03.07.2016 Views

Authorized Authorized

eERqs

eERqs

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

222 WORLD DEVELOPMENT REPORT 2016<br />

Map 4.1 Evidence of internet content filtering<br />

Europe Inset<br />

Level of political content filtering<br />

No evidence<br />

Selective<br />

Substantial<br />

Pervasive<br />

No data available<br />

Caribbean Inset<br />

Source: Open Network Initiative, http://map.opennet.net/filtering-pol.html. Data at http://bit.do/WDR2016-Map4_1.<br />

IBRD 41702<br />

traffic to its products—China, the Democratic Republic<br />

of Congo, the Islamic Republic of Iran, Pakistan,<br />

Tajikistan, and Turkey. 94 Excessive restrictions on use<br />

can increase the costs of doing business, particularly<br />

for international businesses, which may be dissuaded<br />

from investing. 95 In addition, inconsistent and complex<br />

content filtering requirements can make it difficult<br />

to offer internet services and applications that<br />

are global in nature. Policy makers in governments<br />

that impose such restrictions have to choose between<br />

the relative perceived advantages of controlling certain<br />

kinds of information and the economic costs,<br />

including lost opportunities, of maintaining such<br />

systems.<br />

Cybersecurity: Trust in the internet<br />

will come from balancing the security<br />

of networks and information with the<br />

protection of individual rights<br />

The term “cybersecurity” is a convenient shorthand<br />

for a very complex set of issues. It commonly refers<br />

to systems and actions aimed at securing data and<br />

communications over the internet and even the infrastructure<br />

of the internet itself. 96 It also sometimes<br />

includes “cybercrime.” The more common threats<br />

to cybersecurity are malware, denial of service, and<br />

phishing attacks (attempts to acquire sensitive information<br />

online by someone who is masquerading as<br />

a trusted entity), but cyberincidents are increasingly<br />

perpetrated by disaffected insiders. So, cybersecurity<br />

usually refers to securing data and infrastructure in a<br />

civilian context; but acts that might previously have<br />

been considered civilian attacks are now being uncovered<br />

as acts of states against states via nonstate actor<br />

proxies, blurring the lines between acts of cybercrime<br />

and cyberwar or cyberterrorism. Threats to personal<br />

security online, such as online identity theft, are<br />

also growing. This may erode public confidence in<br />

e-commerce and e-government applications, and<br />

make internet use less attractive, thus suppressing its<br />

use for certain applications. Likewise, cybersecurity<br />

can include securing critical information infrastructure<br />

from acts of nature, such as developing backup<br />

facilities in alternative locations.<br />

However defined, weak cybersecurity is a significant<br />

problem worldwide, with both the scale of<br />

financial losses, and the costs of preventing them,<br />

growing (box 4.8). New breaches of security over

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!