Based on article Unintended Consequences by Vinton G. Cerf. The presentation after setting the current context talks about challenges faced due to big-data, how tech-giants handle them. Then it talks about the role of Governments and needs for International Regulation. It finally ends with a discussion on freedom of speech.
This presentation is presented by Sahithi Adimulam, Chandana Kotta, Indu Sushmitha, Pavitra K C and Shashank Motepalli as part of ICT Policy and Regulation course under Prof.Sridhar.
2. The Sharing Net
● Scientists and engineers from
academia and research have
united to develop internet
● Open sharing of information was
preferred over patents
● Keep protocols and data free
from licensing constraints
Main Objective: Driving down barriers
to information and resource sharing
3. A platform to share
● Blogs
● Social Media
● Web pages
Information is beneficial; harvest
of human knowledge
But………
Consequences of
Misinformation, Disinformation
8. Difficulties in dealing with the BAD STUFF
Huge amounts of Data
NO Time & space limitations
Automated algorithms errors
Biases in Manual
review
9. Handling Fake news by major companies
Facebook
Approach 1:
● Listen to feedback from the community
● use machine learning to understand what stories might be false
● send those potential hoaxes to their fact-checking partners for review
○ review the stories
○ check their facts and
○ rate their accuracy
Approach 2: Showing Related Articles
● When false stories does appear in people’s news feed more information about the story
10. If someone tries to post or share a story that has been determined
by fact checkers to be false
https://www.facebook.com/facebook/videos/10156900476581729/?t=0
11. Actions taken against Repeat offenders
● Advertising rights: Removed.
● Distribution: Reduced.
● Opportunities to monetize: Reduced.
13. Youtube Handling copyright infringement & Restricted
content
● People who publish original video on youtube submits a part of their each content
called Digital watermarking.
● Digital Watermarking used as ContentID.
● When a new video is uploaded youtube uses following attributes to find copyright
infringement:
○ Location
○ title of video
○ Keywords
○ Length and
○ format
● Proved very efficient so far in avoiding same or restricted content being uploaded.
18. Three prong approach to regulation:
● Instituting a light-touch framework
○ Internet Content providers and ISPs automatically licensed, must comply with the
Internet Code of practice which outlines what the community regards as offensive or
harmful to public (race, religion, pornography and content harmful to children).
● Encouraging industry self-regulation
○ Industry regulation
● Promoting media literacy and cyber wellness through public education
○ Public education programmes on the positive as well as the less positive aspects of the
information superhighway.
Case Study: Singapore
National Regulation
19. Case Study: Singapore
2 February 2015,
unauthorised websites
which promote, facilitate or
advertise remote gambling
will be blocked
ISPs are required to restrict
public access to a limited
number of mass impact
websites containing offensive
content.
National Regulation
20. ● Commonly deemed bad content: terrorism, child pornography.
● Need for a global regulatory framework: Multi-stakeholder community,
every country must agree to the regulations.
● ICANN?
International Standards
21. Freedom of expression & Internet
The internet made freedom of expression a
reality not just a principle or a theory
It is important that we preserve freedom of
speech, enshrined in the Universal
Declaration of Human Rights.
24. ● Violates freedom of speech: People can not publish any opinion
against the Chinese regime online
● Violates freedom of access: Blocks some international sites like
facebook, twitter
27. The government aims to come
up with a “code of conduct”, or
even a legislation, which will be
“incumbent upon [media]
agencies” to follow.
It will be interesting to see how
the government strikes a
balance between the internet
content regulation and freedom
of expression.
29. This presentation was done as part of ICT Policy and
Regulations course under Prof.V.Sridhar at International
Institute of Information Technology, Bangalore.
Our Team:
Chandana Kotta (hari.chandana@iiitb.org)
Sahiti Adimulam (adimulam.sahithi@iiitb.org)
Pavitra K C (pavithira.kc@iiitb.org)
Indu Sushmitha (indu.susmitha@iiitb.org)
Shashank Motepalli (shashank.048@iiitb.org)