SlideShare a Scribd company logo
POLS3620 Contemporary Europe and Asia




Internet Freedom
1001 7526 Chow Tsz Yan
1001 6759 Chuk Ching Pong
Introduction
• 2012: nearly 1/3 of the world’s population has
  used the Internet
• even greater portion possesses a mobile phone

• Concerned with the power of new technologies
  to catalyze political change
• many authoritarian states have taken various
  measures to filter, monitor, or otherwise
  obstruct free speech online
Freedom on the Net 2012

• Conducted by the Freedom House
• U.S.-based (NGO) that conducts research and
  advocacy on democracy, political freedom and
  human right
Examination of three broad
categories:
• A. Obstacles to Access: assesses infrastructural
  and economic barriers to access

• B. Limits on Content: examines filtering and
  blocking of websites

• C. Violations of User Rights: measures legal
  protections and restrictions on online activity
Standards of Measurement
• 0 (the most free) to 100 (the least free)
• Status designation:
  -Free (0-30 points)
  -Partly Free (31-60 points)
  -Not Free (61-100 points)
Scores of Asia
Scores of Eurasia
Scores of Europe & U.S.
Recent development
• A significant uptick in citizen activism related to internet
  freedom, which has produced several notable
  mobilization efforts and legislative victories.

• In several European countries, fierce public opposition
  to the Anti-Counterfeiting Trade Agreement (ACTA) has
  prompted governments to step away from ratification of
  the treaty
• In largely democratic settings, the courts have
  started to play an instrumental role in defending
  internet freedom and overturning laws that may
  infringe on it.

• Hungary:
  Constitutional Court decided in 2011 that the
  country’s restrictive new media regulations would
  not be applicable to online news sources and portals.

• South Korea:
  the Constitutional Court issued its third decision
  favorable to internet freedom in two years, ruling
  against the real-name registration system
Key Trends
New Laws Restrict Free Speech and Prompt
Arrests of Internet Users
• Responding to the rise of user-generated content

• laws that are ostensibly designed to protect
  national security or citizens from cybercrime

• but which are so broadly worded that they can
  easily be turned on political opponent
• Malaysia:
  parliament passed an amendment to the 1950 Evidence
  Act that holds the hosts of online forums, news outlets,
  blogging services, and businesses providing WiFi
  responsible for any seditious content posted by
  anonymous users

• Thailand:
  pressure on intermediaries intensified in May 2012 after
  a forum moderator for the popular online news outlet
  Prachatai received a suspended eight-month jail
  sentence and a fine for not deleting quickly enough an
  anonymous reader’s criticism of the royal family
• China: private companies maintaining whole divisions
  responsible for monitoring and interpreting daily
  Communist Party directives
Surveillance Increases, with Few Checks on
Abuse

• Many governments are seeking less visible
  means to infringe upon internet freedom
• often by increasing their technical capacity or
  administrative authority to access private
  correspondence

• Governments enhanced their surveillance
  abilities
• E.g. South Korea, Thailand
• Surveillance in nondemocratic countries is often
  political in nature, aimed at identifying and
  suppressing government critics and human
  rights activists.

• In China, major microblogging services were
  given a March 2012 deadline to implement real-
  name registration for their users
• Even in more developed democracies, concerns
  have increased that the government is becoming
  too intrusive

• Britain: In 2012, the government announced a
  proposal to expand the existing surveillance
  measures
China’s Case
The Chinese method for controlling social-
media content
• restricting access to international networks while
  coercing their domestic alternatives to robustly
  censor
• monitor user communications according to
  Communist Party directives—has become a
  particularly potent model for other authoritarian
  countries.

• attempts to enhance their technical capacity to
  censor, monitor, or carry out cyberattacks against
  regime opponents.
http://www.idigitaltimes.com/articles/12672/20121111/google-china-search-banned-communist-internet-censorship.htm
Historical and Cultural Perspective
Historical perspective
• Rejection to ‘digital revolution’ , especially in the
  Cold War era

• “ double juggernaut “ of China since 1990s
- “reform and openness”
- emergence of the World Wide Web in 1991



 • Linear development vs dramatic change
Cultural difference

• Western domination of software industry
- reasons behind like openness , free expression ,
  democracy , competitive market , etc

• China with similar software and internet
  advancement
- eg . Weibo , Renren.com
- under fully government surveillance
- to launch cyber war
Conclusion
 “Technology will make it increasingly difficult for the state to control
  the conformation its people receive … The Goliath of totalitarianism
  will be brought down by the David of the microchip .”

     ─ Ronald Reagan , speech at London’s Guildhall , June 14 , 1989



  “Imagine if the Internet took hold in China . Imagine how freedom
  would spread .”

         ─ George W . Bush , Phoenix , Arizona , December 7 , 1999
Bibliography
• Freedom House, "Freedom on the net 2012." Accessed November 13, 2012.
  http://www.freedomhouse.org/report/freedom-net/freedom-net-2012.

• Kalathil, Shanthi , and Taylor C. Boas . 2003 . Open Networks , Closed Regime : The
  Impact of the Internet on Authoritarian Rule . Washington : The Brookings
  Institution press .

• Herold, David Kurt and Peter Marolt. 2011. Online Society in China :Creating,
  Celebrating, and Instrumentalising the Online Carnival. Media, Culture and Social
  Change in Asia. Vol. 25. Abingdon, Oxon; New York: Routledge.

• Simon, Leslie David, Javier Corrales, and Donald R. Wolfensberger. 2002. Democracy
  and the Internet :Allies Or Adversaries?. Wilson Forum. Washington, D.C.: Woodrow
  Wilson Center Press.

More Related Content

What's hot

Political change in the digital age
Political change in the digital agePolitical change in the digital age
Political change in the digital age
Krishna Mohan
 
Critical Debates in Internet Studies
Critical Debates in Internet StudiesCritical Debates in Internet Studies
Critical Debates in Internet Studies
Muhammad Rawaha Saleem
 
International politics in the age of the internet
International politics in the age of the internetInternational politics in the age of the internet
International politics in the age of the internet
Jeffrey Hart
 
Presentation slides
Presentation slidesPresentation slides
Presentation slides
andrewdyoung
 
Internet Content Regulation: What it means in 2010
Internet Content Regulation: What it means in 2010Internet Content Regulation: What it means in 2010
Internet Content Regulation: What it means in 2010
Wendy Qi
 
Polinter11
Polinter11Polinter11
Polinter11
Jeffrey Hart
 
Texas policy 2016
Texas policy 2016Texas policy 2016
online-disinformation-human-rights
online-disinformation-human-rightsonline-disinformation-human-rights
online-disinformation-human-rights
archiejones4
 
Tracking Social Media Participation: New Approaches to Studying User-Gener...
Tracking  Social  Media  Participation: New Approaches to Studying User-Gener...Tracking  Social  Media  Participation: New Approaches to Studying User-Gener...
Tracking Social Media Participation: New Approaches to Studying User-Gener...
Axel Bruns
 
IGF Hyderabad - Index of Global Internet Freedom
IGF Hyderabad - Index of Global Internet FreedomIGF Hyderabad - Index of Global Internet Freedom
IGF Hyderabad - Index of Global Internet Freedom
Freedom House
 
The Internet, Democracy and the Fifth Estate
The Internet, Democracy and the Fifth EstateThe Internet, Democracy and the Fifth Estate
Fotn 2015 colombia
Fotn 2015 colombiaFotn 2015 colombia
Fotn 2015 colombia
Édgar Medina
 
Internet Governance by Its History (1966-2000)
Internet Governance by Its History (1966-2000)Internet Governance by Its History (1966-2000)
Internet Governance by Its History (1966-2000)
Jeremy Pesner
 
Internet governance
Internet governanceInternet governance
Internet governance
Ghazala Ajami
 
Online Harms White Paper April 2019 Bill Dutton
Online Harms White Paper April 2019 Bill DuttonOnline Harms White Paper April 2019 Bill Dutton
Icegov2011 2
Icegov2011 2Icegov2011 2
Icegov2011 2
Evgeny Patarakin
 
CIPA Overview
CIPA OverviewCIPA Overview
CIPA Overview
edtecher
 
Child grooming
Child groomingChild grooming
Child grooming
LikeMan24Lan
 
Public policy and online social networks: The trillion dollar zombie question
Public policy and online social networks: The trillion dollar zombie questionPublic policy and online social networks: The trillion dollar zombie question
Public policy and online social networks: The trillion dollar zombie question
Chris Marsden
 
The path from e government to open government in vietnam
The path from e government to open government in vietnamThe path from e government to open government in vietnam
The path from e government to open government in vietnam
Danube University Krems, Centre for E-Governance
 

What's hot (20)

Political change in the digital age
Political change in the digital agePolitical change in the digital age
Political change in the digital age
 
Critical Debates in Internet Studies
Critical Debates in Internet StudiesCritical Debates in Internet Studies
Critical Debates in Internet Studies
 
International politics in the age of the internet
International politics in the age of the internetInternational politics in the age of the internet
International politics in the age of the internet
 
Presentation slides
Presentation slidesPresentation slides
Presentation slides
 
Internet Content Regulation: What it means in 2010
Internet Content Regulation: What it means in 2010Internet Content Regulation: What it means in 2010
Internet Content Regulation: What it means in 2010
 
Polinter11
Polinter11Polinter11
Polinter11
 
Texas policy 2016
Texas policy 2016Texas policy 2016
Texas policy 2016
 
online-disinformation-human-rights
online-disinformation-human-rightsonline-disinformation-human-rights
online-disinformation-human-rights
 
Tracking Social Media Participation: New Approaches to Studying User-Gener...
Tracking  Social  Media  Participation: New Approaches to Studying User-Gener...Tracking  Social  Media  Participation: New Approaches to Studying User-Gener...
Tracking Social Media Participation: New Approaches to Studying User-Gener...
 
IGF Hyderabad - Index of Global Internet Freedom
IGF Hyderabad - Index of Global Internet FreedomIGF Hyderabad - Index of Global Internet Freedom
IGF Hyderabad - Index of Global Internet Freedom
 
The Internet, Democracy and the Fifth Estate
The Internet, Democracy and the Fifth EstateThe Internet, Democracy and the Fifth Estate
The Internet, Democracy and the Fifth Estate
 
Fotn 2015 colombia
Fotn 2015 colombiaFotn 2015 colombia
Fotn 2015 colombia
 
Internet Governance by Its History (1966-2000)
Internet Governance by Its History (1966-2000)Internet Governance by Its History (1966-2000)
Internet Governance by Its History (1966-2000)
 
Internet governance
Internet governanceInternet governance
Internet governance
 
Online Harms White Paper April 2019 Bill Dutton
Online Harms White Paper April 2019 Bill DuttonOnline Harms White Paper April 2019 Bill Dutton
Online Harms White Paper April 2019 Bill Dutton
 
Icegov2011 2
Icegov2011 2Icegov2011 2
Icegov2011 2
 
CIPA Overview
CIPA OverviewCIPA Overview
CIPA Overview
 
Child grooming
Child groomingChild grooming
Child grooming
 
Public policy and online social networks: The trillion dollar zombie question
Public policy and online social networks: The trillion dollar zombie questionPublic policy and online social networks: The trillion dollar zombie question
Public policy and online social networks: The trillion dollar zombie question
 
The path from e government to open government in vietnam
The path from e government to open government in vietnamThe path from e government to open government in vietnam
The path from e government to open government in vietnam
 

Viewers also liked

Case study 2012
Case study 2012Case study 2012
Case study 2012
bamick
 
hw
hwhw
Internet freedom
Internet freedomInternet freedom
Internet freedom
Tissue Chowtszyan
 
Pra100 The Winterfest Uludağ
Pra100 The Winterfest UludağPra100 The Winterfest Uludağ
Pra100 The Winterfest Uludağ
Duygun
 
Happiness
HappinessHappiness
Happiness
Duygun
 
Come scegliere una vacanza studio
Come scegliere una vacanza studioCome scegliere una vacanza studio
Come scegliere una vacanza studio
Vacanze Studio Lingua Inglese
 
Vacanza studio Inghilterra Cheltenham 2013
Vacanza studio Inghilterra Cheltenham 2013Vacanza studio Inghilterra Cheltenham 2013
Vacanza studio Inghilterra Cheltenham 2013
Vacanze Studio Lingua Inglese
 
Vacanza studio inghilterra Reading info e prezzi
Vacanza studio inghilterra Reading info e prezziVacanza studio inghilterra Reading info e prezzi
Vacanza studio inghilterra Reading info e prezzi
Vacanze Studio Lingua Inglese
 
HOMOSEXUALITATEA ETA... ZER DA HORI?
HOMOSEXUALITATEA ETA... ZER DA HORI?HOMOSEXUALITATEA ETA... ZER DA HORI?
HOMOSEXUALITATEA ETA... ZER DA HORI?LLUCEA90
 
Vacanza studio Inghilterra reading
Vacanza studio Inghilterra readingVacanza studio Inghilterra reading
Vacanza studio Inghilterra reading
Vacanze Studio Lingua Inglese
 
Extension to asch and crutchfield
Extension to asch and crutchfieldExtension to asch and crutchfield
Extension to asch and crutchfield
Josh Sumner
 
шкільний музей
шкільний музейшкільний музей
шкільний музейdeadangelru
 
Vacanza Studio USA New York 2013
Vacanza Studio USA New York 2013Vacanza Studio USA New York 2013
Vacanza Studio USA New York 2013
Vacanze Studio Lingua Inglese
 
Huong dan tinh toan thanh phan dong cua tt gio
Huong dan tinh toan thanh phan dong cua tt gioHuong dan tinh toan thanh phan dong cua tt gio
Huong dan tinh toan thanh phan dong cua tt giovinhx1b
 

Viewers also liked (14)

Case study 2012
Case study 2012Case study 2012
Case study 2012
 
hw
hwhw
hw
 
Internet freedom
Internet freedomInternet freedom
Internet freedom
 
Pra100 The Winterfest Uludağ
Pra100 The Winterfest UludağPra100 The Winterfest Uludağ
Pra100 The Winterfest Uludağ
 
Happiness
HappinessHappiness
Happiness
 
Come scegliere una vacanza studio
Come scegliere una vacanza studioCome scegliere una vacanza studio
Come scegliere una vacanza studio
 
Vacanza studio Inghilterra Cheltenham 2013
Vacanza studio Inghilterra Cheltenham 2013Vacanza studio Inghilterra Cheltenham 2013
Vacanza studio Inghilterra Cheltenham 2013
 
Vacanza studio inghilterra Reading info e prezzi
Vacanza studio inghilterra Reading info e prezziVacanza studio inghilterra Reading info e prezzi
Vacanza studio inghilterra Reading info e prezzi
 
HOMOSEXUALITATEA ETA... ZER DA HORI?
HOMOSEXUALITATEA ETA... ZER DA HORI?HOMOSEXUALITATEA ETA... ZER DA HORI?
HOMOSEXUALITATEA ETA... ZER DA HORI?
 
Vacanza studio Inghilterra reading
Vacanza studio Inghilterra readingVacanza studio Inghilterra reading
Vacanza studio Inghilterra reading
 
Extension to asch and crutchfield
Extension to asch and crutchfieldExtension to asch and crutchfield
Extension to asch and crutchfield
 
шкільний музей
шкільний музейшкільний музей
шкільний музей
 
Vacanza Studio USA New York 2013
Vacanza Studio USA New York 2013Vacanza Studio USA New York 2013
Vacanza Studio USA New York 2013
 
Huong dan tinh toan thanh phan dong cua tt gio
Huong dan tinh toan thanh phan dong cua tt gioHuong dan tinh toan thanh phan dong cua tt gio
Huong dan tinh toan thanh phan dong cua tt gio
 

Similar to Internet Freedom HKBU, Contemporary Europe and Asia 2012, POLS 3620

Freedom Trends and Assumptions - A Global Assessment of Internet and Digital ...
Freedom Trends and Assumptions - A Global Assessment of Internet and Digital ...Freedom Trends and Assumptions - A Global Assessment of Internet and Digital ...
Freedom Trends and Assumptions - A Global Assessment of Internet and Digital ...
Freedom House
 
Fotn 2013 summary of findings
Fotn 2013 summary of findingsFotn 2013 summary of findings
Fotn 2013 summary of findings
Chafik YAHOU
 
Digital Repression and Techno-Authoritarianism
Digital Repression and Techno-AuthoritarianismDigital Repression and Techno-Authoritarianism
Digital Repression and Techno-Authoritarianism
Charles Mok
 
Freedom unesco-2011
Freedom unesco-2011Freedom unesco-2011
ArticlesJournal of Contemporary Criminal Justice26(1) 10.docx
ArticlesJournal of Contemporary Criminal Justice26(1) 10.docxArticlesJournal of Contemporary Criminal Justice26(1) 10.docx
ArticlesJournal of Contemporary Criminal Justice26(1) 10.docx
wraythallchan
 
Flew dmrc 11 sept 15
Flew dmrc 11 sept 15Flew dmrc 11 sept 15
Flew dmrc 11 sept 15
Terry Flew
 
Society Meets Social Media at reyerson-2015
Society Meets Social Media at reyerson-2015Society Meets Social Media at reyerson-2015
Cst group project#2, intro++
Cst group project#2, intro++Cst group project#2, intro++
Cst group project#2, intro++
Roxanne St Ives
 
C1729690_PersuasiveAnalysis Research Paper (Argument).docx
C1729690_PersuasiveAnalysis Research Paper (Argument).docxC1729690_PersuasiveAnalysis Research Paper (Argument).docx
C1729690_PersuasiveAnalysis Research Paper (Argument).docx
AndrewClark295760
 
Team rocket presentation
Team rocket presentationTeam rocket presentation
Team rocket presentation
bollmanp
 
Team rocket presentation
Team rocket presentationTeam rocket presentation
Team rocket presentation
moralsus
 
Network Neutrality: The Origins, Politics and Implications of New Rules for a...
Network Neutrality: The Origins, Politics and Implications of New Rules for a...Network Neutrality: The Origins, Politics and Implications of New Rules for a...
Network Neutrality: The Origins, Politics and Implications of New Rules for a...
Oxford Martin Centre, OII, and Computer Science at the University of Oxford
 
Dutton china-sjtu-2015
Dutton china-sjtu-2015Dutton china-sjtu-2015
An Overview of the Battle for the Control of the Internet
An Overview of the Battle for the Control of the InternetAn Overview of the Battle for the Control of the Internet
An Overview of the Battle for the Control of the Internet
Dibussi Tande
 
Digital Sovereigns or Consent of the Networked
Digital Sovereigns or Consent of the NetworkedDigital Sovereigns or Consent of the Networked
Digital Sovereigns or Consent of the Networked
Msifry
 
MCj-401 Assignment, roll-30.pdf
MCj-401 Assignment, roll-30.pdfMCj-401 Assignment, roll-30.pdf
MCj-401 Assignment, roll-30.pdf
HasanAlManjur1
 
Week34_The Internet, Digital Media, and Media Convergence (Chapter2) (1).pdf
Week34_The Internet, Digital Media, and Media Convergence (Chapter2) (1).pdfWeek34_The Internet, Digital Media, and Media Convergence (Chapter2) (1).pdf
Week34_The Internet, Digital Media, and Media Convergence (Chapter2) (1).pdf
PhngLinhTrn33
 
The Political Power of Social Media Technology, the Publ.docx
The Political Power of Social Media Technology, the Publ.docxThe Political Power of Social Media Technology, the Publ.docx
The Political Power of Social Media Technology, the Publ.docx
AASTHA76
 
Freedom On The Net
Freedom On The NetFreedom On The Net
Freedom On The Net
Freedom House
 
Unintended Consequences: The Internet Regulation
Unintended Consequences: The Internet RegulationUnintended Consequences: The Internet Regulation
Unintended Consequences: The Internet Regulation
Shashank Motepalli
 

Similar to Internet Freedom HKBU, Contemporary Europe and Asia 2012, POLS 3620 (20)

Freedom Trends and Assumptions - A Global Assessment of Internet and Digital ...
Freedom Trends and Assumptions - A Global Assessment of Internet and Digital ...Freedom Trends and Assumptions - A Global Assessment of Internet and Digital ...
Freedom Trends and Assumptions - A Global Assessment of Internet and Digital ...
 
Fotn 2013 summary of findings
Fotn 2013 summary of findingsFotn 2013 summary of findings
Fotn 2013 summary of findings
 
Digital Repression and Techno-Authoritarianism
Digital Repression and Techno-AuthoritarianismDigital Repression and Techno-Authoritarianism
Digital Repression and Techno-Authoritarianism
 
Freedom unesco-2011
Freedom unesco-2011Freedom unesco-2011
Freedom unesco-2011
 
ArticlesJournal of Contemporary Criminal Justice26(1) 10.docx
ArticlesJournal of Contemporary Criminal Justice26(1) 10.docxArticlesJournal of Contemporary Criminal Justice26(1) 10.docx
ArticlesJournal of Contemporary Criminal Justice26(1) 10.docx
 
Flew dmrc 11 sept 15
Flew dmrc 11 sept 15Flew dmrc 11 sept 15
Flew dmrc 11 sept 15
 
Society Meets Social Media at reyerson-2015
Society Meets Social Media at reyerson-2015Society Meets Social Media at reyerson-2015
Society Meets Social Media at reyerson-2015
 
Cst group project#2, intro++
Cst group project#2, intro++Cst group project#2, intro++
Cst group project#2, intro++
 
C1729690_PersuasiveAnalysis Research Paper (Argument).docx
C1729690_PersuasiveAnalysis Research Paper (Argument).docxC1729690_PersuasiveAnalysis Research Paper (Argument).docx
C1729690_PersuasiveAnalysis Research Paper (Argument).docx
 
Team rocket presentation
Team rocket presentationTeam rocket presentation
Team rocket presentation
 
Team rocket presentation
Team rocket presentationTeam rocket presentation
Team rocket presentation
 
Network Neutrality: The Origins, Politics and Implications of New Rules for a...
Network Neutrality: The Origins, Politics and Implications of New Rules for a...Network Neutrality: The Origins, Politics and Implications of New Rules for a...
Network Neutrality: The Origins, Politics and Implications of New Rules for a...
 
Dutton china-sjtu-2015
Dutton china-sjtu-2015Dutton china-sjtu-2015
Dutton china-sjtu-2015
 
An Overview of the Battle for the Control of the Internet
An Overview of the Battle for the Control of the InternetAn Overview of the Battle for the Control of the Internet
An Overview of the Battle for the Control of the Internet
 
Digital Sovereigns or Consent of the Networked
Digital Sovereigns or Consent of the NetworkedDigital Sovereigns or Consent of the Networked
Digital Sovereigns or Consent of the Networked
 
MCj-401 Assignment, roll-30.pdf
MCj-401 Assignment, roll-30.pdfMCj-401 Assignment, roll-30.pdf
MCj-401 Assignment, roll-30.pdf
 
Week34_The Internet, Digital Media, and Media Convergence (Chapter2) (1).pdf
Week34_The Internet, Digital Media, and Media Convergence (Chapter2) (1).pdfWeek34_The Internet, Digital Media, and Media Convergence (Chapter2) (1).pdf
Week34_The Internet, Digital Media, and Media Convergence (Chapter2) (1).pdf
 
The Political Power of Social Media Technology, the Publ.docx
The Political Power of Social Media Technology, the Publ.docxThe Political Power of Social Media Technology, the Publ.docx
The Political Power of Social Media Technology, the Publ.docx
 
Freedom On The Net
Freedom On The NetFreedom On The Net
Freedom On The Net
 
Unintended Consequences: The Internet Regulation
Unintended Consequences: The Internet RegulationUnintended Consequences: The Internet Regulation
Unintended Consequences: The Internet Regulation
 

Recently uploaded

Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems S.M.S.A.
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
shyamraj55
 
Large Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial ApplicationsLarge Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial Applications
Rohit Gautam
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
DianaGray10
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
danishmna97
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
sonjaschweigert1
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
Neo4j
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
innovationoecd
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
DianaGray10
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
DianaGray10
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
KAMESHS29
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
Safe Software
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
Neo4j
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Aggregage
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
名前 です男
 

Recently uploaded (20)

Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
 
Large Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial ApplicationsLarge Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial Applications
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
 

Internet Freedom HKBU, Contemporary Europe and Asia 2012, POLS 3620

  • 1. POLS3620 Contemporary Europe and Asia Internet Freedom 1001 7526 Chow Tsz Yan 1001 6759 Chuk Ching Pong
  • 2. Introduction • 2012: nearly 1/3 of the world’s population has used the Internet • even greater portion possesses a mobile phone • Concerned with the power of new technologies to catalyze political change • many authoritarian states have taken various measures to filter, monitor, or otherwise obstruct free speech online
  • 3. Freedom on the Net 2012 • Conducted by the Freedom House • U.S.-based (NGO) that conducts research and advocacy on democracy, political freedom and human right
  • 4. Examination of three broad categories: • A. Obstacles to Access: assesses infrastructural and economic barriers to access • B. Limits on Content: examines filtering and blocking of websites • C. Violations of User Rights: measures legal protections and restrictions on online activity
  • 5. Standards of Measurement • 0 (the most free) to 100 (the least free) • Status designation: -Free (0-30 points) -Partly Free (31-60 points) -Not Free (61-100 points)
  • 9.
  • 10. Recent development • A significant uptick in citizen activism related to internet freedom, which has produced several notable mobilization efforts and legislative victories. • In several European countries, fierce public opposition to the Anti-Counterfeiting Trade Agreement (ACTA) has prompted governments to step away from ratification of the treaty
  • 11. • In largely democratic settings, the courts have started to play an instrumental role in defending internet freedom and overturning laws that may infringe on it. • Hungary: Constitutional Court decided in 2011 that the country’s restrictive new media regulations would not be applicable to online news sources and portals. • South Korea: the Constitutional Court issued its third decision favorable to internet freedom in two years, ruling against the real-name registration system
  • 13. New Laws Restrict Free Speech and Prompt Arrests of Internet Users • Responding to the rise of user-generated content • laws that are ostensibly designed to protect national security or citizens from cybercrime • but which are so broadly worded that they can easily be turned on political opponent
  • 14. • Malaysia: parliament passed an amendment to the 1950 Evidence Act that holds the hosts of online forums, news outlets, blogging services, and businesses providing WiFi responsible for any seditious content posted by anonymous users • Thailand: pressure on intermediaries intensified in May 2012 after a forum moderator for the popular online news outlet Prachatai received a suspended eight-month jail sentence and a fine for not deleting quickly enough an anonymous reader’s criticism of the royal family • China: private companies maintaining whole divisions responsible for monitoring and interpreting daily Communist Party directives
  • 15. Surveillance Increases, with Few Checks on Abuse • Many governments are seeking less visible means to infringe upon internet freedom • often by increasing their technical capacity or administrative authority to access private correspondence • Governments enhanced their surveillance abilities • E.g. South Korea, Thailand
  • 16. • Surveillance in nondemocratic countries is often political in nature, aimed at identifying and suppressing government critics and human rights activists. • In China, major microblogging services were given a March 2012 deadline to implement real- name registration for their users
  • 17. • Even in more developed democracies, concerns have increased that the government is becoming too intrusive • Britain: In 2012, the government announced a proposal to expand the existing surveillance measures
  • 19. The Chinese method for controlling social- media content • restricting access to international networks while coercing their domestic alternatives to robustly censor • monitor user communications according to Communist Party directives—has become a particularly potent model for other authoritarian countries. • attempts to enhance their technical capacity to censor, monitor, or carry out cyberattacks against regime opponents.
  • 21. Historical and Cultural Perspective
  • 22. Historical perspective • Rejection to ‘digital revolution’ , especially in the Cold War era • “ double juggernaut “ of China since 1990s - “reform and openness” - emergence of the World Wide Web in 1991 • Linear development vs dramatic change
  • 23. Cultural difference • Western domination of software industry - reasons behind like openness , free expression , democracy , competitive market , etc • China with similar software and internet advancement - eg . Weibo , Renren.com - under fully government surveillance - to launch cyber war
  • 24. Conclusion “Technology will make it increasingly difficult for the state to control the conformation its people receive … The Goliath of totalitarianism will be brought down by the David of the microchip .” ─ Ronald Reagan , speech at London’s Guildhall , June 14 , 1989 “Imagine if the Internet took hold in China . Imagine how freedom would spread .” ─ George W . Bush , Phoenix , Arizona , December 7 , 1999
  • 25. Bibliography • Freedom House, "Freedom on the net 2012." Accessed November 13, 2012. http://www.freedomhouse.org/report/freedom-net/freedom-net-2012. • Kalathil, Shanthi , and Taylor C. Boas . 2003 . Open Networks , Closed Regime : The Impact of the Internet on Authoritarian Rule . Washington : The Brookings Institution press . • Herold, David Kurt and Peter Marolt. 2011. Online Society in China :Creating, Celebrating, and Instrumentalising the Online Carnival. Media, Culture and Social Change in Asia. Vol. 25. Abingdon, Oxon; New York: Routledge. • Simon, Leslie David, Javier Corrales, and Donald R. Wolfensberger. 2002. Democracy and the Internet :Allies Or Adversaries?. Wilson Forum. Washington, D.C.: Woodrow Wilson Center Press.

Editor's Notes

  1. a comprehensive study of internet freedom in 47 countries around the globe. This report is the third in its series and focuses on developments that occurred between January 2011 and May 2012