SlideShare a Scribd company logo
D E S I R E E M I L O S H E V I C
D I P L O A L U M N I
T U E S D A Y , J U L Y 1 8 T H 2 0 1 6
WEBINAR ON THE ROLE OF TRUST IN
DIGITAL POLICY
CASE STUDY: APPLIED ETHICS IN IG
INSTITUTIONS DEALING WITH
GLOBAL RESOURCES
AGENDA
• Trust etymology
• Trust vs trustworthiness
• Why is there so much focus on trust?
• Trust concepts and frameworks
• Applied ethics case study – data
• Role of Trust for Digital Policy?
• Can users’ trust be restored?
• What are stakeholders’ roles?
• Q&A
ETYMOLOGY OF WORD TRUST
• Origin
Old Norse –> traustr –> traust –> treysta: strong
-> Trust - Middle English
• C 1200, "reliance on the veracity, integrity, or other
virtues of someone or something; religious faith,"
from Old Norse traust "help, confidence, protection,
support," from Proto-Germanic abstract noun
*traustam (source also of Old Frisian trast, Dutch
troost "comfort, consolation," Old High German trost
"trust, …Gothic trausti "agreement, alliance"
TRUST
TRUST VS TRUSTWORTHINESS
• Research into the roles of trust in our society broad range of
often conflicting theories. Some theorists maintain that trust is a
social virtue that cannot be reduced to strategic self-interest;
trusting another person is ultimately a rational calculation
based on information about that person and his or her
incentives and motivations.
• our trust in persons whom we believe to have strong reasons*
to act in our best interests.
“We are correct when we assume that the main incentive of
those whom we trust is to maintain a relationship with us—
whether it be for reasons of economic benefit or for love and
friendship. “I trust you to be trustworthy – type of trust we place
in individuals or institutions”
TRUST VS TRUSTWORTHINESS
• Hardin also makes an important differentiation
between the trust and trustworthiness (Hardin,
2006)explaining that
1. trust is a positive belief that does not need to be
proven
2. whereas trustworthiness is an earned quality,
representing someone reliable, proven and honest
WHY IS TRUST THE HOTTEST SUBJECT
IN IG?
• After Snowden revelations, there is a growing anxiety among Internet users
(See: Desiree Miloshevic, Crisis of Trust, Crisis of Accountability 24 june14-
en.pdf)
• Safety and Privacy of citizens is at stake, 45% are changing the way to use the
Internet
• Trust is on top of the mind of all users but also government policy
• “We are at risk of undoing all the progress we have made on the Internet”
Kathy Brown, OECD Ministerial
• https://www.whitehouse.gov/blog/2012/02/24/internet-privacy-protecting-
consumers-building-trust-creating-jobs
• Framework of Trust: trusted networks/ technologies/ users / ecosystem
See: https://www.internetsociety.org/sites/default/files/IG%20and%20Trust%20-
%20BoT%20June%202016%20-%20Final-R.pdf)
TRUST IS…
Can trust be measured?
Trust is a subjective matter … Trust is contextual…
Need to separate normative questions of Ethics and Trust
from questions coming from psychology and other
sciences (e.g. individuals don’t recognize it until it’s lost)
We can only study how is trust perceived to get a more
objective insight
What kind of perceived trust is required for digital policies?
HOW MUCH TRUST IS THERE?
Trust fell in businesses sector from 59% to 57%
Non- Governmental Organisations (NGOs) from 66% to
63%
Media (from 53% to 51%) between 2014 and 2015
Only trust in governments rose during this time (from 45% to
48%), but they were still perceived as the most
untrustworthy form of organisation in the study.
Source: The Edelman Trust Barometer 2015
restoring USERS’ TRUST IN?
• Networks (Infrastructure) Layer I
• Technologies (Protocol and Application Layers: Layer II
and II
• Companies, on-line platforms and devices!
(facebook, gmail, laptops, tablets, mobile phones,
desktops )
• Cloud services, ISPs
• Internet governance Institutions
• National governments
“Trust takes years to build, seconds to break and forever to
repair.”
TRUST AND APPLIED ETHICS
ETHICS &
RELATIONSHIPS
NORMATIVE
1. INERNET USERS vs INTERNET USERS
e.g. bullying, online violence
2. INTERNET USERS vs
CORPORATIONS
3. USERS/MEMBERS vs INTERNET
GOVERNANCE INSTITUTIONS
e.g. USERS and DNS policies in
ICANN e.g. MEMBERS OF RIRs
POLITICAL PHILOSOPHY
NORMATIVE
RELATIONSHIP BETWEEN
USERS/CITIZENS AND THE STATE -
Governments
e.g. Snowden revelations
CORPORATIONS AND
GOVERNMENTS
IMPORTANT SEPARATION
Ethical and Normative
Level:
How things should
ideally look like with
regards to trust, if we
were completely
rational beings?
Empirical and
Pshychological
How things currently
are with regards to
perception of trust in
real life, since there is
always a lack of
information, unrealistic
beliefs and
expectations, personal
interests, and unequal
power relations
between stakeholders
SECURITY AND TRUST – David CLARK
• On July 16, 1992, Prof. David Clark articulated what would become the
creed of the Internet engineering community. He was giving a
presentation A Cloudy Crystal Ball: A Vision into the Future at the IETF. It
was era of turmoil and uncertainty as the privatization of the Internet
(the transformation of the Internet from NSFNET to commercial
networks) was in its infancy.
“We Reject: Kings, Presidents, and Voting.
We Believe in: Running Code and Rough Consensus
Our best success was not computing, but hooking people together!
The hacks of today are the commonplace of tomorrow!
Security is a CRITICAL problem!
What we should do: Fix insecure services: PASSWORDS, etc.
The problem is assigning the correct degree of fear to distant
elephants.
If we have a problem it is due to too much success.”
See http://cybertelecom.blogspot.de/2016/07/1992-july-16-david-clark-
articulates.html
WHAT ARE THE ROLES OF STKHDRS?
• There is no one treaty that would fix this or legislation that
would solve issue of trust
• Can’t just focus on technology, we need to take in law
and global politics
• Commercial interests have impact on the IG ecosystem
not necessarily good for the Internet e.g, botnets, ISPs –
slowing traffic
• Commercial aspects are not apparent enough
• Can we imagine a healthy development of our digital
society without solving the post-Snowden challenges it
brings to citizens, technology, community and
governments as well?
RIR CASE STUDY
• MOST CRITICAL FOR TRUST:
Members of studied IG organisations perceive the role of the
board and relationship of their organisation with the wider
Internet community as critical for continuing to have trust in
the organisation
MOST DAMAGING FOR TRUST:
• a non-transparent act of an organisation.
• not addressing adequately external regulatory threats
• deviation from policies
CONCLUSIONS:
• Demand for transparency
• Demand for slightly conservative business predictability
• Organisation/institution - True to its core mission.

More Related Content

What's hot

Social media marketing 2015
Social media marketing 2015Social media marketing 2015
Social media marketing 2015
Nicole Black
 
DBryant-Cybersecurity Challenge
DBryant-Cybersecurity ChallengeDBryant-Cybersecurity Challenge
DBryant-Cybersecurity Challengemsdee3362
 
HacktivismPaper.docx
HacktivismPaper.docxHacktivismPaper.docx
HacktivismPaper.docxDesarae Veit
 
What is cyber crime ppoint
What is cyber crime ppointWhat is cyber crime ppoint
What is cyber crime ppointatkinsondf
 
20160317 ARMA Wyoming Social Media Security Threats
20160317 ARMA Wyoming Social Media Security Threats20160317 ARMA Wyoming Social Media Security Threats
20160317 ARMA Wyoming Social Media Security Threats
Jesse Wilkins
 
Cybersecurity, Emerging Technologies, and Homeland Security - Chuck Brooks
Cybersecurity, Emerging Technologies, and Homeland Security - Chuck Brooks Cybersecurity, Emerging Technologies, and Homeland Security - Chuck Brooks
Cybersecurity, Emerging Technologies, and Homeland Security - Chuck Brooks
Chuck Brooks
 
Cyber for Counties Guidebook
Cyber for Counties Guidebook Cyber for Counties Guidebook
Cyber for Counties Guidebook Kristin Judge
 
Cybersecurity, Emerging Tech, and Risk Management - compiled media and writin...
Cybersecurity, Emerging Tech, and Risk Management - compiled media and writin...Cybersecurity, Emerging Tech, and Risk Management - compiled media and writin...
Cybersecurity, Emerging Tech, and Risk Management - compiled media and writin...
Chuck Brooks
 
Social media and ethics
Social media and ethicsSocial media and ethics
Social media and ethics
Yvette Babs Walker
 
LifeLock Javelin Presentation
LifeLock Javelin PresentationLifeLock Javelin Presentation
LifeLock Javelin Presentation
LifeLockBusinessSolutions
 
Age Friendly Economy - Legislation and Ethics of Data Use
Age Friendly Economy - Legislation and Ethics of Data UseAge Friendly Economy - Legislation and Ethics of Data Use
Age Friendly Economy - Legislation and Ethics of Data Use
AgeFriendlyEconomy
 
Chuck Brooks; Cybersecurity & Homeland Security Leadership Profile
Chuck Brooks; Cybersecurity & Homeland Security Leadership ProfileChuck Brooks; Cybersecurity & Homeland Security Leadership Profile
Chuck Brooks; Cybersecurity & Homeland Security Leadership Profile
Chuck Brooks
 
Cybersecurity and liability your david willson
Cybersecurity and liability your   david willsonCybersecurity and liability your   david willson
Cybersecurity and liability your david willson
David Willson, Attorney, CISSP, Security +
 
How to Like Social Media Network Security
How to Like Social Media Network SecurityHow to Like Social Media Network Security
How to Like Social Media Network Security
Brian Honan
 
EVERFI/Jackson Lewis: How to Comply with GDPR Requirements: What every U.S. C...
EVERFI/Jackson Lewis: How to Comply with GDPR Requirements: What every U.S. C...EVERFI/Jackson Lewis: How to Comply with GDPR Requirements: What every U.S. C...
EVERFI/Jackson Lewis: How to Comply with GDPR Requirements: What every U.S. C...
Michele Collu
 
Policy Guide for Legislators
Policy Guide for LegislatorsPolicy Guide for Legislators
Policy Guide for LegislatorsKristin Judge
 
111cyber crimes
111cyber crimes111cyber crimes
111cyber crimes
rinushalu
 
Module 5 - Legislation - Online
Module 5 - Legislation - OnlineModule 5 - Legislation - Online
Module 5 - Legislation - Online
caniceconsulting
 
Cybersecurity, Emerging Technologies, Risk Management, Homeland Security, and...
Cybersecurity, Emerging Technologies, Risk Management, Homeland Security, and...Cybersecurity, Emerging Technologies, Risk Management, Homeland Security, and...
Cybersecurity, Emerging Technologies, Risk Management, Homeland Security, and...
Chuck Brooks
 
Social media and security essentials.pptx
Social media and security essentials.pptxSocial media and security essentials.pptx
Social media and security essentials.pptxPink Elephant
 

What's hot (20)

Social media marketing 2015
Social media marketing 2015Social media marketing 2015
Social media marketing 2015
 
DBryant-Cybersecurity Challenge
DBryant-Cybersecurity ChallengeDBryant-Cybersecurity Challenge
DBryant-Cybersecurity Challenge
 
HacktivismPaper.docx
HacktivismPaper.docxHacktivismPaper.docx
HacktivismPaper.docx
 
What is cyber crime ppoint
What is cyber crime ppointWhat is cyber crime ppoint
What is cyber crime ppoint
 
20160317 ARMA Wyoming Social Media Security Threats
20160317 ARMA Wyoming Social Media Security Threats20160317 ARMA Wyoming Social Media Security Threats
20160317 ARMA Wyoming Social Media Security Threats
 
Cybersecurity, Emerging Technologies, and Homeland Security - Chuck Brooks
Cybersecurity, Emerging Technologies, and Homeland Security - Chuck Brooks Cybersecurity, Emerging Technologies, and Homeland Security - Chuck Brooks
Cybersecurity, Emerging Technologies, and Homeland Security - Chuck Brooks
 
Cyber for Counties Guidebook
Cyber for Counties Guidebook Cyber for Counties Guidebook
Cyber for Counties Guidebook
 
Cybersecurity, Emerging Tech, and Risk Management - compiled media and writin...
Cybersecurity, Emerging Tech, and Risk Management - compiled media and writin...Cybersecurity, Emerging Tech, and Risk Management - compiled media and writin...
Cybersecurity, Emerging Tech, and Risk Management - compiled media and writin...
 
Social media and ethics
Social media and ethicsSocial media and ethics
Social media and ethics
 
LifeLock Javelin Presentation
LifeLock Javelin PresentationLifeLock Javelin Presentation
LifeLock Javelin Presentation
 
Age Friendly Economy - Legislation and Ethics of Data Use
Age Friendly Economy - Legislation and Ethics of Data UseAge Friendly Economy - Legislation and Ethics of Data Use
Age Friendly Economy - Legislation and Ethics of Data Use
 
Chuck Brooks; Cybersecurity & Homeland Security Leadership Profile
Chuck Brooks; Cybersecurity & Homeland Security Leadership ProfileChuck Brooks; Cybersecurity & Homeland Security Leadership Profile
Chuck Brooks; Cybersecurity & Homeland Security Leadership Profile
 
Cybersecurity and liability your david willson
Cybersecurity and liability your   david willsonCybersecurity and liability your   david willson
Cybersecurity and liability your david willson
 
How to Like Social Media Network Security
How to Like Social Media Network SecurityHow to Like Social Media Network Security
How to Like Social Media Network Security
 
EVERFI/Jackson Lewis: How to Comply with GDPR Requirements: What every U.S. C...
EVERFI/Jackson Lewis: How to Comply with GDPR Requirements: What every U.S. C...EVERFI/Jackson Lewis: How to Comply with GDPR Requirements: What every U.S. C...
EVERFI/Jackson Lewis: How to Comply with GDPR Requirements: What every U.S. C...
 
Policy Guide for Legislators
Policy Guide for LegislatorsPolicy Guide for Legislators
Policy Guide for Legislators
 
111cyber crimes
111cyber crimes111cyber crimes
111cyber crimes
 
Module 5 - Legislation - Online
Module 5 - Legislation - OnlineModule 5 - Legislation - Online
Module 5 - Legislation - Online
 
Cybersecurity, Emerging Technologies, Risk Management, Homeland Security, and...
Cybersecurity, Emerging Technologies, Risk Management, Homeland Security, and...Cybersecurity, Emerging Technologies, Risk Management, Homeland Security, and...
Cybersecurity, Emerging Technologies, Risk Management, Homeland Security, and...
 
Social media and security essentials.pptx
Social media and security essentials.pptxSocial media and security essentials.pptx
Social media and security essentials.pptx
 

Similar to Webinar The Role of Trust in Digital policy 2016

2015-10-14 research seminar 2
2015-10-14 research seminar 22015-10-14 research seminar 2
2015-10-14 research seminar 2
ifi8106tlu
 
BUILDING TRUST IN A CONNECTED WORLD – HAYNNE’S ROYAL COMMISSION
BUILDING TRUST IN A CONNECTED WORLD – HAYNNE’S ROYAL COMMISSIONBUILDING TRUST IN A CONNECTED WORLD – HAYNNE’S ROYAL COMMISSION
BUILDING TRUST IN A CONNECTED WORLD – HAYNNE’S ROYAL COMMISSION
Godwin Emmanuel Oyedokun MBA MSc PhD FCA FCTI FCNA CFE FFAR
 
Social life in digital societies: Trust, Reputation and Privacy EINS summer s...
Social life in digital societies: Trust, Reputation and Privacy EINS summer s...Social life in digital societies: Trust, Reputation and Privacy EINS summer s...
Social life in digital societies: Trust, Reputation and Privacy EINS summer s...
i_scienceEU
 
Privacy vs personalization: advisory for brand and comms practitioners into 2...
Privacy vs personalization: advisory for brand and comms practitioners into 2...Privacy vs personalization: advisory for brand and comms practitioners into 2...
Privacy vs personalization: advisory for brand and comms practitioners into 2...
Dave Holland
 
Data set Legislation
Data set LegislationData set Legislation
Data set Legislation
Data-Set
 
Data set Legislation
Data set LegislationData set Legislation
Data set Legislation
Data-Set
 
Data set Legislation
Data set   Legislation Data set   Legislation
Data set Legislation
Data-Set
 
Get Consumer Smart - What Fake News Tells Us About Trust
Get Consumer Smart - What Fake News Tells Us About TrustGet Consumer Smart - What Fake News Tells Us About Trust
Get Consumer Smart - What Fake News Tells Us About Trust
emmersons1
 
Trust sharing economy-part_I-introduction
Trust sharing economy-part_I-introductionTrust sharing economy-part_I-introduction
Trust sharing economy-part_I-introduction
shareNL
 
Trust sharing economy-part_I-introduction
Trust sharing economy-part_I-introductionTrust sharing economy-part_I-introduction
Trust sharing economy-part_I-introduction
Jessica Slijpen
 
Data set module 4
Data set   module 4Data set   module 4
Data set module 4
Data-Set
 
ROI of Privacy: Building a Case for Investment [Webinar Slides]
ROI of Privacy: Building a Case for Investment [Webinar Slides]ROI of Privacy: Building a Case for Investment [Webinar Slides]
ROI of Privacy: Building a Case for Investment [Webinar Slides]
TrustArc
 
Big Data and the Future of Money 2014
Big Data and the Future of Money 2014Big Data and the Future of Money 2014
Big Data and the Future of Money 2014
Daniel Austin
 
Chris hankin tril_presentation_pdf.pptx
Chris hankin tril_presentation_pdf.pptxChris hankin tril_presentation_pdf.pptx
Chris hankin tril_presentation_pdf.pptx
Centre for Information Rights, University of Winchester, UK
 
NSTIC and IDESG Update
NSTIC and IDESG UpdateNSTIC and IDESG Update
NSTIC and IDESG Update
Ian Glazer
 
IPR Sapphire Anthology | Collection of 65-word Reflections and Predictions ab...
IPR Sapphire Anthology | Collection of 65-word Reflections and Predictions ab...IPR Sapphire Anthology | Collection of 65-word Reflections and Predictions ab...
IPR Sapphire Anthology | Collection of 65-word Reflections and Predictions ab...
Sarah Jackson
 
Building Trust in Artificial Intelligence
Building Trust in Artificial IntelligenceBuilding Trust in Artificial Intelligence
Building Trust in Artificial Intelligence
mahaveermalhi1
 
Understanding the Landscape of Information Generation in the Media Age by Ami...
Understanding the Landscape of Information Generation in the Media Age by Ami...Understanding the Landscape of Information Generation in the Media Age by Ami...
Understanding the Landscape of Information Generation in the Media Age by Ami...
Amir Jahangir
 
Dull, Difficult, and Essential: Managing Public Records
Dull,  Difficult,  and Essential: Managing Public RecordsDull,  Difficult,  and Essential: Managing Public Records
Dull, Difficult, and Essential: Managing Public Records
Paul W. Taylor
 
Building a Culture of Purpose: Corporate Communication in an Age of Radical U...
Building a Culture of Purpose: Corporate Communication in an Age of Radical U...Building a Culture of Purpose: Corporate Communication in an Age of Radical U...
Building a Culture of Purpose: Corporate Communication in an Age of Radical U...
the Brand & Reputation Collective
 

Similar to Webinar The Role of Trust in Digital policy 2016 (20)

2015-10-14 research seminar 2
2015-10-14 research seminar 22015-10-14 research seminar 2
2015-10-14 research seminar 2
 
BUILDING TRUST IN A CONNECTED WORLD – HAYNNE’S ROYAL COMMISSION
BUILDING TRUST IN A CONNECTED WORLD – HAYNNE’S ROYAL COMMISSIONBUILDING TRUST IN A CONNECTED WORLD – HAYNNE’S ROYAL COMMISSION
BUILDING TRUST IN A CONNECTED WORLD – HAYNNE’S ROYAL COMMISSION
 
Social life in digital societies: Trust, Reputation and Privacy EINS summer s...
Social life in digital societies: Trust, Reputation and Privacy EINS summer s...Social life in digital societies: Trust, Reputation and Privacy EINS summer s...
Social life in digital societies: Trust, Reputation and Privacy EINS summer s...
 
Privacy vs personalization: advisory for brand and comms practitioners into 2...
Privacy vs personalization: advisory for brand and comms practitioners into 2...Privacy vs personalization: advisory for brand and comms practitioners into 2...
Privacy vs personalization: advisory for brand and comms practitioners into 2...
 
Data set Legislation
Data set LegislationData set Legislation
Data set Legislation
 
Data set Legislation
Data set LegislationData set Legislation
Data set Legislation
 
Data set Legislation
Data set   Legislation Data set   Legislation
Data set Legislation
 
Get Consumer Smart - What Fake News Tells Us About Trust
Get Consumer Smart - What Fake News Tells Us About TrustGet Consumer Smart - What Fake News Tells Us About Trust
Get Consumer Smart - What Fake News Tells Us About Trust
 
Trust sharing economy-part_I-introduction
Trust sharing economy-part_I-introductionTrust sharing economy-part_I-introduction
Trust sharing economy-part_I-introduction
 
Trust sharing economy-part_I-introduction
Trust sharing economy-part_I-introductionTrust sharing economy-part_I-introduction
Trust sharing economy-part_I-introduction
 
Data set module 4
Data set   module 4Data set   module 4
Data set module 4
 
ROI of Privacy: Building a Case for Investment [Webinar Slides]
ROI of Privacy: Building a Case for Investment [Webinar Slides]ROI of Privacy: Building a Case for Investment [Webinar Slides]
ROI of Privacy: Building a Case for Investment [Webinar Slides]
 
Big Data and the Future of Money 2014
Big Data and the Future of Money 2014Big Data and the Future of Money 2014
Big Data and the Future of Money 2014
 
Chris hankin tril_presentation_pdf.pptx
Chris hankin tril_presentation_pdf.pptxChris hankin tril_presentation_pdf.pptx
Chris hankin tril_presentation_pdf.pptx
 
NSTIC and IDESG Update
NSTIC and IDESG UpdateNSTIC and IDESG Update
NSTIC and IDESG Update
 
IPR Sapphire Anthology | Collection of 65-word Reflections and Predictions ab...
IPR Sapphire Anthology | Collection of 65-word Reflections and Predictions ab...IPR Sapphire Anthology | Collection of 65-word Reflections and Predictions ab...
IPR Sapphire Anthology | Collection of 65-word Reflections and Predictions ab...
 
Building Trust in Artificial Intelligence
Building Trust in Artificial IntelligenceBuilding Trust in Artificial Intelligence
Building Trust in Artificial Intelligence
 
Understanding the Landscape of Information Generation in the Media Age by Ami...
Understanding the Landscape of Information Generation in the Media Age by Ami...Understanding the Landscape of Information Generation in the Media Age by Ami...
Understanding the Landscape of Information Generation in the Media Age by Ami...
 
Dull, Difficult, and Essential: Managing Public Records
Dull,  Difficult,  and Essential: Managing Public RecordsDull,  Difficult,  and Essential: Managing Public Records
Dull, Difficult, and Essential: Managing Public Records
 
Building a Culture of Purpose: Corporate Communication in an Age of Radical U...
Building a Culture of Purpose: Corporate Communication in an Age of Radical U...Building a Culture of Purpose: Corporate Communication in an Age of Radical U...
Building a Culture of Purpose: Corporate Communication in an Age of Radical U...
 

More from Desiree Miloshevic

"The power of women" summit Klimerko eng Aug-2021
"The power of women" summit Klimerko eng Aug-2021"The power of women" summit Klimerko eng Aug-2021
"The power of women" summit Klimerko eng Aug-2021
Desiree Miloshevic
 
Virtual school of ig economic issues_2021
Virtual school of ig  economic issues_2021Virtual school of ig  economic issues_2021
Virtual school of ig economic issues_2021
Desiree Miloshevic
 
Internet of Things - IoT Webinar 2013
Internet of Things - IoT Webinar 2013Internet of Things - IoT Webinar 2013
Internet of Things - IoT Webinar 2013
Desiree Miloshevic
 
Crisis of trust and accountability, Internet governance, icann50, ccNSO Desir...
Crisis of trust and accountability, Internet governance, icann50, ccNSO Desir...Crisis of trust and accountability, Internet governance, icann50, ccNSO Desir...
Crisis of trust and accountability, Internet governance, icann50, ccNSO Desir...Desiree Miloshevic
 
Multi stakeholder approach to Internet governance
Multi stakeholder approach to Internet governanceMulti stakeholder approach to Internet governance
Multi stakeholder approach to Internet governance
Desiree Miloshevic
 
Io t malta_2013 Internet of Things IoT Webinar Dec 2013 #iot @Des
Io t malta_2013 Internet of Things IoT Webinar Dec 2013 #iot @DesIo t malta_2013 Internet of Things IoT Webinar Dec 2013 #iot @Des
Io t malta_2013 Internet of Things IoT Webinar Dec 2013 #iot @Des
Desiree Miloshevic
 
Internet governance fairytale desiree miloshevic
Internet governance fairytale desiree miloshevicInternet governance fairytale desiree miloshevic
Internet governance fairytale desiree miloshevic
Desiree Miloshevic
 
Presentation isoc iic 2012 10-30 dzm final copy-2 copy
Presentation isoc iic 2012 10-30 dzm final copy-2 copyPresentation isoc iic 2012 10-30 dzm final copy-2 copy
Presentation isoc iic 2012 10-30 dzm final copy-2 copy
Desiree Miloshevic
 

More from Desiree Miloshevic (8)

"The power of women" summit Klimerko eng Aug-2021
"The power of women" summit Klimerko eng Aug-2021"The power of women" summit Klimerko eng Aug-2021
"The power of women" summit Klimerko eng Aug-2021
 
Virtual school of ig economic issues_2021
Virtual school of ig  economic issues_2021Virtual school of ig  economic issues_2021
Virtual school of ig economic issues_2021
 
Internet of Things - IoT Webinar 2013
Internet of Things - IoT Webinar 2013Internet of Things - IoT Webinar 2013
Internet of Things - IoT Webinar 2013
 
Crisis of trust and accountability, Internet governance, icann50, ccNSO Desir...
Crisis of trust and accountability, Internet governance, icann50, ccNSO Desir...Crisis of trust and accountability, Internet governance, icann50, ccNSO Desir...
Crisis of trust and accountability, Internet governance, icann50, ccNSO Desir...
 
Multi stakeholder approach to Internet governance
Multi stakeholder approach to Internet governanceMulti stakeholder approach to Internet governance
Multi stakeholder approach to Internet governance
 
Io t malta_2013 Internet of Things IoT Webinar Dec 2013 #iot @Des
Io t malta_2013 Internet of Things IoT Webinar Dec 2013 #iot @DesIo t malta_2013 Internet of Things IoT Webinar Dec 2013 #iot @Des
Io t malta_2013 Internet of Things IoT Webinar Dec 2013 #iot @Des
 
Internet governance fairytale desiree miloshevic
Internet governance fairytale desiree miloshevicInternet governance fairytale desiree miloshevic
Internet governance fairytale desiree miloshevic
 
Presentation isoc iic 2012 10-30 dzm final copy-2 copy
Presentation isoc iic 2012 10-30 dzm final copy-2 copyPresentation isoc iic 2012 10-30 dzm final copy-2 copy
Presentation isoc iic 2012 10-30 dzm final copy-2 copy
 

Recently uploaded

Collapsing Narratives: Exploring Non-Linearity • a micro report by Rosie Wells
Collapsing Narratives: Exploring Non-Linearity • a micro report by Rosie WellsCollapsing Narratives: Exploring Non-Linearity • a micro report by Rosie Wells
Collapsing Narratives: Exploring Non-Linearity • a micro report by Rosie Wells
Rosie Wells
 
Tom tresser burning issue.pptx My Burning issue
Tom tresser burning issue.pptx My Burning issueTom tresser burning issue.pptx My Burning issue
Tom tresser burning issue.pptx My Burning issue
amekonnen
 
International Workshop on Artificial Intelligence in Software Testing
International Workshop on Artificial Intelligence in Software TestingInternational Workshop on Artificial Intelligence in Software Testing
International Workshop on Artificial Intelligence in Software Testing
Sebastiano Panichella
 
Media as a Mind Controlling Strategy In Old and Modern Era
Media as a Mind Controlling Strategy In Old and Modern EraMedia as a Mind Controlling Strategy In Old and Modern Era
Media as a Mind Controlling Strategy In Old and Modern Era
faizulhassanfaiz1670
 
Presentatie 4. Jochen Cremer - TU Delft 28 mei 2024
Presentatie 4. Jochen Cremer - TU Delft 28 mei 2024Presentatie 4. Jochen Cremer - TU Delft 28 mei 2024
Presentatie 4. Jochen Cremer - TU Delft 28 mei 2024
Dutch Power
 
Announcement of 18th IEEE International Conference on Software Testing, Verif...
Announcement of 18th IEEE International Conference on Software Testing, Verif...Announcement of 18th IEEE International Conference on Software Testing, Verif...
Announcement of 18th IEEE International Conference on Software Testing, Verif...
Sebastiano Panichella
 
Gregory Harris - Cycle 2 - Civics Presentation
Gregory Harris - Cycle 2 - Civics PresentationGregory Harris - Cycle 2 - Civics Presentation
Gregory Harris - Cycle 2 - Civics Presentation
gharris9
 
somanykidsbutsofewfathers-140705000023-phpapp02.pptx
somanykidsbutsofewfathers-140705000023-phpapp02.pptxsomanykidsbutsofewfathers-140705000023-phpapp02.pptx
somanykidsbutsofewfathers-140705000023-phpapp02.pptx
Howard Spence
 
Burning Issue Presentation By Kenmaryon.pdf
Burning Issue Presentation By Kenmaryon.pdfBurning Issue Presentation By Kenmaryon.pdf
Burning Issue Presentation By Kenmaryon.pdf
kkirkland2
 
Doctoral Symposium at the 17th IEEE International Conference on Software Test...
Doctoral Symposium at the 17th IEEE International Conference on Software Test...Doctoral Symposium at the 17th IEEE International Conference on Software Test...
Doctoral Symposium at the 17th IEEE International Conference on Software Test...
Sebastiano Panichella
 
Gregory Harris' Civics Presentation.pptx
Gregory Harris' Civics Presentation.pptxGregory Harris' Civics Presentation.pptx
Gregory Harris' Civics Presentation.pptx
gharris9
 
AWANG ANIQKMALBIN AWANG TAJUDIN B22080004 ASSIGNMENT 2 MPU3193 PHILOSOPHY AND...
AWANG ANIQKMALBIN AWANG TAJUDIN B22080004 ASSIGNMENT 2 MPU3193 PHILOSOPHY AND...AWANG ANIQKMALBIN AWANG TAJUDIN B22080004 ASSIGNMENT 2 MPU3193 PHILOSOPHY AND...
AWANG ANIQKMALBIN AWANG TAJUDIN B22080004 ASSIGNMENT 2 MPU3193 PHILOSOPHY AND...
AwangAniqkmals
 
2024-05-30_meetup_devops_aix-marseille.pdf
2024-05-30_meetup_devops_aix-marseille.pdf2024-05-30_meetup_devops_aix-marseille.pdf
2024-05-30_meetup_devops_aix-marseille.pdf
Frederic Leger
 
Bitcoin Lightning wallet and tic-tac-toe game XOXO
Bitcoin Lightning wallet and tic-tac-toe game XOXOBitcoin Lightning wallet and tic-tac-toe game XOXO
Bitcoin Lightning wallet and tic-tac-toe game XOXO
Matjaž Lipuš
 
María Carolina Martínez - eCommerce Day Colombia 2024
María Carolina Martínez - eCommerce Day Colombia 2024María Carolina Martínez - eCommerce Day Colombia 2024
María Carolina Martínez - eCommerce Day Colombia 2024
eCommerce Institute
 
Presentatie 8. Joost van der Linde & Daniel Anderton - Eliq 28 mei 2024
Presentatie 8. Joost van der Linde & Daniel Anderton - Eliq 28 mei 2024Presentatie 8. Joost van der Linde & Daniel Anderton - Eliq 28 mei 2024
Presentatie 8. Joost van der Linde & Daniel Anderton - Eliq 28 mei 2024
Dutch Power
 
Bonzo subscription_hjjjjjjjj5hhhhhhh_2024.pdf
Bonzo subscription_hjjjjjjjj5hhhhhhh_2024.pdfBonzo subscription_hjjjjjjjj5hhhhhhh_2024.pdf
Bonzo subscription_hjjjjjjjj5hhhhhhh_2024.pdf
khadija278284
 
Supercharge your AI - SSP Industry Breakout Session 2024-v2_1.pdf
Supercharge your AI - SSP Industry Breakout Session 2024-v2_1.pdfSupercharge your AI - SSP Industry Breakout Session 2024-v2_1.pdf
Supercharge your AI - SSP Industry Breakout Session 2024-v2_1.pdf
Access Innovations, Inc.
 
Obesity causes and management and associated medical conditions
Obesity causes and management and associated medical conditionsObesity causes and management and associated medical conditions
Obesity causes and management and associated medical conditions
Faculty of Medicine And Health Sciences
 

Recently uploaded (19)

Collapsing Narratives: Exploring Non-Linearity • a micro report by Rosie Wells
Collapsing Narratives: Exploring Non-Linearity • a micro report by Rosie WellsCollapsing Narratives: Exploring Non-Linearity • a micro report by Rosie Wells
Collapsing Narratives: Exploring Non-Linearity • a micro report by Rosie Wells
 
Tom tresser burning issue.pptx My Burning issue
Tom tresser burning issue.pptx My Burning issueTom tresser burning issue.pptx My Burning issue
Tom tresser burning issue.pptx My Burning issue
 
International Workshop on Artificial Intelligence in Software Testing
International Workshop on Artificial Intelligence in Software TestingInternational Workshop on Artificial Intelligence in Software Testing
International Workshop on Artificial Intelligence in Software Testing
 
Media as a Mind Controlling Strategy In Old and Modern Era
Media as a Mind Controlling Strategy In Old and Modern EraMedia as a Mind Controlling Strategy In Old and Modern Era
Media as a Mind Controlling Strategy In Old and Modern Era
 
Presentatie 4. Jochen Cremer - TU Delft 28 mei 2024
Presentatie 4. Jochen Cremer - TU Delft 28 mei 2024Presentatie 4. Jochen Cremer - TU Delft 28 mei 2024
Presentatie 4. Jochen Cremer - TU Delft 28 mei 2024
 
Announcement of 18th IEEE International Conference on Software Testing, Verif...
Announcement of 18th IEEE International Conference on Software Testing, Verif...Announcement of 18th IEEE International Conference on Software Testing, Verif...
Announcement of 18th IEEE International Conference on Software Testing, Verif...
 
Gregory Harris - Cycle 2 - Civics Presentation
Gregory Harris - Cycle 2 - Civics PresentationGregory Harris - Cycle 2 - Civics Presentation
Gregory Harris - Cycle 2 - Civics Presentation
 
somanykidsbutsofewfathers-140705000023-phpapp02.pptx
somanykidsbutsofewfathers-140705000023-phpapp02.pptxsomanykidsbutsofewfathers-140705000023-phpapp02.pptx
somanykidsbutsofewfathers-140705000023-phpapp02.pptx
 
Burning Issue Presentation By Kenmaryon.pdf
Burning Issue Presentation By Kenmaryon.pdfBurning Issue Presentation By Kenmaryon.pdf
Burning Issue Presentation By Kenmaryon.pdf
 
Doctoral Symposium at the 17th IEEE International Conference on Software Test...
Doctoral Symposium at the 17th IEEE International Conference on Software Test...Doctoral Symposium at the 17th IEEE International Conference on Software Test...
Doctoral Symposium at the 17th IEEE International Conference on Software Test...
 
Gregory Harris' Civics Presentation.pptx
Gregory Harris' Civics Presentation.pptxGregory Harris' Civics Presentation.pptx
Gregory Harris' Civics Presentation.pptx
 
AWANG ANIQKMALBIN AWANG TAJUDIN B22080004 ASSIGNMENT 2 MPU3193 PHILOSOPHY AND...
AWANG ANIQKMALBIN AWANG TAJUDIN B22080004 ASSIGNMENT 2 MPU3193 PHILOSOPHY AND...AWANG ANIQKMALBIN AWANG TAJUDIN B22080004 ASSIGNMENT 2 MPU3193 PHILOSOPHY AND...
AWANG ANIQKMALBIN AWANG TAJUDIN B22080004 ASSIGNMENT 2 MPU3193 PHILOSOPHY AND...
 
2024-05-30_meetup_devops_aix-marseille.pdf
2024-05-30_meetup_devops_aix-marseille.pdf2024-05-30_meetup_devops_aix-marseille.pdf
2024-05-30_meetup_devops_aix-marseille.pdf
 
Bitcoin Lightning wallet and tic-tac-toe game XOXO
Bitcoin Lightning wallet and tic-tac-toe game XOXOBitcoin Lightning wallet and tic-tac-toe game XOXO
Bitcoin Lightning wallet and tic-tac-toe game XOXO
 
María Carolina Martínez - eCommerce Day Colombia 2024
María Carolina Martínez - eCommerce Day Colombia 2024María Carolina Martínez - eCommerce Day Colombia 2024
María Carolina Martínez - eCommerce Day Colombia 2024
 
Presentatie 8. Joost van der Linde & Daniel Anderton - Eliq 28 mei 2024
Presentatie 8. Joost van der Linde & Daniel Anderton - Eliq 28 mei 2024Presentatie 8. Joost van der Linde & Daniel Anderton - Eliq 28 mei 2024
Presentatie 8. Joost van der Linde & Daniel Anderton - Eliq 28 mei 2024
 
Bonzo subscription_hjjjjjjjj5hhhhhhh_2024.pdf
Bonzo subscription_hjjjjjjjj5hhhhhhh_2024.pdfBonzo subscription_hjjjjjjjj5hhhhhhh_2024.pdf
Bonzo subscription_hjjjjjjjj5hhhhhhh_2024.pdf
 
Supercharge your AI - SSP Industry Breakout Session 2024-v2_1.pdf
Supercharge your AI - SSP Industry Breakout Session 2024-v2_1.pdfSupercharge your AI - SSP Industry Breakout Session 2024-v2_1.pdf
Supercharge your AI - SSP Industry Breakout Session 2024-v2_1.pdf
 
Obesity causes and management and associated medical conditions
Obesity causes and management and associated medical conditionsObesity causes and management and associated medical conditions
Obesity causes and management and associated medical conditions
 

Webinar The Role of Trust in Digital policy 2016

  • 1. D E S I R E E M I L O S H E V I C D I P L O A L U M N I T U E S D A Y , J U L Y 1 8 T H 2 0 1 6 WEBINAR ON THE ROLE OF TRUST IN DIGITAL POLICY CASE STUDY: APPLIED ETHICS IN IG INSTITUTIONS DEALING WITH GLOBAL RESOURCES
  • 2. AGENDA • Trust etymology • Trust vs trustworthiness • Why is there so much focus on trust? • Trust concepts and frameworks • Applied ethics case study – data • Role of Trust for Digital Policy? • Can users’ trust be restored? • What are stakeholders’ roles? • Q&A
  • 3. ETYMOLOGY OF WORD TRUST • Origin Old Norse –> traustr –> traust –> treysta: strong -> Trust - Middle English • C 1200, "reliance on the veracity, integrity, or other virtues of someone or something; religious faith," from Old Norse traust "help, confidence, protection, support," from Proto-Germanic abstract noun *traustam (source also of Old Frisian trast, Dutch troost "comfort, consolation," Old High German trost "trust, …Gothic trausti "agreement, alliance"
  • 5. TRUST VS TRUSTWORTHINESS • Research into the roles of trust in our society broad range of often conflicting theories. Some theorists maintain that trust is a social virtue that cannot be reduced to strategic self-interest; trusting another person is ultimately a rational calculation based on information about that person and his or her incentives and motivations. • our trust in persons whom we believe to have strong reasons* to act in our best interests. “We are correct when we assume that the main incentive of those whom we trust is to maintain a relationship with us— whether it be for reasons of economic benefit or for love and friendship. “I trust you to be trustworthy – type of trust we place in individuals or institutions”
  • 6. TRUST VS TRUSTWORTHINESS • Hardin also makes an important differentiation between the trust and trustworthiness (Hardin, 2006)explaining that 1. trust is a positive belief that does not need to be proven 2. whereas trustworthiness is an earned quality, representing someone reliable, proven and honest
  • 7. WHY IS TRUST THE HOTTEST SUBJECT IN IG? • After Snowden revelations, there is a growing anxiety among Internet users (See: Desiree Miloshevic, Crisis of Trust, Crisis of Accountability 24 june14- en.pdf) • Safety and Privacy of citizens is at stake, 45% are changing the way to use the Internet • Trust is on top of the mind of all users but also government policy • “We are at risk of undoing all the progress we have made on the Internet” Kathy Brown, OECD Ministerial • https://www.whitehouse.gov/blog/2012/02/24/internet-privacy-protecting- consumers-building-trust-creating-jobs • Framework of Trust: trusted networks/ technologies/ users / ecosystem See: https://www.internetsociety.org/sites/default/files/IG%20and%20Trust%20- %20BoT%20June%202016%20-%20Final-R.pdf)
  • 8. TRUST IS… Can trust be measured? Trust is a subjective matter … Trust is contextual… Need to separate normative questions of Ethics and Trust from questions coming from psychology and other sciences (e.g. individuals don’t recognize it until it’s lost) We can only study how is trust perceived to get a more objective insight What kind of perceived trust is required for digital policies?
  • 9. HOW MUCH TRUST IS THERE? Trust fell in businesses sector from 59% to 57% Non- Governmental Organisations (NGOs) from 66% to 63% Media (from 53% to 51%) between 2014 and 2015 Only trust in governments rose during this time (from 45% to 48%), but they were still perceived as the most untrustworthy form of organisation in the study. Source: The Edelman Trust Barometer 2015
  • 10. restoring USERS’ TRUST IN? • Networks (Infrastructure) Layer I • Technologies (Protocol and Application Layers: Layer II and II • Companies, on-line platforms and devices! (facebook, gmail, laptops, tablets, mobile phones, desktops ) • Cloud services, ISPs • Internet governance Institutions • National governments “Trust takes years to build, seconds to break and forever to repair.”
  • 11. TRUST AND APPLIED ETHICS ETHICS & RELATIONSHIPS NORMATIVE 1. INERNET USERS vs INTERNET USERS e.g. bullying, online violence 2. INTERNET USERS vs CORPORATIONS 3. USERS/MEMBERS vs INTERNET GOVERNANCE INSTITUTIONS e.g. USERS and DNS policies in ICANN e.g. MEMBERS OF RIRs POLITICAL PHILOSOPHY NORMATIVE RELATIONSHIP BETWEEN USERS/CITIZENS AND THE STATE - Governments e.g. Snowden revelations CORPORATIONS AND GOVERNMENTS
  • 12. IMPORTANT SEPARATION Ethical and Normative Level: How things should ideally look like with regards to trust, if we were completely rational beings? Empirical and Pshychological How things currently are with regards to perception of trust in real life, since there is always a lack of information, unrealistic beliefs and expectations, personal interests, and unequal power relations between stakeholders
  • 13. SECURITY AND TRUST – David CLARK • On July 16, 1992, Prof. David Clark articulated what would become the creed of the Internet engineering community. He was giving a presentation A Cloudy Crystal Ball: A Vision into the Future at the IETF. It was era of turmoil and uncertainty as the privatization of the Internet (the transformation of the Internet from NSFNET to commercial networks) was in its infancy. “We Reject: Kings, Presidents, and Voting. We Believe in: Running Code and Rough Consensus Our best success was not computing, but hooking people together! The hacks of today are the commonplace of tomorrow! Security is a CRITICAL problem! What we should do: Fix insecure services: PASSWORDS, etc. The problem is assigning the correct degree of fear to distant elephants. If we have a problem it is due to too much success.” See http://cybertelecom.blogspot.de/2016/07/1992-july-16-david-clark- articulates.html
  • 14. WHAT ARE THE ROLES OF STKHDRS? • There is no one treaty that would fix this or legislation that would solve issue of trust • Can’t just focus on technology, we need to take in law and global politics • Commercial interests have impact on the IG ecosystem not necessarily good for the Internet e.g, botnets, ISPs – slowing traffic • Commercial aspects are not apparent enough • Can we imagine a healthy development of our digital society without solving the post-Snowden challenges it brings to citizens, technology, community and governments as well?
  • 15. RIR CASE STUDY • MOST CRITICAL FOR TRUST: Members of studied IG organisations perceive the role of the board and relationship of their organisation with the wider Internet community as critical for continuing to have trust in the organisation MOST DAMAGING FOR TRUST: • a non-transparent act of an organisation. • not addressing adequately external regulatory threats • deviation from policies CONCLUSIONS: • Demand for transparency • Demand for slightly conservative business predictability • Organisation/institution - True to its core mission.