SlideShare a Scribd company logo
IGF2013 DAILYNEWS - EDITION FRIDAY, 25 October 2013 Page 1	
5th
edition, 25 October 2013
daily.igf2013.or.id
DAILYNEWS
Internet Freedom vs. Security
in Internet Governance Forum 2013
After long discussion about which multi-stakeholder Internet Governance
system that will be adopted in the future, on the Day 3 IGF 2013 the
issue about Internet Freedom vs. Internet Security come turns. The issues
about how to protect journalists, bloggers, internet users from cyber threat
or from repressive internet law, how to give a chance to everyone to speak
their mind about better Internet Governance, especially the youth, raised
as well as the issue of internet security such as online anonymity, filtering,
blocking, and internet control done by governments and private sectors.
Of course, balancing between these two poles need time and further
discussions. But some key principles has been discussed, such as: where
government is oppressing, anonymity could be a way to express opinions.
Or to tackle cyber threats like Spam, Hacking, and Cyber-Crime needs a
strong cyber-crime laws as well as trained professional people to tackle
the problems.
And who should govern the internet? Everyone, including our young
generation. One can’t avoid their dreams and aspirations about the better
Internet in the future. They want a more precise translation websites, less
of internet scam, a good collaboration between young people, open and
standardized web, and more literate internet users. Who will make that
happen in the future? The answer lies on the result of the 8th Internet
Governance Forum in Bali, Indonesia.
Page 2 IGF2013 DAILYNEWS - EDITION FRIDAY, 25 October 2013 IGF2013 DAILYNEWS - EDITION FRIDAY, 25 October 2013 Page 3	
NEWSFLASH
Further discussion
about Spam,
Hacking, and Cyber-
Crime, being raise
on Day 2 IGF 2013.
Christopher Boyer asks
the panelists, such as
, Dr. Edmon Makarim
(Research Fellow
and Professor University of Indonesia), Jayantha Fernando
(Director & Legal Advisor, ICT Agency of Sri Lanka), etc. to
focus on legal frameworks and asks on their perspectives
on how big of a problem is spam, hacking, as well as cyber-
crimes, and how successful is the process on these issues.
Internet Society representatives, Karen Mulberry puts
a strong point on WCIT treaty conference as well as its big
debate about including spam in the international treaty. Other
speaker such as Wout de Natris sees spam as a nuisance
that have reached the point where the government must take
action on it. To scale initiatives and make it more sustainable,
Mulberry added that projects has been done, leveraging the
information from MAAWG, focusing on operational aspect of
managing and mitigating spam, malware, botnets, also there
is the London Action Plan. The issue of spam is a hard one to
cure, and instead of fighting the impossible, this issue should
be managed to the benefit of all user. 	
Chris Painter of the Department of State added that raising
awareness activities are essential. Painter also emphasizes
on the need of a strong cyber-crime law as well as trained
professional people to tackle the issues. These two factors
need to co-exists together in order for the law to take effect.
In dealing with these security issues, it requires different
approaches to make sure of secure networks, bringing
together different communities (law enforcement, technical
communities to defend networks, private sector as well), joint
workshop with the form of incident responses and security
teams.
Reporter: Nadia Maharani, Okky Alparessi
Protecting Journalist,
Bloggers, and Media Actors
in Digital Age
Uluwatu 5, 09:00 - 10:30 AM
On day 3 IGF 2013, a discussion on protecting journalist,
bloggers, and media actors in digital age was held with
presenting speakers from countries such as Brazil, Argentina,
France, the United Kingdom, and Indonesia.
Jennifer Henrichsen of UNESCO Commissioned research on
online safety emphasizes on the importance of digital literacy in
order to minimize digital dangers or online threats. Henrichsen
describes that there are four key component to the threat
modeling basic: what to keep private, who wants to know your
data, what are the risks, and what if they succeed in getting into
your data.
Focusing on the protection of bloggers, the next topic
discusses the need of equality in protection of journalists and
bloggers. Eduardo Bertoni from Argentina stressed the fact that
journalist and bloggers need to be protected from defamation
because with Internet, it is impossible to anticipate where the
written contents will be read and different jurisdiction equals to
different rules.
Indonesian speakers, Budi Putra and Bambang Harymurti,
elaborate more on blogger safety. Budi Putra emphasizes that
licensing, real name registration, accreditation, protection of
sources and violence, legal liability, and ethical responsibilities
are the key problematic for bloggers.
Bambang Harymurti, editor-in-chief of Tempo daily magazine,
and a strong campaigner of freedom of the press, added that
a revision of the law by expulsion of articles 27, 28, and 45 of
Indonesia Internet Law/UU ITE is strongly needed.
Reporter: Susan, Renold, Nadia
Focus Session (Security: Legal and
Other Frameworks; Spam, Hacking,
and Cyber-Crime
MAIN HALL, 14:30
Online Anonymity, Freedom
of Expression & Internet
Governance
Room 9, Kintamani 7, 11:00 - 12:30 PM
The workshop session explored online anonymity and its im-
portance to different user groups, in particular young people.
With around 14 panelists ranging from private sectors and CSOs
in Europe, Asia Pacific, Latin American and Caribbean, the dis-
cussion on the Day 3 IGF 2013 rise the question about anonym-
ity in relationship with freedom of expression and its impact to
Internet Governance.
Research from Youth IGF Project/Childnet International stat-
ed that the main reason why people choose to be anonymous
online is to protect personal information. Anonymity is considered
in positive use if it is under freedom of constraints reason, and not
based on freedom of responsibility. In certain conditions where
government is oppressing, anonymity could be a way to express
opinions.
Anonymity also poses challenges for Internet Governance.
From the industry side, they tend to opt for real-name culture on
the Internet and social media for safety reasons. Simon Milner
from Facebook give example of their policy and advice, which
is to only accept request from people you know. Nigel Hickson
from ICANN also stated that we must know the conditions under
which anonymity should be in. And from safety perception,
transparency is needed, for example concerns about what
happen to our information when it is uploaded online.
Reporter: Hersinta
Youth’s collaboration
to create a better safer
internet
Nusa Dua Hall 2, 14.30-16.00
Unlike the rest of the sessions on Day 3 IGF 2013, most of the
panelists on this discussion were youngsters from different
countries. There were five prominent youths who shared about
their experience and expectation of internet. They were also given
a chance to state their wishes about better internet, such as: a
more precise translation websites, less of internet scam, a good
collaboration between young people, open and standardized
web, and more literate internet users.
This session was designed as an interactive discussion by
engaging the participants with the speakers. Each participant was
given an electronic tool to vote their opinions on questions given.
Interestingly, from the voting it was found out that more than 50%
participants chose companies, industries, and web developers
(including geeks) as the most responsible stakeholders for
shaping the future of the internet.
In this session, the participants also agreed that there were
some strategies to commit in order to achieve a better and
safer internet. Those strategies should be started with confident
carers, raising awareness through analyzing and education,
privacy by default, global declaration of responsible online users,
better collective social norms and values, and also inclusive
empowering policy. These collaborative ideas will be continued
to the next level and make substantial progress in the coming
year.
Reporter: Fiona, Susan, and Renold
Privacy: From Regional Regulations
To Global Connections
Room 4 Uluwatu 1, 11.00-12.30
Internet is something very broad, it dissolves geographical
internet limits on a larger scale, for example it allows personal
data and others to flow across a border for social Interaction and
support the economy. This is the background of topic discussion
“Privacy, from regional regulations to global connections” held
in Uluwatu 1 at IGF Day 3, on 24th October, 2013. The purpose
of this workshop is to explore main principles and strategy
required to achieve fair and balanced approach to an effective
data protection in regional and international. Furthermore, this
workshop also explore on how the approach of local and regional
can be used at an international level and be used as a global
solution.
The discussion also brought case on ‘Snowden Leaks’ by
Sophie Kwasny, Head of the Data Protection Unit, Council of
Europe-Intergovernmental Organizations (France) who gives
a statement about Snowden issue: “United States should stop
certain things, but not everything”. Furthermore, she explained
that US must immediately stop its surveillance activities in other
countries.
It becomes polemic on how tight and big data should be
protected. Panelist from Poland said that when it comes to
construct regulation on protection data, we must consider 3
elements: government, citizen and state. Poland, currently has
been doing an open forums and dialogue that invite all parties
from youth to society organizations, to talk about the technical
and data management, and also its impact to the society.
Reporter: Okky Alparessi, Aprida
Who Governs the Internet –
How People Can Have a Voice
Room 8 Kintamani 2, 14:30 - 16:00
The heated debate between countries on how to maintain the
internet and about Internet Governance has been happening
a few years back through the World Summit on the Information
Society. On Day 3 IGF 2013, the debate on who truly maintains
the internet and how the people can have the voice continued.
In this session, speakers from Poland, India, United States,
Brazil, as well as Kenya have gathered to speak on these issues.
Jeremy Malcolm as the moderator feels a change in the internet
governance, and asks the invited speaker to speak upon the
subject. Nigel Hickson of ICANN sees this as a challenge as
there are considerable amount of gap in discussing the issue
on internet governance; therefore, a new process is needed.
Maintenance and political issue are one of the two issues
surrounding the Internet Governance Forum.
Parminder Jeet Singh of IT For Change emphasize the way to
govern or maintain is seen by many people from many different
perspectives because the internet holds different meanings to
people. He explains how difficult it is to answer who truly governs
the internet because of the personal interest that stands in the
way. Governing the internet involves decision making and public
policy which then involves invoking the power lies within state
and it impacts people’s interest.
Reporter: Nadia Maharani, Okky Alparessi
Erratum on Page 2, Edition
4 IGF Daily News 2013
“The power of Internet Enabled SMEs Reach
Out to The Local and Global Market” session on
the page 2 is this one.
NEWSFLASH
Page 4 IGF2013 DAILYNEWS - EDITION FRIDAY, 25 October 2013
INTERVIEW
The TEAM
		 Olivia Hutagaol, Maria A. Inkiriwang,
		 Okky Alparessi, Nadia Maharani	
		 Frenavit Putra, Eri Kasman G.
Designer		 : Olivia Hutagaol, Maria A. Inkiriwang
Editorial Secretariat	 : Mariam Ananda, Mataharitimoer,
		 Anisa Nurlitasari
Board of Advisor	 : ID-IGF Secretariat
Managing Editor 	 : Damar Juniarto
News Coordinator	 : Mariam Ananda
Editor 		 : Damar Juniarto, Hersinta, 			
Reporter	 	 : Mariam Ananda, Aprida Sihombing, Hersinta,
		 Fiona Suwana, Renold Sutadi, Susan Wen, 	
:
Can you tell us about Freedom House’s
findings on cyberspace control issue?
Our report this year discovered some
extremely worrisome threats. Internet
freedom more generally has been declining
around the world for 3 years. Particular
concern for us is the rise in surveillance.
We have seen that 35 out of 60 countries
that we evaluated this year have increased
their surveillance powers. Of course there
is the issue with US, but many other
countries have past new laws or upgraded
their equipments. And its becoming quite
problematic particularly in countries with
very full of law. Where political activist
and civil society were being specifically
targeted for things they say online.
How about violence that happenned to
bloggers and online users?
Actually violence on bloggers and online
users has been on dramatic rise. Part of
the issue is that more people have access
to internet, particularly social media. More
people getting arrested and physically
Sanja Tatic Kelly
Project Director of Freedom on The Net,
Freedom House
attacked in some instances. In places like Syria just over
the past year alone 20 netizens and citizen journalist
were killed when they tried to report some of the
human rights violations there. Other interesting
case is from Mexico, where several bloggers and
online journalist were killed over the past year. Not
by the government but actually by the criminal
underworld. And this bloggers actually tried to
write uncover drug trafficking.
You stated that “There’s freedom of speech but
there’s no freedom after speech.” What does it
mean?
I knew in many countries we are seeing this
phenomenon instead of blocking and filtering
information. Governments are actually
obtained to leave the Internet unfiltered but
then people who post messages that provoke
the government often find themselves behind
the bars. Sometimes in prison for years, 10
or 20 years or even killed. Well you can then
say, is that you free to say something online
and you are not going to be censored? But
after you say something online you’re going
to be severely punished. So that freedom
after speech just does not exist.

More Related Content

What's hot

Indonesia National Cyber Security Strategy
Indonesia National Cyber Security StrategyIndonesia National Cyber Security Strategy
Indonesia National Cyber Security Strategy
ICT Watch
 
Indonesia Netizen Facts (April - June 2015)
Indonesia Netizen Facts (April - June 2015)Indonesia Netizen Facts (April - June 2015)
Indonesia Netizen Facts (April - June 2015)
ICT Watch
 
Indonesia Netizen Facts (July - September 2016)
Indonesia Netizen Facts (July - September 2016)Indonesia Netizen Facts (July - September 2016)
Indonesia Netizen Facts (July - September 2016)
ICT Watch
 
Indonesia Netizen Facts (April - June 2016)
Indonesia Netizen Facts (April - June 2016)Indonesia Netizen Facts (April - June 2016)
Indonesia Netizen Facts (April - June 2016)
ICT Watch
 
Persiapan IGF 2018
Persiapan IGF 2018Persiapan IGF 2018
Persiapan IGF 2018
Alvidha Septianingrum
 
Perencanaan Infrastruktur (Trends Infrastructures)
Perencanaan Infrastruktur (Trends Infrastructures)Perencanaan Infrastruktur (Trends Infrastructures)
Perencanaan Infrastruktur (Trends Infrastructures)
soe sumijan
 
ID IGF 2016 - Hukum 3 - Peran Negara dalam Kedaulatan Siber
ID IGF 2016 - Hukum 3 - Peran Negara dalam Kedaulatan SiberID IGF 2016 - Hukum 3 - Peran Negara dalam Kedaulatan Siber
ID IGF 2016 - Hukum 3 - Peran Negara dalam Kedaulatan Siber
IGF Indonesia
 
2015 Cyber Security Strategy
2015 Cyber Security Strategy 2015 Cyber Security Strategy
2015 Cyber Security Strategy
Mohit Kumar
 
Indonesia Netizen Facts (October - December 2016)
Indonesia Netizen Facts (October - December 2016) Indonesia Netizen Facts (October - December 2016)
Indonesia Netizen Facts (October - December 2016)
ICT Watch
 
Presentasi ftii intlcyberlaw
Presentasi ftii intlcyberlawPresentasi ftii intlcyberlaw
Presentasi ftii intlcyberlawftii
 
4.01 Cyber Conference_ press release5.13
4.01 Cyber Conference_ press release5.134.01 Cyber Conference_ press release5.13
4.01 Cyber Conference_ press release5.13
Signals Defense, LLC
 
ID IGF 2016 - Infrastruktur 3 - Security Governance Framework
ID IGF 2016 - Infrastruktur 3 - Security Governance FrameworkID IGF 2016 - Infrastruktur 3 - Security Governance Framework
ID IGF 2016 - Infrastruktur 3 - Security Governance Framework
IGF Indonesia
 
Vincent O. Mwando - Encryption
Vincent O. Mwando - EncryptionVincent O. Mwando - Encryption
Vincent O. Mwando - Encryption
Vincent Mwando
 
Digital citizenship powerpoint
Digital citizenship powerpointDigital citizenship powerpoint
Digital citizenship powerpoint
JannahAboulhassan
 
Nigf report appendix pages
Nigf report   appendix pagesNigf report   appendix pages
Nigf report appendix pagesAgidigba
 
Averting the dangers embedded in lack of privacy law in nigeria by arazim
Averting the dangers embedded in lack of privacy law in nigeria  by arazimAverting the dangers embedded in lack of privacy law in nigeria  by arazim
Averting the dangers embedded in lack of privacy law in nigeria by arazim
Arazim Sheu
 
Introduction to Internet Governance and Cyber-security
Introduction to Internet Governance and Cyber-securityIntroduction to Internet Governance and Cyber-security
Introduction to Internet Governance and Cyber-security
Glenn McKnight
 
South Africa MXIT exploratory paper
South Africa MXIT exploratory paperSouth Africa MXIT exploratory paper
South Africa MXIT exploratory paperAkshay Sinha
 
Digital citizenship powerpoint
Digital citizenship powerpoint Digital citizenship powerpoint
Digital citizenship powerpoint
Omnia Magdy
 
Global challenges in the new information age
Global challenges in the new information ageGlobal challenges in the new information age
Global challenges in the new information ageNitish Rai
 

What's hot (20)

Indonesia National Cyber Security Strategy
Indonesia National Cyber Security StrategyIndonesia National Cyber Security Strategy
Indonesia National Cyber Security Strategy
 
Indonesia Netizen Facts (April - June 2015)
Indonesia Netizen Facts (April - June 2015)Indonesia Netizen Facts (April - June 2015)
Indonesia Netizen Facts (April - June 2015)
 
Indonesia Netizen Facts (July - September 2016)
Indonesia Netizen Facts (July - September 2016)Indonesia Netizen Facts (July - September 2016)
Indonesia Netizen Facts (July - September 2016)
 
Indonesia Netizen Facts (April - June 2016)
Indonesia Netizen Facts (April - June 2016)Indonesia Netizen Facts (April - June 2016)
Indonesia Netizen Facts (April - June 2016)
 
Persiapan IGF 2018
Persiapan IGF 2018Persiapan IGF 2018
Persiapan IGF 2018
 
Perencanaan Infrastruktur (Trends Infrastructures)
Perencanaan Infrastruktur (Trends Infrastructures)Perencanaan Infrastruktur (Trends Infrastructures)
Perencanaan Infrastruktur (Trends Infrastructures)
 
ID IGF 2016 - Hukum 3 - Peran Negara dalam Kedaulatan Siber
ID IGF 2016 - Hukum 3 - Peran Negara dalam Kedaulatan SiberID IGF 2016 - Hukum 3 - Peran Negara dalam Kedaulatan Siber
ID IGF 2016 - Hukum 3 - Peran Negara dalam Kedaulatan Siber
 
2015 Cyber Security Strategy
2015 Cyber Security Strategy 2015 Cyber Security Strategy
2015 Cyber Security Strategy
 
Indonesia Netizen Facts (October - December 2016)
Indonesia Netizen Facts (October - December 2016) Indonesia Netizen Facts (October - December 2016)
Indonesia Netizen Facts (October - December 2016)
 
Presentasi ftii intlcyberlaw
Presentasi ftii intlcyberlawPresentasi ftii intlcyberlaw
Presentasi ftii intlcyberlaw
 
4.01 Cyber Conference_ press release5.13
4.01 Cyber Conference_ press release5.134.01 Cyber Conference_ press release5.13
4.01 Cyber Conference_ press release5.13
 
ID IGF 2016 - Infrastruktur 3 - Security Governance Framework
ID IGF 2016 - Infrastruktur 3 - Security Governance FrameworkID IGF 2016 - Infrastruktur 3 - Security Governance Framework
ID IGF 2016 - Infrastruktur 3 - Security Governance Framework
 
Vincent O. Mwando - Encryption
Vincent O. Mwando - EncryptionVincent O. Mwando - Encryption
Vincent O. Mwando - Encryption
 
Digital citizenship powerpoint
Digital citizenship powerpointDigital citizenship powerpoint
Digital citizenship powerpoint
 
Nigf report appendix pages
Nigf report   appendix pagesNigf report   appendix pages
Nigf report appendix pages
 
Averting the dangers embedded in lack of privacy law in nigeria by arazim
Averting the dangers embedded in lack of privacy law in nigeria  by arazimAverting the dangers embedded in lack of privacy law in nigeria  by arazim
Averting the dangers embedded in lack of privacy law in nigeria by arazim
 
Introduction to Internet Governance and Cyber-security
Introduction to Internet Governance and Cyber-securityIntroduction to Internet Governance and Cyber-security
Introduction to Internet Governance and Cyber-security
 
South Africa MXIT exploratory paper
South Africa MXIT exploratory paperSouth Africa MXIT exploratory paper
South Africa MXIT exploratory paper
 
Digital citizenship powerpoint
Digital citizenship powerpoint Digital citizenship powerpoint
Digital citizenship powerpoint
 
Global challenges in the new information age
Global challenges in the new information ageGlobal challenges in the new information age
Global challenges in the new information age
 

Viewers also liked

Disinformasi, diskriminasi, dan radikalisme di internet
Disinformasi, diskriminasi, dan radikalisme di internetDisinformasi, diskriminasi, dan radikalisme di internet
Disinformasi, diskriminasi, dan radikalisme di internet
mataharitimoer MT
 
Menakar media sosial
Menakar media sosialMenakar media sosial
Menakar media sosial
mataharitimoer MT
 
Igf 2013 daily news edition 3
Igf 2013 daily news   edition 3Igf 2013 daily news   edition 3
Igf 2013 daily news edition 3
mataharitimoer MT
 
KEGAWAT-DARURATAN NAPZA
KEGAWAT-DARURATAN NAPZAKEGAWAT-DARURATAN NAPZA
KEGAWAT-DARURATAN NAPZA
mataharitimoer MT
 
Emergency psichiatri
Emergency psichiatriEmergency psichiatri
Emergency psichiatri
mataharitimoer MT
 
Kegawatdaruratan psikiatri
Kegawatdaruratan psikiatriKegawatdaruratan psikiatri
Kegawatdaruratan psikiatriYeni Anggraini
 
Igf 2013 daily news edition 4
Igf 2013 daily news   edition 4Igf 2013 daily news   edition 4
Igf 2013 daily news edition 4
mataharitimoer MT
 
Correlation liver disfunction and infection disease (dengue typhoid fever)01
Correlation liver disfunction and infection disease (dengue typhoid fever)01Correlation liver disfunction and infection disease (dengue typhoid fever)01
Correlation liver disfunction and infection disease (dengue typhoid fever)01
mataharitimoer MT
 

Viewers also liked (9)

Disinformasi, diskriminasi, dan radikalisme di internet
Disinformasi, diskriminasi, dan radikalisme di internetDisinformasi, diskriminasi, dan radikalisme di internet
Disinformasi, diskriminasi, dan radikalisme di internet
 
Menakar media sosial
Menakar media sosialMenakar media sosial
Menakar media sosial
 
Igf 2013 daily news edition 3
Igf 2013 daily news   edition 3Igf 2013 daily news   edition 3
Igf 2013 daily news edition 3
 
Penatalaksanaan gg-jiwa
Penatalaksanaan gg-jiwaPenatalaksanaan gg-jiwa
Penatalaksanaan gg-jiwa
 
KEGAWAT-DARURATAN NAPZA
KEGAWAT-DARURATAN NAPZAKEGAWAT-DARURATAN NAPZA
KEGAWAT-DARURATAN NAPZA
 
Emergency psichiatri
Emergency psichiatriEmergency psichiatri
Emergency psichiatri
 
Kegawatdaruratan psikiatri
Kegawatdaruratan psikiatriKegawatdaruratan psikiatri
Kegawatdaruratan psikiatri
 
Igf 2013 daily news edition 4
Igf 2013 daily news   edition 4Igf 2013 daily news   edition 4
Igf 2013 daily news edition 4
 
Correlation liver disfunction and infection disease (dengue typhoid fever)01
Correlation liver disfunction and infection disease (dengue typhoid fever)01Correlation liver disfunction and infection disease (dengue typhoid fever)01
Correlation liver disfunction and infection disease (dengue typhoid fever)01
 

Similar to Igf 2013 daily news edititon 5

Daily News 4th ed
Daily News 4th edDaily News 4th ed
Daily News 4th ed03bmai
 
PRIVACY RIGHTS ARE HUMAN RIGHTS (2).pdf
PRIVACY RIGHTS ARE HUMAN RIGHTS (2).pdfPRIVACY RIGHTS ARE HUMAN RIGHTS (2).pdf
PRIVACY RIGHTS ARE HUMAN RIGHTS (2).pdf
linda gichohi
 
Igf 2013 daily news edition 2
Igf 2013 daily news   edition 2Igf 2013 daily news   edition 2
Igf 2013 daily news edition 2
mataharitimoer MT
 
Daily News 2nd ed
Daily News 2nd edDaily News 2nd ed
Daily News 2nd ed03bmai
 
Report on the 2021 MOCK IGF.pdf
Report on the 2021 MOCK IGF.pdfReport on the 2021 MOCK IGF.pdf
Report on the 2021 MOCK IGF.pdf
Vincent Mwando
 
Booklet Dialog Nasional 2018
Booklet Dialog Nasional 2018Booklet Dialog Nasional 2018
Booklet Dialog Nasional 2018
ID IGF
 
Booklet Summary Dilog Nasional ID-IGF 2018
Booklet Summary Dilog Nasional ID-IGF 2018Booklet Summary Dilog Nasional ID-IGF 2018
Booklet Summary Dilog Nasional ID-IGF 2018
ID IGF
 
Resume of ID-IGF National Dialogue 2014
Resume of ID-IGF National Dialogue 2014Resume of ID-IGF National Dialogue 2014
Resume of ID-IGF National Dialogue 2014
IGF Indonesia
 
Cyber security rule of use internet safely
Cyber security rule of use internet safelyCyber security rule of use internet safely
Cyber security rule of use internet safely
Alexander Decker
 
Summary ID-IGF 2014 National Dialogue - English (tata kelola internet / int...
Summary  ID-IGF 2014 National Dialogue  - English (tata kelola internet / int...Summary  ID-IGF 2014 National Dialogue  - English (tata kelola internet / int...
Summary ID-IGF 2014 National Dialogue - English (tata kelola internet / int...
ICT Watch - Indonesia
 
Indonesia 2014 National ID-IGF Dialogue Resume
Indonesia 2014 National ID-IGF Dialogue ResumeIndonesia 2014 National ID-IGF Dialogue Resume
Indonesia 2014 National ID-IGF Dialogue Resume
ID-IGF
 
At The Brink of Digital Authoritarian
At The Brink of Digital AuthoritarianAt The Brink of Digital Authoritarian
At The Brink of Digital Authoritarian
Damar Juniarto
 
Summary ID-IGF 2018 National Dialogue - English (tata kelola internet / int...
Summary  ID-IGF 2018 National Dialogue  - English (tata kelola internet / int...Summary  ID-IGF 2018 National Dialogue  - English (tata kelola internet / int...
Summary ID-IGF 2018 National Dialogue - English (tata kelola internet / int...
ICT Watch - Indonesia
 
Guidelines for Children on Child Online Protection
Guidelines for Children on Child Online ProtectionGuidelines for Children on Child Online Protection
Guidelines for Children on Child Online ProtectionThomas Müller
 
2020.10.11 international statement_end-to-end_encryption_and_public_safety_fo...
2020.10.11 international statement_end-to-end_encryption_and_public_safety_fo...2020.10.11 international statement_end-to-end_encryption_and_public_safety_fo...
2020.10.11 international statement_end-to-end_encryption_and_public_safety_fo...
sabrangsabrang
 
MCj-401 Assignment, roll-30.pdf
MCj-401 Assignment, roll-30.pdfMCj-401 Assignment, roll-30.pdf
MCj-401 Assignment, roll-30.pdf
HasanAlManjur1
 
Guia de orientação para a proteção de crianças online ONU / Unicef
Guia de orientação para a proteção de crianças online ONU / UnicefGuia de orientação para a proteção de crianças online ONU / Unicef
Guia de orientação para a proteção de crianças online ONU / Unicef
FAIR PLAY AD / @VeronicaRRSouza
 
Invasion Of Privacy In Canadian Media
Invasion Of Privacy In Canadian MediaInvasion Of Privacy In Canadian Media
Invasion Of Privacy In Canadian Media
Kelly Ratkovic
 
Summary ID-IGF 2019 National Dialogue - English (tata kelola internet / int...
Summary  ID-IGF 2019 National Dialogue  - English (tata kelola internet / int...Summary  ID-IGF 2019 National Dialogue  - English (tata kelola internet / int...
Summary ID-IGF 2019 National Dialogue - English (tata kelola internet / int...
ICT Watch - Indonesia
 

Similar to Igf 2013 daily news edititon 5 (20)

Daily News 4th ed
Daily News 4th edDaily News 4th ed
Daily News 4th ed
 
PRIVACY RIGHTS ARE HUMAN RIGHTS (2).pdf
PRIVACY RIGHTS ARE HUMAN RIGHTS (2).pdfPRIVACY RIGHTS ARE HUMAN RIGHTS (2).pdf
PRIVACY RIGHTS ARE HUMAN RIGHTS (2).pdf
 
Igf 2013 daily news edition 2
Igf 2013 daily news   edition 2Igf 2013 daily news   edition 2
Igf 2013 daily news edition 2
 
Daily News 2nd ed
Daily News 2nd edDaily News 2nd ed
Daily News 2nd ed
 
Report on the 2021 MOCK IGF.pdf
Report on the 2021 MOCK IGF.pdfReport on the 2021 MOCK IGF.pdf
Report on the 2021 MOCK IGF.pdf
 
Booklet Dialog Nasional 2018
Booklet Dialog Nasional 2018Booklet Dialog Nasional 2018
Booklet Dialog Nasional 2018
 
Booklet Summary Dilog Nasional ID-IGF 2018
Booklet Summary Dilog Nasional ID-IGF 2018Booklet Summary Dilog Nasional ID-IGF 2018
Booklet Summary Dilog Nasional ID-IGF 2018
 
Resume of ID-IGF National Dialogue 2014
Resume of ID-IGF National Dialogue 2014Resume of ID-IGF National Dialogue 2014
Resume of ID-IGF National Dialogue 2014
 
Cyber security rule of use internet safely
Cyber security rule of use internet safelyCyber security rule of use internet safely
Cyber security rule of use internet safely
 
Summary ID-IGF 2014 National Dialogue - English (tata kelola internet / int...
Summary  ID-IGF 2014 National Dialogue  - English (tata kelola internet / int...Summary  ID-IGF 2014 National Dialogue  - English (tata kelola internet / int...
Summary ID-IGF 2014 National Dialogue - English (tata kelola internet / int...
 
Indonesia 2014 National ID-IGF Dialogue Resume
Indonesia 2014 National ID-IGF Dialogue ResumeIndonesia 2014 National ID-IGF Dialogue Resume
Indonesia 2014 National ID-IGF Dialogue Resume
 
At The Brink of Digital Authoritarian
At The Brink of Digital AuthoritarianAt The Brink of Digital Authoritarian
At The Brink of Digital Authoritarian
 
Summary ID-IGF 2018 National Dialogue - English (tata kelola internet / int...
Summary  ID-IGF 2018 National Dialogue  - English (tata kelola internet / int...Summary  ID-IGF 2018 National Dialogue  - English (tata kelola internet / int...
Summary ID-IGF 2018 National Dialogue - English (tata kelola internet / int...
 
Guidelines for Children on Child Online Protection
Guidelines for Children on Child Online ProtectionGuidelines for Children on Child Online Protection
Guidelines for Children on Child Online Protection
 
2020.10.11 international statement_end-to-end_encryption_and_public_safety_fo...
2020.10.11 international statement_end-to-end_encryption_and_public_safety_fo...2020.10.11 international statement_end-to-end_encryption_and_public_safety_fo...
2020.10.11 international statement_end-to-end_encryption_and_public_safety_fo...
 
MCj-401 Assignment, roll-30.pdf
MCj-401 Assignment, roll-30.pdfMCj-401 Assignment, roll-30.pdf
MCj-401 Assignment, roll-30.pdf
 
Guia de orientação para a proteção de crianças online ONU / Unicef
Guia de orientação para a proteção de crianças online ONU / UnicefGuia de orientação para a proteção de crianças online ONU / Unicef
Guia de orientação para a proteção de crianças online ONU / Unicef
 
Invasion Of Privacy In Canadian Media
Invasion Of Privacy In Canadian MediaInvasion Of Privacy In Canadian Media
Invasion Of Privacy In Canadian Media
 
Summary ID-IGF 2019 National Dialogue - English (tata kelola internet / int...
Summary  ID-IGF 2019 National Dialogue  - English (tata kelola internet / int...Summary  ID-IGF 2019 National Dialogue  - English (tata kelola internet / int...
Summary ID-IGF 2019 National Dialogue - English (tata kelola internet / int...
 
Identity Management Policy Seminar
Identity Management Policy SeminarIdentity Management Policy Seminar
Identity Management Policy Seminar
 

More from mataharitimoer MT

Smartphone videograph mt
Smartphone videograph mtSmartphone videograph mt
Smartphone videograph mt
mataharitimoer MT
 
Internet sehat mengawal generasi digital (update april 2015)
Internet sehat mengawal generasi digital (update april 2015)Internet sehat mengawal generasi digital (update april 2015)
Internet sehat mengawal generasi digital (update april 2015)
mataharitimoer MT
 
membaca media online melalui media sosial
membaca media online melalui media sosialmembaca media online melalui media sosial
membaca media online melalui media sosial
mataharitimoer MT
 
Media Sosial, Manfaat dan Risiko (Presentasi di SMP Sekolah Alam Bogor
Media Sosial, Manfaat dan Risiko (Presentasi di SMP Sekolah Alam BogorMedia Sosial, Manfaat dan Risiko (Presentasi di SMP Sekolah Alam Bogor
Media Sosial, Manfaat dan Risiko (Presentasi di SMP Sekolah Alam Bogor
mataharitimoer MT
 
Pemanfaatan Internet untuk Pendidikan
Pemanfaatan Internet untuk PendidikanPemanfaatan Internet untuk Pendidikan
Pemanfaatan Internet untuk Pendidikan
mataharitimoer MT
 
Tweetbinder
TweetbinderTweetbinder
Tweetbinder
mataharitimoer MT
 
Menjaring informasi dengan feedly
Menjaring informasi dengan feedlyMenjaring informasi dengan feedly
Menjaring informasi dengan feedly
mataharitimoer MT
 
PENEGAKAN DISIPLIN KEDOKTERAN OLEH MKDKI & CONTOH KASUS
PENEGAKAN DISIPLIN KEDOKTERAN OLEH MKDKI & CONTOH KASUSPENEGAKAN DISIPLIN KEDOKTERAN OLEH MKDKI & CONTOH KASUS
PENEGAKAN DISIPLIN KEDOKTERAN OLEH MKDKI & CONTOH KASUS
mataharitimoer MT
 
Dr kanadi s penanganan nyeri dismenorea (pit idi bogor) 2013 final
Dr kanadi s penanganan nyeri dismenorea (pit idi bogor) 2013 finalDr kanadi s penanganan nyeri dismenorea (pit idi bogor) 2013 final
Dr kanadi s penanganan nyeri dismenorea (pit idi bogor) 2013 final
mataharitimoer MT
 
Muntah pada Anak
Muntah pada AnakMuntah pada Anak
Muntah pada Anak
mataharitimoer MT
 
INFEKSI ALAT KANDUNGAN
 INFEKSI ALAT KANDUNGAN INFEKSI ALAT KANDUNGAN
INFEKSI ALAT KANDUNGAN
mataharitimoer MT
 
Diagnosa Banding Penurunan Kesadaran Manajemen
Diagnosa Banding Penurunan Kesadaran ManajemenDiagnosa Banding Penurunan Kesadaran Manajemen
Diagnosa Banding Penurunan Kesadaran Manajemen
mataharitimoer MT
 
Sampaikan lewat blog
Sampaikan lewat blogSampaikan lewat blog
Sampaikan lewat blog
mataharitimoer MT
 
Diagnosa dan Manajemen Nyeri Abdomen Akut
Diagnosa dan Manajemen Nyeri Abdomen Akut Diagnosa dan Manajemen Nyeri Abdomen Akut
Diagnosa dan Manajemen Nyeri Abdomen Akut
mataharitimoer MT
 
Insulin intensification : the usage of premixed insulin after basal fails
Insulin intensification : the usage of premixed insulin after basal fails Insulin intensification : the usage of premixed insulin after basal fails
Insulin intensification : the usage of premixed insulin after basal fails
mataharitimoer MT
 
Insulin Initiation : When We should Start with Basal Insulin?
Insulin Initiation : When We should Start with Basal Insulin?Insulin Initiation : When We should Start with Basal Insulin?
Insulin Initiation : When We should Start with Basal Insulin?
mataharitimoer MT
 
ACUTE RESPIRATORY DISTRESS SYNDROME AND HOW TO MANAGE
ACUTE RESPIRATORY DISTRESS SYNDROME AND HOW TO MANAGEACUTE RESPIRATORY DISTRESS SYNDROME AND HOW TO MANAGE
ACUTE RESPIRATORY DISTRESS SYNDROME AND HOW TO MANAGE
mataharitimoer MT
 
Tatalaksana klinis Middle East Respiratory Syndrome Corona Virus
Tatalaksana klinis Middle East Respiratory Syndrome Corona Virus Tatalaksana klinis Middle East Respiratory Syndrome Corona Virus
Tatalaksana klinis Middle East Respiratory Syndrome Corona Virus
mataharitimoer MT
 
Pemakaian Antihistamin secara Rasional
Pemakaian Antihistamin secara RasionalPemakaian Antihistamin secara Rasional
Pemakaian Antihistamin secara Rasional
mataharitimoer MT
 

More from mataharitimoer MT (20)

Smartphone videograph mt
Smartphone videograph mtSmartphone videograph mt
Smartphone videograph mt
 
Internet sehat mengawal generasi digital (update april 2015)
Internet sehat mengawal generasi digital (update april 2015)Internet sehat mengawal generasi digital (update april 2015)
Internet sehat mengawal generasi digital (update april 2015)
 
membaca media online melalui media sosial
membaca media online melalui media sosialmembaca media online melalui media sosial
membaca media online melalui media sosial
 
Media Sosial, Manfaat dan Risiko (Presentasi di SMP Sekolah Alam Bogor
Media Sosial, Manfaat dan Risiko (Presentasi di SMP Sekolah Alam BogorMedia Sosial, Manfaat dan Risiko (Presentasi di SMP Sekolah Alam Bogor
Media Sosial, Manfaat dan Risiko (Presentasi di SMP Sekolah Alam Bogor
 
Pemanfaatan Internet untuk Pendidikan
Pemanfaatan Internet untuk PendidikanPemanfaatan Internet untuk Pendidikan
Pemanfaatan Internet untuk Pendidikan
 
Tweetbinder
TweetbinderTweetbinder
Tweetbinder
 
Menjaring informasi dengan feedly
Menjaring informasi dengan feedlyMenjaring informasi dengan feedly
Menjaring informasi dengan feedly
 
Ngetwit efektif
Ngetwit efektifNgetwit efektif
Ngetwit efektif
 
PENEGAKAN DISIPLIN KEDOKTERAN OLEH MKDKI & CONTOH KASUS
PENEGAKAN DISIPLIN KEDOKTERAN OLEH MKDKI & CONTOH KASUSPENEGAKAN DISIPLIN KEDOKTERAN OLEH MKDKI & CONTOH KASUS
PENEGAKAN DISIPLIN KEDOKTERAN OLEH MKDKI & CONTOH KASUS
 
Dr kanadi s penanganan nyeri dismenorea (pit idi bogor) 2013 final
Dr kanadi s penanganan nyeri dismenorea (pit idi bogor) 2013 finalDr kanadi s penanganan nyeri dismenorea (pit idi bogor) 2013 final
Dr kanadi s penanganan nyeri dismenorea (pit idi bogor) 2013 final
 
Muntah pada Anak
Muntah pada AnakMuntah pada Anak
Muntah pada Anak
 
INFEKSI ALAT KANDUNGAN
 INFEKSI ALAT KANDUNGAN INFEKSI ALAT KANDUNGAN
INFEKSI ALAT KANDUNGAN
 
Diagnosa Banding Penurunan Kesadaran Manajemen
Diagnosa Banding Penurunan Kesadaran ManajemenDiagnosa Banding Penurunan Kesadaran Manajemen
Diagnosa Banding Penurunan Kesadaran Manajemen
 
Sampaikan lewat blog
Sampaikan lewat blogSampaikan lewat blog
Sampaikan lewat blog
 
Diagnosa dan Manajemen Nyeri Abdomen Akut
Diagnosa dan Manajemen Nyeri Abdomen Akut Diagnosa dan Manajemen Nyeri Abdomen Akut
Diagnosa dan Manajemen Nyeri Abdomen Akut
 
Insulin intensification : the usage of premixed insulin after basal fails
Insulin intensification : the usage of premixed insulin after basal fails Insulin intensification : the usage of premixed insulin after basal fails
Insulin intensification : the usage of premixed insulin after basal fails
 
Insulin Initiation : When We should Start with Basal Insulin?
Insulin Initiation : When We should Start with Basal Insulin?Insulin Initiation : When We should Start with Basal Insulin?
Insulin Initiation : When We should Start with Basal Insulin?
 
ACUTE RESPIRATORY DISTRESS SYNDROME AND HOW TO MANAGE
ACUTE RESPIRATORY DISTRESS SYNDROME AND HOW TO MANAGEACUTE RESPIRATORY DISTRESS SYNDROME AND HOW TO MANAGE
ACUTE RESPIRATORY DISTRESS SYNDROME AND HOW TO MANAGE
 
Tatalaksana klinis Middle East Respiratory Syndrome Corona Virus
Tatalaksana klinis Middle East Respiratory Syndrome Corona Virus Tatalaksana klinis Middle East Respiratory Syndrome Corona Virus
Tatalaksana klinis Middle East Respiratory Syndrome Corona Virus
 
Pemakaian Antihistamin secara Rasional
Pemakaian Antihistamin secara RasionalPemakaian Antihistamin secara Rasional
Pemakaian Antihistamin secara Rasional
 

Recently uploaded

原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
3ipehhoa
 
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
3ipehhoa
 
Living-in-IT-era-Module-7-Imaging-and-Design-for-Social-Impact.pptx
Living-in-IT-era-Module-7-Imaging-and-Design-for-Social-Impact.pptxLiving-in-IT-era-Module-7-Imaging-and-Design-for-Social-Impact.pptx
Living-in-IT-era-Module-7-Imaging-and-Design-for-Social-Impact.pptx
TristanJasperRamos
 
ER(Entity Relationship) Diagram for online shopping - TAE
ER(Entity Relationship) Diagram for online shopping - TAEER(Entity Relationship) Diagram for online shopping - TAE
ER(Entity Relationship) Diagram for online shopping - TAE
Himani415946
 
test test test test testtest test testtest test testtest test testtest test ...
test test  test test testtest test testtest test testtest test testtest test ...test test  test test testtest test testtest test testtest test testtest test ...
test test test test testtest test testtest test testtest test testtest test ...
Arif0071
 
Multi-cluster Kubernetes Networking- Patterns, Projects and Guidelines
Multi-cluster Kubernetes Networking- Patterns, Projects and GuidelinesMulti-cluster Kubernetes Networking- Patterns, Projects and Guidelines
Multi-cluster Kubernetes Networking- Patterns, Projects and Guidelines
Sanjeev Rampal
 
Output determination SAP S4 HANA SAP SD CC
Output determination SAP S4 HANA SAP SD CCOutput determination SAP S4 HANA SAP SD CC
Output determination SAP S4 HANA SAP SD CC
ShahulHameed54211
 
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
3ipehhoa
 
This 7-second Brain Wave Ritual Attracts Money To You.!
This 7-second Brain Wave Ritual Attracts Money To You.!This 7-second Brain Wave Ritual Attracts Money To You.!
This 7-second Brain Wave Ritual Attracts Money To You.!
nirahealhty
 
History+of+E-commerce+Development+in+China-www.cfye-commerce.shop
History+of+E-commerce+Development+in+China-www.cfye-commerce.shopHistory+of+E-commerce+Development+in+China-www.cfye-commerce.shop
History+of+E-commerce+Development+in+China-www.cfye-commerce.shop
laozhuseo02
 
How to Use Contact Form 7 Like a Pro.pptx
How to Use Contact Form 7 Like a Pro.pptxHow to Use Contact Form 7 Like a Pro.pptx
How to Use Contact Form 7 Like a Pro.pptx
Gal Baras
 
1.Wireless Communication System_Wireless communication is a broad term that i...
1.Wireless Communication System_Wireless communication is a broad term that i...1.Wireless Communication System_Wireless communication is a broad term that i...
1.Wireless Communication System_Wireless communication is a broad term that i...
JeyaPerumal1
 
BASIC C++ lecture NOTE C++ lecture 3.pptx
BASIC C++ lecture NOTE C++ lecture 3.pptxBASIC C++ lecture NOTE C++ lecture 3.pptx
BASIC C++ lecture NOTE C++ lecture 3.pptx
natyesu
 
guildmasters guide to ravnica Dungeons & Dragons 5...
guildmasters guide to ravnica Dungeons & Dragons 5...guildmasters guide to ravnica Dungeons & Dragons 5...
guildmasters guide to ravnica Dungeons & Dragons 5...
Rogerio Filho
 
The+Prospects+of+E-Commerce+in+China.pptx
The+Prospects+of+E-Commerce+in+China.pptxThe+Prospects+of+E-Commerce+in+China.pptx
The+Prospects+of+E-Commerce+in+China.pptx
laozhuseo02
 
Latest trends in computer networking.pptx
Latest trends in computer networking.pptxLatest trends in computer networking.pptx
Latest trends in computer networking.pptx
JungkooksNonexistent
 

Recently uploaded (16)

原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
 
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
 
Living-in-IT-era-Module-7-Imaging-and-Design-for-Social-Impact.pptx
Living-in-IT-era-Module-7-Imaging-and-Design-for-Social-Impact.pptxLiving-in-IT-era-Module-7-Imaging-and-Design-for-Social-Impact.pptx
Living-in-IT-era-Module-7-Imaging-and-Design-for-Social-Impact.pptx
 
ER(Entity Relationship) Diagram for online shopping - TAE
ER(Entity Relationship) Diagram for online shopping - TAEER(Entity Relationship) Diagram for online shopping - TAE
ER(Entity Relationship) Diagram for online shopping - TAE
 
test test test test testtest test testtest test testtest test testtest test ...
test test  test test testtest test testtest test testtest test testtest test ...test test  test test testtest test testtest test testtest test testtest test ...
test test test test testtest test testtest test testtest test testtest test ...
 
Multi-cluster Kubernetes Networking- Patterns, Projects and Guidelines
Multi-cluster Kubernetes Networking- Patterns, Projects and GuidelinesMulti-cluster Kubernetes Networking- Patterns, Projects and Guidelines
Multi-cluster Kubernetes Networking- Patterns, Projects and Guidelines
 
Output determination SAP S4 HANA SAP SD CC
Output determination SAP S4 HANA SAP SD CCOutput determination SAP S4 HANA SAP SD CC
Output determination SAP S4 HANA SAP SD CC
 
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
 
This 7-second Brain Wave Ritual Attracts Money To You.!
This 7-second Brain Wave Ritual Attracts Money To You.!This 7-second Brain Wave Ritual Attracts Money To You.!
This 7-second Brain Wave Ritual Attracts Money To You.!
 
History+of+E-commerce+Development+in+China-www.cfye-commerce.shop
History+of+E-commerce+Development+in+China-www.cfye-commerce.shopHistory+of+E-commerce+Development+in+China-www.cfye-commerce.shop
History+of+E-commerce+Development+in+China-www.cfye-commerce.shop
 
How to Use Contact Form 7 Like a Pro.pptx
How to Use Contact Form 7 Like a Pro.pptxHow to Use Contact Form 7 Like a Pro.pptx
How to Use Contact Form 7 Like a Pro.pptx
 
1.Wireless Communication System_Wireless communication is a broad term that i...
1.Wireless Communication System_Wireless communication is a broad term that i...1.Wireless Communication System_Wireless communication is a broad term that i...
1.Wireless Communication System_Wireless communication is a broad term that i...
 
BASIC C++ lecture NOTE C++ lecture 3.pptx
BASIC C++ lecture NOTE C++ lecture 3.pptxBASIC C++ lecture NOTE C++ lecture 3.pptx
BASIC C++ lecture NOTE C++ lecture 3.pptx
 
guildmasters guide to ravnica Dungeons & Dragons 5...
guildmasters guide to ravnica Dungeons & Dragons 5...guildmasters guide to ravnica Dungeons & Dragons 5...
guildmasters guide to ravnica Dungeons & Dragons 5...
 
The+Prospects+of+E-Commerce+in+China.pptx
The+Prospects+of+E-Commerce+in+China.pptxThe+Prospects+of+E-Commerce+in+China.pptx
The+Prospects+of+E-Commerce+in+China.pptx
 
Latest trends in computer networking.pptx
Latest trends in computer networking.pptxLatest trends in computer networking.pptx
Latest trends in computer networking.pptx
 

Igf 2013 daily news edititon 5

  • 1. IGF2013 DAILYNEWS - EDITION FRIDAY, 25 October 2013 Page 1 5th edition, 25 October 2013 daily.igf2013.or.id DAILYNEWS Internet Freedom vs. Security in Internet Governance Forum 2013 After long discussion about which multi-stakeholder Internet Governance system that will be adopted in the future, on the Day 3 IGF 2013 the issue about Internet Freedom vs. Internet Security come turns. The issues about how to protect journalists, bloggers, internet users from cyber threat or from repressive internet law, how to give a chance to everyone to speak their mind about better Internet Governance, especially the youth, raised as well as the issue of internet security such as online anonymity, filtering, blocking, and internet control done by governments and private sectors. Of course, balancing between these two poles need time and further discussions. But some key principles has been discussed, such as: where government is oppressing, anonymity could be a way to express opinions. Or to tackle cyber threats like Spam, Hacking, and Cyber-Crime needs a strong cyber-crime laws as well as trained professional people to tackle the problems. And who should govern the internet? Everyone, including our young generation. One can’t avoid their dreams and aspirations about the better Internet in the future. They want a more precise translation websites, less of internet scam, a good collaboration between young people, open and standardized web, and more literate internet users. Who will make that happen in the future? The answer lies on the result of the 8th Internet Governance Forum in Bali, Indonesia.
  • 2. Page 2 IGF2013 DAILYNEWS - EDITION FRIDAY, 25 October 2013 IGF2013 DAILYNEWS - EDITION FRIDAY, 25 October 2013 Page 3 NEWSFLASH Further discussion about Spam, Hacking, and Cyber- Crime, being raise on Day 2 IGF 2013. Christopher Boyer asks the panelists, such as , Dr. Edmon Makarim (Research Fellow and Professor University of Indonesia), Jayantha Fernando (Director & Legal Advisor, ICT Agency of Sri Lanka), etc. to focus on legal frameworks and asks on their perspectives on how big of a problem is spam, hacking, as well as cyber- crimes, and how successful is the process on these issues. Internet Society representatives, Karen Mulberry puts a strong point on WCIT treaty conference as well as its big debate about including spam in the international treaty. Other speaker such as Wout de Natris sees spam as a nuisance that have reached the point where the government must take action on it. To scale initiatives and make it more sustainable, Mulberry added that projects has been done, leveraging the information from MAAWG, focusing on operational aspect of managing and mitigating spam, malware, botnets, also there is the London Action Plan. The issue of spam is a hard one to cure, and instead of fighting the impossible, this issue should be managed to the benefit of all user. Chris Painter of the Department of State added that raising awareness activities are essential. Painter also emphasizes on the need of a strong cyber-crime law as well as trained professional people to tackle the issues. These two factors need to co-exists together in order for the law to take effect. In dealing with these security issues, it requires different approaches to make sure of secure networks, bringing together different communities (law enforcement, technical communities to defend networks, private sector as well), joint workshop with the form of incident responses and security teams. Reporter: Nadia Maharani, Okky Alparessi Protecting Journalist, Bloggers, and Media Actors in Digital Age Uluwatu 5, 09:00 - 10:30 AM On day 3 IGF 2013, a discussion on protecting journalist, bloggers, and media actors in digital age was held with presenting speakers from countries such as Brazil, Argentina, France, the United Kingdom, and Indonesia. Jennifer Henrichsen of UNESCO Commissioned research on online safety emphasizes on the importance of digital literacy in order to minimize digital dangers or online threats. Henrichsen describes that there are four key component to the threat modeling basic: what to keep private, who wants to know your data, what are the risks, and what if they succeed in getting into your data. Focusing on the protection of bloggers, the next topic discusses the need of equality in protection of journalists and bloggers. Eduardo Bertoni from Argentina stressed the fact that journalist and bloggers need to be protected from defamation because with Internet, it is impossible to anticipate where the written contents will be read and different jurisdiction equals to different rules. Indonesian speakers, Budi Putra and Bambang Harymurti, elaborate more on blogger safety. Budi Putra emphasizes that licensing, real name registration, accreditation, protection of sources and violence, legal liability, and ethical responsibilities are the key problematic for bloggers. Bambang Harymurti, editor-in-chief of Tempo daily magazine, and a strong campaigner of freedom of the press, added that a revision of the law by expulsion of articles 27, 28, and 45 of Indonesia Internet Law/UU ITE is strongly needed. Reporter: Susan, Renold, Nadia Focus Session (Security: Legal and Other Frameworks; Spam, Hacking, and Cyber-Crime MAIN HALL, 14:30 Online Anonymity, Freedom of Expression & Internet Governance Room 9, Kintamani 7, 11:00 - 12:30 PM The workshop session explored online anonymity and its im- portance to different user groups, in particular young people. With around 14 panelists ranging from private sectors and CSOs in Europe, Asia Pacific, Latin American and Caribbean, the dis- cussion on the Day 3 IGF 2013 rise the question about anonym- ity in relationship with freedom of expression and its impact to Internet Governance. Research from Youth IGF Project/Childnet International stat- ed that the main reason why people choose to be anonymous online is to protect personal information. Anonymity is considered in positive use if it is under freedom of constraints reason, and not based on freedom of responsibility. In certain conditions where government is oppressing, anonymity could be a way to express opinions. Anonymity also poses challenges for Internet Governance. From the industry side, they tend to opt for real-name culture on the Internet and social media for safety reasons. Simon Milner from Facebook give example of their policy and advice, which is to only accept request from people you know. Nigel Hickson from ICANN also stated that we must know the conditions under which anonymity should be in. And from safety perception, transparency is needed, for example concerns about what happen to our information when it is uploaded online. Reporter: Hersinta Youth’s collaboration to create a better safer internet Nusa Dua Hall 2, 14.30-16.00 Unlike the rest of the sessions on Day 3 IGF 2013, most of the panelists on this discussion were youngsters from different countries. There were five prominent youths who shared about their experience and expectation of internet. They were also given a chance to state their wishes about better internet, such as: a more precise translation websites, less of internet scam, a good collaboration between young people, open and standardized web, and more literate internet users. This session was designed as an interactive discussion by engaging the participants with the speakers. Each participant was given an electronic tool to vote their opinions on questions given. Interestingly, from the voting it was found out that more than 50% participants chose companies, industries, and web developers (including geeks) as the most responsible stakeholders for shaping the future of the internet. In this session, the participants also agreed that there were some strategies to commit in order to achieve a better and safer internet. Those strategies should be started with confident carers, raising awareness through analyzing and education, privacy by default, global declaration of responsible online users, better collective social norms and values, and also inclusive empowering policy. These collaborative ideas will be continued to the next level and make substantial progress in the coming year. Reporter: Fiona, Susan, and Renold Privacy: From Regional Regulations To Global Connections Room 4 Uluwatu 1, 11.00-12.30 Internet is something very broad, it dissolves geographical internet limits on a larger scale, for example it allows personal data and others to flow across a border for social Interaction and support the economy. This is the background of topic discussion “Privacy, from regional regulations to global connections” held in Uluwatu 1 at IGF Day 3, on 24th October, 2013. The purpose of this workshop is to explore main principles and strategy required to achieve fair and balanced approach to an effective data protection in regional and international. Furthermore, this workshop also explore on how the approach of local and regional can be used at an international level and be used as a global solution. The discussion also brought case on ‘Snowden Leaks’ by Sophie Kwasny, Head of the Data Protection Unit, Council of Europe-Intergovernmental Organizations (France) who gives a statement about Snowden issue: “United States should stop certain things, but not everything”. Furthermore, she explained that US must immediately stop its surveillance activities in other countries. It becomes polemic on how tight and big data should be protected. Panelist from Poland said that when it comes to construct regulation on protection data, we must consider 3 elements: government, citizen and state. Poland, currently has been doing an open forums and dialogue that invite all parties from youth to society organizations, to talk about the technical and data management, and also its impact to the society. Reporter: Okky Alparessi, Aprida Who Governs the Internet – How People Can Have a Voice Room 8 Kintamani 2, 14:30 - 16:00 The heated debate between countries on how to maintain the internet and about Internet Governance has been happening a few years back through the World Summit on the Information Society. On Day 3 IGF 2013, the debate on who truly maintains the internet and how the people can have the voice continued. In this session, speakers from Poland, India, United States, Brazil, as well as Kenya have gathered to speak on these issues. Jeremy Malcolm as the moderator feels a change in the internet governance, and asks the invited speaker to speak upon the subject. Nigel Hickson of ICANN sees this as a challenge as there are considerable amount of gap in discussing the issue on internet governance; therefore, a new process is needed. Maintenance and political issue are one of the two issues surrounding the Internet Governance Forum. Parminder Jeet Singh of IT For Change emphasize the way to govern or maintain is seen by many people from many different perspectives because the internet holds different meanings to people. He explains how difficult it is to answer who truly governs the internet because of the personal interest that stands in the way. Governing the internet involves decision making and public policy which then involves invoking the power lies within state and it impacts people’s interest. Reporter: Nadia Maharani, Okky Alparessi Erratum on Page 2, Edition 4 IGF Daily News 2013 “The power of Internet Enabled SMEs Reach Out to The Local and Global Market” session on the page 2 is this one. NEWSFLASH
  • 3. Page 4 IGF2013 DAILYNEWS - EDITION FRIDAY, 25 October 2013 INTERVIEW The TEAM Olivia Hutagaol, Maria A. Inkiriwang, Okky Alparessi, Nadia Maharani Frenavit Putra, Eri Kasman G. Designer : Olivia Hutagaol, Maria A. Inkiriwang Editorial Secretariat : Mariam Ananda, Mataharitimoer, Anisa Nurlitasari Board of Advisor : ID-IGF Secretariat Managing Editor : Damar Juniarto News Coordinator : Mariam Ananda Editor : Damar Juniarto, Hersinta, Reporter : Mariam Ananda, Aprida Sihombing, Hersinta, Fiona Suwana, Renold Sutadi, Susan Wen, : Can you tell us about Freedom House’s findings on cyberspace control issue? Our report this year discovered some extremely worrisome threats. Internet freedom more generally has been declining around the world for 3 years. Particular concern for us is the rise in surveillance. We have seen that 35 out of 60 countries that we evaluated this year have increased their surveillance powers. Of course there is the issue with US, but many other countries have past new laws or upgraded their equipments. And its becoming quite problematic particularly in countries with very full of law. Where political activist and civil society were being specifically targeted for things they say online. How about violence that happenned to bloggers and online users? Actually violence on bloggers and online users has been on dramatic rise. Part of the issue is that more people have access to internet, particularly social media. More people getting arrested and physically Sanja Tatic Kelly Project Director of Freedom on The Net, Freedom House attacked in some instances. In places like Syria just over the past year alone 20 netizens and citizen journalist were killed when they tried to report some of the human rights violations there. Other interesting case is from Mexico, where several bloggers and online journalist were killed over the past year. Not by the government but actually by the criminal underworld. And this bloggers actually tried to write uncover drug trafficking. You stated that “There’s freedom of speech but there’s no freedom after speech.” What does it mean? I knew in many countries we are seeing this phenomenon instead of blocking and filtering information. Governments are actually obtained to leave the Internet unfiltered but then people who post messages that provoke the government often find themselves behind the bars. Sometimes in prison for years, 10 or 20 years or even killed. Well you can then say, is that you free to say something online and you are not going to be censored? But after you say something online you’re going to be severely punished. So that freedom after speech just does not exist.