Digital Safety and Cyber Security Curriculum | IGF 2023 Launch / Award Event #71

Table of contents

Disclaimer: This is not an official record of the IGF session. The DiploAI system automatically generates these resources from the audiovisual recording. Resources are presented in their original format, as provided by the AI (e.g. including any spelling mistakes). The accuracy of these resources cannot be guaranteed. The official record of the session can be found on the IGF's official website.

Knowledge Graph of Debate

Session report

Audience

During a discussion on the ethics of cybersecurity, a student from Nepal studying for a master’s degree raised a question regarding the ethical concentration within the field. The specific focus of inquiry was on issues related to hacking and privacy. The student displayed a neutral sentiment, highlighting the need to consider ethical implications in cybersecurity.

Another individual also expressed concern about the ethical aspect of cybersecurity, displaying a positive sentiment. This person emphasized the importance of addressing the ethical dimension within the industry. Both speakers stressed that cybersecurity professionals should be mindful of the ethical considerations associated with hacking and privacy.

The discussion brought attention to the fact that ethical considerations in cybersecurity, particularly pertaining to hacking and privacy, are becoming increasingly important. It highlighted the need for cybersecurity professionals to operate within a framework that not only protects systems and data but also upholds ethical standards. By addressing these concerns, the industry can ensure that security measures are implemented in a responsible and ethical manner.

Overall, the discussion shed light on the growing recognition of the ethical dimension in cybersecurity and the need to address it within the industry. With cybersecurity playing an increasingly crucial role in our digital society, it is essential to prioritize ethical considerations alongside technical expertise to protect and safeguard individuals’ privacy and security.

Nabeih Abdel-Majid

There is a critical need for cybersecurity education, particularly for children and parents, as a significant percentage of students are using social media and the internet without proper knowledge of potential security risks. Many students believe that social media sites are safe and trustworthy, exposing them to potential dangers. This highlights the importance of educating children and parents about cybersecurity to protect their personal information and online presence.

A proposed curriculum has been developed that covers various aspects of cybersecurity, including social network security skills, file backup, password management, and web browsing skills. The curriculum is designed to be interactive and engaging, using videos and interactive screens to provide a comprehensive learning approach. It is not only targeted at children but also includes modules for educators and parents, emphasizing the need for a community-based approach to increase cybersecurity awareness and action.

Dr. Nabeih has been working on this curriculum for seven years, demonstrating his dedication and expertise in the field. Now, his aim is to share this curriculum with educational institutions to ensure that children and their parents receive proper cybersecurity education. The curriculum has been designed to safeguard children and maintain their self-confidence in the digital world.

Parents play a vital role in implementing this curriculum and protecting their children online. As such, they are encouraged to actively participate in the learning process and be aware of potential digital threats. Nabeih Abdel-Majid’s platform for the curriculum includes a survey for assessing the levels of knowledge and offers courses in multiple languages, catering to a wider audience.

However, there may be some challenges in implementing the curriculum. During the presentation, Nabeih faced trouble connecting to Wi-Fi, which highlights the need for reliable internet access to deliver cybersecurity education effectively. Additionally, structured learning sessions are necessary to ensure that students receive proper guidance and support throughout the learning process.

The curriculum also focuses on preserving privacy and emphasizes the importance of controlling personal data. It teaches students how to safeguard their personal accounts on platforms like WhatsApp and Google to prevent unauthorized access.

Furthermore, the curriculum includes review questions for the purpose of understanding rather than examination. This approach aims to reinforce learning and ensure that students fully comprehend the concepts taught.

A new learning program is being piloted, demonstrating a commitment to continuously improving the curriculum and its educational impact. It places a strong emphasis on cooperation between teachers, students, and program creators. The ultimate goal is to create a secure community where individuals are well-equipped with the necessary cybersecurity knowledge and skills.

The curriculum is targeted at children from grade 5 to grade 11, covering different levels suitable for each grade. Parents are recognized as crucial participants in the educational program and are required to attend group sessions along with their children. This collaborative approach ensures the involvement of parents in protecting their children online.

It is important to note that students can still find ways to circumvent digital restrictions despite cybersecurity measures being in place. Therefore, parents must actively watch their children and offer support and guidance against digital threats.

The project has received accreditation from KHD in Dubai and is seeking recommendations from the IGF to expand its implementation to different communities. This indicates the recognition and confidence in the curriculum’s effectiveness.

Overall, there is a clear need for cybersecurity education for children and parents. The proposed curriculum developed by Dr. Nabeih addresses this need comprehensively. With the involvement of parents and educators, a community-based approach can be adopted to increase cybersecurity awareness and action. Challenges such as reliable internet access and structured learning sessions need to be overcome to effectively implement the curriculum. The goal is to create a secure community, empower children with cybersecurity knowledge, and ensure their safety online.

Hala Adly Hussain

Blockchain technology is highly regarded for its ability to safeguard valuable data and assets from cyber criminals. It operates as a decentralised system that upholds principles of security, privacy, and trust. The architecture of blockchain allows for monitoring of ledgers, enabling the identification of any unusual or malicious activity. Furthermore, the implementation of smart contract security on the blockchain ensures that payment processes become more convenient and secure.

There are two prominent types of blockchain: public and private. Public blockchains, such as Bitcoin, operate on an open network, allowing anyone to participate in transactions. These transactions are validated using public key encryption, ensuring transparency and accountability. On the other hand, private blockchains offer more control, as entry to the network is restricted and heavily reliant on identity control through digital certificates.

In order to successfully implement blockchain technology, education and regulation play vital roles. It is necessary to conduct blockchain implementations while adhering to regulatory requirements. This ensures that the technology is utilised in a manner that aligns with legal and ethical standards. Additionally, it is crucial to educate individuals about the potential vulnerabilities of blockchain. By increasing awareness and knowledge, stakeholders can proactively mitigate risks and strengthen the security of the technology.

Moreover, Hala Adly Hussain demonstrates a keen interest in obtaining approval from the Ministry of Education in Jordan for their project. This highlights the significance of seeking validation and involvement from relevant authorities in the implementation of blockchain solutions within the education sector. By having regulatory bodies endorse projects, the credibility and potential impact of initiatives aiming to enhance the quality of education can be maximised.

In conclusion, blockchain technology possesses inherent capabilities that make it a powerful tool for protecting valuable data and assets from cyber threats. Its decentralised nature, coupled with principles of security, privacy, and trust, enhances the integrity and resilience of digital transactions. The availability of public and private blockchains offers flexibility and control over network participation. Education and regulation are instrumental in successful blockchain implementation, ensuring compliance with legal requirements and mitigating potential vulnerabilities. Collaboration with relevant authorities, such as the Ministry of Education, strengthens the credibility and impact of projects within targeted sectors. The power and potential that blockchain technology holds can be harnessed when combined with a comprehensive understanding of its intricacies and a commitment to ethical practices.

Moderator

During the discussion, the importance of integrating an AI Curriculum in education was highlighted. It was emphasized that teachers, parents, and children should all be educated in this curriculum. This is because AI is becoming increasingly prevalent in various fields, and it is essential for individuals to have a solid understanding of AI concepts and applications.

The AI Curriculum was seen as vital, and it was suggested that everyone should actively participate in it. By doing so, individuals can develop the necessary skills and knowledge to effectively utilize AI and stay updated with technological advancements. Moreover, integrating AI Curriculum in education can help bridge the gap between technological advancements and traditional teaching methods, leading to a better educational experience for students.

In addition to AI, the discussion also explored the integration of Blockchain technology into the cybersecurity curriculum. It was suggested that blockchain technology could enhance cybersecurity by countering the efficiency and effectiveness with which cyber criminals apply AI and machine learning in their cybercrimes. Blockchain, being a decentralized system built on principles of security, privacy, and trust, offers benefits such as real-time data delivery, cost-effectiveness, and strong encryption practices.

The importance of protecting children online while maintaining their self-confidence was also emphasized. The AI Curriculum aimed to equip educators, parents, and children with the necessary knowledge and tools to ensure their safety in the digital world. It was deemed crucial for parents to attend sessions and understand how to monitor their children’s online activities discreetly, thus ensuring their safety without compromising their privacy and trust.

Furthermore, a program to enhance community security was launched as a pilot test. This program aimed to support different communities and promote a secure environment through the collaboration of Dr. Ahmed Noura, Dr. Nermin, and other stakeholders. It was acknowledged that cooperation from all members of the community is essential in achieving a truly secure community.

The session also highlighted the significance of different roles with varying privileges in educational programs. By featuring roles such as students, managers, teachers, and site administrators, users can effectively monitor student progress and ensure a well-rounded educational experience.

The importance of monitoring and taking care of students was stressed. It was acknowledged that even in the digital age, where technological advancements can pose risks, it remains crucial to protect students from harm and extortion.

The session also delved into the aspects of privacy control, stopping hacking, and maintaining cybersecurity. Methods for controlling privacy on platforms such as iCloud and Android were discussed, as well as detecting if someone has hacked into personal devices using the camera or microphone. The importance of deleting files to ensure they are not retrievable by others was also highlighted.

Overall, the session concluded with the expression of hope for the implementation of the AI Curriculum in educational institutions. This implementation could effectively protect children and promote safe internet usage. The discussion underscored the need for continuous education and adaptability in the face of technological advancements. By equipping individuals with the necessary skills and knowledge, society can navigate the digital landscape securely and confidently.

Video

The analysis explores various arguments and topics related to cybersecurity, online learning, and digital security. One argument highlights the alarming possibility of devices being hacked without the user’s knowledge. This emphasises the need for taking necessary preventive measures. It is stated that many programmes have the ability to breach and sneak into your device, allowing them to start monitoring you without your knowledge. This raises concerns about privacy and the security of personal information.

Another argument discusses the alarming capability of hacking programmes to remotely control a device’s camera. This invasion of privacy poses significant risks and underscores the importance of safeguarding digital devices from potential breaches. The analysis further suggests implementing measures to ensure digital security and privacy, such as using internet-safe browsing and adopting strong personal digital security habits. The evidence provided includes the capability of hacking software to greatly affect a device if preventive measures are not taken.

Furthermore, the analysis highlights the importance of cybersecurity awareness, particularly in the education sector. It mentions that a teacher emphasises the significance of cybersecurity awareness in their classes. This observation reflects the growing recognition of the need to educate individuals about cybersecurity risks and the measures they can take to protect themselves.

In addition to cybersecurity, the analysis touches upon other topics as well. It mentions the creation of interactive screens and the use of QR codes for testing purposes. Creating interactive screens can enhance user engagement, while QR codes can provide a convenient and efficient way for testing.

The analysis also addresses online learning and its benefits. It highlights how online learning allows students to repeat sessions as much as needed and have personalised access to lessons from home through unique usernames and passwords. This flexibility enables students to learn at their own pace, which is a significant advantage of online learning.

Furthermore, it is noted that online learning sessions are structured and divided into different sub-sessions. This provides a systematic approach to learning and enables students to navigate through the content more effectively.

Regarding online privacy, the video suggests using the WhatsApp application and opening Google accounts through the browser to preserve user privacy in online learning environments. This highlights the importance of implementing measures to maintain privacy and protect personal information in the digital realm.

In conclusion, the analysis sheds light on several important aspects of cybersecurity, digital security, and online learning. It underscores the need for preventive measures to safeguard against hacking, the importance of cybersecurity awareness, and the benefits of online learning. It also highlights the significance of implementing measures to maintain online privacy and personal digital security. Overall, these insights provide valuable information for individuals and institutions in navigating the digital landscape safely and securely.

Speakers

&

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

&

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

&

’Video

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

Exploring Emerging PE³Ts for Data Governance with Trust | IGF 2023 Open Forum #161

Table of contents

Disclaimer: This is not an official record of the IGF session. The DiploAI system automatically generates these resources from the audiovisual recording. Resources are presented in their original format, as provided by the AI (e.g. including any spelling mistakes). The accuracy of these resources cannot be guaranteed. The official record of the session can be found on the IGF's official website.

Knowledge Graph of Debate

Session report

Udbhav Tiwari

Mozilla Corporation, owned by Mozilla Foundation, is a unique organization in the technology sector. It operates without the typical incentives for profit maximization and prioritizes user welfare and the public interest. While initially having a strong policy against data collection, Mozilla had to make changes due to limitations in product development. They have since explored privacy-preserving ways of collecting information, separating the “who” from the “what” to protect user privacy.

Privacy-preserving technologies have become increasingly feasible with the proliferation of internet availability, bandwidth, and computational power. Privacy has emerged as a key differentiating factor for products, leading to increased investment in privacy-focused solutions.

Mozilla has taken a critical stance on Google’s Chrome Privacy Sandbox set of technologies, acknowledging improvements but asserting the need for technical validation. They are also exploring the use of Privacy-Preserving Technologies (PETs) like Decentralized Ad Delivery (DAP) and Oblivious HTTP (OHTP) for telemetry information collection.

While recognizing the value of advertising to support internet publishers, Mozilla deems the current state of the advertising ecosystem unsustainable. They have introduced features like Firefox’s “Total Cookie Protection” to enhance user privacy while still allowing essential functionality.

Mozilla has raised concerns about Google’s Privacy Sandbox standards potentially becoming the de facto norms, with the potential to impact privacy and competition. They advocate for responsible implementation of PETs to strike a balance between privacy and data collection.

Human involvement in data collection decisions is crucial to consider the risks to user privacy. Mozilla emphasizes the importance of accountability and responsible practices.

In summary, Mozilla Corporation distinguishes itself in the technology sector with its focus on user welfare and the public interest. They actively explore privacy-preserving technologies, criticize Google’s Privacy Sandbox, and advocate for responsible data collection practices. Through their efforts, Mozilla aims to foster a more privacy-protective and user-centered tech industry.

Wojciech Wiewiórowski

The European Data Protection Supervisor (EDPS) plays an essential role in safeguarding privacy within the European Union (EU). Their key priority is the effective implementation of privacy laws through the use of tools. The EDPS serves as a supervisor for EU institutions and offers advice during the legislative process, ensuring that privacy concerns are integrated into decision-making. Their ultimate goal is to promote a safer digital future by advocating for the use of IT architects and a comprehensive privacy engineering approach.

In line with the EDPS’s efforts, Wojciech Wiewiórowski, a prominent figure in the field, acknowledges and supports the work of non-governmental organizations (NGOs) in enforcing privacy policies. He recognizes the vital role that NGOs play and suggests that their work should have been undertaken by data protection commissions much earlier. This recognition highlights the importance of collaboration between regulatory bodies and NGOs in effectively safeguarding individuals’ privacy rights.

Furthermore, Eurostat, the statistical office of the European Union, has developed privacy-preserving tools such as trusted execution environments and trusted smart surveys. These innovative tools aim to ensure privacy while conducting official statistics. The United Nations has included these tools in their guide on privacy enhancing technologies for official statistics, further validating their importance and effectiveness in maintaining data privacy.

Overall, the European Data Protection Supervisor, Wojciech Wiewiórowski, and Eurostat are actively working to uphold privacy rights and create a safer digital environment. Their focus on utilizing tools and collaborating with NGOs demonstrates their commitment to establishing a robust framework for data protection. Embracing these initiatives provides individuals with greater confidence in the privacy of their personal information.

Clara Clark Nevola

Privacy enhancing technologies (PETs) are becoming increasingly important in today’s digital era as they enable data sharing while protecting privacy. The Information Commissioner’s Office (ICO) in the UK has recognised the significance of PETs and has released guidelines that outline how these technologies can support data minimisation, security, and protection.

The ICO’s guidelines highlight the role that PETs play in achieving data minimisation, which refers to the practice of only collecting and retaining the minimum amount of personal data necessary for a specific purpose. By implementing PETs, organisations can ensure that they are processing and sharing data only to the extent required, thereby reducing the risk of potential breaches or misuse.

Furthermore, PETs contribute to data security, addressing concerns about the potential vulnerability of shared data. Different types of PETs, such as homomorphic encryption, secure multi-party computation, and zero-knowledge proofs, offer various solutions for securing data in different sharing scenarios. Homomorphic encryption allows computations to be done on encrypted data without having to decrypt it, while secure multi-party computation enables multiple parties to perform a computation on their data without revealing any sensitive information. Zero-knowledge proofs allow the verification of a claim without revealing the supporting data. These technologies can help protect data integrity while allowing for collaboration and data sharing.

Anonymisation or de-identification is another key aspect of PETs. By applying these techniques, organisations can remove or alter personal identifiers, making it more difficult to link shared data to specific individuals. This helps to protect privacy while still allowing for data analysis and research.

Despite the clear benefits of PETs, challenges remain. Technical standards for PETs need to be developed to ensure interoperability and ease of implementation. Additionally, the costs associated with implementing PETs can be high, posing a barrier to adoption for some organisations. Awareness and understanding of PETs also need to be improved, particularly among lower-tech organisations that could greatly benefit from them.

Data sharing itself poses challenges beyond legal considerations. Organisational and business barriers, such as concerns about reputation and commercial interests, can hinder data sharing efforts. Stakeholders often express reluctance to share their data due to uncertainties about how it will be used or what the outcomes may be.

To overcome these challenges, the ICO advocates for partnerships and collaborations between PET developers, academics, and traditional organisations like local governments and health bodies. By bringing together experts from different fields, these partnerships can elevate awareness and understanding of PETs and facilitate their adoption by traditional organisations.

In conclusion, privacy enhancing technologies are crucial tools for enabling data sharing and protecting privacy in the digital era. The ICO’s guidelines demonstrate how PETs can support data minimisation, security, and protection. While challenges exist in terms of technical standards, costs, and awareness, partnerships between PET developers and traditional organisations can help overcome these obstacles. By promoting the adoption of PETs, organisations can achieve a balance between data sharing and privacy protection, fostering innovation and collaboration while safeguarding individuals’ personal information.

Suchakra Sharma

The speakers in the discussion present different perspectives on privacy in software development. One speaker argues in favour of considering Privacy Enhancement Technologies (PETs) from the software perspective. This involves examining how software handles data, as it can provide insights into developers’ intentions and identify potential privacy violations. The speaker highlights the importance of evaluating the software in order to predict and prevent privacy breaches. As a solution, Privado is developing a tool that can assess how software handles data.

On the other hand, another speaker focuses on the significance of technically verifiable Privacy Impact Assessments (PIAs) in ensuring proactive privacy. They note that during software development, the necessary information for PIAs is already available. By incorporating PIAs into the development process, privacy regulations can be adhered to right from the design phase to deployment. To facilitate this, a tool has been built to perform verifiable PIAs, identifying potential privacy violations in advance. This approach is seen as a guarantee for proactive privacy.

The third speaker explores the possibility of certifying software for privacy compliance. They highlight the importance of evaluating the data processing and handling intentions of software. By doing so, privacy compliance checks can be conducted before the software is deployed. They suggest that regulatory laws such as GDPR and CCPA can be translated into fine-grained checks and tests for compliance. This certification process is considered a potential solution to ensure privacy in software development.

In conclusion, the speakers all emphasize the need to evaluate how software handles data and ensure compliance with privacy regulations throughout the entire software development lifecycle. By considering PETs, performing verifiable PIAs, and certifying software for privacy compliance, proactive measures can be taken to protect privacy. These perspectives highlight the increasing importance of addressing privacy concerns in the software development process.

Maximilian Schrems

NOIP, an organisation, has developed a system that automates the generation and management of complaints about General Data Protection Regulation (GDPR) compliance. This system has proven to be effective in achieving a 42% compliance rate by proactively sending guidelines to companies.

The system operates by performing an auto-scan of websites to identify potential GDPR violations, which is then followed by manual verification. Once a violation is detected, the system auto-generates a complaint, which is then transferred to the violating company for action. Additionally, a platform is used for companies to provide feedback and declare their compliance.

Interestingly, the system has observed a domino effect, wherein even companies that were not directly intervened with have shown improved compliance. This suggests that the awareness and actions taken by some companies have influenced others in the industry to improve their GDPR compliance as well.

Data protection authorities recognise the potential for efficiency that new technologies can bring, but they also express concerns and high levels of interest. They acknowledge that utilising new technologies, such as the automated GDPR compliance system, can increase efficiency by eliminating trivial tasks and increasing the quality of work through the use of well-proven templates.

However, implementing new technology poses certain challenges. The adoption of new technology requires technical infrastructures, such as programmers, to support its implementation. Additionally, a culture shift is necessary for organisations to focus on specific tasks related to the new technology and adapt to the changes it brings.

In conclusion, NOIP’s automated system for GDPR compliance has achieved a significant compliance rate and has demonstrated the potential for technology to enforce and improve GDPR compliance in a more efficient manner. While there are challenges associated with implementing new technology, the benefits of increased efficiency and quality are substantial. It is noteworthy that the system has also influenced compliance improvement among companies that were not directly addressed, highlighting its positive impact on the industry as a whole.

Nicole Stephensen

The analysis explores different perspectives on privacy-enhancing technology and data protection. One argument presented is that privacy-enhancing technology should not replace good decision-making. It is emphasised that governments and organizations have a positive duty to ensure that their information practices accord with relevant privacy and data protection laws and community expectations. This suggests that while privacy-enhancing technology can be beneficial, it should not be solely relied upon to make ethical and responsible decisions regarding data privacy.

Another argument highlighted is the struggle faced by organizations in identifying and mitigating risks, particularly when dealing with large volumes of data or complex vendor relationships. Data leakage is mentioned as a common occurrence that often happens without the organization’s awareness, and it qualifies as a personal data breach. This indicates that organizations may face challenges in effectively managing and protecting data, especially in situations involving extensive data sets or intricate vendor arrangements.

However, the analysis also acknowledges the utility of privacy-enhancing technologies in controlling data leakage. Specifically, the example of Q-Privacy is provided as a tool that allows organizations to audit for data leakage and enforce rules about data usage. This suggests that privacy-enhancing technologies, particularly those focused on data accountability, can play a valuable role in preventing and controlling data leakage incidents.

Furthermore, the importance of prioritizing purpose specification and collection minimization in data protection practices is highlighted. The argument put forward states that these are the building blocks for a culture that limits the use and disclosure of personal data as much as possible. This implies that organizations should be cautious in collecting only necessary data and clearly defining the purposes for which it will be used. By doing so, they can actively contribute to a privacy-conscious environment.

Lastly, the analysis identifies several barriers to the implementation of privacy-enhancing technologies. These include the privacy maturity of the technology suppliers, their geographical location, and the budget of the organization. Additionally, it is noted that decision makers in the privacy domain tend to be more in the legal space and have a less technical focus, which could also be a barrier for adoption. This suggests that a multifaceted approach is necessary to address these barriers and promote the effective adoption and integration of privacy-enhancing technologies.

In conclusion, the analysis provides an overview of various perspectives on privacy-enhancing technology and data protection. It emphasizes the importance of good decision-making, compliance with privacy laws and community expectations, risk identification and mitigation, data accountability tools, purpose specification, and collection minimization in ensuring effective data protection practices. Moreover, the analysis sheds light on the challenges and barriers associated with the implementation of privacy-enhancing technologies, highlighting the need for a comprehensive approach to overcome these obstacles.

Christian Reimsbach Kounatze

In the realm of technology and privacy, it has been established that these two areas can provide scalable solutions to effectively address problems. Maximilian Schrems, a prominent figure in this field, emphasizes the advantages of implementing efficient systems that can eliminate trivial work and enhance the overall quality of work. By using proven templates and carefully selecting cases to work on, these systems greatly improve efficiency and productivity.

Privacy tools, in particular, are seen as indispensable in supporting the work of agencies involved in data protection. These tools enable agencies to effectively navigate the complex landscape of privacy management. However, barriers hinder the widespread adoption of privacy-enhancing technologies. Factors such as low budgets, a lack of technical focus in decision-making teams, and the prioritization of larger organizations impede the adoption and implementation of these technologies. Addressing these issues is crucial to fully benefitting from the advantages offered by privacy-enhancing technologies.

Automation is widely regarded as a crucial component in privacy management. It allows for scaling efforts and addressing the challenges posed by the ever-increasing scale of privacy concerns. However, human involvement should not be replaced entirely. Speakers agree that a balance must be struck between automation and human decision-making. While automation can streamline processes, human oversight and decision-making play an integral role in ensuring ethical and responsible practices. Striking this balance is key to realizing the full potential of automation in privacy management.

In conclusion, the speakers at the event highlighted the significant role that technology, privacy tools, and human involvement play in addressing problems and supporting the work of agencies in the realm of privacy and data protection. Scalable solutions, efficient systems, and the adoption of privacy-enhancing technologies are essential in tackling the challenges at hand. While automation is critical, it should not replace the human touch. By acknowledging these factors and working towards effective implementation, privacy can be ensured in an increasingly digital world.

Speakers

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

Cybersecurity of Civilian Nuclear Infrastructure | IGF 2023 WS #220

Table of contents

Disclaimer: This is not an official record of the IGF session. The DiploAI system automatically generates these resources from the audiovisual recording. Resources are presented in their original format, as provided by the AI (e.g. including any spelling mistakes). The accuracy of these resources cannot be guaranteed. The official record of the session can be found on the IGF's official website.

Knowledge Graph of Debate

Session report

Giacomo Persi Paoli

The Open-Ended Working Group (OEWG) was established to ensure greater visibility and active participation in discussions dealing with international cybersecurity. It has had six iterations, with each iteration involving approximately 20 countries, including the permanent members of the Security Council. The OEWG is seen as more transparent, as everything is open to the public. Furthermore, if consensus isn’t reached on a report, the chair has the authority to publish a summary.

The OEWG has focused on the protection of critical infrastructure, which has been a prevalent subject of discussion. As part of the framework for responsible state behaviour in cyberspace, critical infrastructure is a focal point of multiple norms. States are called to protect their own critical infrastructure and are encouraged not to target the critical infrastructure of others. International assistance is also encouraged for states whose critical infrastructure is targeted by cyber attacks.

However, the OEWG may not be the right forum for detailed discussions on how general norms apply to specific sectors or types of infrastructure. It is viewed as more suitable for discussions on evolving threats, norm implementation, and international impact. There is a need for a dedicated forum to discuss the implementation of general purpose norms for cyber nuclear security. Discussions within the OEWG have covered various aspects of critical infrastructure, such as medical infrastructure, energy, and financial sectors. However, the limited time available has made it challenging for states to deeply explore any of these topics.

Concerns regarding threats to civilian nuclear infrastructure by cyber operations are growing, as states have flagged their increasing concerns over cyber threats to the Secretary General. Cyber attacks have also been on the rise during the pandemic, affecting all sectors of society, including critical infrastructure.

The private sector can play a significant role in helping states develop cyber resilience. The private sector has capacities and capabilities that can contribute to enhancing cyber resilience efforts. Public-private partnerships have been suggested as a tool to increase cyber resilience and have been flagged as a way forward.

In conclusion, the OEWG serves to enhance visibility and participation in discussions on international cybersecurity. It has addressed the crucial issue of critical infrastructure protection. However, it may not be the ideal platform for discussing specific sectors or types of infrastructure. The need for a dedicated forum for discussing the implementation of general purpose norms for cyber nuclear security has emerged. Concerns about threats to civilian nuclear infrastructure by cyber operations are growing, and the involvement of the private sector in developing cyber resilience is seen as significant. Public-private partnerships are also being considered to increase cyber resilience.

Rowan Wilkison

Concerns have been raised regarding the security failures within the IT networks of nuclear plants. These concerns arise from the potential harm and disastrous outcomes that could result from such failures. It is imperative to address these shortcomings and take measures to prevent any adverse consequences.

The modernization of cybersecurity and civilian nuclear infrastructure is seen as a high priority in mitigating the risks associated with these security failures. This would involve implementing advanced and robust security measures to safeguard the IT networks of nuclear plants. By prioritising the improvement of cybersecurity, the likelihood of breaches and potential threats can be significantly reduced.

Furthermore, gaining a better understanding of the threat landscape is crucial. This entails identifying potential vulnerabilities and weak points within the IT systems of nuclear plants and staying updated on the latest cyber threats. By doing so, appropriate measures can be taken to prevent any breaches or malicious activities.

It is worth noting that these issues align with various Sustainable Development Goals (SDGs). Specifically, they relate to SDG 9 – Industry, Innovation and Infrastructure, as the modernisation of cybersecurity and civilian nuclear infrastructure falls within the scope of enhancing industry and infrastructure. Additionally, these concerns also relate to SDG 13 – Climate Action, as the disastrous outcomes of security failures within nuclear plants can have severe environmental implications due to the link to radiation.

Moreover, the issues raised have implications for SDG 16 – Peace, Justice, and Strong Institutions. By addressing the security failures in nuclear plant networks, stronger justice systems and institutions can be established to ensure the safety and security of critical infrastructure. This, in turn, contributes to promoting peace and stability.

In conclusion, the concerns surrounding security failures in IT networks of nuclear plants highlight the need for immediate action. Modernizing cybersecurity and civilian nuclear infrastructure is crucial not only for the industry but also for addressing environmental concerns and maintaining peace and justice. By prioritising these areas and adopting proactive measures, the risks posed by security failures can be effectively mitigated.

Priya Urs

The analysis examines the issue of cyber operations targeting civilian nuclear infrastructure within the framework of international law. The first argument highlights the absence of specific rules in international law that directly address cyber operations on civilian nuclear infrastructure. While states recognize the importance of protecting civilian nuclear infrastructure as critical infrastructure against cyber operations, there is a lack of concrete legal protections.

The second speaker argues that while general rules of international law, including treaties and customary international law, may potentially apply to this context, their specific application presents challenges. These general rules encompass aspects such as the use of force by states, the prohibition of intervention in another state’s affairs, respect for state sovereignty, and the due diligence obligations of states. However, it is important to note that these rules were not designed with cyber operations in mind.

The third and fourth arguments focus on the prohibition of intervention, a principle agreed upon by states, but with variations in the definition of activities that constitute intervention. The generally accepted requirements for intervention to be deemed unlawful are that it must address the internal or external affairs of a state and that it should coerce the targeted state. However, there are disagreements among states regarding the specific activities that fall under this prohibition.

The fifth speaker emphasizes that a cyber operation that disrupts the production of nuclear energy can be seen as coercive and may therefore constitute unlawful intervention. This reflects the belief that if a state adopts a policy regarding the generation of nuclear energy, a cyber operation that disrupts its production would be deemed coercive and thus unlawful.

On the other hand, the sixth speaker argues that cyber operations such as surveillance or data breaches may not be perceived as coercive since they do not directly hinder a state’s policy implementation. These types of operations, which do not interrupt the implementation of a state’s policy, may not be considered unlawful intervention.

The analysis also highlights the importance of preventative measures in cybersecurity and the need for legal accountability. It emphasizes the significance of addressing the cybersecurity problem from multiple angles, including proactive measures and holding accountable those responsible for incidents.

In conclusion, the analysis underscores the lack of specific rules in international law regarding cyber operations on civilian nuclear infrastructure. While general rules of international law may have some relevance, applying them in the context of cyber operations poses challenges. The debate surrounding the definition and scope of intervention further complicates the issue. The analysis also emphasizes the complexity of distinguishing between coercive and non-coercive cyber operations. Finally, it underscores the necessity of comprehensive cybersecurity measures and legal accountability in addressing this complex issue.

Talita Dias

Increased cyber and nuclear risks present a significant threat to national security and global stability. Cyber operations are targeting critical sectors such as healthcare and energy, as well as civilian and military nuclear systems worldwide. It is urgently necessary to develop international technical standards, rules, principles, and non-binding norms to ensure the cybersecurity of civilian nuclear infrastructure. This is particularly crucial given the growing use of small modular reactors and artificial intelligence, which could expand the potential targets for cyber operations.

The International Atomic Energy Agency (IAEA) plays a vital role in this area by providing guidance and recommendations for computer security measures. They also conduct ongoing security audits and assessments to detect vulnerabilities and offer training sessions for nuclear facility operators. However, there is some debate surrounding the binding nature of the IAEA’s recommendations.

To enhance cyber resilience, it is essential to foster multi-stakeholderism and public-private partnerships. The private sector’s involvement in assisting states in building their cybersecurity capacities is recognised, and public-private partnerships are seen as a robust strategy for enhancing the cyber resilience of member states.

One area of contention involves determining what constitutes intervention in the cyber landscape regarding civilian nuclear infrastructure. Understanding the threat landscape in both the cyber and nuclear sectors is critical, as accidents within the nuclear sector can have significant consequences.

Improved dialogue between the cyber and nuclear sectors is necessary to effectively address these risks. Through dialogue, stakeholders can exchange knowledge and best practices, identify potential gaps in cybersecurity measures, and collaborate on developing effective strategies to mitigate cyber threats.

The need for specific cyber nuclear norms, rules, or best practices is currently being debated. The current feedback on this issue indicates a score of 6.4, highlighting the ongoing discussions and varying perspectives on the necessity of such measures.

In conclusion, the increasing cyber and nuclear risks pose significant threats to national security and global stability. Developing international technical standards, rules, principles, and non-binding norms is crucial to safeguarding the cybersecurity of civilian nuclear infrastructure. Collaboration between stakeholders, including public-private partnerships, is necessary to enhance cyber resilience. Clarifying the prohibition on intervention in the cyber landscape and understanding the threat landscape in both the cyber and nuclear sectors are key areas of focus. The necessity of cyber nuclear specific norms, rules, or best practices is subject to ongoing debate and discussions.

Tomohiro Mikanagi

The interpretation of sovereignty in relation to cyber attacks varies among different countries. The UK does not see any standalone obligation arising from sovereignty apart from the non-intervention rules, while France views any cyber operation causing an effect within its borders as a violation of sovereignty. The US, Germany, and Japan believe a certain level of harmful effect needs to be caused in their territory for it to be considered a violation of sovereignty.

In terms of cyber attacks targeting nuclear facilities, it is argued that they could have severe effects and are likely to be considered unlawful under international law. Mikanagi believes that there needs to be a consensus on what constitutes a harmful effect in a cyber attack in order to determine if a violation of sovereignty has occurred. Additionally, the due diligence obligation in international law is not clearly defined, leading to uncertainty among states as to whether this obligation applies to cyber operations.

Furthermore, there is no clear application for the territorial state’s due diligence obligation in the area of nuclear security, and discussions on this matter are ongoing.

The existing Convention on the Physical Protection of Nuclear Materials could potentially cover sabotage through cyber attacks, despite not explicitly mentioning cybersecurity. Given this, it may be more feasible to discuss cyber security issues related to nuclear facilities within the context of established conventions such as this one.

Overall, the varying interpretations of sovereignty and the lack of consensus, clarity, and application of international laws and conventions contribute to the complexity of addressing cyber security issues effectively.

Michael Karimian

The tech sector plays a central role in providing digital solutions for safety, security, and everyday processes, including nuclear systems. It provides ICT infrastructure that is crucial for these purposes. However, the tech sector’s involvement also increases the risk of cyber threats due to the many entry points into its IT systems. Therefore, it is essential for the tech sector to prioritize cybersecurity by design.

One of the main arguments is the ever-evolving threat landscape. The continuous advancements in technology result in a constantly changing and sophisticated threat landscape. Thus, the tech sector must prioritize cybersecurity measures to effectively combat these threats.

Continuous innovation and transparency in threat sharing are also considered crucial. Actively researching and sharing threat intelligence is essential to stay ahead of cyber threats. By engaging in innovation and sharing information, the tech sector can contribute to creating a safer online environment.

Education and training in cybersecurity are also highlighted. Tech companies can provide guidance on cybersecurity best practices, contributing to the education of individuals and organizations in protecting themselves against cyber threats. This emphasizes the importance of quality education and training for ensuring cybersecurity.

The significance of multi-stakeholder engagement and collaboration in addressing cybersecurity challenges is underscored. Collaboration between the tech sector, governments, civil society, and other companies is seen as essential to effectively tackle cybersecurity issues. By working together and sharing knowledge and resources, it becomes easier to address the complex nature of cyber threats.

Microsoft’s stance is mentioned, as they believe in proactively taking steps to address cybersecurity risks. As part of their commitment, they are involved in initiatives like the Cyber Security Tech Accord, which aims to improve cybersecurity across the industry. Microsoft’s active involvement showcases the importance of industry leaders taking responsibility and actively addressing cybersecurity challenges.

Basic cyber hygiene practices are also highlighted. It is mentioned that good yet basic cyber hygiene can significantly reduce the risk of cyber threats. This includes practices such as protecting user identities, applying updates as soon as possible, using advanced anti-malware, enabling auditing resources, and preparing incident response plans. Following these practices allows individuals and organizations to mitigate many cybersecurity risks.

In terms of technology solutions, cloud-based systems are recommended over on-premises systems for better cyber protection. Cloud-based systems offer holistic, adaptive, and global cyber protection, which is facilitated better compared to on-premises systems.

Lastly, the summary emphasizes the importance of adherence to general guidance for cybersecurity across all sectors, including the nuclear sector. Protecting user identities, applying updates as soon as possible, using advanced anti-malware, enabling auditing resources, and preparing incident response plans are considered essential for all sectors. The International Atomic Energy Agency’s guidelines align with this general guidance, further emphasizing the importance of adherence to cybersecurity measures across sectors.

Overall, the summary highlights the tech sector’s importance in providing digital solutions for safety, security, and everyday processes. It emphasizes the need for prioritizing cybersecurity by design, continuous innovation and transparency in threat sharing, education and training, multi-stakeholder engagement and collaboration, adherence to basic cyber hygiene practices, and the use of cloud-based systems. These measures are crucial to mitigating cyber threats and creating a secure online environment.

Marion Messmer

The analysis explores the topic of cybersecurity risks in nuclear facilities and their potential impact. It highlights that cyber attacks can target civilian nuclear facilities either due to their specific role in nuclear systems or their importance to a country’s power supply. Given that nuclear power plants are a crucial part of a nation’s energy infrastructure, any disruption or compromise can have significant consequences.

The analysis notes that awareness of these risks has evolved over time, indicating a need for improved security measures. It mentions that older nuclear power plants initially believed they were safe from cyber threats due to their bespoke IT infrastructure. However, as plants updated and integrated off-the-shelf IT systems, they also had to incorporate cybersecurity measures. Consequently, new regulations and training procedures were required to address these emerging risks.

Moreover, the addition of cybersecurity concerns to the nuclear energy sector, where physical safety has always been of utmost importance, has changed the game. This realization of cyber threats has caused worry among many individuals and organizations involved in the nuclear energy sector.

The analysis also highlights the risks and opportunities presented by new developments in the nuclear sector, such as small modular reactors and microreactors. While these developments can provide a stable power supply to remote regions, they also increase the risk due to the presence of more reactors. The diversification and length of the supply chain in these systems can introduce cybersecurity vulnerabilities. However, the analysis emphasizes that newer reactors are designed with a focus on safety, and awareness of cybersecurity in these systems is more advanced than before. Advancements in design and operator training contribute to reducing the potential risks associated with these developments.

Notably, the war in Ukraine has brought new risks to civilian nuclear infrastructure. The analysis mentions the Saporizha power plant in Ukraine, which has been directly affected by the conflict. Regular physical and cyber attacks on the power plant underline the vulnerability of such infrastructure during times of conflict. The analysis also notes that managing these risks requires particular attention to potential disruptions to the cooling system for the reactors. A disconnection from the grid, for example, could interfere with the cooling system, leading to a reactor meltdown. Backup generators have been put in place at the Saporizha power plant to ensure that cooling can still occur.

The International Atomic Energy Agency (IAEA) has had a positive impact by actively supporting the personnel operating the power plant. Their monitoring and actions have played a crucial role in mitigating risks. It is evident that their involvement is essential in maintaining the security and safety of nuclear facilities.

Additionally, the analysis emphasizes the importance of addressing environmental, health, reputational, and equipment risks associated with nuclear energy. While it may be challenging to determine the exact likelihood of these risks, the potential severe outcomes warrant preventive measures.

Marion Messmer, a noteworthy figure referenced in the analysis, offers insights into the topic. Messmer finds reassurance in the current safety operations and mitigating actions being taken, particularly in the case of the Saporizha power plant. This implies that efforts are being made to address the risks involved in nuclear facilities caught in conflicts. Furthermore, Messmer highlights the significance of reactor design in reducing the likelihood of a Chernobyl-like incident.

It is essential to consider potential scenarios as nuclear energy becomes more prevalent due to the energy transition. Conflicts involving power plants could increase, necessitating effective management strategies for such situations.

Lastly, the analysis raises concerns about putting reactors underwater, as even small modular reactors can pose severe consequences for the environment in the event of a radiological incident. While the idea of hiding reactors underwater may seem appealing, the potential spread of radiation due to water mixing remains a significant risk.

In conclusion, the analysis provides a comprehensive overview of cybersecurity risks in nuclear facilities. The increasing awareness of these risks has led to improved security measures and regulations. New developments in the nuclear sector offer both opportunities and risks, which are being addressed through advancements in design and operator training. The war in Ukraine and the associated risks to civilian nuclear infrastructure highlight the need for managing potential disruptions to cooling systems. The involvement of organizations such as the IAEA has proven valuable in mitigating these risks. Additionally, the analysis emphasizes the significance of preventive measures to address environmental, health, reputational, and equipment risks in the nuclear energy sector. Marion Messmer’s insights further contribute to the discussion, emphasizing the importance of safety operations, reactor design, and effective management strategies.

Tariq Rauf

The International Atomic Energy Agency (IAEA) has issued more than 30 documents providing guidance and recommendations on nuclear security. These documents primarily focus on the integrity of the control systems, containment and control of nuclear materials, and ensuring the safety of nuclear facilities. The IAEA plays a significant role in promoting nuclear security.

However, the primary responsibility for nuclear security lies with states and operators. While international conventions like the Convention on the Physical Protection of Nuclear Material do exist, states and operators are responsible for ensuring the security of their nuclear facilities. The Convention primarily focuses on nuclear security and aims to protect nuclear material during international transport.

Cybersecurity is a crucial aspect of nuclear security and safety. A malicious cyber attack can lead to serious consequences, including the compromise of the cooling system of a nuclear facility. There have been incidents suspected to be caused by cyber attacks that have resulted in leaks in the cooling system of operating nuclear facilities. It is crucial to implement robust cybersecurity measures to prevent, respond to, and recover from such attacks.

Small modular reactors (SMRs) and sealed reactor units are seen as more secure options compared to larger nuclear power plants. SMRs are compact and have sealed reactor units that do not require frequent refueling. This enhances their security and reduces the risk of accidents or material misuse.

The IAEA plays a pivotal role in providing IT security guidance to nuclear facilities. It collaborates with its member states to produce comprehensive cybersecurity measures, which include defense in depth approaches, risk assessment, security policies and procedures, access controls, network security, and incident detection and response protocols.

Capacity building and international cooperation are essential elements in improving nuclear security. The IAEA facilitates capacity building by conducting training sessions at various locations to enhance the skills of nuclear facility operators. It also encourages participation in security audits and assessments to discover new vulnerabilities.

While the Convention on the Physical Protection of Nuclear Material (CPPNM) is an important international instrument for nuclear security, it is not universally binding. Only countries that have acceded to the CPPNM are subject to its provisions. However, the CPPNM amendment in 2005 extended its scope to cover nuclear materials in peaceful uses, domestic storage, and transport.

There is significant concern regarding the potential risks associated with cyber attacks on nuclear facilities. Fukushima and Chernobyl disasters have highlighted the transboundary effects of nuclear accidents. The release of radiation resulting from cyberattacks on nuclear facilities is a major concern. Balancing the protection of national sovereignty and the prevention of widespread radiation is a challenging task.

It is argued that every nation, especially those with nuclear power plants, should accede to the CPPNM to promote international safety. Iran, for example, operates a nuclear power plant but has not yet acceded to the convention. After the Fukushima accident, there were efforts to make the CPPNM mandatory for all 31 states that operate nuclear facilities.

The involvement of the private sector in nuclear security is increasing. International organizations like the IAEA are interacting more with industry, which provides expertise and technology solutions to enhance overall nuclear security efforts.

However, international organizations like the IAEA face the risk of system penetration by state actors. The IAEA deals with highly classified information about the nuclear activities of more than 180 states. State-originated cyber attacks like Stuxnet and Olympic Games on Iran’s enrichment facilities have underscored the need to address this challenge.

Building trust and cooperation with industry is crucial for the IAEA. While the organization has purchased commercial products for managing big data, its IT experts may not match the expertise and capabilities of states. Strengthening cooperation with industry can help overcome suspicion and further enhance nuclear security efforts.

The conclusion drawn from the analysis suggests that the IAEA should have the authority to regulate nuclear security and cybersecurity. An international, legally binding framework for cybersecurity in nuclear facilities is necessary to address the current reliance on national responsibility. Conventions for liability also need to consider damage resulting from cyber incidents at nuclear facilities.

Overall, the summary highlights the importance of nuclear security, the role of the IAEA and international conventions, the need for robust cybersecurity measures, and the challenges posed by cyber attacks. It emphasizes the significance of trust, cooperation, and capacity building to enhance nuclear security and promote international safety.

Speakers

&

’Giacomo

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

&

’Marion

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

&

’Michael

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

&

’Priya

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

&

’Rowan

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

&

’Talita

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

&

’Tariq

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

&

’Tomohiro

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

Data Governance in Broadband Satellite Services | IGF 2023 WS #307

Table of contents

Disclaimer: This is not an official record of the IGF session. The DiploAI system automatically generates these resources from the audiovisual recording. Resources are presented in their original format, as provided by the AI (e.g. including any spelling mistakes). The accuracy of these resources cannot be guaranteed. The official record of the session can be found on the IGF's official website.

Knowledge Graph of Debate

Session report

Uta Meier-Hahn

The analysis explores the topic of internet connectivity and considers various arguments and supporting facts related to its significance for development. It suggests that regions with better internet connectivity tend to progress more rapidly compared to those with limited or no connectivity. This supports the claim that internet connectivity acts as a catalyst for development.

Another important point raised in the analysis is the growing digital divide. As time passes, the gap between regions with adequate connectivity and those without expands further. This emphasizes the urgency to address the issue and find effective solutions to bridge the digital divide.

One potential solution that is highlighted in the analysis is the use of Low Earth Orbit (LEO) satellites. It is argued that LEO satellites require minimal terrestrial infrastructure and can complement the development of fibre and mobile infrastructure. This suggests that LEO satellites have the potential to bridge the digital divide faster than other connectivity solutions.

Furthermore, LEO satellite internet is seen as a valuable resource during times of conflict or natural disasters, when traditional communication networks may become unavailable. This underscores the importance of having alternative means of communication that can remain functional in such challenging circumstances.

The analysis also discusses the benefits of connectivity alternatives. It suggests that offering a range of connectivity solutions can lead to an enlargement of the market and stimulate competition. This variety allows end-users to have more choices, potentially leading to improved services and affordability.

An interesting point made in the analysis is the global nature of the governance of LEO satellite internet. It asserts that all global citizens are stakeholders due to the shared risks associated with the technology, such as potential space debris and environmental costs. This highlights the need for collaboration and cooperation among stakeholders to address these issues effectively.

The analysis concludes by suggesting several recommendations for further action. Countries are encouraged to document and share best practices and explore opportunities to align their interests with providers. This can help in authorizing and licensing LEO systems in a timely manner. Additionally, engaging with financing and investment opportunities is seen as crucial to support the advancement of satellite internet.

Other noteworthy observations from the analysis include the importance of transparency and multi-stakeholder input, as well as the need for research and twinning programmes to further understand and advance satellite internet. The analysis also stresses the significance of quick onboarding and activation of services, and the need for coalition building to foster consumer interest.

Overall, the analysis highlights the positive impact of internet connectivity on development and the potential of LEO satellites in bridging the digital divide. It provides valuable insights and recommendations for countries, stakeholders, and providers to collaborate and work towards achieving better connectivity outcomes.

Akcali Gur Berna

Satellite connectivity and data governance have geopolitical dimensions, especially in Ukraine and Iran. During the Russian invasion of Ukraine, Starlink satellite internet service proved crucial in providing communication support to the war-torn country. However, in Iran, requests for internet restoration were limited due to US restrictions and authorization issues with the Iranian government.

Concerns surrounding data privacy and monopolization have sparked discussions on the need for international treaties to address these issues in the context of satellite broadband. A survey conducted for the ISAAC Foundation-funded research revealed that respondents had concerns about data privacy and suggested an international treaty approach to combat data monopolization. This indicates that global recognition is growing regarding the concerns associated with the data value chain in satellite broadband, and international treaties on data flows and standardization may provide potential solutions.

Certain European Union countries and the UK have licensed Starlink to provide services, but under the condition of compliance with domestic data governance regimes. This shows that countries can employ regulatory measures to address data governance concerns in the use of satellite broadband services. Additionally, major space-faring nations like China and the EU are embarking on their own satellite constellations, citing data governance issues as one of the justifications for these projects.

It is crucial for satellite broadband technology to operate within existing rules and regulations, respecting the importance of the rule of law. This ensures that the deployment and use of satellite broadband services adhere to legal boundaries and prevent potential conflicts. International legal boundaries may restrict broadcasting capabilities in certain countries, and approval is necessary for landing rights and spectrum usage. Turning on satellite services without approval in particular countries would attract international pressure and potentially cause political conflicts.

In terms of domestic regulations, developing countries are advised to reevaluate and update their regulations related to licensing and authorizing satellite broadband services. By reassessing their regulations, these countries can create an environment that promotes the growth and accessibility of satellite broadband while also addressing governance concerns.

In addition, countries are recommended to form regional alliances to enhance the achievement of local policy goals. This collaboration can foster cooperation in addressing common challenges and advancing the benefits of satellite broadband in the region.

Active participation in ITU (International Telecommunication Union) consultations is also encouraged. By engaging in these consultations, countries can contribute to the development of international standards and policies that govern satellite connectivity and data governance.

Countries should also reassess their commitments under trade treaties, ensuring that their satellite broadband initiatives align with international trade agreements and obligations.

Moreover, it is essential for countries to familiarize themselves with space law. Having a comprehensive understanding of space law will ensure that satellite activities are conducted legally and in accordance with international norms.

Finally, a holistic approach is necessary to ensure that satellite broadband initiatives align with sustainable development goals. By considering the environmental, social, and economic impacts of satellite connectivity, countries can maximize the benefits of satellite broadband while minimizing potential negative effects.

In conclusion, the geopolitical dimensions of satellite connectivity and data governance are prominent, particularly in Ukraine and Iran. Addressing data governance concerns through international treaties, regulatory measures, and domestic regulations is crucial for the responsible and effective use of satellite broadband services. Collaboration, active engagement, and adherence to legal frameworks are essential in optimizing the benefits of satellite connectivity and data governance while working towards sustainable development goals.

Dan York

The analysis explores the different aspects of satellite connectivity, specifically focusing on Low Earth Orbit (LEO) satellites and their potential impact on internet accessibility. LEO satellites are seen as a promising solution for providing high-speed and low-latency connectivity, which is crucial for efficient internet access. In comparison, geostationary satellites, which have been providing internet access for many years, have high latency, making them unsuitable for fast connectivity.

The potential of LEO satellites for revolutionizing internet connectivity is highlighted, particularly in terms of their ability to deliver faster and more efficient connections due to their closer proximity to Earth compared to geostationary satellites. Additionally, LEO satellites can be mass-produced and launched in bulk using cost-effective methods, such as reusable rockets, resulting in significantly reduced expenses. However, it is important to note that LEO satellites have a shorter lifespan of around 5 years, requiring continuous deployment to maintain uninterrupted connectivity.

Despite the advantages, there are concerns regarding the implementation of LEO satellite networks. One significant concern is the economic, societal, and environmental implications associated with these systems. Affordability and capacity remain major challenges, and the lack of established standards and privacy concerns pose potential issues for future LEO systems. Additionally, there are concerns about data handling through the required infrastructure and the generation of space debris, which can have potential environmental impacts.

The analysis also addresses the issue of regulatory and legal restrictions, which act as significant barriers to the global implementation of satellite internet. Providers must secure landing rights and obtain spectrum approval in each country they seek to operate in. Operating without proper authorization can lead to international pressure and attention, underscoring the need for adherence to legal and regulatory frameworks.

Moreover, the control of satellite internet by a limited number of billionaires, such as Elon Musk and Jeff Bezos, raises concerns about unequal access and power dynamics. The high cost of launching satellites prevents smaller players or community networks from entering the field, potentially exacerbating inequalities in internet access.

The analysis also raises concerns about the potential risks associated with satellite internet, particularly in terms of two-way communication. This vulnerability could make users, especially those in conflict zones, susceptible to targeting or surveillance.

The importance of healthy competition within a regulatory framework is advocated to address potential issues and failures in the LEO sector, as witnessed in the 1990s. Furthermore, the need for regulation is emphasized to ensure equitable access and prevent regulatory capture, which may impede progress or lead to unfavorable outcomes.

While advancements in satellite technology, including mass production capabilities and improved launch capacities, have greatly improved over the past few decades, uncertainties remain regarding the viability and success of proposed systems. Careful evaluation and addressing of these uncertainties are essential to ensure the effectiveness and sustainability of satellite communication networks.

Alternative solutions, such as optical connectivity, are also discussed. Optical connectivity provides a direct and unshared connection, but its infrastructure is still in the early stages of development.

Finally, the analysis highlights the critical role of satellite communication in disaster management, as evidenced by the deployment of communication resources in disaster-stricken areas to provide Wi-Fi connectivity for first responders. Additionally, the potential use cases of LEO satellites are emphasized, and the need for increased conversations and attention towards the International Telecommunication Union-Radio (ITU-R) is suggested to address the challenges and opportunities presented by LEO satellites.

In conclusion, the analysis provides a comprehensive exploration of the various dimensions of satellite connectivity, with particular emphasis on LEO satellites. While LEO satellites offer promising high-speed and low-latency connectivity, there are concerns regarding environmental impact, data handling, affordability, regulatory restrictions, and broadband inequality. The importance of healthy competition, regulation, and planning ahead to address potential challenges is stressed. Caution and further evaluation are needed before implementing proposed systems, given the uncertainties that exist. Overall, satellite communication, including LEO satellites, holds great potential for improving internet accessibility, and leveraging it effectively requires careful consideration of various factors.

Peter Micek

The analysis examines several significant concerns surrounding the low-Earth-orbit satellite sector. A major apprehension is the potential regulatory risks posed by Starlink, the sector’s first mover. The consolidated control that Starlink holds over the industry raises concerns, particularly due to its dominance and associated risks.

Another worrisome aspect is the heavy reliance of Ukraine on Starlink and its controller. This dependence on a single company creates vulnerability, as any disruption or manipulation of Starlink’s services could have severe consequences for the country.

The analysis also highlights potential security vulnerabilities in low-Earth-orbit satellites. It presents evidence from a live hacking competition at the DEF CON conference, where teams were able to hack into a satellite’s camera and capture pictures of specific locations on Earth. This finding underscores the need for robust security measures to protect these satellites from malicious activities.

Furthermore, the analysis points out the significant dependence of civil society on government in the space sector. The report underscores the substantial funding and procurement efforts made by governments, particularly in defense industries and spending. This heavy reliance on government support poses challenges for civil society to have equal say or influence in shaping sector policies.

Additionally, the analysis identifies an asymmetrical disadvantage in influencing public policy in the space sector. Despite efforts to engage with public policy directors, calls often go unanswered. This lack of responsiveness hampers the ability of concerned parties to have a meaningful impact on policy and regulation development.

On a positive note, the analysis suggests promoting higher standards in government procurement and support for new and emerging technologies. Initiatives like the donor principles on human rights in the digital age launched by the Freedom Online Coalition aim to harmonise and raise standards, addressing challenges in the sector.

Overall, the analysis highlights the need for careful consideration of regulatory risks, security vulnerabilities, and power dynamics in the low-Earth-orbit satellite sector. It emphasizes the importance of inclusivity, human rights, and data protection in policy and regulation development. Promoting higher standards and fostering partnerships in government procurement and emerging technologies are seen as promising approaches going forward.

Larry Press

The analysis explores the topic of optical laser communication between space and the ground, highlighting its potential impact on sustainable development. It is noted that this type of communication is related to SDG 9: Industry, Innovation, and Infrastructure. The technology has gained attention and investment from various smart individuals and organizations.

Optical communication offers several advantages, including faster speed, significant data capacity, wide directional angle, and license-free operation. However, it also faces challenges related to atmospheric conditions, such as clouds and rain, which can distort or weaken the optical signals. Despite these challenges, the overall sentiment towards optical communication is neutral, acknowledging its potential but also recognizing the obstacles it faces.

The involvement of noteworthy organizations, such as NASA and universities, in experimenting with optical communication is highlighted in the analysis. NASA has been working on this technology since 2013 and has achieved transmission rates of up to 200 gigabits per second. The Federal Technical University in Switzerland achieved even higher transmission rates, reaching 0.94 terabits per second using optical communication. This evidence shows that there is active research and development ongoing in this field.

However, there is some skepticism regarding the success of optical to low Earth orbit communication. The president and CEO of KSAT, an established optical ground station company, doubts the viability of this type of communication. The analysis suggests that additional investments and research are needed to overcome the challenges associated with this technology.

In addition to the topic of optical communication, the analysis also examines the criticism directed towards Elon Musk for his political posts on Twitter. Larry Press expresses disappointment and fear towards Elon Musk’s political content. This negative sentiment is further supported by Larry Press’s mention of following Elon Musk on Twitter and disliking the political content.

Another area of discussion revolves around the failures in the past attempts at providing internet connectivity through satellites. The analysis cites the example of Teledesic, a project funded by Bill Gates and a Saudi prince, which failed in the 90s due to technological limitations. It is noted that at that time, the technology and economics did not support internet connectivity via satellites. The limitations in technology made it economically unviable as the internet was primarily text-oriented and had limited technological capacity.

The analysis also includes Larry Press’s viewpoint that connectivity should be affordable based on what people can afford. He argues that if people in an area or nation cannot afford connectivity to services like SpaceX, it implies they have excess capacity. Therefore, he suggests that adjusting prices according to an area’s available capacity would be more feasible.

Furthermore, Larry Press criticizes Elon Musk’s initial pricing structure for SpaceX, stating that it was unrealistic. He points out that Musk initially stated he would charge the same price everywhere, but different rates are now used in different countries. This observation highlights a disparity between the initial intentions and the current pricing policies.

In conclusion, the analysis provides an in-depth exploration of optical laser communication, its advantages and challenges, ongoing research and development, as well as potential skepticism towards its success. It also examines the criticism directed towards Elon Musk for his political posts on Twitter and highlights the failures in past attempts at internet connectivity through satellites. Additionally, it presents Larry Press’s viewpoint on affordability and pricing, emphasizing the importance of adjusting prices according to capacity and income levels. These insights contribute to a comprehensive understanding of the subject matter.

Kulesza Joanna

The panel discussion will delve into the intricacies of data governance in broadband satellite services, with a specific focus on satellite infrastructures and internet connectivity. Comprising seasoned experts in the field, the panel boasts a wealth of experience in both low Earth orbit satellites and internet connectivity. They will shed light on the technological aspects of these systems while also examining the regulatory constraints that come into play, including those imposed by SpaceX.

In addition to exploring the technical and regulatory dimensions, the panel will address the impact of regulations within different jurisdictions. Recognising that various countries may have differing approaches to governing satellite connectivity and internet access, this discussion aims to shed light on the potential consequences of these divergent regulatory frameworks. Civil society feedback, often instrumental in shaping policies and regulations, will also be taken into consideration.

One of the speakers, Kulesza, brings a unique perspective to the table. Working on an ISAC foundation project, she is deeply involved in comprehending the legal framework underpinning low Earth orbit satellites and internet connectivity. To emphasise the significance of this understanding, Kulesza stresses the need to discuss the regulatory impacts that governments attempt to enforce across different jurisdictions. By examining these impacts with a critical lens, the panel hopes to foster a more comprehensive understanding of the legal dimensions surrounding satellite infrastructures and internet connectivity.

Furthermore, the panel recognises the importance of community engagement in these discussions. To facilitate a fruitful exchange of ideas, the audience will be encouraged to participate by posing questions or sharing comments through the chat function. Alternatively, they can wait until the dedicated Q&A session to provide their feedback. This commitment to fostering dialogue and incorporating diverse perspectives aligns with the broader goal of partnership for the goals, as outlined in SDG 17.

In conclusion, the panel discussion on data governance in broadband satellite services promises to offer valuable insights into the technological, regulatory, and legal aspects of satellite infrastructures and internet connectivity. Through the expertise of the panelists and active audience participation, this discussion seeks to advance our understanding of the challenges and opportunities in this rapidly evolving field.

Speakers

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

Building a Global Partnership for Responsible Cyber Behavior | IGF 2023 Launch / Award Event #69

Table of contents

Disclaimer: This is not an official record of the IGF session. The DiploAI system automatically generates these resources from the audiovisual recording. Resources are presented in their original format, as provided by the AI (e.g. including any spelling mistakes). The accuracy of these resources cannot be guaranteed. The official record of the session can be found on the IGF's official website.

Knowledge Graph of Debate

Session report

Pablo Castro

Chile’s new national cybersecurity policy places a strong emphasis on promoting international norms and applying international law in cyberspace. This commitment is vital for achieving the goals outlined in SDG 9 (Industry, Innovation and Infrastructure) and SDG 16 (Peace and Justice). The policy reflects Chile’s dedication to upholding principles that respect human rights and international law in cybersecurity operations. Chile began working on cybersecurity in 2017 and released its cyberdefense policy in 2018, which stated that cyber operations would be conducted with respect for international law and human rights. The upcoming national cybersecurity policy reaffirms Chile’s commitment to promoting international norms and law in cyberspace.

In Latin America, there is a need for further discussion on attribution in cyber attacks. Unlike other regions, there is little dialogue about responsibility for cyber attacks. Governments in Latin America must decide whether publicly attributing an attack to a foreign power is beneficial. This highlights the need for comprehensive conversations and analysis on attribution in the region.

Capacity building and international cooperation are crucial for cybersecurity in Latin America. A lack of national cybersecurity agencies is often seen, with governance falling under committees. However, training courses offered by countries such as the US, Canada, Estonia, and the UK are helping enhance capacity building efforts. These courses focus on applying international law in cybersecurity and play a critical role in equipping Latin American countries with the necessary skills and knowledge to combat cyber threats effectively.

It is stressed that Chile needs to develop a national position on international law in cyberspace. The new cybersecurity policy mandates the establishment of this position. Defining Chile’s stance and approach towards international law in cyberspace is essential to ensure consistency and effectiveness in its cybersecurity efforts.

Regarding cyber attack response, a collective approach in the region is recommended as an effective way to express condemnation without attributing the attack directly to a specific actor. This approach allows for a unified stance against cyber attacks, maintaining diplomatic relations and avoiding unnecessary conflicts.

Pablo Castro, an expert in cybersecurity and related areas, supports discussions taking place in United Nations working groups on emerging threats and technologies such as artificial intelligence and cyber mercenaries. His previous experience in dealing with these issues, particularly in the field of cyber mercenaries, further underscores the importance of these discussions. However, caution is expressed regarding potential difficulties and disagreements in reaching a consensus within the working group. Maintaining a good working relationship among members is prioritised to ensure the effectiveness of the discussions.

In conclusion, Chile’s new national cybersecurity policy highlights the importance of promoting international norms and applying international law in cyberspace. This commitment aligns with the goals of SDG 9 and SDG 16, aiming to foster innovation, ensure infrastructure security, and promote peace and justice. Latin America faces challenges in attributing cyber attacks and requires further discussion. Capacity building and international cooperation are crucial for the region, with training opportunities provided by the US, Canada, Estonia, and the UK. Chile is encouraged to develop a national position on international law in cyberspace to enhance consistency and effectiveness. Furthermore, a collective response to cyber attacks in the region is recommended to express condemnation without directly attributing the attack to a specific actor. Discussions in the United Nations working groups, supported by Pablo Castro, are of vital importance in addressing emerging threats and technologies, while maintaining a good working relationship within the group.

John Hering

The Cybersecurity Tech Accord is a coalition of 168 tech companies from around the world committed to upholding foundational cybersecurity principles. It was established in 2018 with 34 companies and has grown quickly in size and influence. The primary objective of the accord is to give the tech industry a voice on matters of peace and security in the online realm.

One of the driving forces behind the growing interest in joining the Cybersecurity Tech Accord is the pressure from customers, as cyberspace has become an emerging domain of conflict. Companies feel the need to clarify their stance on not weaponising their products and services. This pressure compels companies to actively participate in initiatives like the accord to demonstrate their commitment to cybersecurity principles.

However, a challenge for the accord is getting companies with different capacities on the same page. While some are large multinational corporations with significant resources, others may not have the same level of resources. Bridging this gap is an ongoing challenge.

The accord advocates for coordinated vulnerability disclosure policies. It encourages companies to have these policies in place to address and disclose potential vulnerabilities in a timely and responsible manner. Over 100 coordinated vulnerability disclosure policies from the accord’s signatory base can be reviewed online.

Microsoft, a prominent member of the accord, has played a significant role in the context of the war in Ukraine. The company has prioritised strengthening security for its customers in the region and has responded to multiple generations of wiper malware used in operations targeting Ukrainian data. Microsoft also actively reports its findings in the context of the conflict, providing insights into the activities of broad threat actor groups aligned with military campaigns.

The importance of a robust multi-stakeholder coalition is highlighted, particularly in the context of hybrid warfare. The accord, which includes both private sector companies and public agencies, can provide asymmetric benefits to defenders as hybrid warfare becomes a domain of conflict. The collaborative efforts of the Ukrainian CERT, which had the necessary authorisations and coordinated efforts effectively, have been crucial in thwarting cyber operations in the Ukraine conflict.

Policymakers are urged to carefully consider the impact of their regulations on the security research community. John Hering, a cybersecurity expert, raises concerns about potential negative consequences if regulations do not prioritise fixing vulnerabilities and ensuring customer and user security. Poorly considered policies may inadvertently compromise product security and data safety by creating a race to the bottom.

On a positive note, accountability in cybersecurity is improving. Governments are taking steps to include norms violations in public attribution statements, and the International Criminal Court (ICC) has declared its intention to investigate potential cyber-enabled war crimes. These developments demonstrate progress in holding actors accountable for their actions in the cyber realm.

Overall, the Cybersecurity Tech Accord has garnered significant support and interest from tech companies worldwide. Its commitment to foundational cybersecurity principles and efforts to give the industry a voice in online peace and security are noteworthy. Challenges remain in bringing companies with different capacities together, but the focus on coordinated vulnerability disclosure policies and the active role of Microsoft in securing customer data in the Ukraine conflict show the practical impact of such collaborative initiatives. Policymakers must be cautious in crafting regulations that consider the impact on the security research community. Nevertheless, positive strides in accountability in cybersecurity, with government actions and ICC involvement, indicate progress in creating a safer and more secure online environment.

Koichiro Komiyama

The analysis reveals several important points regarding cybersecurity incident reporting and vulnerability information sharing. In Japan’s case, it is highlighted that sharing information with JP CERT (Japan Computer Emergency Response Team) or the National Cybersecurity Centre is crucial for effective incident handling. On the other hand, the US Securities and Exchange Commission has introduced a new regulation that requires financial institutions to disclose any cybersecurity incidents they experience.

However, it is noted that the role of CSERT has slightly changed. The specific details of this change are not provided, but it suggests that there may be some adjustments or updates in the way CSERT operates in handling cybersecurity incidents.

JP CERT, being a key player in incident reporting and response in Japan, receives around 20,000 incidents per year. This indicates the scale of the cybersecurity challenges faced by the country. Furthermore, JP CERT predominantly communicates with entities in the United States and China, indicating the importance of international cooperation in dealing with cybersecurity issues.

One of the supporting facts provided highlights a negative incident involving a Chinese security researcher. After identifying a vulnerability issue, the researcher promptly shared the information with Log4j developers. However, the researcher was subsequently summoned by Chinese authorities. This incident raises concerns about the potential hindrance to global information sharing and collaboration on cybersecurity matters.

The analysis also suggests that cyberspace is not as global as imagined, with over 80% of JP CERT’s incident engagements involving the US and China. This indicates that despite the interconnected nature of the internet, there are still significant gaps in global information sharing and cooperation in the realm of cybersecurity.

Another significant point raised is the localization of data and vulnerability information. This localization hinders global information sharing and collaboration, resulting in a chilling effect among Chinese security researchers. The introduction of regulations in China has had an impact on the willingness of researchers to share valuable vulnerability information due to potential legal repercussions.

The speakers argue that regulations should not hinder international information sharing and that vulnerability information should not be localized. They emphasize the importance of global cooperation and partnership in addressing cybersecurity challenges effectively. By overcoming barriers to information sharing and collaboration, the international community can collectively work towards a more secure cyberspace.

In conclusion, the analysis highlights the need for effective incident reporting and vulnerability information sharing in cybersecurity. It underscores the significance of international cooperation and the potential implications of regulations on global information sharing. The argument is made for regulations that foster collaboration rather than hinder it, ensuring that vulnerability information is not localized and that the global community can work together to address cybersecurity threats.

Charlotte Lindsey

The Cyber Peace Institute is an organisation dedicated to studying the impact and harms caused by cyber attacks. They recognise the importance of having evidence and data-driven understandings of the harm inflicted by these attacks. They emphasise the need for a context-aware approach to accurately calculate the harms and impacts.

One of the main concerns highlighted by the institute is the increasing targeting of vulnerable communities, specifically humanitarian, human rights, and development organisations, by cyber attacks. To help these organisations respond and enhance their capabilities, the institute has established a humanitarian cybersecurity centre and a cyber peace builders programme. This initiative aims to support these organisations in preventing and responding to cyber attacks effectively.

Understanding the impacts of cyber attacks on vulnerable communities is crucial for policy-makers. The institute believes that lessons learned from data analysis can be injected into policy discussions to develop efficient strategies and measures to address the issue.

During the height of the pandemic, attacks on healthcare infrastructure became a significant concern. Critical healthcare infrastructure experienced an alarming increase in cyber attacks. In response, the Cyber Peace Institute collaborated with the government of the Czech Republic and Microsoft to develop a compendium of best practices aimed at protecting the healthcare sector from cyber harm. This initiative provides guidance and recommendations for safeguarding healthcare facilities and systems from cyber threats and vulnerabilities.

The institute also stresses the need for clear accountability for breaching cybersecurity laws and norms. They are actively monitoring 112 different threat actors related to the Ukraine and Russian conflict. By holding these actors accountable, the institute aims to deter future cyber attacks and ensure a safer cyber environment.

In conclusion, the Cyber Peace Institute’s work revolves around deepening the understanding of cyber attack impacts and harms. They actively support vulnerable communities through their humanitarian cybersecurity centre and cyber peace builders programme. Their collaboration with the government and industry partners highlights the importance of protecting critical healthcare infrastructure from cyber threats. Additionally, the institute advocates for clear accountability to prevent future breaches of cybersecurity laws and norms. Overall, their efforts contribute to creating a more secure and peaceful digital space.

Regine Grienberger

Germany is actively taking steps to strengthen the normative framework for cyber behaviour. They are dedicated to implementing, monitoring, capacitating, and attributing cyber incidents. To protect critical infrastructure, Germany is developing national legislation in alignment with the EU directive. This signifies their commitment to safeguard essential systems and services from cyber threats.

In order to promote transparency and the sharing of best practices, Germany intends to document its progress in implementing cyber norms. By doing so, they hope to contribute to an international dialogue on cybersecurity and encourage other nations to adopt similar measures.

Germany has also established a national attribution procedure, which is coordinated by the Foreign Ministry. This procedure involves conducting comprehensive analyses and making informed political judgments regarding cyber incidents. By attributing cyber attacks, Germany aims to hold perpetrators accountable and deter future malicious activities.

Moreover, Germany recognises the importance of attributing cyber incidents as an essential practice. They believe that it is both achievable and necessary to respond effectively. Germany’s attribution procedure involves extensive analysis and political judgment, demonstrating their commitment to accurately identify and assign responsibility for cyber attacks.

Furthermore, within the context of the European Union diplomatic toolbox, sanctions are considered an instrument for responding to cyber incidents. This highlights Germany’s support for using sanctions as a means to deter and punish those responsible for cyber attacks. By leveraging sanctions, the EU aims to send a strong message that cyber aggression will not be tolerated.

In conclusion, Germany is actively working towards strengthening the normative framework of cyber behaviour through various means. Their efforts include developing national legislation, establishing a national attribution procedure, documenting progress in implementing cyber norms, and supporting the use of sanctions as a response to cyber incidents. These initiatives showcase Germany’s commitment to promoting cybersecurity, accountability, and international cooperation in tackling cyber threats.

Eugene EG Tan

This comprehensive analysis examines the viewpoints presented by Eugene EG Tan on various aspects of cybersecurity research and responsible behavior. Eugene expresses genuine excitement about a project that takes a broad perspective on cybersecurity, inclusive of diverse stakeholders such as states, industry, civil society, and academia. He believes that the project’s wide consultation and intersectionality greatly contribute to the richness of insights generated.

In terms of academic research in cybersecurity, Eugene argues that it has historically been limited to documenting state actions on an individual or regional level. He identifies a critical need for the development of universal measures of responsibility that can be applied across different contexts. Eugene suggests that this lack of common measurement has impeded progress in defining responsibility in the field of cybersecurity.

Furthermore, Eugene advocates for a collaborative and region-interactive approach within the academic community to enrich cybersecurity research. He highlights that academics often tend to focus on individual contexts or specific topics, but funding opportunities are now emerging, enabling cross-regional interactions. By broadening the conversation and understanding different contexts, this inclusive approach can greatly enhance the overall quality of cybersecurity research.

Controlling for cultural and contextual variables across different regions and states in a global study proves to be a significant challenge. Eugene acknowledges the difficulty in establishing a baseline definition of responsible behavior when conducting research on such a broad scale.

To address this challenge, Eugene suggests that it would be reasonable to identify common aspects of responsible behavior while also acknowledging deviations from the norm. This approach would help establish a baseline definition of responsible behavior and provide valuable insights into how the concept of responsibility varies across different states or businesses.

Eugene also emphasizes the crucial importance of implementing additional measures to ensure responsible behavior in cybersecurity. He believes that it is of utmost importance to determine how these measures can be effectively implemented to mitigate irresponsible behavior, subsequently benefiting the entire cybersecurity community.

Accountability and transparency are highlighted as key concerns in the use of commercial spyware. Eugene points out the lack of transparency surrounding the utilization of such tools and the pressing demand for a systematic focus on providing redress for victims. He argues for a coordinated response that effectively shapes the political and normative environment related to spyware. Furthermore, the ability to attribute responsibility becomes crucial in holding individuals accountable for their actions.

Eugene also supports the notion of state responsibility in protecting human rights and holding violators accountable. He emphasizes that states have a legal obligation to protect and promote human rights. Eugene fervently advocates for individual and collective action by states in bringing perpetrators of abuses, such as abusive surveillance technology, to account. He emphasizes the importance of relying on legal avenues, such as formal investigations and subsequent legal cases against the financiers and commissioners of abusive surveillance technology.

In conclusion, Eugene EG Tan highlights the need for a comprehensive perspective in cybersecurity research, the development of universal measures of responsibility, and a collaborative approach within the academic community. He emphasizes the challenges of controlling cultural and contextual variables in global studies, the critical importance of implementing additional measures to ensure responsible behavior, and the urgent need for accountability and transparency in the use of commercial spyware. Furthermore, Eugene supports state responsibility in protecting human rights and holding violators accountable.

Louise Marie Hurel

The analysis explores various perspectives on responsible cyber behavior and the challenges associated with its implementation. It highlights the importance of understanding different interpretations of responsibility in cyberspace, especially in different contexts. The global partnership, which involves over 70 scholars, aims to map practical understandings of responsible cyber behavior and how it is interpreted by different stakeholders. It emphasizes the need to give a voice to less dominant countries, as their interpretations of responsibility are often overshadowed by larger powers.

In promoting responsible state behavior, capacity building and proper implementation of cyber norms are seen as crucial. Germany, for example, has established a national attribution procedure to hold malicious actors accountable, while Regine Grienberger emphasizes the importance of monitoring and sharing information on the implementation process. However, it is also noted that attribution should be a political decision based on effect-based and responsible analysis, rather than an automatic step towards sanctions. There is a growing desire for sanctions in response to malicious behavior, with the EU having the instrument of sanctions in its diplomatic toolkit.

The analysis also stresses the involvement of other actors, such as the private sector, academia, and civil society, in promoting responsible cyber behavior. Louise Marie Hurel argues for more space to be given to less dominant countries in the debate, including private sector companies like Microsoft. She also highlights the role of academia and research in the global cybersecurity landscape, emphasizing the need to connect researchers with the realities on the ground. Hurel acknowledges the multifaceted aspect of cybersecurity, which encompasses statecraft, private sector involvement in conflict situations, and civil society engagement.

Trust-building and better interregional channels are also deemed essential for advancing responsible cyber behavior. Hurel mentions the Point of Contact directory within the Confidence Building Measures at the Organization of American States as an area for development. Furthermore, the analysis highlights the importance of creating a common understanding of responsible behavior in different states and regions, as well as identifying deviating elements in norms across different states to better understand variations in perceptions of responsibility.

The analysis also explores the nuanced implications of state regulations on cybersecurity. While regulations are necessary to ensure vulnerability disclosures and establish necessary procedures, there are concerns about whether these regulations hinder communication channels that are already established. Hurel advocates for careful contemplation and assessment when developing regulations to ensure effective communication channels and feasible job roles.

In conclusion, the analysis underscores the need for understanding different interpretations of responsibility in cyberspace, providing a voice to less dominant countries, capacity building, proper implementation of cyber norms, the role of sanctions and attribution in promoting responsible state behavior, the involvement of the private sector, academia, and civil society, trust-building and interregional communication, and the nuanced implications of state regulations on cybersecurity. It highlights the multifaceted aspect of cybersecurity and the importance of research and academia in connecting with real-world issues. The significance of creating a common understanding of responsible behavior and identifying variations in norms across different states is also emphasized.

Speakers

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

Book presentation: “Youth Atlas (Second edition)” | IGF 2023 Launch / Award Event #61

Table of contents

Disclaimer: This is not an official record of the IGF session. The DiploAI system automatically generates these resources from the audiovisual recording. Resources are presented in their original format, as provided by the AI (e.g. including any spelling mistakes). The accuracy of these resources cannot be guaranteed. The official record of the session can be found on the IGF's official website.

Knowledge Graph of Debate

Session report

Audience

Upon analysing the statements presented by the speakers, several key points emerge regarding internet governance and youth engagement. Firstly, mentorship is highlighted as a crucial factor for newcomers in the field. A speaker mentions being mentored by a veteran from Brazil, named Davi, who had a significant impact on their career and understanding of internet governance. The role of mentorship in shaping one’s understanding and participation in internet governance is cited as a crucial factor.

Additionally, there is an advocacy for improved communication strategies to engage more people, particularly youths, in internet governance. The speaker acknowledges the relevance of studying communications in relation to internet governance. They also praise the Youth Atlas initiative as an example of successful attempts to engage youths from diverse backgrounds in internet governance.

Furthermore, the significant participation of young people at recent events is emphasised. Youth involvement, especially at the Latin American Caribbean IGF, was notable, as large numbers of sessions were proposed by youths and their voices were heard, demonstrating their active involvement in the field.

In terms of inclusion, the importance of including more voices from indigenous people, people with disabilities, and other minorities is stressed. The need for diversity and representation within the field of internet governance is emphasised, indicating the desire for a more inclusive and equitable environment.

Moreover, the speakers highlight the significance of speaking out, even in the face of adversity. They encourage individuals to persevere, even if they are nervous or make mistakes in English pronunciation, emphasising the importance of having the confidence to voice opinions and engage in discussions.

The value of youth participation in the tech space is also recognised. The speaker, who was once a newcomer but has now become a veteran with numerous connections in the tech industry, explores youth involvement in the policy network concerning internet fragmentation, which was presented in the main session.

The aspect of learning and development in the tech space is emphasised, with the speaker emphasising that support is readily available and there is always a learning curve present. The journey of development is acknowledged, with appreciation extended to everyone involved in the process.

Moreover, youth participation programs at internet governance events are considered valuable. The speaker’s own career trajectory serves as an example, highlighting the positive impact of such programs on career development and networking opportunities.

Persistence and dedication are identified as essential qualities for personal growth. The speaker shares their own journey of progress and growth, attributing it to persistence in pursuing their goals and aspirations.

Furthermore, the growing relevance of issues such as privacy and AI within the field of internet governance is acknowledged. The importance of these issues is substantiated by the observation that there is an increase in investment and attention directed towards them over time.

In conclusion, the analysis of the statements reveals the importance of mentorship for newcomers in the internet governance field, as well as the need for improved communication strategies to engage more people, especially young people. The substantial participation of young people at recent events underscores the importance of youth involvement. Inclusion, diversity, and representation are highlighted as crucial elements for a more equitable environment. The significance of speaking out, youth participation in the tech space, and support for learning and development are recognized. The growing relevance of issues like privacy and AI indicates the evolving landscape of internet governance.

Juliana Novaes

The Youth Atlas is a comprehensive documentation of the experiences and journeys of young individuals in the internet governance ecosystem, specifically those who have participated in IGF fellowship programs. The idea for this initiative stemmed from discussions about measuring the impact of these programs on young participants. The inaugural edition of the Youth Atlas was launched in 2019 at the IGF Berlin, marking an important milestone for this resource.

Despite progress in youth representation within the IGF, challenges persist within the internet governance sphere. These challenges, although less prominent now, continue to hinder the full engagement of young people. Difficulties in obtaining approval for IGF sessions and securing funding to attend events are some of the barriers they face.

Notably, youth initiatives in internet governance heavily rely on volunteer work and personal time dedicated by individuals. The inaugural edition of the Youth Atlas was completed in under three months by a team of volunteers, who have all been acknowledged and credited in the book. This highlights the importance of individual passion and commitment in promoting youth involvement.

Greater youth involvement is essential for fostering a healthier and more collaborative culture within internet governance. The Youth Atlas serves as a source of pride and inspiration for young individuals in the field, aiming to encourage more initiatives that empower and support their participation. By amplifying their voices and experiences, the Youth Atlas strives to create a platform for youth-centric initiatives that contribute to inclusive and progressive internet governance.

In conclusion, the Youth Atlas is a valuable record documenting the journeys of young individuals in the internet governance ecosystem, particularly those involved in IGF fellowship programs. While challenges persist, efforts are being made to address them, recognizing the significant role of youth initiatives in shaping the future of internet governance. By promoting youth involvement and providing inspiration and resources, the Youth Atlas aims to contribute to a more inclusive and collaborative internet governance landscape.

Veronica Piccolo

The meeting introduced the second edition of the Youth Atlas, which focuses on tracking the pathways and impact of young people in internet governance. It serves as a comprehensive tool for understanding and highlighting the role of young people in this field.

During the meeting, a key emphasis was placed on clear communication. Participants were encouraged to speak clearly and at a reasonable pace to ensure effective communication. The Q&A session also encouraged questions from both on-site and online participants, promoting an environment of open dialogue and information sharing.

In addition, maintaining a respectful and inclusive environment was highlighted. Participants were requested to uphold respect and inclusivity both in the physical meeting space and in online interactions. This focus on inclusivity is aligned with the Sustainable Development Goals of Gender Equality (SDG 5) and Reduced Inequalities (SDG 10), aiming to create an environment that fosters equal participation for all.

The Youth Atlas is divided into four sessions, each addressing a specific aspect of youth engagement in internet governance. The first session focuses on data and statistics, providing an overview of the development of youth engagement over the past two or three years. The second session entails interviews with individuals who have been engaging in internet governance for three or more years, offering insights from experienced participants. The third session is dedicated to newcomers, providing them with relevant information and resources to get started in the field. Finally, the fourth session focuses on youth programs, highlighting their significance and impact in the internet governance landscape.

Despite the challenges faced during the creation of the Youth Atlas, such as a tight timeframe of less than three months, the process demonstrated dedication and international cooperation. Volunteers from diverse countries contributed to the project, showcasing the importance of youth engagement in internet governance.

The Youth Atlas aims to inspire, empower, and promote personal growth among young people in the internet governance sector. It highlights the contributions and achievements of young people, validating their roles within the internet governance ecosystem. This aligns with the Sustainable Development Goals of Industry, Innovation, and Infrastructure (SDG 9), Gender Equality (SDG 5), Reduced Inequalities (SDG 10), and Quality Education (SDG 4).

The meeting also acknowledged and appreciated youth participation and initiatives. Anja Gengo was specifically recognized for empowering youth and encouraging their participation in IGF initiatives. The positive influence that young people can have on senior stakeholders was also acknowledged, with Veronica Piccolo and Emilia working together to set up a youth IGF in Ethiopia.

Veronica expressed excitement and admiration for Pyrate Ruby Passell, who became the youngest person in the IGF youth track at the age of 14. Pyrate’s extensive involvement in the internet governance environment since joining a year ago was also commended. Veronica showed curiosity and interest in understanding Pyrate’s experience as a younger member in the IGF.

Veronica also expressed interest in Pyrate’s activities within the Teen Dynamic Coalition, highlighting their contribution as one of the highlights in the Youth Atlas. The book features both a printed version and a digital edition, with the digital edition including interactive content such as QR codes linking to video interviews and a Spotify playlist curated by Pyrate.

Overall, the meeting emphasized youth empowerment, career and skill development, and the importance of youth engagement within the European community. The Youth Atlas publication was highly recommended, with young participants invited to obtain a copy. The progress made in youth engagement and initiatives since the first edition of the Atlas in 2019 was acknowledged, reflecting global youth engagement in internet governance.

Anja Gengo

The Youth IGF initiatives have seen significant growth in youth engagement through the organization of webinars and summits in various parts of the world. These events have successfully attracted thousands of young people from all over the globe, demonstrating the increasing interest and involvement of youth in important global issues. By providing a platform for dialogue and capacity development, such as the Youth Summit held in Poland, these initiatives have created spaces for both senior and junior leaders to come together and exchange ideas. This intergenerational dialogue is crucial in fostering leadership and partnership for the achievement of the Sustainable Development Goals (SDGs).

The IGF Secretariat has been actively working towards simplifying the process and channels for youth engagement. They have organized capacity development workshops in regional IGFs to enhance the skills and knowledge of young participants. These efforts aim to provide easier access and avenues for youth to contribute to discussions on topics such as quality education and industry innovation and infrastructure, which are central to the SDGs.

The IGF meetings, held in Finland, Colombia, Australia, and Nigeria, have played a vital role in taking youth engagement to a global level. These meetings, organized by different youth IGFs, have provided opportunities for young people to participate and contribute on an international scale. This has expanded the reach and impact of youth engagement, moving beyond the conference level and facilitating meaningful involvement in global conversations.

Despite the challenges faced, the enthusiasm and energy demonstrated by young people in these initiatives give confidence for a bright digital future. Many young participants are digital natives, equipped with the necessary skills and knowledge to navigate the digital world. Their involvement in global initiatives contributes to the promotion of decent work and economic growth. It also highlights the importance of embracing digital advancements in shaping a promising future.

The 18th IGF meeting was considered a success from the youth perspective due to the commitment and dedication demonstrated by young participants. Their active involvement and contributions have made a significant impact on the meeting’s outcomes and discussions. This success further facilitates the recognition and value of youth engagement in shaping policies and partnerships for the SDGs.

Anja, an important figure in the Youth IGF initiatives, expressed appreciation for the engagement of young people and expressed commitment to supporting their continued connection and exchange. Anja also extended an open invitation for organizations to invite her to their IGFs, highlighting the enthusiasm for attending and learning from other initiatives and events.

In conclusion, the Youth IGF initiatives have experienced significant growth in youth engagement through various activities such as webinars, summits, and regional IGFs. These initiatives have provided platforms for dialogue, capacity development, and have successfully taken youth engagement from local to global levels. The dedication and commitment of young participants have played a crucial role in the success achieved so far. The enthusiasm and energy exhibited by young people indicate a positive outlook for a bright digital future. Anja’s appreciation for youth engagement and her willingness to engage with other initiatives further emphasizes the importance of youth involvement in global conversations.

Jenna Fung

During the analysis, several key points emerged from the speakers’ arguments. One prominent theme was the positive sentiment towards youth participation in ongoing matters. The speakers highlighted examples of individuals like Nadia and Jenna, who have made significant contributions to various platforms and initiatives. These examples served to demonstrate the value and impact of youth involvement in addressing important issues.

Another argument put forth was the necessity of giving youth a place in decision-making processes. The speakers argued that youth participation can help to reduce inequalities and contribute to decent work and economic growth. By involving young people in decision-making at all levels, it was believed that more inclusive and effective solutions could be achieved. Jenna’s experience in the Asia Pacific Youth Internet Governance Forum was cited as a compelling example of how youth participation in decision-making can lead to positive outcomes.

Furthermore, the importance of youth initiatives was emphasized. The speakers acknowledged the energy and passion demonstrated by newcomers in the field of youth initiatives. They also mentioned that although there are many acronyms related to youth initiatives, not everyone may be aware of platforms like the Global Youth Summit. This highlights the need for increased awareness and support for such initiatives to ensure their continued success and impact.

The analysis also revealed a strong emphasis on the need for ongoing efforts for youth development. A colleague’s quote emphasizing the importance of continuous efforts and future planning beyond a single session highlighted the belief that sustained commitment is necessary to bring about long-term positive change for young people. This sentiment underscored the idea that youth development requires continuous investment and attention.

Finally, the analysis emphasized the significance of youth involvement in policy-making. The speakers put forward the viewpoint that “nothing for youth without youth,” indicating the importance of ensuring that young people have a voice in decisions that affect them. Jenna’s perspective on the significance of young people’s voices in decision-making further reinforced the argument for greater inclusion of young people in policy-making processes.

Overall, the analysis revealed a positive sentiment towards youth participation and highlighted the benefits of involving young people in decision-making, supporting youth initiatives, and making ongoing efforts for youth development. These insights underscore the importance of recognizing and empowering the youth population as key contributors to achieving sustainable development goals.

Nadia Tjahja

According to the analysis, there is a growing consensus that youth should have a more significant role in Internet Governance Forums (IGFs). This is because young people have the potential to provide concise, clear, and visible ideas that can greatly contribute to the content and structure of these events. It is believed that involving the youth in IGFs can lead to fresh perspectives, innovative approaches, and effective solutions.

Furthermore, meaningful participation in IGFs requires more than just being present. It involves being well-informed, engaging in consultation, and assuming leadership roles. This concept of meaningful participation is seen as a process that contributes to the constant change in the IGF ecosystem. It is viewed as a way to strengthen the decision-making processes and ensure that all stakeholders, including the youth, have a voice in shaping the Internet governance landscape.

To support the youth in their involvement with IGFs, it is suggested that the IGF should create opportunities that foster their growth and leadership. This can be achieved by working in partnership with the youth to create specific structures and spaces that cater to their needs and interests. Additionally, young people should be given the chance to take on positions as session organizers or collaborate with the IGF Secretariat. These actions would not only enhance youth participation but also contribute to the achievement of the Sustainable Development Goals related to decent work and economic growth, along with reduced inequalities.

Overall, there is a positive sentiment towards youth involvement and meaningful participation in IGFs. The analysis highlights the potential benefits that can arise from including the youth and emphasizes the need to create an environment that encourages their active engagement and contribution. By embracing the ideas and voices of the youth, IGFs can truly become more inclusive, dynamic, and representative of the diverse perspectives and needs within the Internet governance space.

Pyrate Ruby Passell

Pyrate Ruby, a 14-year-old attendee, is thrilled and proud to be the youngest participant on the IGF youth track. This marks her first time attending the IGF, and she expresses her excitement and pride in being able to contribute at such a young age. She strongly supports the idea of encouraging younger participants in the IGF and similar conventions, highlighting the importance of engaging the youth in discussions about important global issues. Her stance aligns with the goals of SDG 4: Quality Education and SDG 10: Reduced Inequalities.

Having been involved in the IGF environment for over a year, Pyrate finds the experience incredibly gratifying. She has actively participated in the IGF youth track and attended the youth summit, where she has been involved in meaningful work. The opportunity to engage with experts and other young individuals passionate about addressing global challenges has further motivated her.

However, Pyrate does find one aspect of participating in the IGF challenging – the time zone differences. As a result, she often has to stay up late, which she finds amusing but also highlights the dedication and commitment she has towards her involvement in the IGF.

Despite the challenges, Pyrate is delighted to be working with her team. She values the opportunities for collaboration and the shared sense of purpose that comes with working towards a common goal. The sense of camaraderie and teamwork contribute to her positive experience within the IGF environment.

In addition to her involvement in the IGF, Pyrate mentions a newly-formed organization called the Dynamic Teen Coalition. Although limited information is provided, it can be inferred that this organization is relevant to Pyrate’s interests and potentially connected to her work within the IGF environment.

In conclusion, Pyrate Ruby, at just 14 years old, is an enthusiastic and dedicated attendee of the IGF. She not only takes pride in being the youngest participant on the IGF youth track but also advocates for greater youth involvement in such conventions. Through her participation, she finds great fulfillment and enjoys the opportunities for collaboration and teamwork. Furthermore, her positive experience is not limited to the IGF, as she mentions the newly formed Dynamic Teen Coalition, suggesting her involvement in various initiatives aimed at empowering teenage voices.

Speakers

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

WSIS Action Lines for Advancing the Achievement of SDGs | IGF 2023 Open Forum #5

Table of contents

Disclaimer: This is not an official record of the IGF session. The DiploAI system automatically generates these resources from the audiovisual recording. Resources are presented in their original format, as provided by the AI (e.g. including any spelling mistakes). The accuracy of these resources cannot be guaranteed. The official record of the session can be found on the IGF's official website.

Knowledge Graph of Debate

Session report

Gitanjali Sah

UNGIS, the United Nations Group on the Information Society, was endorsed by the Chief Executive Board as an interagency mechanism. Its primary objective is to consolidate and address substantive issues in digital, information, and knowledge societies. This initiative has received positive sentiment and is seen as crucial in addressing the challenges faced by these societies.

UNGIS actively collaborates with other organizations to raise awareness about the importance of digital advancements. This collaboration includes making joint statements and conducting side events to highlight the significance of digital in various contexts. Notable events where UNGIS emphasized the importance of digital include the high-level political forum and the United Nations conference on Least Developed Countries (LDCs).

During the high-level political forum, UNGIS organized an event specifically focused on highlighting the importance of digital. This demonstrates their commitment to advocating for the integration of digital technologies in addressing global challenges. Additionally, at the United Nations conference on LDCs, UNGIS played an active role in discussions, emphasizing how digital advancements are essential for achieving the Sustainable Development Goals (SDGs).

Moreover, there is an argument for UNGIS to continue highlighting the significance of digital advancements in various fields. This argument is supported by specific examples, such as the Food and Agriculture Organization (FAO) focusing on the use of digital technologies in agriculture and the World Health Organization (WHO) prioritizing digital solutions in e-health. These examples further emphasize the potential benefits of incorporating digital technologies into different sectors.

In conclusion, UNGIS, endorsed by the Chief Executive Board, serves as an interagency mechanism to address the challenges faced by digital, information, and knowledge societies. Its collaboration with other organizations, as exemplified by its involvement in events like the high-level political forum and the United Nations conference on LDCs, underscores the importance of digital advancements in tackling global issues. With the increasing emphasis on digital technologies in various fields, UNGIS should continue its role in advocating for and promoting the integration of digital solutions to advance development and achieve the SDGs.

Dejan Jakovljevic

In this discussion, three main points are presented by the speakers. The first speaker emphasizes the sense of urgency in transforming agri-food systems through digitalisation. They argue that the Food and Agriculture Organization (FAO) is assisting member countries and rural communities in digitalising these systems. This implies that the FAO recognises the need for digitalisation to improve efficiency and sustainability in agriculture. The speaker presents a positive sentiment towards digitalising agri-food systems, suggesting that it is a crucial step towards achieving SDG 2 – Zero Hunger.

The second speaker focuses on the challenge posed by the lack of access to digital services in rural communities. They point out that one-third of the global population does not have access to such services, and rural populations are particularly affected. This suggests that the digital divide between urban and rural areas is a significant barrier that needs to be addressed. The negative sentiment expressed by the speaker underscores the severity of the challenge and the need for targeted interventions to bridge the digital gap in rural areas. SDG 9 – Industry, Innovation, and Infrastructure is directly related to this issue.

The third speaker highlights the need for broader coordination and guidance from UN agencies and other relevant forums. They suggest that the FAO requires assistance in reaching the last mile, implying that certain rural communities are still not benefiting from digitalisation efforts. The positive sentiment expressed by the speaker indicates the potential of UN agencies and other forums in providing guidance or recommendations to overcome this challenge. This observation emphasizes the importance of international cooperation and UN coordination in supporting the digitalisation of agri-food systems.

Overall, it is evident from the arguments presented that digitalising agri-food systems is seen as an urgent need to improve agricultural productivity and rural livelihoods. The lack of access to digital services in rural communities poses a major challenge that hampers the achievement of sustainable development goals. Broader coordination and guidance from UN agencies and other relevant forums are necessary to ensure that all communities benefit from digitalisation efforts.

Speaker 3

The analysis covers three key points related to the United Nations’ involvement in digital agendas, stakeholder participation in the GDC and WSIS processes, and the need for a clear vision of how the GDC and WSIS processes connect.

Firstly, it is emphasised that every UN body has some sort of digital mandate due to the nature of the digital realm. Examples of UN bodies with digital mandates include UNODC, ILO, OHCHR. The argument made is the importance of involving all UN bodies in the digital agenda for a comprehensive and effective implementation. This argument carries a neutral sentiment, signifying its importance without a strong positive or negative sentiment.

Secondly, there is a need to improve stakeholder participation in the GDC and WSIS processes. Stakeholders are reportedly facing difficulties in understanding how to engage and what the next steps are in these processes. This highlights a lack of clarity and guidance from the UN in facilitating meaningful stakeholder involvement. The sentiment associated with this argument is negative, highlighting the need for enhancing stakeholder participation.

Lastly, it is argued that the UN should provide a clear vision of how the WSIS and GDC processes connect. The tension and speculation surrounding the outcomes of these processes further emphasise the importance of providing clear guidance to alleviate confusion and uncertainty. The sentiment attached to this argument is also negative, suggesting a lack of clarity in understanding the interconnection between the WSIS and GDC processes.

In conclusion, the analysis suggests the need for comprehensive engagement of all UN bodies in the digital agenda, improvement in stakeholder participation in the GDC and WSIS processes, and a clearer vision of how these processes connect. The sentiments expressed highlight areas for improvement and potential challenges that need to be addressed.

Modorator

During the meeting, representatives from various organizations convened to discuss the topics of digitalisation and digital transformation. The attendees included Shizuka Murika, the CEO of digitalisation and digital transformation at UNESCO, and Sebastian Riversky, the director of digitalisation and digital transformation at GIZ. Additionally, Anka and Paul Gaskell, from GIZ and the UK Department for Science and Innovation Technology respectively, were also present.

Taichiro Fujisaki, the director of digitalisation and digital transformation at the University of California, Virginia, joined the conversation, along with Simon Ellis, Paul Blaker, and Josephine. Each participant introduced themselves and highlighted their roles and affiliations.

The attendees emphasised the significance of the issues at hand, evident from their active participation in the meeting. They discussed various aspects related to digitalisation and digital transformation, likely sharing insights and experiences from their respective organisations. However, specific details of their discussions were not disclosed in the excerpt provided.

Overall, the meeting served as a collaborative platform for professionals in the field to exchange ideas and work towards advancing digitalisation and digital transformation.

Denis Susar

The discussions highlighted the need for better integration of the work of the Technical Cooperation Group on the UN Development Account (TEC-EMOY) with the Ad Hoc Expert Group on the Digital Compact (ANGES). It was argued that this integration is vital for achieving more effective digital presence and awareness. For example, Calvin from Rwanda was mentioned as a potential addition to the United Nations Economic Commission for Africa (UNECA) and has been co-leading the global digital compact process. This showcases the importance of merging the efforts of TEC-EMOY and ANGES to foster collaboration and achieve common goals.

Another focal point of the discussions was the pressing need for increased work on digital presence in the most populous cities. The United Nations Department of Economic and Social Affairs (UNDESA) is actively engaged in conducting a United Nations e-government survey, revealing a commitment to addressing this matter. It was highlighted that out of the 193 member states of the United Nations, only 147 of them had an online presence. This illustrates a concerning digital divide and underlines the necessity for concerted efforts to bridge this gap and ensure digital access and presence for all.

The importance of coordination for the World Summit on the Information Society (WSIS) plus 20 reviews was also emphasized. The WSIS action lines, which were initially established in 2005, were brought into question regarding their continued relevance. With the rapid advancements in technology since their inception, there were discussions on whether all the existing action lines should still be maintained or if new ones should be introduced. It was suggested that the WSIS action line review carried out by the International Telecommunication Union (ITU) and the WSIS Action Line review conducted by the United Nations Conference on Trade and Development (UNCTAD) should collaborate and coordinate their efforts to maximize the impact of their reviews.

In conclusion, the need for better integration between TEC-EMOY and ANGES to enhance digital presence and awareness, the urgency of addressing digital presence in the most populous cities, and the importance of coordinated efforts for the WSIS plus 20 reviews were all highlighted. The discussions revealed a collective optimism for a smoother negotiation process and thorough coordination during the WSIS plus 20 review. These insights provide valuable guidance for future actions in advancing digital development and bridging the digital divide.

Speaker 5

The analysis features three speakers discussing various topics. The first speaker underscores the significance of providing equitable access to information for everyone. They highlight that students in their 20s do not frequently visit the United Nations (UN) site to stay informed about global events. To address this issue, the speaker suggests that the UN should offer easily accessible links to its resources, ensuring that all students can access the information they require.

The second speaker argues for targeted marketing strategies based on demographics, specifically age. They note that young students do not regularly visit the UN site and highlight the absence of the UN on popular platforms like Instagram, which are frequently used by young people. To effectively engage with this demographic, the speaker suggests that the UN should invest in targeted marketing campaigns on platforms frequented by young people.

Moving on to the third speaker, they express the viewpoint that young people in developing countries should adopt sustainable practices instead of following the harmful development strategies employed by developed countries in the past. The speaker notes that some students from China and other developing countries hold the belief that since developed countries have previously contributed to global pollution, they too have the right to do so. The speaker argues against this mentality and advocates for the adoption of sustainable practices to mitigate the negative impact on the environment. By encouraging sustainable practices, the speaker suggests that young people can play a crucial role in achieving the Sustainable Development Goals related to climate action and responsible consumption and production.

Overall, the analysis highlights the need for equitable access to information, targeted marketing strategies based on demographics such as age, and the importance of encouraging sustainable practices among young people in developing countries. By addressing these issues, the speakers believe that progress can be made towards reducing inequalities, promoting quality education, and achieving peace, justice, and strong institutions, as outlined by the Sustainable Development Goals.

Speaker 1

The United Nations Global Initiative on Science and Innovation for Sustainable Development (UNGIS) acts as a collaborative platform for UN agencies to cooperate and coordinate their efforts. This is achieved through various initiatives such as joint events and statements. Prateek suggests that UNGIS serves as an avenue for UN agencies to work together, as demonstrated by their joint events and statements.

The UN Sustainable Development Goals (SDGs) are supported through digital transformation and development at the country level. The UN SDG Fund is launching a digital window to catalyze digital transformation and development. This initiative aims to leverage digital technologies to accelerate progress towards the SDGs.

UNCTAD, ITC, and UPU actively work towards helping developing countries benefit from the digital economy. The E-Trade for All initiative, launched by UNCTAD, involved 35 partner organizations. Moreover, UNCTAD’s mandate was renewed in 2021 to strengthen its work in the digital economy. This signifies a shift in focus towards supporting developing countries in embracing the opportunities offered by digitalization.

UNCTAD also emphasizes gathering data on digital trade. Guidelines for collecting data on digital trade have been developed in collaboration with the International Monetary Fund (IMF) and the World Trade Organization (WTO). This demonstrates UNCTAD’s commitment to understanding and promoting digital trade, which is crucial for shaping effective policies.

Furthermore, UNCTAD collaborates with the International Telecommunication Union (ITU) and the International Trade Centre (ITC) to manage e-business. Their joint efforts aim to foster an enabling environment for electronic business, further supporting the digital economy.

Additionally, UNCTAD provides sectoral service and substance support to the UN Commission on Science, Technology, and Development (CSED). This involves reviewing the World Summit on the Information Society (WSIS), highlighting UNCTAD’s commitment to advancing science, technology, and innovation within the UN system.

The annual review of UNGIS is prepared by seeking inputs from UNGIS members and other stakeholders. Inputs are also welcomed from non-governmental organizations (NGOs), civil society, and technical communities. This inclusive approach ensures a comprehensive and diverse assessment of UNGIS’s activities and achievements.

Finally, the deadline for providing inputs to the annual review has been extended, allowing stakeholders to contribute even at the last minute before paper submission for policy clearance. This extension reflects a commitment to inclusivity and the recognition of the valuable insights that stakeholders can bring to the review process.

In conclusion, UNGIS functions as a collaborative platform for UN agencies, facilitating cooperation and coordination. UNCTAD, ITC, and UPU focus on supporting developing countries in benefiting from the digital economy, while also prioritising the collection of data on digital trade. Additionally, UNCTAD collaborates with ITU and ITC to manage e-business and provides sectoral service and substance support to CSED. The annual review of UNGIS seeks inputs from various stakeholders, and the deadline for input submission has been extended. These efforts contribute to advancing science, technology, and sustainable development within the UN system.

Prateek Sibal

The analysis explores discussions on the United Nations Global Information Society (UNGIS) agency and its significance in promoting digital development. Prateek Sibal highlights the importance of cooperation among UNGIS agencies, such as UNDP, ITU, UNESCO, UNEP, and UNCTAD, for digital development.

There are mixed opinions on the need for better coordination at the country level, with existing efforts to strengthen coordination being defended. Sibal acknowledges the need to enhance coordination at the country level and emphasizes ongoing work on joint country programs. These efforts aim to accelerate progress towards the Sustainable Development Goals (SDGs) by promoting collaboration among stakeholders. The launch of the digital window by the U.N. SDG fund is one such initiative to catalyse digital transformation at the country level, with UNISR participating as part of the Secretariat.

UNESCO is actively involved in various areas related to the information society. It focuses on five action lines: C3 (access to information and knowledge), C7 (e-learning and e-science), C8 (cultural diversity, identity, linguistic diversity, and local content), C9 (media), and C10 (ethical dimensions of information societies). These initiatives demonstrate UNESCO’s commitment to promoting access to information, knowledge, cultural diversity and identity, and the ethical use of media and information.

Additionally, UNESCO plays a crucial role in strengthening internet governance through evidence-based assessments. Using the Rome X framework, UNESCO assesses internet governance to ensure peace, justice, and the establishment of strong institutions. UNESCO’s endorsement of the concept of information as a public good, made during the UNESCO General Conference in 2021 as part of the Windhoek Plus 30 declaration, reinforces the organisation’s commitment to promoting open access to information for societal benefit.

UNESCO actively addresses the challenges posed by disinformation and misinformation through media and information literacy programs. These initiatives showcase UNESCO’s dedication to equipping individuals with the necessary skills to critically evaluate and navigate information in the digital era.

Furthermore, UNESCO is engaged in two significant global discussions. Firstly, it focuses on AI ethics, where UNESCO’s recommendation serves as the globally accepted standard on artificial intelligence. Secondly, UNESCO is planning to align its VISIS 2.0 initiative with the GDC (Geneva Dialogue on the Digital Society) process. UNESCO aims to present the achievements of VISIS 2.0 to the General Conference in November, highlighting the organisation’s commitment to partnering with stakeholders to achieve the SDGs.

Finally, UNESCO is set to host the 2025 conference with a theme centered around digital governance and digital transformation. Taking place in February 2025 at UNESCO headquarters, this conference serves as a follow-up to the GDC and the Summit of the Future.

In summary, the analysis covers diverse discussions on the UNGIS agency and its work. Prateek Sibal underscores the importance of cooperation among UN agencies for digital development. UNESCO’s involvement encompasses various aspects of the information society, including access to information and knowledge, cultural diversity, media literacy, internet governance, open science, and AI ethics. Their endorsement of information as a public good and plans for initiatives such as VISIS 2.0 and the 2025 conference highlight UNESCO’s commitment to advancing digital transformation for a sustainable future.

Paul Donohoe

During the discussion, several participants highlighted key points regarding the importance of the Action Line to the World Summit on the Information Society (WSIS). Dennis from Dessa endorsed a previous comment emphasizing the contribution of the Action Line to WSIS. This endorsement reflects a positive sentiment towards the significance of the Action Line’s role in the overall goals of WSIS.

While connectivity was acknowledged as a crucial aspect, it was also noted that it is not the only issue in the information society and within WSIS. This neutral sentiment suggests the need to address other important factors beyond connectivity to achieve a comprehensive and inclusive information society.

The public postal infrastructure was identified as an essential access point for the information society. This positive sentiment recognizes the role of public postal services in providing access to information and communication technologies. The Universal Postal Union (UPU) was mentioned as working with member states to assess the digital transformation capability of public infrastructure and provide support to improve it. This highlights the UPU’s commitment to enhancing public postal infrastructure, further supporting the positive sentiment.

However, a negative sentiment was expressed regarding the digital divide, with concerns raised about its continued growth. This observation underlines the persistent gap in access to technology and the need to address this issue to ensure a more equitable information society.

An encouraging development was the assertion that all United Nations (UN) agencies now have a digital agenda. This positive sentiment reflects the recognition of the importance of integrating digital strategies across UN agencies to effectively address the challenges and opportunities presented in the digital age.

The UPU was also recognized for its unique role in bridging discussions across various spaces, including the Internet Corporation for Assigned Names and Numbers (ICANN), WSIS, and the Internet Governance Forum (IGF). The UPU’s operation of a top-level domain (.post) and close collaboration with UNCTAD, ITC, and ITU further support the positive sentiment towards its involvement in digital discussions.

The need to strengthen the United Nations Joint Inspection Unit (UNJUS) for improved coordination within the UN system was advocated. This reflects a positive sentiment towards enhancing coordination among UN agencies. Concerns were raised about the current lack of coordination within the UN system, highlighting the importance of utilizing the UNJUS to address this issue.

Furthermore, there was a call for better coordination of action and efficient use of public funds within the UN system. This positive sentiment recognizes the need for improved planning, visibility, and engagement to enhance the efficiency and effectiveness of UN activities.

Criticism was directed at the current process for obtaining input for the vision, with a negative sentiment towards its fragmented nature and suitability for generating a broader vision. This observation highlights the need for a more cohesive and inclusive process to capture a wider range of perspectives in shaping the vision.

The idea of an interactive and comprehensive consultation process, similar to the ones held in 2003 and 2005, was favored. This positive sentiment advocates for a more inclusive approach to involve various stakeholders and gather diverse perspectives, building on the successful outcomes of previous interactive consultations.

The significance of local content and indigenous languages was also emphasized, with positive sentiments supporting their inclusion. The World Summit Award was mentioned in connection with local content creation, and the question was raised about how to incorporate these aspects into the discussion. This observation highlights the importance of considering local impact and cultural diversity in the development of the information society.

The Leadership Panel was subject to a positive sentiment advocating for a broader, more inclusive process. This sentiment aligns with the need to involve a diverse range of voices and perspectives in the decision-making process, beyond the limitations of the current panel.

In conclusion, the discussion covered various important aspects related to WSIS and the information society. These included the contribution of the Action Line, the importance of addressing factors beyond connectivity, the role of public postal infrastructure, concerns about the digital divide, the digital agendas of UN agencies, the unique role of UPU in digital discussions, the need to strengthen UNJUS for better coordination, the call for improved coordination and efficient use of public funds, criticism of the current process for obtaining input, the desire for an interactive and comprehensive consultation process, the significance of local content and indigenous languages, and the need for a broader, more inclusive approach to the Leadership Panel.

Winston Roberts

The International Federation of Library Associations (IFLA) is a strong advocate for equitable access to information, considering it vital for society. IFLA actively follows the Internet Governance Forum (IGF) and supports the idea of information as the lifeblood of society. Libraries, being critical infrastructure, play a pivotal role in providing equal access to information. The C3 Action Line focuses on access to information, emphasizing its importance in achieving sustainable development. The argument stresses the need for equitable information access regardless of gender, race, religion, or economic status, as it is fundamental to democracy and equal opportunities. IFLA’s commitment, along with recognition of information’s significance, supports the cause of equitable access to information. This promotes democratic principles, equal opportunities, and contributes to SDGs such as 9, 16, 4, 5, and 10.

Speaker 2

The speakers delivered a series of informative talks highlighting various topics and their relevance to achieving the Sustainable Development Goals (SDGs). One of the main points emphasized was the significance of the Digital ID Programme in achieving SDG 16.9, which focuses on providing legal identification to all individuals. The speakers stressed the fact that currently, around 5 million people in Africa live without any form of legal identity. By implementing a Digital ID Programme, governments and organisations can ensure that everyone has access to proper identification, which is vital for inclusion, empowerment, and access to services.

Another important aspect discussed was the need for capacity building and skills enhancement to achieve the SDGs. The speakers highlighted the importance of working with technology and innovation to build skills, particularly for girls aged 12 to 25 years. By equipping young girls with the necessary skills and knowledge, they can actively contribute to the progress of the SDGs and participate in the digital economy.

The role of the United Nations Global Geospatial Information System (UNGIS) was also highlighted during the talks. The speakers recognised the significance of UNGIS at the UN level and advocated for its involvement in preparing a joint paper on why the World Summit on the Information Society (WSIS) should continue beyond 2025. They emphasised that UNGIS, with its ability to reflect the work of all 35 UN agencies, can effectively contribute to shaping the future of WSIS and its ongoing efforts to bridge the digital divide.

Furthermore, the expansion of broadband access was another major point emphasised during the talks. The speakers underscored the need to connect the remaining 60% of the African population who are currently not connected to the internet. With only 40% of the African population having internet access, expanding broadband infrastructure and access is crucial for promoting economic growth, social inclusion, and sustainable development.

Lastly, the speakers advocated for the continued work on WSIS after 2025, highlighting its potential to benefit regions like Africa. They emphasised the importance of leveraging the opportunities presented by the digital era and continuing the collaborative efforts to bridge the digital divide. By fostering closer partnerships, sharing knowledge and resources, and addressing the challenges of the digital world, WSIS can play a significant role in advancing the SDGs and ensuring a more inclusive and equitable society.

In conclusion, the talks provided valuable insights into the role of the Digital ID Programme, capacity building and skills enhancement, UNGIS, broadband access, and the continued work on WSIS. These discussions shed light on the crucial links between these topics and the overarching goal of achieving the SDGs. By addressing these issues and implementing innovative solutions, the international community can work towards creating a more inclusive and prosperous world.

Speaker 6

The Secretary General has shown his support for digital cooperation and has decided to engage in a concerted high-level political manner. This approach aims to maintain the multi-stakeholder character of the discussions while implementing a roadmap for digital transformation. The Secretary General envisions the Global Digital Cooperation (GDC) as a platform that carries significant political weight. The GDC would help fulfill the Secretary General’s vision by providing a high-level political engagement.

Negotiations for the GDC are expected to commence in January and continue throughout the first and second quarters of the year. These negotiations would play a pivotal role in shaping the direction and objectives of the GDC. While it is unclear precisely what will be discussed during these negotiations, they are anticipated to address various aspects related to digital cooperation.

The Secretary General also recognises the importance of the Internet Governance Forum (IGF) and its role in internet governance. The IGF has proven to be a crucial governance arrangement, facilitating the internet’s exponential growth from 20 million users in the 90s to billions of users today. The Secretary General fully supports the IGF and acknowledges its significance in fostering effective internet governance.

In terms of updating the World Summit on the Information Society (WSIS), the GDC could serve as a means to align the WSIS with contemporary themes. This would enable the WSIS to remain relevant and responsive to the rapidly evolving digital landscape. The GDC would provide intergovernmental endorsement for this update, ensuring a coherent and ambitious approach.

While discussing the various processes related to digital cooperation, concerns have been raised regarding bandwidth and the potential confusion that can arise from navigating multiple processes. The amount of effort required to keep track of these processes and the potential for duplication of efforts have been identified as significant challenges.

In conclusion, the Secretary General’s support for digital cooperation, the negotiations for the GDC, the recognition of the IGF’s importance, the potential for updating the WSIS, and concerns about bandwidth and confusion are all key aspects of the discussions on digital transformation. These developments signify a concerted effort to address contemporary challenges and ensure effective global digital cooperation.

Speaker 4

This extended summary examines three different topics discussed by different speakers.

The first topic discussed is the regional projects of ASCAP (the Asian and Pacific Centre for the Development of Disaster Information Management) and their contribution to the World Summit on the Information Society (WSIS) action lines, particularly C11 (international and regional cooperation). The ASCAP Commission adopted a resolution to promote regional cooperation. Additionally, ASCAP is co-hosting the seventh session of the Asia-Pacific Information Superhighway and WSIS Regional Review with Armenia. This collaboration aims to enhance connectivity and information sharing in the region.

The second topic discussed is the challenges faced by the UNGIS (United Nations Group on the Information Society) team. The team has been inundated with a large number of emails and requests during the COVID-19 pandemic. Consequently, there is a need for a work plan to improve efficiency within the UNGIS team. Establishing a plan of action early in the year for overall coordination is seen as crucial in addressing this issue.

The third topic discussed revolves around the WSIS framework and its measurement of progress. Concerns have been raised regarding the difficulties encountered when discussing and advancing on action lines within the WSIS framework, particularly when the impact cannot be measured. It is argued that the previous efforts of reviewing WSIS effectiveness happened before the initiative of the Sustainable Development Goals (SDGs). To overcome this challenge, it is suggested that the new WSIS framework should be measurable, allowing for a more effective review of progress.

In conclusion, the topics discussed highlight the importance of regional cooperation in promoting information sharing and connectivity, the need for improved efficiency within the UNGIS team, and the necessity of a measurable framework in reviewing progress within the WSIS initiative. These insights provide valuable considerations for further developments in the field of information society and digital connectivity.

Robert Opp

The meeting focused on the importance of establishing a joint position for the United Nations Global Information Society (UNGIS) in the World Summit on the Information Society (WSIS) process. There was a consensus among participants that having a unified stance from UNGIS would be beneficial in shaping the direction of the WSIS process. It was highlighted that there is a strong desire for UNGIS to be actively involved in the WSIS process.

Another key point that emerged from the discussions was the need for the participation of all UN agencies in UNGIS. It was emphasized that UNGIS already includes 32 UN entities and there is a push to include more agencies to ensure comprehensive representation. This inclusive approach is considered essential for fostering effective partnerships and collaborations to achieve the goals of Sustainable Development Goal 17: Partnerships for the Goals.

The meeting also identified the potential benefits of developing an internal work plan and a marketing strategy for UNGIS. Participants recognized that having a clear roadmap for UNGIS and adopting targeted marketing approaches would help effectively engage different population segments. This strategic approach is seen as crucial for disseminating information, raising awareness, and ensuring the engagement of diverse stakeholders in UNGIS initiatives.

Measurement was another significant aspect discussed during the meeting. The importance of measuring the progress and impact of action lines in the WSIS process was specifically highlighted. A question was raised regarding the future of action lines and how their measurement can contribute to the overall evaluation of the WSIS process. This highlights the need for a robust measurement framework to assess the effectiveness and success of action lines in advancing the goals of the WSIS.

In addition to these key points, the meeting also highlighted positive developments in terms of integrated responses and the convergence of agencies. The European Union (EU) was mentioned as investing $30 million in a digital window that emphasizes integrated responses, which require collaboration between multiple agencies. This example demonstrates the growing recognition of the importance of coordinated efforts and partnerships to address complex challenges in the information society.

In conclusion, the discussions emphasized the importance of establishing a joint position for UNGIS in the WSIS process and the need for the participation of all UN agencies. The development of an internal work plan and a marketing strategy for UNGIS was identified as necessary for effective outreach, while the measurement of action lines was emphasized for evaluating progress. The positive developments in integrated responses and the convergence of agencies further underscore the significance of collaboration and partnerships in advancing the goals of the information society.

Speakers

&

’Dejan

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

&

’Denis

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

&

’Gitanjali

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

&

’Paul

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

&

’Prateek

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

&

’Robert

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

&

’Speaker

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

&

’Speaker

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

&

’Speaker

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

&

’Speaker

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

&

’Speaker

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

&

’Speaker

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

&

’Winston

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

WSIS+20 Forum High-Level Event: Open Consultation Process Meeting | IGF 2023 Open Forum #4

Table of contents

Disclaimer: This is not an official record of the IGF session. The DiploAI system automatically generates these resources from the audiovisual recording. Resources are presented in their original format, as provided by the AI (e.g. including any spelling mistakes). The accuracy of these resources cannot be guaranteed. The official record of the session can be found on the IGF's official website.

Knowledge Graph of Debate

Session report

Pratik Chapagain

UNESCO is actively driving discussions on the regulation of various aspects while also supporting artists. They have recognised the importance of information as a public good and have endorsed this concept. In order to ensure media pluralism and transparency in the digital realm, UNESCO has developed guidelines. Additionally, they are actively engaged in strengthening Internet governance and promoting the proliferation of media.

To enhance digital capacity within public administrations, UNESCO is working on various initiatives, including the exploration of digital capacity building programs and training opportunities. Moreover, UNESCO is planning a significant conference in February 2025 with a focus on addressing challenges related to digital transformation and governance. This conference aims to bring together stakeholders and partners from diverse backgrounds to discuss and find solutions.

Furthermore, UNESCO is considering establishing an Internet Governance Forum (IGF) dynamic coalition for digital capacity building. This demonstrates UNESCO’s commitment to enhancing digital skills and knowledge across different sectors.

In November, the UNESCO General Conference will take place, where discussions related to the World Summit on the Information Society (WSIS) will be conducted. This highlights the importance UNESCO places on global cooperation and addressing digital challenges.

Overall, UNESCO’s active involvement in regulation discussions and support for artists signifies their commitment to fostering a fair and inclusive digital landscape. By endorsing information as a public good, developing guidelines, and focusing on capacity building and engagement with multiple stakeholders, UNESCO strives to promote transparency, accessibility, and knowledge sharing in the digital domain.

Gitanjali Sah

The first open consultation process meeting for the World Summit on the Information Society (WSIS) Forum has begun. This meeting marks the start of the consultative process and aims to develop the agenda and program for the event. The purpose of this open consultation process is to involve all stakeholders and encourage their active participation and feedback. This inclusivity ensures that all voices are heard and taken into consideration.

Furthermore, the WSIS Forum will be held in collaboration with the AI for Good Summit. The AI for Good Summit will take place in the CICG, while the WSIS Forum will be held in both the CICG and the ITU premises. This collaboration emphasizes the importance of combining efforts in leveraging technology for the benefit of humanity.

The review process of WSIS Plus 20 is a multi-stakeholder approach that involves the collection of perspectives from various sectors such as civil society, academia, and other stakeholders. This process consists of different stages, including the SDG Summit, the Internet Governance Forum (IGF) in 2020, regional reviews by different commissions, and a high-level meeting in the United Nations General Assembly (UNGA) in 2025. The aim of this review process is to ensure the continuous engagement of different stakeholders in shaping the future of WSIS beyond 2025.

The WSIS process strongly encourages cross-sectoral participation. Ministers from various sectors including environment, education, and climate are expected to engage in the process. Additionally, participation from heads of state, UN agencies, CEOs, ambassadors, mayors, and leaders from civil society is also invited. The meeting also provides a provision for remote participation, allowing for wider inclusion.

During the UNESCO General Conference, discussions will focus on the challenges surrounding digital transformation and capacity building in public administrations. This thematic focus highlights the need to address the obstacles faced during the process of embracing digital technologies in public administrations and the importance of enhancing capacity in this area.

Ensuring the smooth execution of both the WSIS and AI for Good conferences is a priority. Logistics for these conferences are currently under discussion, and efforts are being made to ensure that the venues for both events are adjacent. This will facilitate better coordination and alignment between the conferences, promoting a seamless experience for participants.

The role of the technical community in internet governance is crucial. However, it was noted that there was an oversight in one of the presentations, where the role of the technical community was not sufficiently highlighted. This was acknowledged as a human error, and Gitanjali Sah agreed with Byron Holland’s suggestion of including the technical community as a prominent stakeholder. This emphasizes the importance of recognizing and involving the technical community in shaping internet governance policies and practices.

In conclusion, the first open consultation process meeting of the WSIS Forum has begun, focusing on developing the agenda and program for the event. The WSIS process encourages the involvement of all stakeholders and aims to gather diverse perspectives for the review of WSIS Plus 20. The collaboration with the AI for Good Summit and the emphasis on cross-sectoral participation further highlight the collaborative approach of WSIS. Additionally, discussions during the UNESCO General Conference will center around digital transformation challenges and capacity building in public administrations. The smooth execution of both the WSIS and AI for Good conferences is a priority, and the importance of involving the technical community in internet governance has been recognized.

Tomas Lamanauskas

The World Summit on Information Society (WSIS) is a significant global platform for digital cooperation and development. It has been praised for its inclusive and multi-stakeholder nature, allowing various voices and perspectives to shape policies and initiatives that will define our digital future. The WSIS process plays a vital role in harnessing the collective energy of stakeholders for the benefit of humanity and the planet.

One noteworthy argument is that digital technologies have the potential to boost 70% of the Sustainable Development Goals (SDG) targets. This highlights the transformative power of technology in achieving the SDGs, particularly in areas such as industry, innovation, and infrastructure. By leveraging digital technologies, countries can accelerate progress towards achieving the SDGs and addressing global challenges.

The upcoming WSIS plus 20 high-level event, scheduled from 27th to 31st May 2024, is a special edition of the annual WSIS Forum. This event will be co-hosted by the Confederation of Switzerland. It provides an opportunity for stakeholders to come together and discuss the future of digital cooperation and development. Such events allow for collaboration, innovation, and work towards creating more inclusive information and knowledge societies.

The Consultative Meetings within the WSIS process are highlighted as crucial platforms where diverse voices can shape policies, strategies, and initiatives. These meetings offer an opportunity for stakeholders to contribute their insights and expertise in defining our digital future. By taking an inclusive approach, the WSIS process ensures that the needs and perspectives of all stakeholders are considered.

Another notable aspect is the Open Consultation Process (OCP), which invites all stakeholders to participate. This process encourages individuals and organizations to share their views and ideas, fostering collaboration and engagement in digital cooperation efforts. It acts as a mechanism to gather input and promote a bottom-up approach to decision-making.

Furthermore, the importance of collaboration and partnership among stakeholders and UN agencies is emphasized. The WSIS plus 20 review calls for enhanced collaboration and partnership to strengthen digital cooperation and development efforts. The close collaboration among UN agencies such as UNESCO, UNDP, UNCTAD, CSTD, and UNDESA is cited as an example of the valuable partnerships that can be formed.

In conclusion, the World Summit on Information Society (WSIS) is a vital global platform that promotes digital cooperation and development. Its inclusive and multi-stakeholder nature allows for collaboration, innovation, and the shaping of policies and initiatives that will define our digital future. Digital technologies have the potential to boost the achievement of the Sustainable Development Goals (SDGs). The WSIS plus 20 high-level event, Consultative Meetings, Open Consultation Process (OCP), and collaboration among stakeholders and UN agencies all contribute to the ongoing efforts in achieving digital cooperation and development goals.

Valeria Betancourt

The analysis of the provided information reveals several important points made by the speakers. Firstly, it is highlighted that digital inequality is increasing as more people become connected. This amplifies and complicates existing disparities. The speakers argue that as technology becomes more accessible and prevalent, it is essential to address the growing digital divide to ensure equal opportunities and access for all individuals.

The second point raised is regarding the upcoming WSIS plus 20 review. The speakers pose the question of what we want to achieve and in which direction to go for building a digital society. This review serves as an opportunity to assess the progress made so far and to determine the future direction. The speakers emphasize the importance of strategic planning and the need to identify the desired outcomes for building a digital society.

Furthermore, the analysis highlights the significance of compromises and inputs in shaping policy processes for the digital future. The speakers argue that to address the complex issues surrounding digital advancements, it is crucial to arrive at agreements that consider multiple perspectives. They stress the need for inclusive decision-making processes and the involvement of all stakeholders to ensure policies are effective and beneficial to society.

Lastly, there is a call to strengthen the mandate of the Internet Governance Forum (IGF) to operationalize global digital cooperation. The IGF serves as a platform for dialogue and collaboration among different actors involved in internet governance. The speakers argue that by enhancing the IGF’s mandate, there can be greater operationalization of global digital cooperation, leading to more effective and inclusive decision-making processes.

In conclusion, the analysis highlights the increasing digital inequality resulting from the expanding number of people becoming connected. It emphasises the importance of strategic planning and goal-setting for building a digital society, as well as the need for compromises and inputs in policy processes addressing the digital future. Moreover, there is a call to strengthen the mandate of the Internet Governance Forum to enhance global digital cooperation. These insights shed light on the challenges and opportunities in the digital realm and underscore the need for collaborative efforts to ensure a more equitable and inclusive digital future.

Audience

During the review of WSIS plus 20, it has been highlighted that addressing the implications of changes in the digital society is crucial. This is due to the fact that an increasing number of people are getting connected, leading to a rise in digital inequality. The argument is that it is important to deal with these implications in order to ensure a fair and inclusive digital society.

A key aspect emphasized during the review is the necessity for compromise and agreement in order to achieve the goals set by WSIS. This is particularly important in relation to industry, innovation, and infrastructure, as well as peace, justice, and strong institutions. The focus is on identifying factors that will contribute to reaching compromise during the review process.

Addressing the issue of digital inequality is another important aspect discussed during the review. As more people become connected, digital inequality is amplified and continues to grow. The argument is that this paradoxical situation needs to be addressed in order to achieve SDG 10, which aims to reduce inequalities. The review acknowledges the need to find solutions to bridge the digital divide and prioritize digital inclusion.

Critical attention has also been given to other areas such as digital rights, environmental sustainability, digital inclusion, and cybersecurity. These are seen as significant factors that require careful consideration and swift action. The review highlights the importance of protecting digital rights, ensuring environmental sustainability in digital development, promoting digital inclusion for all groups, and prioritizing cybersecurity to safeguard digital systems.

The importance of financial resources in building the digital future is also highlighted. This neutral argument emphasizes the need for financial investments to support the development of digital infrastructure, innovation, and initiatives. The review recognizes that financial resources play a vital role in ensuring the successful implementation of the digital future.

One positive outcome mentioned in the review is the extension of the mandate of the IGF (Internet Governance Forum) and WSIS Forum. This is seen as a positive development, as these platforms facilitate discussions and collaboration on key digital issues. The extension of their mandate reflects the recognition of their importance in shaping the digital agenda.

However, the review also criticizes the lack of ambition in previous actions. It highlights that previous initiatives and resolutions, including those discussed in the UN General Assembly, did not adequately address crucial aspects such as artificial intelligence, social networks, and the Internet of Things. This critical stance underscores the need for more ambitious and comprehensive actions to address emerging digital challenges.

The review also emphasizes the importance of outlining the future with ambition. This calls for forward-thinking and proactive planning to adapt to evolving digital landscapes. It is mentioned that the future needs to be thoughtfully and ambitiously defined to ensure progress and avoid falling behind.

One observation made during the review is the uncertainty regarding the influence of the UN General Assembly due to political influences. This neutral stance acknowledges that political factors can impact the decision-making process and the implementation of digital initiatives. It highlights the need for careful consideration of political influences and the importance of ensuring unbiased decision-making.

In conclusion, the WSIS plus 20 review underscores the need to address the implications of changes in the digital society. It emphasizes the importance of compromise and agreement to achieve goals, as well as the need to tackle digital inequality. Critical attention is given to digital rights, environmental sustainability, digital inclusion, and cybersecurity. Financial resources are deemed necessary for building the digital future, while the extension of the mandate of the IGF and WSIS Forum is considered a positive outcome. Criticism is expressed regarding the lack of ambition in previous actions, and there is a call for outlining the future with ambition. However, uncertainty exists regarding the influence of the UN General Assembly due to political influences.

Shamika Sirimanne

The WSIS Plus 20 review process has commenced with the initiation of the first consultation at the IGF (Internet Governance Forum). Adopting a multistakeholder approach, the process aims to evaluate progress in implementing the World Summit on the Information Society (WSIS) outcomes. Furthermore, plans are in place to organise events in various regions in collaboration with the regional commissions or the IGF regional forums. This inclusive approach promotes diverse perspectives and contributions to shaping the information society.

UNCTAD, together with other agencies such as ITU, UNESCO, UNDP, and DESA, has released a questionnaire to assess the advancement towards achieving a people-centred, inclusive, and development-oriented information society as envisaged in Tunis. The objective is to gather comprehensive data for a meaningful review, which will be submitted to the General Assembly. This collaborative effort among agencies reflects the commitment to evaluating and fostering progress in the information society domain.

UNCTAD’s primary mandate revolves around leveraging international trade for development, with a particular focus on enabling developing countries to engage effectively in e-commerce and the digital economy. To facilitate this objective, UNCTAD has conducted diagnostic assessments for approximately 39-40 countries to determine their readiness for e-commerce. Additionally, the E-trade for All Platform, a collaborative initiative involving 35 agencies, is working towards addressing the challenges and opportunities associated with e-commerce in developing countries. UNCTAD’s upcoming E-Week in Geneva will dedicate its focus to capturing the potential benefits of the digital economy for developing nations.

However, despite the efforts being made, numerous developing countries, especially the Least Developed Countries (LDCs), face substantial obstacles that impede their ability to actively participate in e-commerce and the digital economy. These challenges include insufficient connectivity, inadequate legal and regulatory frameworks, and inadequate logistics facilities. It is evident that addressing these issues requires a collective effort, as no single agency can single-handedly achieve the goal of inclusive participation in e-commerce for all developing countries.

In conclusion, the WSIS Plus 20 review process has commenced with the inclusion of multiple stakeholders, allowing for a comprehensive evaluation of progress in implementing the WSIS outcomes. UNCTAD, in conjunction with other agencies, is working towards assessing the achievement of a people-centred information society through a questionnaire. UNCTAD’s primary focus on leveraging international trade for development aligns with its efforts to enable developing countries to embrace e-commerce and the digital economy. However, challenges persist, particularly in the case of developing countries and LDCs, in terms of connectivity, legal frameworks, and logistical capabilities. Addressing these issues necessitates a collaborative approach involving various stakeholders to ensure meaningful and inclusive participation of all developing countries in the digital economy.

Nigel Hicson

The WSIS plus 20 review process was emphasised as being of great importance. The focus of this review process is on the process itself, ensuring that all stakeholders and diverse regions are included. This highlights the significance placed on inclusivity and collaboration in shaping the future of the WSIS. The review process aims to examine not only past achievements, but also looks ahead to the future, considering the importance of the roadmap towards the UNGA discussions and the need to bridge the connectivity gap.

The discussions also highlighted the need to bridge the connectivity gap, emphasizing its hindrance to progress in various areas, including achieving the sustainable development goals. To achieve this, there is a call to evolve the WSIS action lines to complement the sustainable development goals. The linkage between the sustainable development goals and the matrix developed in 2015 was seen as important, emphasizing the need for a comprehensive approach that aligns various objectives to promote a more interconnected and sustainable world.

In addition, a recommendation was made to have ministers come to Geneva to discuss issues at a proposed high-level track during the WSIS Forum. This aims to facilitate more meaningful and impactful discussions, indicating the importance of preparation in advance to ensure that important topics are effectively addressed.

The analysis also revealed a positive sentiment towards the work done by UNESCO and ICANN on multilingualism, recognizing their efforts in reducing inequalities and fostering inclusivity in communication and internet accessibility. UNESCO’s “Connecting the Dots” event was greatly appreciated, along with the recognition of ICANN and other areas’ work in developing international domain names and furthering multilingualism.

Overall, the observations from the analysis indicate the recognition of the importance of the WSIS plus 20 review process, bridging the connectivity gap, and evolving the WSIS action lines to align with the sustainable development goals. The recommendation for a high-level track at the WSIS Forum, along with the appreciation for UNESCO and ICANN’s work on multilingualism, further demonstrates the commitment towards promoting inclusivity, collaboration, and international cooperation in addressing global challenges.

Brooke Biasella

The World Summit on the Information Society (WSIS) has made significant progress, operating in 182 countries and offering concrete solutions to address the challenges of today. The need to prioritize WSIS goals and align them with other important issues has been emphasized. One argument put forward is that the focus on knowledge society and transformation should be reinstated, recognizing the importance of skills, competencies, democratic participation, and individuals’ ability to tackle current and future challenges.

It has been observed that the impact of digital transformation on traditional media and the public sphere is profound. Legacy media has been significantly affected, and the public sphere has become fragmented due to the rise of various digital platforms and sources of information. This raises questions about the future of traditional media and the importance of ensuring a diverse and inclusive public discourse in the digital age.

Furthermore, there is a call for European Union (EU) countries to unite around a digital solidarity agenda. Digital solidarity is seen as a political agenda crucial for bridging the digital divide. Cooperation among EU countries is essential in addressing disparities in access to digital technologies and ensuring equal opportunities for all citizens.

In conclusion, the WSIS demands focused prioritization and collaboration with other areas of concern. Reinstating the focus on knowledge society and transformation is crucial, encompassing important aspects such as skills, competencies, democratic participation, and the capability to address current and future challenges. The impact of digital transformation on legacy media and the public sphere is undeniable, highlighting the need for adaptation and inclusivity. Additionally, unity among EU countries on a digital solidarity agenda is necessary to address the digital divide, ensuring that no individual or community is left behind in the digital era.

Bertrand De La Chapelle

The analysis focuses on the frustrations expressed by Bertrand regarding the lack of global cooperation in digital matters. Bertrand expresses a desire to understand the collective global ambition for digital cooperation. The success of the technical architecture during the pandemic is mentioned as evidence of the potential for collaboration. However, the absence of a collective decision is seen as a hindrance to achieving this ambition.

The discussion also highlights Bertrand’s negative sentiment towards WSIS Plus 20 being limited to a mere review. He believes that the event should be more than just a backward-looking examination of past achievements. Rather, there should be a critical evaluation of the failings and missed opportunities to drive progress in digital cooperation. This stance suggests the need for substantial and meaningful action during WSIS Plus 20, rather than merely revisiting past discussions.

The analysis further emphasizes the significance of transnational institutions in addressing the lack of cooperation. It is argued that the absence of collaboration is a major obstacle to achieving digital cooperation goals. While the technical community is acknowledged for its successful contributions, it is believed that they do not have the authority to speak on policy matters. Thus, the need for transnational institutions is highlighted to facilitate effective policy-making and decision-making processes.

In conclusion, the analysis illuminates the frustration over the lack of global cooperation in digital matters. It emphasizes the importance of a collective decision on the ambition for digital cooperation and calls for WSIS Plus 20 to go beyond a mere review. The significance of transnational institutions in fostering collaboration and addressing policy issues is underscored. Overall, the analysis highlights the need for concerted efforts and effective governance structures to achieve meaningful progress in digital cooperation.

Balzur Rahman

The analysis highlights several significant points regarding the integration of WSIS action lines in Bangladesh. Firstly, the government of Bangladesh, in collaboration with civil society organizations (CSOs), has successfully integrated the WSIS action lines with their 5-year plan. This integration demonstrates their commitment to digital transformation, as they have aligned their national development goals with the objectives set by the WSIS action lines. This achievement is a positive indicator of Bangladesh’s progress in promoting industry, innovation, and infrastructure, as outlined in SDG 9.

Furthermore, the analysis emphasizes the need for an annual WSIS forum. This forum would serve as a platform for stakeholders to come together and discuss the latest developments in industry, innovation, and infrastructure. By convening this forum, opportunities for collaboration, knowledge-sharing, and partnership-building can be created. This neutral argument recommends the regular organization of this forum, given the fast-paced nature of advancements in technology and the need for continuous dialogue among stakeholders.

Moreover, the analysis highlights the importance of the WSIS Secretariat developing a toolkit for parliamentarians and mayors. This toolkit would assist these key decision-makers in effectively implementing the WSIS action lines and promoting sustainable cities and communities, as outlined in SDG 11. By providing parliamentarians and mayors with practical resources and guidance, the WSIS Secretariat can contribute to the successful implementation of the action lines at the local level.

Additionally, there is a discussion around the need for the localization of WSIS action lines and the conduct of separate sub-regional open consultations. These measures would ensure that the WSIS action lines are adapted and implemented to suit the specific contexts and needs of different regions. Localizing the action lines and facilitating sub-regional consultations can help address the diverse challenges and opportunities faced by different countries and communities.

Moreover, the analysis raises concerns about the impact of social media and new technologies on the community media sector. It argues that community media, which plays a crucial role in giving voice to marginalized groups, is under threat due to the dominance of social media platforms and advancements in technology. This negative sentiment calls for the protection of the community media sector as a voice for the voiceless. The summary further highlights the supporting fact that community media is the only media ensuring voices for the voiceless from the ground.

In conclusion, the analysis provides valuable insights into the integration of WSIS action lines in Bangladesh, emphasizing the successful alignment of the action lines with the country’s 5-year plan. It also highlights the importance of an annual WSIS forum, the development of a toolkit for parliamentarians and mayors, and the localization of action lines through separate sub-regional open consultations. Additionally, it highlights the challenges faced by the community media sector and advocates for its protection as a valuable platform for amplifying the voices of marginalized groups. These findings underscore the significance of international cooperation and collaboration in achieving the sustainable development goals and promoting digital transformation.

Vladimir Minkin

During the event, the speakers emphasised the importance of long-term planning and consideration beyond the year 2025. They suggested taking a preliminary 20-year view to better understand future needs and goals. This long-term vision is seen as necessary for effective preparation and decision-making.

A key aspect highlighted by the speakers is the need to define what is desired for the future. By clearly outlining the objectives, it becomes easier to work towards achieving them. This includes considering the future of visas, Sustainable Development Goals (SDGs), and digital companies. Involving a broad range of stakeholders allows for multi-stakeholder estimation, providing diverse perspectives and insights.

The involvement of multiple stakeholders is regarded as essential in shaping the future of visas, SDGs, and digital companies. This approach enables diverse voices to be heard, ensuring that decisions are well-informed and inclusive. The speakers believe that by soliciting input from various stakeholders, a comprehensive and holistic understanding of the future can be achieved.

The speakers stated the importance of considering at least a preliminary 20-year view as evidence. This suggests that future planning should take into account long-term consequences and impacts. Proactive measures can then be taken to address potential challenges and opportunities.

Overall, the speakers expressed a positive sentiment towards long-term planning, multi-stakeholder involvement, and defining future goals. They emphasised the value of considering a broader perspective and seeking input from various stakeholders for a more inclusive and comprehensive decision-making process.

To conclude, long-term vision and planning beyond 2025 are crucial for effective preparation and decision-making. By involving multiple stakeholders and defining future objectives, a more inclusive and comprehensive understanding of the future can be achieved. This approach ensures that decisions regarding visas, SDGs, and digital companies are well-informed and aligned with desired outcomes.

Justin Fair

Justin Fair, a prominent figure in the field, applauds the coordination and maturity displayed in the WSIS (World Summit on the Information Society) process. He notes a significant improvement in these areas, resulting in better outcomes. This positive sentiment signifies general satisfaction with the progress achieved in the WSIS process.

Fair also emphasizes the importance of conducting a thorough review of past progress and challenges in the WSIS. He highlights the WSIS Plus Forum as a valuable platform for retrospectively evaluating accomplishments and obstacles. Fair argues that understanding these experiences is vital for preparing for the future. By drawing insights from past successes and challenges, stakeholders can develop more effective strategies to achieve greater outcomes.

Furthermore, Fair seeks more information about an upcoming UNESCO conference scheduled for early 2025. He specifically wants to know if the conference is part of the WSIS Plus 20 review. Fair also raises concerns about the logistics of merging two meetings in Geneva and managing a large number of attendees. These inquiries underscore the significance of detailed planning and efficient execution in organizing successful conferences and events.

Overall, Fair’s observations and insights highlight the positive developments within the WSIS process. The coordination and maturity he commends serve as catalysts for achieving better outcomes. Additionally, his focus on reviewing past progress and challenges acknowledges the importance of learning from past experiences to shape future actions. Fair’s inquiries about logistics and concerns about attendee management underscore the practical challenges organizers must overcome to deliver successful events.

Byron Holland

The analysis presented focuses on the contention surrounding the inclusion of the technical community in the process of internet governance. One of the speakers, Byron Holland, who represents CIRA, which operates the .ca domain, advocates for the involvement of the technical community. Holland stresses that the technical community, distinct from academia and civil society, plays a crucial role in running the internet and should therefore have a voice in the governance process.

Another speaker takes a neutral stance on the issue, arguing that the technical community should be recognized as key actors and stakeholders in internet governance. It is important to note that the technical community comprises both for-profit and non-profit organizations.

The overall sentiment towards the inclusion of the technical community leans towards negativity, indicating opposing views on their participation in internet governance. However, the neutral stance on their role as key actors suggests an acknowledgment of their significance and influence in the process.

The analysis lacks specific supporting evidence for the negative sentiment, making it necessary to further explore the reasons underlying this viewpoint. Delving deeper into this topic could provide insights into the concerns or reservations held by those who oppose including the technical community in the governance process.

In conclusion, the debate over the inclusion of the technical community in internet governance reveals differing opinions. The analysis raises important points about their role and underscores the need for a comprehensive understanding of this issue.

Thomas Schneider

The WSIS plus 20 process has significantly evolved over the past 20 years, as there has been an increase in the number of events, structures, and overlapping structures. This complexity is seen as both a challenge and an opportunity. On one hand, the multitude of tracks and parallel structures can make the process more challenging to navigate. However, on the other hand, it is seen as a positive reflection of the diversity of perspectives and interests involved in the process.

The WSIS process and the Internet Governance Forum (IGF) have played vital roles in creating a more inclusive space within the United Nations (UN) and other institutions. By giving voice to stakeholders from all over the world, these initiatives have helped ensure that diverse perspectives are represented and considered in discussions related to industry, innovation, and infrastructure (SDG 9) and reducing inequalities (SDG 10), as well as peace, justice, and strong institutions (SDG 16).

Switzerland is set to co-host the next year’s WSIS event, which demonstrates its commitment to the process. Thomas Schneider, in particular, has shown his support for the actors driving the WSIS process and is excited about Switzerland’s role as the co-host. This involvement further underscores the importance of the WSIS process and Switzerland’s dedication to fostering partnerships for the goals (SDG 17).

The AI for Good Summit, a significant initiative in the field of artificial intelligence (AI), will be held during the WSIS Plus 20 High-Level Forum week. This demonstrates the recognition of the interconnections between the advancements in AI, industry, innovation, and infrastructure.

However, it is important to acknowledge that there has been a shift in the global landscape. 20 years ago, after the fall of the Berlin Wall, there was hope that technology would foster peace, freedoms, and sharing. However, in the current environment, the focus has shifted towards competition, with a win-lose mentality prevailing over collaboration and sharing. This observation highlights the need for a renewed commitment to peace, cooperation, and collaboration in the face of these complex times. It is essential to reinterpret the Vicious Vision, a concept associated with striving for peace and cooperation, in light of these challenges.

Overall, the WSIS plus 20 process has become more intricate over the years, with an increase in events, structures, and overlapping structures. However, the existence of several tracks and parallel structures is also seen as a positive reflection of the diversity of perspectives involved. The WSIS process, along with the IGF, has played a crucial role in creating a more inclusive space within the UN and other institutions. Switzerland’s upcoming role as co-host of the next year’s event further demonstrates its commitment to the process. The AI for Good Summit, held during the WSIS Plus 20 High-Level Forum week, highlights the intersectionality between AI and the WSIS process. As the world becomes more competitive, it becomes increasingly important to strive for peace, cooperation, and reinterpret the Vicious Vision to address the challenges of the present times.

Rob Golding

ICTs and digital technologies are poised to play a crucial role in shaping the future of humanity. This recognition marks a pivotal moment in our understanding of their potential impact and significance. The speaker highlights the importance of these technologies in advancing the Sustainable Development Goals (SDGs), specifically SDG 9, which focuses on industry, innovation, and infrastructure.

There is widespread recognition of the transformative power of digital technologies in accelerating progress towards achieving the SDGs. The argument stresses the positive impact these technologies can have on various aspects of society. The SDG Digital Acceleration Agenda report, co-released with the International Telecommunication Union (ITU), supports this argument by showcasing the numerous ways in which technology can contribute to SDG attainment. It is seen as cause for celebration, as the potential of digital technologies to address the underlying challenges outlined in the SDGs is acknowledged.

The speaker proudly mentions their role as a co-chair of the UN Group on Information Society. Together with co-organizers UNCTAD and UNESCO, they actively contribute to the work of this group. The UN Group on Information Society is focused on SDG 17, which emphasizes partnerships for the goals. This highlights the importance of collaborative efforts in achieving the SDGs. The speaker expresses gratitude towards the government of Switzerland for hosting the WSIS Forum this year. This serves as a platform for sharing ideas, insights, and experiences to further advance the information society agenda.

In conclusion, ICTs and digital technologies have become vital tools for the future of humanity. Their potential to accelerate progress towards the SDGs is widely recognized. The speaker’s involvement in the UN Group on Information Society reflects a commitment to partnership and collaboration, as no one entity can achieve the SDGs alone. Finally, the speaker extends their gratitude to the government of Switzerland for hosting the WSIS Forum, a significant event for advancing the global information society.

Speakers

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

&

’Balzur

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

&

’Bertrand

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

&

’Brooke

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

&

’Byron

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

&

’Gitanjali

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

&

’Justin

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

&

’Nigel

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

&

’Pratik

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

&

’Rob

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

&

’Shamika

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

&

’Thomas

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

&

’Tomas

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

&

’Valeria

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

&

’Vladimir

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

Youth-Driven Tech: Empowering Next-Gen Innovators | IGF 2023 WS #417

Table of contents

Disclaimer: This is not an official record of the IGF session. The DiploAI system automatically generates these resources from the audiovisual recording. Resources are presented in their original format, as provided by the AI (e.g. including any spelling mistakes). The accuracy of these resources cannot be guaranteed. The official record of the session can be found on the IGF's official website.

Knowledge Graph of Debate

Session report

Audience

The audience member at the event was seeking insights into the resources that policymakers can provide to young people advocating for sustainability through technological innovation, apart from financial support. They strongly believe that policymakers should go beyond financial aid to encourage and support the sustainable pursuits of young people in the field of technology. The audience member wanted to know about other types of resources and support that can empower the youth in their pursuit of sustainability.

During the discussion on youth participation in the Internet Governance Forum (IGF), the importance of learning and capacity building was emphasized. The speaker, who is the chairman of the World Summit Award and the Young Innovators Award, stressed the need for learning and building capacities to actively participate in the IGF. This was particularly highlighted in the context of the Democratic Republic of Congo. The audience member supported the notion that more resources are needed to enable meaningful impact in the IGF.

Another point of discussion revolved around involving youth in the police process and bridging the gaps between them and decision-makers. Andrea Palomino’s project, “Youth for Our Data Future,” aims to achieve this by including youth in the police process. This initiative was positively acknowledged by the audience, who expressed gratitude for the proposed project. Building stronger connections and involvement between youth, decision-makers, and the community can contribute to achieving sustainable cities and communities, aligned with SDG 11.

Overall, the discussions highlighted the audience’s interest in exploring various dimensions of youth empowerment in sustainability and technological innovation. The importance of non-financial support from policymakers, such as resources, capacity-building initiatives, and inclusive participation frameworks, was emphasized. The audience showed appreciation for the dialogue and supported the proposed initiatives focused on youth engagement and bridging gaps between them and decision-makers.

However, it is important to note that the sentiment expressed by the audience members was typically neutral or positive. No specific negative sentiments or arguments were mentioned in the provided data.

Atanas Pahizire

The speakers in the discussion shed light on the importance of youth empowerment and its role in fostering innovation. They highlight the Pan-African Youth Ambassadors on Internet Governance initiative as an example of empowering young people. The initiative has successfully trained over 1,000 young individuals in Africa in five different languages, emphasising the significance of digital literacy and capacity building in enabling youth to contribute to the future of the Internet.

The discussion also emphasises that youth should have a voice in regulatory consultations on artificial intelligence (AI) and data protection. Recognising that youth are the major users of digital technology and will be future leaders, incorporating their perspectives and insights in regulations is essential.

Financial resources are another crucial aspect of empowering youth and fostering innovation. The discussion highlights that having ideas is not enough; young innovators need access to adequate financial resources to turn their ideas into reality.

Moreover, the speakers argue that policies should focus on genuinely empowering young people, rather than just including them as a token gesture. This means involving youth in decision-making processes and ensuring their participation in shaping policies that directly affect them.

Administrative burdens and visa issues are identified as challenges faced by young entrepreneurs, hindering their ability to innovate and collaborate internationally. The speakers call for reducing administrative burdens and improving immigration policies to create a more conducive environment for young entrepreneurs and support inter-regional collaboration.

Despite these challenges, the discussion highlights the resilience and determination of youth to participate and foster sustainable innovation. They encourage young individuals from different fields to continue fighting for their beliefs and building sustainability, even in less than ideal circumstances.

In summary, the discussion underscores the importance of empowering youth and fostering innovation. This includes digital literacy, access to financial resources, meaningful inclusion in policymaking processes, and addressing administrative hurdles for young entrepreneurs. Despite challenges, the speakers find hope in the resilience of youth to create sustainable innovation and advocate for their needs.

Theorose Elikplim

During an event attended by Theo from the Ghana Youth IGF, multiple speakers covered a range of important topics. A more detailed summary of the event reveals that the speakers highlighted various key points and presented arguments backed by evidence, drawing insightful conclusions.

One speaker discussed the significance of digital literacy in empowering the youth in Ghana, emphasizing the need to provide access to digital skills and education to bridge the digital divide. They argued that by equipping young people with necessary knowledge and tools, they can actively participate in the digital economy and contribute to the country’s development.

Another speaker focused on the importance of online safety and security, highlighting the growing risks and threats faced by young people in the digital age, such as cyberbullying, identity theft, and online scams. They suggested implementing effective policies and raising awareness about digital safety to protect the youth and ensure their online well-being.

Furthermore, a discussion on the role of social media in youth activism was explored. The speaker acknowledged the power of social media platforms in enabling young people to raise their voices and advocate for social change. They provided examples of successful youth-led movement campaigns driven by online activism, emphasizing the need to harness these platforms for positive societal impact.

Additionally, a speaker talked about the potential of technology in contributing to sustainable development. They discussed how innovation and digital solutions can address environmental challenges and enhance access to healthcare, education, and other essential services. They called for collaborations between policymakers, tech entrepreneurs, and the youth to develop and implement sustainable technology solutions.

In conclusion, the event provided valuable insights into various relevant topics, including the importance of digital literacy, online safety, youth activism through social media, and the role of technology in sustainable development. By understanding and addressing these issues, it is possible to empower the Ghanaian youth and pave the way for a more inclusive and prosperous future.

Nicolas Fiumarelli

Innovation is essential for progress and is often synonymous with technological advancement. It has the potential to solve complex problems and enhance the quality of life. The private sector plays a crucial role in driving technological advancements and shaping economic pursuits.

However, in the digital age, there are barriers to innovation. Unequal access to the internet is a significant challenge, as a large portion of the population still does not have access to it. This creates a digital divide, where many people are unable to unlock the knowledge and opportunities that the internet provides.

Overregulation is another barrier that can inhibit experimentation and restrict the free flow of information. Striking a balance between regulation and innovation is crucial. It is important to govern the internet in a fair and inclusive manner that facilitates technology and opportunities for all.

Global collaboration is essential in championing a free and innovative internet. Collaboration across nations and generations is necessary to address the complexity of the challenge. The UIGF Uruguay, for example, is committed to advocating for a free, fair, and innovative internet.

Sustainability is not just about collaboration and innovative ideas, but also about considering the environment. It is important to prioritize long-term ecological wealth over immediate corporate gains. Corporate legacy should recognize the profitability of sustainability.

Global equity is crucial for progress. Progress should not only benefit the privileged few but should be inclusive and benefit everyone. This requires a shift towards a more equitable society, where opportunities and benefits are accessible to all.

Youth have an essential role to play in internet governance and innovation. Their fresh and innovative perspective can lead to the creation of new ideas and solutions. Supporting mentorship programs that target young individuals in internet governance is important to foster their involvement and provide guidance as they navigate the digital landscape.

Youth can also drive sustainable practices in the tech industry. They are often more environmentally conscious and can integrate sustainable practices from the beginning. Their involvement can contribute to a more sustainable and responsible approach to technological development.

In conclusion, innovation is crucial for progress and technological advancement. However, barriers such as unequal access to the internet and overregulation hinder innovation in the digital age. Governing the internet in a fair and inclusive manner is important to facilitate technology and opportunities. Global collaboration is needed to champion a free and innovative internet, while also considering sustainability and the environment. The involvement of youth in internet governance and their drive towards sustainability is essential. Supporting mentorship programs further enhances their involvement and development in this field.

Osei Kagyah

The speakers in the discussion highlighted the crucial role of youth participation and collaboration in driving innovation and achieving the Sustainable Development Goals (SDGs). They emphasised that young people possess the energy and fresh perspectives necessary to bring about innovative solutions to complex global challenges. By actively involving young individuals, the speakers argued, societies can harness their potential and creativity to drive progress in various fields.

The importance of effective collaboration was also emphasised during the discussion. The speakers noted that collaboration is essential for addressing “the elephants in the room,” indicating that complex and longstanding issues require a collective effort to be resolved. By working together across different sectors and disciplines, it becomes possible to tackle these challenges more effectively and achieve meaningful progress towards the SDGs.

Furthermore, the Internet Governance Forum (IGF) was highlighted as a significant platform for facilitating collaboration among young people from different countries. The IGF was recognised as a space where individuals can come together, share their ideas, and work collectively towards finding solutions to global problems. The forum’s inclusive nature allows young people to engage in international collaboration, exchange knowledge, and foster partnerships to drive positive change.

In conclusion, the speakers expressed a positive outlook on the role of youth and collaboration in shaping a better future. They underscored the importance of involving young individuals in innovation and problem-solving, highlighting their unique perspectives and fresh energy. Moreover, effective collaboration, both within and across diverse communities, was stressed as a crucial element in addressing global challenges comprehensively. The Internet Governance Forum was singled out as a platform that offers opportunities for young people to collaborate globally and contribute to achieving the SDGs. Overall, the discussion shed light on the necessity of youth participation and collaboration as key drivers for innovation and sustainable development.

Shradha Pandey

The involvement of youth in international discussions surrounding digital transformation has witnessed a significant increase, with young individuals playing a more substantial role and moving beyond mere token representation. These young members are actively contributing to strategic plans and priorities, developing new skills in leadership and strategy. This engagement has not only empowered grassroots communities but has also enabled youth to participate in high-level discussions.

One of the key arguments put forth by the youth community revolves around advocating for inclusive and sustainable innovation. It emphasizes the importance of incorporating rights-based approaches, environmental care, security, and sustainability into digital legislation and innovation. The involvement of youth members recognizes and addresses crucial issues related to trust, security, environmental sustainability, and accountability. They actively advocate for the integration of these aspects as inherent elements in the development and implementation of digital policies.

To foster innovation, it is essential to strengthen human resources, particularly those of young individuals, alongside allocating sufficient financial resources. Youth contributions in this context are based on volunteering their time, energy, effort, and hours. This highlights the need for adequate support and recognition of their input. Furthermore, the correct implementation of policies and the availability of financial resources are imperative for creating an environment conducive to youth-led innovation.

The youth community also stresses the significance of building digital skills and literacy. They argue that these skills should be an integral part of lifelong learning, with digital literacy being incorporated into formal education. By emphasizing the adoption of new technologies and fostering local development of digital content, the youth community aims to ensure that individuals are equipped with the necessary skills and knowledge to navigate the digital landscape effectively.

Lastly, investment in digital initiatives, projects, and infrastructures is highlighted as essential for fostering innovation and supporting communities. Public and private development services play a crucial role in creating an environment that enables youth to thrive and contribute to innovation. Mentorship, incubation labs, and capacity-building programs are a few examples of initiatives aimed at supporting the youth community in their digital development journey.

In conclusion, the involvement of youth in international discussions related to digital transformation has witnessed a positive shift, with young individuals assuming more significant roles and contributing to strategic plans and priorities. Their presence has empowered grassroots communities and allowed for their participation in high-level discussions. The youth community advocates for inclusive and sustainable innovation, stressing the importance of incorporating rights-based approaches, trust, security, environmental sustainability, and accountability. Strengthening human resources, particularly the youth, and allocating adequate financial resources are crucial for fostering innovation. Building digital skills, literacy, and promoting local development of digital content are seen as essential for capacity building. Furthermore, investment in digital initiatives, projects, and infrastructures plays a vital role in creating an environment that supports youth-led innovation. Lastly, the continuous development of digital skills and literacy should be a lifelong learning process, with digital literacy being integrated into formal education to ensure individuals are equipped to navigate the digital landscape effectively.

Deborah

Deborah is a strong advocate for networking and believes in its value and importance. She expresses her belief in and support for networking, highlighting its benefits for personal and professional growth.

In addition to her passion for networking, Deborah also operates a nonprofit organization called findoutwhy.info in The Hague. The focus of her nonprofit is on partnerships for the goals, aligning with SDG 17. She emphasizes the importance of partnerships and collaboration in achieving sustainable development.

Denise Leal, another individual mentioned in the analysis, emphasizes the need for digital literacy in today’s society. She offers one-to-one mentoring services at Find Out Why, based in The Hague. By providing mentorship in digital literacy, Denise aims to empower individuals and equip them with the necessary skills for success in the digital age. This aligns with SDG 4 and SDG 9, which respectively focus on quality education and industry, innovation, and infrastructure.

Deborah also encourages individuals to seize opportunities and take a proactive approach to professional advancement. She urges them to embrace their seniority, disregard hierarchical structures, and form alliances to collaborate effectively. This approach promotes gender equality (SDG 5) and reduced inequalities (SDG 10).

The Digital Fluency Lab, an organization mentioned in the analysis, operates in the city of peace and justice. Their work is centered around championing fairness, human rights, trustworthiness, and privacy. By aligning with these values, the organization contributes to SDG 16, which focuses on peace, justice, and strong institutions.

Deborah’s personal history reflects her resilience and mentorship capacity. She shares her experiences of career reinventions and personal adversity, highlighting the valuable lessons she has learned along the way. Her journey serves as a source of inspiration to others and demonstrates the power of resilience in overcoming challenges.

Lastly, Deborah believes that the youth have a deep understanding of betrayal based on their historical experiences. She encourages young individuals to use their influence and make a positive impact. This aligns with SDG 10 and SDG 16, which focus on reduced inequalities and peace, justice, and strong institutions.

In conclusion, Deborah, Denise Leal, and the Digital Fluency Lab are individuals and organizations that are committed to making a positive difference in the world. Through networking, partnerships, mentorship, and a strong belief in fairness, they contribute to various sustainable development goals, including quality education, reduced inequalities, and peace, justice, and strong institutions. Their efforts inspire others to embrace personal growth, seize opportunities, and create a better future for all.

Celestine Alves

The discussions centre around the lack of innovation in Brazil. It is argued that this lack is not due to a lack of thinkers or intelligence, but rather a lack of opportunities and funding. There is a belief that innovation can push and influence the government and public sector to invest more, particularly in public universities. The sentiment regarding this argument is neutral.

Another factor that is said to contribute to the decrease in industry in Brazil is the impact of the global economy and police problems. It is noted that this has complicated the region’s situation over the past few decades. The sentiment towards this argument is negative.

Regulation is seen as a means to foster innovation, rather than block it. The stance is that regulation can actually encourage innovation, and methods like Sandbox are mentioned as examples. The sentiment regarding this viewpoint is positive.

When it comes to private investment, it is acknowledged that it is profit-focused. However, there is a recognition that preventative measures must be in place to address potential risks associated with innovation. Unfortunately, no specific supporting facts are provided for this viewpoint. The sentiment regarding this stance is neutral.

The importance of innovative hubs in universities and public investments is emphasised as a way to foster innovation in Brazil. However, no specific supporting facts are provided for this argument. The sentiment regarding this argument is positive.

It is argued that big tech companies are exerting control over innovation worldwide. This is supported by the fact that small tech startups, such as the app Waze, have been acquired by big companies like Google. It is suggested that Brazilian engineers from universities are thinking about creating tech solutions that could be sold to these big companies. The sentiment towards this argument is negative.

There is a call for the empowerment of young people and small to medium-sized businesses so that they can control and stimulate their own innovation. It is noted that young people and graduates are already innovating but lack sufficient financial support. There is also a concern that big tech companies take control over smaller startups through acquisition. The sentiment regarding this argument is positive.

The need for society to regulate the control of big companies over innovation is highlighted. It is argued that regulation is necessary to prevent big tech companies from exerting too much power and control over the innovation landscape. The sentiment towards this viewpoint is neutral.

Another aspect that is deemed crucial for innovation is more diversity and participation. It is believed that complex problems require different perspectives, and that solving these problems necessitates the involvement of those who have been affected by them. The sentiment towards this argument is positive.

Lastly, there is a call for the youth to be included in the decision-making process. It is recognised that the youth have ideas and thoughts that could contribute to important discussions, and that simply inviting their participation is not enough. The sentiment regarding this viewpoint is positive.

In conclusion, the discussions surrounding the lack of innovation in Brazil centre around the need for more opportunities, funding, regulation, and diversity. The involvement of the youth in decision-making processes and the empowerment of small to medium-sized businesses are also highlighted. Additionally, there is a concern about big tech companies exerting control over innovation globally.

Boris

The analysis comprises multiple speakers discussing a range of topics, including innovation, sustainability, education, and youth empowerment. One of the speakers, Boris, believes that every aspect of life provides learning opportunities for making positive changes. Boris himself developed a strong understanding of programming after reading the book “How Things Work” in year six. Using his programming skills, Boris and his team in the computer science society created a neural network that successfully pairs students with their preferred subjects. Boris encourages youth to recognize the impact they can have by harnessing their skills and thinking resourcefully.

The sentiment turns negative when tech companies are discussed. It is argued that these companies intentionally make managing cookies a difficult process to collect more user data. This practice raises concerns about privacy and data collection.

Another negative sentiment arises when discussing the use of carbon offsetting by many companies. While these companies claim to offset their carbon emissions, it is stated that many of these offsetting methods are ineffective. This highlights the need for more accountability from tech companies regarding their contributions to data center pollution.

On a positive note, one speaker advocates for the implementation of a data tax. The argument is that everything on the internet is intellectual property, and companies should be held accountable for using this data to create new technologies. The suggestion is to impose a data tax to ensure that companies are held responsible for their data usage.

There is also a call for increased government funding targeted at youth below the age of 18 to engage in sustainable tech solutions. The argument is that governments can do more to support and fund young individuals, allowing them to exercise their creativity and contribute to sustainable technology.

The importance of accessible knowledge, a suitable environment, and mentors is emphasized for youth to make a significant impact. The speakers stress that for young people to succeed, they need up-to-date knowledge in emerging sectors such as the metaverse and cryptocurrency. Mentorship is seen as essential in guiding young individuals to effectively utilize their skills. Additionally, government policies that promote the right environment are viewed as crucial for skill development.

The idea of increasing collaboration between the public, private, and civil society is highlighted. It is argued that such collaborations can provide necessary resources and training programs for individuals. Moreover, increased interaction between youth and older individuals can lead to valuable learning experiences and further skill development.

The analysis concludes by asserting that anyone, regardless of age, can make a positive change in their communities. The speakers urge individuals to take action and collaborate for a better future.

In summary, the analysis presents various viewpoints on innovation, sustainability, education, and youth empowerment. While there are negative sentiments towards certain practices by tech companies, there are also positive ideas proposed, such as a data tax and increased government funding. The importance of accessible knowledge, a suitable environment, and mentorship for youth is emphasized, along with the need for collaboration between different sectors of society. The analysis inspires individuals to recognize their power to make a difference and work together towards creating a better future.

Denise Leal

Denise Leal, a young innovator from Brazil, is taking the lead in hosting a youth panel focusing on innovation. This event is particularly significant for some of the speakers, as it marks their first participation in such a gathering. Denise shows great enthusiasm as she actively encourages the speakers, creating an environment that fosters engagement and learning. She expresses her delight in seeing the audience join the session, clearly demonstrating her passion for youth participation and encouragement.

During the panel, Andrea Palomino discusses a noteworthy project called ‘Youth for our Data Future’. This initiative aims to include young people in the police process and bridge the gap between youth and decision-makers. Andrea’s comment highlights the importance of empowering and involving young individuals in decision-making processes, particularly in areas related to community development and the promotion of peace and justice. This project serves as an excellent example of the positive impact that youth inclusion can have on building stronger institutions and sustainable cities.

Denise also emphasizes the significance of continuous contribution to the Internet Governance (IG) community. By encouraging active participation and engagement, she demonstrates her belief in the power of collaboration and collective action. Her support for the inclusion of youth in the decision-making process reinforces the idea that diverse voices and perspectives are essential for making informed and inclusive decisions.

In conclusion, Denise Leal’s hosting of the youth panel centered around innovation showcases her passion for empowering young people and amplifying their voices. Through her enthusiasm and encouragement, she creates an environment that fosters collaboration, learning, and engagement. Furthermore, her support for initiatives such as ‘Youth for our Data Future’ highlights the importance of youth inclusion in decision-making processes and community development efforts. Denise’s dedication to the IG community exemplifies the potential for positive change when young individuals are given the opportunity to contribute and shape the future.

James Amattey

James Amattey, a student at the University of Hong Kong, advocates for increased support and collaboration to assist young people in developing sustainable initiatives. He understands the challenges faced by youth in sustainable innovation, including the lack of experience, resources, and skills. James emphasises the importance of collaboration with government and big firms to provide the necessary support and capacity building for young individuals in sustainable innovation. This collaboration is crucial for the success of sustainable initiatives as it allows for the inclusion of the youth’s perspective and provides the needed resources, capital, and training.

Furthermore, young people play a crucial role in the digital economy and are at the forefront of finding innovative solutions to societal challenges. Their proximity to these problems gives them an advantage in contributing to sustainable development. James encourages the younger generation to communicate and share their views through existing platforms, enabling them to actively contribute their knowledge, experiences, and viewpoints.

Intergenerational mentorship also plays a significant role in bridging the knowledge gap. The older generation’s increased openness to offering mentorship to young individuals is essential for transferring knowledge and expertise. This exchange of wisdom and guidance empowers young people to effectively lead sustainable initiatives.

To summarise, James Amattey highlights the need for increased support and collaboration to assist youth in developing sustainable initiatives. Collaboration with government and big firms provides the necessary resources and capacity building for young individuals. Young people’s active involvement in the digital economy and their ability to communicate their viewpoints are valuable assets for sustainable development. Intergenerational mentorship is also crucial in bridging the knowledge gap and empowering young individuals.

Ethan Chern

Ethan Chern, a concerned student, identified a waste problem in his school involving the disposal of unused books, leading to the emission of carbon dioxide. At the start of the school year, only 2-3 books were designated for book crossing, but by the end of the year, this number had surged to 400-500 books. Unfortunately, the school management decided to discard or recycle these books, resulting in additional carbon emissions. Ethan observed that this waste issue was detrimental to the environment and called for immediate action.

To address the waste management problem in educational institutions and promote sustainability, Ethan, along with his father, formulated an innovative solution. They established the Mon Pau Foundation, which aimed to find ways to deal with the excess books in a sustainable manner. The successful establishment of the foundation paved the way for ongoing initiatives and actions to mitigate waste and foster environmental consciousness among students.

Ethan firmly believes that everyone, regardless of age or gender, possesses the ability to contribute towards making the world more sustainable. In a speech, he stressed the significance of collective efforts towards sustainability and highlighted the Sustainable Development Goals (SDGs) as a common objective. Ethan’s advocacy for cooperation and inclusivity resonates with SDG 17: Partnerships for the Goals, which emphasises the need for collaboration between various stakeholders to achieve sustainable development.

In conclusion, Ethan Chern’s observations and initiatives shed light on the pressing waste management issues faced by educational institutions. His determination to address these challenges led to the establishment of the Mon Pau Foundation, a commendable step towards sustainability. By promoting collective efforts and emphasising inclusivity, Ethan encourages individuals of all ages and genders to contribute towards achieving the SDGs. It is through cooperative endeavours that we can pave the way for a more sustainable future.

Speakers

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

Unlocking Trust and Safety to Preserve the Open Internet | IGF 2023 Open Forum #129

Table of contents

Disclaimer: This is not an official record of the IGF session. The DiploAI system automatically generates these resources from the audiovisual recording. Resources are presented in their original format, as provided by the AI (e.g. including any spelling mistakes). The accuracy of these resources cannot be guaranteed. The official record of the session can be found on the IGF's official website.

Knowledge Graph of Debate

Session report

Brent Carey

New Zealand has shown its commitment to online safety by enacting the Harmful Digital Communications Act in 2016. This legislation takes a principles-based approach to address various forms of online harm, including incitement to commit suicide, breach of confidentiality, and harassment. The act covers both criminal and civil aspects, with NetSafe, a government-approved NGO agency, managing the civil side.

NetSafe plays a vital role in helping New Zealanders resolve online disputes through mediation. Each year, over 25,000 individuals seek assistance from NetSafe, with more than 7,000 engaging in the mediation process. This demonstrates the effectiveness of NetSafe in providing a platform for conflict resolution in the digital realm.

NetSafe has also led the development of the ‘Aotearoa Online Safety Code’, launched in July 2022. This code, supported by major platforms like TikTok, Meta, Amazon, Twitch, and Twitter, addresses issues such as hate speech, disinformation, and misinformation. By adopting risk-based approaches, the code aims to tackle these challenges and create a safer digital environment.

New Zealand is actively seeking innovative approaches to address emerging online harms and learn from global best practices. They have produced a discussion paper titled ‘Safer Online Services and Media Platforms Bill’ to explore content regulation. Additionally, NetSafe participates as an observer in global regulators’ forums, engaging in relevant discussions.

To ensure a comprehensive and collaborative approach to internet safety, different stakeholders need to come together for discussions. This collaboration within the digital ecosystem creates spaces and opportunities for diverse parts of the infrastructure to engage in meaningful conversations.

Industry-led interventions are considered crucial in promoting online safety. By providing a platform for different voices, these interventions contribute to a balanced and effective response to online threats.

However, the regulation of platforms has raised concerns about the withdrawal of news and media plurality. Some platforms have expressed plans to withdraw and stop providing news in response to regulations such as the Fair Digital Media Bill. This highlights the challenge of balancing regulation with maintaining a diverse media landscape.

The importance of media plurality and media literacy is widely acknowledged. Media plurality is seen as crucial for a vibrant civil society, while media literacy empowers individuals to critically navigate the digital world.

The existing media landscape is undergoing significant transformations due to the influence of both old and new media. Brent Carey suggests that understanding these changing dynamics and effective responses are necessary in this evolving landscape.

Preserving online privacy is of utmost importance, and New Zealand has implemented stringent measures to tackle privacy violations. The Harmful Digital Communications Act imposes penalties of a $50,000 fine or two years imprisonment for posting intimate images without consent. The New Zealand police actively prosecute such offenses, emphasizing the seriousness of this issue.

Brent Carey supports severe repercussions for online privacy violations and highlights the effectiveness of the Harmful Digital Communications Act in addressing such breaches.

Encouraging the online industry to uphold the highest standards of safety and corporate citizenship is essential. Brent Carey believes in striving for the highest standards, rather than settling for lower ones exhibited by certain platforms. Companies like Twitter have taken steps in this direction, as evidenced by Brent Carey’s involvement with Twitter’s Trust and Safety Council and their commitment to online safety through localized data.

It is worth noting that the discussion did not cover the Judaic argument, as Brent Carey explicitly declined to discuss it. This suggests that certain limitations or sensitivities may exist concerning specific topics within the broader discourse of online safety and governance.

In conclusion, New Zealand’s enactment of the Harmful Digital Communications Act reflects its commitment to online safety. NetSafe’s mediation services and the ‘Aotearoa Online Safety Code’ further enhance efforts to address online disputes and tackle issues such as hate speech and misinformation. New Zealand actively explores innovative strategies and seeks global best practices to combat emerging online harms. Collaboration among stakeholders is crucial for effective internet safety, and industry-led interventions play a vital role. However, challenges remain regarding platform regulation and media plurality. Preserving online privacy and promoting the highest standards of safety and corporate citizenship are key priorities.

Rishika Chandra

Fiji is at the forefront of recognising the significance of online safety and has taken concrete steps to ensure a secure digital environment for its citizens. In 2018, Fiji enacted the Online Safety Act, which laid the foundation for the establishment of the Online Safety Commission in 2019. The commission has made considerable progress in organising awareness and education programmes to educate people about potential risks and equip them with the necessary tools to protect themselves online.

Furthermore, Fiji has been actively involved in fostering international cooperation and knowledge sharing in tackling online abuse through its participation in the Global Online Safety Regulators Network. Formed in 2022, the network includes members from Fiji, the UK, Australia, Ireland, Africa, and Korea. This collaboration has been instrumental in promoting the exchange of ideas and experiences in combating online abuse on a global scale.

The partnership between the Online Safety Commission and eSafety Commissioner Australia, along with social media platforms such as Meta and TikTok, plays a crucial role in promoting online safety. Under this arrangement, the organisations work together to support online safety in Fiji and Australia by sharing best practices, raising awareness of online safety trends and emerging issues, and developing national online safety strategies. One of the primary ways they collaborate with these tech companies is through their content reporting systems, which enable users to report harmful and inappropriate content for swift action.

Governments around the world face the challenge of balancing regulations on online content and data privacy without infringing upon individuals’ rights to free speech or impeding innovation. While it is important to protect users from harmful content or cyber threats, it is equally essential to ensure that regulations do not stifle freedom of expression or impede the progress of technological advancements.

Fiji has taken a strong stance against online harassment, cyberbullying, image-based abuse, and child exploitation, criminalising these offences. The penalties are significant, including imprisonment and fines. However, it is worth noting that defamation is not covered under Fiji’s Online Safety Act.

To effectively regulate social media platforms, Fijians need a better understanding of their design, policies, and community guidelines. It is crucial for individuals to be aware of how these platforms work to navigate them safely. While social media platforms can be dangerous, they also serve as a means of connectivity and communication.

Building strong relationships and collaborations with social media platforms is vital in achieving a balance between regulation and individual rights. By working in a collaborative manner with these platforms, it becomes possible to address online safety concerns effectively.

In conclusion, Fiji’s commitment to online safety is commendable, with the enactment of the Online Safety Act and the establishment of the Online Safety Commission. The country’s active participation in international networks and partnerships, along with efforts to educate its citizens and collaborate with social media platforms, further solidifies Fiji’s position as a leader in this field. However, it is essential for governments to find a balance between regulation and individual rights, ensuring the protection of users while fostering innovation and free speech.

Audience

During the discussion, several key points were raised by different speakers. One audience member expressed concern about the involvement and engagement of civil society within the Internet Governance Forum (IGF). They questioned the extent to which civil society is included and heard in participatory discussions such as the IGF. This raised questions about the room and role for civil society and their ability to influence decisions.

Another speaker highlighted the importance of partnerships and their role in addressing the demands and concerns of civil society. They emphasized the need for the partnership to consider and respond to the voices and needs of civil society, particularly in the areas of peace, justice, strong institutions, and partnerships for the goals.

Doubts were also raised about the effectiveness of voluntary industry associations, specifically in sectors such as automotive, advertising, and digital identity. The audience member noted that voluntary industry associations in these sectors have failed to bring about significant change or address the concerns of stakeholders. This raised skepticism about the potential success of a new voluntary industry association.

The need to strike a balance between government and private sector involvement in regulating the internet was a key point of discussion. One speaker questioned the current system of industry-led regulation of the internet and advocated for a more balanced approach that includes government involvement. They highlighted the example of Canada’s Bill C-11 Online News Act, which required tech companies to pay news outlets for posting or linking content. This led to Meta removing news from their platforms, raising questions about the control that companies have over the digital space.

On the other hand, a speaker argued that less regulation can lead to better outcomes. They referenced the positive effects of the relatively unrestricted early internet and suggested that excessive government regulation can hinder innovation and progress. This viewpoint advocated for self-regulation as a solution, suggesting that businesses should take responsibility for their actions and address any potential harm caused.

Notably, there were contrasting viewpoints on self-regulation between different cultural contexts. A South Korean panel member advocated for self-regulation, while Europe has shifted towards government regulation. This highlighted the different perspectives on how best to regulate the internet and the need for cross-cultural understanding and collaboration.

The enforcement of online moderation rules and regulations was a point of concern, with many customers expressing dissatisfaction. The speaker called for transparency in the enforcement process but also highlighted the impact it may have on revealing business strategies. Striking a balance between transparency and maintaining customer trust was deemed essential.

In terms of partnership expansion, there was a call to bring more gaming companies into the fold and to establish rules and expectations specific to the gaming industry. This recognizes the unique challenges and dynamics within the gaming sector and the need for tailored approaches.

The challenges of information sharing within companies and content moderation were also discussed. Companies have been relatively low profile about information sharing within their functions, but there is a shift towards more sharing while considering trade-offs. Additionally, the stress and challenges faced by content moderators were highlighted through the game “Moderator Mayhem,” underscoring the need for a deeper understanding of the positions and support given to those responsible for content moderation.

The credibility of voluntary industry action in trust and safety was called into question, particularly considering the activities of certain companies in this space. There were concerns that their actions might undermine the overall credibility and effectiveness of voluntary action in ensuring trust and safety.

Finally, a speaker suggested that a non-prescriptive duty of care for user safety would be a better legislative approach. This would involve holding companies accountable for ensuring the safety of their users without prescribing specific actions or methods.

In conclusion, the discussion covered a wide range of topics related to civil society involvement, the effectiveness of voluntary industry associations, government and private sector involvement in regulating the internet, contrasting viewpoints on self-regulation, the enforcement of online moderation rules, challenges in the gaming industry, information sharing within companies, the credibility of voluntary industry action, and legislative approaches to user safety. Noteworthy observations include the importance of considering civil society demands and concerns, the need for balance and collaboration in regulation, and the challenges faced in content moderation and information sharing.

David Sullivan

The Digital Trust and Safety Partnership (DTSP) was launched by David Sullivan in February 2021 to establish best practices for trust and safety online using a risk-based approach. It aims to develop specific standards and practices for companies’ services. DTSP emphasizes the importance of tailoring assessments and practices based on company size and risk. One of its key goals is to prevent internet fragmentation and support a free and open internet by developing international standards on trust and safety. DTSP believes that adopting a risk-based approach and conducting third-party assessments can help achieve these goals. The partnership values the input of stakeholders, including industry perspectives, and aims to engage in broad consultations. DTSP recognizes the significance of independent third-party reviews to provide objective assessments of company practices. It also highlights the changing concept of self-regulation within companies as emerging regulatory regimes are established globally. David Sullivan advocates for greater transparency in online moderation processes and regulations, while also considering trade-offs. DTSP refrains from commenting on specific companies’ activities to maintain industry credibility. The partnership acknowledges previous challenges faced by voluntary industry associations and emphasizes the need for proper implementation and alignment with emerging regulations. It also recognizes the spread and challenge of digital authoritarianism and emphasizes the need for collective action beyond individual company initiatives. Overall, the DTSP aims to establish best practices for trust and safety online by tailoring assessments, considering various perspectives, advocating for international standards, and promoting transparency in online moderation processes. The partnership is committed to driving positive change in enhancing the trust and safety of the online environment.

Nobuhisa Nishigata

In Japan, except for broadcasting, there is no direct regulation of online content by the government. However, there are certain issues that persist, such as cyberbullying, online slandering, and the distribution of pirated content, particularly manga. Despite these challenges, the Japanese government places great importance on respecting freedom of speech and expression.

Measures have been taken to address these issues, including regulations against spam and finding a balance between public safety and human rights. The government acknowledges the need to protect children from online harm and encourages voluntary efforts for software installation and filter optimization. Additionally, discussions have arisen about the liability of internet service providers and their prompt actions in response to harmful content.

There is a positive outlook for the future development of the Digital Trust & Safety Partnership (DTSP) and a recognition of the importance of combating pirated content without direct regulation. Japan believes in learning from successful practices of companies and sees co-regulation as an effective approach to tackle online content issues.

Concerns have been raised regarding public safety and the activities of tech companies. The frustrations of tech companies with government involvement are acknowledged. However, Japan remains committed to maintaining an open and free internet. The commitment of Japanese Prime Minister Kishida and Japan’s support for the Future Declaration on the Internet exemplify this dedication. Additionally, the importance of effective internet governance was emphasized at the G7 ministerial meeting in Takasaki.

Media literacy and caution about relying too heavily on online media and social networking sites (SNS) for information are highlighted. Concerns are expressed about companies lacking journalistic backgrounds and the variation in information depending on the country.

The handling of content-related matters, such as harassment and defamation, as criminal offenses varies depending on the case. Jurisdiction plays a role in determining the approach taken, and for more serious offenses, law enforcement may directly charge individuals. In other cases, private lawsuits can result in sanctions or mitigation.

Nobuhisa Nishigata, mentioned in the discussions, expresses optimism about the further development of digitalization work in the United States. Nishigata supports private-led investment in digital infrastructure and believes the government should act primarily as a coordinator. Japan has already established a basic law concerning digitalization and the digital society, which emphasizes private-led investment in digital infrastructure.

Lastly, there is an expressed interest in a Japanese company joining global partnerships. The importance of partnerships and global cooperation, particularly in relation to the United Nations’ Sustainable Development Goal 17: Partnerships for the Goals, is emphasized.

In summary, while the Japanese government does not directly regulate online content, challenges and concerns persist regarding cyberbullying, online slandering, and pirated content. Respect for freedom of speech and expression is highly valued by the government. Measures such as regulations against spam, finding a balance between public safety and human rights, and involving tech companies in ensuring public safety are being discussed. The future development of the DTSP and the interest in joining global partnerships reflect Japan’s commitment to addressing these issues while maintaining an open and free internet.

Angela McKay

Angela McKay, a technology risk expert, strongly supports the concept of a free, open, and interoperable internet. She acknowledges the desire of global companies to operate in a global market and expresses encouragement toward conversations surrounding this vision. McKay recognizes that collaborative solutions are necessary to address the changing technology and harms landscape. Drawing from her experience in technology risk, she identifies similarities between the discussions around online harm and her field. She notes that governments, civil society, and companies have realized the importance of collaborating to tackle these issues effectively.

In terms of regulation and transparency, McKay believes that these approaches should reflect the cultural values and norms of a region. She acknowledges that regardless of the approach taken, governments represent the cultural values of their respective regions. This implies that regulatory and transparency approaches must be sensitive to cultural variations.

McKay advocates for a risk-based approach to address online harms. She highlights the need for companies to adopt risk-based approaches and emphasizes the importance of considering trade-offs to ensure a safe online environment. This approach allows for a more nuanced and flexible response to the complexities of online harms.

Cross-sector dialogue is another crucial aspect highlighted by McKay. She emphasizes the importance of conversations between different entities, citing examples such as the DTSP (Digital Trust and Safety Partnership) within organizations and the Global Online Safety Regulators Forum between regulators. Through dialogue and collaboration, learning can occur, leading to improved practices.

The exchange of best practices among companies of varying sizes is seen as instrumental in supporting global proliferation. McKay notes that the DTSP has partnered with the Global Network Initiative to involve civil society in advancing the Digital Services Act. This collaboration prevents knowledge and expertise from being confined to only large companies, ensuring that even medium and smaller companies have an opportunity to benefit from best practices.

McKay recognizes that the field of operational maturity is continuously evolving. Companies are constantly seeking out novel methods and practices that have not been previously implemented, highlighting their commitment to continuous learning and improvement.

The importance of exchanging ideas among different communities of civil society is stressed by McKay. It is not sufficient for companies alone to engage in dialogue; the participation of civil society is crucial to ensure a more inclusive and comprehensive approach to addressing online harms. McKay mentions that Google has been actively involving civil society members and academics in discussions on topics like child safety. They are also exploring the use of requests for information and online forums to catalyze conversations and gather diverse perspectives.

Advocating for active engagement with civil society, McKay suggests that companies should proactively encourage dialogue and collaboration among different communities. By bringing in external voices and perspectives, companies can better understand and address societal concerns.

While acknowledging the potential benefits of regulation and transparency, McKay cautions against viewing them as a panacea for all problems. She believes that focusing on what behaviors are being aimed to drive is more crucial than fixating on the enforcement method. This perspective challenges the false dilemma of regulation versus transparency, shifting the focus towards the fundamental goal of shaping positive online behaviors.

The progress made in managing cybersecurity risks is acknowledged by McKay. She highlights the evolution from solely focusing on vulnerability management to a more holistic, risk-based approach. This progress highlights the continuous efforts to enhance cybersecurity measures and protect online users.

In conclusion, Angela McKay’s perspectives highlight the importance of a free, open, and interoperable internet, collaboration to address online harms, culturally sensitive regulation and transparency approaches, risk-based management of online harms, cross-sector dialogue for learning and improvement, the exchange of best practices among companies of varying sizes, continuous learning and improvement in operational maturity, the significance of exchanging ideas with civil society, and the need to focus on driving desirable behaviors rather than fixating on enforcement methods. Her insights contribute to a more comprehensive understanding of the complexities and potential solutions within the digital landscape.

Kyoungmi Oh

The South Korean government is currently making efforts to exert control over content on various platforms, which has posed challenges and highlighted the need for increased transparency. Civil society organizations in South Korea are requesting platforms to disclose government requests for user information and content takedown, a practice that ceased around 2011.

The inadequacy of the SAFE (Safety, Audit, Feedback, and Enforcement) framework in addressing the unique aspects of the digital industry has been noted. The framework fails to consider the importance of freedom of expression and privacy, and the potential harms that occur when content is taken down or censored. This calls for a more nuanced approach to trust and safety that prioritizes protecting freedom of expression.

Collaboration with digital rights organizations and civil society is crucial for effectively managing trust and safety in the digital industry. The Trust and Safety Council of Twitter serves as an example of successful collaboration, incorporating a wider range of perspectives and insights into content regulation decisions. Limited transparency with recognized human rights organizations under appropriate non-disclosure agreements is also seen as beneficial.

Incorporating industry-specific considerations and placing greater emphasis on enforcement and transparency within the SAFE framework is necessary. The current framework falls short in addressing the unique characteristics of the digital industry, with abstract questions that do not cater to its specifics. Clarity on what content should be taken down is lacking, leading to confusion and potential bias in decision-making.

Self-regulation is preferred over governmental regulation, as endorsed by South Korean civil society organizations. However, transparency in the self-regulation process is crucial due to the diverse interests, goals, and missions of different organizations.

South Korea has enacted legislation to address cybercrimes, particularly harassment and sexual abuse. The Punishment Act allows the communication network to punish offenders and provides a legal framework for combating these crimes.

In conclusion, the South Korean government’s control over platform content and the shortcomings of the SAFE framework have raised concerns regarding transparency, freedom of expression, and privacy. Collaboration with digital rights organizations and civil society, industry-specific considerations, and enforcement are essential for effective trust and safety management. While self-regulation is preferred, transparency in the self-regulation process is crucial. Legislation addressing cybercrimes demonstrates South Korea’s commitment to combating online abuse. Addressing these issues will contribute to a more inclusive and secure digital environment.

Speakers

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more