SlideShare a Scribd company logo
1 of 14
Who determines what is
right and wrong online?
Direct Government Censorship
The most easily recognizable form of censorship is when the government directly
interferes with the internet.

• Examples
    • Interfering with physical servers, internet service providers (ISPs), or companies
      within state jurisdiction
    • Blocking access to specific sites or information
    • Broad filtering or monitoring of communications, news, or other information
• Some participating states
    • China, Iran, Syria, and North Korea
Corporate Censorship
When companies or web properties voluntarily restrict certain content to protect their
corporate interests.

• Examples
    • Blocking content that they fear may lead to lawsuits
    • Blocking content that they feel undermines their business goals
    • Reducing company exposure to unwanted content online; i.e. PR
      controversy, social media properties, community comments, published hacks, etc.
• Some participating companies
    • Apple, YouTube, Facebook
Corporations or Special Interest Groups + Government
The most common form of internet censorship in the Western world is a blended
approach where groups lobby government to enact laws beneficial to them.

• Examples
    • SOPA/PIPA/ACTA/DMCA – copyright laws giving a company the legal grounds to
       sue a company or individual, pressure them to remove certain content, or block
       access to certain websites
    • Demonization of certain activities in the press as hacking, piracy, etc.
• Participating countries and organizations
    • Pervasive throughout the Western world
Online Protest
Real-world protest is for the most part a defined activity, but online protest exists in a grey
area. What is and isn’t legal? What constitutes protest vs. criminal activity?

• Examples
    • Anonymous – a decentralized group that does participate in hacking at times, but
      is primarily a means of organizing both online and real-world protest
    • LOIC (Low Orbit Ionic Cannon) – a program often utilized by Anonymous and
      others to perform dDOS attacks
         • dDOS attacks temporarily overwhelm servers but do no actual damage, much
            as a real-world protest may do so with a physical space.
Why does this matter?
We are here
Why does this matter?
The internet is still very young, and how it is defined
today will impact it for decades to come.
Why does this matter?
The internet is global and we are all a part of it no
matter which country we live in. And if one country
enacts strict laws, it would disrupt the global net
infrastructure by forcing traffic to route around it, if
even possible depending on the destination.
Questions?

More Related Content

What's hot

What is a joke? The role of social media providers in regulating speech
What is a joke? The role of social media providers in regulating speechWhat is a joke? The role of social media providers in regulating speech
What is a joke? The role of social media providers in regulating speechEmily Laidlaw
 
Freedom of expression
Freedom of expressionFreedom of expression
Freedom of expressionGerwin Ocsena
 
Privacy law and policy 2 - LIS550
Privacy law and policy 2 - LIS550 Privacy law and policy 2 - LIS550
Privacy law and policy 2 - LIS550 Brian Rowe
 
The Internet State Filter
The Internet State FilterThe Internet State Filter
The Internet State FilterAndrew Davies
 
An Overview of the Battle for the Control of the Internet
An Overview of the Battle for the Control of the InternetAn Overview of the Battle for the Control of the Internet
An Overview of the Battle for the Control of the InternetDibussi Tande
 
Framing Search Engine Responsibilities
Framing Search Engine ResponsibilitiesFraming Search Engine Responsibilities
Framing Search Engine ResponsibilitiesEmily Laidlaw
 
Internet censorship power point
Internet censorship power pointInternet censorship power point
Internet censorship power pointJonathan Milner
 
Digital law
Digital lawDigital law
Digital lawmyls69
 
Lessons on netfreedom+best practices in cyber security
Lessons on netfreedom+best practices in cyber securityLessons on netfreedom+best practices in cyber security
Lessons on netfreedom+best practices in cyber securityFreedom House
 
Internetregulationjapan
InternetregulationjapanInternetregulationjapan
Internetregulationjapanrmackinnon
 
The Individual and the Internet -- The Use and Abuse of Personal Information
The Individual and the Internet -- The Use and Abuse of Personal InformationThe Individual and the Internet -- The Use and Abuse of Personal Information
The Individual and the Internet -- The Use and Abuse of Personal InformationCharles Mok
 
Internet decency legislation
Internet decency legislationInternet decency legislation
Internet decency legislationTgarmon34
 
Internet Censorship
Internet CensorshipInternet Censorship
Internet Censorshipbecnicholas
 
Freedom of Expression our Internet Rights and Principle by Shreedeep Rayamajh...
Freedom of Expression our Internet Rights and Principle by Shreedeep Rayamajh...Freedom of Expression our Internet Rights and Principle by Shreedeep Rayamajh...
Freedom of Expression our Internet Rights and Principle by Shreedeep Rayamajh...Shreedeep Rayamajhi
 
Cyber harassment ppt umt
Cyber harassment ppt umtCyber harassment ppt umt
Cyber harassment ppt umtMuhammad Ahmad
 
Internet privacy and laws
Internet privacy and lawsInternet privacy and laws
Internet privacy and lawsjcmonnett
 
Quiz - Online Regulation
Quiz - Online RegulationQuiz - Online Regulation
Quiz - Online RegulationKesby12
 
An Internet of Governments
An Internet of GovernmentsAn Internet of Governments
An Internet of GovernmentsRobbie Mitchell
 
Freedom Trends and Assumptions - A Global Assessment of Internet and Digital ...
Freedom Trends and Assumptions - A Global Assessment of Internet and Digital ...Freedom Trends and Assumptions - A Global Assessment of Internet and Digital ...
Freedom Trends and Assumptions - A Global Assessment of Internet and Digital ...Freedom House
 

What's hot (20)

What is a joke? The role of social media providers in regulating speech
What is a joke? The role of social media providers in regulating speechWhat is a joke? The role of social media providers in regulating speech
What is a joke? The role of social media providers in regulating speech
 
Freedom of expression
Freedom of expressionFreedom of expression
Freedom of expression
 
Privacy law and policy 2 - LIS550
Privacy law and policy 2 - LIS550 Privacy law and policy 2 - LIS550
Privacy law and policy 2 - LIS550
 
The Internet State Filter
The Internet State FilterThe Internet State Filter
The Internet State Filter
 
An Overview of the Battle for the Control of the Internet
An Overview of the Battle for the Control of the InternetAn Overview of the Battle for the Control of the Internet
An Overview of the Battle for the Control of the Internet
 
Cyber law1
Cyber law1Cyber law1
Cyber law1
 
Framing Search Engine Responsibilities
Framing Search Engine ResponsibilitiesFraming Search Engine Responsibilities
Framing Search Engine Responsibilities
 
Internet censorship power point
Internet censorship power pointInternet censorship power point
Internet censorship power point
 
Digital law
Digital lawDigital law
Digital law
 
Lessons on netfreedom+best practices in cyber security
Lessons on netfreedom+best practices in cyber securityLessons on netfreedom+best practices in cyber security
Lessons on netfreedom+best practices in cyber security
 
Internetregulationjapan
InternetregulationjapanInternetregulationjapan
Internetregulationjapan
 
The Individual and the Internet -- The Use and Abuse of Personal Information
The Individual and the Internet -- The Use and Abuse of Personal InformationThe Individual and the Internet -- The Use and Abuse of Personal Information
The Individual and the Internet -- The Use and Abuse of Personal Information
 
Internet decency legislation
Internet decency legislationInternet decency legislation
Internet decency legislation
 
Internet Censorship
Internet CensorshipInternet Censorship
Internet Censorship
 
Freedom of Expression our Internet Rights and Principle by Shreedeep Rayamajh...
Freedom of Expression our Internet Rights and Principle by Shreedeep Rayamajh...Freedom of Expression our Internet Rights and Principle by Shreedeep Rayamajh...
Freedom of Expression our Internet Rights and Principle by Shreedeep Rayamajh...
 
Cyber harassment ppt umt
Cyber harassment ppt umtCyber harassment ppt umt
Cyber harassment ppt umt
 
Internet privacy and laws
Internet privacy and lawsInternet privacy and laws
Internet privacy and laws
 
Quiz - Online Regulation
Quiz - Online RegulationQuiz - Online Regulation
Quiz - Online Regulation
 
An Internet of Governments
An Internet of GovernmentsAn Internet of Governments
An Internet of Governments
 
Freedom Trends and Assumptions - A Global Assessment of Internet and Digital ...
Freedom Trends and Assumptions - A Global Assessment of Internet and Digital ...Freedom Trends and Assumptions - A Global Assessment of Internet and Digital ...
Freedom Trends and Assumptions - A Global Assessment of Internet and Digital ...
 

Viewers also liked

Let Me Google That For You
Let Me Google That For YouLet Me Google That For You
Let Me Google That For YouSean Mulholland
 
Sharepoint Project
Sharepoint ProjectSharepoint Project
Sharepoint ProjectRipu Jain
 
re:publica 2015: Internet censorship around Europe since ACTA
re:publica 2015: Internet censorship around Europe since ACTAre:publica 2015: Internet censorship around Europe since ACTA
re:publica 2015: Internet censorship around Europe since ACTAKirsten Fiedler
 
Essex introductory Presentation 09.11.2010
Essex introductory Presentation 09.11.2010Essex introductory Presentation 09.11.2010
Essex introductory Presentation 09.11.2010Andrew Kenyon
 
Anti-Terrorism Laws in Australia
Anti-Terrorism Laws in AustraliaAnti-Terrorism Laws in Australia
Anti-Terrorism Laws in AustraliaHasan Mohammad
 
MGSM877A Public Performance for Managers - Internet censorship in Australia
MGSM877A Public Performance for Managers - Internet censorship in AustraliaMGSM877A Public Performance for Managers - Internet censorship in Australia
MGSM877A Public Performance for Managers - Internet censorship in AustraliaTom Voirol
 
A Survey of Research Prospects for more Manageable Personal Digital Photo Col...
A Survey of Research Prospects for more Manageable Personal Digital Photo Col...A Survey of Research Prospects for more Manageable Personal Digital Photo Col...
A Survey of Research Prospects for more Manageable Personal Digital Photo Col...nullhandle
 
284 Cambio automatico de 6 relaciones 09E en el Audi A8 2003 Parte 2.pdf
284 Cambio automatico de 6 relaciones 09E en el Audi A8 2003 Parte 2.pdf284 Cambio automatico de 6 relaciones 09E en el Audi A8 2003 Parte 2.pdf
284 Cambio automatico de 6 relaciones 09E en el Audi A8 2003 Parte 2.pdfjcarrey
 
Study: The Future of VR, AR and Self-Driving Cars
Study: The Future of VR, AR and Self-Driving CarsStudy: The Future of VR, AR and Self-Driving Cars
Study: The Future of VR, AR and Self-Driving CarsLinkedIn
 

Viewers also liked (10)

Let Me Google That For You
Let Me Google That For YouLet Me Google That For You
Let Me Google That For You
 
Sharepoint Project
Sharepoint ProjectSharepoint Project
Sharepoint Project
 
re:publica 2015: Internet censorship around Europe since ACTA
re:publica 2015: Internet censorship around Europe since ACTAre:publica 2015: Internet censorship around Europe since ACTA
re:publica 2015: Internet censorship around Europe since ACTA
 
Essex introductory Presentation 09.11.2010
Essex introductory Presentation 09.11.2010Essex introductory Presentation 09.11.2010
Essex introductory Presentation 09.11.2010
 
Anti-Terrorism Laws in Australia
Anti-Terrorism Laws in AustraliaAnti-Terrorism Laws in Australia
Anti-Terrorism Laws in Australia
 
MGSM877A Public Performance for Managers - Internet censorship in Australia
MGSM877A Public Performance for Managers - Internet censorship in AustraliaMGSM877A Public Performance for Managers - Internet censorship in Australia
MGSM877A Public Performance for Managers - Internet censorship in Australia
 
A Survey of Research Prospects for more Manageable Personal Digital Photo Col...
A Survey of Research Prospects for more Manageable Personal Digital Photo Col...A Survey of Research Prospects for more Manageable Personal Digital Photo Col...
A Survey of Research Prospects for more Manageable Personal Digital Photo Col...
 
SEO - a brief introduction
SEO - a brief introductionSEO - a brief introduction
SEO - a brief introduction
 
284 Cambio automatico de 6 relaciones 09E en el Audi A8 2003 Parte 2.pdf
284 Cambio automatico de 6 relaciones 09E en el Audi A8 2003 Parte 2.pdf284 Cambio automatico de 6 relaciones 09E en el Audi A8 2003 Parte 2.pdf
284 Cambio automatico de 6 relaciones 09E en el Audi A8 2003 Parte 2.pdf
 
Study: The Future of VR, AR and Self-Driving Cars
Study: The Future of VR, AR and Self-Driving CarsStudy: The Future of VR, AR and Self-Driving Cars
Study: The Future of VR, AR and Self-Driving Cars
 

Similar to Internet Censorship

Internet Content Regulation: What it means in 2010
Internet Content Regulation: What it means in 2010Internet Content Regulation: What it means in 2010
Internet Content Regulation: What it means in 2010Wendy Qi
 
International internet governance
International internet governanceInternational internet governance
International internet governanceJillian York
 
Sopa (stop online piracy act)
Sopa (stop online piracy act)Sopa (stop online piracy act)
Sopa (stop online piracy act)kmcintire84
 
Digital Repression and Techno-Authoritarianism
Digital Repression and Techno-AuthoritarianismDigital Repression and Techno-Authoritarianism
Digital Repression and Techno-AuthoritarianismCharles Mok
 
The State Department and Net Freedom: A year of great challenges & opportunities
The State Department and Net Freedom: A year of great challenges & opportunitiesThe State Department and Net Freedom: A year of great challenges & opportunities
The State Department and Net Freedom: A year of great challenges & opportunitiesFreedom House
 
Censorship and Regulation of the Internet
Censorship and Regulation of the InternetCensorship and Regulation of the Internet
Censorship and Regulation of the InternetEllieWeedon
 
Cybercrime
CybercrimeCybercrime
CybercrimeSERCOD
 
Social Impacts of Computing Science
Social Impacts of Computing ScienceSocial Impacts of Computing Science
Social Impacts of Computing Sciencemissstevenson01
 
How you can protect your online identity, online privacy and VPNs
How you can protect your online identity, online privacy and VPNsHow you can protect your online identity, online privacy and VPNs
How you can protect your online identity, online privacy and VPNsIulia Porneala
 
Week34_The Internet, Digital Media, and Media Convergence (Chapter2) (1).pdf
Week34_The Internet, Digital Media, and Media Convergence (Chapter2) (1).pdfWeek34_The Internet, Digital Media, and Media Convergence (Chapter2) (1).pdf
Week34_The Internet, Digital Media, and Media Convergence (Chapter2) (1).pdfPhngLinhTrn33
 
Individual and Technology
Individual and TechnologyIndividual and Technology
Individual and TechnologyMr Shipp
 
Tor as an Attack Tool: Penetrating Firewalls in Repressive Regimes
Tor as an Attack Tool: Penetrating Firewalls in Repressive RegimesTor as an Attack Tool: Penetrating Firewalls in Repressive Regimes
Tor as an Attack Tool: Penetrating Firewalls in Repressive RegimesD. Hill
 
Cyber Criminals,Classifications of Cybercrimes aat.pptx
Cyber Criminals,Classifications of Cybercrimes aat.pptxCyber Criminals,Classifications of Cybercrimes aat.pptx
Cyber Criminals,Classifications of Cybercrimes aat.pptxAshwini831102
 

Similar to Internet Censorship (20)

Internet Content Regulation: What it means in 2010
Internet Content Regulation: What it means in 2010Internet Content Regulation: What it means in 2010
Internet Content Regulation: What it means in 2010
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
International internet governance
International internet governanceInternational internet governance
International internet governance
 
Sopa (stop online piracy act)
Sopa (stop online piracy act)Sopa (stop online piracy act)
Sopa (stop online piracy act)
 
Digital Repression and Techno-Authoritarianism
Digital Repression and Techno-AuthoritarianismDigital Repression and Techno-Authoritarianism
Digital Repression and Techno-Authoritarianism
 
The State Department and Net Freedom: A year of great challenges & opportunities
The State Department and Net Freedom: A year of great challenges & opportunitiesThe State Department and Net Freedom: A year of great challenges & opportunities
The State Department and Net Freedom: A year of great challenges & opportunities
 
Censorship and Regulation of the Internet
Censorship and Regulation of the InternetCensorship and Regulation of the Internet
Censorship and Regulation of the Internet
 
Misuse of computer
Misuse of computerMisuse of computer
Misuse of computer
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Social Impacts of Computing Science
Social Impacts of Computing ScienceSocial Impacts of Computing Science
Social Impacts of Computing Science
 
How you can protect your online identity, online privacy and VPNs
How you can protect your online identity, online privacy and VPNsHow you can protect your online identity, online privacy and VPNs
How you can protect your online identity, online privacy and VPNs
 
cyber crime
cyber crimecyber crime
cyber crime
 
E commerce
E commerce E commerce
E commerce
 
Week34_The Internet, Digital Media, and Media Convergence (Chapter2) (1).pdf
Week34_The Internet, Digital Media, and Media Convergence (Chapter2) (1).pdfWeek34_The Internet, Digital Media, and Media Convergence (Chapter2) (1).pdf
Week34_The Internet, Digital Media, and Media Convergence (Chapter2) (1).pdf
 
dark-web-and-cybercrime.pdf
dark-web-and-cybercrime.pdfdark-web-and-cybercrime.pdf
dark-web-and-cybercrime.pdf
 
Individual and Technology
Individual and TechnologyIndividual and Technology
Individual and Technology
 
Chapter 5_dp-_pertemuan_7_8
 Chapter 5_dp-_pertemuan_7_8 Chapter 5_dp-_pertemuan_7_8
Chapter 5_dp-_pertemuan_7_8
 
Tor as an Attack Tool: Penetrating Firewalls in Repressive Regimes
Tor as an Attack Tool: Penetrating Firewalls in Repressive RegimesTor as an Attack Tool: Penetrating Firewalls in Repressive Regimes
Tor as an Attack Tool: Penetrating Firewalls in Repressive Regimes
 
Cyber Criminals,Classifications of Cybercrimes aat.pptx
Cyber Criminals,Classifications of Cybercrimes aat.pptxCyber Criminals,Classifications of Cybercrimes aat.pptx
Cyber Criminals,Classifications of Cybercrimes aat.pptx
 

Recently uploaded

Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...gurkirankumar98700
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilV3cube
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 

Recently uploaded (20)

Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of Brazil
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 

Internet Censorship

  • 1. Who determines what is right and wrong online?
  • 2.
  • 3. Direct Government Censorship The most easily recognizable form of censorship is when the government directly interferes with the internet. • Examples • Interfering with physical servers, internet service providers (ISPs), or companies within state jurisdiction • Blocking access to specific sites or information • Broad filtering or monitoring of communications, news, or other information • Some participating states • China, Iran, Syria, and North Korea
  • 4. Corporate Censorship When companies or web properties voluntarily restrict certain content to protect their corporate interests. • Examples • Blocking content that they fear may lead to lawsuits • Blocking content that they feel undermines their business goals • Reducing company exposure to unwanted content online; i.e. PR controversy, social media properties, community comments, published hacks, etc. • Some participating companies • Apple, YouTube, Facebook
  • 5. Corporations or Special Interest Groups + Government The most common form of internet censorship in the Western world is a blended approach where groups lobby government to enact laws beneficial to them. • Examples • SOPA/PIPA/ACTA/DMCA – copyright laws giving a company the legal grounds to sue a company or individual, pressure them to remove certain content, or block access to certain websites • Demonization of certain activities in the press as hacking, piracy, etc. • Participating countries and organizations • Pervasive throughout the Western world
  • 6.
  • 7. Online Protest Real-world protest is for the most part a defined activity, but online protest exists in a grey area. What is and isn’t legal? What constitutes protest vs. criminal activity? • Examples • Anonymous – a decentralized group that does participate in hacking at times, but is primarily a means of organizing both online and real-world protest • LOIC (Low Orbit Ionic Cannon) – a program often utilized by Anonymous and others to perform dDOS attacks • dDOS attacks temporarily overwhelm servers but do no actual damage, much as a real-world protest may do so with a physical space.
  • 8. Why does this matter?
  • 9.
  • 11. Why does this matter? The internet is still very young, and how it is defined today will impact it for decades to come.
  • 12.
  • 13. Why does this matter? The internet is global and we are all a part of it no matter which country we live in. And if one country enacts strict laws, it would disrupt the global net infrastructure by forcing traffic to route around it, if even possible depending on the destination.