{"id":36974,"date":"2018-01-31T06:00:15","date_gmt":"2018-01-30T19:00:15","guid":{"rendered":"https:\/\/www.aspistrategist.ru\/?p=36974"},"modified":"2018-01-30T15:21:36","modified_gmt":"2018-01-30T04:21:36","slug":"securing-digital-transition","status":"publish","type":"post","link":"https:\/\/www.aspistrategist.ru\/securing-digital-transition\/","title":{"rendered":"Securing the digital transition"},"content":{"rendered":"
<\/figure>\n

Every year, the World Economic Forum publishes a Global Risks Report<\/a>, which distills the views of experts and policymakers from around the world. This year, cybersecurity is high on the list of global concerns, as well it should be. In 2017, the world witnessed a continued escalation in cyberattacks and security breaches that affected all parts of society. There is no reason to believe 2018 will be different.<\/p>\n

The implications are far-reaching. Most immediately, we must grapple with governance of<\/em> the internet as well as on<\/em> the internet. Otherwise, the opportunities afforded by digital technologies could be squandered in a regulatory and legal arms race, complete with new borders and new global tensions.<\/p>\n

But there\u2019s a broader issue: For all the speed with which we are racing into the digital age, efforts to ensure global stability are lagging far behind. In many respects, our world is still organised within a Westphalian framework. States with (mostly) recognised borders are the building blocks of the international system. Their interactions, and their willingness to share sovereignty, define the existing world order.<\/p>\n

But globalisation has gradually changed the realities on the ground. And while its force\u2014waxing and waning since the decades preceding World War I\u2014is nowadays being tempered by geopolitics, and by the impulse to slow the pace of technological change, the digital transformation will propel globalisation forward, albeit in a different form. After all, the internet\u2019s key feature is its non-territorial architecture. By breaking down traditional borders, it poses a direct challenge to the very foundation of the Westphalian order.<\/p>\n

This is a profoundly positive development, because it facilitates free expression and the cross-border exchange of goods and ideas. But, as with all human inventions, the internet can be abused, as evidenced by the rise in cybercrime, online harassment, hate speech, incitement to violence and online radicalisation.<\/p>\n

Minimising such abuses in the years ahead will require close international cooperation to establish and enforce common rules. There can be no solution in isolation, because no single government can tackle the problem on its own.<\/p>\n

Over time, an alphabet soup of organisations has emerged to bring together the technical community, businesses, governments and civil society. And bodies such as ICANN (Internet Corporation for Assigned Names and Numbers), IETF (Internet Engineering Task Force) and W3C (World Wide Web Consortium) now provide de facto governance of the internet\u2019s architecture. But governance on<\/em> the internet is far more complex. Here, the institutional landscape is both crowded and unsettled.<\/p>\n

It is crowded because numerous actors are competing to shape the normative framework of cyberspace. Many countries have multiple relevant ministries regulating online activity. Websites and online services have vastly different community guidelines and terms of service. Public- and private-sector developers determine the design of the internet\u2019s changing infrastructure. And numerous civil-society groups are proposing their own sets of cyber principles, while international organisations attempt to develop multilateral agreements.<\/p>\n

The landscape remains unsettled because intergovernmental cooperation has largely stalled, owing to conflicting priorities among countries. Making matters worse, there are still too few dedicated spaces for different stakeholders to interact and devise operational solutions.<\/p>\n

In the absence of mutually agreed frameworks, governments will tend to adopt short-term unilateral measures\u2014mandatory data localisation, excessive content restrictions, intrusive surveillance\u2014to address immediate concerns, or as a response to domestic political pressure. But by doing so, they could fuel a dynamic that heightens, rather than minimises, international tensions.<\/p>\n

Digital governance touches on everything from cybersecurity to the economy to human rights, and uncertainty about which laws apply in different jurisdictions weakens enforcement in all of them, leaving everyone worse off. Moreover, measures to address one dimension can easily affect the others, which means that uncoordinated and rash policy decisions can have negative consequences across the board.<\/p>\n

When I had the honour of chairing the Global Commission on Internet Governance<\/a>, our 2016 report<\/a> highlighted these risks, and called for \u2018a new social compact\u2019 to ensure that the internet of the future will be accessible, inclusive, secure and trustworthy.<\/p>\n

Progress since then has been limited. Because efforts at the United Nations to establish global cyber rules have reached an impasse, alternative initiatives will have to drive the process forward.<\/p>\n

Fortunately, the Global Commission on the Stability of Cyberspace recently issued an important \u2018Call to protect the public core of the internet<\/a>\u2019. And the upcoming Global Internet and Jurisdiction Conference<\/a> in Ottawa will provide another valuable opportunity for policymakers to continue working towards solutions.<\/p>\n

Such technical and legalistic proceedings are essential for shaping the global transition from the industrial to the digital era. To avoid a legal arms race, policymakers will need to develop a smart approach to a variety of tricky issues, from mutual assistance frameworks for investigations to the role of domain-name administrators and service providers in addressing abusive speech online.<\/p>\n

Achieving policy coherence across jurisdictions should be a top priority. Doing so will require direct, sustained interactions among all stakeholders. Only then can we create a framework to preserve the cross-border nature of the internet, protect human rights, fight abuse and sustain a truly global digital economy.<\/p>\n

As Kofi Annan<\/a> said<\/a> back in 2004, \u2018In managing, promoting and protecting [the internet\u2019s] presence in our lives, we need to be no less creative than those who invented it.\u2019 Westphalia is behind us. What comes next is up to us.<\/p>\n","protected":false},"excerpt":{"rendered":"

Every year, the World Economic Forum publishes a Global Risks Report, which distills the views of experts and policymakers from around the world. This year, cybersecurity is high on the list of global concerns, as …<\/p>\n","protected":false},"author":527,"featured_media":36979,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_mi_skip_tracking":false,"footnotes":""},"categories":[1],"tags":[95,162],"class_list":["post-36974","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-general","tag-cyber-security","tag-governance"],"acf":[],"yoast_head":"\nSecuring the digital transition | The Strategist<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.aspistrategist.ru\/securing-digital-transition\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Securing the digital transition | The Strategist\" \/>\n<meta property=\"og:description\" content=\"Every year, the World Economic Forum publishes a Global Risks Report, which distills the views of experts and policymakers from around the world. This year, cybersecurity is high on the list of global concerns, as ...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.aspistrategist.ru\/securing-digital-transition\/\" \/>\n<meta property=\"og:site_name\" content=\"The Strategist\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/ASPI.org\" \/>\n<meta property=\"article:published_time\" content=\"2018-01-30T19:00:15+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2018-01-30T04:21:36+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2018\/01\/16042227002_1d00e0771d_z.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"640\" \/>\n\t<meta property=\"og:image:height\" content=\"527\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Carl Bildt\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@ASPI_org\" \/>\n<meta name=\"twitter:site\" content=\"@ASPI_org\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Carl Bildt\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.aspistrategist.ru\/#website\",\"url\":\"https:\/\/www.aspistrategist.ru\/\",\"name\":\"The Strategist\",\"description\":\"ASPI's analysis and commentary site\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.aspistrategist.ru\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-AU\"},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-AU\",\"@id\":\"https:\/\/www.aspistrategist.ru\/securing-digital-transition\/#primaryimage\",\"url\":\"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2018\/01\/16042227002_1d00e0771d_z.jpg\",\"contentUrl\":\"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2018\/01\/16042227002_1d00e0771d_z.jpg\",\"width\":640,\"height\":527},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.aspistrategist.ru\/securing-digital-transition\/\",\"url\":\"https:\/\/www.aspistrategist.ru\/securing-digital-transition\/\",\"name\":\"Securing the digital transition | The Strategist\",\"isPartOf\":{\"@id\":\"https:\/\/www.aspistrategist.ru\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.aspistrategist.ru\/securing-digital-transition\/#primaryimage\"},\"datePublished\":\"2018-01-30T19:00:15+00:00\",\"dateModified\":\"2018-01-30T04:21:36+00:00\",\"author\":{\"@id\":\"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/8e6a3214e076ea44466faf875d1bc2b2\"},\"breadcrumb\":{\"@id\":\"https:\/\/www.aspistrategist.ru\/securing-digital-transition\/#breadcrumb\"},\"inLanguage\":\"en-AU\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.aspistrategist.ru\/securing-digital-transition\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.aspistrategist.ru\/securing-digital-transition\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.aspistrategist.ru\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Securing the digital transition\"}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/8e6a3214e076ea44466faf875d1bc2b2\",\"name\":\"Carl Bildt\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-AU\",\"@id\":\"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/2371f5efd9976a553bc6f1a4b16435ec?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/2371f5efd9976a553bc6f1a4b16435ec?s=96&d=mm&r=g\",\"caption\":\"Carl Bildt\"},\"url\":\"https:\/\/www.aspistrategist.ru\/author\/carl-bildt\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Securing the digital transition | The Strategist","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.aspistrategist.ru\/securing-digital-transition\/","og_locale":"en_US","og_type":"article","og_title":"Securing the digital transition | The Strategist","og_description":"Every year, the World Economic Forum publishes a Global Risks Report, which distills the views of experts and policymakers from around the world. This year, cybersecurity is high on the list of global concerns, as ...","og_url":"https:\/\/www.aspistrategist.ru\/securing-digital-transition\/","og_site_name":"The Strategist","article_publisher":"https:\/\/www.facebook.com\/ASPI.org","article_published_time":"2018-01-30T19:00:15+00:00","article_modified_time":"2018-01-30T04:21:36+00:00","og_image":[{"width":640,"height":527,"url":"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2018\/01\/16042227002_1d00e0771d_z.jpg","type":"image\/jpeg"}],"author":"Carl Bildt","twitter_card":"summary_large_image","twitter_creator":"@ASPI_org","twitter_site":"@ASPI_org","twitter_misc":{"Written by":"Carl Bildt","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebSite","@id":"https:\/\/www.aspistrategist.ru\/#website","url":"https:\/\/www.aspistrategist.ru\/","name":"The Strategist","description":"ASPI's analysis and commentary site","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.aspistrategist.ru\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-AU"},{"@type":"ImageObject","inLanguage":"en-AU","@id":"https:\/\/www.aspistrategist.ru\/securing-digital-transition\/#primaryimage","url":"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2018\/01\/16042227002_1d00e0771d_z.jpg","contentUrl":"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2018\/01\/16042227002_1d00e0771d_z.jpg","width":640,"height":527},{"@type":"WebPage","@id":"https:\/\/www.aspistrategist.ru\/securing-digital-transition\/","url":"https:\/\/www.aspistrategist.ru\/securing-digital-transition\/","name":"Securing the digital transition | The Strategist","isPartOf":{"@id":"https:\/\/www.aspistrategist.ru\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.aspistrategist.ru\/securing-digital-transition\/#primaryimage"},"datePublished":"2018-01-30T19:00:15+00:00","dateModified":"2018-01-30T04:21:36+00:00","author":{"@id":"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/8e6a3214e076ea44466faf875d1bc2b2"},"breadcrumb":{"@id":"https:\/\/www.aspistrategist.ru\/securing-digital-transition\/#breadcrumb"},"inLanguage":"en-AU","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.aspistrategist.ru\/securing-digital-transition\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.aspistrategist.ru\/securing-digital-transition\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.aspistrategist.ru\/"},{"@type":"ListItem","position":2,"name":"Securing the digital transition"}]},{"@type":"Person","@id":"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/8e6a3214e076ea44466faf875d1bc2b2","name":"Carl Bildt","image":{"@type":"ImageObject","inLanguage":"en-AU","@id":"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/2371f5efd9976a553bc6f1a4b16435ec?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/2371f5efd9976a553bc6f1a4b16435ec?s=96&d=mm&r=g","caption":"Carl Bildt"},"url":"https:\/\/www.aspistrategist.ru\/author\/carl-bildt\/"}]}},"_links":{"self":[{"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/posts\/36974"}],"collection":[{"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/users\/527"}],"replies":[{"embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/comments?post=36974"}],"version-history":[{"count":6,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/posts\/36974\/revisions"}],"predecessor-version":[{"id":36985,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/posts\/36974\/revisions\/36985"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/media\/36979"}],"wp:attachment":[{"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/media?parent=36974"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/categories?post=36974"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/tags?post=36974"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}