SlideShare a Scribd company logo
1 of 15
Download to read offline
D E S I R E E M I L O S H E V I C
D I P L O A L U M N I
T U E S D A Y , J U L Y 1 8 T H 2 0 1 6
WEBINAR ON THE ROLE OF TRUST IN
DIGITAL POLICY
CASE STUDY: APPLIED ETHICS IN IG
INSTITUTIONS DEALING WITH
GLOBAL RESOURCES
AGENDA
• Trust etymology
• Trust vs trustworthiness
• Why is there so much focus on trust?
• Trust concepts and frameworks
• Applied ethics case study – data
• Role of Trust for Digital Policy?
• Can users’ trust be restored?
• What are stakeholders’ roles?
• Q&A
ETYMOLOGY OF WORD TRUST
• Origin
Old Norse –> traustr –> traust –> treysta: strong
-> Trust - Middle English
• C 1200, "reliance on the veracity, integrity, or other
virtues of someone or something; religious faith,"
from Old Norse traust "help, confidence, protection,
support," from Proto-Germanic abstract noun
*traustam (source also of Old Frisian trast, Dutch
troost "comfort, consolation," Old High German trost
"trust, …Gothic trausti "agreement, alliance"
TRUST
TRUST VS TRUSTWORTHINESS
• Research into the roles of trust in our society broad range of
often conflicting theories. Some theorists maintain that trust is a
social virtue that cannot be reduced to strategic self-interest;
trusting another person is ultimately a rational calculation
based on information about that person and his or her
incentives and motivations.
• our trust in persons whom we believe to have strong reasons*
to act in our best interests.
“We are correct when we assume that the main incentive of
those whom we trust is to maintain a relationship with us—
whether it be for reasons of economic benefit or for love and
friendship. “I trust you to be trustworthy – type of trust we place
in individuals or institutions”
TRUST VS TRUSTWORTHINESS
• Hardin also makes an important differentiation
between the trust and trustworthiness (Hardin,
2006)explaining that
1. trust is a positive belief that does not need to be
proven
2. whereas trustworthiness is an earned quality,
representing someone reliable, proven and honest
WHY IS TRUST THE HOTTEST SUBJECT
IN IG?
• After Snowden revelations, there is a growing anxiety among Internet users
(See: Desiree Miloshevic, Crisis of Trust, Crisis of Accountability 24 june14-
en.pdf)
• Safety and Privacy of citizens is at stake, 45% are changing the way to use the
Internet
• Trust is on top of the mind of all users but also government policy
• “We are at risk of undoing all the progress we have made on the Internet”
Kathy Brown, OECD Ministerial
• https://www.whitehouse.gov/blog/2012/02/24/internet-privacy-protecting-
consumers-building-trust-creating-jobs
• Framework of Trust: trusted networks/ technologies/ users / ecosystem
See: https://www.internetsociety.org/sites/default/files/IG%20and%20Trust%20-
%20BoT%20June%202016%20-%20Final-R.pdf)
TRUST IS…
Can trust be measured?
Trust is a subjective matter … Trust is contextual…
Need to separate normative questions of Ethics and Trust
from questions coming from psychology and other
sciences (e.g. individuals don’t recognize it until it’s lost)
We can only study how is trust perceived to get a more
objective insight
What kind of perceived trust is required for digital policies?
HOW MUCH TRUST IS THERE?
Trust fell in businesses sector from 59% to 57%
Non- Governmental Organisations (NGOs) from 66% to
63%
Media (from 53% to 51%) between 2014 and 2015
Only trust in governments rose during this time (from 45% to
48%), but they were still perceived as the most
untrustworthy form of organisation in the study.
Source: The Edelman Trust Barometer 2015
restoring USERS’ TRUST IN?
• Networks (Infrastructure) Layer I
• Technologies (Protocol and Application Layers: Layer II
and II
• Companies, on-line platforms and devices!
(facebook, gmail, laptops, tablets, mobile phones,
desktops )
• Cloud services, ISPs
• Internet governance Institutions
• National governments
“Trust takes years to build, seconds to break and forever to
repair.”
TRUST AND APPLIED ETHICS
ETHICS &
RELATIONSHIPS
NORMATIVE
1. INERNET USERS vs INTERNET USERS
e.g. bullying, online violence
2. INTERNET USERS vs
CORPORATIONS
3. USERS/MEMBERS vs INTERNET
GOVERNANCE INSTITUTIONS
e.g. USERS and DNS policies in
ICANN e.g. MEMBERS OF RIRs
POLITICAL PHILOSOPHY
NORMATIVE
RELATIONSHIP BETWEEN
USERS/CITIZENS AND THE STATE -
Governments
e.g. Snowden revelations
CORPORATIONS AND
GOVERNMENTS
IMPORTANT SEPARATION
Ethical and Normative
Level:
How things should
ideally look like with
regards to trust, if we
were completely
rational beings?
Empirical and
Pshychological
How things currently
are with regards to
perception of trust in
real life, since there is
always a lack of
information, unrealistic
beliefs and
expectations, personal
interests, and unequal
power relations
between stakeholders
SECURITY AND TRUST – David CLARK
• On July 16, 1992, Prof. David Clark articulated what would become the
creed of the Internet engineering community. He was giving a
presentation A Cloudy Crystal Ball: A Vision into the Future at the IETF. It
was era of turmoil and uncertainty as the privatization of the Internet
(the transformation of the Internet from NSFNET to commercial
networks) was in its infancy.
“We Reject: Kings, Presidents, and Voting.
We Believe in: Running Code and Rough Consensus
Our best success was not computing, but hooking people together!
The hacks of today are the commonplace of tomorrow!
Security is a CRITICAL problem!
What we should do: Fix insecure services: PASSWORDS, etc.
The problem is assigning the correct degree of fear to distant
elephants.
If we have a problem it is due to too much success.”
See http://cybertelecom.blogspot.de/2016/07/1992-july-16-david-clark-
articulates.html
WHAT ARE THE ROLES OF STKHDRS?
• There is no one treaty that would fix this or legislation that
would solve issue of trust
• Can’t just focus on technology, we need to take in law
and global politics
• Commercial interests have impact on the IG ecosystem
not necessarily good for the Internet e.g, botnets, ISPs –
slowing traffic
• Commercial aspects are not apparent enough
• Can we imagine a healthy development of our digital
society without solving the post-Snowden challenges it
brings to citizens, technology, community and
governments as well?
RIR CASE STUDY
• MOST CRITICAL FOR TRUST:
Members of studied IG organisations perceive the role of the
board and relationship of their organisation with the wider
Internet community as critical for continuing to have trust in
the organisation
MOST DAMAGING FOR TRUST:
• a non-transparent act of an organisation.
• not addressing adequately external regulatory threats
• deviation from policies
CONCLUSIONS:
• Demand for transparency
• Demand for slightly conservative business predictability
• Organisation/institution - True to its core mission.

More Related Content

What's hot

Social media marketing 2015
Social media marketing 2015Social media marketing 2015
Social media marketing 2015Nicole Black
 
DBryant-Cybersecurity Challenge
DBryant-Cybersecurity ChallengeDBryant-Cybersecurity Challenge
DBryant-Cybersecurity Challengemsdee3362
 
HacktivismPaper.docx
HacktivismPaper.docxHacktivismPaper.docx
HacktivismPaper.docxDesarae Veit
 
What is cyber crime ppoint
What is cyber crime ppointWhat is cyber crime ppoint
What is cyber crime ppointatkinsondf
 
20160317 ARMA Wyoming Social Media Security Threats
20160317 ARMA Wyoming Social Media Security Threats20160317 ARMA Wyoming Social Media Security Threats
20160317 ARMA Wyoming Social Media Security ThreatsJesse Wilkins
 
Cybersecurity, Emerging Technologies, and Homeland Security - Chuck Brooks
Cybersecurity, Emerging Technologies, and Homeland Security - Chuck Brooks Cybersecurity, Emerging Technologies, and Homeland Security - Chuck Brooks
Cybersecurity, Emerging Technologies, and Homeland Security - Chuck Brooks Chuck Brooks
 
Cyber for Counties Guidebook
Cyber for Counties Guidebook Cyber for Counties Guidebook
Cyber for Counties Guidebook Kristin Judge
 
Cybersecurity, Emerging Tech, and Risk Management - compiled media and writin...
Cybersecurity, Emerging Tech, and Risk Management - compiled media and writin...Cybersecurity, Emerging Tech, and Risk Management - compiled media and writin...
Cybersecurity, Emerging Tech, and Risk Management - compiled media and writin...Chuck Brooks
 
Age Friendly Economy - Legislation and Ethics of Data Use
Age Friendly Economy - Legislation and Ethics of Data UseAge Friendly Economy - Legislation and Ethics of Data Use
Age Friendly Economy - Legislation and Ethics of Data UseAgeFriendlyEconomy
 
Chuck Brooks; Cybersecurity & Homeland Security Leadership Profile
Chuck Brooks; Cybersecurity & Homeland Security Leadership ProfileChuck Brooks; Cybersecurity & Homeland Security Leadership Profile
Chuck Brooks; Cybersecurity & Homeland Security Leadership ProfileChuck Brooks
 
How to Like Social Media Network Security
How to Like Social Media Network SecurityHow to Like Social Media Network Security
How to Like Social Media Network SecurityBrian Honan
 
EVERFI/Jackson Lewis: How to Comply with GDPR Requirements: What every U.S. C...
EVERFI/Jackson Lewis: How to Comply with GDPR Requirements: What every U.S. C...EVERFI/Jackson Lewis: How to Comply with GDPR Requirements: What every U.S. C...
EVERFI/Jackson Lewis: How to Comply with GDPR Requirements: What every U.S. C...Michele Collu
 
Policy Guide for Legislators
Policy Guide for LegislatorsPolicy Guide for Legislators
Policy Guide for LegislatorsKristin Judge
 
111cyber crimes
111cyber crimes111cyber crimes
111cyber crimesrinushalu
 
Module 5 - Legislation - Online
Module 5 - Legislation - OnlineModule 5 - Legislation - Online
Module 5 - Legislation - Onlinecaniceconsulting
 
Cybersecurity, Emerging Technologies, Risk Management, Homeland Security, and...
Cybersecurity, Emerging Technologies, Risk Management, Homeland Security, and...Cybersecurity, Emerging Technologies, Risk Management, Homeland Security, and...
Cybersecurity, Emerging Technologies, Risk Management, Homeland Security, and...Chuck Brooks
 
Social media and security essentials.pptx
Social media and security essentials.pptxSocial media and security essentials.pptx
Social media and security essentials.pptxPink Elephant
 

What's hot (20)

Social media marketing 2015
Social media marketing 2015Social media marketing 2015
Social media marketing 2015
 
DBryant-Cybersecurity Challenge
DBryant-Cybersecurity ChallengeDBryant-Cybersecurity Challenge
DBryant-Cybersecurity Challenge
 
HacktivismPaper.docx
HacktivismPaper.docxHacktivismPaper.docx
HacktivismPaper.docx
 
What is cyber crime ppoint
What is cyber crime ppointWhat is cyber crime ppoint
What is cyber crime ppoint
 
20160317 ARMA Wyoming Social Media Security Threats
20160317 ARMA Wyoming Social Media Security Threats20160317 ARMA Wyoming Social Media Security Threats
20160317 ARMA Wyoming Social Media Security Threats
 
Cybersecurity, Emerging Technologies, and Homeland Security - Chuck Brooks
Cybersecurity, Emerging Technologies, and Homeland Security - Chuck Brooks Cybersecurity, Emerging Technologies, and Homeland Security - Chuck Brooks
Cybersecurity, Emerging Technologies, and Homeland Security - Chuck Brooks
 
Cyber for Counties Guidebook
Cyber for Counties Guidebook Cyber for Counties Guidebook
Cyber for Counties Guidebook
 
Cybersecurity, Emerging Tech, and Risk Management - compiled media and writin...
Cybersecurity, Emerging Tech, and Risk Management - compiled media and writin...Cybersecurity, Emerging Tech, and Risk Management - compiled media and writin...
Cybersecurity, Emerging Tech, and Risk Management - compiled media and writin...
 
Social media and ethics
Social media and ethicsSocial media and ethics
Social media and ethics
 
LifeLock Javelin Presentation
LifeLock Javelin PresentationLifeLock Javelin Presentation
LifeLock Javelin Presentation
 
Age Friendly Economy - Legislation and Ethics of Data Use
Age Friendly Economy - Legislation and Ethics of Data UseAge Friendly Economy - Legislation and Ethics of Data Use
Age Friendly Economy - Legislation and Ethics of Data Use
 
Chuck Brooks; Cybersecurity & Homeland Security Leadership Profile
Chuck Brooks; Cybersecurity & Homeland Security Leadership ProfileChuck Brooks; Cybersecurity & Homeland Security Leadership Profile
Chuck Brooks; Cybersecurity & Homeland Security Leadership Profile
 
Cybersecurity and liability your david willson
Cybersecurity and liability your   david willsonCybersecurity and liability your   david willson
Cybersecurity and liability your david willson
 
How to Like Social Media Network Security
How to Like Social Media Network SecurityHow to Like Social Media Network Security
How to Like Social Media Network Security
 
EVERFI/Jackson Lewis: How to Comply with GDPR Requirements: What every U.S. C...
EVERFI/Jackson Lewis: How to Comply with GDPR Requirements: What every U.S. C...EVERFI/Jackson Lewis: How to Comply with GDPR Requirements: What every U.S. C...
EVERFI/Jackson Lewis: How to Comply with GDPR Requirements: What every U.S. C...
 
Policy Guide for Legislators
Policy Guide for LegislatorsPolicy Guide for Legislators
Policy Guide for Legislators
 
111cyber crimes
111cyber crimes111cyber crimes
111cyber crimes
 
Module 5 - Legislation - Online
Module 5 - Legislation - OnlineModule 5 - Legislation - Online
Module 5 - Legislation - Online
 
Cybersecurity, Emerging Technologies, Risk Management, Homeland Security, and...
Cybersecurity, Emerging Technologies, Risk Management, Homeland Security, and...Cybersecurity, Emerging Technologies, Risk Management, Homeland Security, and...
Cybersecurity, Emerging Technologies, Risk Management, Homeland Security, and...
 
Social media and security essentials.pptx
Social media and security essentials.pptxSocial media and security essentials.pptx
Social media and security essentials.pptx
 

Similar to Webinar The Role of Trust in Digital policy 2016

2015-10-14 research seminar 2
2015-10-14 research seminar 22015-10-14 research seminar 2
2015-10-14 research seminar 2ifi8106tlu
 
Social life in digital societies: Trust, Reputation and Privacy EINS summer s...
Social life in digital societies: Trust, Reputation and Privacy EINS summer s...Social life in digital societies: Trust, Reputation and Privacy EINS summer s...
Social life in digital societies: Trust, Reputation and Privacy EINS summer s...i_scienceEU
 
Privacy vs personalization: advisory for brand and comms practitioners into 2...
Privacy vs personalization: advisory for brand and comms practitioners into 2...Privacy vs personalization: advisory for brand and comms practitioners into 2...
Privacy vs personalization: advisory for brand and comms practitioners into 2...Dave Holland
 
Data set Legislation
Data set LegislationData set Legislation
Data set LegislationData-Set
 
Data set Legislation
Data set LegislationData set Legislation
Data set LegislationData-Set
 
Data set Legislation
Data set   Legislation Data set   Legislation
Data set Legislation Data-Set
 
Get Consumer Smart - What Fake News Tells Us About Trust
Get Consumer Smart - What Fake News Tells Us About TrustGet Consumer Smart - What Fake News Tells Us About Trust
Get Consumer Smart - What Fake News Tells Us About Trustemmersons1
 
Trust sharing economy-part_I-introduction
Trust sharing economy-part_I-introductionTrust sharing economy-part_I-introduction
Trust sharing economy-part_I-introductionshareNL
 
Trust sharing economy-part_I-introduction
Trust sharing economy-part_I-introductionTrust sharing economy-part_I-introduction
Trust sharing economy-part_I-introductionJessica Slijpen
 
Data set module 4
Data set   module 4Data set   module 4
Data set module 4Data-Set
 
ROI of Privacy: Building a Case for Investment [Webinar Slides]
ROI of Privacy: Building a Case for Investment [Webinar Slides]ROI of Privacy: Building a Case for Investment [Webinar Slides]
ROI of Privacy: Building a Case for Investment [Webinar Slides]TrustArc
 
Big Data and the Future of Money 2014
Big Data and the Future of Money 2014Big Data and the Future of Money 2014
Big Data and the Future of Money 2014Daniel Austin
 
NSTIC and IDESG Update
NSTIC and IDESG UpdateNSTIC and IDESG Update
NSTIC and IDESG UpdateIan Glazer
 
IPR Sapphire Anthology | Collection of 65-word Reflections and Predictions ab...
IPR Sapphire Anthology | Collection of 65-word Reflections and Predictions ab...IPR Sapphire Anthology | Collection of 65-word Reflections and Predictions ab...
IPR Sapphire Anthology | Collection of 65-word Reflections and Predictions ab...Sarah Jackson
 
Building Trust in Artificial Intelligence
Building Trust in Artificial IntelligenceBuilding Trust in Artificial Intelligence
Building Trust in Artificial Intelligencemahaveermalhi1
 
Understanding the Landscape of Information Generation in the Media Age by Ami...
Understanding the Landscape of Information Generation in the Media Age by Ami...Understanding the Landscape of Information Generation in the Media Age by Ami...
Understanding the Landscape of Information Generation in the Media Age by Ami...Amir Jahangir
 
Dull, Difficult, and Essential: Managing Public Records
Dull,  Difficult,  and Essential: Managing Public RecordsDull,  Difficult,  and Essential: Managing Public Records
Dull, Difficult, and Essential: Managing Public RecordsPaul W. Taylor
 
Building a Culture of Purpose: Corporate Communication in an Age of Radical U...
Building a Culture of Purpose: Corporate Communication in an Age of Radical U...Building a Culture of Purpose: Corporate Communication in an Age of Radical U...
Building a Culture of Purpose: Corporate Communication in an Age of Radical U...the Brand & Reputation Collective
 

Similar to Webinar The Role of Trust in Digital policy 2016 (20)

2015-10-14 research seminar 2
2015-10-14 research seminar 22015-10-14 research seminar 2
2015-10-14 research seminar 2
 
BUILDING TRUST IN A CONNECTED WORLD – HAYNNE’S ROYAL COMMISSION
BUILDING TRUST IN A CONNECTED WORLD – HAYNNE’S ROYAL COMMISSIONBUILDING TRUST IN A CONNECTED WORLD – HAYNNE’S ROYAL COMMISSION
BUILDING TRUST IN A CONNECTED WORLD – HAYNNE’S ROYAL COMMISSION
 
Social life in digital societies: Trust, Reputation and Privacy EINS summer s...
Social life in digital societies: Trust, Reputation and Privacy EINS summer s...Social life in digital societies: Trust, Reputation and Privacy EINS summer s...
Social life in digital societies: Trust, Reputation and Privacy EINS summer s...
 
Privacy vs personalization: advisory for brand and comms practitioners into 2...
Privacy vs personalization: advisory for brand and comms practitioners into 2...Privacy vs personalization: advisory for brand and comms practitioners into 2...
Privacy vs personalization: advisory for brand and comms practitioners into 2...
 
Data set Legislation
Data set LegislationData set Legislation
Data set Legislation
 
Data set Legislation
Data set LegislationData set Legislation
Data set Legislation
 
Data set Legislation
Data set   Legislation Data set   Legislation
Data set Legislation
 
Get Consumer Smart - What Fake News Tells Us About Trust
Get Consumer Smart - What Fake News Tells Us About TrustGet Consumer Smart - What Fake News Tells Us About Trust
Get Consumer Smart - What Fake News Tells Us About Trust
 
Trust sharing economy-part_I-introduction
Trust sharing economy-part_I-introductionTrust sharing economy-part_I-introduction
Trust sharing economy-part_I-introduction
 
Trust sharing economy-part_I-introduction
Trust sharing economy-part_I-introductionTrust sharing economy-part_I-introduction
Trust sharing economy-part_I-introduction
 
Data set module 4
Data set   module 4Data set   module 4
Data set module 4
 
ROI of Privacy: Building a Case for Investment [Webinar Slides]
ROI of Privacy: Building a Case for Investment [Webinar Slides]ROI of Privacy: Building a Case for Investment [Webinar Slides]
ROI of Privacy: Building a Case for Investment [Webinar Slides]
 
Big Data and the Future of Money 2014
Big Data and the Future of Money 2014Big Data and the Future of Money 2014
Big Data and the Future of Money 2014
 
Chris hankin tril_presentation_pdf.pptx
Chris hankin tril_presentation_pdf.pptxChris hankin tril_presentation_pdf.pptx
Chris hankin tril_presentation_pdf.pptx
 
NSTIC and IDESG Update
NSTIC and IDESG UpdateNSTIC and IDESG Update
NSTIC and IDESG Update
 
IPR Sapphire Anthology | Collection of 65-word Reflections and Predictions ab...
IPR Sapphire Anthology | Collection of 65-word Reflections and Predictions ab...IPR Sapphire Anthology | Collection of 65-word Reflections and Predictions ab...
IPR Sapphire Anthology | Collection of 65-word Reflections and Predictions ab...
 
Building Trust in Artificial Intelligence
Building Trust in Artificial IntelligenceBuilding Trust in Artificial Intelligence
Building Trust in Artificial Intelligence
 
Understanding the Landscape of Information Generation in the Media Age by Ami...
Understanding the Landscape of Information Generation in the Media Age by Ami...Understanding the Landscape of Information Generation in the Media Age by Ami...
Understanding the Landscape of Information Generation in the Media Age by Ami...
 
Dull, Difficult, and Essential: Managing Public Records
Dull,  Difficult,  and Essential: Managing Public RecordsDull,  Difficult,  and Essential: Managing Public Records
Dull, Difficult, and Essential: Managing Public Records
 
Building a Culture of Purpose: Corporate Communication in an Age of Radical U...
Building a Culture of Purpose: Corporate Communication in an Age of Radical U...Building a Culture of Purpose: Corporate Communication in an Age of Radical U...
Building a Culture of Purpose: Corporate Communication in an Age of Radical U...
 

More from Desiree Miloshevic

"The power of women" summit Klimerko eng Aug-2021
"The power of women" summit Klimerko eng Aug-2021"The power of women" summit Klimerko eng Aug-2021
"The power of women" summit Klimerko eng Aug-2021Desiree Miloshevic
 
Virtual school of ig economic issues_2021
Virtual school of ig  economic issues_2021Virtual school of ig  economic issues_2021
Virtual school of ig economic issues_2021Desiree Miloshevic
 
Internet of Things - IoT Webinar 2013
Internet of Things - IoT Webinar 2013Internet of Things - IoT Webinar 2013
Internet of Things - IoT Webinar 2013Desiree Miloshevic
 
Crisis of trust and accountability, Internet governance, icann50, ccNSO Desir...
Crisis of trust and accountability, Internet governance, icann50, ccNSO Desir...Crisis of trust and accountability, Internet governance, icann50, ccNSO Desir...
Crisis of trust and accountability, Internet governance, icann50, ccNSO Desir...Desiree Miloshevic
 
Multi stakeholder approach to Internet governance
Multi stakeholder approach to Internet governanceMulti stakeholder approach to Internet governance
Multi stakeholder approach to Internet governanceDesiree Miloshevic
 
Io t malta_2013 Internet of Things IoT Webinar Dec 2013 #iot @Des
Io t malta_2013 Internet of Things IoT Webinar Dec 2013 #iot @DesIo t malta_2013 Internet of Things IoT Webinar Dec 2013 #iot @Des
Io t malta_2013 Internet of Things IoT Webinar Dec 2013 #iot @DesDesiree Miloshevic
 
Internet governance fairytale desiree miloshevic
Internet governance fairytale desiree miloshevicInternet governance fairytale desiree miloshevic
Internet governance fairytale desiree miloshevicDesiree Miloshevic
 
Presentation isoc iic 2012 10-30 dzm final copy-2 copy
Presentation isoc iic 2012 10-30 dzm final copy-2 copyPresentation isoc iic 2012 10-30 dzm final copy-2 copy
Presentation isoc iic 2012 10-30 dzm final copy-2 copyDesiree Miloshevic
 

More from Desiree Miloshevic (8)

"The power of women" summit Klimerko eng Aug-2021
"The power of women" summit Klimerko eng Aug-2021"The power of women" summit Klimerko eng Aug-2021
"The power of women" summit Klimerko eng Aug-2021
 
Virtual school of ig economic issues_2021
Virtual school of ig  economic issues_2021Virtual school of ig  economic issues_2021
Virtual school of ig economic issues_2021
 
Internet of Things - IoT Webinar 2013
Internet of Things - IoT Webinar 2013Internet of Things - IoT Webinar 2013
Internet of Things - IoT Webinar 2013
 
Crisis of trust and accountability, Internet governance, icann50, ccNSO Desir...
Crisis of trust and accountability, Internet governance, icann50, ccNSO Desir...Crisis of trust and accountability, Internet governance, icann50, ccNSO Desir...
Crisis of trust and accountability, Internet governance, icann50, ccNSO Desir...
 
Multi stakeholder approach to Internet governance
Multi stakeholder approach to Internet governanceMulti stakeholder approach to Internet governance
Multi stakeholder approach to Internet governance
 
Io t malta_2013 Internet of Things IoT Webinar Dec 2013 #iot @Des
Io t malta_2013 Internet of Things IoT Webinar Dec 2013 #iot @DesIo t malta_2013 Internet of Things IoT Webinar Dec 2013 #iot @Des
Io t malta_2013 Internet of Things IoT Webinar Dec 2013 #iot @Des
 
Internet governance fairytale desiree miloshevic
Internet governance fairytale desiree miloshevicInternet governance fairytale desiree miloshevic
Internet governance fairytale desiree miloshevic
 
Presentation isoc iic 2012 10-30 dzm final copy-2 copy
Presentation isoc iic 2012 10-30 dzm final copy-2 copyPresentation isoc iic 2012 10-30 dzm final copy-2 copy
Presentation isoc iic 2012 10-30 dzm final copy-2 copy
 

Recently uploaded

Quality by design.. ppt for RA (1ST SEM
Quality by design.. ppt for  RA (1ST SEMQuality by design.. ppt for  RA (1ST SEM
Quality by design.. ppt for RA (1ST SEMCharmi13
 
Chizaram's Women Tech Makers Deck. .pptx
Chizaram's Women Tech Makers Deck.  .pptxChizaram's Women Tech Makers Deck.  .pptx
Chizaram's Women Tech Makers Deck. .pptxogubuikealex
 
The Ten Facts About People With Autism Presentation
The Ten Facts About People With Autism PresentationThe Ten Facts About People With Autism Presentation
The Ten Facts About People With Autism PresentationNathan Young
 
THE COUNTRY WHO SOLVED THE WORLD_HOW CHINA LAUNCHED THE CIVILIZATION REVOLUTI...
THE COUNTRY WHO SOLVED THE WORLD_HOW CHINA LAUNCHED THE CIVILIZATION REVOLUTI...THE COUNTRY WHO SOLVED THE WORLD_HOW CHINA LAUNCHED THE CIVILIZATION REVOLUTI...
THE COUNTRY WHO SOLVED THE WORLD_HOW CHINA LAUNCHED THE CIVILIZATION REVOLUTI...漢銘 謝
 
Dutch Power - 26 maart 2024 - Henk Kras - Circular Plastics
Dutch Power - 26 maart 2024 - Henk Kras - Circular PlasticsDutch Power - 26 maart 2024 - Henk Kras - Circular Plastics
Dutch Power - 26 maart 2024 - Henk Kras - Circular PlasticsDutch Power
 
The 3rd Intl. Workshop on NL-based Software Engineering
The 3rd Intl. Workshop on NL-based Software EngineeringThe 3rd Intl. Workshop on NL-based Software Engineering
The 3rd Intl. Workshop on NL-based Software EngineeringSebastiano Panichella
 
Early Modern Spain. All about this period
Early Modern Spain. All about this periodEarly Modern Spain. All about this period
Early Modern Spain. All about this periodSaraIsabelJimenez
 
Engaging Eid Ul Fitr Presentation for Kindergartners.pptx
Engaging Eid Ul Fitr Presentation for Kindergartners.pptxEngaging Eid Ul Fitr Presentation for Kindergartners.pptx
Engaging Eid Ul Fitr Presentation for Kindergartners.pptxAsifArshad8
 
SaaStr Workshop Wednesday w/ Kyle Norton, Owner.com
SaaStr Workshop Wednesday w/ Kyle Norton, Owner.comSaaStr Workshop Wednesday w/ Kyle Norton, Owner.com
SaaStr Workshop Wednesday w/ Kyle Norton, Owner.comsaastr
 
RACHEL-ANN M. TENIBRO PRODUCT RESEARCH PRESENTATION
RACHEL-ANN M. TENIBRO PRODUCT RESEARCH PRESENTATIONRACHEL-ANN M. TENIBRO PRODUCT RESEARCH PRESENTATION
RACHEL-ANN M. TENIBRO PRODUCT RESEARCH PRESENTATIONRachelAnnTenibroAmaz
 
PHYSICS PROJECT BY MSC - NANOTECHNOLOGY
PHYSICS PROJECT BY MSC  - NANOTECHNOLOGYPHYSICS PROJECT BY MSC  - NANOTECHNOLOGY
PHYSICS PROJECT BY MSC - NANOTECHNOLOGYpruthirajnayak525
 
Event 4 Introduction to Open Source.pptx
Event 4 Introduction to Open Source.pptxEvent 4 Introduction to Open Source.pptx
Event 4 Introduction to Open Source.pptxaryanv1753
 
PAG-UNLAD NG EKONOMIYA na dapat isaalang alang sa pag-aaral.
PAG-UNLAD NG EKONOMIYA na dapat isaalang alang sa pag-aaral.PAG-UNLAD NG EKONOMIYA na dapat isaalang alang sa pag-aaral.
PAG-UNLAD NG EKONOMIYA na dapat isaalang alang sa pag-aaral.KathleenAnnCordero2
 
SBFT Tool Competition 2024 -- Python Test Case Generation Track
SBFT Tool Competition 2024 -- Python Test Case Generation TrackSBFT Tool Competition 2024 -- Python Test Case Generation Track
SBFT Tool Competition 2024 -- Python Test Case Generation TrackSebastiano Panichella
 
Work Remotely with Confluence ACE 2.pptx
Work Remotely with Confluence ACE 2.pptxWork Remotely with Confluence ACE 2.pptx
Work Remotely with Confluence ACE 2.pptxmavinoikein
 
Call Girls In Aerocity 🤳 Call Us +919599264170
Call Girls In Aerocity 🤳 Call Us +919599264170Call Girls In Aerocity 🤳 Call Us +919599264170
Call Girls In Aerocity 🤳 Call Us +919599264170Escort Service
 
Genshin Impact PPT Template by EaTemp.pptx
Genshin Impact PPT Template by EaTemp.pptxGenshin Impact PPT Template by EaTemp.pptx
Genshin Impact PPT Template by EaTemp.pptxJohnree4
 
Mathan flower ppt.pptx slide orchids ✨🌸
Mathan flower ppt.pptx slide orchids ✨🌸Mathan flower ppt.pptx slide orchids ✨🌸
Mathan flower ppt.pptx slide orchids ✨🌸mathanramanathan2005
 
DGT @ CTAC 2024 Valencia: Most crucial invest to digitalisation_Sven Zoelle_v...
DGT @ CTAC 2024 Valencia: Most crucial invest to digitalisation_Sven Zoelle_v...DGT @ CTAC 2024 Valencia: Most crucial invest to digitalisation_Sven Zoelle_v...
DGT @ CTAC 2024 Valencia: Most crucial invest to digitalisation_Sven Zoelle_v...Henrik Hanke
 
miladyskindiseases-200705210221 2.!!pptx
miladyskindiseases-200705210221 2.!!pptxmiladyskindiseases-200705210221 2.!!pptx
miladyskindiseases-200705210221 2.!!pptxCarrieButtitta
 

Recently uploaded (20)

Quality by design.. ppt for RA (1ST SEM
Quality by design.. ppt for  RA (1ST SEMQuality by design.. ppt for  RA (1ST SEM
Quality by design.. ppt for RA (1ST SEM
 
Chizaram's Women Tech Makers Deck. .pptx
Chizaram's Women Tech Makers Deck.  .pptxChizaram's Women Tech Makers Deck.  .pptx
Chizaram's Women Tech Makers Deck. .pptx
 
The Ten Facts About People With Autism Presentation
The Ten Facts About People With Autism PresentationThe Ten Facts About People With Autism Presentation
The Ten Facts About People With Autism Presentation
 
THE COUNTRY WHO SOLVED THE WORLD_HOW CHINA LAUNCHED THE CIVILIZATION REVOLUTI...
THE COUNTRY WHO SOLVED THE WORLD_HOW CHINA LAUNCHED THE CIVILIZATION REVOLUTI...THE COUNTRY WHO SOLVED THE WORLD_HOW CHINA LAUNCHED THE CIVILIZATION REVOLUTI...
THE COUNTRY WHO SOLVED THE WORLD_HOW CHINA LAUNCHED THE CIVILIZATION REVOLUTI...
 
Dutch Power - 26 maart 2024 - Henk Kras - Circular Plastics
Dutch Power - 26 maart 2024 - Henk Kras - Circular PlasticsDutch Power - 26 maart 2024 - Henk Kras - Circular Plastics
Dutch Power - 26 maart 2024 - Henk Kras - Circular Plastics
 
The 3rd Intl. Workshop on NL-based Software Engineering
The 3rd Intl. Workshop on NL-based Software EngineeringThe 3rd Intl. Workshop on NL-based Software Engineering
The 3rd Intl. Workshop on NL-based Software Engineering
 
Early Modern Spain. All about this period
Early Modern Spain. All about this periodEarly Modern Spain. All about this period
Early Modern Spain. All about this period
 
Engaging Eid Ul Fitr Presentation for Kindergartners.pptx
Engaging Eid Ul Fitr Presentation for Kindergartners.pptxEngaging Eid Ul Fitr Presentation for Kindergartners.pptx
Engaging Eid Ul Fitr Presentation for Kindergartners.pptx
 
SaaStr Workshop Wednesday w/ Kyle Norton, Owner.com
SaaStr Workshop Wednesday w/ Kyle Norton, Owner.comSaaStr Workshop Wednesday w/ Kyle Norton, Owner.com
SaaStr Workshop Wednesday w/ Kyle Norton, Owner.com
 
RACHEL-ANN M. TENIBRO PRODUCT RESEARCH PRESENTATION
RACHEL-ANN M. TENIBRO PRODUCT RESEARCH PRESENTATIONRACHEL-ANN M. TENIBRO PRODUCT RESEARCH PRESENTATION
RACHEL-ANN M. TENIBRO PRODUCT RESEARCH PRESENTATION
 
PHYSICS PROJECT BY MSC - NANOTECHNOLOGY
PHYSICS PROJECT BY MSC  - NANOTECHNOLOGYPHYSICS PROJECT BY MSC  - NANOTECHNOLOGY
PHYSICS PROJECT BY MSC - NANOTECHNOLOGY
 
Event 4 Introduction to Open Source.pptx
Event 4 Introduction to Open Source.pptxEvent 4 Introduction to Open Source.pptx
Event 4 Introduction to Open Source.pptx
 
PAG-UNLAD NG EKONOMIYA na dapat isaalang alang sa pag-aaral.
PAG-UNLAD NG EKONOMIYA na dapat isaalang alang sa pag-aaral.PAG-UNLAD NG EKONOMIYA na dapat isaalang alang sa pag-aaral.
PAG-UNLAD NG EKONOMIYA na dapat isaalang alang sa pag-aaral.
 
SBFT Tool Competition 2024 -- Python Test Case Generation Track
SBFT Tool Competition 2024 -- Python Test Case Generation TrackSBFT Tool Competition 2024 -- Python Test Case Generation Track
SBFT Tool Competition 2024 -- Python Test Case Generation Track
 
Work Remotely with Confluence ACE 2.pptx
Work Remotely with Confluence ACE 2.pptxWork Remotely with Confluence ACE 2.pptx
Work Remotely with Confluence ACE 2.pptx
 
Call Girls In Aerocity 🤳 Call Us +919599264170
Call Girls In Aerocity 🤳 Call Us +919599264170Call Girls In Aerocity 🤳 Call Us +919599264170
Call Girls In Aerocity 🤳 Call Us +919599264170
 
Genshin Impact PPT Template by EaTemp.pptx
Genshin Impact PPT Template by EaTemp.pptxGenshin Impact PPT Template by EaTemp.pptx
Genshin Impact PPT Template by EaTemp.pptx
 
Mathan flower ppt.pptx slide orchids ✨🌸
Mathan flower ppt.pptx slide orchids ✨🌸Mathan flower ppt.pptx slide orchids ✨🌸
Mathan flower ppt.pptx slide orchids ✨🌸
 
DGT @ CTAC 2024 Valencia: Most crucial invest to digitalisation_Sven Zoelle_v...
DGT @ CTAC 2024 Valencia: Most crucial invest to digitalisation_Sven Zoelle_v...DGT @ CTAC 2024 Valencia: Most crucial invest to digitalisation_Sven Zoelle_v...
DGT @ CTAC 2024 Valencia: Most crucial invest to digitalisation_Sven Zoelle_v...
 
miladyskindiseases-200705210221 2.!!pptx
miladyskindiseases-200705210221 2.!!pptxmiladyskindiseases-200705210221 2.!!pptx
miladyskindiseases-200705210221 2.!!pptx
 

Webinar The Role of Trust in Digital policy 2016

  • 1. D E S I R E E M I L O S H E V I C D I P L O A L U M N I T U E S D A Y , J U L Y 1 8 T H 2 0 1 6 WEBINAR ON THE ROLE OF TRUST IN DIGITAL POLICY CASE STUDY: APPLIED ETHICS IN IG INSTITUTIONS DEALING WITH GLOBAL RESOURCES
  • 2. AGENDA • Trust etymology • Trust vs trustworthiness • Why is there so much focus on trust? • Trust concepts and frameworks • Applied ethics case study – data • Role of Trust for Digital Policy? • Can users’ trust be restored? • What are stakeholders’ roles? • Q&A
  • 3. ETYMOLOGY OF WORD TRUST • Origin Old Norse –> traustr –> traust –> treysta: strong -> Trust - Middle English • C 1200, "reliance on the veracity, integrity, or other virtues of someone or something; religious faith," from Old Norse traust "help, confidence, protection, support," from Proto-Germanic abstract noun *traustam (source also of Old Frisian trast, Dutch troost "comfort, consolation," Old High German trost "trust, …Gothic trausti "agreement, alliance"
  • 5. TRUST VS TRUSTWORTHINESS • Research into the roles of trust in our society broad range of often conflicting theories. Some theorists maintain that trust is a social virtue that cannot be reduced to strategic self-interest; trusting another person is ultimately a rational calculation based on information about that person and his or her incentives and motivations. • our trust in persons whom we believe to have strong reasons* to act in our best interests. “We are correct when we assume that the main incentive of those whom we trust is to maintain a relationship with us— whether it be for reasons of economic benefit or for love and friendship. “I trust you to be trustworthy – type of trust we place in individuals or institutions”
  • 6. TRUST VS TRUSTWORTHINESS • Hardin also makes an important differentiation between the trust and trustworthiness (Hardin, 2006)explaining that 1. trust is a positive belief that does not need to be proven 2. whereas trustworthiness is an earned quality, representing someone reliable, proven and honest
  • 7. WHY IS TRUST THE HOTTEST SUBJECT IN IG? • After Snowden revelations, there is a growing anxiety among Internet users (See: Desiree Miloshevic, Crisis of Trust, Crisis of Accountability 24 june14- en.pdf) • Safety and Privacy of citizens is at stake, 45% are changing the way to use the Internet • Trust is on top of the mind of all users but also government policy • “We are at risk of undoing all the progress we have made on the Internet” Kathy Brown, OECD Ministerial • https://www.whitehouse.gov/blog/2012/02/24/internet-privacy-protecting- consumers-building-trust-creating-jobs • Framework of Trust: trusted networks/ technologies/ users / ecosystem See: https://www.internetsociety.org/sites/default/files/IG%20and%20Trust%20- %20BoT%20June%202016%20-%20Final-R.pdf)
  • 8. TRUST IS… Can trust be measured? Trust is a subjective matter … Trust is contextual… Need to separate normative questions of Ethics and Trust from questions coming from psychology and other sciences (e.g. individuals don’t recognize it until it’s lost) We can only study how is trust perceived to get a more objective insight What kind of perceived trust is required for digital policies?
  • 9. HOW MUCH TRUST IS THERE? Trust fell in businesses sector from 59% to 57% Non- Governmental Organisations (NGOs) from 66% to 63% Media (from 53% to 51%) between 2014 and 2015 Only trust in governments rose during this time (from 45% to 48%), but they were still perceived as the most untrustworthy form of organisation in the study. Source: The Edelman Trust Barometer 2015
  • 10. restoring USERS’ TRUST IN? • Networks (Infrastructure) Layer I • Technologies (Protocol and Application Layers: Layer II and II • Companies, on-line platforms and devices! (facebook, gmail, laptops, tablets, mobile phones, desktops ) • Cloud services, ISPs • Internet governance Institutions • National governments “Trust takes years to build, seconds to break and forever to repair.”
  • 11. TRUST AND APPLIED ETHICS ETHICS & RELATIONSHIPS NORMATIVE 1. INERNET USERS vs INTERNET USERS e.g. bullying, online violence 2. INTERNET USERS vs CORPORATIONS 3. USERS/MEMBERS vs INTERNET GOVERNANCE INSTITUTIONS e.g. USERS and DNS policies in ICANN e.g. MEMBERS OF RIRs POLITICAL PHILOSOPHY NORMATIVE RELATIONSHIP BETWEEN USERS/CITIZENS AND THE STATE - Governments e.g. Snowden revelations CORPORATIONS AND GOVERNMENTS
  • 12. IMPORTANT SEPARATION Ethical and Normative Level: How things should ideally look like with regards to trust, if we were completely rational beings? Empirical and Pshychological How things currently are with regards to perception of trust in real life, since there is always a lack of information, unrealistic beliefs and expectations, personal interests, and unequal power relations between stakeholders
  • 13. SECURITY AND TRUST – David CLARK • On July 16, 1992, Prof. David Clark articulated what would become the creed of the Internet engineering community. He was giving a presentation A Cloudy Crystal Ball: A Vision into the Future at the IETF. It was era of turmoil and uncertainty as the privatization of the Internet (the transformation of the Internet from NSFNET to commercial networks) was in its infancy. “We Reject: Kings, Presidents, and Voting. We Believe in: Running Code and Rough Consensus Our best success was not computing, but hooking people together! The hacks of today are the commonplace of tomorrow! Security is a CRITICAL problem! What we should do: Fix insecure services: PASSWORDS, etc. The problem is assigning the correct degree of fear to distant elephants. If we have a problem it is due to too much success.” See http://cybertelecom.blogspot.de/2016/07/1992-july-16-david-clark- articulates.html
  • 14. WHAT ARE THE ROLES OF STKHDRS? • There is no one treaty that would fix this or legislation that would solve issue of trust • Can’t just focus on technology, we need to take in law and global politics • Commercial interests have impact on the IG ecosystem not necessarily good for the Internet e.g, botnets, ISPs – slowing traffic • Commercial aspects are not apparent enough • Can we imagine a healthy development of our digital society without solving the post-Snowden challenges it brings to citizens, technology, community and governments as well?
  • 15. RIR CASE STUDY • MOST CRITICAL FOR TRUST: Members of studied IG organisations perceive the role of the board and relationship of their organisation with the wider Internet community as critical for continuing to have trust in the organisation MOST DAMAGING FOR TRUST: • a non-transparent act of an organisation. • not addressing adequately external regulatory threats • deviation from policies CONCLUSIONS: • Demand for transparency • Demand for slightly conservative business predictability • Organisation/institution - True to its core mission.