SlideShare a Scribd company logo
BY ROBERTO ARAUJO
In China…
•  ournalist and bloggers
 J
could only post positive
stories online. Possible jail
time or fines for those who
don’t.
                                •  group of policeman (“Ciber
                                 A
                                Police”) are monitoring and
                                recording each key stroke 24/7

•  nything you say online can be
 A
used against you in court.


 COME TO CHINA: What Happens
 in China Stays in China!
Now, what do you
think about the
Chinese
government?
American Companies as:
Contributed to the so called
“Great Firewall” in China



                               Contributed with tips on
                               user content resulting in
                               the arrest of 3 Chinese

 Censors itself in China, in
 order to abide by tight
 government control

Who’s the felon: the shooter or the
gunsmith?
Now, How do you
feel about
American
Companies?
Denial, or Spin?
 …Has not sold equipment meant
to “identify dissidents or hostile
elements”

                             Apologized, but not for revealing
                             the the information, but for not
                             knowing that those were the
                             consequences

Revealed that they do not offer
email or blogging service in order
to avoid being censured by the
Chinese government
Current Status of American
Corporations in China:                            Covalence Ethical
                                                   Ranking 2009
Cisco recently announced their
Next Stage of Corporate Strategy
                                                       6/541
based in a sustainability initiative
in China

                 Yahoo has less than 5% of
                 popularity as search engine in        447/541
                 China

Google have recently boosted its
shares in China competing with
                                                       48/541
Baidu, which both together account
for 95% of search revenues
Ask Yourself:
Is ETHICS a relative term?


          Traveling state by state, do you obey each
          state rules?

Do you GOOGLE or YAHOO?

          Being a multinational company (world
          leader), could you afford not dealing
          with China?
Let’s be realistic:
China is the country with the largest # of
net user in the world

           Human rights advocates small minority

American Corporations participation in
China is positive

   Yes, I’m in the
            Who’s side are you,
            Corporate or Human
   corporate side
            Rights?

More Related Content

Similar to Pr 192 censorship in china

Internet Censorship
Internet CensorshipInternet Censorship
Internet Censorship
becnicholas
 
Survey Research Paper - Apreamare
Survey Research Paper - ApreamareSurvey Research Paper - Apreamare
Survey Research Paper - Apreamare
Jennifer Jones
 
Evaluating Information
Evaluating InformationEvaluating Information
Evaluating Information
Forsyth Library
 
Ftce General Knowledge Essay Topics 2015
Ftce General Knowledge Essay Topics 2015Ftce General Knowledge Essay Topics 2015
Ftce General Knowledge Essay Topics 2015
Ana Hall
 
The Ethics Of The Whistle Blower Essay
The Ethics Of The Whistle Blower EssayThe Ethics Of The Whistle Blower Essay
The Ethics Of The Whistle Blower Essay
Buy A Literature Review Paper
 
Writing The Essay What Is An Academic Essay
Writing The Essay What Is An Academic EssayWriting The Essay What Is An Academic Essay
Writing The Essay What Is An Academic Essay
Mariana Arnold
 
Dyslexia Essay Introduction. Online assignment writing service.
Dyslexia Essay Introduction. Online assignment writing service.Dyslexia Essay Introduction. Online assignment writing service.
Dyslexia Essay Introduction. Online assignment writing service.
Brenda Gutierrez
 
Designing Against a Data Dystopia
Designing Against a Data DystopiaDesigning Against a Data Dystopia
Designing Against a Data Dystopia
Agnes Pyrchla
 
Whistle blowing Policy-1.pptx
Whistle blowing Policy-1.pptxWhistle blowing Policy-1.pptx
Whistle blowing Policy-1.pptx
VenkatDhanyamraju
 
Top 14 Public Relations Insights of 2019
Top 14 Public Relations Insights of 2019Top 14 Public Relations Insights of 2019
Top 14 Public Relations Insights of 2019
Sarah Jackson
 
8 Best Images Of Printable Notebook Pages - Free Pri
8 Best Images Of Printable Notebook Pages - Free Pri8 Best Images Of Printable Notebook Pages - Free Pri
8 Best Images Of Printable Notebook Pages - Free Pri
Lisa Fields
 
Different Ways To Write An Essay. Online assignment writing service.
Different Ways To Write An Essay. Online assignment writing service.Different Ways To Write An Essay. Online assignment writing service.
Different Ways To Write An Essay. Online assignment writing service.
Pamela Watkins
 
Online Identity- Part 1
Online Identity- Part 1Online Identity- Part 1
Online Identity- Part 1
KR_Barker
 
Write My Research Paper - How To Write A Reaction Pa
Write My Research Paper - How To Write A Reaction PaWrite My Research Paper - How To Write A Reaction Pa
Write My Research Paper - How To Write A Reaction Pa
Jenny Mancini
 
Strong Verbs Essay Writing Sk
Strong Verbs  Essay Writing SkStrong Verbs  Essay Writing Sk
Strong Verbs Essay Writing Sk
Jeff Nelson
 
10 Ways to Identify Disinformation
10 Ways to Identify Disinformation10 Ways to Identify Disinformation
10 Ways to Identify Disinformation
Sarah Jackson
 
Ucla Essay Prompt. Online assignment writing service.
Ucla Essay Prompt. Online assignment writing service.Ucla Essay Prompt. Online assignment writing service.
Ucla Essay Prompt. Online assignment writing service.
Lakeisha Johnson
 
Buy Law Essay Uk
Buy Law Essay UkBuy Law Essay Uk
Buy Law Essay Uk
Michele Johnson
 
How To Make A Review Paper. How To Format You
How To Make A Review Paper. How To Format YouHow To Make A Review Paper. How To Format You
How To Make A Review Paper. How To Format You
Michelle Shaw
 
A Sample College Application Essay. Online assignment writing service.
A Sample College Application Essay. Online assignment writing service.A Sample College Application Essay. Online assignment writing service.
A Sample College Application Essay. Online assignment writing service.
Trisha Anderson
 

Similar to Pr 192 censorship in china (20)

Internet Censorship
Internet CensorshipInternet Censorship
Internet Censorship
 
Survey Research Paper - Apreamare
Survey Research Paper - ApreamareSurvey Research Paper - Apreamare
Survey Research Paper - Apreamare
 
Evaluating Information
Evaluating InformationEvaluating Information
Evaluating Information
 
Ftce General Knowledge Essay Topics 2015
Ftce General Knowledge Essay Topics 2015Ftce General Knowledge Essay Topics 2015
Ftce General Knowledge Essay Topics 2015
 
The Ethics Of The Whistle Blower Essay
The Ethics Of The Whistle Blower EssayThe Ethics Of The Whistle Blower Essay
The Ethics Of The Whistle Blower Essay
 
Writing The Essay What Is An Academic Essay
Writing The Essay What Is An Academic EssayWriting The Essay What Is An Academic Essay
Writing The Essay What Is An Academic Essay
 
Dyslexia Essay Introduction. Online assignment writing service.
Dyslexia Essay Introduction. Online assignment writing service.Dyslexia Essay Introduction. Online assignment writing service.
Dyslexia Essay Introduction. Online assignment writing service.
 
Designing Against a Data Dystopia
Designing Against a Data DystopiaDesigning Against a Data Dystopia
Designing Against a Data Dystopia
 
Whistle blowing Policy-1.pptx
Whistle blowing Policy-1.pptxWhistle blowing Policy-1.pptx
Whistle blowing Policy-1.pptx
 
Top 14 Public Relations Insights of 2019
Top 14 Public Relations Insights of 2019Top 14 Public Relations Insights of 2019
Top 14 Public Relations Insights of 2019
 
8 Best Images Of Printable Notebook Pages - Free Pri
8 Best Images Of Printable Notebook Pages - Free Pri8 Best Images Of Printable Notebook Pages - Free Pri
8 Best Images Of Printable Notebook Pages - Free Pri
 
Different Ways To Write An Essay. Online assignment writing service.
Different Ways To Write An Essay. Online assignment writing service.Different Ways To Write An Essay. Online assignment writing service.
Different Ways To Write An Essay. Online assignment writing service.
 
Online Identity- Part 1
Online Identity- Part 1Online Identity- Part 1
Online Identity- Part 1
 
Write My Research Paper - How To Write A Reaction Pa
Write My Research Paper - How To Write A Reaction PaWrite My Research Paper - How To Write A Reaction Pa
Write My Research Paper - How To Write A Reaction Pa
 
Strong Verbs Essay Writing Sk
Strong Verbs  Essay Writing SkStrong Verbs  Essay Writing Sk
Strong Verbs Essay Writing Sk
 
10 Ways to Identify Disinformation
10 Ways to Identify Disinformation10 Ways to Identify Disinformation
10 Ways to Identify Disinformation
 
Ucla Essay Prompt. Online assignment writing service.
Ucla Essay Prompt. Online assignment writing service.Ucla Essay Prompt. Online assignment writing service.
Ucla Essay Prompt. Online assignment writing service.
 
Buy Law Essay Uk
Buy Law Essay UkBuy Law Essay Uk
Buy Law Essay Uk
 
How To Make A Review Paper. How To Format You
How To Make A Review Paper. How To Format YouHow To Make A Review Paper. How To Format You
How To Make A Review Paper. How To Format You
 
A Sample College Application Essay. Online assignment writing service.
A Sample College Application Essay. Online assignment writing service.A Sample College Application Essay. Online assignment writing service.
A Sample College Application Essay. Online assignment writing service.
 

More from RCAroman

Skin tone as a factor in representation of black women in magazines
Skin tone as a factor in representation of black women in magazinesSkin tone as a factor in representation of black women in magazines
Skin tone as a factor in representation of black women in magazines
RCAroman
 
Negotiating outcomes presentation pp
Negotiating outcomes presentation ppNegotiating outcomes presentation pp
Negotiating outcomes presentation pp
RCAroman
 
Psychology presentation
Psychology presentationPsychology presentation
Psychology presentation
RCAroman
 
Marketing research presentation SJSU
Marketing research presentation SJSUMarketing research presentation SJSU
Marketing research presentation SJSU
RCAroman
 
Los japonese en peru power point
Los japonese en peru power pointLos japonese en peru power point
Los japonese en peru power point
RCAroman
 
Ywca presentation pp
Ywca presentation ppYwca presentation pp
Ywca presentation pp
RCAroman
 
Gavin Newsom Digg project
Gavin Newsom Digg projectGavin Newsom Digg project
Gavin Newsom Digg project
RCAroman
 
Social media for yogurt
Social media for yogurtSocial media for yogurt
Social media for yogurt
RCAroman
 
PR 199 class, NWPC plan
PR 199 class, NWPC planPR 199 class, NWPC plan
PR 199 class, NWPC plan
RCAroman
 

More from RCAroman (9)

Skin tone as a factor in representation of black women in magazines
Skin tone as a factor in representation of black women in magazinesSkin tone as a factor in representation of black women in magazines
Skin tone as a factor in representation of black women in magazines
 
Negotiating outcomes presentation pp
Negotiating outcomes presentation ppNegotiating outcomes presentation pp
Negotiating outcomes presentation pp
 
Psychology presentation
Psychology presentationPsychology presentation
Psychology presentation
 
Marketing research presentation SJSU
Marketing research presentation SJSUMarketing research presentation SJSU
Marketing research presentation SJSU
 
Los japonese en peru power point
Los japonese en peru power pointLos japonese en peru power point
Los japonese en peru power point
 
Ywca presentation pp
Ywca presentation ppYwca presentation pp
Ywca presentation pp
 
Gavin Newsom Digg project
Gavin Newsom Digg projectGavin Newsom Digg project
Gavin Newsom Digg project
 
Social media for yogurt
Social media for yogurtSocial media for yogurt
Social media for yogurt
 
PR 199 class, NWPC plan
PR 199 class, NWPC planPR 199 class, NWPC plan
PR 199 class, NWPC plan
 

Recently uploaded

Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
Safe Software
 
GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...
ThomasParaiso2
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
Data structures and Algorithms in Python.pdf
Data structures and Algorithms in Python.pdfData structures and Algorithms in Python.pdf
Data structures and Algorithms in Python.pdf
TIPNGVN2
 
Large Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial ApplicationsLarge Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial Applications
Rohit Gautam
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
SOFTTECHHUB
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
Uni Systems S.M.S.A.
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
DianaGray10
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
Alpen-Adria-Universität
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Aggregage
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
Neo4j
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
Matthew Sinclair
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
danishmna97
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
DianaGray10
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
KAMESHS29
 

Recently uploaded (20)

Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
 
GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
Data structures and Algorithms in Python.pdf
Data structures and Algorithms in Python.pdfData structures and Algorithms in Python.pdf
Data structures and Algorithms in Python.pdf
 
Large Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial ApplicationsLarge Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial Applications
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
 

Pr 192 censorship in china

  • 2. In China… •  ournalist and bloggers J could only post positive stories online. Possible jail time or fines for those who don’t. •  group of policeman (“Ciber A Police”) are monitoring and recording each key stroke 24/7 •  nything you say online can be A used against you in court. COME TO CHINA: What Happens in China Stays in China!
  • 3. Now, what do you think about the Chinese government?
  • 4. American Companies as: Contributed to the so called “Great Firewall” in China Contributed with tips on user content resulting in the arrest of 3 Chinese Censors itself in China, in order to abide by tight government control Who’s the felon: the shooter or the gunsmith?
  • 5. Now, How do you feel about American Companies?
  • 6. Denial, or Spin? …Has not sold equipment meant to “identify dissidents or hostile elements” Apologized, but not for revealing the the information, but for not knowing that those were the consequences Revealed that they do not offer email or blogging service in order to avoid being censured by the Chinese government
  • 7. Current Status of American Corporations in China: Covalence Ethical Ranking 2009 Cisco recently announced their Next Stage of Corporate Strategy 6/541 based in a sustainability initiative in China Yahoo has less than 5% of popularity as search engine in 447/541 China Google have recently boosted its shares in China competing with 48/541 Baidu, which both together account for 95% of search revenues
  • 8. Ask Yourself: Is ETHICS a relative term? Traveling state by state, do you obey each state rules? Do you GOOGLE or YAHOO? Being a multinational company (world leader), could you afford not dealing with China?
  • 9. Let’s be realistic: China is the country with the largest # of net user in the world Human rights advocates small minority American Corporations participation in China is positive Yes, I’m in the Who’s side are you, Corporate or Human corporate side Rights?