https://eurodigwiki.org/mw/index.php?title=Cyber_security_and_cyber_crime&feed=atom&action=historyCyber security and cyber crime - Revision history2024-03-28T20:03:14ZRevision history for this page on the wikiMediaWiki 1.39.6https://eurodigwiki.org/mw/index.php?title=Cyber_security_and_cyber_crime&diff=8883&oldid=prevEurodigwiki-edit at 19:16, 9 March 20172017-03-09T19:16:50Z<p></p>
<table style="background-color: #fff; color: #202122;" data-mw="interface">
<col class="diff-marker" />
<col class="diff-content" />
<col class="diff-marker" />
<col class="diff-content" />
<tr class="diff-title" lang="en">
<td colspan="2" style="background-color: #fff; color: #202122; text-align: center;">← Older revision</td>
<td colspan="2" style="background-color: #fff; color: #202122; text-align: center;">Revision as of 20:16, 9 March 2017</td>
</tr><tr><td colspan="2" class="diff-lineno" id="mw-diff-left-l81">Line 81:</td>
<td colspan="2" class="diff-lineno">Line 81:</td></tr>
<tr><td class="diff-marker"></td><td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><div>| style="border: 1px solid #00000a;" align="LEFT"|<span style="font-family: Calibri; "><br /></span></div></td><td class="diff-marker"></td><td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><div>| style="border: 1px solid #00000a;" align="LEFT"|<span style="font-family: Calibri; "><br /></span></div></td></tr>
<tr><td class="diff-marker"></td><td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><div>|}</div></td><td class="diff-marker"></td><td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><div>|}</div></td></tr>
<tr><td colspan="2" class="diff-side-deleted"></td><td class="diff-marker" data-marker="+"></td><td style="color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;"><div><ins style="font-weight: bold; text-decoration: none;">[[Category:2014]]</ins></div></td></tr>
</table>Eurodigwiki-edithttps://eurodigwiki.org/mw/index.php?title=Cyber_security_and_cyber_crime&diff=564&oldid=prev64.134.177.38 at 13:34, 27 April 20142014-04-27T13:34:36Z<p></p>
<table style="background-color: #fff; color: #202122;" data-mw="interface">
<col class="diff-marker" />
<col class="diff-content" />
<col class="diff-marker" />
<col class="diff-content" />
<tr class="diff-title" lang="en">
<td colspan="2" style="background-color: #fff; color: #202122; text-align: center;">← Older revision</td>
<td colspan="2" style="background-color: #fff; color: #202122; text-align: center;">Revision as of 14:34, 27 April 2014</td>
</tr><tr><td colspan="2" class="diff-lineno" id="mw-diff-left-l15">Line 15:</td>
<td colspan="2" class="diff-lineno">Line 15:</td></tr>
<tr><td class="diff-marker"></td><td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><div>| style="border: 1px solid #00000a;" align="LEFT" |<span style="font-family: Calibri; ">International institutional frameworks related to cybersecurity</span></div></td><td class="diff-marker"></td><td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><div>| style="border: 1px solid #00000a;" align="LEFT" |<span style="font-family: Calibri; ">International institutional frameworks related to cybersecurity</span></div></td></tr>
<tr><td class="diff-marker"></td><td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><div>| style="border: 1px solid #00000a;" align="LEFT"|<span style="font-family: Calibri; ">Are existing frameworks effective to deal with cyber-conflicts? What are strengths/weaknesses of treaties/informal cooperation? How to deal with countries with different cybersecurity/diplomatic ties?</span></div></td><td class="diff-marker"></td><td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><div>| style="border: 1px solid #00000a;" align="LEFT"|<span style="font-family: Calibri; ">Are existing frameworks effective to deal with cyber-conflicts? What are strengths/weaknesses of treaties/informal cooperation? How to deal with countries with different cybersecurity/diplomatic ties?</span></div></td></tr>
<tr><td class="diff-marker" data-marker="−"></td><td style="color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;"><div>| style="border: 1px solid #00000a;" align="LEFT"|<span style="font-family: Calibri; "><del style="font-weight: bold; text-decoration: none;">(speaker self-promotion)</del></span></div></td><td class="diff-marker" data-marker="+"></td><td style="color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;"><div>| style="border: 1px solid #00000a;" align="LEFT"|<span style="font-family: Calibri; "></span></div></td></tr>
<tr><td class="diff-marker"></td><td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><div>|-</div></td><td class="diff-marker"></td><td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><div>|-</div></td></tr>
<tr><td class="diff-marker"></td><td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><div>| style="border: 1px solid #00000a;" align="RIGHT" height="169"|<span style="font-family: Calibri; ">20</span></div></td><td class="diff-marker"></td><td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><div>| style="border: 1px solid #00000a;" align="RIGHT" height="169"|<span style="font-family: Calibri; ">20</span></div></td></tr>
</table>64.134.177.38https://eurodigwiki.org/mw/index.php?title=Cyber_security_and_cyber_crime&diff=254&oldid=prevLorena: Created page with "{| border="0" cellspacing="0"<colgroup width="85"></colgroup> <colgroup width="177"></colgroup> <colgroup width="145"></colgroup> <colgroup width="156"></colgroup> <colgroup w..."2014-02-11T12:40:14Z<p>Created page with "{| border="0" cellspacing="0"<colgroup width="85"></colgroup> <colgroup width="177"></colgroup> <colgroup width="145"></colgroup> <colgroup width="156"></colgroup> <colgroup w..."</p>
<p><b>New page</b></p><div>{| border="0" cellspacing="0"<colgroup width="85"></colgroup> <colgroup width="177"></colgroup> <colgroup width="145"></colgroup> <colgroup width="156"></colgroup> <colgroup width="196"></colgroup> <colgroup width="147"></colgroup> <colgroup width="176"></colgroup><br />
|-<br />
| style="border: 1px solid #00000a;" align="LEFT" height="32"|'''<span style="font-family: Calibri; ">No</span>'''<br />
| style="border: 1px solid #00000a;" align="LEFT"|'''<span style="font-family: Calibri; ">Name</span>'''<br />
| style="border: 1px solid #00000a;" align="LEFT"|'''<span style="font-family: Calibri; ">Affil./Org.</span>'''<br />
| style="border: 1px solid #00000a;" align="LEFT"|'''<span style="font-family: Calibri; ">SH-group</span>'''<br />
| style="border: 1px solid #00000a;" align="LEFT"|'''<span style="font-family: Calibri; ">Topic and sub-issues</span>'''<br />
| style="border: 1px solid #00000a;" align="LEFT"|'''<span style="font-family: Calibri; ">Description</span>'''<br />
| style="border: 1px solid #00000a;" align="LEFT"|'''<span style="font-family: Calibri; ">Remarks</span>'''<br />
|-<br />
| style="border: 1px solid #00000a;" align="RIGHT" height="118"|<span style="font-family: Calibri; ">16</span><br />
| style="border: 1px solid #00000a;" align="LEFT"|<span style="font-family: Calibri; ">Nir Kshetri</span><br />
| style="border: 1px solid #00000a;" align="LEFT"|<span style="font-family: Calibri; ">University of North Carolina —Greensboro, USA</span><br />
| style="border: 1px solid #00000a;" align="CENTER"|<span style="font-family: Calibri; ">Academia</span><br />
| style="border: 1px solid #00000a;" align="LEFT" |<span style="font-family: Calibri; ">International institutional frameworks related to cybersecurity</span><br />
| style="border: 1px solid #00000a;" align="LEFT"|<span style="font-family: Calibri; ">Are existing frameworks effective to deal with cyber-conflicts? What are strengths/weaknesses of treaties/informal cooperation? How to deal with countries with different cybersecurity/diplomatic ties?</span><br />
| style="border: 1px solid #00000a;" align="LEFT"|<span style="font-family: Calibri; ">(speaker self-promotion)</span><br />
|-<br />
| style="border: 1px solid #00000a;" align="RIGHT" height="169"|<span style="font-family: Calibri; ">20</span><br />
| style="border: 1px solid #00000a;" align="LEFT"|<span style="font-family: Calibri; ">Matthias Flittner</span><br />
| style="border: 1px solid #00000a;" align="LEFT"|<span style="font-family: Calibri; ">KIT / research assistant</span><br />
| style="border: 1px solid #00000a;" align="CENTER"|<span style="color: #262626; font-family: Calibri; ">Academia.</span><br />
| style="border: 1px solid #00000a;" align="LEFT" |<span style="font-family: Calibri; ">We need transparent cyber security for humanity</span><br />
| style="border: 1px solid #00000a;" align="LEFT"|<span style="font-family: Calibri; ">What does security mean?<br />Threats in a cyber context?<br />Verification of cyber security.<br />What is about NSA, GHCQ?<br />Transparent provable easy guarantees.<br />New transport / internet technologies.</span><br />
| style="border: 1px solid #00000a;" align="LEFT"|<span style="font-family: Calibri; "><br /></span><br />
|-<br />
| style="border: 1px solid #00000a;" align="RIGHT" height="133"|<span style="font-family: Calibri; ">27</span><br />
| style="border: 1px solid #00000a;" align="LEFT"|<span style="font-family: Calibri; ">Laura-Lee Smith</span><br />
| style="border: 1px solid #00000a;" align="LEFT"|<span style="font-family: Calibri; ">SRH Hochschule Berlin</span><br />
| style="border: 1px solid #00000a;" align="CENTER"|<span style="font-family: Calibri; ">Academia.</span><br />
| style="border: 1px solid #00000a;" align="LEFT" |<span style="font-family: Calibri; ">Human rights</span><br />
| style="border: 1px solid #00000a;" align="LEFT"|<span style="font-family: Calibri; ">Cyberattacks and cybersecurity concerns; data protection; standardization of internet principles and freedoms; governance accountability. This report is for scientific, observation research on the legitimacy of internet governance multi-stakeholder processes in 2014.</span><br />
| style="border: 1px solid #00000a;" align="LEFT"|<span style="font-family: Calibri; "><br /></span><br />
|-<br />
| style="border: 1px solid #00000a;" align="RIGHT" height="261"|<span style="font-family: Calibri; ">28</span><br />
| style="border: 1px solid #00000a;" align="LEFT"|<span style="font-family: Calibri; ">Paul Fehlinger</span><br />
| style="border: 1px solid #00000a;" align="LEFT"|<span style="font-family: Calibri; ">Internet & Jurisdiction project, France</span><br />
| style="border: 1px solid #00000a;" align="CENTER"|<span style="font-family: Calibri; ">Academia</span><br />
| style="border: 1px solid #00000a;" align="LEFT" |<span style="font-family: Calibri; ">.How to maintain the universality and openness of the Internet? Can different legal norms coexist In Cyberspace or will the Internet fragment?</span><br />
| style="border: 1px solid #00000a;" align="LEFT"|<span style="font-family: Calibri; ">In the absence of appropriate frameworks, a trend towards a creeping fragmentation of the Internet is already observed around the world. Uncoordinated and potentially incompatible solutions emerge in different jurisdictions (new “data sovereignty” laws, national clouds, redirections to national ccTLDs, local offices obligations etc.) How to ensure the digital coexistence of heterogeneous laws and values in online spaces is thus becoming a core challenge for international organi-zations, states, platforms, technical operators and users in Europe. How can frameworks be developed to prevent such a fragmentation? What are the merits of different approaches such as harmonization, treaties, guidelines, standards or enhanced multi-stakeholder cooperation that are currently explored?</span><br />
| style="border: 1px solid #00000a;" align="LEFT"|<span style="font-family: Calibri; "><br /></span><br />
|-<br />
| style="border: 1px solid #00000a;" align="RIGHT" height="171"|<span style="font-family: Calibri; ">50</span><br />
| style="border: 1px solid #00000a;" align="LEFT"|<span style="font-family: Calibri; ">Tatiana Tropina </span><br />
| style="border: 1px solid #00000a;" align="LEFT"|<span style="font-family: Calibri; ">Max-Planck Institute for Foreign and International Criminal Law, Germany</span><br />
| style="border: 1px solid #00000a;" align="CENTER"|<span style="font-family: Calibri; ">Academia</span><br />
| style="border: 1px solid #00000a;" align="LEFT" |Internet governance - the end of multi-stakeholder approach? Cybersecurity - the end of multi-stakeholder environment? Where are the borders of multi-stakeholder?<br />
| style="border: 1px solid #00000a;" align="LEFT"|<span style="font-family: Calibri; ">Despite all the efforts to make cybersecurity a multi-stakeholder task, there is still a lack of trust between public and private parties, and the tendency to regulate strictly coming from government side when the issue of cybersecurity comes to the level of critical information infrastructure protection or national security and surveillance. The goal of the session is to discuss where are the borders of multi-stakeholder environment and how to build the trust and capacity (and whether it is possible to build them at all).</span><br />
| style="border: 1px solid #00000a;" align="LEFT"|<span style="font-family: Calibri; "><br /></span><br />
|-<br />
| style="border: 1px solid #00000a;" align="RIGHT" height="251"|<span style="font-family: Calibri; ">56</span><br />
| style="border: 1px solid #00000a;" align="LEFT"|<span style="font-family: Calibri; ">Oliver Sueme</span><br />
| style="border: 1px solid #00000a;" align="LEFT"|<span style="font-family: Calibri; ">EuroISPA</span><br />
| style="border: 1px solid #00000a;" align="CENTER"|<span style="font-family: Calibri; ">Business, Europ. Org.</span><br />
| style="border: 1px solid #00000a;" align="LEFT" |<span style="font-family: Calibri; ">The Rule of Law as a subject of Multi-stakeholderism and Internet Governance -- Role of the Internet Intermediaries in the focus of Law Enforcement and Surveillance.</span><br />
| style="border: 1px solid #00000a;" align="LEFT"|<span style="font-family: Calibri; ">With the spread of Internet use, public sector authorities, secret services and private companies are increasingly attempting to co-opt Internet intermediaries as their enforcement and security agents. The Intermediaries are in the focus of this development. While they are responsible for the security of their services on the one hand, they are more and more in the focus of law enforcement agencies, secret services and private companies on the other hand. Is there a need to redesign the European policy paradigms and bring them back within the boundaries of the rule of law? What is the role of intermediaries? Should the balance between the interests of law enforcement authorities, intermediaries and users of the internet be an aspect of the multi-stakeholder-model?</span><br />
| style="border: 1px solid #00000a;" align="LEFT"|<span style="font-family: Calibri; "><br /></span><br />
|-<br />
| style="border: 1px solid #00000a;" align="RIGHT" height="211"|<span style="font-family: Calibri; ">71</span><br />
| style="border: 1px solid #00000a;" align="LEFT"|<span style="font-family: Calibri; ">Farzaneh Badiei</span><br />
| style="border: 1px solid #00000a;" align="LEFT"|<span style="font-family: Calibri; ">Hamburg University, Germany</span><br />
| style="border: 1px solid #00000a;" align="CENTER"|<span style="font-family: Calibri; ">Academia</span><br />
| style="border: 1px solid #00000a;" align="LEFT" |<span style="font-family: Calibri; ">Setting out the principles of the rule of law for Internet governance -- What are the rule of law principles in Internet governance? What are the mechanisms by which the rule of law can be protected?</span><br />
| style="border: 1px solid #00000a;" align="LEFT"|<span style="font-family: Calibri; ">Article 1 of the Council of Europe’s Internet Governance Principles reaffirms that the Internet governance arrangements should ensure the protection of the rule of law. One critical method for achieving this goal may be the use of online dispute resolution (ODR). ODR provides a protective mechanism for the rule of law, as well as a punitive mechanism in case its principles are breached. This proposal discusses the issues regarding structural aspects of ODR, how ODR can use the multi-stakeholder approach to ensure justice, and how effectively it can ensure that the principles of the rule of law are followed.</span><br />
| style="border: 1px solid #00000a;" align="LEFT"|<span style="font-family: Calibri; "><br /></span><br />
|-<br />
| style="border: 1px solid #00000a;" align="RIGHT" height="44"|<span style="font-family: Calibri; ">75</span><br />
| style="border: 1px solid #00000a;" align="LEFT"|<span style="font-family: Calibri; ">Lee Hibbard</span><br />
| style="border: 1px solid #00000a;" align="LEFT"|<span style="font-family: Calibri; ">Council of Europe</span><br />
| style="border: 1px solid #00000a;" align="CENTER"|<span style="font-family: Calibri; ">Europ. Org.</span><br />
| style="border: 1px solid #00000a;" align="LEFT" |<span style="font-family: Calibri; ">The multi-stakeholder dimensions and added value in the fight against cybercrime</span><br />
| style="border: 1px solid #00000a;" align="LEFT"|<span style="color: #262626; font-family: Calibri; "><br /></span><br />
| style="border: 1px solid #00000a;" align="LEFT"|<span style="font-family: Calibri; "><br /></span><br />
|-<br />
| style="border: 1px solid #00000a;" align="RIGHT" height="171"|<span style="font-family: Calibri; ">88</span><br />
| style="border: 1px solid #00000a;" align="LEFT"|<span style="font-family: Calibri; ">Hans Peter Dittler</span><br />
| style="border: 1px solid #00000a;" align="LEFT"|<span style="font-family: Calibri; ">Internet Society German Chapter</span><br />
| style="border: 1px solid #00000a;" align="CENTER"|<span style="font-family: Calibri; ">Technical community</span><br />
| style="border: 1px solid #00000a;" align="LEFT" |<span style="font-family: Calibri; ">Freedom on the Internet -- Regulation of the Internet, <br />Privacy of data on the Internet. The conflict between regulation and freedom.</span><br />
| style="border: 1px solid #00000a;" align="LEFT"|<span style="font-family: Calibri; ">In order to maintain and develop the Internet as a free and open infrastructure, the following topics should be discussed:<br />- how much regulation is needed to keep the Internet as a resource free and available to everybody?<br />- how much regulation can a free Internet stand before it breaks?<br />- should the standards (like the ones from the IETF) which define the rules of the Internet be changed to ensure privacy?<br />- how much traffic engineering and data inspection is needed to keep the Internet technically working?</span><br />
| style="border: 1px solid #00000a;" align="LEFT"|<span style="font-family: Calibri; "><br /></span><br />
|}</div>Lorena