security and privacy

High-Level Briefing on Data Protection and Privacy for Senior Government Officials of the Maldives

The Asian and Pacific Training Centre for ICT for Development (APCICT/ESCAP), in partnership with the Ministry of Environment, Climate Change and Technology of the Republic of the Maldives, held a High-Level Briefing on Data Protection and Privacy for senior government officials on 12 October 2021.

Capacity Building Webinar on Information Security and Privacy for Pacific Countries

As the Pacific sub-region is still in the early stages of developing and improving national ICT infrastructure and cybersecurity capabilities, assistance is required in building cybersecurity capability, formulating guiding frameworks for long-term national cybersecurity and addressing information security and privacy gaps. 

Policing cybercrimes: Situating the Public Police in Networks of Security within Cyberspace

The Internet and the criminal behaviour it transforms (cybercrime) pose considerable challenges for order maintenance and law enforcement because Internet-related offending takes place within a global context while crime tends to be nationally defined. Policing cyber-crime is made all the more complex by the very nature of policing and security being networked and nodal and also because within this framework the public police play only a small part in the policing of the Internet.

Global Law and Global Challenges - Cyber Warfare: Law and Policy Proposals for U.S. and Global Governance

Cybersecurity is the newest and most unique national security issue of the twenty-first century. Cyber warfare uses computer technologies as defensive and offensive weapons in international relations. Until now, there has been no national debate within the United States over the concept of cyber warfare; neither its meaning nor the international laws that govern this concept have been discussed at any length, and nor have the domestic rules regarding it.

The Dangers of Surveillance

This article seeks to explain the harms of government surveillance. Drawing on law, history, literature, and the work of scholars in the emerging interdisciplinary field of “surveillance studies,” the article offers an account of what those harms are and why they matter. The article moves beyond the vagueness of current theories of surveillance to articulate a more coherent understanding and a more workable approach. At the level of theory, the paper explains why and when surveillance is particularly dangerous and when it is not.

Caught in the cloud Privacy, encryption, and government back doors in the web 2.0 era

Over the last few years, consumers, corporations and governments have rushed to move their data to “the cloud,” adopting web-based applications and storage solutions provided by companies that include Amazon, Google, Microsoft and Yahoo. Cloud computing services provide consumers with vast amounts of cheap, redundant storage and allow them to instantly access their data from a web-connected computer anywhere in the world. Unfortunately the shift to cloud computing needlessly exposes users to privacy invasion and fraud by hackers.