SlideShare ist ein Scribd-Unternehmen logo
1 von 13
INTERNET GOVERNANCE


       Alain Nkoyock,
     Tangier, 22 November 2005

                                 1
Internet Governance
• Is analyzed as a problem of coordinating a
  multi-level, adaptive, socio-technical System
  – that is embedded in and has effects on local, national, regional,
    supra-national and global levels
• A broad spectrum of alternative coordination
  mechanisms is available:
  –   Reliance on norms and traditions
  –   Decentralized market decisions
  –   Forms of self- and co-regulation
  –   Forms of government intervention and regulation
• IG: should not to be restricted to the
  management of domain name and possibly
  other technical issues
                                                                        2
4 global Main Issues have to be
                considered
1. Issues related to the network infrastructure upon
   which the Internet rests
2. Technical coordination issues related to the
   Internet as a logical layer protocols, including the
   organization of the numbering and identifier space
3. Issues related to the content of the
   communications, including intellectual property
   issues
4. Issues related to the applications and services
   offered using the Internet, including the
   establishment of legal frameworks for electronic
   commerce.

                                                     3
IG and Specific Policy Issues
1.    Content Issues
2.    Crime and cybersecurity
3.    The Economics of Interconnection for Developing Countries
4.    Privacy and confidentiality of Information
5.    Contracts and e-commerce
6.    IP Telephony (VoIP)
7.    Universal access and service policies
8.    Liberalization of telecoms
9.    Consumer protection
10.   Taxation of goods and services on the Internet
11.   Local content, languages and character sets
12.   Enabling entrepreneurism and the private sector
                                                            4
Alternative approaches to IG
•    Based on those issues, different theories have
     being considered:
    1. Governance of large technical systems
    2. Policy design in dynamic environment
    3. Theory of complex adaptive systems
•    And some alternative approaches to IG have
     being identified:
    1.   Spontaneous self-organization
    2.   Forms of self- and co-regulation
    3.   The theory of distributed governance
    4.   Public interest government intervention
Actually, IG follows the second approach
                                                      5
Internet Technical Management : Actual
         Institutional Arrangements (1/2)
1.   The Internet Engineering Task Force (IETF) is the
     Internet’s standards organization, responsible for the
     development of tested standards upon which the Internet
     rests.
2.   The Internet Society (ISOC) contains the Internet
     Engineering Steering Group (IESG), which sets the
     general agenda for the work of the IETF. In addition, ISOC
     is the entity that provides the legal umbrella for the
     activities of the IETF.
3.   The Internet Architecture Board (IAB), chartered by
     ISOC, provides oversight of aspects of the architecture for
     the protocols and procedures used by the Internet.
4.   The Internet Corporation for Assigned Names and
     Numbers (ICANN) is responsible for technical
     coordination of the Internet address space (IP numbers)
     and the Domain Name System.
                                                              6
Internet Technical Management : Actual
              Institutional Arrangements (2/2)
5.        The Computer Emergency Response Team (CERT) in the U.S. and the growing
          number of national CERTs in other countries have responsibility for monitoring network-
          related threats to the integrity of the Internet and its attached computers.
6.        The Regional Internet Registries (RIRs) are responsible for the allocation of IP
          addresses in their regions of responsibility:
      –       ARIN
      –       RIPE NCC
      –       APNIC
      –       AFRINIC
7.        The Internet Assigned Numbers Authority (IANA) is responsible for various
          administrative functions associated with management of the Internet's domain-name
          system root zone.
8.        The root server operators maintain a synchronized set of distributed common data
          base of the directories for top level domains.
9.        The World Wide Web Consortium (W3C) is responsible for standards pertaining to the
          World Wide Web.
10.       The International Telecommunications Union (ITU) provides comprehensive
          standards at layer 1, (e.g. telephony) for communications technologies that carry Internet
          traffic. The ITU also provides international coordination of the allocation and use of the
          communication frequencies of the electromagnetic spectrum.
11.       The tier 1 ISPs, who provide the Internet’s backbone functions, coordinate their
          activities through formalized network operators’ groups, and have peering arrangements
          between themselves provide connectivity to other ISPs.
12.       VERISIGN?????
                                                                                                7
Organizations engaged in IG and public
                policy
1. At the global level
   •   UNCITRAL (United National Commission on International Trade Law): e-
       commerce and electronic signatures
   •   WTO: basic agreement on telecom, telecom liberalization
   •   OECD: guidelines on privacy, security, cryptography
   •   WIPO: intellectual property
2. At the regional level
   •   APEC: security
   •   EU: telecoms, e-commerce, privacy
   •   Council of Europe: cybercrime, freedom of expression
   •   Regional Trade Agreements (NAFTA, MERCOSUR)
3. Other international organizations, including NGOs
   •   G8: cybercrime and cybersecurity
   •   Human rights bodies
4. At the national level
   •   Government ministries
   •   Specialized organizations – universities and research institutions
   •   Private sector associations
                                                                            8
   •   Not-for-profit organizations
Observations
1. There are a large number of national,
   regional and global institutions and
   organizations whose mandate, at least
   partially, includes their involvement in one or
   more of Internet issues described above.

2. However, if the aim is to properly address
   those issues, it is clear that most of those
   issues go beyond the scope of anyone
   institution or organization
                                                  9
The Debate today is around the 5
           following questions
1. Is there a need to create a variety of new
   organizations?
2. Or are current institutions in some combination
   sufficient for coping with the issues raised by IG?
3. What about developing country needs and
   development processes?
4. Can one global institution alone take care of most of
   the existing issues?
5. Is there and “institutional gap” that needs to be
   filled?
  There is indeed no easy answer to any of these
                                                     10
                          questions.
The African Countries views on IG should be
        based on the 2 main aspects:
• Management and Coordination of Internet names and
  numbers:
   – Afrinic represents the continent under the umbrella of ICANN
   – Specific policies to guarantee that those administrative functions proceed
     expeditiously and on a uniform standard must be under the responsibility of
     ICANN
   – More transparency on Afrinic institutional arrangements
   – Need to enhance the participation of developing countries in ICANN board
   – True internationalization and legal independence of ICANN from any national
     government among others.
• Global Internet Governance issues
   – The existence at the international level of a variety of intergovernemental, non-
     governemental, and voluntary private organizations working on the various Internet
     issues seems to support the thesis that the creation of yet other specilaized entities is
     not required.
   – Cooperation among national governments and these organizations spans all ICT-
     related issues, and it seems evident that the extension of this cooperation should be
                                                                                          11
     the primary direction for addressing the Internet specific issues
The African Countries views on IG should be
        based on the 2 main aspects:
• The question is: How this can be accomplished in an
  open and balanced manner?
   – Developing country governments need to have a focal
     point within the government for overall coordination of
     policy with respect to IG
   – From the point of view of non-governmental stakeholders,
     there is ample room for creating and strengthening new
     and existing national and international networks
   – In Africa, AU and RECs should play a significant role on
     the IG



                                                          12
Policies Implications & Transition
• But, Identifying possible alternative governance
  options alone is insufficient
• Unless a feasible transition path from the status quo
  to an alternative arrangement can be identified, the
  status quo has to be considered superior
• A gradual transformation from the status quo ante is
  probably the most appropriate approach
  – Some issues, such as linguistic diversity, may be easily
    be delegated to decentralized actors
  – Other issues, which have high potential externalities, such
    as security issues, may have to be dealt with in a more
    centralized fashion, albeit with appropriate representation.
                                                            13

Weitere ähnliche Inhalte

Was ist angesagt?

CTO-CybersecurityForum-2010-Jayantha Fernando
CTO-CybersecurityForum-2010-Jayantha FernandoCTO-CybersecurityForum-2010-Jayantha Fernando
CTO-CybersecurityForum-2010-Jayantha Fernandosegughana
 
Policy and Technical Solutions for Online Cross-Border Legal Problems in Asia
Policy and Technical Solutions for Online Cross-Border Legal Problems in AsiaPolicy and Technical Solutions for Online Cross-Border Legal Problems in Asia
Policy and Technical Solutions for Online Cross-Border Legal Problems in AsiaAPNIC
 
Indonesia National Cyber Security Strategy
Indonesia National Cyber Security StrategyIndonesia National Cyber Security Strategy
Indonesia National Cyber Security StrategyICT Watch
 
4 key technological trends that raise ethical issues
4   key technological trends that raise ethical issues4   key technological trends that raise ethical issues
4 key technological trends that raise ethical issuesRownel Cerezo Gagani
 
SPEEDA INSIGHTS_Market Prospects for the Security Industry
SPEEDA INSIGHTS_Market Prospects for the Security IndustrySPEEDA INSIGHTS_Market Prospects for the Security Industry
SPEEDA INSIGHTS_Market Prospects for the Security IndustryKyna Tsai
 
Otieno antony rethinking internet shutdown
Otieno antony   rethinking internet shutdownOtieno antony   rethinking internet shutdown
Otieno antony rethinking internet shutdownOtieno Antony
 
Resume of ID-IGF National Dialogue 2014
Resume of ID-IGF National Dialogue 2014Resume of ID-IGF National Dialogue 2014
Resume of ID-IGF National Dialogue 2014IGF Indonesia
 
Guideline Thailand Cybersecure Strate Digital Economy
Guideline Thailand Cybersecure Strate Digital EconomyGuideline Thailand Cybersecure Strate Digital Economy
Guideline Thailand Cybersecure Strate Digital EconomySettapong_CyberSecurity
 
Indonesia 2014 National ID-IGF Dialogue Resume
Indonesia 2014 National ID-IGF Dialogue ResumeIndonesia 2014 National ID-IGF Dialogue Resume
Indonesia 2014 National ID-IGF Dialogue ResumeID-IGF
 
Cyber security and critical information infrastructure protection from a sout...
Cyber security and critical information infrastructure protection from a sout...Cyber security and critical information infrastructure protection from a sout...
Cyber security and critical information infrastructure protection from a sout...Business Finland
 
Ethical and social issues in information systems
Ethical and social issues in information systemsEthical and social issues in information systems
Ethical and social issues in information systemsProf. Othman Alsalloum
 
Network Security and Privacy in Medium Scale Businesses in Nigeria
Network Security and Privacy in Medium Scale Businesses in NigeriaNetwork Security and Privacy in Medium Scale Businesses in Nigeria
Network Security and Privacy in Medium Scale Businesses in NigeriaINFOGAIN PUBLICATION
 
Consumer International Presentation- Rami Olwan
Consumer International Presentation- Rami OlwanConsumer International Presentation- Rami Olwan
Consumer International Presentation- Rami Olwanguestcd5f64
 

Was ist angesagt? (20)

Session 5.2 Martin Koyabe
Session 5.2 Martin KoyabeSession 5.2 Martin Koyabe
Session 5.2 Martin Koyabe
 
PPIT Lecture 7
PPIT Lecture 7PPIT Lecture 7
PPIT Lecture 7
 
Chapter 4 MIS
Chapter 4 MISChapter 4 MIS
Chapter 4 MIS
 
CTO-CybersecurityForum-2010-Jayantha Fernando
CTO-CybersecurityForum-2010-Jayantha FernandoCTO-CybersecurityForum-2010-Jayantha Fernando
CTO-CybersecurityForum-2010-Jayantha Fernando
 
Policy and Technical Solutions for Online Cross-Border Legal Problems in Asia
Policy and Technical Solutions for Online Cross-Border Legal Problems in AsiaPolicy and Technical Solutions for Online Cross-Border Legal Problems in Asia
Policy and Technical Solutions for Online Cross-Border Legal Problems in Asia
 
04 privacy
04 privacy04 privacy
04 privacy
 
Indonesia National Cyber Security Strategy
Indonesia National Cyber Security StrategyIndonesia National Cyber Security Strategy
Indonesia National Cyber Security Strategy
 
4 key technological trends that raise ethical issues
4   key technological trends that raise ethical issues4   key technological trends that raise ethical issues
4 key technological trends that raise ethical issues
 
SPEEDA INSIGHTS_Market Prospects for the Security Industry
SPEEDA INSIGHTS_Market Prospects for the Security IndustrySPEEDA INSIGHTS_Market Prospects for the Security Industry
SPEEDA INSIGHTS_Market Prospects for the Security Industry
 
Otieno antony rethinking internet shutdown
Otieno antony   rethinking internet shutdownOtieno antony   rethinking internet shutdown
Otieno antony rethinking internet shutdown
 
Chapter 8_dp-pertemuan_12-13
 Chapter 8_dp-pertemuan_12-13 Chapter 8_dp-pertemuan_12-13
Chapter 8_dp-pertemuan_12-13
 
Resume of ID-IGF National Dialogue 2014
Resume of ID-IGF National Dialogue 2014Resume of ID-IGF National Dialogue 2014
Resume of ID-IGF National Dialogue 2014
 
Assignment 1
Assignment 1Assignment 1
Assignment 1
 
Guideline Thailand Cybersecure Strate Digital Economy
Guideline Thailand Cybersecure Strate Digital EconomyGuideline Thailand Cybersecure Strate Digital Economy
Guideline Thailand Cybersecure Strate Digital Economy
 
Indonesia 2014 National ID-IGF Dialogue Resume
Indonesia 2014 National ID-IGF Dialogue ResumeIndonesia 2014 National ID-IGF Dialogue Resume
Indonesia 2014 National ID-IGF Dialogue Resume
 
Cyber security and critical information infrastructure protection from a sout...
Cyber security and critical information infrastructure protection from a sout...Cyber security and critical information infrastructure protection from a sout...
Cyber security and critical information infrastructure protection from a sout...
 
Ethical issues of IS
Ethical issues of ISEthical issues of IS
Ethical issues of IS
 
Ethical and social issues in information systems
Ethical and social issues in information systemsEthical and social issues in information systems
Ethical and social issues in information systems
 
Network Security and Privacy in Medium Scale Businesses in Nigeria
Network Security and Privacy in Medium Scale Businesses in NigeriaNetwork Security and Privacy in Medium Scale Businesses in Nigeria
Network Security and Privacy in Medium Scale Businesses in Nigeria
 
Consumer International Presentation- Rami Olwan
Consumer International Presentation- Rami OlwanConsumer International Presentation- Rami Olwan
Consumer International Presentation- Rami Olwan
 

Andere mochten auch (14)

Business Law Consultancy
Business Law ConsultancyBusiness Law Consultancy
Business Law Consultancy
 
Analise de circuitos jonh o'malley
Analise de circuitos  jonh o'malleyAnalise de circuitos  jonh o'malley
Analise de circuitos jonh o'malley
 
Sofwar educativo 2
Sofwar educativo 2Sofwar educativo 2
Sofwar educativo 2
 
Twitter workshop
Twitter workshopTwitter workshop
Twitter workshop
 
Herbal Treatment
Herbal TreatmentHerbal Treatment
Herbal Treatment
 
Venzo Facebook & Twitter Training
Venzo Facebook & Twitter TrainingVenzo Facebook & Twitter Training
Venzo Facebook & Twitter Training
 
Phd. Thesis : Temporal Recommendation
Phd. Thesis : Temporal RecommendationPhd. Thesis : Temporal Recommendation
Phd. Thesis : Temporal Recommendation
 
TIPS
TIPS TIPS
TIPS
 
Acting instructor and animator eric
Acting instructor and animator ericActing instructor and animator eric
Acting instructor and animator eric
 
Twitter good and Bad
Twitter good and BadTwitter good and Bad
Twitter good and Bad
 
Social media voor vrijwilligers seminar
Social media voor vrijwilligers seminarSocial media voor vrijwilligers seminar
Social media voor vrijwilligers seminar
 
Tue in motion
Tue in motionTue in motion
Tue in motion
 
Back to-school movies for parents
Back to-school movies for parentsBack to-school movies for parents
Back to-school movies for parents
 
Social Media Monitoring met gratis tools #smc073
Social Media Monitoring met gratis tools #smc073Social Media Monitoring met gratis tools #smc073
Social Media Monitoring met gratis tools #smc073
 

Ähnlich wie Internet Governance - African Perspective

WCIT-12 What Happens Next by Susan Crawford
WCIT-12 What Happens Next by Susan CrawfordWCIT-12 What Happens Next by Susan Crawford
WCIT-12 What Happens Next by Susan CrawfordCreative Commons Korea
 
Multistakeholder_Model-Histories-Trends-Recent Developments
Multistakeholder_Model-Histories-Trends-Recent DevelopmentsMultistakeholder_Model-Histories-Trends-Recent Developments
Multistakeholder_Model-Histories-Trends-Recent DevelopmentsEdwin A. Opare
 
WCIT 2014 Robert Kahn - The Evolution of the Internet
WCIT 2014 Robert Kahn - The Evolution of the InternetWCIT 2014 Robert Kahn - The Evolution of the Internet
WCIT 2014 Robert Kahn - The Evolution of the InternetWCIT 2014
 
Sail regulation governance 101018
Sail regulation governance 101018Sail regulation governance 101018
Sail regulation governance 101018SAIL
 
Module 5 ig presentation iran 2
Module 5 ig presentation iran 2Module 5 ig presentation iran 2
Module 5 ig presentation iran 2Habib Noroozi
 
sem_web_slides_k2013.ppt
sem_web_slides_k2013.pptsem_web_slides_k2013.ppt
sem_web_slides_k2013.pptRichaAngel2
 
ISOC-PolicyBrief-Slides-IoT-20161115.pptx
ISOC-PolicyBrief-Slides-IoT-20161115.pptxISOC-PolicyBrief-Slides-IoT-20161115.pptx
ISOC-PolicyBrief-Slides-IoT-20161115.pptxYekoyeTigabuYeko
 
The UN perspective on Digital Public Policy
The UN perspective on Digital Public PolicyThe UN perspective on Digital Public Policy
The UN perspective on Digital Public PolicyGenève Lab
 
IGF MAG Update
IGF MAG UpdateIGF MAG Update
IGF MAG UpdateAPNIC
 
ISOC and GSMA: Shared Futures, Global Opportunities
ISOC and GSMA: Shared Futures, Global OpportunitiesISOC and GSMA: Shared Futures, Global Opportunities
ISOC and GSMA: Shared Futures, Global OpportunitiesInternet Society
 
Some Internet Topics: Horizontals, the IETF, and IPv6
Some Internet Topics: Horizontals, the IETF, and IPv6Some Internet Topics: Horizontals, the IETF, and IPv6
Some Internet Topics: Horizontals, the IETF, and IPv6Internet Society
 
APAN 54: Introducing the IETF
APAN 54: Introducing the IETFAPAN 54: Introducing the IETF
APAN 54: Introducing the IETFAPNIC
 
The Internet: Communities,Collaborations & Concepts
The Internet: Communities,Collaborations & ConceptsThe Internet: Communities,Collaborations & Concepts
The Internet: Communities,Collaborations & ConceptsEdwin A. Opare
 
Internet governance
Internet governanceInternet governance
Internet governancermvvr143
 
Virtual school of Internet Governance
Virtual school of Internet Governance Virtual school of Internet Governance
Virtual school of Internet Governance Glenn McKnight
 
A Triple-Helix Model of Sustainable Government Information Infrastructure: Ca...
A Triple-Helix Model of Sustainable Government Information Infrastructure: Ca...A Triple-Helix Model of Sustainable Government Information Infrastructure: Ca...
A Triple-Helix Model of Sustainable Government Information Infrastructure: Ca...Fathul Wahid
 

Ähnlich wie Internet Governance - African Perspective (20)

Gérald Santucci
Gérald SantucciGérald Santucci
Gérald Santucci
 
eDem&eGov 2013
eDem&eGov 2013eDem&eGov 2013
eDem&eGov 2013
 
WCIT-12 What Happens Next by Susan Crawford
WCIT-12 What Happens Next by Susan CrawfordWCIT-12 What Happens Next by Susan Crawford
WCIT-12 What Happens Next by Susan Crawford
 
Multistakeholder_Model-Histories-Trends-Recent Developments
Multistakeholder_Model-Histories-Trends-Recent DevelopmentsMultistakeholder_Model-Histories-Trends-Recent Developments
Multistakeholder_Model-Histories-Trends-Recent Developments
 
WCIT 2014 Robert Kahn - The Evolution of the Internet
WCIT 2014 Robert Kahn - The Evolution of the InternetWCIT 2014 Robert Kahn - The Evolution of the Internet
WCIT 2014 Robert Kahn - The Evolution of the Internet
 
Sail regulation governance 101018
Sail regulation governance 101018Sail regulation governance 101018
Sail regulation governance 101018
 
Internet ecosystem
Internet ecosystemInternet ecosystem
Internet ecosystem
 
Module 5 ig presentation iran 2
Module 5 ig presentation iran 2Module 5 ig presentation iran 2
Module 5 ig presentation iran 2
 
sem_web_slides_k2013.ppt
sem_web_slides_k2013.pptsem_web_slides_k2013.ppt
sem_web_slides_k2013.ppt
 
ISOC-PolicyBrief-Slides-IoT-20161115.pptx
ISOC-PolicyBrief-Slides-IoT-20161115.pptxISOC-PolicyBrief-Slides-IoT-20161115.pptx
ISOC-PolicyBrief-Slides-IoT-20161115.pptx
 
The UN perspective on Digital Public Policy
The UN perspective on Digital Public PolicyThe UN perspective on Digital Public Policy
The UN perspective on Digital Public Policy
 
IGF MAG Update
IGF MAG UpdateIGF MAG Update
IGF MAG Update
 
ISOC and GSMA: Shared Futures, Global Opportunities
ISOC and GSMA: Shared Futures, Global OpportunitiesISOC and GSMA: Shared Futures, Global Opportunities
ISOC and GSMA: Shared Futures, Global Opportunities
 
Some Internet Topics: Horizontals, the IETF, and IPv6
Some Internet Topics: Horizontals, the IETF, and IPv6Some Internet Topics: Horizontals, the IETF, and IPv6
Some Internet Topics: Horizontals, the IETF, and IPv6
 
интернет
интернетинтернет
интернет
 
APAN 54: Introducing the IETF
APAN 54: Introducing the IETFAPAN 54: Introducing the IETF
APAN 54: Introducing the IETF
 
The Internet: Communities,Collaborations & Concepts
The Internet: Communities,Collaborations & ConceptsThe Internet: Communities,Collaborations & Concepts
The Internet: Communities,Collaborations & Concepts
 
Internet governance
Internet governanceInternet governance
Internet governance
 
Virtual school of Internet Governance
Virtual school of Internet Governance Virtual school of Internet Governance
Virtual school of Internet Governance
 
A Triple-Helix Model of Sustainable Government Information Infrastructure: Ca...
A Triple-Helix Model of Sustainable Government Information Infrastructure: Ca...A Triple-Helix Model of Sustainable Government Information Infrastructure: Ca...
A Triple-Helix Model of Sustainable Government Information Infrastructure: Ca...
 

Mehr von Alain Nkoyock

Disruptive innovation and technology
Disruptive innovation and technologyDisruptive innovation and technology
Disruptive innovation and technologyAlain Nkoyock
 
goPRS Suite - Preventing Public Procurement Corruption - Prevenir la corrupti...
goPRS Suite - Preventing Public Procurement Corruption - Prevenir la corrupti...goPRS Suite - Preventing Public Procurement Corruption - Prevenir la corrupti...
goPRS Suite - Preventing Public Procurement Corruption - Prevenir la corrupti...Alain Nkoyock
 
goPRS Suite of Software
goPRS Suite of SoftwaregoPRS Suite of Software
goPRS Suite of SoftwareAlain Nkoyock
 
goPRS Folder - Public Procurement Review Software
goPRS Folder - Public Procurement Review SoftwaregoPRS Folder - Public Procurement Review Software
goPRS Folder - Public Procurement Review SoftwareAlain Nkoyock
 
Computerized Electoral Systems
Computerized Electoral SystemsComputerized Electoral Systems
Computerized Electoral SystemsAlain Nkoyock
 
Preventing Corruption through Public Procurement - goPRS
Preventing Corruption through Public Procurement - goPRSPreventing Corruption through Public Procurement - goPRS
Preventing Corruption through Public Procurement - goPRSAlain Nkoyock
 
Telecom Infrastructure in Africa
Telecom Infrastructure in AfricaTelecom Infrastructure in Africa
Telecom Infrastructure in AfricaAlain Nkoyock
 
ICT Policies In East Africa Comparative Analysis
ICT Policies In East Africa   Comparative AnalysisICT Policies In East Africa   Comparative Analysis
ICT Policies In East Africa Comparative AnalysisAlain Nkoyock
 
Aisi and Nici-Policy Doc
Aisi and Nici-Policy DocAisi and Nici-Policy Doc
Aisi and Nici-Policy DocAlain Nkoyock
 
Aisi and Nici - Policy Doc2
Aisi and Nici - Policy Doc2Aisi and Nici - Policy Doc2
Aisi and Nici - Policy Doc2Alain Nkoyock
 
Knowledge Management: The SPL Model 1.0
Knowledge  Management: The SPL Model 1.0Knowledge  Management: The SPL Model 1.0
Knowledge Management: The SPL Model 1.0Alain Nkoyock
 

Mehr von Alain Nkoyock (15)

Disruptive innovation and technology
Disruptive innovation and technologyDisruptive innovation and technology
Disruptive innovation and technology
 
goPRS-1
goPRS-1goPRS-1
goPRS-1
 
goPRS Suite - Preventing Public Procurement Corruption - Prevenir la corrupti...
goPRS Suite - Preventing Public Procurement Corruption - Prevenir la corrupti...goPRS Suite - Preventing Public Procurement Corruption - Prevenir la corrupti...
goPRS Suite - Preventing Public Procurement Corruption - Prevenir la corrupti...
 
goPRS Suite of Software
goPRS Suite of SoftwaregoPRS Suite of Software
goPRS Suite of Software
 
goPRS Folder - Public Procurement Review Software
goPRS Folder - Public Procurement Review SoftwaregoPRS Folder - Public Procurement Review Software
goPRS Folder - Public Procurement Review Software
 
Computerized Electoral Systems
Computerized Electoral SystemsComputerized Electoral Systems
Computerized Electoral Systems
 
Preventing Corruption through Public Procurement - goPRS
Preventing Corruption through Public Procurement - goPRSPreventing Corruption through Public Procurement - goPRS
Preventing Corruption through Public Procurement - goPRS
 
WSIS Process
WSIS ProcessWSIS Process
WSIS Process
 
Telecom Infrastructure in Africa
Telecom Infrastructure in AfricaTelecom Infrastructure in Africa
Telecom Infrastructure in Africa
 
ICT4D
ICT4DICT4D
ICT4D
 
ICT Policies In East Africa Comparative Analysis
ICT Policies In East Africa   Comparative AnalysisICT Policies In East Africa   Comparative Analysis
ICT Policies In East Africa Comparative Analysis
 
Floss
FlossFloss
Floss
 
Aisi and Nici-Policy Doc
Aisi and Nici-Policy DocAisi and Nici-Policy Doc
Aisi and Nici-Policy Doc
 
Aisi and Nici - Policy Doc2
Aisi and Nici - Policy Doc2Aisi and Nici - Policy Doc2
Aisi and Nici - Policy Doc2
 
Knowledge Management: The SPL Model 1.0
Knowledge  Management: The SPL Model 1.0Knowledge  Management: The SPL Model 1.0
Knowledge Management: The SPL Model 1.0
 

Kürzlich hochgeladen

A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI AgeCprime
 
QCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architecturesQCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architecturesBernd Ruecker
 
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...itnewsafrica
 
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS:  6 Ways to Automate Your Data IntegrationBridging Between CAD & GIS:  6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integrationmarketing932765
 
Français Patch Tuesday - Avril
Français Patch Tuesday - AvrilFrançais Patch Tuesday - Avril
Français Patch Tuesday - AvrilIvanti
 
JET Technology Labs White Paper for Virtualized Security and Encryption Techn...
JET Technology Labs White Paper for Virtualized Security and Encryption Techn...JET Technology Labs White Paper for Virtualized Security and Encryption Techn...
JET Technology Labs White Paper for Virtualized Security and Encryption Techn...amber724300
 
Microservices, Docker deploy and Microservices source code in C#
Microservices, Docker deploy and Microservices source code in C#Microservices, Docker deploy and Microservices source code in C#
Microservices, Docker deploy and Microservices source code in C#Karmanjay Verma
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsRavi Sanghani
 
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...panagenda
 
Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)Kaya Weers
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesKari Kakkonen
 
Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)
Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)
Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)Mark Simos
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality AssuranceInflectra
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityIES VE
 
Transcript: New from BookNet Canada for 2024: BNC SalesData and LibraryData -...
Transcript: New from BookNet Canada for 2024: BNC SalesData and LibraryData -...Transcript: New from BookNet Canada for 2024: BNC SalesData and LibraryData -...
Transcript: New from BookNet Canada for 2024: BNC SalesData and LibraryData -...BookNet Canada
 
Kuma Meshes Part I - The basics - A tutorial
Kuma Meshes Part I - The basics - A tutorialKuma Meshes Part I - The basics - A tutorial
Kuma Meshes Part I - The basics - A tutorialJoão Esperancinha
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Mark Goldstein
 
All These Sophisticated Attacks, Can We Really Detect Them - PDF
All These Sophisticated Attacks, Can We Really Detect Them - PDFAll These Sophisticated Attacks, Can We Really Detect Them - PDF
All These Sophisticated Attacks, Can We Really Detect Them - PDFMichael Gough
 
Manual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance AuditManual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance AuditSkynet Technologies
 

Kürzlich hochgeladen (20)

A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI Age
 
QCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architecturesQCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architectures
 
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
 
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS:  6 Ways to Automate Your Data IntegrationBridging Between CAD & GIS:  6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integration
 
Français Patch Tuesday - Avril
Français Patch Tuesday - AvrilFrançais Patch Tuesday - Avril
Français Patch Tuesday - Avril
 
JET Technology Labs White Paper for Virtualized Security and Encryption Techn...
JET Technology Labs White Paper for Virtualized Security and Encryption Techn...JET Technology Labs White Paper for Virtualized Security and Encryption Techn...
JET Technology Labs White Paper for Virtualized Security and Encryption Techn...
 
Microservices, Docker deploy and Microservices source code in C#
Microservices, Docker deploy and Microservices source code in C#Microservices, Docker deploy and Microservices source code in C#
Microservices, Docker deploy and Microservices source code in C#
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and Insights
 
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
 
Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examples
 
Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)
Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)
Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a reality
 
Transcript: New from BookNet Canada for 2024: BNC SalesData and LibraryData -...
Transcript: New from BookNet Canada for 2024: BNC SalesData and LibraryData -...Transcript: New from BookNet Canada for 2024: BNC SalesData and LibraryData -...
Transcript: New from BookNet Canada for 2024: BNC SalesData and LibraryData -...
 
Kuma Meshes Part I - The basics - A tutorial
Kuma Meshes Part I - The basics - A tutorialKuma Meshes Part I - The basics - A tutorial
Kuma Meshes Part I - The basics - A tutorial
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
 
All These Sophisticated Attacks, Can We Really Detect Them - PDF
All These Sophisticated Attacks, Can We Really Detect Them - PDFAll These Sophisticated Attacks, Can We Really Detect Them - PDF
All These Sophisticated Attacks, Can We Really Detect Them - PDF
 
Manual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance AuditManual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance Audit
 
How Tech Giants Cut Corners to Harvest Data for A.I.
How Tech Giants Cut Corners to Harvest Data for A.I.How Tech Giants Cut Corners to Harvest Data for A.I.
How Tech Giants Cut Corners to Harvest Data for A.I.
 

Internet Governance - African Perspective

  • 1. INTERNET GOVERNANCE Alain Nkoyock, Tangier, 22 November 2005 1
  • 2. Internet Governance • Is analyzed as a problem of coordinating a multi-level, adaptive, socio-technical System – that is embedded in and has effects on local, national, regional, supra-national and global levels • A broad spectrum of alternative coordination mechanisms is available: – Reliance on norms and traditions – Decentralized market decisions – Forms of self- and co-regulation – Forms of government intervention and regulation • IG: should not to be restricted to the management of domain name and possibly other technical issues 2
  • 3. 4 global Main Issues have to be considered 1. Issues related to the network infrastructure upon which the Internet rests 2. Technical coordination issues related to the Internet as a logical layer protocols, including the organization of the numbering and identifier space 3. Issues related to the content of the communications, including intellectual property issues 4. Issues related to the applications and services offered using the Internet, including the establishment of legal frameworks for electronic commerce. 3
  • 4. IG and Specific Policy Issues 1. Content Issues 2. Crime and cybersecurity 3. The Economics of Interconnection for Developing Countries 4. Privacy and confidentiality of Information 5. Contracts and e-commerce 6. IP Telephony (VoIP) 7. Universal access and service policies 8. Liberalization of telecoms 9. Consumer protection 10. Taxation of goods and services on the Internet 11. Local content, languages and character sets 12. Enabling entrepreneurism and the private sector 4
  • 5. Alternative approaches to IG • Based on those issues, different theories have being considered: 1. Governance of large technical systems 2. Policy design in dynamic environment 3. Theory of complex adaptive systems • And some alternative approaches to IG have being identified: 1. Spontaneous self-organization 2. Forms of self- and co-regulation 3. The theory of distributed governance 4. Public interest government intervention Actually, IG follows the second approach 5
  • 6. Internet Technical Management : Actual Institutional Arrangements (1/2) 1. The Internet Engineering Task Force (IETF) is the Internet’s standards organization, responsible for the development of tested standards upon which the Internet rests. 2. The Internet Society (ISOC) contains the Internet Engineering Steering Group (IESG), which sets the general agenda for the work of the IETF. In addition, ISOC is the entity that provides the legal umbrella for the activities of the IETF. 3. The Internet Architecture Board (IAB), chartered by ISOC, provides oversight of aspects of the architecture for the protocols and procedures used by the Internet. 4. The Internet Corporation for Assigned Names and Numbers (ICANN) is responsible for technical coordination of the Internet address space (IP numbers) and the Domain Name System. 6
  • 7. Internet Technical Management : Actual Institutional Arrangements (2/2) 5. The Computer Emergency Response Team (CERT) in the U.S. and the growing number of national CERTs in other countries have responsibility for monitoring network- related threats to the integrity of the Internet and its attached computers. 6. The Regional Internet Registries (RIRs) are responsible for the allocation of IP addresses in their regions of responsibility: – ARIN – RIPE NCC – APNIC – AFRINIC 7. The Internet Assigned Numbers Authority (IANA) is responsible for various administrative functions associated with management of the Internet's domain-name system root zone. 8. The root server operators maintain a synchronized set of distributed common data base of the directories for top level domains. 9. The World Wide Web Consortium (W3C) is responsible for standards pertaining to the World Wide Web. 10. The International Telecommunications Union (ITU) provides comprehensive standards at layer 1, (e.g. telephony) for communications technologies that carry Internet traffic. The ITU also provides international coordination of the allocation and use of the communication frequencies of the electromagnetic spectrum. 11. The tier 1 ISPs, who provide the Internet’s backbone functions, coordinate their activities through formalized network operators’ groups, and have peering arrangements between themselves provide connectivity to other ISPs. 12. VERISIGN????? 7
  • 8. Organizations engaged in IG and public policy 1. At the global level • UNCITRAL (United National Commission on International Trade Law): e- commerce and electronic signatures • WTO: basic agreement on telecom, telecom liberalization • OECD: guidelines on privacy, security, cryptography • WIPO: intellectual property 2. At the regional level • APEC: security • EU: telecoms, e-commerce, privacy • Council of Europe: cybercrime, freedom of expression • Regional Trade Agreements (NAFTA, MERCOSUR) 3. Other international organizations, including NGOs • G8: cybercrime and cybersecurity • Human rights bodies 4. At the national level • Government ministries • Specialized organizations – universities and research institutions • Private sector associations 8 • Not-for-profit organizations
  • 9. Observations 1. There are a large number of national, regional and global institutions and organizations whose mandate, at least partially, includes their involvement in one or more of Internet issues described above. 2. However, if the aim is to properly address those issues, it is clear that most of those issues go beyond the scope of anyone institution or organization 9
  • 10. The Debate today is around the 5 following questions 1. Is there a need to create a variety of new organizations? 2. Or are current institutions in some combination sufficient for coping with the issues raised by IG? 3. What about developing country needs and development processes? 4. Can one global institution alone take care of most of the existing issues? 5. Is there and “institutional gap” that needs to be filled? There is indeed no easy answer to any of these 10 questions.
  • 11. The African Countries views on IG should be based on the 2 main aspects: • Management and Coordination of Internet names and numbers: – Afrinic represents the continent under the umbrella of ICANN – Specific policies to guarantee that those administrative functions proceed expeditiously and on a uniform standard must be under the responsibility of ICANN – More transparency on Afrinic institutional arrangements – Need to enhance the participation of developing countries in ICANN board – True internationalization and legal independence of ICANN from any national government among others. • Global Internet Governance issues – The existence at the international level of a variety of intergovernemental, non- governemental, and voluntary private organizations working on the various Internet issues seems to support the thesis that the creation of yet other specilaized entities is not required. – Cooperation among national governments and these organizations spans all ICT- related issues, and it seems evident that the extension of this cooperation should be 11 the primary direction for addressing the Internet specific issues
  • 12. The African Countries views on IG should be based on the 2 main aspects: • The question is: How this can be accomplished in an open and balanced manner? – Developing country governments need to have a focal point within the government for overall coordination of policy with respect to IG – From the point of view of non-governmental stakeholders, there is ample room for creating and strengthening new and existing national and international networks – In Africa, AU and RECs should play a significant role on the IG 12
  • 13. Policies Implications & Transition • But, Identifying possible alternative governance options alone is insufficient • Unless a feasible transition path from the status quo to an alternative arrangement can be identified, the status quo has to be considered superior • A gradual transformation from the status quo ante is probably the most appropriate approach – Some issues, such as linguistic diversity, may be easily be delegated to decentralized actors – Other issues, which have high potential externalities, such as security issues, may have to be dealt with in a more centralized fashion, albeit with appropriate representation. 13