Digital Debates: CyFy Journal Volume 3 (2016)
()
Currently unavailable
Currently unavailable
About this ebook
Debates around internet policy have taken centre stage in domestic politics and international relations alike. While national debates are shaped by local priorities, politics and contextual ambitions, cyber diplomacy differs from traditional diplomacy in two important respects. First, the stakeholders invested in internet policy include not just states and governments but the industry and civil society as well. Second, the norms that define conduct over cyberspace remain diverse, divergent and fluid. Creating a universal set of norms to guide policymaking on digital spaces is further complicated as individual sovereign assessments are significantly implicated by regional and strategic tensions unique to them.
Concurrently, the world is also witnessing two parallel sets of conversations on digital policy. One is largely focused on translating rights from the online world to the offline world. This conversation is premised on a clear understanding of what the rights entail in the offline wold; and the central task that remains is focussed on demarcating the contours of those rights online. The other, related, conversation attempts to negotiate the very nature of, and need for these rights. For instance, the European Union holds data protection in the highest regard, enshrining it within the European Charter of Fundamental Rights. At the same time, India, the largest democracy in the world, is yet to explicitly recognise a right to privacy within its Constitution. The difference in these approaches transcends legal regimes. The social contract in Europe, a product of legal, cultural and political factors, pried access to data away from the regulators and ceded agency over it to the private citizen. This equilibrium is today reflected in EU data protection norms. In India, where norms of social behaviour are evolving concurrently with lawmaking, there is no national consensus on a “right to privacy”, with some constituencies alleging that a “western” model may not be fully appropriate, or would need significant redefinition when applied to the Indian context. In India as in other emerging economies, cyberspace regulation has shouldered the additional burden of delineating and guaranteeing rights that are not necessarily available in offline spaces.
The real challenge therefore lies in creating a public sphere and a digital public sphere that attends to the integrity of both spaces.
Global Policy
Global Policy is an innovative and interdisciplinary journal bringing together world class academics and leading practitioners to analyse both public and private solutions to global problems and issues. It focuses on understanding globally relevant risks and collective action problems; policy challenges that have global impact; and competing and converging discourses about global risks and policy responses. It also includes case studies of policy with clear lessons for other countries and regions; how policy responses, politics and institutions interrelate at the global level; and the conceptual, theoretical and methodological innovations needed to explain and develop policy in these areas.Global Policy will be invaluable to those working in economics, global politics, government, international law, international relations, international political economy, and many other disciplines that contribute to developing global policy. The journal is also designed to inform and engage senior policymakers, private and public corporations, non-governmental organisations, and international bodies. The overall objective is to stimulate deep policy learning, relevant for the academy and for governments and key non-governmental players.Global Policy's Editorial Board comprises a distinguished panel of academics who are supported by an International Advisory Board and a Practitioners' Advisory Board of experts from around the world to ensure the focus remains on pressing and relevant global issues. Global Policy is based at Durham University.
Related to Digital Debates
Related ebooks
Securing the Connected World: Cybersecurity in the Age of Digital Sovereignty Rating: 0 out of 5 stars0 ratingsDigital Technology and Democratic Theory Rating: 0 out of 5 stars0 ratingsDigital Power: State of Power 2023 Rating: 0 out of 5 stars0 ratingsYour Right To Privacy: Minimize Your Digital Footprint Rating: 0 out of 5 stars0 ratingsNetwork Publicy Governance: On Privacy and the Informational Self Rating: 0 out of 5 stars0 ratingsThe Digital Republic: On Freedom and Democracy in the 21st Century Rating: 0 out of 5 stars0 ratingsHow to Remain Anonymous Online: A Users Guide Updated Rating: 0 out of 5 stars0 ratingsThe Uncertain Digital Revolution Rating: 0 out of 5 stars0 ratingsCyber Security Meets National Security: International Perspectives on Digital Era Threats Rating: 0 out of 5 stars0 ratingsThe Digital Agenda Rating: 0 out of 5 stars0 ratingsSurveillance, Transparency, and Democracy: Public Administration in the Information Age Rating: 0 out of 5 stars0 ratingsThe Automation of Society is Next: How to Survive the Digital Revolution Rating: 0 out of 5 stars0 ratingsIf It's Smart, It's Vulnerable Rating: 4 out of 5 stars4/5Privacy 3.0: Unlocking Our Data-Driven Future Rating: 0 out of 5 stars0 ratingsDigital Risk Governance: Security Strategies for the Public and Private Sectors Rating: 0 out of 5 stars0 ratingsCyber Security and Policy: A substantive dialogue Rating: 0 out of 5 stars0 ratingsPracticing Sovereignty: Digital Involvement in Times of Crises Rating: 0 out of 5 stars0 ratingsChokepoints: Global Private Regulation on the Internet Rating: 0 out of 5 stars0 ratingsDisability, Human Rights, and Information Technology Rating: 0 out of 5 stars0 ratingsPrivacy, Security, and Cyberspace, Revised Edition Rating: 0 out of 5 stars0 ratingsAn Ultimate Guide to Launch An SEC Compliant ICO Rating: 0 out of 5 stars0 ratingsSeen Again Rating: 0 out of 5 stars0 ratingsDigital Identity Management Rating: 0 out of 5 stars0 ratingsRegulating Cross-Border Data Flows: Issues, Challenges and Impact Rating: 0 out of 5 stars0 ratingsCybersecurity in China: The Next Wave Rating: 0 out of 5 stars0 ratingsHyperconnectivity: Economical, Social and Environmental Challenges Rating: 0 out of 5 stars0 ratingsTowards Digital Enlightenment: Essays on the Dark and Light Sides of the Digital Revolution Rating: 0 out of 5 stars0 ratingsDigital Footprints Rating: 0 out of 5 stars0 ratings
Security For You
CompTIA Security+ Study Guide: Exam SY0-601 Rating: 5 out of 5 stars5/5Hacking: Ultimate Beginner's Guide for Computer Hacking in 2018 and Beyond: Hacking in 2018, #1 Rating: 4 out of 5 stars4/5How to Be Invisible: Protect Your Home, Your Children, Your Assets, and Your Life Rating: 4 out of 5 stars4/5How to Become Anonymous, Secure and Free Online Rating: 5 out of 5 stars5/5Remote/WebCam Notarization : Basic Understanding Rating: 3 out of 5 stars3/5Tor and the Dark Art of Anonymity Rating: 5 out of 5 stars5/5Make Your Smartphone 007 Smart Rating: 4 out of 5 stars4/5Cybersecurity: The Beginner's Guide: A comprehensive guide to getting started in cybersecurity Rating: 5 out of 5 stars5/5The Hacker Crackdown: Law and Disorder on the Electronic Frontier Rating: 4 out of 5 stars4/5Hacking : The Ultimate Comprehensive Step-By-Step Guide to the Basics of Ethical Hacking Rating: 5 out of 5 stars5/5Wireless Hacking 101 Rating: 4 out of 5 stars4/5Network+ Study Guide & Practice Exams Rating: 4 out of 5 stars4/5Social Engineering: The Science of Human Hacking Rating: 3 out of 5 stars3/5Cybersecurity For Dummies Rating: 4 out of 5 stars4/5Mike Meyers CompTIA Security+ Certification Passport, Sixth Edition (Exam SY0-601) Rating: 5 out of 5 stars5/5The Art of Intrusion: The Real Stories Behind the Exploits of Hackers, Intruders and Deceivers Rating: 4 out of 5 stars4/5CompTIA Network+ Review Guide: Exam N10-008 Rating: 0 out of 5 stars0 ratingsMike Meyers' CompTIA Security+ Certification Guide, Third Edition (Exam SY0-601) Rating: 5 out of 5 stars5/5Ultimate Guide for Being Anonymous: Hacking the Planet, #4 Rating: 5 out of 5 stars5/5CompTIA Network+ Certification Guide (Exam N10-008): Unleash your full potential as a Network Administrator (English Edition) Rating: 0 out of 5 stars0 ratingsPractical Lock Picking: A Physical Penetration Tester's Training Guide Rating: 5 out of 5 stars5/5Hacking For Dummies Rating: 4 out of 5 stars4/5Dark Territory: The Secret History of Cyber War Rating: 4 out of 5 stars4/5The Cyber Attack Survival Manual: Tools for Surviving Everything from Identity Theft to the Digital Apocalypse Rating: 0 out of 5 stars0 ratingsSecurity+ Boot Camp Study Guide Rating: 5 out of 5 stars5/5How to Hack Like a Pornstar Rating: 5 out of 5 stars5/5How to Hack Like a GOD: Master the secrets of hacking through real-life hacking scenarios Rating: 4 out of 5 stars4/5Amazon Web Services (AWS) Interview Questions and Answers Rating: 5 out of 5 stars5/5
Reviews for Digital Debates
0 ratings0 reviews