SlideShare a Scribd company logo
1 of 14
Download to read offline
Web Censorship and Public Awareness:
The case of Internet regulation in Japan


              Chris Salzberg
To censor:

to examine in order to suppress or delete anything 
            considered objectionable

               (Merriam­Webster)
What does “Web Censorship” mean?

    Different meanings in different contexts:
    
        Censorship by governments against freedom of expression 
        and free access to information
    
        Filtering of content seen as “harmful” to society
    
        Violation of privacy rights: web monitoring, eavesdropping
    
        “Censorship” against file sharing (copyrighted content)

    What is “anti­censorship”?
“The Age of Net Regulation is Coming”
 
     In the last year, moves toward net regulation:
     1.Internet content (transmission + broadcasting = ?)
     2.Copyright legislation (file sharing)
     3.Mobile web access (filtering, “harmful” content)
 
     Fears about: “deai” (dating) sites, obscene/voilent 
     content, child porn, “adult” anime, net bullying, 
     death threats (Akihabara massacre), etc. etc. etc.
Filtering of “harmful” content

    Bill by LDP/DPJ passed into law on June 11th

    Included in the bill:
    
        Obligation on PC makers to pre­install national 
        standards­based filtering software on PCs/mobile phones
    
        Filtering on mobile phones for users under age 18
    
        ISPs required to eliminate harmful content/services

    Government decides what is “harmful”
Support for Regulation

    A survey on regulation of “harmful content” (2007):
    
        67.8% said the Internet should be regulated
    
        22.7% said they lean toward regulation
    
        3.1% said they lean toward non­regulation
    
        1.4% said the Internet should not be regulated

    76% support web filtering, 51% want police to 
    strengthen monitoring, 87% support manga porn 
    regulation
Opposition to Regulation





    Some of the greatest opposition from companies: 
    DENA, Yahoo, Microsoft, Rakuten, Net Star

    Emphasizing positives of an open Internet
Opposition strategies

    More so than free access to information, opposition 
    strategies emphasize economic considerations:
    
        Regulation will stop innovation/creativity
    
        Japan will be left behind, outcompeted

    Also emphasizes knowledge issues:
    
        Many proposals are technologically contradictory
    
        Lack of transparency in legislation
The “people” are killing the Internet

    Oppression of the people by governments and 
    corporations is not seen as a major concern

    Conern is about other citizens:
    
        Bullying, death threats, dating sites, obscene content, 
        copyright violation, etc. etc.

    Conclusion: it is the people who are killing the 
    Internet, gov't needs to step in and regulate
The future is now





    Citizen media coverage of Akihabara killings:
    
        Instantaneous through Ustream, 2000­3000 viewers
    
        No editing or censorship of footage
    
        Large public backlash, criticism
Summary

    “Web censorship” means different things to 
    different people/groups/nations

    Different opposition strategies:
    
        Technological problems with censorship
    
        Lack of transparency in process
    
        Economic considerations, innovation/creativity

    Awareness and literacy are key

More Related Content

What's hot

Where next for the Regulation of Investigatory Powers Act?
Where next for the Regulation of Investigatory Powers Act?Where next for the Regulation of Investigatory Powers Act?
Where next for the Regulation of Investigatory Powers Act?blogzilla
 
Turkey aside
Turkey asideTurkey aside
Turkey asideDina Beer
 
2019: Regulating disinformation with artificial intelligence (AI)
2019: Regulating disinformation with artificial intelligence (AI)2019: Regulating disinformation with artificial intelligence (AI)
2019: Regulating disinformation with artificial intelligence (AI)Chris Marsden
 
Oxford Internet Institute 19 Sept 2019: Disinformation – Platform, publisher ...
Oxford Internet Institute 19 Sept 2019: Disinformation – Platform, publisher ...Oxford Internet Institute 19 Sept 2019: Disinformation – Platform, publisher ...
Oxford Internet Institute 19 Sept 2019: Disinformation – Platform, publisher ...Chris Marsden
 
Artificial intelligence governance in the Obama & Trump years
Artificial intelligence governance in the Obama & Trump yearsArtificial intelligence governance in the Obama & Trump years
Artificial intelligence governance in the Obama & Trump yearsAdam Thierer
 
Lim Jus394 Sea Censorship
Lim Jus394 Sea CensorshipLim Jus394 Sea Censorship
Lim Jus394 Sea Censorshipmerlyna
 
Governance and Information Technology
Governance and Information TechnologyGovernance and Information Technology
Governance and Information Technologykatieingersoll
 
Cyber Surveillance - Honors English 1 Presentation
Cyber Surveillance - Honors English 1 PresentationCyber Surveillance - Honors English 1 Presentation
Cyber Surveillance - Honors English 1 Presentationaxnv
 
Internet Surveillance
Internet SurveillanceInternet Surveillance
Internet Surveillancecfeutlinske
 
Privacy law and policy 2 - LIS550
Privacy law and policy 2 - LIS550 Privacy law and policy 2 - LIS550
Privacy law and policy 2 - LIS550 Brian Rowe
 
Analysis of cyber crime bill 2016
Analysis of cyber crime bill 2016 Analysis of cyber crime bill 2016
Analysis of cyber crime bill 2016 Zohaib Arshid
 
SCL Annual Conference 2019: Regulating social media platforms for interoperab...
SCL Annual Conference 2019: Regulating social media platforms for interoperab...SCL Annual Conference 2019: Regulating social media platforms for interoperab...
SCL Annual Conference 2019: Regulating social media platforms for interoperab...Chris Marsden
 
At The Brink of Digital Authoritarian
At The Brink of Digital AuthoritarianAt The Brink of Digital Authoritarian
At The Brink of Digital AuthoritarianDamar Juniarto
 
Computer and network surveillance
Computer and network surveillanceComputer and network surveillance
Computer and network surveillancemarianavigato0
 
Open Letter to President Obama Opposing Backdoors and Defective Encryption
Open Letter to President Obama Opposing Backdoors and Defective EncryptionOpen Letter to President Obama Opposing Backdoors and Defective Encryption
Open Letter to President Obama Opposing Backdoors and Defective EncryptionAlvaro Lopez Ortega
 

What's hot (20)

Where next for the Regulation of Investigatory Powers Act?
Where next for the Regulation of Investigatory Powers Act?Where next for the Regulation of Investigatory Powers Act?
Where next for the Regulation of Investigatory Powers Act?
 
Turkey aside
Turkey asideTurkey aside
Turkey aside
 
2019: Regulating disinformation with artificial intelligence (AI)
2019: Regulating disinformation with artificial intelligence (AI)2019: Regulating disinformation with artificial intelligence (AI)
2019: Regulating disinformation with artificial intelligence (AI)
 
Oxford Internet Institute 19 Sept 2019: Disinformation – Platform, publisher ...
Oxford Internet Institute 19 Sept 2019: Disinformation – Platform, publisher ...Oxford Internet Institute 19 Sept 2019: Disinformation – Platform, publisher ...
Oxford Internet Institute 19 Sept 2019: Disinformation – Platform, publisher ...
 
Internet Censorship
Internet CensorshipInternet Censorship
Internet Censorship
 
Artificial intelligence governance in the Obama & Trump years
Artificial intelligence governance in the Obama & Trump yearsArtificial intelligence governance in the Obama & Trump years
Artificial intelligence governance in the Obama & Trump years
 
Lim Jus394 Sea Censorship
Lim Jus394 Sea CensorshipLim Jus394 Sea Censorship
Lim Jus394 Sea Censorship
 
Governance and Information Technology
Governance and Information TechnologyGovernance and Information Technology
Governance and Information Technology
 
Cyber Surveillance - Honors English 1 Presentation
Cyber Surveillance - Honors English 1 PresentationCyber Surveillance - Honors English 1 Presentation
Cyber Surveillance - Honors English 1 Presentation
 
Internet Surveillance
Internet SurveillanceInternet Surveillance
Internet Surveillance
 
The Largest Democracy - India
The Largest Democracy - IndiaThe Largest Democracy - India
The Largest Democracy - India
 
Freedom on the net 2018
Freedom on the net 2018Freedom on the net 2018
Freedom on the net 2018
 
Polinter11
Polinter11Polinter11
Polinter11
 
Privacy law and policy 2 - LIS550
Privacy law and policy 2 - LIS550 Privacy law and policy 2 - LIS550
Privacy law and policy 2 - LIS550
 
Analysis of cyber crime bill 2016
Analysis of cyber crime bill 2016 Analysis of cyber crime bill 2016
Analysis of cyber crime bill 2016
 
Internet Freedom 2.1
Internet Freedom 2.1Internet Freedom 2.1
Internet Freedom 2.1
 
SCL Annual Conference 2019: Regulating social media platforms for interoperab...
SCL Annual Conference 2019: Regulating social media platforms for interoperab...SCL Annual Conference 2019: Regulating social media platforms for interoperab...
SCL Annual Conference 2019: Regulating social media platforms for interoperab...
 
At The Brink of Digital Authoritarian
At The Brink of Digital AuthoritarianAt The Brink of Digital Authoritarian
At The Brink of Digital Authoritarian
 
Computer and network surveillance
Computer and network surveillanceComputer and network surveillance
Computer and network surveillance
 
Open Letter to President Obama Opposing Backdoors and Defective Encryption
Open Letter to President Obama Opposing Backdoors and Defective EncryptionOpen Letter to President Obama Opposing Backdoors and Defective Encryption
Open Letter to President Obama Opposing Backdoors and Defective Encryption
 

Similar to Web Censorship in Japan and Public Support

International politics in the age of the internet
International politics in the age of the internetInternational politics in the age of the internet
International politics in the age of the internetJeffrey Hart
 
China’s Internet Security _Dichotomy of National Security and Human Rights in...
China’s Internet Security _Dichotomy of National Security and Human Rights in...China’s Internet Security _Dichotomy of National Security and Human Rights in...
China’s Internet Security _Dichotomy of National Security and Human Rights in...Emily Võ
 
Cst group project#2, intro++
Cst group project#2, intro++Cst group project#2, intro++
Cst group project#2, intro++Roxanne St Ives
 
Censorship down under
Censorship down underCensorship down under
Censorship down underErhan Boduk
 
A week is a long time in computer ethics
A week is a long time in computer ethicsA week is a long time in computer ethics
A week is a long time in computer ethicsUltraUploader
 
Digital Repression and Techno-Authoritarianism
Digital Repression and Techno-AuthoritarianismDigital Repression and Techno-Authoritarianism
Digital Repression and Techno-AuthoritarianismCharles Mok
 
Internet Censorship across the World
Internet Censorship across the WorldInternet Censorship across the World
Internet Censorship across the WorldNitine
 
Running Head THE CHANGING NATURE OF CYBER CRIME 1 .docx
Running Head THE CHANGING NATURE OF CYBER CRIME 1          .docxRunning Head THE CHANGING NATURE OF CYBER CRIME 1          .docx
Running Head THE CHANGING NATURE OF CYBER CRIME 1 .docxjeanettehully
 
Freedom of expression
Freedom of expressionFreedom of expression
Freedom of expressionGerwin Ocsena
 
"Digital.Report+" - expert magazine for ICT policy professionals
"Digital.Report+" - expert magazine for ICT policy professionals"Digital.Report+" - expert magazine for ICT policy professionals
"Digital.Report+" - expert magazine for ICT policy professionalsVadim Dryganov
 
Moral Censorship on The Internet
Moral Censorship on The InternetMoral Censorship on The Internet
Moral Censorship on The InternetJacob Gee
 
Freedom or Control in Virtual Worlds
Freedom or Control in Virtual WorldsFreedom or Control in Virtual Worlds
Freedom or Control in Virtual WorldsJyrki Kasvi
 
The Rise of Internet Freedom Activism
The Rise of Internet Freedom ActivismThe Rise of Internet Freedom Activism
The Rise of Internet Freedom ActivismUniversity of Sydney
 
Manipulating Social Media to Undermine Democracy 2017 Final
Manipulating Social Media to Undermine Democracy 2017 Final Manipulating Social Media to Undermine Democracy 2017 Final
Manipulating Social Media to Undermine Democracy 2017 Final Alireza Ghahrood
 
The securitization of online activism
The securitization of online activismThe securitization of online activism
The securitization of online activismjwilso
 
Lessons on netfreedom+best practices in cyber security
Lessons on netfreedom+best practices in cyber securityLessons on netfreedom+best practices in cyber security
Lessons on netfreedom+best practices in cyber securityFreedom House
 

Similar to Web Censorship in Japan and Public Support (19)

International politics in the age of the internet
International politics in the age of the internetInternational politics in the age of the internet
International politics in the age of the internet
 
China’s Internet Security _Dichotomy of National Security and Human Rights in...
China’s Internet Security _Dichotomy of National Security and Human Rights in...China’s Internet Security _Dichotomy of National Security and Human Rights in...
China’s Internet Security _Dichotomy of National Security and Human Rights in...
 
Cst group project#2, intro++
Cst group project#2, intro++Cst group project#2, intro++
Cst group project#2, intro++
 
Censorship down under
Censorship down underCensorship down under
Censorship down under
 
Internet governance
Internet governanceInternet governance
Internet governance
 
A week is a long time in computer ethics
A week is a long time in computer ethicsA week is a long time in computer ethics
A week is a long time in computer ethics
 
Digital Repression and Techno-Authoritarianism
Digital Repression and Techno-AuthoritarianismDigital Repression and Techno-Authoritarianism
Digital Repression and Techno-Authoritarianism
 
Internet Censorship across the World
Internet Censorship across the WorldInternet Censorship across the World
Internet Censorship across the World
 
Future of democracy and civic innovation
Future of democracy and civic innovationFuture of democracy and civic innovation
Future of democracy and civic innovation
 
Running Head THE CHANGING NATURE OF CYBER CRIME 1 .docx
Running Head THE CHANGING NATURE OF CYBER CRIME 1          .docxRunning Head THE CHANGING NATURE OF CYBER CRIME 1          .docx
Running Head THE CHANGING NATURE OF CYBER CRIME 1 .docx
 
Freedom of expression
Freedom of expressionFreedom of expression
Freedom of expression
 
"Digital.Report+" - expert magazine for ICT policy professionals
"Digital.Report+" - expert magazine for ICT policy professionals"Digital.Report+" - expert magazine for ICT policy professionals
"Digital.Report+" - expert magazine for ICT policy professionals
 
Moral Censorship on The Internet
Moral Censorship on The InternetMoral Censorship on The Internet
Moral Censorship on The Internet
 
Freedom or Control in Virtual Worlds
Freedom or Control in Virtual WorldsFreedom or Control in Virtual Worlds
Freedom or Control in Virtual Worlds
 
The Rise of Internet Freedom Activism
The Rise of Internet Freedom ActivismThe Rise of Internet Freedom Activism
The Rise of Internet Freedom Activism
 
Texas policy 2016
Texas policy 2016Texas policy 2016
Texas policy 2016
 
Manipulating Social Media to Undermine Democracy 2017 Final
Manipulating Social Media to Undermine Democracy 2017 Final Manipulating Social Media to Undermine Democracy 2017 Final
Manipulating Social Media to Undermine Democracy 2017 Final
 
The securitization of online activism
The securitization of online activismThe securitization of online activism
The securitization of online activism
 
Lessons on netfreedom+best practices in cyber security
Lessons on netfreedom+best practices in cyber securityLessons on netfreedom+best practices in cyber security
Lessons on netfreedom+best practices in cyber security
 

More from rmackinnon

Can authoritarianism survive the Internet? Yes it can...
Can authoritarianism survive the Internet? Yes it can...Can authoritarianism survive the Internet? Yes it can...
Can authoritarianism survive the Internet? Yes it can...rmackinnon
 
国际互联网治理 - 我们都是国际网民!
国际互联网治理 -我们都是国际网民!国际互联网治理 -我们都是国际网民!
国际互联网治理 - 我们都是国际网民!rmackinnon
 
Document 1: Green Dam Technical Requirements
Document 1: Green Dam Technical RequirementsDocument 1: Green Dam Technical Requirements
Document 1: Green Dam Technical Requirementsrmackinnon
 
China's Censorship 2.0 (Green Dam update)
China's Censorship 2.0 (Green Dam update)China's Censorship 2.0 (Green Dam update)
China's Censorship 2.0 (Green Dam update)rmackinnon
 
Internet & Activism: 20 Years After Tiananmen
Internet & Activism: 20 Years After TiananmenInternet & Activism: 20 Years After Tiananmen
Internet & Activism: 20 Years After Tiananmenrmackinnon
 
Lecture @ Fudan J-School
Lecture @ Fudan J-SchoolLecture @ Fudan J-School
Lecture @ Fudan J-Schoolrmackinnon
 
The Tao of the Web: China and the future of the Internet
The Tao of the Web: China and the future of the InternetThe Tao of the Web: China and the future of the Internet
The Tao of the Web: China and the future of the Internetrmackinnon
 
Chinese social media and political discourse
Chinese social media and political discourseChinese social media and political discourse
Chinese social media and political discoursermackinnon
 
Cyber-ocracy vs. Cyber-tarianism: The Chinese Internet
Cyber-ocracy vs. Cyber-tarianism: The Chinese InternetCyber-ocracy vs. Cyber-tarianism: The Chinese Internet
Cyber-ocracy vs. Cyber-tarianism: The Chinese Internetrmackinnon
 
OSi Forum - supplementary videos
OSi Forum - supplementary videosOSi Forum - supplementary videos
OSi Forum - supplementary videosrmackinnon
 
Censorship by Chinese Blog-hosting Companies
Censorship by Chinese Blog-hosting CompaniesCensorship by Chinese Blog-hosting Companies
Censorship by Chinese Blog-hosting Companiesrmackinnon
 
iSummit keynote: Free Culture & Free Speech
iSummit keynote: Free Culture & Free SpeechiSummit keynote: Free Culture & Free Speech
iSummit keynote: Free Culture & Free Speechrmackinnon
 
China the Internet and Corporate Responsibility
China the Internet and Corporate ResponsibilityChina the Internet and Corporate Responsibility
China the Internet and Corporate Responsibilityrmackinnon
 
Yahoo!, the Shi Tao Case, and lessons for corporate social responsibility
Yahoo!, the Shi Tao Case, and lessons for corporate social responsibilityYahoo!, the Shi Tao Case, and lessons for corporate social responsibility
Yahoo!, the Shi Tao Case, and lessons for corporate social responsibilityrmackinnon
 
Journalism 2.0: The future of news
Journalism 2.0: The future of newsJournalism 2.0: The future of news
Journalism 2.0: The future of newsrmackinnon
 
Global Voices May9
Global Voices May9Global Voices May9
Global Voices May9rmackinnon
 

More from rmackinnon (18)

Can authoritarianism survive the Internet? Yes it can...
Can authoritarianism survive the Internet? Yes it can...Can authoritarianism survive the Internet? Yes it can...
Can authoritarianism survive the Internet? Yes it can...
 
国际互联网治理 - 我们都是国际网民!
国际互联网治理 -我们都是国际网民!国际互联网治理 -我们都是国际网民!
国际互联网治理 - 我们都是国际网民!
 
Document 1: Green Dam Technical Requirements
Document 1: Green Dam Technical RequirementsDocument 1: Green Dam Technical Requirements
Document 1: Green Dam Technical Requirements
 
China's Censorship 2.0 (Green Dam update)
China's Censorship 2.0 (Green Dam update)China's Censorship 2.0 (Green Dam update)
China's Censorship 2.0 (Green Dam update)
 
Internet & Activism: 20 Years After Tiananmen
Internet & Activism: 20 Years After TiananmenInternet & Activism: 20 Years After Tiananmen
Internet & Activism: 20 Years After Tiananmen
 
Lecture @ Fudan J-School
Lecture @ Fudan J-SchoolLecture @ Fudan J-School
Lecture @ Fudan J-School
 
The Tao of the Web: China and the future of the Internet
The Tao of the Web: China and the future of the InternetThe Tao of the Web: China and the future of the Internet
The Tao of the Web: China and the future of the Internet
 
Chinese social media and political discourse
Chinese social media and political discourseChinese social media and political discourse
Chinese social media and political discourse
 
Cyber-ocracy vs. Cyber-tarianism: The Chinese Internet
Cyber-ocracy vs. Cyber-tarianism: The Chinese InternetCyber-ocracy vs. Cyber-tarianism: The Chinese Internet
Cyber-ocracy vs. Cyber-tarianism: The Chinese Internet
 
OSi Forum - supplementary videos
OSi Forum - supplementary videosOSi Forum - supplementary videos
OSi Forum - supplementary videos
 
Censorship by Chinese Blog-hosting Companies
Censorship by Chinese Blog-hosting CompaniesCensorship by Chinese Blog-hosting Companies
Censorship by Chinese Blog-hosting Companies
 
iSummit keynote: Free Culture & Free Speech
iSummit keynote: Free Culture & Free SpeechiSummit keynote: Free Culture & Free Speech
iSummit keynote: Free Culture & Free Speech
 
China the Internet and Corporate Responsibility
China the Internet and Corporate ResponsibilityChina the Internet and Corporate Responsibility
China the Internet and Corporate Responsibility
 
Yahoo!, the Shi Tao Case, and lessons for corporate social responsibility
Yahoo!, the Shi Tao Case, and lessons for corporate social responsibilityYahoo!, the Shi Tao Case, and lessons for corporate social responsibility
Yahoo!, the Shi Tao Case, and lessons for corporate social responsibility
 
Journalism 2.0: The future of news
Journalism 2.0: The future of newsJournalism 2.0: The future of news
Journalism 2.0: The future of news
 
Cc Hku
Cc HkuCc Hku
Cc Hku
 
Global Voices May9
Global Voices May9Global Voices May9
Global Voices May9
 
Web2hku
Web2hkuWeb2hku
Web2hku
 

Recently uploaded

How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?XfilesPro
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAndikSusilo4
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your BudgetHyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your BudgetEnjoy Anytime
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 

Recently uploaded (20)

How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & Application
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptxVulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
 
The transition to renewables in India.pdf
The transition to renewables in India.pdfThe transition to renewables in India.pdf
The transition to renewables in India.pdf
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your BudgetHyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 

Web Censorship in Japan and Public Support

  • 3. What does “Web Censorship” mean?  Different meanings in different contexts:  Censorship by governments against freedom of expression  and free access to information  Filtering of content seen as “harmful” to society  Violation of privacy rights: web monitoring, eavesdropping  “Censorship” against file sharing (copyrighted content)  What is “anti­censorship”?
  • 4. “The Age of Net Regulation is Coming”  In the last year, moves toward net regulation: 1.Internet content (transmission + broadcasting = ?) 2.Copyright legislation (file sharing) 3.Mobile web access (filtering, “harmful” content)  Fears about: “deai” (dating) sites, obscene/voilent  content, child porn, “adult” anime, net bullying,  death threats (Akihabara massacre), etc. etc. etc.
  • 5. Filtering of “harmful” content  Bill by LDP/DPJ passed into law on June 11th  Included in the bill:  Obligation on PC makers to pre­install national  standards­based filtering software on PCs/mobile phones  Filtering on mobile phones for users under age 18  ISPs required to eliminate harmful content/services  Government decides what is “harmful”
  • 6.
  • 7.
  • 8.
  • 9. Support for Regulation  A survey on regulation of “harmful content” (2007):  67.8% said the Internet should be regulated  22.7% said they lean toward regulation  3.1% said they lean toward non­regulation  1.4% said the Internet should not be regulated  76% support web filtering, 51% want police to  strengthen monitoring, 87% support manga porn  regulation
  • 10. Opposition to Regulation  Some of the greatest opposition from companies:  DENA, Yahoo, Microsoft, Rakuten, Net Star  Emphasizing positives of an open Internet
  • 11. Opposition strategies  More so than free access to information, opposition  strategies emphasize economic considerations:  Regulation will stop innovation/creativity  Japan will be left behind, outcompeted  Also emphasizes knowledge issues:  Many proposals are technologically contradictory  Lack of transparency in legislation
  • 12. The “people” are killing the Internet  Oppression of the people by governments and  corporations is not seen as a major concern  Conern is about other citizens:  Bullying, death threats, dating sites, obscene content,  copyright violation, etc. etc.  Conclusion: it is the people who are killing the  Internet, gov't needs to step in and regulate
  • 13. The future is now  Citizen media coverage of Akihabara killings:  Instantaneous through Ustream, 2000­3000 viewers  No editing or censorship of footage  Large public backlash, criticism
  • 14. Summary  “Web censorship” means different things to  different people/groups/nations  Different opposition strategies:  Technological problems with censorship  Lack of transparency in process  Economic considerations, innovation/creativity  Awareness and literacy are key