If we had to choose music to accompany all our activities at APRICOT 2017 it would surely be Chopin’s Minute Waltz (Op 64, No 1)! No, we did not manage to fit 138 bars of music into 60 seconds but the tempo was very lively with frequent crescendos and diminuendos and a lengthy trill. Call it efficiency, but we all managed to share and exchange a lot of information working within the new shortened APRICOT 2017/APNIC 43 programme.
Employing good strategic planning, the ISOC Asia-Pacific Regional Bureau’s activities preceded our arrival into Saigon (the former name for Ho Chi Minh...
Date published 24 March 2017
APRICOT, Asia-Pacific, Domain Name System Security Extensions (DNSSEC), Ho Chi Minh, IPv6, MANRS, Networks & Trust, Open Internet Standards, Vietnam, Wireless For Communities, Other external events
The European Union today faces some serious challenges including growing levels of populism and the threat of foreign intervention through cyber-attacks. Last year’s alleged Russian-led cyberattacks on US Democratic Party servers as well as Chinese government cyber espionage against other governments and companies have provided worrying precedents. Although it is hard to measure the actual impact these attacks had on the election results in the US, concerns are growing amongst European leaders that their electoral procedures are vulnerable to manipulation.
With elections rapidly approaching...
Date published 07 March 2017
That was the question Bruce Schneier and I were asked by Craig Spietzle of the Online Trust Alliance (OTA) during a panel he moderated recently at the RSA conference.
My answer to that question was “an unequivocal yes!” Below is the longer answer. The key lies in accountability.
Old wine in new bags
No matter how you think about the Internet of Things, it is clear that it captures a vision of mind boggling opportunities. Suddenly everything around is being connected. Security cameras, thermostats, fridges, and cars turn into connected computers. The speed of the changes by which the Internet...
Date published 28 February 2017
This week the mobile industry will meet at their annual gathering in Barcelona and I am excited to be there. Mobile has changed my life as it has changed that of the 63% of the world population. For the last two decades, I and billions of people around the world have been able to be reached by others and to reach others almost anytime and anywhere. This was unimaginable just three decades ago.
Mobile has also become the method of choice to access the Internet. In fact, very often it is the only method to access the Internet. Without mobile technology, it would have been impossible to reach...
Date published 27 February 2017
A number of seminal papers appeared towards the end of the 20th century calling for more attention to be paid to the human in the security loop. For example, Anne Adams and Angela Sasse’s “Users are not the Enemy” and Mark Ackerman and Lorrie Cranor’s "Privacy critics: UI components to safeguard users' privacy." The research field of Usable Security was thereby launched, and quickly garnered interest amongst academics and in industry. Almost two decades later this field has achieved independent status with a number of conferences and workshops being dedicated to this research field. USEC is a...
Date published 17 February 2017
We are happy to announce that Applications for Beyond the Net Medium and Large grants are open until Thursday, 23 March 2017.
Beyond the Net seeks to improve the quality of people’s lives in all parts of the world by providing them meaningful access to an open, trusted and global Internet.
Do you have a project that can promote the development of your community, but you don’t have the economic resources to implement it?
Beyond the Net provides funding up to $30,000 USD for one or two years’ projects.
Projects must focus in one or more of the following categories:
Access and Development...
Date published 26 January 2017
Last week was the “Key Issues for Digital Transformation in the G20” event, a joint conference between the OECD and the German government setting the stage for the G20 meeting later this year in Hamburg, Germany. As an international forum gathering the world’s twenty major economies this is as much a political event as a thermometer on the major concerns that will drive international ICT policy in the near future.
Resisting a reflex of fear and isolation
The 2017 G20 on “Shaping an Interconnected world” is taking place in a context where the Internet has an ever growing influence on...
Date published 19 January 2017
With the news of a second, even bigger hack of Yahoo user data, common sense might conclude that consumers would be scurrying to batten down their Internet hatches. But a new study indicates otherwise, concluding that “security fatigue" has made many of us numb to the dangers lurking in cyberspace.
“Users are tired of being overwhelmed by the need to be constantly on alert, tired of all the measures they are asked to adopt to keep themselves safe, and tired of trying to understand the ins and outs of online security,” a team from the U.S. National Institutes of Standards and Technology...
Date published 02 January 2017
The UK’s Information Commissioner, Elizabeth Denham, has been in post just under four months, but already the differences between her approach and those of her two most recent predecessors (Richard Thomas and Christopher Graham) are starting to become clear. This may be due partly to the fact that she comes to the role with six years’ experience as the Information and Privacy Commissioner for British Columbia, whereas Thomas and Graham came, respectively, from legal practice and the BBC.
Recently, Denham posted an update on the first eight weeks of her team’s investigation into personal data...
Date published 30 November 2016
There is an old adage that trust takes years to build, seconds to break, and forever to repair.
When it comes to the Internet and its users, the same holds true. For average Internet users, trust in the Internet has to be built. They have to gain confidence in the safety of their private information online. When a user's private online information is made public, they lose trust in the Internet and its services.
It is critical that the actions taken by governments foster Internet trust and do not put users, or their data, at greater risk. One of the simplest means of achieving this is through...
Date published 29 November 2016