SlideShare une entreprise Scribd logo
1  sur  15
Freedom of Access to Information Historical Context Totalitarian States censor at production point, Capitalism censors at distribution point. Censorship & the Apartheid State State gets to decide what you can and cannot read, knowledge is something mediated via security apparatus, not civil society (academia, press, etc)
The IBM Case ,[object Object],[object Object],[object Object],[object Object]
Information wants to be Free ,[object Object],[object Object]
[object Object],Information wants to be Open Source
South Africa's Information Age Constitution ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Privacy ,[object Object],[object Object],[object Object],[object Object],[object Object]
Net Neutrality ,[object Object]
Net Neutrality in Africa ,[object Object],[object Object],[object Object],[object Object],[object Object]
Wikileaks ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Egyptian Revolution ,[object Object],[object Object],[object Object],[object Object]
Privacy under threat ,[object Object],[object Object],[object Object]
The Gigaba Plan ,[object Object],Let's RICA the Internet and build a National firewall like China.
The Blackberry Furore ,[object Object],[object Object]
SA Information Bill ,[object Object],[object Object],[object Object],[object Object]
Low-tech Access solutions ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]

Contenu connexe

Tendances

Know Your Rights On #Internet
Know Your Rights On #InternetKnow Your Rights On #Internet
Know Your Rights On #Internet
Hayder Hamzoz
 
Karen Cook: Technology Outspacing Constitution
Karen Cook: Technology Outspacing ConstitutionKaren Cook: Technology Outspacing Constitution
Karen Cook: Technology Outspacing Constitution
merlyna
 
G&P - Chapter 10 - Info & Tech
G&P - Chapter 10 - Info & TechG&P - Chapter 10 - Info & Tech
G&P - Chapter 10 - Info & Tech
cyruskarimian
 
Freedom of expression
Freedom of expressionFreedom of expression
Freedom of expression
Gerwin Ocsena
 

Tendances (20)

Know Your Rights On #Internet
Know Your Rights On #InternetKnow Your Rights On #Internet
Know Your Rights On #Internet
 
Karen Cook: Technology Outspacing Constitution
Karen Cook: Technology Outspacing ConstitutionKaren Cook: Technology Outspacing Constitution
Karen Cook: Technology Outspacing Constitution
 
Americanizing Palestine Through Internet
Americanizing Palestine Through InternetAmericanizing Palestine Through Internet
Americanizing Palestine Through Internet
 
Communications
CommunicationsCommunications
Communications
 
Internet censorship by ronak
Internet censorship by ronakInternet censorship by ronak
Internet censorship by ronak
 
Open internet in singapore
Open internet in singaporeOpen internet in singapore
Open internet in singapore
 
After 9 11
After 9 11After 9 11
After 9 11
 
Internet Censorship across the World
Internet Censorship across the WorldInternet Censorship across the World
Internet Censorship across the World
 
Freedom or Control in Virtual Worlds
Freedom or Control in Virtual WorldsFreedom or Control in Virtual Worlds
Freedom or Control in Virtual Worlds
 
G&P - Chapter 10 - Info & Tech
G&P - Chapter 10 - Info & TechG&P - Chapter 10 - Info & Tech
G&P - Chapter 10 - Info & Tech
 
Research on Digital Security Act 2018
Research on Digital Security Act 2018Research on Digital Security Act 2018
Research on Digital Security Act 2018
 
e-G8 Summary
e-G8 Summarye-G8 Summary
e-G8 Summary
 
Digital security law security of individual or government
Digital security law security of individual or governmentDigital security law security of individual or government
Digital security law security of individual or government
 
Artificial intelligence governance in the Obama & Trump years
Artificial intelligence governance in the Obama & Trump yearsArtificial intelligence governance in the Obama & Trump years
Artificial intelligence governance in the Obama & Trump years
 
Cyber security and prevention in Bangladesh
Cyber security and prevention in BangladeshCyber security and prevention in Bangladesh
Cyber security and prevention in Bangladesh
 
Internet privacy and laws
Internet privacy and lawsInternet privacy and laws
Internet privacy and laws
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Open Data, Open Government
Open Data, Open GovernmentOpen Data, Open Government
Open Data, Open Government
 
Freedom of expression
Freedom of expressionFreedom of expression
Freedom of expression
 
Internetregulationjapan
InternetregulationjapanInternetregulationjapan
Internetregulationjapan
 

En vedette

Qa chapter 02
Qa chapter 02Qa chapter 02
Qa chapter 02
Ann Lunde
 
Empreendendo na Ilha do Silício
Empreendendo na Ilha do SilícioEmpreendendo na Ilha do Silício
Empreendendo na Ilha do Silício
Bruno Ghisi
 
презентация японских продуктов
презентация японских продуктовпрезентация японских продуктов
презентация японских продуктов
Andreykireenkov
 
Research present
Research presentResearch present
Research present
Nicole D.
 
Automatic liquid level control of tank system
Automatic liquid level control of tank systemAutomatic liquid level control of tank system
Automatic liquid level control of tank system
Fatahillah Ata
 

En vedette (20)

Sirs
SirsSirs
Sirs
 
Copyright info
Copyright infoCopyright info
Copyright info
 
Программа для матери и ребенка спа-центра Quatre Terres
Программа для матери и ребенка спа-центра Quatre TerresПрограмма для матери и ребенка спа-центра Quatre Terres
Программа для матери и ребенка спа-центра Quatre Terres
 
Perspective lesson 1zoom
Perspective lesson 1zoomPerspective lesson 1zoom
Perspective lesson 1zoom
 
Econemp 2-140305160859-phpapp02
Econemp 2-140305160859-phpapp02Econemp 2-140305160859-phpapp02
Econemp 2-140305160859-phpapp02
 
Educational Project for Loreto
Educational Project for LoretoEducational Project for Loreto
Educational Project for Loreto
 
2 класс. урок № 3. привет. в зоопарке
2 класс. урок № 3. привет. в зоопарке2 класс. урок № 3. привет. в зоопарке
2 класс. урок № 3. привет. в зоопарке
 
Qa chapter 02
Qa chapter 02Qa chapter 02
Qa chapter 02
 
Foliar Nutrient Resorption and Litterfall Production With Stand Age, Overstor...
Foliar Nutrient Resorption and Litterfall Production With Stand Age, Overstor...Foliar Nutrient Resorption and Litterfall Production With Stand Age, Overstor...
Foliar Nutrient Resorption and Litterfall Production With Stand Age, Overstor...
 
2 класс. обощающий урок по разделу привет. повторение
2 класс. обощающий урок по разделу привет. повторение2 класс. обощающий урок по разделу привет. повторение
2 класс. обощающий урок по разделу привет. повторение
 
Empreendendo na Ilha do Silício
Empreendendo na Ilha do SilícioEmpreendendo na Ilha do Silício
Empreendendo na Ilha do Silício
 
презентация японских продуктов
презентация японских продуктовпрезентация японских продуктов
презентация японских продуктов
 
Northern lights college
Northern lights collegeNorthern lights college
Northern lights college
 
Abstract
AbstractAbstract
Abstract
 
Research present
Research presentResearch present
Research present
 
Algonquin college
Algonquin collegeAlgonquin college
Algonquin college
 
Customer service february 2012
Customer service february  2012Customer service february  2012
Customer service february 2012
 
The How To of Crisis Communications
The How To of Crisis CommunicationsThe How To of Crisis Communications
The How To of Crisis Communications
 
urbanisation
urbanisationurbanisation
urbanisation
 
Automatic liquid level control of tank system
Automatic liquid level control of tank systemAutomatic liquid level control of tank system
Automatic liquid level control of tank system
 

Similaire à #DCI11 Access to Information

DCB1309 - F2_Dark_Net
DCB1309 - F2_Dark_NetDCB1309 - F2_Dark_Net
DCB1309 - F2_Dark_Net
Paul Elliott
 
Cyberterrorism can be in the form of Information attacks which a.docx
Cyberterrorism can be in the form of Information attacks which a.docxCyberterrorism can be in the form of Information attacks which a.docx
Cyberterrorism can be in the form of Information attacks which a.docx
whittemorelucilla
 
Computer Fraud And Abuse Act Of 1986 (CFA)
Computer Fraud And Abuse Act Of 1986 (CFA)Computer Fraud And Abuse Act Of 1986 (CFA)
Computer Fraud And Abuse Act Of 1986 (CFA)
Kim Moore
 

Similaire à #DCI11 Access to Information (13)

DCB1309 - F2_Dark_Net
DCB1309 - F2_Dark_NetDCB1309 - F2_Dark_Net
DCB1309 - F2_Dark_Net
 
PRIVACY RIGHTS ARE HUMAN RIGHTS (2).pdf
PRIVACY RIGHTS ARE HUMAN RIGHTS (2).pdfPRIVACY RIGHTS ARE HUMAN RIGHTS (2).pdf
PRIVACY RIGHTS ARE HUMAN RIGHTS (2).pdf
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Digital Repression and Techno-Authoritarianism
Digital Repression and Techno-AuthoritarianismDigital Repression and Techno-Authoritarianism
Digital Repression and Techno-Authoritarianism
 
Cyber Crime Essay
Cyber Crime EssayCyber Crime Essay
Cyber Crime Essay
 
Privacy reconsidered
Privacy reconsideredPrivacy reconsidered
Privacy reconsidered
 
2600 v19 n4 (winter 2002)
2600 v19 n4 (winter 2002)2600 v19 n4 (winter 2002)
2600 v19 n4 (winter 2002)
 
Cyberterrorism can be in the form of Information attacks which a.docx
Cyberterrorism can be in the form of Information attacks which a.docxCyberterrorism can be in the form of Information attacks which a.docx
Cyberterrorism can be in the form of Information attacks which a.docx
 
Internet Privacy Essay
Internet Privacy EssayInternet Privacy Essay
Internet Privacy Essay
 
Essay Cyber Crime
Essay Cyber CrimeEssay Cyber Crime
Essay Cyber Crime
 
Digital Surveillance
Digital SurveillanceDigital Surveillance
Digital Surveillance
 
Computer Fraud And Abuse Act Of 1986 (CFA)
Computer Fraud And Abuse Act Of 1986 (CFA)Computer Fraud And Abuse Act Of 1986 (CFA)
Computer Fraud And Abuse Act Of 1986 (CFA)
 
Technology evolves so fast
Technology evolves so fast Technology evolves so fast
Technology evolves so fast
 

Dernier

Dernier (20)

The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 

#DCI11 Access to Information

  • 1. Freedom of Access to Information Historical Context Totalitarian States censor at production point, Capitalism censors at distribution point. Censorship & the Apartheid State State gets to decide what you can and cannot read, knowledge is something mediated via security apparatus, not civil society (academia, press, etc)
  • 2.
  • 3.
  • 4.
  • 5.
  • 6.
  • 7.
  • 8.
  • 9.
  • 10.
  • 11.
  • 12.
  • 13.
  • 14.
  • 15.