SlideShare a Scribd company logo
1 of 8
Download to read offline
Censorship
Dr. Varun Kumar
Dr. Varun Kumar (IIIT Surat) Lecture-19 1 / 8
Outlines
1 Introduction to Censorship
2 What could we censor?
3 Censorship Strategy
Dr. Varun Kumar (IIIT Surat) Lecture-19 2 / 8
Introduction to Censorship
⇒ Accessing internet require
Computer
A telecommunication connection
A modem
A browser
⇒ During working hour, employee may misuse the internet.
Need some restriction for increasing productivity.
⇒ Providing Internet access at home.
May be dangerous for children → Sexual or violence content
Harmful for family as well as society.
⇒ Not providing access to the Internet
Exclude people from the benefits of the vast information on the
Internet.
Dr. Varun Kumar (IIIT Surat) Lecture-19 3 / 8
Continued–
⇒ Filter the websites to ensure the ’right’ information is accessible to
people.
⇒ Especially children and employees.
⇒ Freedom of Speech is a fundamental human right.
⇒ This freedom of speech has also +ve and -ve aspects.
⇒ For social security, we need also some censorship.
Prevent children from viewing pornography
Dr. Varun Kumar (IIIT Surat) Lecture-19 4 / 8
Types of Authority
1 Parental
⇒ Authority over their children.
⇒ Pornographic material or violence content
2 Employer
⇒ Authority over their employees in the workplace.
⇒ Playing games
3 Government
⇒ Authority over a country.
⇒ Violent materials circulations
4 International
⇒ Authority over the international community.
⇒ Stopping Terrorist Newsgroups
Dr. Varun Kumar (IIIT Surat) Lecture-19 5 / 8
Why Censor?
Censorship is a contentious issue and a wide range of viewpoints exist on
the topic.
⇒ Parents: Parents want
Children watch educational Web sites.
Children easily influenced by the content that they find on the Web.
Parents want to prevent their children from accessing adult material.
⇒ Employers: Employers want
Internet is paid service and is given for office work only.
Corporate liability may be threatened if employees view inappropriate
and/or offensive material.
⇒ Pressure groups:
Internet is open for all. It can be used for spreading wrong and unsocial
information.
There should be some mechanism for the removal of such sites.
⇒ Legal:
Laws limit the offensive material that may be communicated by
electronic means.
Dr. Varun Kumar (IIIT Surat) Lecture-19 6 / 8
Censorship Strategies
Popular systems for censoring sites
⇒ Blocking Software
⇒ Chines software/apps banned by Indian Government after Galwan clash.
⇒ Some censorship may be genuine and someone may be political or
intentional.
⇒ Google also take responsibility for allowing and blocking software on its
platform playstore.
⇒ Ratings
⇒ Moody’s and Fitch → Ease of doing business over the globe.
⇒ FATF → Involvement of a nation in terrorist activities.
Two rating based approach
⇒ Syntax for defining labels:
A website could have labels describing the levels of Language, Nudity,
Sex, and Violence.
⇒ Syntax for labeling content:
Rating classification itself for each of the labels. Ex- Thesis evaluation
in front of DSC committee (PhD program)
Dr. Varun Kumar (IIIT Surat) Lecture-19 7 / 8
Continued–
⇒ Service Providers
⇒ The ISP can then run the appropriate software to block access to sites
based on the user’s access level → Block lists or site ratings.
⇒ Browsers and search engines
⇒ Some browsers and search engines directly allow for censorship.
⇒ Some search engines allow for user feedback to provide information
used to decide if a site should be removed from their index.
⇒ Social Methods
⇒ It is important that users are educated as to the implications of their
actions.
⇒ There is a moral responsibility associated with data access, and those
who have the ability to control it need to be aware of the issues
involved.
⇒ Education plays an important role in raising awareness, and this has to
be addressed from a global perspective.
Dr. Varun Kumar (IIIT Surat) Lecture-19 8 / 8

More Related Content

What's hot

CIPA Overview
CIPA OverviewCIPA Overview
CIPA Overviewedtecher
 
Online radicalisation: work, challenges and future directions
Online radicalisation: work, challenges and future directionsOnline radicalisation: work, challenges and future directions
Online radicalisation: work, challenges and future directionsMiriam Fernandez
 
New Possibility in Computing
New Possibility in ComputingNew Possibility in Computing
New Possibility in ComputingVARUN KUMAR
 
Action Lines of Geneva Plan of Action
Action Lines of Geneva Plan of ActionAction Lines of Geneva Plan of Action
Action Lines of Geneva Plan of ActionVARUN KUMAR
 
Information Technology Use in West African Agriculture – challenges and oppor...
Information Technology Use in West African Agriculture – challenges and oppor...Information Technology Use in West African Agriculture – challenges and oppor...
Information Technology Use in West African Agriculture – challenges and oppor...Maurice Dawson
 
Internet Freedom & Internet Bill of Rights
Internet Freedom & Internet Bill of RightsInternet Freedom & Internet Bill of Rights
Internet Freedom & Internet Bill of RightsFreedom House
 
IGF Hyderabad - Index of Global Internet Freedom
IGF Hyderabad - Index of Global Internet FreedomIGF Hyderabad - Index of Global Internet Freedom
IGF Hyderabad - Index of Global Internet FreedomFreedom House
 
Digitaldivide
DigitaldivideDigitaldivide
Digitaldivideliz5685
 
Should the government monitor their people's activities online?
Should the government monitor their people's activities online?Should the government monitor their people's activities online?
Should the government monitor their people's activities online?DannyTio
 
Presentation slides
Presentation slidesPresentation slides
Presentation slidesandrewdyoung
 
International Standards to Regulate Aggressive Cyber-behavior from a Foreign ...
International Standards to Regulate Aggressive Cyber-behavior from a Foreign ...International Standards to Regulate Aggressive Cyber-behavior from a Foreign ...
International Standards to Regulate Aggressive Cyber-behavior from a Foreign ...Mansoor Faridi, CISA
 
Internet Content Regulation: What it means in 2010
Internet Content Regulation: What it means in 2010Internet Content Regulation: What it means in 2010
Internet Content Regulation: What it means in 2010Wendy Qi
 
On the Application of Social Data Science to Address Societal Challenges
On the Application of Social Data Science to Address Societal ChallengesOn the Application of Social Data Science to Address Societal Challenges
On the Application of Social Data Science to Address Societal ChallengesMiriam Fernandez
 
Cyberwar and Geopolitics
Cyberwar and GeopoliticsCyberwar and Geopolitics
Cyberwar and Geopoliticstnwac
 
Korpisaari how to combat hate speech without sacrificing freedom of speech?
Korpisaari how to combat hate speech without sacrificing freedom of speech?Korpisaari how to combat hate speech without sacrificing freedom of speech?
Korpisaari how to combat hate speech without sacrificing freedom of speech?Päivi Korpisaari
 

What's hot (20)

Online Harms White Paper April 2019 Bill Dutton
Online Harms White Paper April 2019 Bill DuttonOnline Harms White Paper April 2019 Bill Dutton
Online Harms White Paper April 2019 Bill Dutton
 
CIPA Overview
CIPA OverviewCIPA Overview
CIPA Overview
 
Online radicalisation: work, challenges and future directions
Online radicalisation: work, challenges and future directionsOnline radicalisation: work, challenges and future directions
Online radicalisation: work, challenges and future directions
 
New Possibility in Computing
New Possibility in ComputingNew Possibility in Computing
New Possibility in Computing
 
Cyber security issue part b
Cyber security issue  part b Cyber security issue  part b
Cyber security issue part b
 
Action Lines of Geneva Plan of Action
Action Lines of Geneva Plan of ActionAction Lines of Geneva Plan of Action
Action Lines of Geneva Plan of Action
 
Information Technology Use in West African Agriculture – challenges and oppor...
Information Technology Use in West African Agriculture – challenges and oppor...Information Technology Use in West African Agriculture – challenges and oppor...
Information Technology Use in West African Agriculture – challenges and oppor...
 
Internet Freedom & Internet Bill of Rights
Internet Freedom & Internet Bill of RightsInternet Freedom & Internet Bill of Rights
Internet Freedom & Internet Bill of Rights
 
IGF Hyderabad - Index of Global Internet Freedom
IGF Hyderabad - Index of Global Internet FreedomIGF Hyderabad - Index of Global Internet Freedom
IGF Hyderabad - Index of Global Internet Freedom
 
Digitaldivide
DigitaldivideDigitaldivide
Digitaldivide
 
Should the government monitor their people's activities online?
Should the government monitor their people's activities online?Should the government monitor their people's activities online?
Should the government monitor their people's activities online?
 
Policy primer
Policy primerPolicy primer
Policy primer
 
8th Milestones meeting: Cyber violence roundtable
8th Milestones meeting: Cyber violence roundtable8th Milestones meeting: Cyber violence roundtable
8th Milestones meeting: Cyber violence roundtable
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Presentation slides
Presentation slidesPresentation slides
Presentation slides
 
International Standards to Regulate Aggressive Cyber-behavior from a Foreign ...
International Standards to Regulate Aggressive Cyber-behavior from a Foreign ...International Standards to Regulate Aggressive Cyber-behavior from a Foreign ...
International Standards to Regulate Aggressive Cyber-behavior from a Foreign ...
 
Internet Content Regulation: What it means in 2010
Internet Content Regulation: What it means in 2010Internet Content Regulation: What it means in 2010
Internet Content Regulation: What it means in 2010
 
On the Application of Social Data Science to Address Societal Challenges
On the Application of Social Data Science to Address Societal ChallengesOn the Application of Social Data Science to Address Societal Challenges
On the Application of Social Data Science to Address Societal Challenges
 
Cyberwar and Geopolitics
Cyberwar and GeopoliticsCyberwar and Geopolitics
Cyberwar and Geopolitics
 
Korpisaari how to combat hate speech without sacrificing freedom of speech?
Korpisaari how to combat hate speech without sacrificing freedom of speech?Korpisaari how to combat hate speech without sacrificing freedom of speech?
Korpisaari how to combat hate speech without sacrificing freedom of speech?
 

Similar to Introduction to Censorship

Unintended Consequences: The Internet Regulation
Unintended Consequences: The Internet RegulationUnintended Consequences: The Internet Regulation
Unintended Consequences: The Internet RegulationShashank Motepalli
 
Understanding the computer and privacy issues-2
Understanding the computer and privacy issues-2Understanding the computer and privacy issues-2
Understanding the computer and privacy issues-2VARUN KUMAR
 
Understanding the computer and privacy issues
Understanding the computer and privacy issuesUnderstanding the computer and privacy issues
Understanding the computer and privacy issuesVARUN KUMAR
 
Igf 2013 daily news edititon 5
Igf 2013 daily news   edititon 5Igf 2013 daily news   edititon 5
Igf 2013 daily news edititon 5mataharitimoer MT
 
Computer Ethics: Some Case Study
Computer Ethics: Some Case StudyComputer Ethics: Some Case Study
Computer Ethics: Some Case StudyVARUN KUMAR
 
Social Media: What's Not to Like About Social Media in the Workplace?
 Social Media: What's Not to Like About Social Media in the Workplace? Social Media: What's Not to Like About Social Media in the Workplace?
Social Media: What's Not to Like About Social Media in the Workplace?Parsons Behle & Latimer
 
E-democracy or Digital Democracy
E-democracy or Digital DemocracyE-democracy or Digital Democracy
E-democracy or Digital DemocracyVARUN KUMAR
 
Report on the 2021 MOCK IGF.pdf
Report on the 2021 MOCK IGF.pdfReport on the 2021 MOCK IGF.pdf
Report on the 2021 MOCK IGF.pdfVincent Mwando
 
Igf 2013 daily news edition 4
Igf 2013 daily news   edition 4Igf 2013 daily news   edition 4
Igf 2013 daily news edition 4mataharitimoer MT
 
Daily News 4th ed
Daily News 4th edDaily News 4th ed
Daily News 4th ed03bmai
 
C1729690_PersuasiveAnalysis Research Paper (Argument).docx
C1729690_PersuasiveAnalysis Research Paper (Argument).docxC1729690_PersuasiveAnalysis Research Paper (Argument).docx
C1729690_PersuasiveAnalysis Research Paper (Argument).docxAndrewClark295760
 
A SMART WIZARD SYSTEM SUITABLE FOR USE WITH INTERNET MOBILE DEVICES TO ADJUST...
A SMART WIZARD SYSTEM SUITABLE FOR USE WITH INTERNET MOBILE DEVICES TO ADJUST...A SMART WIZARD SYSTEM SUITABLE FOR USE WITH INTERNET MOBILE DEVICES TO ADJUST...
A SMART WIZARD SYSTEM SUITABLE FOR USE WITH INTERNET MOBILE DEVICES TO ADJUST...ijsptm
 
Social Media: Legal Pitfalls and Best Practices - SXSWedu 2016
Social Media: Legal Pitfalls and Best Practices - SXSWedu 2016Social Media: Legal Pitfalls and Best Practices - SXSWedu 2016
Social Media: Legal Pitfalls and Best Practices - SXSWedu 2016Diana Benner
 
Cst group project#2, intro++
Cst group project#2, intro++Cst group project#2, intro++
Cst group project#2, intro++Roxanne St Ives
 
Team rocket presentation
Team rocket presentationTeam rocket presentation
Team rocket presentationmoralsus
 
Team rocket presentation
Team rocket presentationTeam rocket presentation
Team rocket presentationbollmanp
 
Guidelines for Children on Child Online Protection
Guidelines for Children on Child Online ProtectionGuidelines for Children on Child Online Protection
Guidelines for Children on Child Online ProtectionThomas Müller
 
Presentation at COMPACT Project event in Riga - Disinformation, Media literac...
Presentation at COMPACT Project event in Riga - Disinformation, Media literac...Presentation at COMPACT Project event in Riga - Disinformation, Media literac...
Presentation at COMPACT Project event in Riga - Disinformation, Media literac...Oles Kulchytskyy
 
UK Independent Parliamentary Report Into Online Child Protection
UK Independent Parliamentary Report Into Online Child ProtectionUK Independent Parliamentary Report Into Online Child Protection
UK Independent Parliamentary Report Into Online Child ProtectionKrishna De
 

Similar to Introduction to Censorship (20)

Unintended Consequences: The Internet Regulation
Unintended Consequences: The Internet RegulationUnintended Consequences: The Internet Regulation
Unintended Consequences: The Internet Regulation
 
Understanding the computer and privacy issues-2
Understanding the computer and privacy issues-2Understanding the computer and privacy issues-2
Understanding the computer and privacy issues-2
 
Understanding the computer and privacy issues
Understanding the computer and privacy issuesUnderstanding the computer and privacy issues
Understanding the computer and privacy issues
 
Igf 2013 daily news edititon 5
Igf 2013 daily news   edititon 5Igf 2013 daily news   edititon 5
Igf 2013 daily news edititon 5
 
Computer Ethics: Some Case Study
Computer Ethics: Some Case StudyComputer Ethics: Some Case Study
Computer Ethics: Some Case Study
 
Social Media: What's Not to Like About Social Media in the Workplace?
 Social Media: What's Not to Like About Social Media in the Workplace? Social Media: What's Not to Like About Social Media in the Workplace?
Social Media: What's Not to Like About Social Media in the Workplace?
 
E-democracy or Digital Democracy
E-democracy or Digital DemocracyE-democracy or Digital Democracy
E-democracy or Digital Democracy
 
Report on the 2021 MOCK IGF.pdf
Report on the 2021 MOCK IGF.pdfReport on the 2021 MOCK IGF.pdf
Report on the 2021 MOCK IGF.pdf
 
Igf 2013 daily news edition 4
Igf 2013 daily news   edition 4Igf 2013 daily news   edition 4
Igf 2013 daily news edition 4
 
Daily News 4th ed
Daily News 4th edDaily News 4th ed
Daily News 4th ed
 
C1729690_PersuasiveAnalysis Research Paper (Argument).docx
C1729690_PersuasiveAnalysis Research Paper (Argument).docxC1729690_PersuasiveAnalysis Research Paper (Argument).docx
C1729690_PersuasiveAnalysis Research Paper (Argument).docx
 
A SMART WIZARD SYSTEM SUITABLE FOR USE WITH INTERNET MOBILE DEVICES TO ADJUST...
A SMART WIZARD SYSTEM SUITABLE FOR USE WITH INTERNET MOBILE DEVICES TO ADJUST...A SMART WIZARD SYSTEM SUITABLE FOR USE WITH INTERNET MOBILE DEVICES TO ADJUST...
A SMART WIZARD SYSTEM SUITABLE FOR USE WITH INTERNET MOBILE DEVICES TO ADJUST...
 
Social Media: Legal Pitfalls and Best Practices - SXSWedu 2016
Social Media: Legal Pitfalls and Best Practices - SXSWedu 2016Social Media: Legal Pitfalls and Best Practices - SXSWedu 2016
Social Media: Legal Pitfalls and Best Practices - SXSWedu 2016
 
Cst group project#2, intro++
Cst group project#2, intro++Cst group project#2, intro++
Cst group project#2, intro++
 
Team rocket presentation
Team rocket presentationTeam rocket presentation
Team rocket presentation
 
Team rocket presentation
Team rocket presentationTeam rocket presentation
Team rocket presentation
 
Disrupting harm — Project brief
Disrupting harm — Project briefDisrupting harm — Project brief
Disrupting harm — Project brief
 
Guidelines for Children on Child Online Protection
Guidelines for Children on Child Online ProtectionGuidelines for Children on Child Online Protection
Guidelines for Children on Child Online Protection
 
Presentation at COMPACT Project event in Riga - Disinformation, Media literac...
Presentation at COMPACT Project event in Riga - Disinformation, Media literac...Presentation at COMPACT Project event in Riga - Disinformation, Media literac...
Presentation at COMPACT Project event in Riga - Disinformation, Media literac...
 
UK Independent Parliamentary Report Into Online Child Protection
UK Independent Parliamentary Report Into Online Child ProtectionUK Independent Parliamentary Report Into Online Child Protection
UK Independent Parliamentary Report Into Online Child Protection
 

More from VARUN KUMAR

Distributed rc Model
Distributed rc ModelDistributed rc Model
Distributed rc ModelVARUN KUMAR
 
Electrical Wire Model
Electrical Wire ModelElectrical Wire Model
Electrical Wire ModelVARUN KUMAR
 
Interconnect Parameter in Digital VLSI Design
Interconnect Parameter in Digital VLSI DesignInterconnect Parameter in Digital VLSI Design
Interconnect Parameter in Digital VLSI DesignVARUN KUMAR
 
Introduction to Digital VLSI Design
Introduction to Digital VLSI DesignIntroduction to Digital VLSI Design
Introduction to Digital VLSI DesignVARUN KUMAR
 
Challenges of Massive MIMO System
Challenges of Massive MIMO SystemChallenges of Massive MIMO System
Challenges of Massive MIMO SystemVARUN KUMAR
 
Ethics of Parasitic Computing
Ethics of Parasitic ComputingEthics of Parasitic Computing
Ethics of Parasitic ComputingVARUN KUMAR
 
Geneva Plan of Action
Geneva Plan of ActionGeneva Plan of Action
Geneva Plan of ActionVARUN KUMAR
 
Fair Use in the Electronic Age
Fair Use in the Electronic AgeFair Use in the Electronic Age
Fair Use in the Electronic AgeVARUN KUMAR
 
Software as a Property
Software as a PropertySoftware as a Property
Software as a PropertyVARUN KUMAR
 
Orthogonal Polynomial
Orthogonal PolynomialOrthogonal Polynomial
Orthogonal PolynomialVARUN KUMAR
 
Patent Protection
Patent ProtectionPatent Protection
Patent ProtectionVARUN KUMAR
 
Copyright Vs Patent and Trade Secrecy Law
Copyright Vs Patent and Trade Secrecy LawCopyright Vs Patent and Trade Secrecy Law
Copyright Vs Patent and Trade Secrecy LawVARUN KUMAR
 
Property Right and Software
Property Right and SoftwareProperty Right and Software
Property Right and SoftwareVARUN KUMAR
 
Investigating Data Trials
Investigating Data TrialsInvestigating Data Trials
Investigating Data TrialsVARUN KUMAR
 
Gaussian Numerical Integration
Gaussian Numerical IntegrationGaussian Numerical Integration
Gaussian Numerical IntegrationVARUN KUMAR
 
Romberg's Integration
Romberg's IntegrationRomberg's Integration
Romberg's IntegrationVARUN KUMAR
 
Protect your online privacy-2
Protect your online privacy-2Protect your online privacy-2
Protect your online privacy-2VARUN KUMAR
 
Interception Act vs Privacy Act
Interception Act vs Privacy ActInterception Act vs Privacy Act
Interception Act vs Privacy ActVARUN KUMAR
 
Simpson's rule of integration
Simpson's rule of integrationSimpson's rule of integration
Simpson's rule of integrationVARUN KUMAR
 
Numerical Integration: Trapezoidal Rule
Numerical Integration: Trapezoidal RuleNumerical Integration: Trapezoidal Rule
Numerical Integration: Trapezoidal RuleVARUN KUMAR
 

More from VARUN KUMAR (20)

Distributed rc Model
Distributed rc ModelDistributed rc Model
Distributed rc Model
 
Electrical Wire Model
Electrical Wire ModelElectrical Wire Model
Electrical Wire Model
 
Interconnect Parameter in Digital VLSI Design
Interconnect Parameter in Digital VLSI DesignInterconnect Parameter in Digital VLSI Design
Interconnect Parameter in Digital VLSI Design
 
Introduction to Digital VLSI Design
Introduction to Digital VLSI DesignIntroduction to Digital VLSI Design
Introduction to Digital VLSI Design
 
Challenges of Massive MIMO System
Challenges of Massive MIMO SystemChallenges of Massive MIMO System
Challenges of Massive MIMO System
 
Ethics of Parasitic Computing
Ethics of Parasitic ComputingEthics of Parasitic Computing
Ethics of Parasitic Computing
 
Geneva Plan of Action
Geneva Plan of ActionGeneva Plan of Action
Geneva Plan of Action
 
Fair Use in the Electronic Age
Fair Use in the Electronic AgeFair Use in the Electronic Age
Fair Use in the Electronic Age
 
Software as a Property
Software as a PropertySoftware as a Property
Software as a Property
 
Orthogonal Polynomial
Orthogonal PolynomialOrthogonal Polynomial
Orthogonal Polynomial
 
Patent Protection
Patent ProtectionPatent Protection
Patent Protection
 
Copyright Vs Patent and Trade Secrecy Law
Copyright Vs Patent and Trade Secrecy LawCopyright Vs Patent and Trade Secrecy Law
Copyright Vs Patent and Trade Secrecy Law
 
Property Right and Software
Property Right and SoftwareProperty Right and Software
Property Right and Software
 
Investigating Data Trials
Investigating Data TrialsInvestigating Data Trials
Investigating Data Trials
 
Gaussian Numerical Integration
Gaussian Numerical IntegrationGaussian Numerical Integration
Gaussian Numerical Integration
 
Romberg's Integration
Romberg's IntegrationRomberg's Integration
Romberg's Integration
 
Protect your online privacy-2
Protect your online privacy-2Protect your online privacy-2
Protect your online privacy-2
 
Interception Act vs Privacy Act
Interception Act vs Privacy ActInterception Act vs Privacy Act
Interception Act vs Privacy Act
 
Simpson's rule of integration
Simpson's rule of integrationSimpson's rule of integration
Simpson's rule of integration
 
Numerical Integration: Trapezoidal Rule
Numerical Integration: Trapezoidal RuleNumerical Integration: Trapezoidal Rule
Numerical Integration: Trapezoidal Rule
 

Recently uploaded

Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxpurnimasatapathy1234
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxpranjaldaimarysona
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSKurinjimalarL3
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )Tsuyoshi Horigome
 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...Call Girls in Nagpur High Profile
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130Suhani Kapoor
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escortsranjana rawat
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130Suhani Kapoor
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...ranjana rawat
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations120cr0395
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Dr.Costas Sachpazis
 
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...RajaP95
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingrakeshbaidya232001
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxupamatechverse
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escortsranjana rawat
 
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 

Recently uploaded (20)

Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptx
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptx
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )
 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations
 
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCRCall Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
 
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writing
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptx
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
 
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
 

Introduction to Censorship

  • 1. Censorship Dr. Varun Kumar Dr. Varun Kumar (IIIT Surat) Lecture-19 1 / 8
  • 2. Outlines 1 Introduction to Censorship 2 What could we censor? 3 Censorship Strategy Dr. Varun Kumar (IIIT Surat) Lecture-19 2 / 8
  • 3. Introduction to Censorship ⇒ Accessing internet require Computer A telecommunication connection A modem A browser ⇒ During working hour, employee may misuse the internet. Need some restriction for increasing productivity. ⇒ Providing Internet access at home. May be dangerous for children → Sexual or violence content Harmful for family as well as society. ⇒ Not providing access to the Internet Exclude people from the benefits of the vast information on the Internet. Dr. Varun Kumar (IIIT Surat) Lecture-19 3 / 8
  • 4. Continued– ⇒ Filter the websites to ensure the ’right’ information is accessible to people. ⇒ Especially children and employees. ⇒ Freedom of Speech is a fundamental human right. ⇒ This freedom of speech has also +ve and -ve aspects. ⇒ For social security, we need also some censorship. Prevent children from viewing pornography Dr. Varun Kumar (IIIT Surat) Lecture-19 4 / 8
  • 5. Types of Authority 1 Parental ⇒ Authority over their children. ⇒ Pornographic material or violence content 2 Employer ⇒ Authority over their employees in the workplace. ⇒ Playing games 3 Government ⇒ Authority over a country. ⇒ Violent materials circulations 4 International ⇒ Authority over the international community. ⇒ Stopping Terrorist Newsgroups Dr. Varun Kumar (IIIT Surat) Lecture-19 5 / 8
  • 6. Why Censor? Censorship is a contentious issue and a wide range of viewpoints exist on the topic. ⇒ Parents: Parents want Children watch educational Web sites. Children easily influenced by the content that they find on the Web. Parents want to prevent their children from accessing adult material. ⇒ Employers: Employers want Internet is paid service and is given for office work only. Corporate liability may be threatened if employees view inappropriate and/or offensive material. ⇒ Pressure groups: Internet is open for all. It can be used for spreading wrong and unsocial information. There should be some mechanism for the removal of such sites. ⇒ Legal: Laws limit the offensive material that may be communicated by electronic means. Dr. Varun Kumar (IIIT Surat) Lecture-19 6 / 8
  • 7. Censorship Strategies Popular systems for censoring sites ⇒ Blocking Software ⇒ Chines software/apps banned by Indian Government after Galwan clash. ⇒ Some censorship may be genuine and someone may be political or intentional. ⇒ Google also take responsibility for allowing and blocking software on its platform playstore. ⇒ Ratings ⇒ Moody’s and Fitch → Ease of doing business over the globe. ⇒ FATF → Involvement of a nation in terrorist activities. Two rating based approach ⇒ Syntax for defining labels: A website could have labels describing the levels of Language, Nudity, Sex, and Violence. ⇒ Syntax for labeling content: Rating classification itself for each of the labels. Ex- Thesis evaluation in front of DSC committee (PhD program) Dr. Varun Kumar (IIIT Surat) Lecture-19 7 / 8
  • 8. Continued– ⇒ Service Providers ⇒ The ISP can then run the appropriate software to block access to sites based on the user’s access level → Block lists or site ratings. ⇒ Browsers and search engines ⇒ Some browsers and search engines directly allow for censorship. ⇒ Some search engines allow for user feedback to provide information used to decide if a site should be removed from their index. ⇒ Social Methods ⇒ It is important that users are educated as to the implications of their actions. ⇒ There is a moral responsibility associated with data access, and those who have the ability to control it need to be aware of the issues involved. ⇒ Education plays an important role in raising awareness, and this has to be addressed from a global perspective. Dr. Varun Kumar (IIIT Surat) Lecture-19 8 / 8