Научная статья на тему 'Internet Governance: Trends and realities. Part 2'

Internet Governance: Trends and realities. Part 2 Текст научной статьи по специальности «СМИ (медиа) и массовые коммуникации»

CC BY-NC-ND
331
128
i Надоели баннеры? Вы всегда можете отключить рекламу.
Ключевые слова
ИНТЕРНЕТ / INTERNET / УПРАВЛЕНИЕ ИНТЕРНЕТОМ / INTERNET GOVERNANCE / ГЛОБАЛЬНОЕ УПРАВЛЕНИЕ / GLOBAL GOVERNANCE

Аннотация научной статьи по СМИ (медиа) и массовым коммуникациям, автор научной работы — Major Peter

Internet Governance is one of the global governance issues that emerged at the end of the 1990s. As the Internet is taking on an important role in every aspect of our lives, it has been recognized that its governance needs to involve all stakeholders and institutions to allow global access, foster development and contribute to the global economy, education, information. Security and privacy concerns should also be addressed in the policy dialogues. This paper outlines the global nature of the Internet Governance. It argues that in addition to dialogues and negotiations formal approaches should be explored to handle global issues in a global way. In its conclusion a mechanism is proposed to address Internet related global public policy issues. The views expressed in this paper are solely those of the author in his private capacity and do not in any way represent the views of the UN Commission on Science and Technology for Development.

i Надоели баннеры? Вы всегда можете отключить рекламу.
iНе можете найти то, что вам нужно? Попробуйте сервис подбора литературы.
i Надоели баннеры? Вы всегда можете отключить рекламу.

Текст научной работы на тему «Internet Governance: Trends and realities. Part 2»

Internet Governance: Trends and realities. Part 2

Peter Major

Vice-Chairman

United Nations Commission on Science and Technology for Development (CSTD) Address: Palais des Nations, 8-14, Av. de la Paix, 1211 Geneva 10, Switzerland E-mail: pmajor@bluewin.ch

Abstract

Internet Governance is one of the global governance issues that emerged at the end of the 1990s. As the Internet is taking on an important role in every aspect of our lives, it has been recognized that its governance needs to involve all stakeholders and institutions to allow global access, foster development and contribute to the global economy, education, information. Security and privacy concerns should also be addressed in the policy dialogues. This paper outlines the global nature of the Internet Governance. It argues that in addition to dialogues and negotiations formal approaches should be explored to handle global issues in a global way. In its conclusion a mechanism is proposed to address Internet related global public policy issues.

The views expressed in this paper are solely those of the author in his private capacity and do not in any way represent the views of the UN Commission on Science and Technology for Development.

Key words: Internet, Internet Governance, global governance.

Citation: Major P. (2016) Internet Governance: Trends and realities. Part 2. Business Informatics, no. 1 (35), pp. 20-25. DOI: 10.17323/1998-0663.2016.1.20.25.

5. Regional and national Internet Governance approaches

The Internet evolved as a project with the participation of the US government and the technical community/academia. Subsequently business took a great interest in the Internet and contributed to its success through massive investments to expand the infrastructure and to create an environment for applications. With the rapid evolution of the Internet, civil society and international organizations got involved on issues as human rights, consumer protection, intellectual property rights, as well as privacy and security issues. Involvement of governments has been quite visible since the second phase of WSIS.

The Tunis Agenda ofWSIS left an ambiguity in the Internet Governance approaches: on one hand, it evoked the multi-stakeholder governance model, but the notion of enhanced cooperation implicitly encouraged the government lead approach. Instances of the first model can be found in many organizations.

Internet Governance on the international level has evolved as a bottom-up, business-led multi-stakeholder process with the involvement of governments, the technical community, academia, civil society and international organizations. On the national level, most countries advocate the multi-stakeholder model. In practice, Internet governance issues frequently reflect political system-specific characteristics. In the shaping of national IG policies, most governments try to have a coordinated strategy, usually elaborated by the ministry of economic development, the ministry of information and communication technologies and the ministry of foreign affairs. However, in the absence of clear leadership, there may be contradictory statements and initiatives in some countries. The main concerns for internet- related national policy: national sovereignty, security, human rights, surveillance, privacy, cyber espionage, censorship, etc.

Many countries consider the Internet to be borderless space where everyone should be able to exercise rights online that are granted by national legislation. It is thought

that this approach has fostered the evolution of the Internet and it should be adopted by all. Other countries view the Internet as an extension of the respective national physical space and consider that exercising national sovereignty over it is of primary importance. Yet another group of countries try to follow a policy in between the two approaches. Some issues such as managing infrastructure and critical resources have always been among the main concerns of countries not involved directly in the global management of these resources. Access, content, surveillance and combating cyber-crime are closely related to human rights and privacy, as well as to security. In this context, it is important to note that in July 2014 the UN Human Rights Council in its resolution cosponsored by Brazil, Nigeria, Sweden, Turkey, Tunisia and the United States reaffirmed its earlier resolution that 'the same rights that people have offline must also be protected online, in particular the freedom of expression" [17]. The resolution recognizes that the global and open nature of the Internet is a driving force in accelerating progress towards development, including the implementation of the right to education. It also calls upon States to address the digital divide and to promote digital literacy and access to information on the Internet. The resolution takes note of the need for human rights to underpin Internet governance, and it affirms the importance of the global, open and interoperable nature of the Internet. It calls on States to formulate, through transparent and inclusive processes, national Internet-related public policies. Universal access and enjoyment of human rights must be central to those policies. The resolution recognizes that respect for the rights to freedom of expression and privacy is key to building confidence and trust in the Internet, and that any attempt by States to address security concerns on the Internet must be in accordance with international human rights obligations. Critically, the resolution states this must be done through democratic, transparent institutions, based on the rule of law.

Internet Governance is deeply embedded in national politics. The multi-stakeholder approach to Internet Governance is the generally accepted principle. Surveillance, censorship, limiting access and curtailing human rights are justified by governments with the emerging security concerns, cyber threats and cyber crime. Significant differences in national approaches, also articulated in international discussions, may prevent consensus in open negotiations.

In international discussions, like-minded countries emerge as a group emphasizing particular points from the Tunis Agenda. The US, UK, France other members of the EU, Australia, Brazil, Japan, South Korea, etc. are unconditional advocates of the multi-stakeholder Internet governance and consider it to be the prerequisite of in-

novation, competition and the freedoms on the Internet. Russia, China, Iran, Saudi Arabia and others recognize the importance of the multi-stakeholder approach on the international level, but their priorities are national sovereignty, security and social order.

Table 2 summarizes some initiatives for cooperation on cyber security issues on the international and regional levels.

Table 2.

Instruments and scopes of international cooperation on cyber security

Instrument Scope of international cooperation provisions

Draft African Union Convention [18] Cybercrime

Commonwealth of Independent States (CIS) Agreement [19] Offenses relating to computer information

Council of Europe (CoE) Cybercrime Convention [20] Criminal offenses related to computer systems and data collection of evidence in electronic form of a criminal Offense

League of Arab States Convention [21] Information and information technology offences Gathering of electronic evidence in offenses

Shanghai Cooperation Organization Agreement [22] International information security

There are diverging views expressed in these documents, but commonalities found in the texts may offer a way forward.

In February 2015, the US Federal Communication Commission (FCC) accepted so-called net neutrality regulations to reclassify Internet Service Providers (ISPs) as common carriers, regulating them under Title II of the Communications Act, the same statute that governs telephone companies. Internet providers will be common carriers in their relationships with home Internet and mobile broadband customers; they will also be common carriers in their relationships with companies that deliver content to subscribers over the networks operated by ISPs. That includes online content providers. Broadband providers may not block access to legal content, applications, services, or non-harmful devices; they may not impair or degrade lawful Internet traffic on the basis of content, applications, services, or non-harmful devices and may not favor some lawful Internet traffic over other lawful traffic in exchange for a consideration. This rule also bans ISPs from prioritizing content and services of their affiliates. There is no ban on data caps (limiting the transfer of a specified amount of data over a period of time), but the proposal would let the FCC intervene when caps are used to harm consumers or competitors [23]. It is anticipated that many regulators will incorporate this approach in their national policies.

Several national and regional initiatives and dialogue forums help to shape the Internet Governance policy decisions. These initiatives in most cases follow the pattern of the IGF but concentrate on national and regional issues (http://www.intgovforum.org/cms/meetings).

6. Towards a global framework

for global Internet Governance

The evolution of the Internet is very fast, but the evolution of the legal framework is much slower. In the discussions related to legal frameworks, it is assumed that the Internet is not fragmented. The Internet Governance is embedded in a multi-stakeholder approach and the legal framework needs to be harmonized. Many countries focus on human rights, data protection, privacy rights, consumer rights and intellectual property rights.

Most of the existing international treaties, conventions and agreements covering human rights were negotiated before the Internet (The Universal Declaration of Human Rights [24], UN International Covenant on Civil and Political Rights [25], UN International Covenant on Economic, Social and Cultural Rights [26], UN Convention on the Elimination of All Forms of Discrimination Against Women [27], UN Convention of the Rights of the Child [28]). They have to be analyzed with a view to extending their applicability to cyberspace.

More recent treaties and resolutions on human rights have already considered or made reference to Interne and ICTs (UN Convention on the Rights of Persons with Disabilities [29], UN Human Rights Council Resolution on the promotion, protection and enjoyment of human rights on the Internet).

Data protection and privacy rights, similarly to human rights, are considered to be very important. The primary purpose of data protection legislation is to protect individuals against possible misuse of personal data information about them held by others, to give people the right to know what information organizations hold about them, and to provide a framework for organizations handling personal data. There are international [30] and regional initiatives [31] about collecting, organizing or altering personal data; retrieving, consulting, using, storing or adapting the data; disclosing the data by transmitting, disseminating or otherwise making it available; or aligning, combining, blocking, erasing or destroying the data. During these activities, information must be fairly and lawfully processed, processed for specified purposes, appropriate, relevant and not excessive, accurate and up-to-date, not kept for longer than is necessary, processed in line with individuals' rights, secure and not transferred outside the country without adequate protection.

The UN Guidelines on Consumer Protection (UN-GCP) [32] provide a framework for governments to develop and strengthen consumer protection policies and legislation. The document adopted by the UN General Assembly in 1985 was amended in 1999. It contains the essential elements of comprehensive consumer protection, including the right to safety, the right to basic needs, the right to information, the right to consumer education, the right to redress, the right to be heard and the right to a healthy environment. The guidelines are being revised by UNCTAD.

Important, Internet related treaties: the WIPO Copyright Treaty [33] and the WIPO Performances and Phonograms Treaty [34].

The ITU International Telecommunication Regulations [35] establish general principles relating to the provision and operation of international telecoms; facilitate global interconnection and interoperability; underpin harmonious development and efficient operation of technical facilities; promote efficiency, usefulness, and availability of international telecommunication services, and treaty-level provisions are required with respect to international telecommunication networks and services. Net-neutrality regulations may have an impact on the interpretations of the International Telecommunication Regulations (ITRs) of the ITU modified in the controversial World Conference on International Telecommunications (WCIT) in Dubai, in 2012.

The ACTA - Anti-Counterfeiting Trade Agreement is an international treaty for the purpose of establishing international standards for intellectual property rights enforcement. The agreement aims to establish an international legal framework for targeting counterfeit goods, generic medicines and copyright infringement on the Internet, and would create a new governing body outside existing forums, such as the World Trade Organization, the World Intellectual Property Organization, and the United Nations. The treaty has not entered into force after worldwide protests arguing that that the 'intended benefits of this international agreement are far outweighed by the potential threats to civil liberties".

The General Agreement on Trade and Services (GATS), a treaty of the World Trade Organization (WTO), is one of the results of the 8 th round of the multilateral trade negotiations (Uruguay Round), conducted from 1986 to 1994 and signed by all member states of the WTO [36]. The GATS provides an international framework for trade and services including e-commerce, e-banking and other e-services (except government services) using the Internet. The agreement came into force in 1995 after difficult nego-

tiations. Another result of the Uruguay Round is the Agreement of the Trade Related Aspect of Intellectual Property Rights (TRIPS) [37]. This agreement sets down minimum standards of intellectual property regulations as applied to nationals of other WTO members.

Ten years after the WSIS, stakeholders are assessing the achievements and considering the possible ways forward. There are significant results in bridging the digital divide. We have to recall that almost 60% of the world's population still does not have access to the Internet. We have to face a new challenge, the so-called broadband divide between developed and developing countries. There are significant results in Internet Governance: many of the proposals of the WGIG included in the Tunis Agenda have been or are being implemented. IGFs provide platforms for open discussions and contribute to better governance. It is clear, however, that global public policy issues have to be addressed using appropriate mechanisms in the UN system that are acceptable to all stakeholders. The approach may require reassessing, reviewing and if needed modifying available instruments with a view to taking into account the specific nature of the Internet. At the same time, the feasibility of using the multi-stakeholder approach should be explored and applied in Internet-related public policy issues dealt with within the UN system. In his report, the chair of the CSTD WGEC states that during the discussion on enhanced cooperation some participants proposed to create a new mechanism within the UN system mandated to deal with Internet related global public policy issues, while others argued that mechanisms already exist in the UN and in different agencies of the UN system.

To overcome the differences, the Secretariat of the UN CSTD may be tasked to help to explore the best way to deal with Internet related public policy issues within the UN system through performing clearing-house functions with the close cooperation of other UN agencies and other stakeholders. The Secretariat shall identify problems and issues, identify existing mechanism within the UN system where these problems are addressed, indicate where modification of the existing mechanism/mandate may be required and keep track of the outcome of the discussions/negotiations of the problems. In performing these functions, the Secretariat in its assessments will be helped by a voluntary, multi-stakeholder advisory group selected by each stakeholder group and nominated by the Chair of the CSTD. Global issues in general are complex and require multidisciplinary approaches.

Many methods and techniques have been developed to deal with the complexity of systems, including systems dynamics, fractals, chaos theory, the science of networks,

and complexity theory (http://www.ipsonet.org/publica-tions/open-access/policy-and-complex-systems). They provide a powerful set of tools to model and/or simulate phenomena that are characterized by their scale-free and/or small-world network structure, sensitivity to initial conditions, power-law distributions, adaptability, self-organization, feedback loops, and emergent properties. However, applying such tools on any real-world problem will require the mastery of intricacies ofboth public policy and a wide variety of discipline-specific expertise, working together to uncover principles that both transcend and complement disciplinary contributions.

There are views that application of scale-free network theory to the study of international relations, with special attention to cyber venues, may contribute to better understanding of cyberpolitics [38]. Recently attempts have been made to analyze complex mechanisms using mathematical models such as complex systems or network theory [39]. Further research is needed to explore how formal methods can be applied to global governance issues in general and to Internet Governance in particular.

Conclusion

In this paper I tried to show the complexity of global governance in general and of Internet Governance in particular. The Internet is operating based on standards elaborated through rough consensus, the first of which was published in 1969. The governance of the Internet, infrastructure, names and numbers and related issues, is handled in a multi-stakeholder approach. Significant efforts are being made to find solution to the controversies related to the management of the root zone. Discussions are being conducted about the transition of the US Government's stewardship to a multi-stakeholder arrangement with a view to meeting the target date of 30 September 2015. Governments are getting more and more involved in Internet Governance: more than 140 governments are participating in the work of the Government Advisory Committee of ICANN. They are making significant contributions to public policy discussions and give advice to the ICANN Board. GAC delegates take an important part in the discussions on the transition and the accountability of ICANN. The governance on the Internet is embedded in the national interests, policy priorities and traditions. Application of existing multilateral arrangements on issues of human rights, security, censorship, etc. need to be analyzed and reconsidered with a view to adapting them for governance on the Internet. Considerable efforts have to be made to reconcile concerns for free access, human rights, development as well as national security and sovereignty. ■

References

17. United Nations Human Rights Council (2014) Promotion and protection of all human rights, civil, political, economic, social and cultural rights, including the right to development. Resolution A/HRC/RES/26/13. Geneva. Available at: http://daccess-dds-ny.un.org/doc/UN-DOC/LTD/G14/059/67/PDF/G1405967.pdf?OpenElement (accessed 30 September 2015).

18. Economic Commission for Africa, African Union Convention (2012) Draft African Union convention on the confidence and security in cyberspace. Version 01/09/2012. Available at: http://au.int/en/sites/default/files/AU%20Convention%20EN.%20%283-9-2012%29%20 clean_0.pdf (accessed 30 September 2015).

19. Commonwealth of Independent States (2001) Agreement on cooperation in combating offences related to computer information (Commonwealth of Independent States Agreement).

20. Council of Europe (2001) Convention on cybercrime, 23 November 2001, Budapest. Available at: http://conventions.coe.int/Treaty/ Commun/QueVoulezVous.asp?CL=ENG&NT=185 (accessed 30 September 2015).

21. Arab League (2010) Arab convention on combating information technology offences. Arab League, 21 December 2010, Cairo.

22. Shanghai Cooperation Organization (2009) The agreement between the governments of state members of the Shanghai Organization of Cooperation about cooperation in the field of ensuring the international information security. Shanghai Cooperation Organization, 16 July 2009, Yekaterinburg. Available at: https://ccdcoe.org/sites/default/files/documents/SC0-090616-IISAgreementRussian.pdf (accessed 30 September 2015).

23. Brodkin J. (2015) Don't call them "utility" rules: The FCC's net neutrality regime, explained // Arstechnica.com, 05 February 2015. Available at: http://arstechnica.com/business/2015/02/dont-call-them-utility-rules-the-fccs-net-neutrality-regime-explained/ (accessed 30 September 2015).

24. United Nations (1948) The universal declaration of human rights. New York. Available at: http://www.un.org/en/documents/udhr/ (accessed 30 September 2015).

25. United Nations (1966) International covenant on civil and political rights (1st generation rights). New York. Available at: http://www.ohchr. org/en/professionalinterest/pages/ccpr.aspx (accessed 30 September 2015).

26. United Nations (1966) International covenant on economic, social and cultural rights (2ndgeneration rights). New York. Available at: http:// www.ohchr.org/EN/ProfessionalInterest/Pages/cescr.aspx (accessed 30 September 2015).

27. United Nations (1981) Convention on the elimination of all forms of discrimination against women. New York. Available at: http://www1.umn. edu/humanrts/instree/women/engl-wmn.html (accessed 30 September 2015).

28. United Nations (1989) Convention of the rights of the child. New York. Available at: http://www.un.org/cyberschoolbus/humanrights/ resources/plainchild.asp (accessed 30 September 2015).

29. United Nations (2006) Convention on the rights of persons with disabilities. New York. Available at: http://www.un.org/disabilities/conven-tion/conventionfull.shtml (accessed 30 September 2015).

30. United Nations (2013) The right to privacy in the digital age. New York. Available at: http://www.un.org/en/ga/search/view_doc. asp?symbol=A/RES/68/167 (accessed 30 September 2015).

31. European Commission (2015) Protection of personal data. Available at: http://ec.europa.eu/justice/data-protection/ (accessed 30 September 2015).

32. United Nations (1999) United Nations guidelines on consumer protection. New York. Available at: http://www.un.org/esa/sustdev/publica-tions/consumption_en.pdf (accessed 30 September 2015).

33. World Intellectual Property Organization (1996) WIPO copyright treaty. Geneva. Available at: http://www.wipo.int/treaties/en/text.jsp?file_ id=295166 (accessed 30 September 2015).

34. World Intellectual Property Organization (1996) WIPO performances and phonograms treaty. Geneva. Available at: http://www.wipo.int/ treaties/en/text.jsp?file_id=295578 (accessed 30 September 2015).

35. ITU (2012) ITU international telecommunication regulations. Dubai. Available at: http://www.itu.int/pub/S-CONF-WCIT-2012/en (accessed 30 September 2015).

36. World Trade Organization (1995) General agreement on trade and services. Available at: https://www.wto.org/English/docs_e/legal_e/26-gats.pdf (accessed 30 September 2015).

37. World Trade Organization (1994) Trade-related aspects of intellectual property Rights. Annex 1C of the Marakesh agreement astablishing the World Trade Organization. Marakesh, Morocco. Available at: https://www.wto.org/English/docs_e/legal_e/27-trips_01_e.htm (accessed 30 September 2015).

38. Choucri N. (2012) Cyberpolitics in international relations. Cambridge, MA, MIT Press.

39. Barabasi A.-L. (2015) Network science. Cambridge, UK, Cambridge University Press.

Управление Интернетом: Тенденции и реальность. Часть 2

П. Мейор

заместитель руководителя Комиссии ООН по науке и технологиям Адрес: Palais des Nations, 8-14, Av. de la Paix, 1211 Geneva 10, Switzerland E-mail: pmajor@bluewin.ch

Аннотация

Управление Интернетом представляет собой одно из направлений глобального управления, активно развивающееся с конца 1990-х годов. Поскольку Интернет играет важную роль в нашей жизни, представляется необходимым вовлечение в процессы управления всех заинтересованных лиц и институтов, а также

ИНТЕРНЕТ-ТЕХНОЛОГИИ

I способствование развитию и вкладу в мировую экономику, образование и информационное обеспечение. Вопросы информационной безопасности и конфиденциальности также должны рассматриваться в рамках обсуждения политики в области управления Интернетом. В данной статье рассматривается глобальный аспект управления Интернетом. Показано, что в дополнение к обсуждениям и переговорам должны применяться формальные подходы, позволяющие решать глобальные вопросы. Предлагается подход к решению вопросов, связанных с глобальной политикой в области управления Интернетом.

Выводы и рекомендации, приведенные в статье, отражают исключительно личное мнение автора и не должны трактоваться в качестве официальной позиции Комиссии ООН по науке и технологиям.

Ключевые слова: Интернет, управление Интернетом, глобальное управление.

Цитирование: Major P. Internet Governance: Trends and realities. Part 2 // Business Informatics. 2016. No. 1 (35). P. 20—25.

DOI: 10.17323/1998-0663.2016.1.20.25.

Литература

17. Promotion and protection of all human rights, civil, political, economic, social and cultural rights, including the right to development. Resolution A/HRC/RES/26/13. Geneva: United Nations Human Rights Council, 2014. [Электронный ресурс]: http://daccess-dds-ny. un.org/doc/UNDOC/LTD/G14/059/67/PDF/G1405967.pdf?OpenElement (дата обращения 30.09.2015).

18. Draft African Union convention on the confidence and security in cyberspace. Version 01/09/2012. Economic Commission for Africa, African Union Convention, 2012. [Электронный ресурс]: http://au.int/en/sites/default/ffles/AU%20Convention%20EN.%20%283-9-2012%29%20clean_0.pdf (дата обращения 30.09.2015).

19. Agreement on cooperation in combating offences related to computer information (Commonwealth of Independent States Agreement). Commonwealth of Independent States, 2001.

20. Convention on cybercrime, 23 November 2001, Budapest. Council of Europe, 2001. [Электронный ресурс]: http://conventions.coe.int/ Treaty/Commun/QueVoulezVous.asp?CL=ENG&NT=185 (дата обращения 30.09.2015).

21. Arab convention on combating information technology offences. Arab League, 21 December 2010, Cairo. Arab League, 2010.

22. The agreement between the governments of state members of the Shanghai Organization of Cooperation about cooperation in the field of ensuring the international information security. Shanghai Cooperation Organization, 16 July 2009, Yekaterinburg. Shanghai Cooperation Organization, 2009. [Электронный ресурс]: https://ccdcoe.org/sites/default/files/documents/SC0-090616-IISAgreementRussian.pdf (дата обращения 30.09.2015).

23. Brodkin J. Don't call them «utility» rules: The FCC's net neutrality regime, explained // Arstechnica.com, 05 February 2015. [Электронный ресурс]: http://arstechnica.com/business/2015/02/dont-call-them-utility-rules-the-fccs-net-neutrality-regime-explained/ (дата обращения 30.09.2015).

24. The universal declaration of human rights. New York: United Nations, 1948. [Электронный ресурс]: http://www.un.org/en/documents/ udhr/ (дата обращения 30.09.2015).

25. International covenant on civil and political rights (1st generation rights). New York: United Nations, 1966. [Электронный ресурс]: http:// www.ohchr.org/en/professionalinterest/pages/ccpr.aspx (дата обращения 30.09.2015).

26. International covenant on economic, social and cultural rights (2nd generation rights). New York: United Nations, 1966. [Электронный ресурс]: http://www.ohchr.org/EN/ProfessionalInterest/Pages/cescr.aspx (дата обращения 30.09.2015).

27. Convention on the elimination of all forms of discrimination against women. New York: United Nations, 1981. [Электронный ресурс]: http://www1.umn.edu/humanrts/instree/women/engl-wmn.html (дата обращения 30.09.2015).

28. Convention of the rights of the child. New York: United Nations, 1989. [Электронный ресурс]: http://www.un.org/cyberschoolbus/hu-manrights/resources/plainchild.asp (дата обращения 30.09.2015).

29. Convention on the rights of persons with disabilities. New York: United Nations, 2006. [Электронный ресурс]: http://www.un.org/dis-abilities/convention/conventionfull.shtml (дата обращения 30.09.2015).

30. The right to privacy in the digital age. New York: United Nations, 2013. [Электронный ресурс]: http://www.un.org/en/ga/search/view_ doc.asp?symbol=A/RES/68/167 (дата обращения 30.09.2015).

31. Protection of personal data. European Commission, 2015. [Электронный ресурс]: http://ec.europa.eu/justice/data-protection/ (дата обращения 30.09.2015).

32. United Nations guidelines on consumer protection. New York: United Nations, 1999. [Электронный ресурс]: http://www.un.org/esa/ sustdev/publications/consumption_en.pdf (дата обращения 30.09.2015).

iНе можете найти то, что вам нужно? Попробуйте сервис подбора литературы.

33. WIPO copyright treaty. Geneva: World Intellectual Property Organization, 1996. [Электронный ресурс]: http://www.wipo.int/treaties/ en/text.jsp?file_id=295166 (дата обращения 30.09.2015).

34. WIPO performances and phonograms treaty. Geneva: World Intellectual Property Organization, 1996. [Электронный ресурс]: http://ITU international telecommunication regulations. Dubai: ITU, 2012. [Электронный ресурс]: http://www.itu.int/pub/S-CONF-WCIT-2012/en (дата обращения 30.09.2015).

35. ITU international telecommunication regulations. Dubai: ITU, 2012. [Электронный ресурс]: http://www.itu.int/pub/S-CONF-WCIT-2012/en (дата обращения 30.09.2015).

36. General agreement on trade and services. World Trade Organization, 1995. [Электронный ресурс]: https://www.wto.org/English/docs_e/ legal_e/26-gats.pdf (дата обращения 30.09.2015).

37. Trade-related aspects of intellectual property Rights. Annex 1C of the Marakesh agreement astablishing the World Trade Organization. Ma-rakesh, Morocco: World Trade Organization, 1994. [Электронный ресурс]: https://www.wto.org/English/docs_e/legal_e/27-trips_01_e. htm (дата обращения 30.09.2015).

38. Choucri N. Cyberpolitics in international relations. Cambridge, MA, MIT Press, 2012.

39. Barabasi A.-L. Network science. Cambridge, UK, Cambridge University Press, 2015.

БИЗНЕС-ИНФОРМАТИКА № 1(35) - 2016

i Надоели баннеры? Вы всегда можете отключить рекламу.