Internet filtering and censorship is common in the Middle East and North Africa region. Governments use a variety of methods to control access including laws restricting media, surveillance of internet cafes, and monitoring of online activity. Internet use is growing due to improving infrastructure and a youthful population, but censorship issues continue as governments block content they deem offensive or threatening and imprison bloggers and journalists. Debate over censorship and online freedoms is ongoing as both advocates and opponents seek to challenge or strengthen controls.
This document analyzes Lebanon's 2009 draft law regulating service provider licensing. The analysis was prepared for Schools Online, an NGO working to establish internet learning centers. The draft law aimed to liberalize Lebanon's telecommunications sector and encourage competition by opening it up to private participation. However, the analysis notes weaknesses like inadequate broadband capacity that hindered reliable, affordable internet access and perpetuated a digital divide. The document provides background on Lebanon's telecom sector and issues relevant to Schools Online, and will inform their decision to operate in Lebanon.
This document discusses the regulatory regime of the internet in Malaysia. It provides an overview of how the internet was initially unregulated but licensing requirements were introduced with the Communications and Multimedia Act 1998. It also discusses Malaysia's policy of no censorship of the internet, though some websites have been blocked and individuals prosecuted for unlawful content. The document examines how laws like the Computer Crimes Act and CMA are used to regulate online content within this framework, seeking to understand the interplay between no censorship and regulation of the internet in Malaysia.
30 recent Internet and Technology developments you may have missed
from – and/or potentially impacting on - Qatar and the Middle East, curated by ictQATAR's Damian Radcliffe.
The document discusses the Virgin Islands Next Generation Network (viNGN) and its mission to provide high-speed fiber optic broadband services to the US Virgin Islands. viNGN aims to transform the territory by serving as a catalyst for economic growth through technology and improving quality of life. It received federal funding through four grants to build infrastructure, provide public computer centers, and promote broadband adoption. The summaries highlight how viNGN is working to improve broadband access and position the USVI as a technology leader in the Caribbean by building an all fiber-optic network.
Social media facts - South Korea by Digital Junglehearqian
South Korea has a highly connected population with widespread internet access and fast speeds. Social media is widely used, with top platforms including Naver and Daum which host popular blogs, as well as me2DAY and Cyworld which are leading microblogging and social networking sites respectively. Video and instant messaging are also popular online activities for South Koreans. The government has strongly supported internet infrastructure development resulting in South Korea's high rates of connectivity.
Mobile phones, human rights and social justice in africaDr Lendy Spires
This document summarizes research conducted on the use of mobile phones by civil society organizations in Africa for human rights and social justice work. Over 50 organizations were identified that are using mobile phones for communication, networking, advocacy and services, though the actual number is likely much higher. While mobile phones have enabled unprecedented connectivity, organizations still face challenges like high costs, lack of electricity in rural areas, and limited technical capacity. The workshop this document refers to aims to help organizations overcome isolation, share experiences using mobile technology, and establish an ongoing support network.
This document analyzes Lebanon's 2009 draft law regulating service provider licensing. The analysis was prepared for Schools Online, an NGO working to establish internet learning centers. The draft law aimed to liberalize Lebanon's telecommunications sector and encourage competition by opening it up to private participation. However, the analysis notes weaknesses like inadequate broadband capacity that hindered reliable, affordable internet access and perpetuated a digital divide. The document provides background on Lebanon's telecom sector and issues relevant to Schools Online, and will inform their decision to operate in Lebanon.
This document discusses the regulatory regime of the internet in Malaysia. It provides an overview of how the internet was initially unregulated but licensing requirements were introduced with the Communications and Multimedia Act 1998. It also discusses Malaysia's policy of no censorship of the internet, though some websites have been blocked and individuals prosecuted for unlawful content. The document examines how laws like the Computer Crimes Act and CMA are used to regulate online content within this framework, seeking to understand the interplay between no censorship and regulation of the internet in Malaysia.
30 recent Internet and Technology developments you may have missed
from – and/or potentially impacting on - Qatar and the Middle East, curated by ictQATAR's Damian Radcliffe.
The document discusses the Virgin Islands Next Generation Network (viNGN) and its mission to provide high-speed fiber optic broadband services to the US Virgin Islands. viNGN aims to transform the territory by serving as a catalyst for economic growth through technology and improving quality of life. It received federal funding through four grants to build infrastructure, provide public computer centers, and promote broadband adoption. The summaries highlight how viNGN is working to improve broadband access and position the USVI as a technology leader in the Caribbean by building an all fiber-optic network.
Social media facts - South Korea by Digital Junglehearqian
South Korea has a highly connected population with widespread internet access and fast speeds. Social media is widely used, with top platforms including Naver and Daum which host popular blogs, as well as me2DAY and Cyworld which are leading microblogging and social networking sites respectively. Video and instant messaging are also popular online activities for South Koreans. The government has strongly supported internet infrastructure development resulting in South Korea's high rates of connectivity.
Mobile phones, human rights and social justice in africaDr Lendy Spires
This document summarizes research conducted on the use of mobile phones by civil society organizations in Africa for human rights and social justice work. Over 50 organizations were identified that are using mobile phones for communication, networking, advocacy and services, though the actual number is likely much higher. While mobile phones have enabled unprecedented connectivity, organizations still face challenges like high costs, lack of electricity in rural areas, and limited technical capacity. The workshop this document refers to aims to help organizations overcome isolation, share experiences using mobile technology, and establish an ongoing support network.
The document analyzes internet freedom in Tunisia and finds that reforms are needed to protect freedom of expression online. While internet censorship has decreased since President Ben Ali was ousted, repressive laws from his government remain on the books, posing a threat to free speech. These laws impose liability on internet service providers for third-party content and require monitoring and removing content deemed contrary to public order or morals. Reforms are recommended to remove these problematic provisions and bring internet regulation in line with international standards.
The document discusses internet freedom in Ukraine from 2013 to 2014. It notes that while internet access increased during this period, online freedoms faced growing pressures during the Euromaidan protests against the Yanukovych government. Journalists and activists experienced physical attacks and censorship attempts. After Yanukovych's ouster, tensions continued in Crimea and from Russian propaganda, while social media still played an important role for civic activism.
The telecommunications industry in Russia has undergone significant changes since the 1980s. There were few television channels during the Soviet era, but many new private and state-run radio stations and TV channels have emerged in recent decades. The industry is regulated by laws on communications and mass media. The mobile market has grown rapidly, with over 190% penetration expected by 2017. Growth has been driven by increasing demand for mobile data and infotainment services, as well as a growing economy. However, the government maintains a controlling influence and the regulator depends on government.
Each quarter, Akamai will be publishing a quarterly “State of the Internet” report. This report will include data gathered from across Akamai’s global server network about attack traffic and broadband adoption, as well as trends seen in this data over time. It will also aggregate publicly available news and information about notable events seen throughout the quarter, including Denial of Service attacks, Web site hacks, and network events, including outages
and new connections.
During the fourth quarter of 2008, Akamai observed attack traffic originating from 193
unique countries around the world. The United States and China were the two largest attack traffic sources, accounting for over 42% of observed traffic in total. Akamai observed attack traffic targeted at more than 20,000 unique ports, with the top 10 ports seeing over 77% of the observed attack traffic. Web site hacks and Web-based exploits were regularly in the news
during the quarter, as was a proof-of-concept exploit for a vulnerability in SSL, the underlying mechanism that secures financial and retail transactions, among others, across the Web.
Notable network outages in the fourth quarter were due to submarine cables in the
Mediterranean being severed, as well as two major Internet backbone providers de-peering
their networks from one another. Notable Web site outages in the fourth quarter were
attributed to increased traffic, hardware failure, and power outages.
Global connectivity advanced in the fourth quarter, with the commercial launch or
announcement of WiMAX and 3G broadband services in a number of countries, the launch
of higher speed cable broadband services based on DOCSIS 3.0, and additional fiber-to-thehome services that will bring extremely high-speed connections to subscribers in Switzerland,
Brazil, India, Spain, Italy, and Russia.
Akamai observed a nearly six percent increase (from the third quarter 2008) globally in the
number of unique IP addresses connecting to Akamai’s network, and a 28% increase from
the end of 2007. From a global connection speed perspective, South Korea had the highest
levels of “high broadband” (>5 Mbps) connectivity for the fourth consecutive quarter, and
the highest average connection speed, at 15 Mbps. In the United States, Delaware also
maintained its top position, with 62% of connections to Akamai occurring at 5 Mbps or
greater, and the highest average connection speed in the United States, at 7.3 Mbps. Looking
at observed “narrowband” (<256 Kbps) connections, Mayotte and Equatorial Guinea were
the “slowest” countries, with 98% and 96% of connections to Akamai, respectively, occurring
at speeds below 256 Kbps. In the United States, the District of Columbia continued to have
the highest percentage of observed connections below 256 Kbps. However, this was down
nearly seven percent from the prior quarter, and over 42% from the end of 2007
This document provides a quarterly report on the state of the internet during Q4 2008. It summarizes key findings regarding security threats including:
1) Attack traffic originated from 193 countries, led by the US and China accounting for over 42% of traffic. The top 10 countries made up nearly 72% of traffic.
2) Attacks targeted over 20,000 ports, led by Port 445 (Microsoft-DS) with 22.96% of traffic. Port 80 (WWW) rose to the #2 spot, likely due to SQL injection scans.
3) Notable security events included exploits of SSL vulnerabilities and widespread web site hacks and exploits throughout the quarter.
The document analyzes Turkmenistan's telecommunications industry. It finds that while the government has made some moves to expand access, state controls still limit development. Mobile penetration reached 88% by 2012, up from 63% in 2010, but the suspension of MTS's license hindered growth. Fixed line penetration remains low at 11%. Internet access is provided by the state-owned monopoly TurkmenTelecom, and broadband access is below 0.03% of the population. Demand appears strong despite high prices and censorship.
This document discusses the development of internet and social media in Malaysia. It provides background on media control and regulations in Malaysia, and notes that the government exercises tight control over mainstream media. It then discusses Malaysians' increasing internet usage, with 66% of the population online by 2012. Social media like Facebook has also grown rapidly, with Malaysia having the fifth most Facebook users in Asia. The document examines how new digital technologies have allowed alternative media and voices to emerge online despite government restrictions on mainstream media.
South Korea has a highly developed internet landscape, with 82.1% of the population using the internet. 94.6% of internet users also use mobile phones, with 9 out of 10 using smartphones powered by Android. Popular services include KakaoTalk, the leading instant messenger with 140 million global users, and social networking sites are popular for socializing and hobbies. Online shopping is also popular, with 50.4% of internet users making purchases and the average amount spent being 50,000-60,200 South Korean Won.
Netpop | Pocket: Growing The Mobile Marketplace PreviewNetpop Research
Summary of Netpop Research's 2009 Growing the Mobile Marketplace report. For more information about the full report, go to http://netpopresearch.com/node/26589
The document discusses broadband access in Jordan. It provides background on Jordan's geography, history, politics, and telecommunications sector. Jordan has made significant investments in telecom infrastructure over the past few decades. Major players now include Orange, Batelco, Zain, and others offering ADSL, wireless and 3G services. While broadband access has expanded, affordability remains an issue for many Jordanians compared to higher GDP countries like Australia. The telecom regulator aims to promote competition and accessible services.
The document provides information on the use of the internet in business. It discusses key uses such as research, buying/selling, advertising, communication and information gathering. Advantages include increased business opportunities, improved efficiency, access to information and connectivity. Potential disadvantages are also outlined, like bullying, addiction, identity theft and negative social impacts. The document also briefly describes email and how it works using various internet protocols.
Whitepapers Akamai State Of The Internet Q3 2008guest1d6dd0
This report summarizes internet and security trends from the 3rd quarter of 2008 as observed by Akamai's global server network. It found that China and the US were the largest sources of attack traffic, targeting mostly the top 10 ports which saw over 85% of attacks. Several proof-of-concept attacks were announced targeting social media sites and core internet protocols like DNS, BGP, and TCP. Notable outages occurred due to hurricanes in the US and from increased traffic, human error, and power issues affecting websites. Global connectivity expanded through new undersea cables and launches of WiMAX and fiber internet services in various countries.
The chapter discusses the evolution of the Internet from its origins as ARPANET connecting a few computers to today's massive global network. It describes the various groups that make up the Internet community such as users, internet service providers, and content providers. The chapter covers options for connecting to the Internet including types of connections like broadband, selecting an internet service provider, and setting up a computer to access the internet. It also discusses using search engines to find information online and common internet applications.
1. The document discusses government regulation of media through agencies like the FTC, FRC, and FCC which shape interactions between media, government, and audiences.
2. It also covers media law and related issues like censorship, intellectual property, and the influence of digital technology on democracy.
3. Key topics analyzed include the fairness doctrine, DMCA, censorship of speech, and how the internet both enhances and diminishes free speech while affecting politics in all countries.
This document summarizes key internet freedom developments in Colombia from June 2014 to May 2015. It notes that while internet access is steadily increasing, obstacles like poor infrastructure, lack of development, and high costs still hamper widespread access. When online, users can generally access and share content freely, though prosecutions under defamation laws are rare but pose serious risks to user rights. The document also discusses debates around issues like government surveillance, net neutrality, and zero-rating programs.
1) According to a 2009 report, 16% of India's urban population, or 43 million people, were actively using the internet at that time.
2) Small towns with populations under 500,000 saw the largest growth in internet usage between 2008 and 2009.
3) Students account for 44% of internet usage, primarily for education and entertainment. Working professionals tend to use the internet for communication and information.
Music Video Analysis - Everybody Hurts REMjenhutton
The music video for REM's "Everybody Hurts" depicts various people stuck in a traffic jam. Through shots of individuals in the cars, the video conveys that each person has their own struggles and reasons for "hurting" even when they feel alone. By showing different characters experiencing pain privately yet together on the road, the video enhances the song's message that personal hardship is universal and no one is truly alone in suffering.
O documento discute como o Espiritismo e a Arte podem se unir para promover a espiritualização humana e o desenvolvimento de valores nobres. Ele propõe que a ciência, religião, arte e filosofia devem educar as pessoas para além do dogmatismo ou exibicionismo. O fórum visa permitir maiores níveis de percepção através do debate sobre manifestações artísticas e seu conteúdo espiritual, a fim de induzir uma resignificação de valores.
The document provides an overview of Siemens' products for automation and drives. It introduces their Totally Integrated Automation and Totally Integrated Power platforms which integrate planning, configuration, products, systems, and communication across industrial automation and building technology. The catalog then summarizes some of their key products, including the LOGO! logic module for simple control tasks, the SIMATIC S7-200 Micro PLC, and the SIMATIC S7-300 modular and expandable PLC system.
This document provides vocabulary definitions to accompany a reading selection about trees. It includes definitions for 12 words: solid, limbs, sprouts, extremely, release, trunks, stems, minerals, oxygen, substance, growth, and seedling. The definitions are presented to help students understand the meaning of words they will encounter in the story. The concept word for the lesson is "growth," which is defined as "the process of becoming larger." Trees need sun, food, water, and minerals to grow and become larger living things.
The document analyzes internet freedom in Tunisia and finds that reforms are needed to protect freedom of expression online. While internet censorship has decreased since President Ben Ali was ousted, repressive laws from his government remain on the books, posing a threat to free speech. These laws impose liability on internet service providers for third-party content and require monitoring and removing content deemed contrary to public order or morals. Reforms are recommended to remove these problematic provisions and bring internet regulation in line with international standards.
The document discusses internet freedom in Ukraine from 2013 to 2014. It notes that while internet access increased during this period, online freedoms faced growing pressures during the Euromaidan protests against the Yanukovych government. Journalists and activists experienced physical attacks and censorship attempts. After Yanukovych's ouster, tensions continued in Crimea and from Russian propaganda, while social media still played an important role for civic activism.
The telecommunications industry in Russia has undergone significant changes since the 1980s. There were few television channels during the Soviet era, but many new private and state-run radio stations and TV channels have emerged in recent decades. The industry is regulated by laws on communications and mass media. The mobile market has grown rapidly, with over 190% penetration expected by 2017. Growth has been driven by increasing demand for mobile data and infotainment services, as well as a growing economy. However, the government maintains a controlling influence and the regulator depends on government.
Each quarter, Akamai will be publishing a quarterly “State of the Internet” report. This report will include data gathered from across Akamai’s global server network about attack traffic and broadband adoption, as well as trends seen in this data over time. It will also aggregate publicly available news and information about notable events seen throughout the quarter, including Denial of Service attacks, Web site hacks, and network events, including outages
and new connections.
During the fourth quarter of 2008, Akamai observed attack traffic originating from 193
unique countries around the world. The United States and China were the two largest attack traffic sources, accounting for over 42% of observed traffic in total. Akamai observed attack traffic targeted at more than 20,000 unique ports, with the top 10 ports seeing over 77% of the observed attack traffic. Web site hacks and Web-based exploits were regularly in the news
during the quarter, as was a proof-of-concept exploit for a vulnerability in SSL, the underlying mechanism that secures financial and retail transactions, among others, across the Web.
Notable network outages in the fourth quarter were due to submarine cables in the
Mediterranean being severed, as well as two major Internet backbone providers de-peering
their networks from one another. Notable Web site outages in the fourth quarter were
attributed to increased traffic, hardware failure, and power outages.
Global connectivity advanced in the fourth quarter, with the commercial launch or
announcement of WiMAX and 3G broadband services in a number of countries, the launch
of higher speed cable broadband services based on DOCSIS 3.0, and additional fiber-to-thehome services that will bring extremely high-speed connections to subscribers in Switzerland,
Brazil, India, Spain, Italy, and Russia.
Akamai observed a nearly six percent increase (from the third quarter 2008) globally in the
number of unique IP addresses connecting to Akamai’s network, and a 28% increase from
the end of 2007. From a global connection speed perspective, South Korea had the highest
levels of “high broadband” (>5 Mbps) connectivity for the fourth consecutive quarter, and
the highest average connection speed, at 15 Mbps. In the United States, Delaware also
maintained its top position, with 62% of connections to Akamai occurring at 5 Mbps or
greater, and the highest average connection speed in the United States, at 7.3 Mbps. Looking
at observed “narrowband” (<256 Kbps) connections, Mayotte and Equatorial Guinea were
the “slowest” countries, with 98% and 96% of connections to Akamai, respectively, occurring
at speeds below 256 Kbps. In the United States, the District of Columbia continued to have
the highest percentage of observed connections below 256 Kbps. However, this was down
nearly seven percent from the prior quarter, and over 42% from the end of 2007
This document provides a quarterly report on the state of the internet during Q4 2008. It summarizes key findings regarding security threats including:
1) Attack traffic originated from 193 countries, led by the US and China accounting for over 42% of traffic. The top 10 countries made up nearly 72% of traffic.
2) Attacks targeted over 20,000 ports, led by Port 445 (Microsoft-DS) with 22.96% of traffic. Port 80 (WWW) rose to the #2 spot, likely due to SQL injection scans.
3) Notable security events included exploits of SSL vulnerabilities and widespread web site hacks and exploits throughout the quarter.
The document analyzes Turkmenistan's telecommunications industry. It finds that while the government has made some moves to expand access, state controls still limit development. Mobile penetration reached 88% by 2012, up from 63% in 2010, but the suspension of MTS's license hindered growth. Fixed line penetration remains low at 11%. Internet access is provided by the state-owned monopoly TurkmenTelecom, and broadband access is below 0.03% of the population. Demand appears strong despite high prices and censorship.
This document discusses the development of internet and social media in Malaysia. It provides background on media control and regulations in Malaysia, and notes that the government exercises tight control over mainstream media. It then discusses Malaysians' increasing internet usage, with 66% of the population online by 2012. Social media like Facebook has also grown rapidly, with Malaysia having the fifth most Facebook users in Asia. The document examines how new digital technologies have allowed alternative media and voices to emerge online despite government restrictions on mainstream media.
South Korea has a highly developed internet landscape, with 82.1% of the population using the internet. 94.6% of internet users also use mobile phones, with 9 out of 10 using smartphones powered by Android. Popular services include KakaoTalk, the leading instant messenger with 140 million global users, and social networking sites are popular for socializing and hobbies. Online shopping is also popular, with 50.4% of internet users making purchases and the average amount spent being 50,000-60,200 South Korean Won.
Netpop | Pocket: Growing The Mobile Marketplace PreviewNetpop Research
Summary of Netpop Research's 2009 Growing the Mobile Marketplace report. For more information about the full report, go to http://netpopresearch.com/node/26589
The document discusses broadband access in Jordan. It provides background on Jordan's geography, history, politics, and telecommunications sector. Jordan has made significant investments in telecom infrastructure over the past few decades. Major players now include Orange, Batelco, Zain, and others offering ADSL, wireless and 3G services. While broadband access has expanded, affordability remains an issue for many Jordanians compared to higher GDP countries like Australia. The telecom regulator aims to promote competition and accessible services.
The document provides information on the use of the internet in business. It discusses key uses such as research, buying/selling, advertising, communication and information gathering. Advantages include increased business opportunities, improved efficiency, access to information and connectivity. Potential disadvantages are also outlined, like bullying, addiction, identity theft and negative social impacts. The document also briefly describes email and how it works using various internet protocols.
Whitepapers Akamai State Of The Internet Q3 2008guest1d6dd0
This report summarizes internet and security trends from the 3rd quarter of 2008 as observed by Akamai's global server network. It found that China and the US were the largest sources of attack traffic, targeting mostly the top 10 ports which saw over 85% of attacks. Several proof-of-concept attacks were announced targeting social media sites and core internet protocols like DNS, BGP, and TCP. Notable outages occurred due to hurricanes in the US and from increased traffic, human error, and power issues affecting websites. Global connectivity expanded through new undersea cables and launches of WiMAX and fiber internet services in various countries.
The chapter discusses the evolution of the Internet from its origins as ARPANET connecting a few computers to today's massive global network. It describes the various groups that make up the Internet community such as users, internet service providers, and content providers. The chapter covers options for connecting to the Internet including types of connections like broadband, selecting an internet service provider, and setting up a computer to access the internet. It also discusses using search engines to find information online and common internet applications.
1. The document discusses government regulation of media through agencies like the FTC, FRC, and FCC which shape interactions between media, government, and audiences.
2. It also covers media law and related issues like censorship, intellectual property, and the influence of digital technology on democracy.
3. Key topics analyzed include the fairness doctrine, DMCA, censorship of speech, and how the internet both enhances and diminishes free speech while affecting politics in all countries.
This document summarizes key internet freedom developments in Colombia from June 2014 to May 2015. It notes that while internet access is steadily increasing, obstacles like poor infrastructure, lack of development, and high costs still hamper widespread access. When online, users can generally access and share content freely, though prosecutions under defamation laws are rare but pose serious risks to user rights. The document also discusses debates around issues like government surveillance, net neutrality, and zero-rating programs.
1) According to a 2009 report, 16% of India's urban population, or 43 million people, were actively using the internet at that time.
2) Small towns with populations under 500,000 saw the largest growth in internet usage between 2008 and 2009.
3) Students account for 44% of internet usage, primarily for education and entertainment. Working professionals tend to use the internet for communication and information.
Music Video Analysis - Everybody Hurts REMjenhutton
The music video for REM's "Everybody Hurts" depicts various people stuck in a traffic jam. Through shots of individuals in the cars, the video conveys that each person has their own struggles and reasons for "hurting" even when they feel alone. By showing different characters experiencing pain privately yet together on the road, the video enhances the song's message that personal hardship is universal and no one is truly alone in suffering.
O documento discute como o Espiritismo e a Arte podem se unir para promover a espiritualização humana e o desenvolvimento de valores nobres. Ele propõe que a ciência, religião, arte e filosofia devem educar as pessoas para além do dogmatismo ou exibicionismo. O fórum visa permitir maiores níveis de percepção através do debate sobre manifestações artísticas e seu conteúdo espiritual, a fim de induzir uma resignificação de valores.
The document provides an overview of Siemens' products for automation and drives. It introduces their Totally Integrated Automation and Totally Integrated Power platforms which integrate planning, configuration, products, systems, and communication across industrial automation and building technology. The catalog then summarizes some of their key products, including the LOGO! logic module for simple control tasks, the SIMATIC S7-200 Micro PLC, and the SIMATIC S7-300 modular and expandable PLC system.
This document provides vocabulary definitions to accompany a reading selection about trees. It includes definitions for 12 words: solid, limbs, sprouts, extremely, release, trunks, stems, minerals, oxygen, substance, growth, and seedling. The definitions are presented to help students understand the meaning of words they will encounter in the story. The concept word for the lesson is "growth," which is defined as "the process of becoming larger." Trees need sun, food, water, and minerals to grow and become larger living things.
The document describes Cain and Abel from the biblical book of Genesis. It explains that Cain and Abel were brothers, the sons of Adam and Eve. Cain worked the ground while Abel was a shepherd. Cain brought an offering from the ground to God but God did not respect it, while He did respect Abel's offering of firstborn animals. Cain became angry and killed Abel. When God asked where Abel was, Cain denied knowing and questioned if he was responsible for his brother.
Highlights of the first quarter of 2013. Net sales amounted to SEK 25,328m (25,875) and reported income for the period was SEK 361m (499), or SEK 1.26 (1.76) per share. Organic growth was 3.8%, while currencies had a negative impact of –5.9%. Continued strong sales growth in North America, Asia/Pacific and Latin America. Market conditions in Europe weakened and sales for Major Appliances, Small Appliances and Professional Products were negatively impacted. North America more than tripled its earnings year-over-year as a result of strong volume growth and improvements in price and mix. Lower volumes and a weak price/mix trend in Europe negatively impacted results. Negative impact from currencies by SEK –318m impacted earnings for Latin America, Europe and Small Appliances. Seasonal build-up of inventories and working capital needs driven by strong growth impacted cash-flow in the quarter.
Smart Home System----Nanjing IOT Technology Co., LtdDaniel Chen
Nanjing IOT Sensor Technology Co.,Ltd. is the global leading supplier for IOT(Internet of Things) devices and solutions. Based on the demand by our customers, we continue to innovate and lead the industry of IOT sensor, controller, mobile IOT and cloud computing. Our company has become one of the flag-bearers of the IOT era that is rapidly approaching. At present, our products and technologies have been widely used in many key-projects globally. We also became the prominent technological support for building Smart City in many areas around the world. Our vision is to enable everyone to truly sense the world, we developed various sensors to help people around the globe which will enable them getting information directly, freely and equally, eradicating biases of information transfer. In the respect for the increasingly serious climate changes and natural disasters, we design our technologies that are green and energy efficient, in hopes of helping the world stay green and our people stay healthy.
Bioenergy in Brazil and the USA - an overvivewGeraldo Eugenio
This document provides a final report on a Fulbright fellowship held at the University of Nebraska-Lincoln from August to December 2012 focusing on bioenergy and biofuels. It acknowledges those involved in supporting the fellowship. It then proposes areas for a joint US-Brazil research program in bioenergy including research on sugarcane, corn, sweet sorghum, switchgrass, and related topics. It recommends complimentary areas for technological cooperation such as corn breeding and production and managing shared water resources like the Ogallala and Guarani aquifers.
The document discusses the benefits of exercise for mental health. Regular physical activity can help reduce anxiety and depression and improve mood and cognitive functioning. Exercise causes chemical changes in the brain that may help protect against mental illness and improve symptoms.
Protein Protein Interactions Of Glycine Oxidase (Thi O)bturne
Project done as a final presentation for Experimental Biochemistry. The project was designed and proposed by me and performed by myself and Lauren Pioppo.
Cung Cấp Giáo Viên Nước Ngoài - Reading test of TOEFLSelena Nguyen
Cung cấp giáo viên nước ngoài đang là dịch vụ rất được chú trọng vì tầm quan trọng về chất lượng cũng như kết quả mà dịch vụ đem đến cho khách hàng. Từ lâu nhu cầu học tiếng Anh với người bản xứ đã trở nên rất phổ biến trong xã hội ngày nay, nhất là khi Việt Nam đang từng bước hội nhập với quốc tế, kéo theo đó là nhu cầu cung cấp giáo viên nước ngoài ngày một cao. Nhưng để tìm một nguồn cung cấp giáo viên nước ngoài chất lượng là vấn đề cần phải được lưu tâm. Nắm bắt được điều đó, công ty Hawaii Education – công ty chuyên cung cấp giáo viên nước ngoài dạy tiếng Anh – mang đến khách hàng những gói dịch vụ đa dạng, uy tín và chất lượng, cùng giá cả cạnh tranh, nhằm đáp ứng nhu cầu học tiếng Anh ngày một cao của khách hàng, giúp khách hàng dễ dàng tìm được giáo viên ưng ý cũng như tiết kiệm chi phí đáng kể.
The great wall of china is a series of fortifications made of stoneshilpineha
The Great Wall of China was built along China's northern borders to protect against nomadic groups and military incursions. It also served purposes like imposing duties on goods along the Silk Road, regulating trade, and controlling immigration. The Great Pyramid of Giza in Egypt is the oldest and largest of the three pyramids at the Giza Necropolis. It is also the oldest of the Seven Wonders of the Ancient World. The Great Sphinx of Giza is a large limestone statue located on the Giza Plateau in Egypt, and is the world's largest monolith statue. Confucius was a Chinese teacher and philosopher from the Spring and Autumn Period who emphasized morality, social relationships, justice, and
Title name of the book is “Ahsan Al-Qasas” Commentary of Surah Yousuf, the 12th Chapter of the Glorious Quran in English language. Written by Sheikh Abdur Raheem and translated into English by Sheikh Mahmood Chandia.
The mention of the name Yousuf normally makes one recall the story of the great Prophet of Allah, Yousuf (A,S). His detailed mention in the Quran, in a chapter under the same name, holds host to a whole range of lessons, meanings and emotions waiting to be embraced by the keen of mind. This is Surah Yousuf a mark of all mankind.
This book attempts to bring the meanings and deeper interpretations of this Surah to the doorstep of the reader. While maintaining the authenticity of sources, this commentary unveils the story of Yousuf (A.S) as well as opens the door to many sub-topics buried within the Surah. Dreams and interpretations, slavery, kinship and forbearance are some of the insights brought to light for the benefit of the reader.
Surah Yousuf is a tale of many contradistinctions of love and longing and patient forbearance in the face of loss. It provides a compelling account of the Divine reward for patient endurance. This Tafseer is a powerful antidote to the modern values of instant gratification that Western Muslims in particular, aspire toward.
The lesson of Surah Yousuf is inspiring. The excellence of Prophet Yusuf (a.s) character shows that lasting contentment comes through obedience of Allah. The trials that Prophet Yousuf (a.s) experienced, were born through his dignity and compassion.
This book is an enlightening and educational reading for one seeking a comprehensive understanding of an aspect revealed in the Islamic scripture, the Holy Quran.
This document provides information about facility maintenance services offered by Sticks & Stones Artisan Group Inc. (SSAGI) in Tampa, Florida. It lists their service routes and fees, the malls and retail stores they service in the Tampa area, and examples of renovation, repair, and restoration services. Contact information is provided for their commercial and residential offices in Dunedin, Florida and Clarksville, Tennessee respectively.
Overview of Dishwashing liquid products in Vietnam market
PBI Survey 2015
Research Design
3
Research Method
Internet Sampling
Fieldwork Period
9th Feb 2015 – 10th Feb 2015
Research Area: Vietnam (Nationwide)
Respondent Criteria: Female only
Sample Size: 620 samples
Survey Content:
Dishwashing liquid brand awareness
Expansive of Dishwashing liquid Brand
Dishwashing liquid brand ever used
Dishwashing liquid brand used in the past 3 months
Dishwashing liquid brand most often used in the past 3 months
Dishwashing liquid brand use in the future
Dishwashing liquid brand recommendation
30 recent Internet and Technology developments you may have missed - also found at: http://www.slideshare.net/ictQATAR/digital-qatar-internet-society-digest-septoct-final-171012-2
40 recent Internet and Technology developments you may have missed
from – and/or potentially impacting on - Qatar and the Middle East, curated by ictQATAR's Damian Radcliffe.
Legal Framework of Online Media: A Perspective for Online Journalists, Online...Social Media Exchange
This is draft chapter of a report that was never published for the Doha Centre for Media Freedom on the emerging legal framework for free expression online in the Arab region. It is currently being updated as a part of SMEX Arab Digital Rights Datasets initiative. Comments welcome.
40 recent Internet and Technology developments from - or potentially impacting on - the Middle East, which I curated. Also available at: http://www.slideshare.net/ictQATAR/digital-digest-novdec-2012
H.E. Dr Abdulrahman Al-Jafary, Governor of the Communications and Information Technology Commission (CITC) of Saudi Arabia, delivered the keynote speech at the Telecommunications and Media Forum in Bahrain in May 2009. He discussed Saudi Arabia's efforts to develop its ICT sector through regulatory reforms by CITC, including introducing competition in mobile and fixed services. He also highlighted key challenges facing regulators like developing broadband strategies, optimizing spectrum use, encouraging local content, and expanding rural networks through cooperation. Regional cooperation was emphasized as important to address common challenges in developing the information society.
ICTs investments in MENA countries are overtaking the rest of the world but they didn’t improve their cyber legislation systems. Cybercrime in the region is rising alarmingly and there no efforts to tackle this phenomenon. Lack of legislative and technical capabilities are common factors in most Middle East countries along with poor security awareness and education. I’m delighted to introduce my latest research to address these latest cybercrime issues in the region. This research includes extensive study for Internet penetration in MENA, country by country assessment, legal frameworks, and challenges facing legislators in the region.
A personal take on 22 recent Internet and Technology developments from – and/or potentially impacting on - Qatar and the Middle East by ictQATAR's Internet & Society Manager, Damian Radcliffe.
Supporting the global efforts in strengthening the safety, security and resilience of Cyberspace, the Commonwealth Cybersecurity Forum 2013, organised by the Commonwealth Telecommunications Organisation. The ceremonial opening examined how Cyberspace could be governed and utilised in a manner to foster freedom and entrepreneurship, while protecting individuals, property and the state, leading to socio-economic development. Speakers of this session, Mr Mario Maniewicz, Chief, Department of Infrastructure, Enabling Environment and E-Applications, ITU; Mr David Pollington, Director, International Security Relations, Microsoft; Mr Alexander Seger, Secretary, Cybercrime Convention Committee, Council of Europe; Mr Nigel Hickson, Vice President, Europe, ICANN and Mr Pierre Dandjinou, Vice President, Africa, ICANN, added their perspectives on various approaches to Cybergovernance, with general agreement on the role Cyberspace could play to facilitate development equitably and fairly across the world.
Hosted by the Ministry of Posts and Telecommunications of Cameroon together with the Telecommunications Regulatory Board of Cameroon and backed by partners and industry supporters including ICANN, Council of Europe, Microsoft, MTN Cameroon, AFRINIC and Internet Watch Foundation, the Commonwealth Cybersecurity Forum 2013 seeks to broaden stakeholder dialogue to facilitate practical action in Cybergovernance and Cybersecurity, some of which will be reflected in the CTO’s own work programmes under its Cybersecurity agenda.
Building a mobile content ecosystem as a foundation to digital arabiaNicolas Hans
Mobile Internet growth in the Middle East and North Africa is strong and accelerating. Although international Internet players have recently boosted their presence in the region, mobile telecommunication operators have a strategic opportunity to secure a control point in the Internet value chain that goes beyond providing connectivity.
Running Head CYBER SECURITY IN AFRICA .docxtodd271
Running Head: CYBER SECURITY IN AFRICA 1
CYBER SECURITY IN AFRICA 2
Cyber Security in Africa
African countries have lagged behind in the implementation and development of internet connectivity and cyber security measures. Being developing nations, most of the African states have not been able to fully enhance and promote internet connectivity, preferring to put their priorities on providing other basic and necessary social amenities to their people. The governments have, however, ensured that there is provision of telecommunication networks across most parts of the continent, and internet service providers would often ride upon these networks for provision of their services to the people.
It is estimated that almost 170 million people across the continent have at least a mobile phone. Internet penetration in Africa has however remained at 18%, which is way lower than the global average connectivity of 30%. It is estimated that only 1 household out of 10 households is connected to the internet. However, the number of connected internet users in Africa has grown sevenfold since 2000 to 2012. This progress can be attributed to the changes in government policy and regulations.
The cyber space in Africa has been growing at a snail speed compares to other regions due to factors such as the lack of relevant skills and knowledge that would have enabled African nations to develop software’s and applications. There are few professionals in the internet and technology sectors, and thus this limits the ability of African countries to come up with their own internet applications. The introduction of internet in Africa saw some already established mobile telephone countries monopolize the internet service delivery sector. Most of the upcoming and newly-established companies which have tried to venture into the sector have had no space for development. This has greatly limited the internet technological investment, which would have helped the internet access to many people.
In Africa, internet penetration has been greatly experienced in the major urban centers, where the relevant infrastructure has been put in place. The poor transport and communication networks in the rural areas has inhibited the investment into the internet sector by both the private and even governmental organizations. The uneven settlement patterns across the continent also discourages internet and communication investment in the rural areas, given that most of the people residing in the rural areas are not stable financially, and they would thus have to put food at the table at the expense of the internet, which is like a luxury and not a necessity to them. Their financial status also does not allow them to possess the internet-enabled mobile phones, tablets and laptops. The well-to-do people often reside in the major urban centers. The.
25 digital or tech stories you may have missed, from - or potentially impacting on the Middle East - curated by Damian Radcliffe (@damianradcliffe).
Middle East Stories this quarter include: New data on MENA Internet usage, highlights from the 5th Arab Social Media Report, Arab Media Use: Social networks (and the web) are key sources of news, stats on massive mobile growth in the last 10 years, how mobile is increasingly important to get online, Facebook in 2017, highlights from the 5th Arab Youth Survey.
Wider research includes: Our constant need to be connected, “showrooming”, in Q4 2012, more tablets shipped than PCs, “Project Loon”, McKinsey's 12 Disruptive Technologies, How “Connected” Cars could save lives and whether Facial Recognition for device security will be the next big thing?
Media development in digital era : Moroccan Model Mustapha Khalfi
The document discusses several challenges facing media development in Morocco in the digital era, including infrastructure challenges, political and constitutional challenges, legal challenges, economic challenges, and ethical challenges. It outlines reforms Morocco has implemented to address these challenges, such as adopting a new press code to strengthen legal protections for journalists, setting up a national press council, and increasing state aid and investments to support an independent and sustainable media sector. However, it notes that ethics and developing a viable economic model remain ongoing challenges.
Mobile technology has grown rapidly in the Middle East and North Africa region, but divides still exist. While smartphone penetration is high in places like the UAE and Qatar, many cannot afford broadband services. There are also differences in access to advanced technologies between regions. Going forward, priorities include closing digital divides, planning for new divides as newer technologies emerge, developing demand-led services, increasing Arabic digital content, and addressing privacy concerns. Reasons for optimism include the region's youth population, successful case studies of mobile services, new collaborations and infrastructure projects, and audiences finding their own solutions within existing technologies.
Personal round up by Internet & Society Manager, Damian Radcliffe (@mrdamian76) of developments in the Internet space relevant to the MENA region in the past month. Curation of stories covering social networking, Arabic language developments, research into ICT use and forthcoming developments. Comments and feedback welcome.
A quarterly round up of 25 Internet and Technology developments from across the Middle East, as well as wider global developments which may impact (or be of interest) to people in the region. Curated by ictQATAR's Social Impact Manger, Damian Radclife.
Middle East Stories this quarter include: the most popular online activities in the Middle East, how UAE is the Global Smartphone Leader, Social Media Usage during Ramadan, eCommerce Insights and regional insights from the World Economic Forum’s Global Competitiveness Report.
Wider research includes: how mobile devices driving a return to the living room, uncovering the digital habits of Kenyan youth, evolving Cell Phone Behaviors, Vietnam’s new online censorship law and efforts to connect the next 5 billion online.
25 digital or tech stories you may have missed, from - or potentially impacting on the Middle East - curated by Damian Radcliffe (@damianradcliffe).
Middle East Stories this quarter include: New data on MENA Internet usage, highlights from the 5th Arab Social Media Report, Arab Media Use: Social networks (and the web) are key sources of news, stats on massive mobile growth in the last 10 years, how mobile is increasingly important to get online, Facebook in 2017, highlights from the 5th Arab Youth Survey.
Wider research includes: Our constant need to be connected, “showrooming”, in Q4 2012, more tablets shipped than PCs, “Project Loon”, McKinsey's 12 Disruptive Technologies, How “Connected” Cars could save lives and whether Facial Recognition for device security will be the next big thing?
My round up for Digital Qatar of recent developments in the Internet and Tech space relevant to the Middle East.
See: http://www.digitalqatar.net/2012/06/20/introducing-our-all-new-digital-digest/ for context.
Also available at: http://www.slideshare.net/ictQATAR/digital-digest-june-2012
This document analyzes Lebanon's 2009 Draft Law for Service Provider Licensing Regulation. The original objective of the draft law was to improve internet penetration rates and quality by combating illegal internet service providers (ISPs). However, the analysis finds that gaps remain between the written law and the reality of Lebanon's telecommunications sector. The analysis describes relevant provisions and assesses the strengths and weaknesses using global communication models. Recommendations are provided to improve the policy and promote healthy competition to better achieve the participatory communication model.
Similar to Internet Filtering in the Middle East and North Africa (20)
The document announces that the content has moved to a new location. It provides the URL https://www.slideshare.net/united-interactive indicating that the slides or presentation that were previously hosted at an unknown location are now available at that SlideShare profile page for United Interactive. In just one sentence, the document communicates that the content has been relocated online.
DoubleClick benchmarks are derived from a robust data set of metrics across DoubleClick for Advertisers (DFA), based on rigorous methodology with input from the Advertising Research Foundation. This data set includes hundreds of advertisers, thousands of campaigns, and tens of billions of ad impressions.
Data shown here represent activity of a wide range of ad formats for DFA advertisers in the EMEA Region from January to December 2009.
Middle East and North Africa, the fastest growing region in the world.
IT spending in the MENA Region is forecast to grow 12% in 2010, faster than any other region. Only India, taken outside of its neighbours, is set to grow more rapidly.
Effective Measure & Spot On PR: Media Consumption & Habits of MENA Internet U...United Interactive™
The document provides findings from a survey of internet users in the Middle East and North Africa region conducted in July-September 2010. Some key findings:
- 32% of MENA internet users buy products or services online, compared to 62% in the UK. Online shopping is most common in the GCC countries.
- Males and females have different online purchasing profiles, with females preferring clothing and accessories and males preferring electronics.
- Media consumption habits during the Muslim holy month of Ramadan varied only slightly from July consumption patterns.
Effective Measure & Spot On PR: Media Consumption & Habits of MENA Internet U...United Interactive™
Key Findings:
- MENA internet users spend more time online than watching TV
- The internet retains a substantial audience throughout the day and night, while traditional media show peak periods for consumption
- eMail and social networking are the most popular activities for MENA internet users.
Click 4.0: Digital Marketing Professionals of the Middle East Survey 2010United Interactive™
Click 4.0 – The Digital Marketing Event for the Middle East
Survey asked 1,048 marketing professionals across the MENA and GCC region 8 key questions about their role and their organisation’s strategy when it comes to digital marketing and its implementation.
Jazarah.net: Saudi Arabia Facebook Fact Sheet – April 2010United Interactive™
As of April 2010, number of facebook users in Saudi Arabia exceeded the 2 million users, which makes the kingdom the second largest Arab population on the largest social networking hub.
TNS Global: The Arab As A Consumer 20-20 Woman – Saudi ArabiaUnited Interactive™
Saudi Arabia is undergoing rapid social changes as King Abdullah endorses programs opening new doors for women. Traditionally confined to the home, Saudi women are now more independent and assertive as individualism grows. They seek equal partnerships with husbands and value careers, challenging traditional relationships. As consumer perspectives broaden with new media, brands have opportunities to connect with Saudi women undergoing self-actualization and redefining roles.
Among the significant findings, the survey found the participants highly adept at using new media. They spent considerable time consuming new and traditional media, but much less time producing media content. For instance, the vast majority of participants indicated that they had never blogged. In addition, those who did produce media content, through blogging or otherwise, tended to do it in a language other than their native language.
Indeed, with the exception of news, the majority of surveyed youth consumed and produced media in English, rather than Arabic. In addition, the participants used media predominantly for entertainment, for connecting with others, and for work or schoolwork, but less often for current affairs, for expressing their opinions, or for political activism.
- Islam, a growing Ideology
- Marketing to Muslims
- Using varied research techniques
- What we set out to do?
- Understanding values - how?
- Similarities across the Muslim world
- Differences across the Muslim world
- Segment size by market
- Insights can be used...
This report clearly details the complex challenges facing young people across the Arab world. Among these great challenges is employment — or the lack of it.
The MENA region faces one of the highest rates of youth unemployment and underemployment in the world. Creating the required number of new jobs over the next two decades will be monumentally difficult. Even more young people have been forced into unemployment, low-quality jobs, and living “on the margins” as a result of the weakened global economic climate.
The global economic crisis hits the MENA region at a time when the youth share of the total population is at a high point, with nearly one-third of MENA residents between the ages of 15 and 29.
The Telecommunications Regulatory Authority (TRA) has undertaken the most intensive survey of ICT in the history of the UAE. The survey focuses primarily on ICT access (i.e. internet connections) and ICT use (i.e. utilization of internet). The survey was conducted over 6 months and covered 7 sectors: Households, Private Sector, Education Establishments, Higher Education Establishments, Government, ICT Business Sector, and Public Internet Access Center (PIAC) Establishments (e.g., internet cafes and public libraries).
The diversity of Islam can be summarized in three points:
1. Islam is based on belief in one God and was founded by the Prophet Muhammad through revelations in the Quran. Its core principles are submission to God, faith in God, and virtue through awareness of God.
2. There are three major doctrinal divisions - Sunni, Shi'a, and Ibadi - based on political disputes after Muhammad's death.
3. There are also ideological divisions between Traditional Islam, Islamic Modernism, and Islamic Fundamentalism based on their approach to modernization and political involvement.
1. The document discusses winning in the traditional trade, which represents the vast majority of stores where most consumers purchase goods on a daily basis in rapid growth and emerging markets. This includes open air markets, small stores, and other independent retailers.
2. It notes several common myths about the traditional trade, such as the idea that only low-income consumers shop there or that shoppers only shop in person. It suggests opportunities to target different income groups and leverage non-in-person shopping behaviors.
3. The document emphasizes the importance of understanding distribution points, reaching communities, leveraging modern trade presence, and using effective research methodologies tailored to the traditional trade environment. It provides recommendations for communicating promotions, engaging shop
By TNS' Global Rapid Growth & Emerging Markets Insights team
- Yes we can!
- The social dynamics of microfinance and entrepreneurship at the BOP
- Evaluating social mission projects in emerging and BOP markets
- Are you digitally awake to Asia?
- Letter from China
This document provides a timeline of trends and technologies from 2010 to 2050 organized into 5 time zones. Some of the predictions include digital cash being widely used and embedded in clothing by 2015-2020. By 2025-2035, brain drain from hedge funds to scientific research to focus on energy issues. Later predictions include average lifespans reaching 100 years by 2035-2050 and robotic insects being used for crop pollination. The document also lists potential "black swan" events that could disrupt predicted trends.
Based on, and including, interviews with a global panel of experts from world-leading institutions, Capitalising on the Digital Age outlines future revenue models and strategies that media and telecoms firms should consider adopting in order to prosper in a world where the value of traditional business models is slowly being eroded.
Jonckers: Choosing A Srategic Sourcing Model For LocalisationUnited Interactive™
This document discusses choosing a strategic sourcing model for localization. It outlines key questions to consider such as localization needs, resources, costs, timelines and risks. The options range from fully insourcing to outsourcing localization. The best approach is often a hybrid model. Understanding an organization's position on factors like supplier dependency, cost tolerance, time-to-market pressures, risks and quality assurance needs helps determine the optimal sourcing strategy. A flexible approach may be needed as needs change over time.
By Peggy Anne Salz
Ms. Salz is the Chief Analyst and publisher of MSearchGroove, an online source of analysis and commentary on mobile search, mobile advertising and social media.
The internet ecosystem is a complex and involves multiple activities and players. Study breaks down the internet value chain into five main markets: Content Rights, Online Services, Enabling Technology/Services, Connectivity and User Interface (devices and applications).
How to Manage Your Lost Opportunities in Odoo 17 CRMCeline George
Odoo 17 CRM allows us to track why we lose sales opportunities with "Lost Reasons." This helps analyze our sales process and identify areas for improvement. Here's how to configure lost reasons in Odoo 17 CRM
This slide is special for master students (MIBS & MIFB) in UUM. Also useful for readers who are interested in the topic of contemporary Islamic banking.
it describes the bony anatomy including the femoral head , acetabulum, labrum . also discusses the capsule , ligaments . muscle that act on the hip joint and the range of motion are outlined. factors affecting hip joint stability and weight transmission through the joint are summarized.
How to Fix the Import Error in the Odoo 17Celine George
An import error occurs when a program fails to import a module or library, disrupting its execution. In languages like Python, this issue arises when the specified module cannot be found or accessed, hindering the program's functionality. Resolving import errors is crucial for maintaining smooth software operation and uninterrupted development processes.
This presentation was provided by Steph Pollock of The American Psychological Association’s Journals Program, and Damita Snow, of The American Society of Civil Engineers (ASCE), for the initial session of NISO's 2024 Training Series "DEIA in the Scholarly Landscape." Session One: 'Setting Expectations: a DEIA Primer,' was held June 6, 2024.
This document provides an overview of wound healing, its functions, stages, mechanisms, factors affecting it, and complications.
A wound is a break in the integrity of the skin or tissues, which may be associated with disruption of the structure and function.
Healing is the body’s response to injury in an attempt to restore normal structure and functions.
Healing can occur in two ways: Regeneration and Repair
There are 4 phases of wound healing: hemostasis, inflammation, proliferation, and remodeling. This document also describes the mechanism of wound healing. Factors that affect healing include infection, uncontrolled diabetes, poor nutrition, age, anemia, the presence of foreign bodies, etc.
Complications of wound healing like infection, hyperpigmentation of scar, contractures, and keloid formation.
A review of the growth of the Israel Genealogy Research Association Database Collection for the last 12 months. Our collection is now passed the 3 million mark and still growing. See which archives have contributed the most. See the different types of records we have, and which years have had records added. You can also see what we have for the future.
বাংলাদেশের অর্থনৈতিক সমীক্ষা ২০২৪ [Bangladesh Economic Review 2024 Bangla.pdf] কম্পিউটার , ট্যাব ও স্মার্ট ফোন ভার্সন সহ সম্পূর্ণ বাংলা ই-বুক বা pdf বই " সুচিপত্র ...বুকমার্ক মেনু 🔖 ও হাইপার লিংক মেনু 📝👆 যুক্ত ..
আমাদের সবার জন্য খুব খুব গুরুত্বপূর্ণ একটি বই ..বিসিএস, ব্যাংক, ইউনিভার্সিটি ভর্তি ও যে কোন প্রতিযোগিতা মূলক পরীক্ষার জন্য এর খুব ইম্পরট্যান্ট একটি বিষয় ...তাছাড়া বাংলাদেশের সাম্প্রতিক যে কোন ডাটা বা তথ্য এই বইতে পাবেন ...
তাই একজন নাগরিক হিসাবে এই তথ্য গুলো আপনার জানা প্রয়োজন ...।
বিসিএস ও ব্যাংক এর লিখিত পরীক্ষা ...+এছাড়া মাধ্যমিক ও উচ্চমাধ্যমিকের স্টুডেন্টদের জন্য অনেক কাজে আসবে ...
Internet Filtering in the Middle East and North Africa
1. 2009
Internet Filtering in the
Middle East
and North Africa
Internet in the Middle East and North accessible to Internet users as part of
Africa Qatar’s Supreme Council for Information
Countries in the Middle East and North and Communication Technology’s
Africa continue to invest in information initiative to develop more Web sites with
and communications infrastructure and Arabic content.3
media projects as part of their strategies The number of Internet users is likely
to develop the local economies and create to continue to rise, especially with the
employment. introduction of technologies that
Among the major examples are overcome poor ICT infrastructure that
Jordan’s plans to establish a free IT zone hinders Internet access in the region.
in Amman, which will give sales and WiMAX, for example, was commercially
income tax breaks to the software available by end of March 2009 in Algeria,
companies and business development Bahrain, Jordan, Kuwait, Saudi Arabia and
firms based in the zone. The zone is part Tunisia, while operators in other parts of
of a strategy designed to increase the the region have started testing the
number of Internet users from 26 percent service.4 Additionally, broadband markets
to 50 percent. It aims to increase are growing fast in Algeria, Egypt, Morocco
employment in the sector and to boost the and Tunisia, and commercial 3G mobile
sector’s revenues from $2.2 billion in services have been launched in Egypt,
2009 to $3 billion by end of 2011.1 Libya, Morocco, Sudan, Syria, and
In addition to existing regional hubs Tunisia.5
Dubai Media City and Dubai Internet City, Demographic factors are also expected
the United Arab Emirates launched a new to contribute to the growth of Internet
content creation zone to support media population. The Arab Media Outlook
content creators in the Middle East and 2008–2012 says that, “Digital media will
North Africa. The new Abu Dhabi-based thrive in the Arab market because the
zone aims to employ Arab media market has a large, technologically
professionals in film, broadcast, digital accomplished demographic group—its
and publishing. CNN, BBC, the Financial youth—who are comfortable with it and will
Times, Thomson Reuters Foundation, and customize it to their own requirements.”
Thomson Foundation are among the The report also revealed that, “over 50%
partners of the zone.2 of the population in Yemen, Oman, Saudi
At the same time, some countries have Arabia, Jordan, Morocco and Egypt are
initiated efforts to develop Arabic Web estimated to be currently less than 25
content. In this regard, Microsoft is years old, while in the rest of the countries
working on translation technology that the under-25, ‘net generation’ makes up
would make the Arabic language more around 35% to 47% of total population.”6
1
2. 2009
Liberalization of telecommunications Internet and Media Regulations: The
markets has already taken place in Debate
several Arab countries. Most incumbent The last few years have witnessed an
telecom companies in North Africa are increase in the debate over media and
already in private hands, with exception of Internet censorship in the region. Rifts
Algerie Telecom, the privatization of which between the censors and local and
has been postponed due to the global regional advocates of freedom of speech
economic crisis.7 However, experts say have intensified, and more voices
telecom liberalization in the Middle East continue to express concern about media
and North Africa still lags behind the rest regulations in the region.
of the world in terms cost and efficiency, a Interestingly, while advocates in the
matter which does not encourage direct region criticize the regimes for the
foreign investment.8 repressive regulations, which limit
freedom of speech online, some
The Media Environment in the Middle governments claim they arrest bloggers
East and North Africa and online activists because they abuse
The Middle East and North Africa is one of what the regimes call “media freedom.” In
the most heavily censored regions in the Egypt for example, the authorities arrested
world. Human rights watchdogs and free a blogger in May 2009 under the
speech advocacy groups continue to accusation of "Exploitation of the
criticize the media restrictions and democratic climate prevailing in the
repressive legal regimes, and over the country to overthrow the regime." The
past few years, a great number of bloggers Cairo-based Arab Network for Human
and cyber-dissidents have been jailed. Rights Information deplored the charges
In April 2009, The International and described them as a black comedy.11
Federation of Journalists called for a Another example of such a rift is from the
radical overhaul of media laws in the Gulf countries, where the head of the
Middle East, stating that the laws in most Doha Centre for Media Freedom criticized
of the region’s countries still permit the Dubai Police for allegedly asking Google to
jailing of journalists for undermining the censor YouTube. The head of the center
reputation of the state, the president, the was later criticized by Qatar officials as
monarch or the religion. Such laws have well as some journalists and was accused
often been used to suppress reporting of of endorsing pornography,12 which is a
corruption or scrutiny of government sensitive topic in many Middle East and
actions.9 This media environment created North African societies.
by authorities has been hostile to bloggers While it is common for Internet groups
and online activism, resulting in a number and online activists in the region to
of arrests across the region. In a list organize online campaigns to condemn
created by the Committee to Protect online censorship and arrests of bloggers
Journalists of the ten worst countries to be and online writers, other online campaigns
a blogger, four such countries (Egypt, which call for and support social
Syria, Tunisia, and Saudi Arabia) were censorship–mostly online pornography–
from the region.10 have emerged in the past few years. For
instance, an Arabic Web site called Ehjeb
(Arabic for the verb "to block") is becoming
increasingly popular, particularly among
users of Web forums. The site offers to
2
3. 2009
facilitate blocking of Web sites by sending and regulations, technical filtering,
user-submitted URLs of questionable physical restrictions, surveillance and
content to the censors in some of the monitoring, and harassments and arrests.
region’s countries. Also, some Internet Among the laws and regulations used to
users in North African countries where control access in the region are the press
there is no social filtering have organized and publication laws, penal codes,
online campaigns to demand filtering of emergency laws, anti-terrorism laws,
sexually explicit content.13 Internet-specific laws, ISPs Terms &
Pro-censorship advocates and anti- Conditions, and telecommunications
censorship activists have also used the decrees.
court system in their attempts to
implement or remove censorship. For Press and Publication Laws, Penal
example, a judge in Egypt filed a lawsuit Codes, Emergency Laws, and Anti-
requesting the banning of 51 Web sites terrorism Bills
considered offensive. The court rejected Many countries in the region use
the lawsuit in December 2007 and restrictive press laws to regulate online
emphasized support for freedom of publishing and traditional journalism. For
expression as long as the Web sites do not example, censorship of online media and
harm local beliefs or public order. In May print journalism in Bahrain is exerted
2009 however, a Cairo court ruled in favor using the 2002 Press Law.14 Kuwait’s
of an Egyptian lawyer and ordered the 2006 Press Law allows imprisonment of
Egyptian government to ban access to journalists for making references to Islam
pornographic Web sites because they are that are deemed insulting,15 or for articles
deemed offensive to the values of religion seen as “against national interests.”16
and society. Oman’s 1984 Press and Publication Law
In Tunisia however, a blogger authorizes the government to censor
challenged the Web filtering regime in the publications deemed politically, culturally,
country by filing a legal suit against the or sexually offensive.17 Syria’s 2001 Press
Tunisian Internet Agency (ATI) for Law sets out sweeping controls over
censoring the social networking site publications printed in Syria.18 And
Facebook after it was briefly blocked in journalists in Tunisia have been
August 2008. The court dismissed the prosecuted by Tunisia’s press code which
case in November 2008 without providing bans offending the president, disturbing
any explanation. These examples and order, and publishing what the
cases illustrate how the fight over access government perceives as false news.19
control is taking different shapes and Yemen’s 1990 Press and Publications Law
forms, and also indicate that different subjects publications and broadcast
players will continue the debate and media to broad prohibitions and harsh
challenge each other. penalties.20 The press law in Morocco has
been used to suppress outspoken online
Access Control in the Middle East writers.21
and North Africa In addition to press codes, some
Access control in the Middle East and countries often use penal codes to
North Africa is multilayered; governments suppress journalists and online writers.
and authorities use different measures to Yemen’s Ministry of Information declared
regulate Internet access and online in April 2008 that the penal code will be
activities. These measures include laws used to prosecute writers who publish on
3
4. 2009
the Internet content that “incites hatred” or religious rituals, opposing the Islamic
or “harms national interests.”22 Syria’s religion, transcending family principles
penal code criminalizes spreading news and values, setting up a Web site for
abroad.23 Though the Bahraini groups promoting programs in breach of
government introduced in May 2008 public decency and order, and setting up a
amendments to the 2002 Press Law that Web site or publishing information for a
eliminate prison sentences for journalists terrorist group under fake names with
and prior censorship on publications, intent to facilitate contacts with their
journalists can still be charged and jailed leadership, or to promote their ideologies
using the penal code and anti-terrorism and finance their activities, or to publish
law.24 information on how to make explosives or
In addition to the use of penal and any other substances to be used in
press codes, two countries–Egypt and terrorist attacks.28
Syria–both of which have been under In January 2008, Saudi Arabia
emergency law for some time, have taken implemented 16 articles of new law on the
advantage of their status to punish use of technology. The law includes
individuals deemed threatening. Egypt’s penalties of ten years in prison and a fine
emergency law, in force since the for Web site operators who advocate or
declaration of the state of emergency in support terrorism; three years and fine for
1981, grants the administrative authority financial fraud or invasion of privacy; and
powers to search, arrest and detain five years and a fine for those guilty of
individuals without the supervision of distributing pornography or other
judicial bodies. Rights groups say that the materials that violate public law, religious
uninterrupted application of the values and social standards of the
emergency law since 1981 has led to the kingdom. Accomplices of the guilty parties
emergence of a parallel legal system and even those who are proven to have
unchecked by ordinary judicial bodies.25 only intended to engage in unlawful IT acts
Similarly, Syria uses the ongoing state of can receive up to half of maximum
emergency (which began in 1963) to punishments.29
arrest media workers and journalists and
political activists risk arrest at any time.26 Terms and Conditions of ISPs
Morocco uses its anti-terrorism bill, Terms and conditions imposed by ISPs are
passed following suicide bombings in also used to control access in some
Casablanca in 2003, to punish journalists. countries. In Oman for example, Internet
The bill grants the government sweeping use is regulated by the ISP Omantel’s
legal power to arrest journalists for Terms & Conditions, which mandate that
publishing content deemed to “disrupt users “not carry out any unlawful activities
public order by intimidation, force, which contradict the social, cultural,
violence, fear or terror.”27 political, religious or economical values of
the Sultanate of Oman or could cause
Internet-Specific Laws harm to any third party” as any abuse and
Few countries in the region have misuse of the Internet Services will “result
introduced Internet-specific laws to in the termination of the subscription
regulate Internet activities; among them and/or in the proceedings of Criminal or
are the United Arab Emirates and Saudi Civil lawsuits against the Customer.”30
Arabia. The UAE’s 2007 federal cyber law Another example is Yemen where the
criminalizes hacking, abusing holy shrines terms and conditions set by the ISP
4
5. 2009
TeleYemen (aka Y.Net) prohibits “sending information, together with any suspicious
any message which is offensive on moral, activities to the police.36
religious, communal, or political grounds.” Similarly, Jordan began in March 2008
TeleYemen reserves the right to control increasing restrictions on the country’s
access to data stored in its system “in any Internet cafés. Cameras were installed in
manner deemed appropriate by Internet cafes to monitor users, and
TeleYemen.” Section 6.3.3 cautions Internet café owners were required to
subscribers that TeleYemen will report register the IP number of the café, the
“any use or attempted use of the Y.Net users’ personal data, the time of use and
service which contravenes any applicable the data of Web sites explored.37
Law of the Republic of Yemen.”31 Additionally, Saudi Arabia’s Ministry of
Interior in April 2009 ordered Internet
Telecommunications Laws cafés to install hidden cameras and
Telecommunications laws are used to provide a record of names and identities
control what ISPs can and cannot host. In of their customers.38 In Kuwait, Internet
Algeria, for example, article 14 of a 1998 café owners also were required to
telecommunications decree makes ISPs maintain a record of customers’ names
responsible for the sites they host, and and IDs, which they must submit to the
requires them to take “all necessary steps Ministry of Communications (MOC) upon
to ensure constant surveillance” of request.39
content to prevent access to “material Some Internet café operators in
contrary to public order and morality.32 Lebanon admit that they use surveillance
Bahrain’s Telecommunications Law of computer software that enables them to
2002 contains penalties for illicit use of monitor the desktops and browsing habits
the network, including the transmission of of their clients under the pretext of
messages that are offensive to public protecting the security of their computer
policy or morals.33 And in Tunisia, the networks or to stop their clients from
1998 post and telecommunications law accessing pornography.40 In March 2008,
enables the authorities to intercept and the Syrian authorities ordered Internet
check the content of email messages.34 café users to provide their names and
Electronic surveillance such as filtering of identification cards and the times they use
email messages of government opponents the Internet café to Internet café owners
has been reported in Tunisia.35 who will subsequently present them to the
authorities.41
Surveillance and Monitoring In October 2007, police in Yemen
Measures to monitor Internet activities, ordered some Internet cafés to close at
particularly in Internet cafés, have been midnight and demanded that users show
introduced in many Arab countries. In their identification cards to the café
Algeria, security forces started raiding operator.42 Some Internet café owners use
Internet cafés and checking browsing surveillance software to monitor the online
history of Internet users after terrorist activities of their customers and refuse
attacks hit the country in April 2007. In access to clients who access
April 2008, the security forces increased pornography.43
their monitoring and surveillance efforts of In August 2008, the Egyptian
Internet cafés and Internet cafés were authorities imposed new monitoring
required to collect names and ID numbers measures by demanding that Internet café
of their customers and report this clients must provide their names, email
5
6. 2009
and phone numbers, before they can use To one degree or another, the Gulf
the Internet. Once the data is provided, countries, as well as Sudan, Tunisia, Gaza,
clients will receive a text message on their and Yemen, censor pornography, nudity,
cell phones and a pin number that they gay and lesbian content, escort and dating
can use to access the Internet.44 services, and sites displaying provocative
In addition to the above measures, attire. Also censored by most of these
some countries impose physical countries are Web sites which present
restrictions on Internet cafés as part of the critical reviews of Islam and/or attempt to
monitoring efforts. For example, Yemen45 convert Muslims to other religions. Some
and Oman46 require that computer of these countries also filter Web sites
screens in Internet cafés must be visible related to alcohol, gambling, and drugs.
to the floor supervisor. No closed rooms or Generally, the countries that implement
curtains that might obstruct view of the political or social filtering also target to
monitors are allowed. various degrees proxies and
circumvention tools to prevent users from
Technical Filtering in the Middle East bypassing filters. Some of these countries
and North Africa also block online translation services and
ONI conducted tests for technical Internet privacy tools apparently because they also
filtering in all of the countries in the can be used to access blocked content.
Middle East and North Africa between
2008 and 2009. Test results prove that Regional Trends in Access Control
the governments and Internet service Internet censorship in the Middle East and
providers (ISPs) censor content deemed North Africa is on the rise, and the scope
politically sensitive; critical of and depth of filtering are increasing.
governments, leaders or ruling families; Previous ONI tests revealed that political
morally offensive; or in violation of public filtering was limited in some countries, but
ethics and order. 2008-2009 results indicate that political
Testing also revealed that political censorship is targeting more content and
filtering continues to be the common is becoming more consistent. For
denominator across the region. Many example, previous tests found that Yemen
states in the Middle East and North Africa temporarily blocked political Web sites in
prevent their citizens from accessing the run-up to the 2006 presidential
political content or have blocked such elections, and Bahrain did the same
content in the past. For example, Bahrain, ahead of parliamentary elections.
Qatar, Jordan, the United Arab Emirates, However, 2008-2009 testing revealed
Syria, Saudi Arabia, Morocco, Libya, and that filtering in these two countries has
Tunisia have censored Web sites been consistently extended to include
containing content critical of the several Web sites run by opposition
governments and leaders, Web sites groups or news Web sites and forums
which claim human rights violations, which espouse oppositional political
and/or Web sites of opposition groups. views.
Mauritania has briefly blocked the news In the meantime, countries that have
Web site Taqadoumy, and Egypt has at been filtering political content continue to
some point blocked the Web site of the add more Web sites to their political
Islamic opposition group Muslim blacklists. For example, filtering in Syria
Brotherhood, as well as the Web site of was expanded to include popular sites
the Labor Party’s newspaper. such as YouTube, Facebook, and Amazon,
6
7. 2009
as well as more Web sites affiliated with Department, which announced it would
the Muslim Brotherhood Kurdish exercise immediate supervision and
opposition groups. Another example is censorship.
Tunisia, which added more political and Another example is Saudi Arabia,
oppositional content as well as other which announced in May 2009 plans to
apolitical sites such as the OpenNet enact legislation for newspapers and
Initiative and Global Voices Online. Internet Web sites that will require Saudi-
Social filtering is also increasing and is based Web sites to get official licenses
catching up with the continuously growing from a special agency under the purview
social Web. Most of the Arab countries of the Ministry of Information. Bahrain
were found to have started to block already has a similar system that requires
Arabic-language explicit content that was local Web sites to register with the
previously accessible. Interestingly, Ministry of Information.
filtering of Arabic-language explicit Web Among the new trends in controlling
content in the Middle East and North access is the increase in incidents of
Africa is usually not as fast as that of other hacking of opposition and dissident Web
languages. ONI’s investigation revealed sites and blogs. Such incidents have been
that the US-based commercial filtering reported in Tunisia and Yemen. On the
software used by most of the ISPs in the other hand, sectarian cyber war among
region does not pick up Arabic content as different religious groups in the region,
comprehensively as content in English. namely Shiite and Sunni groups, has
Increases in filtering are the norm in occurred in the past few years. The cyber
the Middle East and North Africa, and attacks managed to deface the Web sites
unblocking is the exception. Of the few of significant Shiite and Sunni
examples of unblocking of Web sites is organizations and individuals and in some
Syria’s restoration of access to Wikipedia cases the attackers managed to remove
Arabic, Morocco’s lifting of a ban on a few the content of some of these sites.
pro-Western Sahara independence Web Additionally, Israeli, Palestinian and
sites, and Libya’s allowing access to some Lebanese Web sites run by Hizbullah have
previously banned political sites. Sudan’s been targets of attacks and hacking,
filtering of gay and lesbian, dating, especially during wars and conflicts.
provocative attire and health-related sites
was also more limited compared to Conclusion
previous test results. Governments in the Middle East and North
Another regional trend is that more Africa continue to invest in media and IT
Arab countries are introducing regulations projects, and at the same time are
to make Web publishing subject to press continuing to invest in censorship
and publication laws and requiring local technologies to prevent their citizens from
Web sites to register with the authorities accessing a wide range of objectionable
before they can go live. In Jordan, for content. Also, while Western companies
example, the country’s Legislation Bureau build ICT infrastructure necessary for
in the Prime Minister’s Office issued in development in the region, other Western
September 2007 a decision that Web companies provide the censors with
sites and electronic press must comply technologies and data used to filter the
with the provisions of the publications and Internet.
publishing law and fall under the oversight The censors in the region attempt to
of the Publications and Publishing control political content using technical
7
8. 2009
filtering, laws and regulations, surveillance NOTES
and monitoring, physical restrictions, and
extra-legal harassment and arrests.
Filtering of content deemed offensive for 1 Mohammad Ghazal, “Jordan, UAE firms in
religious, moral, and cultural reasons is talks over free IT zone,” The National, May
pervasive in many countries and is 16, 2009,
growing. http://www.jordantimes.com/?news=1674
2.
Though many governments 2 Keach Hagey, “Capital launches media zone
acknowledge social filtering, most to nurture young Arab talent,” The National,
continue to disguise their political filtering October 13, 2008,
practices by attempting to confuse users http://www.thenational.ae/article/2008101
with different error messages. 2/BUSINESS/13341341/1119/NEWS.
The absence of technical filtering in 3 Chris V. Panganiban, “Technology to promote
some countries in the region by no means Arabic online,” The Peninsula, April 19,
indicates free online environments in 2009,
those countries; surveillance and http://www.thepeninsulaqatar.com/Display
monitoring practices and extra-legal _news.asp?section=local_news&month=apr
harassment from security agencies create il2009&file=local_news2009041913642.x
ml.
a climate of fear used to silence online 4 “Has the age of fixed wireless broadband
dissidents. services arrived in the Arab World? By end
Many ISPs block popular politically of March 2009, six Arab countries had
neutral online services such as online eleven commercially launched,” Arab
translation services and privacy tools Advisors Group, April 16, 2009,
fearing that they can be used to bypass http://www.arabadvisors.com/Pressers/pre
the filtering regimes. The censors also sser-160409.htm.
5 “2008 Africa - Telecoms, Mobile and
overblock Web sites and services such as
social networking Web sites and photo Broadband in Northern Region,” ChinaCCM,
and video sharing Web sites because of December 2008,
the potential for content considered http://www.chinaccm.com/4S/4S16/4S16
07/news/20081205/111435.asp.
objectionable. 6 PricewaterhouseCoopers, “Arab media
More users in the Middle East and outlook 2008-2012,”
North Africa are using the Internet for http://www.pwc.com/extweb/pwcpublicatio
political campaigning and social activism; ns.nsf/docid/14D97CB491E2A59B852573
however, states continue to introduce 34000B8AAB.
more restrictive legal, technical and 7 “2008 Africa - Telecoms, Mobile and
monitoring measures, amid growing local Broadband in Northern Region,” ChinaCCM,
and regional calls to ease restrictions and December 2008,
remove barriers to the free flow of http://www.chinaccm.com/4S/4S16/4S16
information. 07/news/20081205/111435.asp.
8 Dana Halawi, “MENA telecoms need
liberalization – Hasbani,” The Daily Star,
Author: Helmi Noman
April 17, 2009,
http://www.dailystar.com.lb/article.asp?edit
ion_id=1&categ_id=3&article_id=101067#.
9 International Federation of Journalists, “IFJ
Demands Overhaul of Repressive Media
Laws in the Middle East,” April 29, 2009,
http://www.ifj.org/en/articles/ifj-demands-
8
9. 2009
overhaul-of-repressive-media-laws-in-the- http://cpj.org/reports/2008/09/tunisia-
middle-east. oppression.php.
10 Committee to Protect Journalists, “10 Worst 20 Yemen News Agency (Saba) Press and
Countries to be a Blogger,” April 30, 2009 Publications Law,
http://cpj.org/reports/2009/04/10-worst- http://www.sabanews.net/en/news44000.
countries-to-be-a-blogger.php. htm.
11 “Egypt: new comic crimes written by the 21 “Appeal court overturns blogger’s
state security - Blogger in custody, on conviction,” September 18, 2008, Reporters
charges of exploitation of the democratic Without Borders,
climate,” The Arabic Network for Human http://www.rsf.org/article.php3?id_article=
Rights Information, May 14, 2009, 28603.
http://anhri.net/en/reports/2009/pr0514- 22 “Lawzi: Ma Yonshar fi Sahafat Al Internet
2.shtml. Lan Yakon Ba'eedan A'n Al Mosa'ala bimojib
12 “A press row in Qatar -The limits to Qanoon Al Oqobat” [Online journalism is
liberalization,” The Economist, May 14, subject to the penal code: Lawzi, Yemeni
2009, Minister of Information], Saba, February 3,
http://www.economist.com/world/mideast- 2008,
africa/displaystory.cfm?story_id=13649580 http://www.yemenna.com/vb/showthread.p
. hp?t=9502.
13 “Users’ Initiative to Block Web Sites,” 23 Freedom House, “Map of Press Freedom
OpenNet Initiative Blog, October 24, 2008, 2008,”
http://opennet.net/blog/2008/10/users- http://www.freedomhouse.org/template.cf
initiatives-block-web-sites. m?page=251&year=2008.
14 Bahrain Center for Human Rights, “Website 24 “Despite advances, journalists still face
accused of violating press code, BCHR possible jail terms under prevailing laws,
concerned that move is aimed at silencing warns IFJ,” International Federation of
critical voices,” September 2008 Journalists, June 12, 2008,
http://www.bahrainrights.org/en/node/244 http://www.ifex.org/en/content/view/full/9
6. 4435/.
15 “Country Profile: Kuwait,” BBC News, March 25 Sarah Carr, “Journalists Challenge Egypt’s
11, 2009, Exceptional Laws at Seminar,” Daily News
http://news.bbc.co.uk/2/hi/middle_east/co Egypt, August 1, 2008,
untry_profiles/791053.stm. http://dailystaregypt.com/article.aspx?Articl
16 Reporters without Borders, “Kuwait— eID=15464.
Annual Report 2007”, 26 Reporters Without Borders, “Syria - Annual
http://www.rsf.org/article.php3?id_article= Report 2007,” http://rsf.org/en-rapport163-
20767. id_rubrique659-Syria.html.
17 United Nations Development Programme, 27 “Background: The State of Human Rights in
“Program on Governance in the Arab Region Morocco,” Human Rights Watch, November
(UNDP-POGAR): Oman,” 2005,
http://www.pogar.org/countries/civil.asp?ci http://hrw.org/reports/2005/morocco1105
d=13. /4.htm.
18 Freedom House, “Map of Press Freedom 28 “UAE cyber crimes law,” Gulf News,
2008,” November 2, 2007,
http://www.freedomhouse.org/template.cf http://archive.gulfnews.com/uae/uaessenti
m?page=251&year=2008. als/more_stories/10018507.html.
19 Committee to Protect Journalists, “Tunisia 29 David Westley, “Saudi Tightens Grip on
Report: The Smiling Oppressor,” September Internet Use,” Arabian Business, January
23, 2008, 26, 2008,
9
10. 2009
http://www.arabianbusiness.com/509226- caf%C3%A9s-saudi-must-install-hidden-
saudi-tightens-grip-on-internet-useoni. came.
30 Omantel, “Omantel Terms & Conditions,” 39 U.S. Department of State, “Country Reports
http://www.omantel.net.om/policy/terms.as on Human Rights Practices—2007,”
p. released by the Bureau of Democracy,
31 Y.Net, “Terms and conditions for Y.Net Human Rights, and Labor, March 11, 2008,
Service,” http://www.state.gov/g/drl/rls/hrrpt/2007/
http://www.y.net.ye/support/rules.htm. 100599.htm.
32 Reporters Without Borders, “Internet Under 40 “Baramij Malomatiya tadbut elaqat al-
Surveillance 2004 - Algeria,” Jumhur bemaqahi al-Internet lima’ aljins
http://www.rsf.org/article.php3?id_article= waltajasos wasirqat albareed aleliqtoroni”
10730. [Information software to control the
33 Telecommunication Regulatory Authority relationship between the public and Internet
(TRA) - Kingdom of Bahrain, “Legislative cafés and to prevent access to sex, spying,
decree no. 48 of 2002 Promulgating the and stealing emails], Dar al-Hayat, June 24,
Telecommunications Law,” 2007,
http://www.tra.org.bh/en/home.asp?dfltlng http://www.daralhayat.com/science_tech/0
=1. 6-2007/Item-20070623-59a6944a-c0a8-
34 “A textbook case in press censorship for the 10ed-0082-a494ca530035/story.html.
past 20 years,” Reporters Without Borders, 41 Khaled Yacoub Oweis, “Syria expands ‘iron
November 5, 2007, censorship’ over Internet,” Reuters, March
http://www.rsf.org/article.php3?id_article= 13, 2008,
24264. http://uk.reuters.com/article/internetNews/
35 “Repression continues as Ben Ali marks idUKL138353620080313?sp=true.
21st anniversary as president,” Reporters 42 “Internet cafes closed after midnight,”
Without Borders, November 7, 2008, Mareb Press, February 20, 2008,
http://www.rsf.org/article.php3?id_article= http://marebpress.net/news_details.php?si
29208. d=10305.
36 Fathiya Borowinah, “al-Jazaer: Ajhizat alamn 43 Moneer Al-Omari , “Search for Pornographic
tolin al-harb ala magahi alinternet liihbat Material on Rise; Children are most
masharee’ khalaya irhabiya naemah” Vulnerable,” Yemen Post, January 12, 2009,
[Algeria: security services declared war on http://www.yemenpost.net/63/Reports/20
Internet cafes to thwart the projects of 084.htm.
terrorist sleeper cells], Al-Riyadh, May 1, 44 “Egypt demanding data from cyber cafés
2007, users: NGO,” AFP, August 9, 2008,
http://www.alriyadh.com/2007/05/01/arti http://afp.google.com/article/ALeqM5hN_tk
cle246175.html. tRSmeojLOOn65lVULB4lj8A.
37 “Jordan: New Restrictions on Internet Cafes 45 Moneer Al-Omari , “Search for Pornographic
and Violating Privacy of Users,” The Arabic Material on Rise; Children are most
Network for Human Rights Information, Vulnerable,” Yemen Post, January 12, 2009,
March 11, 2008, http://www.yemenpost.net/63/Reports/20
http://anhri.net/en/reports/2008/pr0311.s 084.htm.
html. 46 Oman Telecommunications Company,
38 Helmi Noman, “Restriction on Internet use “Procedures for Internet Cyber Café Pre-
in the Middle East on the rise: Internet cafés Approval,”
in Saudi must install hidden cameras,” http://www.omantel.net.om/services/busin
OpenNet Initiative Blog, April 16, 2009, ess/internet/preapprovaleng.pdf.
http://opennet.net/blog/2009/04/restrictio
n-internet-use-middle-east-rise-internet-
10