42 research outputs found

    ミャンマー語テキストの形式手法による音節分割、正規化と辞書順排列

    Get PDF
    国立大学法人長岡技術科学大

    Internet Domain Names in China

    Get PDF
    This article aims at documenting the implementation of the Domain Name System in China, in coordination and in tension with the global Domain Name System since the end of the 1980s with the Chinese country-code top-level domain “.cn,” and more recently with the creation of Chinese-language domain names such as “.中国” and “.中文网.” It puts into perspective the notion of “digital sovereignty” by analysing the role of the DNS in the “localisation” of online content as part of the censorship system. It further shows that although Chinese representatives have always been very critical of the existing architecture and management of the DNS on the global stage, their attitude has evolved from de facto, bottom-up participation and protection of their interests to a more confident and assertive behaviour, as the growth of the Chinese Internet has put them in a more dominant position

    Internet Governance: the State of Play

    Get PDF
    The Global Forum on Internet Governance held by the UNICT Task Force in New York on 25-26 March concluded that Internet governance issues were many and complex. The Secretary-General's Working Group on Internet Governance will have to map out and navigate this complex terrain as it makes recommendations to the World Summit on an Information Society in 2005. To assist in this process, the Forum recommended, in the words of the Deputy Secretary-General of the United Nations at the closing session, that a matrix be developed "of all issues of Internet governance addressed by multilateral institutions, including gaps and concerns, to assist the Secretary-General in moving forward the agenda on these issues." This paper takes up the Deputy Secretary-General's challenge. It is an analysis of the state of play in Internet governance in different forums, with a view to showing: (1) what issues are being addressed (2) by whom, (3) what are the types of consideration that these issues receive and (4) what issues are not adequately addressed

    China & technical global internet governance: from norm-taker to norm-maker?

    Full text link
     This dissertation examines Chinese engagement with core norms structuring technical global internet governance. It finds that China has been a norm-taker globally, but more of a norm-maker both regionally and domestically. Beijing seeks to restrict US government and non-state actor authority, but cannot due to limited support and power constraints

    The state of broadband 2012: achieving digital inclusion for all

    Get PDF
    With this Report, the Broadband Commission expands awareness and understanding of the importance of broadband networks, services, and applications for generating economic growth and achieving social progress. High-speed affordable broadband connectivity to the Internet is essential to modern society, offering widely recognized economic and social benefits (Annex 1). The Broadband Commission for Digital Development promotes the adoption of broadband-friendly practices and policies for all, so everyone can take advantage of the benefits offered by broadband. With this Report, the Broadband Commission expands awareness and understanding of the importance of broadband networks, services, and applications for generating economic growth and achieving social progress. It has been written collaboratively, drawing on insightful and thought-provoking contributions from our leading array of Commissioners and their organizations, foremost in their fields

    Governança multisetorial e o processo de governança da internet : um estudo de caso sobre crime cibernético e filtragem na internet entre 1990 e 2010

    Get PDF
    Tese (doutorado)—Universidade de Brasília, Instituto de Relações Internacionais, 2012.Texto em inglês, com os elementos pré-textuais, introdução e conclusão em português.Com o desenvolvimento do código HTML e do primeiro browser no começo dos anos 90, a internet deixou de ser uma rede acessada somente por um grupo relativamente pequeno de pessoas distribuídas por alguns países. A partir do momento em que houve a comercialização da internet, um número crescente de pessoas e atores começou a utilizar esse meio de forma a desenvolver suas próprias visões, ideias e interesses. O que começou como uma rede fundamentalmente usada por programadores e acadêmicos com o objetivo de criar acesso rápido a informações independentes da localização física do usuário se tranformou em uma rede de negócios, um meio de divulgação de direitos básicos, um fórum para qualquer tipo de informação, mas também um espaço para atividades mal intencionadas, crime cibernético ou ataques virtuais. Face a essa alta quantidade de problemas e oportunidades, um grande número de atores do setor público, do setor privado e da sociedade civil criou um novo fenômeno chamado governança de internet, baseado no conceito multi-setorial. A institucionalização desse processo aconteceu quando, em 2005, foi criado o Fórum de Governança de Internet pela Organização das Nações Unidas. Esta tese busca analisar o processo que criou o ambiente multi-setorial da governança de internet com foco nos dois fenômenos de crime cibernético e filtragem da internet. _______________________________________________________________________________________ ABSTRACTWith the development of HTML and the first browser in the beginning of the 1990s, the Internet was no longer a network exclusively for a relatively small group of individuals in a number of countries. With the commercialization of the Internet a growing number of individuals and actors started using this means to develop and follow their own visions, ideas and interests. What had started as a network basically used by programmers and scientists aiming at creating fast access to information independently of the physical location of the user, turned into a business network, a place to divulge basic rights, a forum for any kind of information but also a place for malicious activities, cybercrime, and virtual attacks. Given the high quantity of problems and opportunities a large number of actors from the public sector, the private sector and civil society developed a new phenomenon called Internet governance, based on a multi-stakeholder approach. The institutionalization of this process happened in 2005 when the United Nations Internet Governance Forum was set up. This thesis is analysing the process that built the multi-stakeholder Internet governance environment, with a focus on the two phenomenons cybercrime and Internet filtering

    ICANN and Antitrust

    Full text link
    The Internet Corporation for Assigned Names and Numbers (ICANN) is a private non-profit company which, pursuant to contracts with the US government, acts as the de facto regulator for DNS policy. ICANN decides what TLDs will be made available to users, and which registrars will be permitted to offer those TLDs for sale. In this article we focus on a hitherto-neglected implication of ICANN's assertion that it is a private rather than a public actor: its potential liability under the U.S. antitrust laws, and the liability of those who transact with it. ICANN argues that it is not as closely tied to the government as NSI and IANA were in the days before ICANN was created. If this is correct, it seems likely that ICANN will not benefit from the antitrust immunity those actors enjoyed. Some of ICANN's regulatory actions may restrain competition, e.g. its requirement that applicants for new gTLDs demonstrate that their proposals would not enable competitive (alternate) roots and ICANN's preventing certain types of non-price competition among registrars (requiring the UDRP). ICANN's rule adoption process might be characterized as anticompetitive collusion by existing registrars, who are likely not be subject to the Noerr-Pennington lobbying exemption. Whether ICANN has in fact violated the antitrust laws depends on whether it is an antitrust state actor, whether the DNS is an essential facility, and on whether it can shelter under precedents that protect standard-setting bodies. If (as seems likely) a private ICANN and those who petition it are subject to antitrust law, everyone involved in the process needs to review their conduct with an eye towards legal liability. ICANN should act very differently with respect to both the UDRP and the competitive roots if it is to avoid restraining trade.Comment: 29th TPRC Conference, 200

    The Proceedings of 15th Australian Information Security Management Conference, 5-6 December, 2017, Edith Cowan University, Perth, Australia

    Get PDF
    Conference Foreword The annual Security Congress, run by the Security Research Institute at Edith Cowan University, includes the Australian Information Security and Management Conference. Now in its fifteenth year, the conference remains popular for its diverse content and mixture of technical research and discussion papers. The area of information security and management continues to be varied, as is reflected by the wide variety of subject matter covered by the papers this year. The papers cover topics from vulnerabilities in “Internet of Things” protocols through to improvements in biometric identification algorithms and surveillance camera weaknesses. The conference has drawn interest and papers from within Australia and internationally. All submitted papers were subject to a double blind peer review process. Twenty two papers were submitted from Australia and overseas, of which eighteen were accepted for final presentation and publication. We wish to thank the reviewers for kindly volunteering their time and expertise in support of this event. We would also like to thank the conference committee who have organised yet another successful congress. Events such as this are impossible without the tireless efforts of such people in reviewing and editing the conference papers, and assisting with the planning, organisation and execution of the conference. To our sponsors, also a vote of thanks for both the financial and moral support provided to the conference. Finally, thank you to the administrative and technical staff, and students of the ECU Security Research Institute for their contributions to the running of the conference
    corecore