An overview of how mobile phones, mobile web, and the internet ("MMI" -- my term) as tools for freedom of expression are protected or challenged in the EU and in the South Caucasus (Armenia, Azerbaijan, Georgia), including some key questions on the future of MMI as tools to support democracy and/or self-determination.
The Next Six Months in Myanmar: Stakeholder Risk in the Telecoms SectorEthical Sector
Vicky Bowman gave a keynote analysis at Myanmar Connect 2015 in Naypyidaw on 16 September. Her presentation focussed on the stakeholder risks for the ICT sector during the coming six months before and after Myanmar’s election on 8 November. She previewed the ICT Sector-wide Impact Assessment, recently completed by MCRB, which will be published on 24 September, and identified some of the main online and offline human rights impacts of the sector which will feature jn the SWIA. She particularly highlighted the question of ‘network shutdown’ and the increased risk of this as a result of the election and its aftermath. She identified commitments which the government could make, as well as steps companies should take to prepare themselves for this risk.
The Next Six Months in Myanmar: Stakeholder Risk in the Telecoms SectorEthical Sector
Vicky Bowman gave a keynote analysis at Myanmar Connect 2015 in Naypyidaw on 16 September. Her presentation focussed on the stakeholder risks for the ICT sector during the coming six months before and after Myanmar’s election on 8 November. She previewed the ICT Sector-wide Impact Assessment, recently completed by MCRB, which will be published on 24 September, and identified some of the main online and offline human rights impacts of the sector which will feature jn the SWIA. She particularly highlighted the question of ‘network shutdown’ and the increased risk of this as a result of the election and its aftermath. She identified commitments which the government could make, as well as steps companies should take to prepare themselves for this risk.
MEDIA AND INFORMATION LITERACY (MIL)
LESSON 5 : DIFFERENT TYPES OF MEDIA
After this lesson the learner will be able to . . . .
•classifies contents of different media types
•defines media convergence through current examples
•discusses to class on how a particular individual/ or society is portrayed in public using different type of media
MEDIA AND INFORMATION LITERACY (MIL)
LESSON 5 : DIFFERENT TYPES OF MEDIA
After this lesson the learner will be able to . . . .
•classifies contents of different media types
•defines media convergence through current examples
•discusses to class on how a particular individual/ or society is portrayed in public using different type of media
Demystifying Android's Bluetooth Low Energy at MCE^3 ConfPawel Urban
Presentation by Paweł Urban & Dariusz Seweryn.
Programming with a hardware in mind is fun. IoT is no longer a future but it's around us and Bluetooth programming became our reality. We'll tell you how to play with it without having a headache, using reactive concepts.
Slides for plenary talk on "Content Management - Buy or Build?" given by Ricky Ranking and Gareth McLeese at the IWMW 2003 event held at the University of Kent on 11-13 June 2003.
See http://www.ukoln.ac.uk/web-focus/events/workshops/webmaster-2003/sessions/#talk-6
IWMW 2003 b4 QA for web sites (5 - The QA Focus Perspective)IWMW
Slides (5 - The QA Focus Perspective) used in workshop session B4 on "Catching Mistakes: QA for your Web site" at the IWMW 2003 event held at the University of Kent on 11-13 June 2003.
See http://www.ukoln.ac.uk/web-focus/events/workshops/webmaster-2003/sessions/index.html#workshops-b
P2594 Relation Sandro Suzart SUZART GOOGLE INC United States on Demons...Sandro Suzart
relationship between Sandro Suzart SUZART GOOGLE INC and United States on Demonstrations 2013 and Impeachments of 22 governments Relation, Sandro Suzart, SUZART, GOOGLE INC, United States on Demonstrations countries IMPEACHMENT GOOGLE INC
P2594 2 Relation between Sandro Suzart, SUZART, GOOGLE INC, United Stat...Sandro Santana
Sandro Suzart, SUZART, GOOGLE INC and United States on relationship among Demonstrations, 2013. IMPEACHMENTS of 22 governments, Relation, Sandro Suzart, SUZART, GOOGLE INC, United States, Demonstrations countries IMPEACHMENT, GOOGLE INC, the torture suffered by Sandro Suzart, Genocide in Egypt and Lybia.
The ongoing debate in the EU and the US over the shape of the Internet
focuses mainly on the technological and economical aspects of the issue. This paper
is meant to be an introduction to the debate on the impact of the network neutrality
on free speech and the right to information in the field of political science. The author
tries to identify potential threats from the economic, technological and political perspective, as they are strongly interconnected.
Fundamental human rights can benefit from enforcing network neutrality regulations; however, a much more important issue is related to the question of what would
happen to the freedom of speech and the right of information if the regulations were
gone.
Article 19 of the Universal Declaration of Human Rights, states: “Everyone has the right to freedom of opinion and expression; this right includes freedom to hold opinions without interference and to seek, receive and impart information and ideas through any media and regardless of frontiers.”
World Radio Day 2024 marks 100 years of radio, a period in which it has become the medium that is arguably closest to human hearts and minds, providing news, entertainment and education in all corners of the world. It satisfies our need to be informed both for day-to-day decision-making and in times of emergency and crisis. Over the past century, radio has proved itself as a crucial medium in maintaining freedom of opinion and expression, often being the only one still up and running in times of crisis.
Studies have repeatedly shown that radio has the greatest trust, with most citizens rating it above television, the internet, social networks or the written press. Radio is a triumph of accessibility, immediacy and intimacy, and there’s a strong public-interest case for protecting it and our access to it.
We believe that remaining easily accessible to all people, in all places, regardless of how they receive radio means using terrestrial broadcast networks (both analogue and digital) – still relied upon by the majority of listeners globally – and fostering online access to radio that is just as democratic and open.
Cars are a particular concern, consistently among the most popular locations for radio listening. Whether it is terrestrial broadcast or internet, radio in cars should not just be easy to find, it must be impossible to miss.
Information is a public good and a shared resource for all of humanity. Radio has its place in the digital transformation of the information ecosystem, complementing the internet and digital platforms. The evolution of communication technologies should advance people’s right to receive information and ideas through any media – instead of regressing it.
We call upon governments, regulatory bodies, the technology and automotive industries, and all members of the global radio community to put safeguards in place to ensure that radio continues to thrive; to protect the free and unfettered access radio provides to a plurality of opinions and to trusted information; to allow radio to continue to help communities and all minority language speakers to
receive information and participate in democratic processes; and to ensure radio remains available to all people regardless of their financial means or personal circumstances.
An Overview of the Battle for the Control of the InternetDibussi Tande
Presentation to a joint/plenary session of the 16th Highway Africa Conference and the 3rd World Conference of the Global Forum for Media Development (GFMD) in Grahamstown, South Africa, September 10, 2012.
Will the Internet Be Bad for Democracy Eli M. NoamProfessor a.docxalanfhall8953
Will the Internet Be Bad for Democracy?
Eli M. Noam
Professor and Finance and Economics
Director, Columbia Institute for Tele-Information
Graduate School of Business, Columbia University
November 2001, Camden, Maine
“Digital Citizens appear startlingly close to the Jeffersonian ideal--they are informed, outspoken, participatory, passionate about freedom, proud of their culture, and committed to the free nation in which it has evolved…”
“…Politicians shouldn’t even dream of talking to [Digital Citizens] about the past – or the present for that matter.Digital Citizens don’t care about today; they want to know about tomorrow…”
(Wired Magazine 1997)
When the media history of the 20th Century will be written, the Internet will be seen asitsmajor contribution. Television, telephone, and computers will be viewed as its early precursors, merging and converging into the new medium just as radio and film did into TV. The Internet’s impact on culture, business, and politics will be vast, for sure. Where will it take us? To answer that question is difficult, because the Internet is not simply a set of interconnecting links and protocols connecting packet switchednetworks, but it is also a construct of imagination, an inkblot test into which everybody projects their desires, fears and fantasies.
Some see enlightenment and education. Others see pornography and gambling. Some see sharing and collaboration; others see e-commerce and profits. Controversies abound on most aspects of the Internet. Yet when it comes to its impact on democracy process, the answer seems unanimous.[1] The Internet is good for democracy. It creates digital citizens (Wired 1997) active in the vibrant teledemocracy (Etzioni, 1997) of the Electronic Republic (Grossman 1995) in the
[footnoteRef:1]Digital Nation (Katz 1992). Is there no other side to this question? Is the answer so positively positive? [1: [1]Exceptions are Bimber (1998) and Blau (1998)]
The reasons why the Internet is supposed to strengthen democracy include the following:
1.The Internet lowers the entry barriers to political participation.
2.It strengthens political dialogue.
3.It creates community.
4.It cannot be controlled by government.
5.It increases voting participation.
6.Itpermits closer communication with officials.
7.It spreads democracy world-wide.
Each of the propositions in this utopian populist, view, which might be called is questionable. But they are firmly held by the Internet founder generation, by the industry that now operates the medium, by academics from Negroponte (1995) to Dahl (1989), by gushy news media, and by a cross-party set of politicians who wish to claim the future, from Gore to Gingrich, from Bangemann to Blair.
I will argue, in contrast, that the Internet, far from helping democracy, is a threat to it. And I am taking this view as an enthusiast, not a critic. But precisely because the Internet is powerful and revolutionary, it also affects, and even destroys, all.
Similar to Digital Communications and Democracy (20)
Mountain Farm Community Grocery fills the need for a nonprofit grocery in McDowell County, WV to ensure a grocery is present, combat the local food desert and junk food swamp, and support local and regional farmers and value-added producers.
Energy Extractive Communities, Democracy, and "Economic Diversification"Crystal Cook Marshall
Hinterland energy extractive communities (those places located far outside urban areas) do more than their share of society's heavy lifting in terms of production but are also often less democratic. Economic diversification is often touted as a panacea for "fixing" these communities; however, it is often not a well-defined construct. Maybe other policy models are more applicable.
Concerned about the flow of young people, money, and talent away from your community? Want new ideas about how to keep those assets local? This presentation focuses on how communities in economic decline, and communities in central Appalachia specifically, can keep kids, cash, and culture in the community. It includes overarching theory, examples, and lists of resources.
Concerned about the flow of young people, money, and talent away from your community? Want new ideas about how to keep those assets local? This presentation focuses on how communities in economic decline, and communities in central Appalachia specifically, can keep kids, cash, and culture in the community. It includes overarching theory, examples, and lists of resources.
An overview appropriate for non-profit and academic environments on the fundraising cycle, how to raise money, where to start when looking for grants. A very appropriate presentation for fundraising trainings and newcomers to fundraising/grant-seeking. Fun slide at the beginning that shows how fundraising is like dating to find a spouse.
Connector Corner: Automate dynamic content and events by pushing a buttonDianaGray10
Here is something new! In our next Connector Corner webinar, we will demonstrate how you can use a single workflow to:
Create a campaign using Mailchimp with merge tags/fields
Send an interactive Slack channel message (using buttons)
Have the message received by managers and peers along with a test email for review
But there’s more:
In a second workflow supporting the same use case, you’ll see:
Your campaign sent to target colleagues for approval
If the “Approve” button is clicked, a Jira/Zendesk ticket is created for the marketing design team
But—if the “Reject” button is pushed, colleagues will be alerted via Slack message
Join us to learn more about this new, human-in-the-loop capability, brought to you by Integration Service connectors.
And...
Speakers:
Akshay Agnihotri, Product Manager
Charlie Greenberg, Host
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf91mobiles
91mobiles recently conducted a Smart TV Buyer Insights Survey in which we asked over 3,000 respondents about the TV they own, aspects they look at on a new TV, and their TV buying preferences.
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualityInflectra
In this insightful webinar, Inflectra explores how artificial intelligence (AI) is transforming software development and testing. Discover how AI-powered tools are revolutionizing every stage of the software development lifecycle (SDLC), from design and prototyping to testing, deployment, and monitoring.
Learn about:
• The Future of Testing: How AI is shifting testing towards verification, analysis, and higher-level skills, while reducing repetitive tasks.
• Test Automation: How AI-powered test case generation, optimization, and self-healing tests are making testing more efficient and effective.
• Visual Testing: Explore the emerging capabilities of AI in visual testing and how it's set to revolutionize UI verification.
• Inflectra's AI Solutions: See demonstrations of Inflectra's cutting-edge AI tools like the ChatGPT plugin and Azure Open AI platform, designed to streamline your testing process.
Whether you're a developer, tester, or QA professional, this webinar will give you valuable insights into how AI is shaping the future of software delivery.
DevOps and Testing slides at DASA ConnectKari Kakkonen
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
JMeter webinar - integration with InfluxDB and GrafanaRTTS
Watch this recorded webinar about real-time monitoring of application performance. See how to integrate Apache JMeter, the open-source leader in performance testing, with InfluxDB, the open-source time-series database, and Grafana, the open-source analytics and visualization application.
In this webinar, we will review the benefits of leveraging InfluxDB and Grafana when executing load tests and demonstrate how these tools are used to visualize performance metrics.
Length: 30 minutes
Session Overview
-------------------------------------------
During this webinar, we will cover the following topics while demonstrating the integrations of JMeter, InfluxDB and Grafana:
- What out-of-the-box solutions are available for real-time monitoring JMeter tests?
- What are the benefits of integrating InfluxDB and Grafana into the load testing stack?
- Which features are provided by Grafana?
- Demonstration of InfluxDB and Grafana using a practice web application
To view the webinar recording, go to:
https://www.rttsweb.com/jmeter-integration-webinar
UiPath Test Automation using UiPath Test Suite series, part 4DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 4. In this session, we will cover Test Manager overview along with SAP heatmap.
The UiPath Test Manager overview with SAP heatmap webinar offers a concise yet comprehensive exploration of the role of a Test Manager within SAP environments, coupled with the utilization of heatmaps for effective testing strategies.
Participants will gain insights into the responsibilities, challenges, and best practices associated with test management in SAP projects. Additionally, the webinar delves into the significance of heatmaps as a visual aid for identifying testing priorities, areas of risk, and resource allocation within SAP landscapes. Through this session, attendees can expect to enhance their understanding of test management principles while learning practical approaches to optimize testing processes in SAP environments using heatmap visualization techniques
What will you get from this session?
1. Insights into SAP testing best practices
2. Heatmap utilization for testing
3. Optimization of testing processes
4. Demo
Topics covered:
Execution from the test manager
Orchestrator execution result
Defect reporting
SAP heatmap example with demo
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.
Securing your Kubernetes cluster_ a step-by-step guide to success !KatiaHIMEUR1
Today, after several years of existence, an extremely active community and an ultra-dynamic ecosystem, Kubernetes has established itself as the de facto standard in container orchestration. Thanks to a wide range of managed services, it has never been so easy to set up a ready-to-use Kubernetes cluster.
However, this ease of use means that the subject of security in Kubernetes is often left for later, or even neglected. This exposes companies to significant risks.
In this talk, I'll show you step-by-step how to secure your Kubernetes cluster for greater peace of mind and reliability.
Elevating Tactical DDD Patterns Through Object CalisthenicsDorra BARTAGUIZ
After immersing yourself in the blue book and its red counterpart, attending DDD-focused conferences, and applying tactical patterns, you're left with a crucial question: How do I ensure my design is effective? Tactical patterns within Domain-Driven Design (DDD) serve as guiding principles for creating clear and manageable domain models. However, achieving success with these patterns requires additional guidance. Interestingly, we've observed that a set of constraints initially designed for training purposes remarkably aligns with effective pattern implementation, offering a more ‘mechanical’ approach. Let's explore together how Object Calisthenics can elevate the design of your tactical DDD patterns, offering concrete help for those venturing into DDD for the first time!
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
Epistemic Interaction - tuning interfaces to provide information for AI support
Digital Communications and Democracy
1. Digital Communications and Democracy An Assessment through the Prisms of EU Regulations and the Eastern Partnership Countries of the South Caucasus In light of the movements now happening in the Middle East, this presentation I made in Dec. 2010 seems particularly relevant. It compares regulatory language on technology for freedom of expression with actual practices, particularly comparing EU countries and the countries of the South Caucasus (neighbor countries to the Middle East).
2. What does technology have to do with freedom of expression? What is and isn’t protected through regulation and enforcement? How has technology possibly changed whether that matters? We have all heard of this guy…
3. The Lenses Technologies for democracy Democracy = Free speech & People-powered movements FREEDOM OF EXPRESSION Digital Communications Technology Mobile phones, mobile web, the internet MMI (my term for mobile web, mobile phone, and internet) This document references supporting technology to support people-powered movements. I call these “technologies for democracy.”
4. Where do people need powered? The South Caucasus are snug between Russia to the North, Turkey to the West, Iran to the South, and Central Asia to the East.
5.
6. Why do the people need democracy? Who doesn’t need democracy? One complication is the dozens of ethnicities, languages, and the # of standing conflicts [Georgia with Russia; Armenia with Azerbaijan; Turkey with Armenia]. Many borders are closed and the region is locked up due to conflict.
7. The region is at a geographic center between larger powers and competing spheres of influence: the EU (Turkey/Black Sea Region)-Middle East EU-Russia American (Turkey/NATO)-Russia American (Turkey/NATO)-Iran Christian-Moslem Turkic-Slavic Turkic-Persian NATO-the Collective Security Treaty Organization (Russia’s answer to NATO) access to Europe (Black Sea)-no direct access resource/land rich-desiccated
10. Q: What did I find? A: Surprises The Constitutions of the three countries of the South Caucasus provide as much protection of freedom of expression via MMI as does the EU’s Treaty of Lisbon (The Charter of Fundamental Rights of the European Union ). Both EU member states and the South Caucasus countries lag in protection and enforcement (as do most countries most places). No country is all that good at stopping the flow of information channeled through MMI. Frankly, the South Caucasus countries are not that much more severe in their on-the-ground suppression/oppression of MMI for freedom of expression than are some EU countries
11. The Charter of Fundamental Rights of the European Union The South Caucasus Article 11 Freedom of expression and information 1. Everyone has the right to freedom of expression. This right shall include freedom to hold opinions and to receive and impart information and ideas without interference by public authority and regardless of frontiers.* 2. The freedom and pluralism of the media shall be respected. * From the Universal Declaration of Human Rights (Armenia) Everyone shall have the right to freedom of expression including freedom to search for, receive and impart information and ideas by any means of information regardless of the state frontiers.* (Azerbaijan) Everyone is free to look for, acquire, transfer, prepare and distribute information. (Georgia) Everyone has the right to freely receive and impart information, to express and impart his/her opinion orally, in writing or by in any other means.
12. Enforcement and protection lag in EU Member States, too, not only in the South Caucasus countries European Data Retention Directive—kept people’s data on file way too long Swedish authority to national security—logs people’s info a long time Uneven enforcement in Poland Raids on online content in Germany Photocopies of passports in Italy when you use an internet cafe Internet blackout during election protests in 2008 in Armenia Headlines around the world with arrest of 2 bloggers in Azerbaijan .ru block during war between Georgia and Russia I would have anticipated this, but not the EU issues…
13. MMI & liberty & security. Here is why the balance is hard (from the Global Internet Liberty Campaign’s report to the Open Society Institute) Global -- The Internet provides immediate access to information from around the world. With simple e-mail, it is as easy to send a message to another continent as it is to the building next door. Through the World Wide Web, thousands of newspapers and tens of thousands of other information sources are available from around the world. While access is still not available to most of the world's population, the fastest rates of growth are in less developed countries. Decentralized -- The Internet was designed by purpose to be decentralized, to work without gatekeepers, and to accommodate multiple, competitive access points. The absence of gatekeepers of the kind that exist in broadcasting, cable television, or satellite transmission, the availability of numerous hosting sites, and the irrelevance of geographic location mean that material can almost always be published outside the control of governments, monopolies or oligopolies. Open -- The Internet has low barriers to access. Service can be priced very inexpensively. The costs of creating and disseminating content are extremely low. Because of the Internet, anybody who has a computer and a modem can be a publisher -- a digital Gutenberg. Abundant -- The digitization of information and the ability to transmit it over the telephone network, combined with the decentralized nature of the Internet, mean that the Internet has essentially unlimited capacity to hold information. In economic terms, the marginal cost of adding another web site, sending another email message, or posting to a newsgroup is essentially zero. Interactive -- The Internet is designed for bi-directional communication: All Internet users can be both speakers and listeners. The Internet allows responsive communication from one-to-one, from one-to-many, and from many-to-one. User-Controlled -- The Internet allows users to exercise far more choice than even cable television or short wave radio. The user can skip from site to site in ways that are not dictated by the content providers or by the access provider. User can control what content reaches their computers. Users can encrypt their communications to hide them from government censors. Infrastructure independent -- The Internet is not linked to any infrastructure other than the telephone system. Dial-up access is available from any telephone that can make an international call. Access to the Internet can also be wireless and satellite based and therefore further removed from effective control of governments.
14. What else? Mobile web is bringing the internet to everyone Mobile phones are making content creation possible for everyone (video, photos, and a worldwide distribution outlet) Mobile phones and mobile web can circumvent state-controlled or approved traditional media (TV, radio, print)
15. What can/could be done? EU proposes global internet codes and standards Hold countries accountable for protection and enforcement of protection HOWEVER Technology may render global standards meaningless because there will always be a technological way around the regulation (e.g. host somewhere else; use mirror sites) OR Technology may make it easier for countries to violate freedom of expression and to block content (more money for tighter tech-based controls) OR The vast expansion of MMI to non-elites (the fastest growing MMI markets) may put the people in control of the mass of information flow for the first time in human history... looks like we may have a winner, folks!
16. Next steps (in the South Caucasus) Some social science research into the actual effects of self-guided information sharing and content creation via MMI on broadening the range of political discourse among non-elites (a people-powered discourse) in the South Caucasus would be useful to illuminate how political repression modulates the influence of MMI. Where freedom of expression is especially limited, repression may trump the democratic potential of MMI. On the other hand, MMI may be most significant where traditional means of expression are most repressed. Also worth examining: the EU’s affect on the political environment of the South Caucasus. As the economic relationship (the first priority of the Eastern Partnership) between the EU and the South Caucasus matures, will the political environment of the South Caucasus become more democratic? What role will MMI play? Will the need to keep the internet open for foreign businesses and for foreigners doing business influence a country’s decisions regarding enforcement or repression of freedom of expression via MMI? Does the market impact freedom of expression and MMI?
17. MMI seems unstoppable… Slipstream Technology Outpaces Privacy (Yet Again) By NATASHA SINGER Published: December 11, 2010 In a similar fashion, the F.T.C.’s report recommends that Internet and mobile app users receive better control over who sees, collects and shares information about their electronic behavior — like, say, the Web sites they peruse or the terms they plug into search engines. Indeed, the commission proposed a “do not track” mechanism that would allow consumers to opt out of “behavioral advertising,” the kind of marketing that tailors ads to a consumer’s personal track record. “The laws haven’t really kept pace with the unbelievable developments,” says Jessica Rich, deputy director of the trade commission’s bureau on consumer protection. Sunday New York Times Feature Articles Dec. 11, 2010 Slipstream Keeping Secrets WikiSafe By SCOTT SHANE Published: December 11, 2010 WASHINGTON — Can the government still keep a secret? In an age of WikiLeaks, flash drives and instant Web postings, leaks have begun to seem unstoppable. Still, there’s been a change. Traditional watchdog journalism, which has long accepted leaked information in dribs and drabs, has been joined by a new counterculture of information vigilantism that now promises disclosures by the terabyte. A bureaucrat can hide a library’s worth of documents on a key fob, and scatter them over the Internet to a dozen countries during a cigarette break. That accounts for how, in the three big WikiLeaks document dumps since July, the usual trickle of leaks became a torrent. All of it, disguised as a Lady Gaga CD, was smuggled out of a military intelligence office, according to government prosecutors, by Pfc. Bradley Manning, a soldier now imprisoned and charged with the leak.
18. How will MMI continue to contribute as a technological tool for self-determination?Does it only make a difference in an atmosphere of restriction? That is, once a place reaches a certain level of freedom, MMI no longer is as impactful a tool to take the country beyond that certain level?
19. Thanks!For more about my research interests and about me, visitwww.crystallallenecook.com