SlideShare una empresa de Scribd logo
1 de 15
Freedom of Access to Information Historical Context Totalitarian States censor at production point, Capitalism censors at distribution point. Censorship & the Apartheid State State gets to decide what you can and cannot read, knowledge is something mediated via security apparatus, not civil society (academia, press, etc)
The IBM Case ,[object Object],[object Object],[object Object],[object Object]
Information wants to be Free ,[object Object],[object Object]
[object Object],Information wants to be Open Source
South Africa's Information Age Constitution ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Privacy ,[object Object],[object Object],[object Object],[object Object],[object Object]
Net Neutrality ,[object Object]
Net Neutrality in Africa ,[object Object],[object Object],[object Object],[object Object],[object Object]
Wikileaks ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Egyptian Revolution ,[object Object],[object Object],[object Object],[object Object]
Privacy under threat ,[object Object],[object Object],[object Object]
The Gigaba Plan ,[object Object],Let's RICA the Internet and build a National firewall like China.
The Blackberry Furore ,[object Object],[object Object]
SA Information Bill ,[object Object],[object Object],[object Object],[object Object]
Low-tech Access solutions ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]

Más contenido relacionado

La actualidad más candente

Know Your Rights On #Internet
Know Your Rights On #InternetKnow Your Rights On #Internet
Know Your Rights On #InternetHayder Hamzoz
 
Karen Cook: Technology Outspacing Constitution
Karen Cook: Technology Outspacing ConstitutionKaren Cook: Technology Outspacing Constitution
Karen Cook: Technology Outspacing Constitutionmerlyna
 
Americanizing Palestine Through Internet
Americanizing Palestine Through InternetAmericanizing Palestine Through Internet
Americanizing Palestine Through InternetYeungnam University
 
Internet censorship by ronak
Internet censorship by ronakInternet censorship by ronak
Internet censorship by ronakRonak Karanpuria
 
Open internet in singapore
Open internet in singaporeOpen internet in singapore
Open internet in singaporeBenjamin Ang
 
Internet Censorship across the World
Internet Censorship across the WorldInternet Censorship across the World
Internet Censorship across the WorldNitine
 
Freedom or Control in Virtual Worlds
Freedom or Control in Virtual WorldsFreedom or Control in Virtual Worlds
Freedom or Control in Virtual WorldsJyrki Kasvi
 
G&P - Chapter 10 - Info & Tech
G&P - Chapter 10 - Info & TechG&P - Chapter 10 - Info & Tech
G&P - Chapter 10 - Info & Techcyruskarimian
 
Research on Digital Security Act 2018
Research on Digital Security Act 2018Research on Digital Security Act 2018
Research on Digital Security Act 2018Nilima Tariq
 
Digital security law security of individual or government
Digital security law security of individual or governmentDigital security law security of individual or government
Digital security law security of individual or governmentM S Siddiqui
 
Artificial intelligence governance in the Obama & Trump years
Artificial intelligence governance in the Obama & Trump yearsArtificial intelligence governance in the Obama & Trump years
Artificial intelligence governance in the Obama & Trump yearsAdam Thierer
 
Cyber security and prevention in Bangladesh
Cyber security and prevention in BangladeshCyber security and prevention in Bangladesh
Cyber security and prevention in BangladeshRabita Rejwana
 
Internet privacy and laws
Internet privacy and lawsInternet privacy and laws
Internet privacy and lawsjcmonnett
 
Open Data, Open Government
Open Data, Open GovernmentOpen Data, Open Government
Open Data, Open GovernmentMsifry
 
Freedom of expression
Freedom of expressionFreedom of expression
Freedom of expressionGerwin Ocsena
 
Internetregulationjapan
InternetregulationjapanInternetregulationjapan
Internetregulationjapanrmackinnon
 

La actualidad más candente (20)

Know Your Rights On #Internet
Know Your Rights On #InternetKnow Your Rights On #Internet
Know Your Rights On #Internet
 
Karen Cook: Technology Outspacing Constitution
Karen Cook: Technology Outspacing ConstitutionKaren Cook: Technology Outspacing Constitution
Karen Cook: Technology Outspacing Constitution
 
Americanizing Palestine Through Internet
Americanizing Palestine Through InternetAmericanizing Palestine Through Internet
Americanizing Palestine Through Internet
 
Communications
CommunicationsCommunications
Communications
 
Internet censorship by ronak
Internet censorship by ronakInternet censorship by ronak
Internet censorship by ronak
 
Open internet in singapore
Open internet in singaporeOpen internet in singapore
Open internet in singapore
 
After 9 11
After 9 11After 9 11
After 9 11
 
Internet Censorship across the World
Internet Censorship across the WorldInternet Censorship across the World
Internet Censorship across the World
 
Freedom or Control in Virtual Worlds
Freedom or Control in Virtual WorldsFreedom or Control in Virtual Worlds
Freedom or Control in Virtual Worlds
 
G&P - Chapter 10 - Info & Tech
G&P - Chapter 10 - Info & TechG&P - Chapter 10 - Info & Tech
G&P - Chapter 10 - Info & Tech
 
Research on Digital Security Act 2018
Research on Digital Security Act 2018Research on Digital Security Act 2018
Research on Digital Security Act 2018
 
e-G8 Summary
e-G8 Summarye-G8 Summary
e-G8 Summary
 
Digital security law security of individual or government
Digital security law security of individual or governmentDigital security law security of individual or government
Digital security law security of individual or government
 
Artificial intelligence governance in the Obama & Trump years
Artificial intelligence governance in the Obama & Trump yearsArtificial intelligence governance in the Obama & Trump years
Artificial intelligence governance in the Obama & Trump years
 
Cyber security and prevention in Bangladesh
Cyber security and prevention in BangladeshCyber security and prevention in Bangladesh
Cyber security and prevention in Bangladesh
 
Internet privacy and laws
Internet privacy and lawsInternet privacy and laws
Internet privacy and laws
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Open Data, Open Government
Open Data, Open GovernmentOpen Data, Open Government
Open Data, Open Government
 
Freedom of expression
Freedom of expressionFreedom of expression
Freedom of expression
 
Internetregulationjapan
InternetregulationjapanInternetregulationjapan
Internetregulationjapan
 

Destacado

Программа для матери и ребенка спа-центра Quatre Terres
Программа для матери и ребенка спа-центра Quatre TerresПрограмма для матери и ребенка спа-центра Quatre Terres
Программа для матери и ребенка спа-центра Quatre TerresSergey Manvelov
 
Econemp 2-140305160859-phpapp02
Econemp 2-140305160859-phpapp02Econemp 2-140305160859-phpapp02
Econemp 2-140305160859-phpapp02jose bravo
 
Educational Project for Loreto
Educational Project for LoretoEducational Project for Loreto
Educational Project for LoretoJose Luis Tapia
 
2 класс. урок № 3. привет. в зоопарке
2 класс. урок № 3. привет. в зоопарке2 класс. урок № 3. привет. в зоопарке
2 класс. урок № 3. привет. в зоопаркеshpinat
 
Qa chapter 02
Qa chapter 02Qa chapter 02
Qa chapter 02Ann Lunde
 
Foliar Nutrient Resorption and Litterfall Production With Stand Age, Overstor...
Foliar Nutrient Resorption and Litterfall Production With Stand Age, Overstor...Foliar Nutrient Resorption and Litterfall Production With Stand Age, Overstor...
Foliar Nutrient Resorption and Litterfall Production With Stand Age, Overstor...Amber Brant
 
2 класс. обощающий урок по разделу привет. повторение
2 класс. обощающий урок по разделу привет. повторение2 класс. обощающий урок по разделу привет. повторение
2 класс. обощающий урок по разделу привет. повторениеshpinat
 
Empreendendo na Ilha do Silício
Empreendendo na Ilha do SilícioEmpreendendo na Ilha do Silício
Empreendendo na Ilha do SilícioBruno Ghisi
 
презентация японских продуктов
презентация японских продуктовпрезентация японских продуктов
презентация японских продуктовAndreykireenkov
 
Research present
Research presentResearch present
Research presentNicole D.
 
Automatic liquid level control of tank system
Automatic liquid level control of tank systemAutomatic liquid level control of tank system
Automatic liquid level control of tank systemFatahillah Ata
 

Destacado (20)

Sirs
SirsSirs
Sirs
 
Copyright info
Copyright infoCopyright info
Copyright info
 
Программа для матери и ребенка спа-центра Quatre Terres
Программа для матери и ребенка спа-центра Quatre TerresПрограмма для матери и ребенка спа-центра Quatre Terres
Программа для матери и ребенка спа-центра Quatre Terres
 
Perspective lesson 1zoom
Perspective lesson 1zoomPerspective lesson 1zoom
Perspective lesson 1zoom
 
Econemp 2-140305160859-phpapp02
Econemp 2-140305160859-phpapp02Econemp 2-140305160859-phpapp02
Econemp 2-140305160859-phpapp02
 
Educational Project for Loreto
Educational Project for LoretoEducational Project for Loreto
Educational Project for Loreto
 
2 класс. урок № 3. привет. в зоопарке
2 класс. урок № 3. привет. в зоопарке2 класс. урок № 3. привет. в зоопарке
2 класс. урок № 3. привет. в зоопарке
 
Qa chapter 02
Qa chapter 02Qa chapter 02
Qa chapter 02
 
Foliar Nutrient Resorption and Litterfall Production With Stand Age, Overstor...
Foliar Nutrient Resorption and Litterfall Production With Stand Age, Overstor...Foliar Nutrient Resorption and Litterfall Production With Stand Age, Overstor...
Foliar Nutrient Resorption and Litterfall Production With Stand Age, Overstor...
 
2 класс. обощающий урок по разделу привет. повторение
2 класс. обощающий урок по разделу привет. повторение2 класс. обощающий урок по разделу привет. повторение
2 класс. обощающий урок по разделу привет. повторение
 
Empreendendo na Ilha do Silício
Empreendendo na Ilha do SilícioEmpreendendo na Ilha do Silício
Empreendendo na Ilha do Silício
 
презентация японских продуктов
презентация японских продуктовпрезентация японских продуктов
презентация японских продуктов
 
Northern lights college
Northern lights collegeNorthern lights college
Northern lights college
 
Abstract
AbstractAbstract
Abstract
 
Research present
Research presentResearch present
Research present
 
Algonquin college
Algonquin collegeAlgonquin college
Algonquin college
 
Customer service february 2012
Customer service february  2012Customer service february  2012
Customer service february 2012
 
The How To of Crisis Communications
The How To of Crisis CommunicationsThe How To of Crisis Communications
The How To of Crisis Communications
 
urbanisation
urbanisationurbanisation
urbanisation
 
Automatic liquid level control of tank system
Automatic liquid level control of tank systemAutomatic liquid level control of tank system
Automatic liquid level control of tank system
 

Similar a #DCI11 Access to Information

DCB1309 - F2_Dark_Net
DCB1309 - F2_Dark_NetDCB1309 - F2_Dark_Net
DCB1309 - F2_Dark_NetPaul Elliott
 
PRIVACY RIGHTS ARE HUMAN RIGHTS (2).pdf
PRIVACY RIGHTS ARE HUMAN RIGHTS (2).pdfPRIVACY RIGHTS ARE HUMAN RIGHTS (2).pdf
PRIVACY RIGHTS ARE HUMAN RIGHTS (2).pdflinda gichohi
 
Digital Repression and Techno-Authoritarianism
Digital Repression and Techno-AuthoritarianismDigital Repression and Techno-Authoritarianism
Digital Repression and Techno-AuthoritarianismCharles Mok
 
Privacy reconsidered
Privacy reconsideredPrivacy reconsidered
Privacy reconsideredBrian Rowe
 
2600 v19 n4 (winter 2002)
2600 v19 n4 (winter 2002)2600 v19 n4 (winter 2002)
2600 v19 n4 (winter 2002)Felipe Prado
 
Cyberterrorism can be in the form of Information attacks which a.docx
Cyberterrorism can be in the form of Information attacks which a.docxCyberterrorism can be in the form of Information attacks which a.docx
Cyberterrorism can be in the form of Information attacks which a.docxwhittemorelucilla
 
Computer Fraud And Abuse Act Of 1986 (CFA)
Computer Fraud And Abuse Act Of 1986 (CFA)Computer Fraud And Abuse Act Of 1986 (CFA)
Computer Fraud And Abuse Act Of 1986 (CFA)Kim Moore
 
Technology evolves so fast
Technology evolves so fast Technology evolves so fast
Technology evolves so fast Jyrki Kasvi
 

Similar a #DCI11 Access to Information (13)

DCB1309 - F2_Dark_Net
DCB1309 - F2_Dark_NetDCB1309 - F2_Dark_Net
DCB1309 - F2_Dark_Net
 
PRIVACY RIGHTS ARE HUMAN RIGHTS (2).pdf
PRIVACY RIGHTS ARE HUMAN RIGHTS (2).pdfPRIVACY RIGHTS ARE HUMAN RIGHTS (2).pdf
PRIVACY RIGHTS ARE HUMAN RIGHTS (2).pdf
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Digital Repression and Techno-Authoritarianism
Digital Repression and Techno-AuthoritarianismDigital Repression and Techno-Authoritarianism
Digital Repression and Techno-Authoritarianism
 
Cyber Crime Essay
Cyber Crime EssayCyber Crime Essay
Cyber Crime Essay
 
Privacy reconsidered
Privacy reconsideredPrivacy reconsidered
Privacy reconsidered
 
2600 v19 n4 (winter 2002)
2600 v19 n4 (winter 2002)2600 v19 n4 (winter 2002)
2600 v19 n4 (winter 2002)
 
Cyberterrorism can be in the form of Information attacks which a.docx
Cyberterrorism can be in the form of Information attacks which a.docxCyberterrorism can be in the form of Information attacks which a.docx
Cyberterrorism can be in the form of Information attacks which a.docx
 
Internet Privacy Essay
Internet Privacy EssayInternet Privacy Essay
Internet Privacy Essay
 
Essay Cyber Crime
Essay Cyber CrimeEssay Cyber Crime
Essay Cyber Crime
 
Digital Surveillance
Digital SurveillanceDigital Surveillance
Digital Surveillance
 
Computer Fraud And Abuse Act Of 1986 (CFA)
Computer Fraud And Abuse Act Of 1986 (CFA)Computer Fraud And Abuse Act Of 1986 (CFA)
Computer Fraud And Abuse Act Of 1986 (CFA)
 
Technology evolves so fast
Technology evolves so fast Technology evolves so fast
Technology evolves so fast
 

Último

New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfPrecisely
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESmohitsingh558521
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersRaghuram Pandurangan
 

Último (20)

New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
 

#DCI11 Access to Information

  • 1. Freedom of Access to Information Historical Context Totalitarian States censor at production point, Capitalism censors at distribution point. Censorship & the Apartheid State State gets to decide what you can and cannot read, knowledge is something mediated via security apparatus, not civil society (academia, press, etc)
  • 2.
  • 3.
  • 4.
  • 5.
  • 6.
  • 7.
  • 8.
  • 9.
  • 10.
  • 11.
  • 12.
  • 13.
  • 14.
  • 15.