SlideShare une entreprise Scribd logo
1  sur  25
POLS3620 Contemporary Europe and Asia




Internet Freedom
1001 7526 Chow Tsz Yan
1001 6759 Chuk Ching Pong
Introduction
• 2012: nearly 1/3 of the world’s population has
  used the Internet
• even greater portion possesses a mobile phone

• Concerned with the power of new technologies
  to catalyze political change
• many authoritarian states have taken various
  measures to filter, monitor, or otherwise
  obstruct free speech online
Freedom on the Net 2012

• Conducted by the Freedom House
• U.S.-based (NGO) that conducts research and
  advocacy on democracy, political freedom and
  human right
Examination of three broad
categories:
• A. Obstacles to Access: assesses infrastructural
  and economic barriers to access

• B. Limits on Content: examines filtering and
  blocking of websites

• C. Violations of User Rights: measures legal
  protections and restrictions on online activity
Standards of Measurement
• 0 (the most free) to 100 (the least free)
• Status designation:
  -Free (0-30 points)
  -Partly Free (31-60 points)
  -Not Free (61-100 points)
Scores of Asia
Scores of Eurasia
Scores of Europe & U.S.
Recent development
• A significant uptick in citizen activism related to internet
  freedom, which has produced several notable
  mobilization efforts and legislative victories.

• In several European countries, fierce public opposition
  to the Anti-Counterfeiting Trade Agreement (ACTA) has
  prompted governments to step away from ratification of
  the treaty
• In largely democratic settings, the courts have
  started to play an instrumental role in defending
  internet freedom and overturning laws that may
  infringe on it.

• Hungary:
  Constitutional Court decided in 2011 that the
  country’s restrictive new media regulations would
  not be applicable to online news sources and portals.

• South Korea:
  the Constitutional Court issued its third decision
  favorable to internet freedom in two years, ruling
  against the real-name registration system
Key Trends
New Laws Restrict Free Speech and Prompt
Arrests of Internet Users
• Responding to the rise of user-generated content

• laws that are ostensibly designed to protect
  national security or citizens from cybercrime

• but which are so broadly worded that they can
  easily be turned on political opponent
• Malaysia:
  parliament passed an amendment to the 1950 Evidence
  Act that holds the hosts of online forums, news outlets,
  blogging services, and businesses providing WiFi
  responsible for any seditious content posted by
  anonymous users

• Thailand:
  pressure on intermediaries intensified in May 2012 after
  a forum moderator for the popular online news outlet
  Prachatai received a suspended eight-month jail
  sentence and a fine for not deleting quickly enough an
  anonymous reader’s criticism of the royal family
• China: private companies maintaining whole divisions
  responsible for monitoring and interpreting daily
  Communist Party directives
Surveillance Increases, with Few Checks on
Abuse

• Many governments are seeking less visible
  means to infringe upon internet freedom
• often by increasing their technical capacity or
  administrative authority to access private
  correspondence

• Governments enhanced their surveillance
  abilities
• E.g. South Korea, Thailand
• Surveillance in nondemocratic countries is often
  political in nature, aimed at identifying and
  suppressing government critics and human
  rights activists.

• In China, major microblogging services were
  given a March 2012 deadline to implement real-
  name registration for their users
• Even in more developed democracies, concerns
  have increased that the government is becoming
  too intrusive

• Britain: In 2012, the government announced a
  proposal to expand the existing surveillance
  measures
China’s Case
The Chinese method for controlling social-
media content
• restricting access to international networks while
  coercing their domestic alternatives to robustly
  censor
• monitor user communications according to
  Communist Party directives—has become a
  particularly potent model for other authoritarian
  countries.

• attempts to enhance their technical capacity to
  censor, monitor, or carry out cyberattacks against
  regime opponents.
http://www.idigitaltimes.com/articles/12672/20121111/google-china-search-banned-communist-internet-censorship.htm
Historical and Cultural Perspective
Historical perspective
• Rejection to ‘digital revolution’ , especially in the
  Cold War era

• “ double juggernaut “ of China since 1990s
- “reform and openness”
- emergence of the World Wide Web in 1991



 • Linear development vs dramatic change
Cultural difference

• Western domination of software industry
- reasons behind like openness , free expression ,
  democracy , competitive market , etc

• China with similar software and internet
  advancement
- eg . Weibo , Renren.com
- under fully government surveillance
- to launch cyber war
Conclusion
 “Technology will make it increasingly difficult for the state to control
  the conformation its people receive … The Goliath of totalitarianism
  will be brought down by the David of the microchip .”

     ─ Ronald Reagan , speech at London’s Guildhall , June 14 , 1989



  “Imagine if the Internet took hold in China . Imagine how freedom
  would spread .”

         ─ George W . Bush , Phoenix , Arizona , December 7 , 1999
Bibliography
• Freedom House, "Freedom on the net 2012." Accessed November 13, 2012.
  http://www.freedomhouse.org/report/freedom-net/freedom-net-2012.

• Kalathil, Shanthi , and Taylor C. Boas . 2003 . Open Networks , Closed Regime : The
  Impact of the Internet on Authoritarian Rule . Washington : The Brookings
  Institution press .

• Herold, David Kurt and Peter Marolt. 2011. Online Society in China :Creating,
  Celebrating, and Instrumentalising the Online Carnival. Media, Culture and Social
  Change in Asia. Vol. 25. Abingdon, Oxon; New York: Routledge.

• Simon, Leslie David, Javier Corrales, and Donald R. Wolfensberger. 2002. Democracy
  and the Internet :Allies Or Adversaries?. Wilson Forum. Washington, D.C.: Woodrow
  Wilson Center Press.

Contenu connexe

Tendances

Political change in the digital age
Political change in the digital agePolitical change in the digital age
Political change in the digital ageKrishna Mohan
 
International politics in the age of the internet
International politics in the age of the internetInternational politics in the age of the internet
International politics in the age of the internetJeffrey Hart
 
Presentation slides
Presentation slidesPresentation slides
Presentation slidesandrewdyoung
 
Internet Content Regulation: What it means in 2010
Internet Content Regulation: What it means in 2010Internet Content Regulation: What it means in 2010
Internet Content Regulation: What it means in 2010Wendy Qi
 
online-disinformation-human-rights
online-disinformation-human-rightsonline-disinformation-human-rights
online-disinformation-human-rightsarchiejones4
 
Tracking Social Media Participation: New Approaches to Studying User-Gener...
Tracking  Social  Media  Participation: New Approaches to Studying User-Gener...Tracking  Social  Media  Participation: New Approaches to Studying User-Gener...
Tracking Social Media Participation: New Approaches to Studying User-Gener...Axel Bruns
 
IGF Hyderabad - Index of Global Internet Freedom
IGF Hyderabad - Index of Global Internet FreedomIGF Hyderabad - Index of Global Internet Freedom
IGF Hyderabad - Index of Global Internet FreedomFreedom House
 
Internet Governance by Its History (1966-2000)
Internet Governance by Its History (1966-2000)Internet Governance by Its History (1966-2000)
Internet Governance by Its History (1966-2000)Jeremy Pesner
 
CIPA Overview
CIPA OverviewCIPA Overview
CIPA Overviewedtecher
 
Public policy and online social networks: The trillion dollar zombie question
Public policy and online social networks: The trillion dollar zombie questionPublic policy and online social networks: The trillion dollar zombie question
Public policy and online social networks: The trillion dollar zombie questionChris Marsden
 

Tendances (20)

Political change in the digital age
Political change in the digital agePolitical change in the digital age
Political change in the digital age
 
Critical Debates in Internet Studies
Critical Debates in Internet StudiesCritical Debates in Internet Studies
Critical Debates in Internet Studies
 
International politics in the age of the internet
International politics in the age of the internetInternational politics in the age of the internet
International politics in the age of the internet
 
Presentation slides
Presentation slidesPresentation slides
Presentation slides
 
Internet Content Regulation: What it means in 2010
Internet Content Regulation: What it means in 2010Internet Content Regulation: What it means in 2010
Internet Content Regulation: What it means in 2010
 
Polinter11
Polinter11Polinter11
Polinter11
 
Texas policy 2016
Texas policy 2016Texas policy 2016
Texas policy 2016
 
online-disinformation-human-rights
online-disinformation-human-rightsonline-disinformation-human-rights
online-disinformation-human-rights
 
Tracking Social Media Participation: New Approaches to Studying User-Gener...
Tracking  Social  Media  Participation: New Approaches to Studying User-Gener...Tracking  Social  Media  Participation: New Approaches to Studying User-Gener...
Tracking Social Media Participation: New Approaches to Studying User-Gener...
 
IGF Hyderabad - Index of Global Internet Freedom
IGF Hyderabad - Index of Global Internet FreedomIGF Hyderabad - Index of Global Internet Freedom
IGF Hyderabad - Index of Global Internet Freedom
 
The Internet, Democracy and the Fifth Estate
The Internet, Democracy and the Fifth EstateThe Internet, Democracy and the Fifth Estate
The Internet, Democracy and the Fifth Estate
 
Fotn 2015 colombia
Fotn 2015 colombiaFotn 2015 colombia
Fotn 2015 colombia
 
Internet Governance by Its History (1966-2000)
Internet Governance by Its History (1966-2000)Internet Governance by Its History (1966-2000)
Internet Governance by Its History (1966-2000)
 
Internet governance
Internet governanceInternet governance
Internet governance
 
Online Harms White Paper April 2019 Bill Dutton
Online Harms White Paper April 2019 Bill DuttonOnline Harms White Paper April 2019 Bill Dutton
Online Harms White Paper April 2019 Bill Dutton
 
Icegov2011 2
Icegov2011 2Icegov2011 2
Icegov2011 2
 
CIPA Overview
CIPA OverviewCIPA Overview
CIPA Overview
 
Child grooming
Child groomingChild grooming
Child grooming
 
Public policy and online social networks: The trillion dollar zombie question
Public policy and online social networks: The trillion dollar zombie questionPublic policy and online social networks: The trillion dollar zombie question
Public policy and online social networks: The trillion dollar zombie question
 
The path from e government to open government in vietnam
The path from e government to open government in vietnamThe path from e government to open government in vietnam
The path from e government to open government in vietnam
 

En vedette

Case study 2012
Case study 2012Case study 2012
Case study 2012bamick
 
Pra100 The Winterfest Uludağ
Pra100 The Winterfest UludağPra100 The Winterfest Uludağ
Pra100 The Winterfest UludağDuygun
 
Happiness
HappinessHappiness
HappinessDuygun
 
HOMOSEXUALITATEA ETA... ZER DA HORI?
HOMOSEXUALITATEA ETA... ZER DA HORI?HOMOSEXUALITATEA ETA... ZER DA HORI?
HOMOSEXUALITATEA ETA... ZER DA HORI?LLUCEA90
 
Extension to asch and crutchfield
Extension to asch and crutchfieldExtension to asch and crutchfield
Extension to asch and crutchfieldJosh Sumner
 
шкільний музей
шкільний музейшкільний музей
шкільний музейdeadangelru
 
Huong dan tinh toan thanh phan dong cua tt gio
Huong dan tinh toan thanh phan dong cua tt gioHuong dan tinh toan thanh phan dong cua tt gio
Huong dan tinh toan thanh phan dong cua tt giovinhx1b
 

En vedette (14)

Case study 2012
Case study 2012Case study 2012
Case study 2012
 
hw
hwhw
hw
 
Internet freedom
Internet freedomInternet freedom
Internet freedom
 
Pra100 The Winterfest Uludağ
Pra100 The Winterfest UludağPra100 The Winterfest Uludağ
Pra100 The Winterfest Uludağ
 
Happiness
HappinessHappiness
Happiness
 
Come scegliere una vacanza studio
Come scegliere una vacanza studioCome scegliere una vacanza studio
Come scegliere una vacanza studio
 
Vacanza studio Inghilterra Cheltenham 2013
Vacanza studio Inghilterra Cheltenham 2013Vacanza studio Inghilterra Cheltenham 2013
Vacanza studio Inghilterra Cheltenham 2013
 
Vacanza studio inghilterra Reading info e prezzi
Vacanza studio inghilterra Reading info e prezziVacanza studio inghilterra Reading info e prezzi
Vacanza studio inghilterra Reading info e prezzi
 
HOMOSEXUALITATEA ETA... ZER DA HORI?
HOMOSEXUALITATEA ETA... ZER DA HORI?HOMOSEXUALITATEA ETA... ZER DA HORI?
HOMOSEXUALITATEA ETA... ZER DA HORI?
 
Vacanza studio Inghilterra reading
Vacanza studio Inghilterra readingVacanza studio Inghilterra reading
Vacanza studio Inghilterra reading
 
Extension to asch and crutchfield
Extension to asch and crutchfieldExtension to asch and crutchfield
Extension to asch and crutchfield
 
шкільний музей
шкільний музейшкільний музей
шкільний музей
 
Vacanza Studio USA New York 2013
Vacanza Studio USA New York 2013Vacanza Studio USA New York 2013
Vacanza Studio USA New York 2013
 
Huong dan tinh toan thanh phan dong cua tt gio
Huong dan tinh toan thanh phan dong cua tt gioHuong dan tinh toan thanh phan dong cua tt gio
Huong dan tinh toan thanh phan dong cua tt gio
 

Similaire à Internet Freedom HKBU, Contemporary Europe and Asia 2012, POLS 3620

Freedom Trends and Assumptions - A Global Assessment of Internet and Digital ...
Freedom Trends and Assumptions - A Global Assessment of Internet and Digital ...Freedom Trends and Assumptions - A Global Assessment of Internet and Digital ...
Freedom Trends and Assumptions - A Global Assessment of Internet and Digital ...Freedom House
 
Fotn 2013 summary of findings
Fotn 2013 summary of findingsFotn 2013 summary of findings
Fotn 2013 summary of findingsChafik YAHOU
 
Digital Repression and Techno-Authoritarianism
Digital Repression and Techno-AuthoritarianismDigital Repression and Techno-Authoritarianism
Digital Repression and Techno-AuthoritarianismCharles Mok
 
ArticlesJournal of Contemporary Criminal Justice26(1) 10.docx
ArticlesJournal of Contemporary Criminal Justice26(1) 10.docxArticlesJournal of Contemporary Criminal Justice26(1) 10.docx
ArticlesJournal of Contemporary Criminal Justice26(1) 10.docxwraythallchan
 
Flew dmrc 11 sept 15
Flew dmrc 11 sept 15Flew dmrc 11 sept 15
Flew dmrc 11 sept 15Terry Flew
 
Cst group project#2, intro++
Cst group project#2, intro++Cst group project#2, intro++
Cst group project#2, intro++Roxanne St Ives
 
C1729690_PersuasiveAnalysis Research Paper (Argument).docx
C1729690_PersuasiveAnalysis Research Paper (Argument).docxC1729690_PersuasiveAnalysis Research Paper (Argument).docx
C1729690_PersuasiveAnalysis Research Paper (Argument).docxAndrewClark295760
 
Team rocket presentation
Team rocket presentationTeam rocket presentation
Team rocket presentationmoralsus
 
Team rocket presentation
Team rocket presentationTeam rocket presentation
Team rocket presentationbollmanp
 
An Overview of the Battle for the Control of the Internet
An Overview of the Battle for the Control of the InternetAn Overview of the Battle for the Control of the Internet
An Overview of the Battle for the Control of the InternetDibussi Tande
 
Digital Sovereigns or Consent of the Networked
Digital Sovereigns or Consent of the NetworkedDigital Sovereigns or Consent of the Networked
Digital Sovereigns or Consent of the NetworkedMsifry
 
MCj-401 Assignment, roll-30.pdf
MCj-401 Assignment, roll-30.pdfMCj-401 Assignment, roll-30.pdf
MCj-401 Assignment, roll-30.pdfHasanAlManjur1
 
Week34_The Internet, Digital Media, and Media Convergence (Chapter2) (1).pdf
Week34_The Internet, Digital Media, and Media Convergence (Chapter2) (1).pdfWeek34_The Internet, Digital Media, and Media Convergence (Chapter2) (1).pdf
Week34_The Internet, Digital Media, and Media Convergence (Chapter2) (1).pdfPhngLinhTrn33
 
The Political Power of Social Media Technology, the Publ.docx
The Political Power of Social Media Technology, the Publ.docxThe Political Power of Social Media Technology, the Publ.docx
The Political Power of Social Media Technology, the Publ.docxAASTHA76
 
Unintended Consequences: The Internet Regulation
Unintended Consequences: The Internet RegulationUnintended Consequences: The Internet Regulation
Unintended Consequences: The Internet RegulationShashank Motepalli
 

Similaire à Internet Freedom HKBU, Contemporary Europe and Asia 2012, POLS 3620 (20)

Freedom Trends and Assumptions - A Global Assessment of Internet and Digital ...
Freedom Trends and Assumptions - A Global Assessment of Internet and Digital ...Freedom Trends and Assumptions - A Global Assessment of Internet and Digital ...
Freedom Trends and Assumptions - A Global Assessment of Internet and Digital ...
 
Fotn 2013 summary of findings
Fotn 2013 summary of findingsFotn 2013 summary of findings
Fotn 2013 summary of findings
 
Digital Repression and Techno-Authoritarianism
Digital Repression and Techno-AuthoritarianismDigital Repression and Techno-Authoritarianism
Digital Repression and Techno-Authoritarianism
 
Freedom unesco-2011
Freedom unesco-2011Freedom unesco-2011
Freedom unesco-2011
 
ArticlesJournal of Contemporary Criminal Justice26(1) 10.docx
ArticlesJournal of Contemporary Criminal Justice26(1) 10.docxArticlesJournal of Contemporary Criminal Justice26(1) 10.docx
ArticlesJournal of Contemporary Criminal Justice26(1) 10.docx
 
Flew dmrc 11 sept 15
Flew dmrc 11 sept 15Flew dmrc 11 sept 15
Flew dmrc 11 sept 15
 
Society Meets Social Media at reyerson-2015
Society Meets Social Media at reyerson-2015Society Meets Social Media at reyerson-2015
Society Meets Social Media at reyerson-2015
 
Cst group project#2, intro++
Cst group project#2, intro++Cst group project#2, intro++
Cst group project#2, intro++
 
C1729690_PersuasiveAnalysis Research Paper (Argument).docx
C1729690_PersuasiveAnalysis Research Paper (Argument).docxC1729690_PersuasiveAnalysis Research Paper (Argument).docx
C1729690_PersuasiveAnalysis Research Paper (Argument).docx
 
Team rocket presentation
Team rocket presentationTeam rocket presentation
Team rocket presentation
 
Team rocket presentation
Team rocket presentationTeam rocket presentation
Team rocket presentation
 
Network Neutrality: The Origins, Politics and Implications of New Rules for a...
Network Neutrality: The Origins, Politics and Implications of New Rules for a...Network Neutrality: The Origins, Politics and Implications of New Rules for a...
Network Neutrality: The Origins, Politics and Implications of New Rules for a...
 
Dutton china-sjtu-2015
Dutton china-sjtu-2015Dutton china-sjtu-2015
Dutton china-sjtu-2015
 
An Overview of the Battle for the Control of the Internet
An Overview of the Battle for the Control of the InternetAn Overview of the Battle for the Control of the Internet
An Overview of the Battle for the Control of the Internet
 
Digital Sovereigns or Consent of the Networked
Digital Sovereigns or Consent of the NetworkedDigital Sovereigns or Consent of the Networked
Digital Sovereigns or Consent of the Networked
 
MCj-401 Assignment, roll-30.pdf
MCj-401 Assignment, roll-30.pdfMCj-401 Assignment, roll-30.pdf
MCj-401 Assignment, roll-30.pdf
 
Week34_The Internet, Digital Media, and Media Convergence (Chapter2) (1).pdf
Week34_The Internet, Digital Media, and Media Convergence (Chapter2) (1).pdfWeek34_The Internet, Digital Media, and Media Convergence (Chapter2) (1).pdf
Week34_The Internet, Digital Media, and Media Convergence (Chapter2) (1).pdf
 
The Political Power of Social Media Technology, the Publ.docx
The Political Power of Social Media Technology, the Publ.docxThe Political Power of Social Media Technology, the Publ.docx
The Political Power of Social Media Technology, the Publ.docx
 
Freedom On The Net
Freedom On The NetFreedom On The Net
Freedom On The Net
 
Unintended Consequences: The Internet Regulation
Unintended Consequences: The Internet RegulationUnintended Consequences: The Internet Regulation
Unintended Consequences: The Internet Regulation
 

Dernier

Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024The Digital Insurer
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piececharlottematthew16
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Wonjun Hwang
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfRankYa
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 

Dernier (20)

Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piece
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdf
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 

Internet Freedom HKBU, Contemporary Europe and Asia 2012, POLS 3620

  • 1. POLS3620 Contemporary Europe and Asia Internet Freedom 1001 7526 Chow Tsz Yan 1001 6759 Chuk Ching Pong
  • 2. Introduction • 2012: nearly 1/3 of the world’s population has used the Internet • even greater portion possesses a mobile phone • Concerned with the power of new technologies to catalyze political change • many authoritarian states have taken various measures to filter, monitor, or otherwise obstruct free speech online
  • 3. Freedom on the Net 2012 • Conducted by the Freedom House • U.S.-based (NGO) that conducts research and advocacy on democracy, political freedom and human right
  • 4. Examination of three broad categories: • A. Obstacles to Access: assesses infrastructural and economic barriers to access • B. Limits on Content: examines filtering and blocking of websites • C. Violations of User Rights: measures legal protections and restrictions on online activity
  • 5. Standards of Measurement • 0 (the most free) to 100 (the least free) • Status designation: -Free (0-30 points) -Partly Free (31-60 points) -Not Free (61-100 points)
  • 9.
  • 10. Recent development • A significant uptick in citizen activism related to internet freedom, which has produced several notable mobilization efforts and legislative victories. • In several European countries, fierce public opposition to the Anti-Counterfeiting Trade Agreement (ACTA) has prompted governments to step away from ratification of the treaty
  • 11. • In largely democratic settings, the courts have started to play an instrumental role in defending internet freedom and overturning laws that may infringe on it. • Hungary: Constitutional Court decided in 2011 that the country’s restrictive new media regulations would not be applicable to online news sources and portals. • South Korea: the Constitutional Court issued its third decision favorable to internet freedom in two years, ruling against the real-name registration system
  • 13. New Laws Restrict Free Speech and Prompt Arrests of Internet Users • Responding to the rise of user-generated content • laws that are ostensibly designed to protect national security or citizens from cybercrime • but which are so broadly worded that they can easily be turned on political opponent
  • 14. • Malaysia: parliament passed an amendment to the 1950 Evidence Act that holds the hosts of online forums, news outlets, blogging services, and businesses providing WiFi responsible for any seditious content posted by anonymous users • Thailand: pressure on intermediaries intensified in May 2012 after a forum moderator for the popular online news outlet Prachatai received a suspended eight-month jail sentence and a fine for not deleting quickly enough an anonymous reader’s criticism of the royal family • China: private companies maintaining whole divisions responsible for monitoring and interpreting daily Communist Party directives
  • 15. Surveillance Increases, with Few Checks on Abuse • Many governments are seeking less visible means to infringe upon internet freedom • often by increasing their technical capacity or administrative authority to access private correspondence • Governments enhanced their surveillance abilities • E.g. South Korea, Thailand
  • 16. • Surveillance in nondemocratic countries is often political in nature, aimed at identifying and suppressing government critics and human rights activists. • In China, major microblogging services were given a March 2012 deadline to implement real- name registration for their users
  • 17. • Even in more developed democracies, concerns have increased that the government is becoming too intrusive • Britain: In 2012, the government announced a proposal to expand the existing surveillance measures
  • 19. The Chinese method for controlling social- media content • restricting access to international networks while coercing their domestic alternatives to robustly censor • monitor user communications according to Communist Party directives—has become a particularly potent model for other authoritarian countries. • attempts to enhance their technical capacity to censor, monitor, or carry out cyberattacks against regime opponents.
  • 21. Historical and Cultural Perspective
  • 22. Historical perspective • Rejection to ‘digital revolution’ , especially in the Cold War era • “ double juggernaut “ of China since 1990s - “reform and openness” - emergence of the World Wide Web in 1991 • Linear development vs dramatic change
  • 23. Cultural difference • Western domination of software industry - reasons behind like openness , free expression , democracy , competitive market , etc • China with similar software and internet advancement - eg . Weibo , Renren.com - under fully government surveillance - to launch cyber war
  • 24. Conclusion “Technology will make it increasingly difficult for the state to control the conformation its people receive … The Goliath of totalitarianism will be brought down by the David of the microchip .” ─ Ronald Reagan , speech at London’s Guildhall , June 14 , 1989 “Imagine if the Internet took hold in China . Imagine how freedom would spread .” ─ George W . Bush , Phoenix , Arizona , December 7 , 1999
  • 25. Bibliography • Freedom House, "Freedom on the net 2012." Accessed November 13, 2012. http://www.freedomhouse.org/report/freedom-net/freedom-net-2012. • Kalathil, Shanthi , and Taylor C. Boas . 2003 . Open Networks , Closed Regime : The Impact of the Internet on Authoritarian Rule . Washington : The Brookings Institution press . • Herold, David Kurt and Peter Marolt. 2011. Online Society in China :Creating, Celebrating, and Instrumentalising the Online Carnival. Media, Culture and Social Change in Asia. Vol. 25. Abingdon, Oxon; New York: Routledge. • Simon, Leslie David, Javier Corrales, and Donald R. Wolfensberger. 2002. Democracy and the Internet :Allies Or Adversaries?. Wilson Forum. Washington, D.C.: Woodrow Wilson Center Press.

Notes de l'éditeur

  1. a comprehensive study of internet freedom in 47 countries around the globe. This report is the third in its series and focuses on developments that occurred between January 2011 and May 2012