The document discusses the results of a survey conducted by the Internet Society Asia-Pacific on internet policy issues in the region. Some of the key findings include:
- Over 1,700 stakeholders from South Asia, Southeast Asia, East Asia, and Australia/New Zealand participated in the survey.
- Major areas of concern included internet access, cybersecurity, connectivity, privacy, and data protection. Younger respondents and those from technical backgrounds were most concerned with cybersecurity.
- Most respondents felt they had little opportunity to participate in policymaking and that their online privacy is not sufficiently protected. Only a small portion believed government security policies fully addressed their online concerns.
Case study fishbowl on cyber security by Shreedeep Rayamajhi
1. A Case Study Cyber Security
Fishbowl
Presentation
Shreedeep Rayamajhi
ICT4D Consultant
Rayznews | Learn Internet Governance
2. Introduction to Fishbowl
The “fishbowl” is a teaching strategy that
helps student’s practice being
contributors and listeners in a defined
environment where they can speak and
collaborate in a true multistakeholder
way.
3. Advantages of Fishbowl Discussion
• To address multiple number of people for group discussion
• To create dynamic group involvement and active participation
• To discuss controversial topics (less productive for heavily didactical
content)
• To observe, analyze and learn from another group’s thinking
process (outer circle)
• To make people understand and give importance for others ideas
and perspectives
• A dynamic alternative method for traditional debate and discussion
process
• To increase participation in the group
4. First Stage
Fishbowl Case Study Discussion (problem session)
There are two circles.The inner circle is the discussion circle and the outer
circle is the listeners circle
The Inner circle will contain 4 to 5 chairs or more where one or two chair will be
empty as per the participants number
At all times any participant from outer circle can occupy the empty chair and
join the inner fishbowl.When this happens, an existing member of the inner
fishbowl must voluntarily leave the fishbowl and free the inner circle chair
Within the stipulated time they have to come up with the list of summary of
challenges and issues
There will be one person appointed to record the discussion
All the participants have to follow the rules and have to be disciplined
5. Second Stage
Collaborative Decision
With the list of issues and challenges coming down from the first stage, the
inner-circle will against starts the discussion but this time for solution
Same rules apply, at all times any participant from outer circle can occupy
the empty chair and join the inner circle fishbowl. When this happens, an
existing member of the inner fishbowl must voluntarily leave the fishbowl
and free the inner circle chair
Within the stipulated time they have to come up with the list of decisions
There will be one person appointed to record the discussion
All the participants have to follow the rules and have to be disciplined
6. Rules & Regulation of Fishbowl
There would be two circles in the fishbowl (inner –speaking , outer listening )
There would always be a chair empty in the inner first circle
The first circle would be responsible for the discussion on the case study presentation
A person would be appointed for recording the discussion and points
The person from the outer circle feels one person is talking or speaking too much the
outer circle person can tap and get the person’s place
Please be very precise and to the point
The second decision session will be based on the issues and problems of the first
session
8. Internet Society Asia-Pacific (APAC) Regional Bureau conducted a research on
Policy Issues in Asia-Pacific as an annual, cross-sectional study of the attitudes
of Internet stakeholders toward topical Internet policy concerns in the
region.
The survey was conducted online using the Survey Monkey platform, and ran
from 25 March to 25 April 2016.
9. Total Participants
1,770 individual stakeholders
Age
some 52% were
between 15-34 years old, 28% were aged 35-44, and the
remaining 20% were 45 years or older.Twenty-seven
percent were affiliated with the private sector, 22% with
academia, 21% with the technical community, 16% with
civil society and 14% with government.
Demographics
South Asia (67%), Southeast Asia (17%); East Asia (6%);
and Australia, New Zealand and the Pacific Islands (10%).
Some 86% of the total number of respondents were male.
10. Key findings
Major areas of concern
In the past year, more than
half of respondents
followed news around
Internet access (65%),
cybersecurity (62%),
connectivity (55%), privacy
(55%), data protection
(55%) and
cybercrime (52%).
11. • Cybersecurity was priority for those between 15 to 34 years old the
government sector and the technical community.
• Civil Society was much more concerned with freedom of expression
(55%), net neutrality (47%) and censorship (50%).
• Areas related to online content control were likewise high in the Pacific,
where half or close to half of respondents kept an eye on filtering (50%),
freedom of expression (49%) and net neutrality (44%) issues.
• Government surveillance, meanwhile, was tracked by 42% of those 45
years old or above.
12. Highlights of Survey
• Access was the most mentioned Internet policy concern in the past year
• Cybersecurity was the top issue that stakeholders felt needed attention
from policymakers
• 77% of respondents did not have an opportunity to participate in
policymaking for the Internet in the past year
• 59% felt their privacy is not sufficiently protected when they use the
Internet
• Only 9% thought that government policies on Internet security fully
reflected their own online concerns
• 66% believed that government policies on Internet security are not fully
appropriate to the real risks encountered online
13. Challenges
•Data protection, along with reliable access,
were cited as the two most crucial factors for
building trust in the Internet.
•Online security Policy were largely compatible
with human and civil rights, but did not extend
to privacy online.