Towards a New Multi-Stakeholderism in Internet Governance



Similar documents
Need to institutionalize and strengthen multi-stakeholder model Establish goals for IG Role for gov t, private sector Self regulatory instead of

Michael Yakushev PIR-Center, Moscow (Russia)

2009 TRIAL HIGHER SCHOOL CERTIFICATE EXAMINATIONS LEGAL STUDIES MARKING GUIDELINES

What Every Non-profit Organization Should Know About Its Use of the Internet and Never Dared to Ask

GOVERNANCE IN "CYBERSPACE' Access and Public Interest in Global Communications

STRATEGIC PRIORITIES

Mr. Craig Mokhiber Chief Development and Economic and Social Issues Branch UN Office of the High Commissioner for Human Rights (OHCHR) April 12, 2013

DECLARATION OF ZARAGOZA ADOPTED BY THE 11 TH CONFERENCE OF PRESIDENTS OF REGIONS WITH LEGISLATIVE POWERS NOVEMBER 2010

Panel 3: Applicability of International Law to Cyberspace & Characterization of Cyber Incidents

Choosing tools for analysis and monitoring

AFRICAN DECLARATION on Internet Rights and Freedoms

EXECUTIVE SUMMARY 30 FINDINGS, 10 IMMEDIATE ACTIONS AND 10 LONG-TERM BUILDING BLOCKS

ACTION. emerging from the IIEP Policy Forum October 2012, Paris ENGAGING YOUTH IN PLANNING EDUCATION FOR SOCIAL TRANSFORMATION

UNESCO S CONTRIBUTIONS TO THE DRAFT OUTCOME STATEMENT OF THE NETMUNDIAL CONFERENCE. Introduction

Mainstreaming Cross-Cutting Outcomes: Gender Equality, Environmental Sustainability, Cultural Respect and Understanding. A Toolkit

General Assembly. United Nations A/69/723

CYBERSECURITY RISK RESEARCH CENTRE (832)

Role of Civil Society Organisations in REDD Projects

TUNIS COMMITMENT. Document WSIS-05/TUNIS/DOC/7 -E 18 November 2005 Original: English

Karl Bruckmeier, Gothenburg University Sweden, Human Ecology Section

APPROVED VERSION. Centro de Estudios Estratégicos de la Defensa Consejo de Defensa Suramericano Unión de Naciones Suramericanas.

High Representative of the Union for Foreign Policy and Security Policy/Vice-President of the European Commission

Cyber Security Ultimately Is Military Security

Vice-President for Budget and Human Resources

Addressing the Social, Economic and Political Dimensions of Inequality

41/128.Declaration on the Right to Development

CHECK AGAINST DELIVERY EMBARGO UNTIL 14 October Gaps and Overlaps Accountability and Public Audit Arrangements in EU, ECA, Brussels

EDRi s. January European Digital Rights Rue Belliard 20, 1040 Brussels tel. +32 (0)

TAP Network Response to the Post-2015 Zero Draft

Accountability Challenges in the Age of Responsive Governance. Professor Martin Painter City University of Hong Kong

(U) Appendix E: Case for Developing an International Cybersecurity Policy Framework

Building a financial ecosystem for social enterprises

Commonwealth Approach to Cybergovernance and Cybersecurity. By the Commonwealth Telecommunications Organisation

DTEK Corporate Social Responsibility (CSR) Policy

Adopted by. the Assembly of the Paris Union for the Protection of Industrial Property. and

Digital Customer Experience

Can peacebuilding practice help build more inclusive societies in Europe?

Forest Law Enforcement Governance and Trade (FLEGT) Voluntary Partnership Agreements (VPAs) or How to do effective consultation for national policies?

PARIS AGENDA OR 12 RECOMMENDATIONS FOR MEDIA EDUCATION

-Amie Kreppel University of Florida. Prepared for presentation at Carleton University, Ottawa Canada, January 11, 2010

The Future of the ENP

A NEW DEAL for engagement in fragile states

Environmental governance

We, in regional sub-national and national legislative Assemblies in Federal States, gathered here in Milan from different Nations and Continents,

Internet Governance Forum Baku 2012

The main object of my research is :

RUSSIA CHINA NEXUS IN CYBER SPACE

Framework. Australia s Aid Program to Papua New Guinea

RECOMMENDATION CONCERNING THE PROMOTION AND USE OF MULTILINGUALISM AND UNIVERSAL ACCESS TO CYBERSPACE

CYBER SECURITY AND CYBER DEFENCE IN THE EUROPEAN UNION OPPORTUNITIES, SYNERGIES AND CHALLENGES

Reviving local public investments. Flexibility is needed in the existing rules of the Stability and Growth Pact. CEMR Position paper December 2015

Co-operatives for Europe: Moving forward together

United Cities and Local Governments, UCLG Policy Paper on Local Finance

Cybersecurity in the Commonwealth: Setting the Stage

Comments on Draft Report: Review of Generic Names Supporting Organization (GNSO)

GLOBAL BUSINESS DIALOGUE ON ELECTRONIC COMMERCE CYBER SECURITY AND CYBER CRIME SEPTEMBER 26, CEO EDS Corporation

General Assembly. United Nations A/66/359

Name: Joyce Zheng. Organization: Alibaba Cloud Computing Ltd. Submission ID: 159

GOVERNANCE AND CIVIL SOCIETY

2. SECURITY OF COMMUNICATION AND INFORMATION SYSTEMS IN THE GLOBALIZATION PROCESS

LESSONS FROM THE FINANCIAL CRISIS FOR RISK MANAGEMENT

Chapter 4 BELGIUM. In Belgium, three sets of rules can apply to the recognition and enforcement of foreign insolvency proceedings.

COMMUNICATION FROM THE COMMISSION TO THE COUNCIL, THE EUROPEAN PARLIAMENT AND THE EUROPEAN ECONOMIC AND SOCIAL COMMITTEE

] RIN 0660 XA23:

TOPICS FOR DISSERTATIONS

Terms of Reference for Assessment of the Environment & Natural Resources Sector in Kenya

Cyber Security Strategy for Germany

Public Affairs Standard. Representation of Interests in Public Affairs

Summary of replies to the public consultation on crossborder inheritance tax obstacles within the EU and possible solutions

16207/14 AD/cs 1 DGG 2B

TAP Network Response to the Post-2015 Z ero Draft

S. ll IN THE SENATE OF THE UNITED STATES

member of from diagnosis to cure Eucomed Six Key Principles for the Efficient and Sustainable Funding & Reimbursement of Medical Devices

United Nations General Assembly s Overall Review of the Implementation of WSIS Outcomes

NATIONAL STANDARDS FOR FINANCIAL MANAGERS

Piloting Process Child Participation Assessment Tool

THE HON JULIA GILLARD MP DEPUTY PRIME MINISTER Minister for Education Minister for Employment and Workplace Relations Minister for Social Inclusion

DSCI Inputs on TRAI Consultation on Regulatory Framework for OTT services

Policy on Migration and Diasporas in Georgia

Acceptable Use of Information Technology (IT) Resources

Learning from Local Success. Stories in Service Delivery in the. Middle East and North Africa. Hana Brixi, Ellen Lust, and Michael Woolcock

Professional Capability Framework Social Work Level Capabilities:

BIG DATA AND CYBERSECURITY:

Get in on the Act. The Care Act Corporate

TENNESSEE DEPARTMENT OF SAFETY AND HOMELAND SECURITY TENNESSEE OFFICE OF HOMELAND SECURITY

Collaborative Enterprise Understanding

Project Quality Planning

- CHECK AGAINST DELIVERY -

Budgeting. including the timing and the availability of income (such as additional grant funds) Providing a basis for accountability and transparency.

RESOLUTION 102 (REV. BUSAN, 2014)

Support to the State Chancellery in decentralization/local public policy formulation and implementation

(DRAFT)( 2 ) MOTION FOR A RESOLUTION

Striving for Good Governance in Africa

Democratic budgeting processes and new aid mechanisms

CYBERSECURITY RISK RESEARCH CENTER (832)

Corporate Social Responsibility (CSR) for Social Development in Arab States

MINISTERIAL MEETING OF THE BLUE WEEK 2015

* * * Initial Provisions for. CHAPTER [ ] - Regulatory Cooperation

How Effective are International Approaches for Global Cyber Security?

2013 Africa Union Framework for Cyber security in Africa

Transcription:

Towards a New Multi-Stakeholderism in Internet Governance Abstract Area: SET OF INTERNET GOVERNANCE PRINCIPLES Entitled by: Klaus Stoll Region: Europe Organization: Global Knowledge Partnership Foundation, NPOC Sector: Civil Society Keywords: multi-stakeholderism, sovereignty, implementation, Internet Governance The Internet Ecosystem is subject to constant development and change. Consequently, the needs and demands on Internet Governance, (IG), are changing. The following paper describe how over time different understandings of sovereignty have emerged in Cyber space. The resulting differences and gaps in exercising sovereignty represent the fundamental challenge on IG today. The paper continues to describe how to bridge the gaps through Knowledge Exchange and Awareness Building and the resulting need for a new understanding and implementation of multi-stakeholderism. Document Internet Governance today The Internet today concerns and affects everybody, everywhere, connected or not! How the Internet is operated and governed is a topic as significant as the environment, human rights and peace. Today s Internet Governance has to struggle with three basic characteristics:

1. Public commons versus private ownership The character of the Internet as a shared human commons is unique. On the one hand it is a shared environment; on the other hand it is based on a physical infrastructure and has limited resources that have owners with their specific investments and interests. 2. Sovereignty versus the geography of cyberspace The Internet Ecosystem, by its very nature, does not care too much about physical boundaries. This is the fundamental reason why countries, whose authority is based on territory and the concept of sovereignty, struggle to find their place in a digital world. The uncontrolled free flow of data, together with the ongoing speed of innovation, seems to be irreconcilable with the concepts of national territory and sovereign rights. 3. New forms of sovereignty and governance Similar to nation states, many of those organizations and individuals involved in the Internet Ecosystem and its governance, commonly known as the stakeholders, claim sole-sovereignty or self-proclaimed sovereignty over specific issues, roles and functions. The stability and security of the DNS, telecommunication standards, security and human rights, to name just some, are well defined subject-territories in the Internet Ecosystem. Cyberspace today requires a new understanding of sovereignty. Sovereignty in the context of Internet Governance is fundamentally different from the traditional

understanding of sovereignty as it is not based on geographical territories and treaties but on the ability of a stakeholder or a group of stakeholders in Cyberspace to have specific expertise and/or infrastructure that is relevant to the Internet Ecosystem and to have the capacity to manage the decision-making and implementation processes in a timely and effective way. Bridging the Sovereignty Gaps: Knowledge and Awareness Building and a New Understanding of Multi- Stakeholderism Nobody should interfere in the specific sovereignty and governance of nation states. Equally it is the sole role, responsibility and privilege of all Internet Ecosystem stakeholders to exercise their sovereignty. These gaps can be bridged and turned into a constructive force when all those exercising sovereignty in Cyberspace recognize that their own legitimacy, development and sustainability is dependent on: 1. the availability of suitable instruments for internal and external awareness-building, knowledge exchange and processing. 2. the establishment of a new understanding of multi-stakeholderism that is based on inter-sovereignty collaboration and joint implementation. The need for Knowledge Exchange and Awareness Building The uncomfortable fact remains true that Cyberspace today resembles a country where 1% of the population governs 99% of the population and 98% of these don t even know that the 1% exist! This represents a real legitimacy problem for all current IG processes and sovereignty claims. Real development and sustainability can only happen if it is based on knowledge that is available to everybody in appropriate forms, and not just to a self-elected elite. Different sovereignties have their own governance structures and there are attempts to create joint governance structures, but they can only be legitimate and successful if they put the awareness building and empowerment of their citizens and that of the citizens in other spheres, at the center of their thinking and doing. All governance structures for Cyberspace should be citizen-centric.

It also has to be recognized, that neither nation states, nor the Internet ecosystem stakeholders, are limitless in their abilities to build Awareness and exchange Knowledge, even if they have a strong desire and need. Their abilities are limited by, and directly proportionate to, the availability and nature of the instruments they have available. Therefore, the immediate goal has to be to create suitable instruments and tools. Another look at the multi-stakeholder model Multi stakeholderism has been the central concept for IG until today. Despite the many problems and frustrations, the stability and security of the DNS throughout the years and the quality of service it provides, are reason enough to described it as a success. The multi-stakeholder model under strain With the crowing impact and complexity of Cyberspace, the sovereignty gaps between stakeholders have become more obvious and are increasingly causing contention. A closer look at these conflicts reveals that the real problem is based in the confrontation of 2 different fundamental sovereignties: a) the sovereignty that is inherit in the decision making processes, and b) the sovereignty that is inherit in the processes of implementation. A multi-stakeholder process that is following the best principles of inclusion, transparency and applied knowledge, will usually come up with good decisions, but these decisions might look rather questionable when seen out of the perspective of implementation. One example that stands for many is security in Cyberspace. Security can and has to be legislated but it also has to be implemented. The best security legislation is useless when it is overridden on the implementation level for whatever reason. In many cases reality shows that those who are legislators distrust those who are implementers, and vice versa. The reason for this distrust is that they both feel that the needs and sovereignty they represent are not been taken into account adequately. As a result, Cyberspace is not only

divided in itself, its existence threatened, by clashing understandings of sovereignties. A new understanding of multi-stakeholderism The only way to overcome the legislation/implementation sovereignty problem, is to create and implement a new understanding of multi-stakeholderism that is based on bringing together the decision making and implementation processes. To bring them together requires: 1. 2. 3. the understanding and respect of the stakeholders of their respective roles, the understanding of their inter dependency the instruments of joint implementation Multi-stakeholderism in IG today needs to express itself in tangible practical forms of working together and joint implementation. It simply makes sense, business sense, development sense, common sense and so on, as it is taking the concept of creating win/win situations seriously. The successful execution of someone elses sovereignty becomes vital for my own interest. The gain that specific IG stakeholders will experience is ultimately the reason why they will accept and participate in joint implementations, as it is in their own interest. New multi-stakeholderim in Internet Governance is a key factor for economic development. The real reformation in IG will come from no longer perceiving sovereignties as competing entities but as implementation partners that are vital to ensure my own specific needs and interests.