Building Trust Internet Governance

Internet Governance: Showing Up, Being Present, Making Decisions

 ”The only way to avoid malware and viruses is to use Linux!”

“Stop saying that or I will hit you with my Microsoft Surface!”

So went a rather uh, heated discussion about cyber security at the pre-IGF meetings that the ISOC Ambassadors, Fellows and Chapter Leaders were at. Termed the Collaborative Leadership Exchange (CLX), its objectives were to get participants prepared for the intensive workshop circus that is the annual IGF conference.

But I think we’ve all already taken away much, much more than that. Preparation for conference workshops tend to be humdrum and mind-numbing – but these two days of pre-IGF workshops is by far one of the most positive experiences in group prep I’ve had the privilege of attending. These two days saw some intensive discussions on ISOC chapter management issues, Internet governance problems and how to solve them, discussions on specific topics such as building a safe internet, creating and sustaining online communities, developing local content, cyber security (which led to the exchange you read above), amongst other issues.

As we spend the rest of the week conferencing in beautiful Bali with amazing food, it seems appropriate to approach the question culinarily: what’s the secret sauce to having a good discussion? Here are the ingredients:

1. An external moderator who is prepared
Ruud Janssen is a rock star – spent his birthday with us sorry folk rather than with his family. He came prepared, understanding the organisation, its objectives, and the opportunities that the platform could give discussants.

2. A facilitation technology that actually encourages active discussion
I quite like the Fish Bowl facilitation method of discussion – 8 seats in the inner circle, 16 seats outside; all seats save 1 in the inner/discussant circle should be filled; 16 seats outside aka observers cannot speak but can request to enter the inner circle by claiming the empty seat, after which conversation must stop until someone leaves the inner circle. This allows
(1) good discussion among a small group of people,
(2) peer pressure keeps the loudmouths down, especially if the inner circle has swapped many times – seat hogs don’t stay seat hogs too long,
(3) it gives opportunity to jump in if you want, or stay as an observer if you don’t want,
(4) it is strict and adheres to rules (no more talking once the inner circle ceases to make 7 pax)

The second part of the Fish Bowl is to peer- solve your solutions, where participants are grouped in tables of about 7, and for 35mins, the table focuses on one problem that’s been defined, providing perspectives and offering solutions.
(5) This was particularly useful as it filled a gap many have complained about before: after meetings, participants have no time to ruminate on solutions to issues that have been raised. Now “thinking time” is built into the programme.

3. People who care
I’ve had a day to mull over it, and after numerous informal chats with my fellow IGF Ambassadors, there is a sense that the people at the table – at OUR table, the ISOC peeps, in the CLX room – we are all fully present and in the moment, and ready to roll up our sleeves to help. This bunch of people want to help. These bunch of people are interested in the issues raise. This bunch of people actually bother. They will to participate and contribute, even if they disagree with you (on what OS you use), even if they don’t feel much for your topic, and even if it’s after lunch and time for a siesta.

My key takeaway these two days? That decisions are made by people who show up AND contribute.

That, and maybe I should look into using Linux. Tell me Nabil, can I buy it from iTunes? 😉

Building Trust Identity Internet Governance Privacy

Internet of Humans

On November 8, 2012, I stood in as moderator of an extraordinary workshop for a colleague who was unable to make it to this year’s IGF covering the topic: “The Internet of Humans – Online Human Behaviour & IG Policy Impacts”.

This was an interesting mashup of Sociology, Social Psychology, ICT and Internet Policy dimensions with several of the panelists dipping their toes into more than one of these areas to hammer home their point.

As background to this Workshop, if IG and ICT policy are to be effective, it is clear that we must cultivate a keen understanding of the ever-evolving human behaviours that accompany an Internet of individuals and communities; a human internet that shapes global society in ever more pervasive ways.

This workshop formed an intersection between research on emerging sociological and psychological trends in Global Human behavior on the Internet, and Internet Governance Policy and Practice.

With the evolution of the Internet, there are ever increasing opportunities and challenges for empowered participation regarding issues of Privacy, Security, Freedom of Expression and Openness. Tacit behaviour of everyday users forms a “Net Etiquette” of expectations, roles, responsibilities and rights that surround participation. These individual and community online actions lead to macro-effects on “virtual” and “real world” spaces. Our (cyber)security, freedom and knowledge as a society do not depend on theoretical abstraction but on real world actions.

The multi-stakeholder, global and interactive workshop assembled leading research in Sociology and Psychology of Ihe internet, social mediaphiles, policy practitioners, businesses, government, and youth to hold a fluid discussion with all stakeholders present to:

  • Discuss a range of research and perspectives in an attempt to demystify and unload the meanings that are embedded in concepts of Privacy, Trust, Freedom of Expression, Openness and Security; and
  • Apply the findings to ICT and IG Policy, and practice by considering:
    • ​- measures that can be taken to ensure freedom of expression, access to knowledge and privacy for all stakeholders including Youth;
    • – challenges encountered in protecting freedom of expression online Solutions to better empower citizen’s access to information and effective/empowered participation in digital age;
    • – “Net Etiquette” and the roles, responsibilities and rights of users as they relate to openness, privacy and security.

The workshop relied on an interactive, dialogue based approach with a primary aim of inclusion. A concrete outcome of this workshop is expected to be the creation a roadmap of next steps in furthering a research and evidence-based ICT and IG policy agenda which, based on the workshop discussions will seek to address the following considerations:

  • Use of real names online is desirable but we need to be careful of what is posted online and the law should be balanced in dispensing justice related to speech online and in the physical world.
  • Two rights that are neglected online are freedom of assembly and freedom of association. These rights are threatened by surveillance, censorship and erosion of anonymity.
  • Need for greater accountability by all stakeholders in what is shared online and generally how one behaves online. As well as the need for govts to understand the issues from a multi disciplinary, multistakeholder approach.
  • One approach suggested was to study/understand human behavior first then consider online behavior
  • Some questions raised include what steps are being taken by Policymakers /regulators to understand the behaviors are taking place on line and How do regulators determine what policies need to be implemented to address online behavior? It was recommended to use different specialist to analyzed this issue (experts on behavior, sociologist, technologist in addition to lawyers).
  • Privacy is an issue integrally related to security: users’ concerns revolves around non-authorized access to their systems or devices, identity theft, hijacked of their accounts, access to their financial information and unauthorized used of payment instruments.
  • Keeping user information safe and available is top priority for Google. It is important to ensure strong security and privacy protection by providing easy-to-use security and privacy tools to help users to protect themselves against spam, phishing and malware and to avoid unauthorized access to their accounts and personal information.
  • Users’ behavior alters traditional legal institutions: for example the raising need for users to have content available on demand, when, where and in the format they want is affecting traditional models of copyright and there is an increasing need that those models start to became more resilient to users’new demands.
  • Consideration needs to be given for how ICTs have changed our respective behaviours e.g constant use of email, impact on interpersonal communication skills (face to face)
  • There is a large population of users that see the internet as a source of information, but are unaware of the risks associated with the use of the internet. There is a need for greater awareness and capacity building in the area of privacy, security and ethics.
  • Laws need to be in place address cybercrime.
  • Based on an emprical study (by ChildNet) of 800 youths on 6 different continents, the following findings were pertinent:
    • – Youth are more inclined to be open if they were anonymous, Anonymity provides security, protection and allows them to be more expressive.
    • – One drawback was that aspects of communication (body language ) is lost, found it difficult to identify emotions even with the use of emoticons
    • – Sometimes their own freedom of expression had to be curtailed out of concern for their reputation
    • – The type of communication and the openness of it depends on the target audience
Overall, the workshop participants agreed that there is a need to have diversity in this kind of discussion and get experiences of different groups eg disabled, policymakers and ordinary end users. It was anticipated that this approach will show the different perspectives of how we behave online and allow for the creation of more informed policies. In the final analysis, there was a call for collaboration in order for the research agenda to be expanded.