This is the old version of the H2O platform and is now read-only. This means you can view content but cannot create content. You can access the new platform at https://opencasebook.org. Thank you.
Purpose: To provide the reader an understanding of the theory behind Internet governance and the multi-stakeholder nature of the Internet. It will also outlines a number of globally relevant bodies and treaties, including ICANN, IETF, ITU, SCO, and the COE Convention on Cybercrime.
EDIT PLAYLIST INFORMATIONDELETE PLAYLIST
Edit playlist item notes below to have a mix of public & private notes, or:
Presents an overarching framework for Internet governance and discusses the difficulties that arise with coordinating regulation across the globe in a rapidly changing cyber-environment.
This article takes a broad view of Internet governance, presenting three central ideas regarding Internet governance and five different models to Internet governance.
This article examines the technological decisions enabling the Internet’s success and vulnerabilities, then outlines an agenda that the United States can pursue with allies on the international stage
This article examines the institutions responsible for addressing the security of cyberspace and international relations in the cyber-domain. It highlights emerging challenges while evaluating the strengths and weaknesses of the current institutional framework.
This article explains why international cooperation is considered central to the cybersecurity problem and examines three major hurdles to a global cybersecurity treaty. It then considers the feasibility of narrower and softer forms of cooperation.
This piece discusses how the threats to cybersecurity are currently being approached at the private, national, and international level, then demonstrates the potential for increased international cooperation. It also covers how to fashion effective international initiatives and the difficulties in such negotiations.
Provides an understanding of the major bodies and treaties that impact cybersecurity on a global-level, to include ICANN, ITU, SCO, and various international treaties.
Provides an understanding of the major bodies and treaties that impact cybersecurity on a global-level, to include ICANN, ITU, SCO, and various international treaties.
This MOU between the Department of Commerce (DOC) and ICANN sets out that ICANN will provide expertise and advice regarding DNS, such as the allocation of IP number blocks and coordination of the assignment of other technical parameters to maintain internet connectivity.
The paper discusses the overall benefits and negatives of self-regulation, using ICANN as the center of the discussion and comparing it to the IETF and W3C.
The Shanghai Cooperation Organisation (SCO) is a permanent intergovernmental international organization created on 15 June 2001 in Shanghai (China) by the Republic of Kazakhstan, the People’s Republic of China, the Kyrgyz Republic, the Russian Federation, the Republic of Tajikistan and the Republic of Uzbekistan.
The Yekaterinburg Declaration calls for leaders to build a more just world order, to cement international stability and economic development. Regarding cyber security, the SCO member states stress the significance of the issue of ensuring international information security as one of the key elements of the common system of international security.
The Internet Engineering Task Force is a loosely coordinated and self-organized body that contributes to the engineering and evolution of Internet technologies. It is the principal body engaged in the development of new Internet standard specifications.
This document describes the inner workings of IETF meetings and Working Groups, discusses organizations related to the IETF, and introduces the standards process. It is not a formal IETF process document but instead an informational overview.
An agency of the United Nations focused on telecommunication networks and radio frequency allocations. In recent years, a number of UN members have sought to provide the ITU more regulatory power of the Internet, an ongoing, and contentious debate.
This article examines the institutions responsible for addressing the security of cyberspace and international relations in the cyber-domain. It highlights emerging challenges while evaluating the strengths and weaknesses of the current institutional framework.
This article provides a critical reaction to the treaty talks focused on potentially giving the United Nations unprecedented powers over the Internet through the International Telecommunication Union.
This book offers the reader perspectives on the governance of global information and communication networks and uncovers the politics that lie beneath global rules and regulations that may seem at first glance to be mainly technical. It shows how the ITU is beset by new challenges from changing technologies and business models, as well as suggesting reforms.
This Convention was the first international treaty on cybercrime, and deals particularly with copyright, computer fraud, child pornography and network security. Its main objective is to pursue a criminal policy aimed to protect society against cybercrime by adopting appropriate legislation and fostering international cooperation.
The OAS brings together all 35 independent states of the Americas and constitutes a political, juridical, and social governmental forum of the entire Hemisphere. In addition, it has granted permanent observer status to 67 states, as well as to the European Union (EU).
The OAS Cybersecurity Strategy recognizes that protecting networks and information systems is dependent upon: giving operators information to help them secure their networks and respond to incidents; fostering public-private partnerships to increase education of the private sector to secure their infrastructures; stimulating the adoption of standards and practices for information security; and fostering the adoption of cyber-crime policies and legislation to protect users and prevent and deter criminal misuse of computer networks, while respecting users’ privacy. On June 10, 2003, the OAS General Assembly passed Resolution: AG/RES. 1939 (XXXIII-O/03), on the Development of an Inter-American Strategy to Combat Threats to Cybersecurity.
This is the old version of the H2O platform and is now read-only. This means you can view content but cannot create content. If you would like access to the new version of the H2O platform and have not already been contacted by a member of our team, please contact us at h2o@cyber.law.harvard.edu. Thank you.