the Internet? the Global Multi-Stakeholder Model of Internet Governance Research Volume Two Two Volume Research Who Runs the Internet? The Global Multi-stakeholder Model of Internet Governance Who Runs the Internet? Research Volume Two Global Commission on Internet Governance Who Runs the Internet? The Global Multi-stakeholder Model of Internet Governance 67 Erb Street West 10 St James’s Square Waterloo, Ontario N2L 6C2, Canada London, England SW1Y 4LE tel +1 519 885 2444 fax +1 519 885 5450 United Kingdom www.cigionline.org tel +44 (0)20 7957 5700 fax +44 (0)20 7957 5710 www.chathamhouse.org Research Volume Two Global Commission on Internet Governance Who Runs the Internet? The Global Multi-stakeholder Model of Internet Governance Published by the Centre for International Governance Innovation and the Royal Institute of International Affairs The copyright in respect of each chapter is noted at the beginning of each chapter. The opinions expressed in this publication are those of the authors and do not necessarily reect the views of the Centre for International Governance Innovation or its Board of Directors. This work was carried out with the aid of a grant from the International Development Research Centre (IDRC), Ottawa, Canada. The views expressed herein do not necessarily represent those of IDRC or its Board of Governors. This work is licensed under a Creative Commons Attribution — Non-commercial — No Derivatives License. To view this licence, visit (www.creativecommons.org/licenses/ by-nc-nd/3.0/). For re-use or distribution, please include this copyright notice. Centre for International Governance Innovation, CIGI and the CIGI globe are registered trademarks. 67 Erb Street West 10 St James’s Square Waterloo, Ontario N2L 6C2 London, England SW1Y 4LE Canada United Kingdom tel +1 519 885 2444 fax +1 519 885 5450 tel +44 (0)20 7957 5700 fax +44 (0)20 7957 5710 www.cigionline.org www.chathamhouse.org TABLE OF CONTENTS About the Global Commission on Internet Governance . iv Preface . v Carl Bildt Introduction . 1 Laura DeNardis Chapter One: The Regime Complex for Managing Global Cyber Activities . 5 Joseph S. Nye, Jr. Chapter Two: Multi-stakeholderism: Anatomy of an Inchoate Global Institution . 19 Mark Raymond and Laura DeNardis Chapter Three: The Emergence of Contention in Global Internet Governance . 45 Samantha Bradshaw, Laura DeNardis, Fen Osler Hampson, Eric Jardine and Mark Raymond Chapter Four: Legal Mechanisms for Governing the Transition of Key Domain Name Functions to the Global Multi-stakeholder Community . 67 Aaron Shull, Paul Twomey and Christopher S. Yoo Chapter Five: ICANN: Bridging the Trust Gap . 79 Emily Taylor Chapter Six: Innovations in Global Governance: Toward a Distributed Internet Governance Ecosystem. 95 Stefaan G. Verhulst, Beth S. Noveck, Jillian Raines and Antony Declercq About CIGI . 118 About Chatham House . 118 CIGI Masthead . 118 ABOUT THE GLOBAL COMMISSION ON INTERNET GOVERNANCE The Global Commission on Internet Governance was established in January 2014 to articulate and advance a strategic vision for the future of Internet governance. The two-year project conducted and supported independent research on Internet-related dimensions of global public policy, culminating in an ofcial commission report — One Internet, published in June 2016 — that articulated concrete policy recommendations for the future of Internet governance. These recommendations address concerns about the stability, interoperability, security and resilience of the Internet ecosystem. Launched by two independent global think tanks, the Centre for International Governance Innovation (CIGI) and Chatham House, the Global Commission on Internet Governance will help educate the wider public on the most effective ways to promote Internet access, while simultaneously championing the principles of freedom of expression and the free ow of ideas over the Internet. The Global Commission on Internet Governance focuses on four key themes: • enhancing governance legitimacy — including regulatory approaches and standards; • stimulating economic innovation and growth — including critical Internet resources, infrastructure and competition policy; • ensuring human rights online — including establishing the principle of technological neutrality for human rights, privacy and free expression; and • avoiding systemic risk — including establishing norms regarding state conduct, cybercrime cooperation and non- proliferation, condence-building measures and disarmament issues. The goal of the Global Commission on Internet Governance is two-fold. First, it will encourage globally inclusive public discussions on the future of Internet governance. Second, through its comprehensive policy-oriented report, and the subsequent promotion of this nal report, the Global Commission on Internet Governance will communicate its ndings with senior stakeholders at key Internet governance events. www.ourinternet.org IV • CENTRE FOR INTERNATIONAL GOVERNANCE INNOVATION • CHATHAM HOUSE PREFACE When I and my colleagues at the Centre for International Governance Innovation and Chatham House envisioned and launched the Global Commission on Internet Governance (GCIG) in 2014, we were determined to approach the work ahead strictly on the strength of evidence-based research. To make this possible, we commissioned nearly 50 research papers, which are now published online. We believe that this body of work represents the largest set of research materials on Internet governance to be currently available from any one source. We also believe that these materials, while they were essential to the GCIG’s discussions over these past months, will also be invaluable to policy development for many years to come. The GCIG was fortunate to have Professor Laura DeNardis as its director of research, who, along with Eric Jardine and Samantha Bradshaw at CIGI, collaborated on identifying and commissioning authors, arranging for peer review and guiding the papers through the publication process. Questions about the governance of the Internet will be with us long into the future. The papers now collected in these volumes aim to be forward looking and to have continuing relevance as the issues they examine evolve. Nothing would please me and my fellow Commissioners more than to receive comments and suggestions from other experts in the eld whose own research has been stimulated by these volumes. The chapters you are about to read were written for non-expert netizens as well as for subject experts. To all of you, the message I bring from all of us involved with the GCIG is simple — be engaged. If we fail to engage with these key governance questions, we risk a future for our Internet that is disturbingly distant from the one we want. Carl Bildt Chair, GCIG November 2016 CARL BILDT • V INTRODUCTION INTRODUCTION Laura DeNardis Copyright © 2016 by Laura DeNardis LAURA DENARDIS • 1 RESEARCH VOLUME TWO: WHO RUNS THE INTERNET? INTRODUCTION “multi-stakeholder model” of Internet governance and makes recommendations about the types of governance Debates about Internet governance have long embodied a innovations necessary to maintain both Internet freedom tension between forces advocating for greater government and Internet stability in the coming years. oversight of the Internet and those advocating for a coordinating structure distributed across many actors — Internet governance can be viewed as a complex ecosystem ranging from international organizations, governments, of tasks carried out by many actors constrained by context- the private sector, civil society and new global institutions specic policies, markets and norms. In the rst chapter such as the Internet Corporation for Assigned Names in this volume, The Regime Complex for Managing Global and Numbers (ICANN). What is the appropriate role of Cyber Activities, Joseph S. Nye Jr. (2014) applies regime governments in running the Internet, on the one hand, versus theory to explain this range of actors, institutions, policies the administrative coordination of cyberspace distributed and norms collectively constituting Internet governance. across the private sector, traditional governments and The emergence of a unitary cyber regime is improbable civil society, on the other? The government-centric because of the different values and norms that exist approach can be thought of as multilateral oversight. The around issues such as cyber security and because of global distributed governance approach — which captures how disputes over cyber power. Rather, Nye considers the Internet governance has evolved historically — is usually structures underlying cyber governance a regime complex, called the multi-stakeholder governance model, although with “a set of loosely coupled norms and institutions that explanations of what multi-stakeholder governance ranks somewhere between an integrated institution that actually is and what is at stake are often incomplete. imposes regulation through hierarchical rules, and highly What is this multi-stakeholder model and who are the fragmented practices and institutions with no identiable 1 stakeholders? How should power be distributed across core and non-existent linkages” (p. 8). Within this regime various coordinating entities, and who decides? Is there complex, governance approaches to issues take various something unique about this framework of governance or forms. For example, international cooperation is more likely are there analogies in other areas of society? in the area of cybercrime, while governance approaches to online expression vary globally by cultural norms and Governance
Recommended publications
  • An Evaluation of Developments of E- Commerce Practices in Kazakhstan in the Framework of Historical Process
    ISSN 0798 1015 HOME Revista ESPACIOS ÍNDICES / Index A LOS AUTORES / To the ! ! AUTORS ! Vol. 40 (Number 22) Year 2019. Page 10 An evaluation of developments of e- commerce practices in Kazakhstan in the framework of historical process Una evaluación de la evolución de las prácticas de comercio electrónico en Kazajstán en el marco del proceso histórico SEN, Bulent 1; YDYRYS, Serikbay 2; MUNASSIPOVA, Malike 3 & KURALBAYEV, Almas 4 Received: 28/02/2019 • Approved: 07/06/2019 • Published 01/07/2019 Contents 1. Introduction 2. Methodology 3. Results 4. Conclusions Bibliographic references ABSTRACT: RESUMEN: The use of internet in Kazakhstan seems to have El uso de internet en Kazajstán parece haber increased considerably, especially between 2008 and aumentado considerablemente, especialmente entre 2011. The increase of 176.4% in 2008 is the highest 2008 y 2011. El aumento del 176,4% en 2008 es el in all years. When the country’s wide land and low más alto de todos los años. Cuando se considera la population ratio is considered, the given situations amplia proporción de tierra y baja población del país, make it an ideal candidate for the internet ordering las situaciones dadas lo convierten en un candidato sector. Products that are developing in the sense of ideal para el sector de pedidos por Internet. Los retail and that are considered suitable for electronic productos que se están desarrollando en el sentido de commerce are respectively as follows: cosmetics, la venta minorista y que se consideran adecuados electronic goods, home textile and leisure products. para el comercio electrónico son, respectivamente, los Keywords: public-private partnerships, public-private siguientes: cosméticos, productos electrónicos, partnership projects, project efficiency, technical and textiles para el hogar y productos de ocio.
    [Show full text]
  • North Korean Cyber Capabilities: in Brief
    North Korean Cyber Capabilities: In Brief Emma Chanlett-Avery Specialist in Asian Affairs Liana W. Rosen Specialist in International Crime and Narcotics John W. Rollins Specialist in Terrorism and National Security Catherine A. Theohary Specialist in National Security Policy, Cyber and Information Operations August 3, 2017 Congressional Research Service 7-5700 www.crs.gov R44912 North Korean Cyber Capabilities: In Brief Overview As North Korea has accelerated its missile and nuclear programs in spite of international sanctions, Congress and the Trump Administration have elevated North Korea to a top U.S. foreign policy priority. Legislation such as the North Korea Sanctions and Policy Enhancement Act of 2016 (P.L. 114-122) and international sanctions imposed by the United Nations Security Council have focused on North Korea’s WMD and ballistic missile programs and human rights abuses. According to some experts, another threat is emerging from North Korea: an ambitious and well-resourced cyber program. North Korea’s cyberattacks have the potential not only to disrupt international commerce, but to direct resources to its clandestine weapons and delivery system programs, potentially enhancing its ability to evade international sanctions. As Congress addresses the multitude of threats emanating from North Korea, it may need to consider responses to the cyber aspect of North Korea’s repertoire. This would likely involve multiple committees, some of which operate in a classified setting. This report will provide a brief summary of what unclassified open-source reporting has revealed about the secretive program, introduce four case studies in which North Korean operators are suspected of having perpetrated malicious operations, and provide an overview of the international finance messaging service that these hackers may be exploiting.
    [Show full text]
  • The Future of Internet Governance: Should the United States Relinquish Its Authority Over ICANN?
    The Future of Internet Governance: Should the United States Relinquish Its Authority over ICANN? Lennard G. Kruger Specialist in Science and Technology Policy September 1, 2016 Congressional Research Service 7-5700 www.crs.gov R44022 The Future of Internet Governance: Should the U.S. Relinquish Its Authority over ICANN Summary Currently, the U.S. government retains limited authority over the Internet’s domain name system, primarily through the Internet Assigned Numbers Authority (IANA) functions contract between the National Telecommunications and Information Administration (NTIA) and the Internet Corporation for Assigned Names and Numbers (ICANN). By virtue of the IANA functions contract, the NTIA exerts a legacy authority and stewardship over ICANN, and arguably has more influence over ICANN and the domain name system (DNS) than other national governments. Currently the IANA functions contract with NTIA expires on September 30, 2016. However, NTIA has the flexibility to extend the contract for any period through September 2019. On March 14, 2014, NTIA announced the intention to transition its stewardship role and procedural authority over key Internet domain name functions to the global Internet multistakeholder community. To accomplish this transition, NTIA asked ICANN to convene interested global Internet stakeholders to develop a transition proposal. NTIA stated that it would not accept any transition proposal that would replace the NTIA role with a government-led or an intergovernmental organization solution. For two years, Internet stakeholders were engaged in a process to develop a transition proposal that will meet NTIA’s criteria. On March 10, 2016, the ICANN Board formally accepted the multistakeholder community’s transition plan and transmitted that plan to NTIA for approval.
    [Show full text]
  • Never Agains IV February 2010
    the Availability Digest www.availabilitydigest.com More Never Agains IV February 2010 It is once again time to reflect on the damage that IT systems can inflict on us mere humans. We have come a long way in ensuring the high availability of our data-processing systems. But as the following stories show, we still have a ways to go. During the last six months, hardware/software and network faults shared responsibility, each causing about one-third of the outages. The rest of the outages were caused by a variety of problems such as power failures, construction mishaps, and hacking. Rackspace Hit with Another Outage Techcrunch, June 20, 2009 – On June 20, Rackspace suffered yet another outage1 due to a power failure. The breaker on the primary utility feed powering one of its nine data centers tripped, causing data center’s generators to start up. However, a field excitation failure escalated to the point that the generators became overloaded. An attempt by Rackspace to fail over to its secondary utility feed failed because the transfer switch malfunctioned. When the data center’s batteries ran out, the data center went down. Failovers do fail. Have a contingency plan no matter the extent of your redundancy. NYSE Suffers Several Outages in Less Than a Month Reuters, July 2, 2009 – On Thursday morning, July 2, brokers on the floor of the New York Stock Exchange found that they could not route orders, causing the NYSE to halt trading in some stocks and to extend the trading day. During the previous month, a software glitch halted trading; and an order-matching problem affected timely order reconciliation.
    [Show full text]
  • Challenging Conventional Wisdom: Development Implications of Trade in Services Liberalization
    UNITED NATIONS CONFERENCE ON TRADE AND DEVELOPMENT TRADE, POVERTY AND CROSS-CUTTING DEVELOPMENT ISSUES STUDY SERIES NO. 2 Challenging Conventional Wisdom: Development Implications of Trade in Services Liberalization Luis Abugattas Majluf and Simonetta Zarrilli Division on International Trade in Goods and Services, and Commodities UNCTAD UNITED NATIONS New York and Geneva, 2007 NOTE Luis Abugattas Majluf and Simonetta Zarrilli are staff members of the Division on International Trade in Goods and Services, and Commodities of the UNCTAD secretariat. Part of this study draws on policy-relevant research undertaken at UNCTAD on the assessment of trade in services liberalization and its development implications. The views expressed in this study are those of the authors and do not necessarily reflect the views of the United Nations. The designations employed and the presentation of the material do not imply the expression of any opinion whatsoever on the part of the United Nations Secretariat concerning the legal status of any country, territory, city or area, or of its authorities, or concerning the delimitation of its frontiers or boundaries. Material in this publication may be freely quoted or reprinted, but acknowledgement is requested, together with a reference to the document number. It would be appreciated if a copy of the publication containing the quotation or reprint were sent to the UNCTAD secretariat: Chief Trade Analysis Branch Division on International Trade in Goods and Services, and Commodities United Nations Conference on Trade and Development Palais des Nations CH-1211 Geneva Series Editor: Khalilur Rahman Chief, Trade Analysis Branch DITC/UNCTAD UNCTAD/DITC/TAB/POV/2006/1 UNITED NATIONS PUBLICATION ISSN 1815-7742 © Copyright United Nations 2007 All rights reserved ii ABSTRACT The implications of trade in services liberalization on poverty alleviation, on welfare and on the overall development prospects of developing countries remain at the hearth of the debate on the interlinkages between trade and development.
    [Show full text]
  • Per Concordiam V7N2 ENG.Pdf
    per VOLUME 7, ISSUE 2, 2016 ConcordiamJournal of European Security and Defense Issues n BALTIC CYBER DEFENSE n BATTLING BOKO HARAM Nations sign important agreement Nigeria’s online war against extremism n CYBER TERRORISM PLUS Categorizing attacks by severity Partnership for Peace n PROTECTING UKRAINE Kazakhstan seeks security Kyiv faces an array of threats Georgia’s approach to cyber INFORMATION SHARING A Cooperative Approach to Cyber Security Table of Contents features ON THE COVER Cyber attacks rarely recognize national borders. So the strategies aimed at preventing, deflecting and responding to these attacks must also be regionally and globally oriented. GETTY IMAGES 24 10 Defining Cyber Terrorism 28 Online Extremism in Nigeria By Ruben Tuitel By Tommy Victor Udoh, Nigerian Defense Space Agency Coming up with a globally acceptable definition The government focuses on countering Boko Haram’s of what constitutes Internet-based terrorism is use of social media to seduce vulnerable recruits. difficult. 34 Kazakhstan Adapts to the 18 Baltic Cyber Cooperation Cyber Age By Vytautas Butrimas, senior advisor, Cybersecurity By Anna Gussarova, Kazakhstan Institute for and IT Department, Ministry of National Defense, Strategic Studies Republic of Lithuania The country’s growing reliance on the digital economy Lithuania, Latvia and Estonia advance regional demands a change in thinking about security. cooperation by aligning their cyber defense policies. 40 Moldova’s Cyber Security Center By Natalia Spinu, Chief, Moldovan Cyber Security Center, 24 A New Cyber Security Curriculum E.S. Center for Special Telecommunications By Sean Costigan and Michael Hennessy The country uses a comprehensive approach to NATO and the Partnership for Peace devise an improve its ability to defend itself against online threats.
    [Show full text]
  • About the Internet Governance Forum
    About the Internet Governance Forum The Internet Governance Forum (IGF) – convened by the United Nations Secretary-General – is the global multistakeholder forum for dialogue on Internet governance issues. BACKGROUND AND CONTEXT 1 The IGF as an outcome of WSIS 2 IGF mandate 2 THE IGF PROCESS 3 IGF annual meetings 3 Intersessional activities 4 National, regional and youth IGF initiatives (NRIs) 5 PARTICIPATION IN IGF ACTIVITIES 6 Online participation 6 COORDINATION OF IGF WORK 7 Multistakeholder Advisory Group 7 IGF Secretariat 7 UN DESA 7 FUNDING 7 IMPACT 8 LOOKING AHEAD: STRENGTHENING THE IGF 8 The IGF in the High-level Panel on Digital Cooperation’s report 8 The IGF in the Secretary-General’s Roadmap for Digital Cooperation 9 9 1 BACKGROUND AND CONTEXT The IGF as an outcome of WSIS Internet governance was one of the most controversial issues during the first phase of the World Summit on the Information Society (WSIS-I), held in Geneva in December 2003. It was recognised that understanding Internet governance was essential in achieving the development goals of the Geneva Plan of Action, but defining the term and understanding the roles and responsibilities of the different stakeholders involved proved to be difficult. The UN Secretary-General set up a Working Group on Internet Governance (WGIG) to explore these issues and prepare a report to feed into the second phase of WSIS (WSIS-II), held in Tunis in November 2005. Many elements contained in the WGIG report – developed through an open process and multistakeholder consultations – were endorsed in the Tunis Agenda for the Information Society (one of the main outcomes of WSIS-II).
    [Show full text]
  • Digital Gerrymandering 24
    00 01 02 03 04 05 06 07 08 09 10 11 12 Policy & Government Digital Gerrymandering Near-future pessimistic scenario Electoral districts have long been shaped and manipulated to the benefit or disadvantage of certain political parties, and as network connectivity becomes a major factor affecting citizens’ quality of life, access to resources, and even the ability to vote, the practice of gerrymandering is translated to the digital realm. Building on the tactics of traditional gerrymandering, some districts are “packed”— incumbent politicians strategically place high-speed internet in a select few districts to consolidate constitu- ents of the opposing party in fewer locales, minimizing their presence in contested districts and thus weakening their ability to sway elections. Other districts, where constituents of the opposing are already concentrated, are “cracked”—incumbent politicians throttle connectivity or undermine the installation and maintenance of network infrastructure in order to disperse their opponents’ vot- ers, diluting their electoral impact. No politician will give up the opportunity to gain an advantage over their rivals, and weaponizing connectivity is a clever (if sinister) way to do just that. Scenarios24 © 2021 Future Today Institute 00 01 02 03 04 05 06 07 08 09 10 11 12 Policy & Government Watch Closely Informs Strategy Act Now 2ND YEAR ON THE LIST Techno-Nationalism KEY INSIGHT EXAMPLES DISRUPTIVE IMPACT EMERGING PLAYERS A great decoupling is underway, as the • U.S. Department of State In the digital age, a China’s new Foreign Investment Law U.S. and Chinese tech sectors are cleaved imposes strict rules for vetting foreign • Committee on Foreign Investment in nation’s technology apart by national governments.
    [Show full text]
  • The IMF and the World Bank in an Evolving World
    3 The IMF and the World Bank in an Evolving World This session fea tured two speakers from major countries who have played ac­ tive and important roles in their countries for many years. The first speaker was Manmohan Singh, the Finance Minister of India and one of the chief archi­ tects of lndia's recent economic reform program. He was followed by C. Fred Bergsten, the founder and Director of the Institute for International Economics and a fo nner Assistant Secretary of the U.S. Tr easury Department. After they addressed the global issues affecting the Bretton Woods institutions from their unique perspectives, the Chairman of the session-lıımberto Dini, Minister of the Tr easury of Italy-offered an overview and synthesis of the suggestions presented. The speakers then responded to a number of questions and com­ ments raised by other participants. Manmohan Singh When I was invited to speak at this conference, I accepted with great pleasure. Fiftieth anniversaries are festive occasions when old friends gather to relive pleasant memories, to rejoice and felicitate. I have been privileged, in various capacities in the Government of India, to dea! with the Bretton Woods institutions for almost half of the 50 years we are commemorating today. I have innumerable pleasant memories and old friends associated with these institutions and it is therefore a partic­ ular pleasure to be part of this celebration. Twoscore and ten years is not a very long time for historians, but it is time enough to reflect on the achievements of institutions and draw new blueprints for the future.
    [Show full text]
  • Data Localization Requirements Across Different Jurisdictions 70
    The Localisation Gambit Unpacking Policy Measures for Sovereign Control of Data in India 19th March, 2019 By ​Arindrajit Basu, Elonnai Hickok, and Aditya Singh Chawla Edited by ​Pranav M Bidare, Vipul Kharbanda, and Amber Sinha Research Assistance ​Anjanaa Aravindan The Centre for Internet and Society, India Acknowledgements 2 Executive Summary 3 Introduction 9 Methodology 10 Defining and Conceptualizing Sovereign Control of Data 11 Mapping of Current Policy Measures for Localization of Data in India 13 The Draft Personal Data Protection Bill, 2018 13 Draft E-commerce Policy (s) 17 RBI Notification on ‘Storage of Payment System Data’ 19 Draft E-Pharmacy Regulations 20 FDI Policy 2017 20 National Telecom M2M Roadmap 21 Unified Access License for Telecom 21 Companies Act, 2013 and Rules 21 The IRDAI (Outsourcing of Activities by Indian Insurers) Regulations, 2017 22 Guidelines on Contractual Terms Related to Cloud Services 22 Reflecting on Objectives, Challenges and Implications of National Control of Data 24 Enabling Innovation and Economic Growth 24 Enhancing National Security and Law Enforcement Access 34 Law Enforcement Access 34 Protecting Against Foreign Surveillance 36 Threat to fibre-optic cables 37 Widening Tax Base 40 Data Sovereignty and India’s Trade Commitments 41 A Survey of Stakeholder Responses 48 Data Localisation Around the World 49 Conclusions and Recommended Approaches 61 Annexure I 70 Mapping Data Localization Requirements Across Different Jurisdictions 70 Annexure 2 75 A survey of stakeholder responses 75 1 Acknowledgements The authors would like to thank Pranav MB, Vipul Kharbanda, Amber Sinha, and Saumyaa Naidu for their invaluable edits and comments on the draft.
    [Show full text]
  • Annex E Aid-For-Trade Case Stories Overview
    ANNEX E AID-FOR-TRADE CASE STORIES OVERVIEW Reference Author Title Sector number 1 International Trade Moroccan businesses boost exports of processed food, Public sector case story Centre seafood and leather goods www.oecd.org/aidfortrade/casestories/casestories-2017/CS%2001-Moroccan-businesses-boost-exports-of-processed- foods-seafood-and-leather-goods%20.pdf 2 Alliance for Affordable Affordability Report 2015/16 Academia and NGOs Internet (A4AI) case story www.oecd.org/aidfortrade/casestories/casestories-2017/CS-02-A4AI-Affordability-Report-2015-16.pdf 3 Alliance for Affordable Affordable internet in Ghana: the status quo and Academia and NGOs Internet (A4AI) the path ahead case story www.oecd.org/aidfortrade/casestories/casestories-2017/CS-03-A4AI-Affordable-Internet-in-Ghana.pdf 4 Alliance for Affordable Affordable Internet in the Dominican Republic Academia and NGOs Internet (A4AI) case story www.oecd.org/aidfortrade/casestories/casestories-2017/CS-04-A4AI-Affordable-Internet-in-the-Dominican-Republic.pdf 5 Alliance for Affordable Delivering affordable internet in Myanmar Academia and NGOs Internet (A4AI) case story http://www.oecd.org/aidfortrade/casestories/casestories-2017/CS%2005-A4AI-Affordable-Internet-in-Myanmar.pdf 6 Alliance for Affordable Nigeria: how Africa's largest economy is prioritising Academia and NGOs Internet (A4AI) affordable internet case story www.oecd.org/aidfortrade/casestories/casestories-2017/CS-06-A4AI-Affordable-Internet-in-Nigeria.pdf 7 Mace Promotions, Ltd. Sustainability and Empowerment Initiative Private
    [Show full text]
  • The Wisdom of the Few a Collaborative Filtering Approach Based on Expert Opinions from the Web
    The Wisdom of the Few A Collaborative Filtering Approach Based on Expert Opinions from the Web Xavier Amatriain Neal Lathia Josep M. Pujol Telefonica Research Dept. of Computer Science Telefonica Research Via Augusta, 177 University College of London Via Augusta, 177 Barcelona 08021, Spain Gower Street Barcelona 08021, Spain [email protected] London WC1E 6BT, UK [email protected] [email protected] Haewoon Kwak Nuria Oliver KAIST Telefonica Research Computer Science Dept. Via Augusta, 177 Kuseong-dong, Yuseong-gu Barcelona 08021, Spain Daejeon 305-701, Korea [email protected] [email protected] ABSTRACT 1. INTRODUCTION Nearest-neighbor collaborative filtering provides a successful Collaborative filtering (CF) is the current mainstream ap- means of generating recommendations for web users. How- proach used to build web-based recommender systems [1]. ever, this approach suffers from several shortcomings, in- CF algorithms assume that in order to recommend items cluding data sparsity and noise, the cold-start problem, and to users, information can be drawn from what other similar scalability. In this work, we present a novel method for rec- users liked in the past. The Nearest Neighbor algorithm, ommending items to users based on expert opinions. Our for instance, does so by finding, for each user, a number of method is a variation of traditional collaborative filtering: similar users whose profiles can then be used to predict rec- rather than applying a nearest neighbor algorithm to the ommendations. However, defining similarity between users user-rating data, predictions are computed using a set of ex- is not an easy task: it is limited by the sparsity and noise in pert neighbors from an independent dataset, whose opinions the data and is computationally expensive.
    [Show full text]