SlideShare a Scribd company logo
1 of 11
Internet Censorship Mike McKenty, Erin Kelly, Nick Lubsen, Pat Walsh
Censorship on Facebook Privacy regarding “News Feed” and/or Personal Information. Content posted or shared Content Monitered
Censorship on Facebook Censoring pictures uploaded/User Interface Inappropriate pictures are banned If posted, facebook automatically blocks viewers from viewing the picture Myspace not strongly controlled, Facebook strongly controlled.
Censorship on Facebook Student-police relationship  Police are permitted to create any fake name they want. Can they convict people for what they post on Facebook? Causes self-censorship or inhibition
Email Censorship Spam programs Block hackers from getting into email. Possibility for these programs to backfire.
Email Censorship Government controlled Allowed to hack into personal accounts. Great debate over this access. Some feel it is an invasion of privacy, others believe it’s to protect the U.S. from foreign invaders.
Email Censorship Bulk email is usually blocked. Advertisements are blocked. Selling email addresses to other companies for money. Precautions for concern of spam.
Censorship Within Google Started in late 1990’s Dramatically risen Controversy in China Google is torn between core values, and profit Censorship is number one barrier
Censorship Within Google Asia and Middle East Google becoming greedy “don’t be evil” philosophy Human rights activist get involved
Censorship Within Google Youtube becoming a problem Renouncing Censorship Google’s growth continues
Video on Internet Censorship http://www.youtube.com/watch?v=XPAvg6CU6sI

More Related Content

What's hot

Privacy issues in social networking
Privacy issues in social networkingPrivacy issues in social networking
Privacy issues in social networkingBryan Tran
 
The Dark Side of Social Media: Privacy Concerns
The Dark Side of Social Media: Privacy ConcernsThe Dark Side of Social Media: Privacy Concerns
The Dark Side of Social Media: Privacy ConcernsCorinne Weisgerber
 
Online Safety Tips for Parents
Online Safety Tips for ParentsOnline Safety Tips for Parents
Online Safety Tips for ParentsKristi Richburg
 
How to keep your teens safe on social media
How to keep your teens safe on social mediaHow to keep your teens safe on social media
How to keep your teens safe on social mediaKwazi Communications
 
Social Media And Privacy October 9 2009
Social Media And Privacy October 9 2009Social Media And Privacy October 9 2009
Social Media And Privacy October 9 2009canadianlawyer
 
Dangers to social media
Dangers to social mediaDangers to social media
Dangers to social mediaRyan Ward
 
Social Media and Media Abuse for Parents
Social Media and Media Abuse for ParentsSocial Media and Media Abuse for Parents
Social Media and Media Abuse for ParentsDave Tinker, CFRE
 
Social media privacy issues
Social media privacy issuesSocial media privacy issues
Social media privacy issuesNousheen Arshad
 
Social media security
Social media securitySocial media security
Social media securityMosoco Ltd
 
Social Network Privacy, Security and Identity:One
Social Network Privacy, Security and Identity:OneSocial Network Privacy, Security and Identity:One
Social Network Privacy, Security and Identity:OneInflection Point Global
 
Social Media for Police Departments
Social Media for Police DepartmentsSocial Media for Police Departments
Social Media for Police DepartmentsTurell Group
 
Kyle Cyber Bullying
Kyle Cyber BullyingKyle Cyber Bullying
Kyle Cyber Bullyinghoskei
 
Social Media Basics: Security Loopholes with Twitter & Other Social Media
Social Media Basics: Security Loopholes with Twitter & Other Social MediaSocial Media Basics: Security Loopholes with Twitter & Other Social Media
Social Media Basics: Security Loopholes with Twitter & Other Social MediaTyler Shields
 
L2 rules of netiquette
L2 rules of netiquetteL2 rules of netiquette
L2 rules of netiquetterowenick
 

What's hot (19)

Privacy issues in social networking
Privacy issues in social networkingPrivacy issues in social networking
Privacy issues in social networking
 
Cyber stalking
Cyber stalking Cyber stalking
Cyber stalking
 
The Dark Side of Social Media: Privacy Concerns
The Dark Side of Social Media: Privacy ConcernsThe Dark Side of Social Media: Privacy Concerns
The Dark Side of Social Media: Privacy Concerns
 
Online Safety Tips for Parents
Online Safety Tips for ParentsOnline Safety Tips for Parents
Online Safety Tips for Parents
 
Social Media Safety Tips
Social Media Safety TipsSocial Media Safety Tips
Social Media Safety Tips
 
How to keep your teens safe on social media
How to keep your teens safe on social mediaHow to keep your teens safe on social media
How to keep your teens safe on social media
 
Social Media And Privacy October 9 2009
Social Media And Privacy October 9 2009Social Media And Privacy October 9 2009
Social Media And Privacy October 9 2009
 
Dangers to social media
Dangers to social mediaDangers to social media
Dangers to social media
 
Social Media and Media Abuse for Parents
Social Media and Media Abuse for ParentsSocial Media and Media Abuse for Parents
Social Media and Media Abuse for Parents
 
Social media privacy issues
Social media privacy issuesSocial media privacy issues
Social media privacy issues
 
cyber stalking
cyber stalking cyber stalking
cyber stalking
 
Social media-threats
Social media-threatsSocial media-threats
Social media-threats
 
Social media security
Social media securitySocial media security
Social media security
 
Social Network Privacy, Security and Identity:One
Social Network Privacy, Security and Identity:OneSocial Network Privacy, Security and Identity:One
Social Network Privacy, Security and Identity:One
 
Social Media for Police Departments
Social Media for Police DepartmentsSocial Media for Police Departments
Social Media for Police Departments
 
Kyle Cyber Bullying
Kyle Cyber BullyingKyle Cyber Bullying
Kyle Cyber Bullying
 
Social Media Basics: Security Loopholes with Twitter & Other Social Media
Social Media Basics: Security Loopholes with Twitter & Other Social MediaSocial Media Basics: Security Loopholes with Twitter & Other Social Media
Social Media Basics: Security Loopholes with Twitter & Other Social Media
 
Stephanie nichole ho
Stephanie nichole hoStephanie nichole ho
Stephanie nichole ho
 
L2 rules of netiquette
L2 rules of netiquetteL2 rules of netiquette
L2 rules of netiquette
 

Viewers also liked

Censorship Powerpoint
Censorship PowerpointCensorship Powerpoint
Censorship Powerpointmmentis117
 
Internet Censorship
Internet CensorshipInternet Censorship
Internet Censorshipqwsny
 
Internet censorship
Internet censorshipInternet censorship
Internet censorshipmateo davis
 
Censorship in Media by Terence J. Grant
Censorship in Media by Terence J. GrantCensorship in Media by Terence J. Grant
Censorship in Media by Terence J. GrantTerence J. Grant
 
Censorship on the Internet
Censorship on the InternetCensorship on the Internet
Censorship on the Internetno0orcom
 
Censorship essay
Censorship essayCensorship essay
Censorship essayOliviaBolt
 
Internet Censorship
Internet CensorshipInternet Censorship
Internet Censorshipbecnicholas
 
Censorship essay (2)
Censorship essay (2)Censorship essay (2)
Censorship essay (2)OliviaBolt
 
G+ do's & don'ts
G+ do's & don'ts G+ do's & don'ts
G+ do's & don'ts Zaydaploon
 
Understanding hate speech within a digital context
Understanding hate speech within a digital contextUnderstanding hate speech within a digital context
Understanding hate speech within a digital contextLeeRoyChetty
 
Internet Censorship across the World
Internet Censorship across the WorldInternet Censorship across the World
Internet Censorship across the WorldNitine
 
internet filtering and government legislation
internet filtering and government legislationinternet filtering and government legislation
internet filtering and government legislationlily_ji
 
10과 internet censorship
10과 internet censorship10과 internet censorship
10과 internet censorshipKyeongah So
 
Aeon management reviews velachery/ aeon Management Chennai
Aeon management  reviews velachery/ aeon Management ChennaiAeon management  reviews velachery/ aeon Management Chennai
Aeon management reviews velachery/ aeon Management ChennaiAEON MANAGEMENT LIMITED
 
Censorship and Media (COMM514): Session #2
Censorship and Media (COMM514): Session #2Censorship and Media (COMM514): Session #2
Censorship and Media (COMM514): Session #2pergam
 

Viewers also liked (20)

Censorship Powerpoint
Censorship PowerpointCensorship Powerpoint
Censorship Powerpoint
 
Internet Censorship
Internet CensorshipInternet Censorship
Internet Censorship
 
Censorship
CensorshipCensorship
Censorship
 
Internet censorship
Internet censorshipInternet censorship
Internet censorship
 
Censorship in Media by Terence J. Grant
Censorship in Media by Terence J. GrantCensorship in Media by Terence J. Grant
Censorship in Media by Terence J. Grant
 
Censorship on the Internet
Censorship on the InternetCensorship on the Internet
Censorship on the Internet
 
Censorship essay
Censorship essayCensorship essay
Censorship essay
 
Internet Censorship
Internet CensorshipInternet Censorship
Internet Censorship
 
Censorship
CensorshipCensorship
Censorship
 
Censorship in Media
Censorship in MediaCensorship in Media
Censorship in Media
 
Media censorship
Media censorshipMedia censorship
Media censorship
 
Censorship essay (2)
Censorship essay (2)Censorship essay (2)
Censorship essay (2)
 
G+ do's & don'ts
G+ do's & don'ts G+ do's & don'ts
G+ do's & don'ts
 
Understanding hate speech within a digital context
Understanding hate speech within a digital contextUnderstanding hate speech within a digital context
Understanding hate speech within a digital context
 
Internet censorship
Internet censorshipInternet censorship
Internet censorship
 
Internet Censorship across the World
Internet Censorship across the WorldInternet Censorship across the World
Internet Censorship across the World
 
internet filtering and government legislation
internet filtering and government legislationinternet filtering and government legislation
internet filtering and government legislation
 
10과 internet censorship
10과 internet censorship10과 internet censorship
10과 internet censorship
 
Aeon management reviews velachery/ aeon Management Chennai
Aeon management  reviews velachery/ aeon Management ChennaiAeon management  reviews velachery/ aeon Management Chennai
Aeon management reviews velachery/ aeon Management Chennai
 
Censorship and Media (COMM514): Session #2
Censorship and Media (COMM514): Session #2Censorship and Media (COMM514): Session #2
Censorship and Media (COMM514): Session #2
 

Similar to Internet Censorship Power Point

Cohoes Jan 13 Cyberbullying
Cohoes Jan 13 CyberbullyingCohoes Jan 13 Cyberbullying
Cohoes Jan 13 Cyberbullyingkschermerhorn
 
Lecture in Empowerment Technologies week 2.pptx
Lecture in Empowerment Technologies week 2.pptxLecture in Empowerment Technologies week 2.pptx
Lecture in Empowerment Technologies week 2.pptxDominicCaling
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber BullyingTeamBanana
 
How big is your digital footprint fall 2012
How big is your digital footprint fall 2012How big is your digital footprint fall 2012
How big is your digital footprint fall 2012kschermerhorn
 
Learn internet governance initiative child online safety by shreedeep rayamaj...
Learn internet governance initiative child online safety by shreedeep rayamaj...Learn internet governance initiative child online safety by shreedeep rayamaj...
Learn internet governance initiative child online safety by shreedeep rayamaj...Shreedeep Rayamajhi
 
Learn internet governance initiative child online safety by shreedeep rayamaj...
Learn internet governance initiative child online safety by shreedeep rayamaj...Learn internet governance initiative child online safety by shreedeep rayamaj...
Learn internet governance initiative child online safety by shreedeep rayamaj...Shreedeep Rayamajhi
 
Disadvantages of Digital Identity
Disadvantages of Digital IdentityDisadvantages of Digital Identity
Disadvantages of Digital IdentityDigital-identity
 
Cyber bullyingchurch
Cyber bullyingchurchCyber bullyingchurch
Cyber bullyingchurchJack Jones
 
Kevin Cullen Cyber Bullying
Kevin Cullen Cyber BullyingKevin Cullen Cyber Bullying
Kevin Cullen Cyber BullyingKevin
 
Social media is a waste of time
Social media is a waste of timeSocial media is a waste of time
Social media is a waste of timeHamseOmer1
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullyingkpwillia
 
Post 1CyberstalkingCyberstalking is defined as the online st.docx
Post 1CyberstalkingCyberstalking is defined as the online st.docxPost 1CyberstalkingCyberstalking is defined as the online st.docx
Post 1CyberstalkingCyberstalking is defined as the online st.docxstilliegeorgiana
 

Similar to Internet Censorship Power Point (20)

Media Law
Media LawMedia Law
Media Law
 
Cohoes Jan 13 Cyberbullying
Cohoes Jan 13 CyberbullyingCohoes Jan 13 Cyberbullying
Cohoes Jan 13 Cyberbullying
 
Stephanie nichole ho
Stephanie nichole hoStephanie nichole ho
Stephanie nichole ho
 
Lecture in Empowerment Technologies week 2.pptx
Lecture in Empowerment Technologies week 2.pptxLecture in Empowerment Technologies week 2.pptx
Lecture in Empowerment Technologies week 2.pptx
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullying
 
How big is your digital footprint fall 2012
How big is your digital footprint fall 2012How big is your digital footprint fall 2012
How big is your digital footprint fall 2012
 
Learn internet governance initiative child online safety by shreedeep rayamaj...
Learn internet governance initiative child online safety by shreedeep rayamaj...Learn internet governance initiative child online safety by shreedeep rayamaj...
Learn internet governance initiative child online safety by shreedeep rayamaj...
 
Learn internet governance initiative child online safety by shreedeep rayamaj...
Learn internet governance initiative child online safety by shreedeep rayamaj...Learn internet governance initiative child online safety by shreedeep rayamaj...
Learn internet governance initiative child online safety by shreedeep rayamaj...
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Boushrat 9 a
Boushrat   9 aBoushrat   9 a
Boushrat 9 a
 
Disadvantages of Digital Identity
Disadvantages of Digital IdentityDisadvantages of Digital Identity
Disadvantages of Digital Identity
 
Cyber bullyingchurch
Cyber bullyingchurchCyber bullyingchurch
Cyber bullyingchurch
 
Negative effects of Facebook Use
Negative effects of Facebook UseNegative effects of Facebook Use
Negative effects of Facebook Use
 
Kevin Cullen Cyber Bullying
Kevin Cullen Cyber BullyingKevin Cullen Cyber Bullying
Kevin Cullen Cyber Bullying
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Social media is a waste of time
Social media is a waste of timeSocial media is a waste of time
Social media is a waste of time
 
Cyberbullying and Cybercrime
Cyberbullying and CybercrimeCyberbullying and Cybercrime
Cyberbullying and Cybercrime
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Facebook
FacebookFacebook
Facebook
 
Post 1CyberstalkingCyberstalking is defined as the online st.docx
Post 1CyberstalkingCyberstalking is defined as the online st.docxPost 1CyberstalkingCyberstalking is defined as the online st.docx
Post 1CyberstalkingCyberstalking is defined as the online st.docx
 

Recently uploaded

FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxnull - The Open Security Community
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDGMarianaLemus7
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 

Recently uploaded (20)

FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
The transition to renewables in India.pdf
The transition to renewables in India.pdfThe transition to renewables in India.pdf
The transition to renewables in India.pdf
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDG
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 

Internet Censorship Power Point

  • 1. Internet Censorship Mike McKenty, Erin Kelly, Nick Lubsen, Pat Walsh
  • 2. Censorship on Facebook Privacy regarding “News Feed” and/or Personal Information. Content posted or shared Content Monitered
  • 3. Censorship on Facebook Censoring pictures uploaded/User Interface Inappropriate pictures are banned If posted, facebook automatically blocks viewers from viewing the picture Myspace not strongly controlled, Facebook strongly controlled.
  • 4. Censorship on Facebook Student-police relationship Police are permitted to create any fake name they want. Can they convict people for what they post on Facebook? Causes self-censorship or inhibition
  • 5. Email Censorship Spam programs Block hackers from getting into email. Possibility for these programs to backfire.
  • 6. Email Censorship Government controlled Allowed to hack into personal accounts. Great debate over this access. Some feel it is an invasion of privacy, others believe it’s to protect the U.S. from foreign invaders.
  • 7. Email Censorship Bulk email is usually blocked. Advertisements are blocked. Selling email addresses to other companies for money. Precautions for concern of spam.
  • 8. Censorship Within Google Started in late 1990’s Dramatically risen Controversy in China Google is torn between core values, and profit Censorship is number one barrier
  • 9. Censorship Within Google Asia and Middle East Google becoming greedy “don’t be evil” philosophy Human rights activist get involved
  • 10. Censorship Within Google Youtube becoming a problem Renouncing Censorship Google’s growth continues
  • 11. Video on Internet Censorship http://www.youtube.com/watch?v=XPAvg6CU6sI