SlideShare a Scribd company logo
Freedom of Access to Information Historical Context Totalitarian States censor at production point, Capitalism censors at distribution point. Censorship & the Apartheid State State gets to decide what you can and cannot read, knowledge is something mediated via security apparatus, not civil society (academia, press, etc)
The IBM Case ,[object Object],[object Object],[object Object],[object Object]
Information wants to be Free ,[object Object],[object Object]
[object Object],Information wants to be Open Source
South Africa's Information Age Constitution ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Privacy ,[object Object],[object Object],[object Object],[object Object],[object Object]
Net Neutrality ,[object Object]
Net Neutrality in Africa ,[object Object],[object Object],[object Object],[object Object],[object Object]
Wikileaks ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Egyptian Revolution ,[object Object],[object Object],[object Object],[object Object]
Privacy under threat ,[object Object],[object Object],[object Object]
The Gigaba Plan ,[object Object],Let's RICA the Internet and build a National firewall like China.
The Blackberry Furore ,[object Object],[object Object]
SA Information Bill ,[object Object],[object Object],[object Object],[object Object]
Low-tech Access solutions ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]

More Related Content

What's hot

Know Your Rights On #Internet
Know Your Rights On #InternetKnow Your Rights On #Internet
Know Your Rights On #InternetHayder Hamzoz
 
Karen Cook: Technology Outspacing Constitution
Karen Cook: Technology Outspacing ConstitutionKaren Cook: Technology Outspacing Constitution
Karen Cook: Technology Outspacing Constitutionmerlyna
 
Americanizing Palestine Through Internet
Americanizing Palestine Through InternetAmericanizing Palestine Through Internet
Americanizing Palestine Through Internet
Yeungnam University
 
Internet censorship by ronak
Internet censorship by ronakInternet censorship by ronak
Internet censorship by ronak
Ronak Karanpuria
 
Open internet in singapore
Open internet in singaporeOpen internet in singapore
Open internet in singapore
Benjamin Ang
 
Internet Censorship across the World
Internet Censorship across the WorldInternet Censorship across the World
Internet Censorship across the World
Nitine
 
Freedom or Control in Virtual Worlds
Freedom or Control in Virtual WorldsFreedom or Control in Virtual Worlds
Freedom or Control in Virtual Worlds
Jyrki Kasvi
 
G&P - Chapter 10 - Info & Tech
G&P - Chapter 10 - Info & TechG&P - Chapter 10 - Info & Tech
G&P - Chapter 10 - Info & Techcyruskarimian
 
Research on Digital Security Act 2018
Research on Digital Security Act 2018Research on Digital Security Act 2018
Research on Digital Security Act 2018
Nilima Tariq
 
e-G8 Summary
e-G8 Summarye-G8 Summary
e-G8 Summary
Simeon Oriko
 
Digital security law security of individual or government
Digital security law security of individual or governmentDigital security law security of individual or government
Digital security law security of individual or government
M S Siddiqui
 
Artificial intelligence governance in the Obama & Trump years
Artificial intelligence governance in the Obama & Trump yearsArtificial intelligence governance in the Obama & Trump years
Artificial intelligence governance in the Obama & Trump years
Adam Thierer
 
Cyber security and prevention in Bangladesh
Cyber security and prevention in BangladeshCyber security and prevention in Bangladesh
Cyber security and prevention in Bangladesh
Rabita Rejwana
 
Internet privacy and laws
Internet privacy and lawsInternet privacy and laws
Internet privacy and laws
jcmonnett
 
Open Data, Open Government
Open Data, Open GovernmentOpen Data, Open Government
Open Data, Open Government
Msifry
 
Freedom of expression
Freedom of expressionFreedom of expression
Freedom of expressionGerwin Ocsena
 
Internetregulationjapan
InternetregulationjapanInternetregulationjapan
Internetregulationjapan
rmackinnon
 

What's hot (20)

Know Your Rights On #Internet
Know Your Rights On #InternetKnow Your Rights On #Internet
Know Your Rights On #Internet
 
Karen Cook: Technology Outspacing Constitution
Karen Cook: Technology Outspacing ConstitutionKaren Cook: Technology Outspacing Constitution
Karen Cook: Technology Outspacing Constitution
 
Americanizing Palestine Through Internet
Americanizing Palestine Through InternetAmericanizing Palestine Through Internet
Americanizing Palestine Through Internet
 
Communications
CommunicationsCommunications
Communications
 
Internet censorship by ronak
Internet censorship by ronakInternet censorship by ronak
Internet censorship by ronak
 
Open internet in singapore
Open internet in singaporeOpen internet in singapore
Open internet in singapore
 
After 9 11
After 9 11After 9 11
After 9 11
 
Internet Censorship across the World
Internet Censorship across the WorldInternet Censorship across the World
Internet Censorship across the World
 
Freedom or Control in Virtual Worlds
Freedom or Control in Virtual WorldsFreedom or Control in Virtual Worlds
Freedom or Control in Virtual Worlds
 
G&P - Chapter 10 - Info & Tech
G&P - Chapter 10 - Info & TechG&P - Chapter 10 - Info & Tech
G&P - Chapter 10 - Info & Tech
 
Research on Digital Security Act 2018
Research on Digital Security Act 2018Research on Digital Security Act 2018
Research on Digital Security Act 2018
 
e-G8 Summary
e-G8 Summarye-G8 Summary
e-G8 Summary
 
Digital security law security of individual or government
Digital security law security of individual or governmentDigital security law security of individual or government
Digital security law security of individual or government
 
Artificial intelligence governance in the Obama & Trump years
Artificial intelligence governance in the Obama & Trump yearsArtificial intelligence governance in the Obama & Trump years
Artificial intelligence governance in the Obama & Trump years
 
Cyber security and prevention in Bangladesh
Cyber security and prevention in BangladeshCyber security and prevention in Bangladesh
Cyber security and prevention in Bangladesh
 
Internet privacy and laws
Internet privacy and lawsInternet privacy and laws
Internet privacy and laws
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Open Data, Open Government
Open Data, Open GovernmentOpen Data, Open Government
Open Data, Open Government
 
Freedom of expression
Freedom of expressionFreedom of expression
Freedom of expression
 
Internetregulationjapan
InternetregulationjapanInternetregulationjapan
Internetregulationjapan
 

Viewers also liked

Программа для матери и ребенка спа-центра Quatre Terres
Программа для матери и ребенка спа-центра Quatre TerresПрограмма для матери и ребенка спа-центра Quatre Terres
Программа для матери и ребенка спа-центра Quatre Terres
Sergey Manvelov
 
Perspective lesson 1zoom
Perspective lesson 1zoomPerspective lesson 1zoom
Perspective lesson 1zoom
Delmacy Cruz Souza
 
Econemp 2-140305160859-phpapp02
Econemp 2-140305160859-phpapp02Econemp 2-140305160859-phpapp02
Econemp 2-140305160859-phpapp02
jose bravo
 
Educational Project for Loreto
Educational Project for LoretoEducational Project for Loreto
Educational Project for Loreto
Jose Luis Tapia
 
2 класс. урок № 3. привет. в зоопарке
2 класс. урок № 3. привет. в зоопарке2 класс. урок № 3. привет. в зоопарке
2 класс. урок № 3. привет. в зоопарке
shpinat
 
Qa chapter 02
Qa chapter 02Qa chapter 02
Qa chapter 02Ann Lunde
 
Foliar Nutrient Resorption and Litterfall Production With Stand Age, Overstor...
Foliar Nutrient Resorption and Litterfall Production With Stand Age, Overstor...Foliar Nutrient Resorption and Litterfall Production With Stand Age, Overstor...
Foliar Nutrient Resorption and Litterfall Production With Stand Age, Overstor...
Amber Brant
 
2 класс. обощающий урок по разделу привет. повторение
2 класс. обощающий урок по разделу привет. повторение2 класс. обощающий урок по разделу привет. повторение
2 класс. обощающий урок по разделу привет. повторение
shpinat
 
Empreendendo na Ilha do Silício
Empreendendo na Ilha do SilícioEmpreendendo na Ilha do Silício
Empreendendo na Ilha do SilícioBruno Ghisi
 
презентация японских продуктов
презентация японских продуктовпрезентация японских продуктов
презентация японских продуктовAndreykireenkov
 
Research present
Research presentResearch present
Research presentNicole D.
 
Customer service february 2012
Customer service february  2012Customer service february  2012
Customer service february 2012
The Art of Service Pty Ltd
 
The How To of Crisis Communications
The How To of Crisis CommunicationsThe How To of Crisis Communications
The How To of Crisis Communications
Council of Manufacturing Associations
 
urbanisation
urbanisationurbanisation
urbanisation
Aditi Sharma
 
Automatic liquid level control of tank system
Automatic liquid level control of tank systemAutomatic liquid level control of tank system
Automatic liquid level control of tank systemFatahillah Ata
 

Viewers also liked (20)

Sirs
SirsSirs
Sirs
 
Copyright info
Copyright infoCopyright info
Copyright info
 
Программа для матери и ребенка спа-центра Quatre Terres
Программа для матери и ребенка спа-центра Quatre TerresПрограмма для матери и ребенка спа-центра Quatre Terres
Программа для матери и ребенка спа-центра Quatre Terres
 
Perspective lesson 1zoom
Perspective lesson 1zoomPerspective lesson 1zoom
Perspective lesson 1zoom
 
Econemp 2-140305160859-phpapp02
Econemp 2-140305160859-phpapp02Econemp 2-140305160859-phpapp02
Econemp 2-140305160859-phpapp02
 
Educational Project for Loreto
Educational Project for LoretoEducational Project for Loreto
Educational Project for Loreto
 
2 класс. урок № 3. привет. в зоопарке
2 класс. урок № 3. привет. в зоопарке2 класс. урок № 3. привет. в зоопарке
2 класс. урок № 3. привет. в зоопарке
 
Qa chapter 02
Qa chapter 02Qa chapter 02
Qa chapter 02
 
Foliar Nutrient Resorption and Litterfall Production With Stand Age, Overstor...
Foliar Nutrient Resorption and Litterfall Production With Stand Age, Overstor...Foliar Nutrient Resorption and Litterfall Production With Stand Age, Overstor...
Foliar Nutrient Resorption and Litterfall Production With Stand Age, Overstor...
 
2 класс. обощающий урок по разделу привет. повторение
2 класс. обощающий урок по разделу привет. повторение2 класс. обощающий урок по разделу привет. повторение
2 класс. обощающий урок по разделу привет. повторение
 
Empreendendo na Ilha do Silício
Empreendendo na Ilha do SilícioEmpreendendo na Ilha do Silício
Empreendendo na Ilha do Silício
 
презентация японских продуктов
презентация японских продуктовпрезентация японских продуктов
презентация японских продуктов
 
Northern lights college
Northern lights collegeNorthern lights college
Northern lights college
 
Abstract
AbstractAbstract
Abstract
 
Research present
Research presentResearch present
Research present
 
Algonquin college
Algonquin collegeAlgonquin college
Algonquin college
 
Customer service february 2012
Customer service february  2012Customer service february  2012
Customer service february 2012
 
The How To of Crisis Communications
The How To of Crisis CommunicationsThe How To of Crisis Communications
The How To of Crisis Communications
 
urbanisation
urbanisationurbanisation
urbanisation
 
Automatic liquid level control of tank system
Automatic liquid level control of tank systemAutomatic liquid level control of tank system
Automatic liquid level control of tank system
 

Similar to #DCI11 Access to Information

DCB1309 - F2_Dark_Net
DCB1309 - F2_Dark_NetDCB1309 - F2_Dark_Net
DCB1309 - F2_Dark_NetPaul Elliott
 
PRIVACY RIGHTS ARE HUMAN RIGHTS (2).pdf
PRIVACY RIGHTS ARE HUMAN RIGHTS (2).pdfPRIVACY RIGHTS ARE HUMAN RIGHTS (2).pdf
PRIVACY RIGHTS ARE HUMAN RIGHTS (2).pdf
linda gichohi
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
Charles Mok
 
Digital Repression and Techno-Authoritarianism
Digital Repression and Techno-AuthoritarianismDigital Repression and Techno-Authoritarianism
Digital Repression and Techno-Authoritarianism
Charles Mok
 
Cyber Crime Essay
Cyber Crime EssayCyber Crime Essay
Privacy reconsidered
Privacy reconsideredPrivacy reconsidered
Privacy reconsidered
Brian Rowe
 
2600 v19 n4 (winter 2002)
2600 v19 n4 (winter 2002)2600 v19 n4 (winter 2002)
2600 v19 n4 (winter 2002)
Felipe Prado
 
Cyberterrorism can be in the form of Information attacks which a.docx
Cyberterrorism can be in the form of Information attacks which a.docxCyberterrorism can be in the form of Information attacks which a.docx
Cyberterrorism can be in the form of Information attacks which a.docx
whittemorelucilla
 
Internet Privacy Essay
Internet Privacy EssayInternet Privacy Essay
Internet Privacy Essay
College Papers Writing Service
 
Essay Cyber Crime
Essay Cyber CrimeEssay Cyber Crime
Digital Surveillance
Digital SurveillanceDigital Surveillance
Digital Surveillance
Natasha Barnett
 
Computer Fraud And Abuse Act Of 1986 (CFA)
Computer Fraud And Abuse Act Of 1986 (CFA)Computer Fraud And Abuse Act Of 1986 (CFA)
Computer Fraud And Abuse Act Of 1986 (CFA)
Kim Moore
 
Technology evolves so fast
Technology evolves so fast Technology evolves so fast
Technology evolves so fast
Jyrki Kasvi
 

Similar to #DCI11 Access to Information (13)

DCB1309 - F2_Dark_Net
DCB1309 - F2_Dark_NetDCB1309 - F2_Dark_Net
DCB1309 - F2_Dark_Net
 
PRIVACY RIGHTS ARE HUMAN RIGHTS (2).pdf
PRIVACY RIGHTS ARE HUMAN RIGHTS (2).pdfPRIVACY RIGHTS ARE HUMAN RIGHTS (2).pdf
PRIVACY RIGHTS ARE HUMAN RIGHTS (2).pdf
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Digital Repression and Techno-Authoritarianism
Digital Repression and Techno-AuthoritarianismDigital Repression and Techno-Authoritarianism
Digital Repression and Techno-Authoritarianism
 
Cyber Crime Essay
Cyber Crime EssayCyber Crime Essay
Cyber Crime Essay
 
Privacy reconsidered
Privacy reconsideredPrivacy reconsidered
Privacy reconsidered
 
2600 v19 n4 (winter 2002)
2600 v19 n4 (winter 2002)2600 v19 n4 (winter 2002)
2600 v19 n4 (winter 2002)
 
Cyberterrorism can be in the form of Information attacks which a.docx
Cyberterrorism can be in the form of Information attacks which a.docxCyberterrorism can be in the form of Information attacks which a.docx
Cyberterrorism can be in the form of Information attacks which a.docx
 
Internet Privacy Essay
Internet Privacy EssayInternet Privacy Essay
Internet Privacy Essay
 
Essay Cyber Crime
Essay Cyber CrimeEssay Cyber Crime
Essay Cyber Crime
 
Digital Surveillance
Digital SurveillanceDigital Surveillance
Digital Surveillance
 
Computer Fraud And Abuse Act Of 1986 (CFA)
Computer Fraud And Abuse Act Of 1986 (CFA)Computer Fraud And Abuse Act Of 1986 (CFA)
Computer Fraud And Abuse Act Of 1986 (CFA)
 
Technology evolves so fast
Technology evolves so fast Technology evolves so fast
Technology evolves so fast
 

Recently uploaded

From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
Product School
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
Product School
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
Product School
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
Elena Simperl
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
DianaGray10
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
RTTS
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Product School
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
Product School
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Tobias Schneck
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
 

Recently uploaded (20)

From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 

#DCI11 Access to Information

  • 1. Freedom of Access to Information Historical Context Totalitarian States censor at production point, Capitalism censors at distribution point. Censorship & the Apartheid State State gets to decide what you can and cannot read, knowledge is something mediated via security apparatus, not civil society (academia, press, etc)
  • 2.
  • 3.
  • 4.
  • 5.
  • 6.
  • 7.
  • 8.
  • 9.
  • 10.
  • 11.
  • 12.
  • 13.
  • 14.
  • 15.