SlideShare a Scribd company logo
1 of 14
Download to read offline
Web Censorship and Public Awareness:
The case of Internet regulation in Japan


              Chris Salzberg
To censor:

to examine in order to suppress or delete anything 
            considered objectionable

               (Merriam­Webster)
What does “Web Censorship” mean?

    Different meanings in different contexts:
    
        Censorship by governments against freedom of expression 
        and free access to information
    
        Filtering of content seen as “harmful” to society
    
        Violation of privacy rights: web monitoring, eavesdropping
    
        “Censorship” against file sharing (copyrighted content)

    What is “anti­censorship”?
“The Age of Net Regulation is Coming”
 
     In the last year, moves toward net regulation:
     1.Internet content (transmission + broadcasting = ?)
     2.Copyright legislation (file sharing)
     3.Mobile web access (filtering, “harmful” content)
 
     Fears about: “deai” (dating) sites, obscene/voilent 
     content, child porn, “adult” anime, net bullying, 
     death threats (Akihabara massacre), etc. etc. etc.
Filtering of “harmful” content

    Bill by LDP/DPJ passed into law on June 11th

    Included in the bill:
    
        Obligation on PC makers to pre­install national 
        standards­based filtering software on PCs/mobile phones
    
        Filtering on mobile phones for users under age 18
    
        ISPs required to eliminate harmful content/services

    Government decides what is “harmful”
Support for Regulation

    A survey on regulation of “harmful content” (2007):
    
        67.8% said the Internet should be regulated
    
        22.7% said they lean toward regulation
    
        3.1% said they lean toward non­regulation
    
        1.4% said the Internet should not be regulated

    76% support web filtering, 51% want police to 
    strengthen monitoring, 87% support manga porn 
    regulation
Opposition to Regulation





    Some of the greatest opposition from companies: 
    DENA, Yahoo, Microsoft, Rakuten, Net Star

    Emphasizing positives of an open Internet
Opposition strategies

    More so than free access to information, opposition 
    strategies emphasize economic considerations:
    
        Regulation will stop innovation/creativity
    
        Japan will be left behind, outcompeted

    Also emphasizes knowledge issues:
    
        Many proposals are technologically contradictory
    
        Lack of transparency in legislation
The “people” are killing the Internet

    Oppression of the people by governments and 
    corporations is not seen as a major concern

    Conern is about other citizens:
    
        Bullying, death threats, dating sites, obscene content, 
        copyright violation, etc. etc.

    Conclusion: it is the people who are killing the 
    Internet, gov't needs to step in and regulate
The future is now





    Citizen media coverage of Akihabara killings:
    
        Instantaneous through Ustream, 2000­3000 viewers
    
        No editing or censorship of footage
    
        Large public backlash, criticism
Summary

    “Web censorship” means different things to 
    different people/groups/nations

    Different opposition strategies:
    
        Technological problems with censorship
    
        Lack of transparency in process
    
        Economic considerations, innovation/creativity

    Awareness and literacy are key

More Related Content

What's hot

Where next for the Regulation of Investigatory Powers Act?
Where next for the Regulation of Investigatory Powers Act?Where next for the Regulation of Investigatory Powers Act?
Where next for the Regulation of Investigatory Powers Act?blogzilla
 
Turkey aside
Turkey asideTurkey aside
Turkey asideDina Beer
 
2019: Regulating disinformation with artificial intelligence (AI)
2019: Regulating disinformation with artificial intelligence (AI)2019: Regulating disinformation with artificial intelligence (AI)
2019: Regulating disinformation with artificial intelligence (AI)Chris Marsden
 
Oxford Internet Institute 19 Sept 2019: Disinformation – Platform, publisher ...
Oxford Internet Institute 19 Sept 2019: Disinformation – Platform, publisher ...Oxford Internet Institute 19 Sept 2019: Disinformation – Platform, publisher ...
Oxford Internet Institute 19 Sept 2019: Disinformation – Platform, publisher ...Chris Marsden
 
Artificial intelligence governance in the Obama & Trump years
Artificial intelligence governance in the Obama & Trump yearsArtificial intelligence governance in the Obama & Trump years
Artificial intelligence governance in the Obama & Trump yearsAdam Thierer
 
Lim Jus394 Sea Censorship
Lim Jus394 Sea CensorshipLim Jus394 Sea Censorship
Lim Jus394 Sea Censorshipmerlyna
 
Governance and Information Technology
Governance and Information TechnologyGovernance and Information Technology
Governance and Information Technologykatieingersoll
 
Cyber Surveillance - Honors English 1 Presentation
Cyber Surveillance - Honors English 1 PresentationCyber Surveillance - Honors English 1 Presentation
Cyber Surveillance - Honors English 1 Presentationaxnv
 
Internet Surveillance
Internet SurveillanceInternet Surveillance
Internet Surveillancecfeutlinske
 
Privacy law and policy 2 - LIS550
Privacy law and policy 2 - LIS550 Privacy law and policy 2 - LIS550
Privacy law and policy 2 - LIS550 Brian Rowe
 
Analysis of cyber crime bill 2016
Analysis of cyber crime bill 2016 Analysis of cyber crime bill 2016
Analysis of cyber crime bill 2016 Zohaib Arshid
 
SCL Annual Conference 2019: Regulating social media platforms for interoperab...
SCL Annual Conference 2019: Regulating social media platforms for interoperab...SCL Annual Conference 2019: Regulating social media platforms for interoperab...
SCL Annual Conference 2019: Regulating social media platforms for interoperab...Chris Marsden
 
At The Brink of Digital Authoritarian
At The Brink of Digital AuthoritarianAt The Brink of Digital Authoritarian
At The Brink of Digital AuthoritarianDamar Juniarto
 
Computer and network surveillance
Computer and network surveillanceComputer and network surveillance
Computer and network surveillancemarianavigato0
 
Open Letter to President Obama Opposing Backdoors and Defective Encryption
Open Letter to President Obama Opposing Backdoors and Defective EncryptionOpen Letter to President Obama Opposing Backdoors and Defective Encryption
Open Letter to President Obama Opposing Backdoors and Defective EncryptionAlvaro Lopez Ortega
 

What's hot (20)

Where next for the Regulation of Investigatory Powers Act?
Where next for the Regulation of Investigatory Powers Act?Where next for the Regulation of Investigatory Powers Act?
Where next for the Regulation of Investigatory Powers Act?
 
Turkey aside
Turkey asideTurkey aside
Turkey aside
 
2019: Regulating disinformation with artificial intelligence (AI)
2019: Regulating disinformation with artificial intelligence (AI)2019: Regulating disinformation with artificial intelligence (AI)
2019: Regulating disinformation with artificial intelligence (AI)
 
Oxford Internet Institute 19 Sept 2019: Disinformation – Platform, publisher ...
Oxford Internet Institute 19 Sept 2019: Disinformation – Platform, publisher ...Oxford Internet Institute 19 Sept 2019: Disinformation – Platform, publisher ...
Oxford Internet Institute 19 Sept 2019: Disinformation – Platform, publisher ...
 
Internet Censorship
Internet CensorshipInternet Censorship
Internet Censorship
 
Artificial intelligence governance in the Obama & Trump years
Artificial intelligence governance in the Obama & Trump yearsArtificial intelligence governance in the Obama & Trump years
Artificial intelligence governance in the Obama & Trump years
 
Lim Jus394 Sea Censorship
Lim Jus394 Sea CensorshipLim Jus394 Sea Censorship
Lim Jus394 Sea Censorship
 
Governance and Information Technology
Governance and Information TechnologyGovernance and Information Technology
Governance and Information Technology
 
Cyber Surveillance - Honors English 1 Presentation
Cyber Surveillance - Honors English 1 PresentationCyber Surveillance - Honors English 1 Presentation
Cyber Surveillance - Honors English 1 Presentation
 
Internet Surveillance
Internet SurveillanceInternet Surveillance
Internet Surveillance
 
The Largest Democracy - India
The Largest Democracy - IndiaThe Largest Democracy - India
The Largest Democracy - India
 
Freedom on the net 2018
Freedom on the net 2018Freedom on the net 2018
Freedom on the net 2018
 
Polinter11
Polinter11Polinter11
Polinter11
 
Privacy law and policy 2 - LIS550
Privacy law and policy 2 - LIS550 Privacy law and policy 2 - LIS550
Privacy law and policy 2 - LIS550
 
Analysis of cyber crime bill 2016
Analysis of cyber crime bill 2016 Analysis of cyber crime bill 2016
Analysis of cyber crime bill 2016
 
Internet Freedom 2.1
Internet Freedom 2.1Internet Freedom 2.1
Internet Freedom 2.1
 
SCL Annual Conference 2019: Regulating social media platforms for interoperab...
SCL Annual Conference 2019: Regulating social media platforms for interoperab...SCL Annual Conference 2019: Regulating social media platforms for interoperab...
SCL Annual Conference 2019: Regulating social media platforms for interoperab...
 
At The Brink of Digital Authoritarian
At The Brink of Digital AuthoritarianAt The Brink of Digital Authoritarian
At The Brink of Digital Authoritarian
 
Computer and network surveillance
Computer and network surveillanceComputer and network surveillance
Computer and network surveillance
 
Open Letter to President Obama Opposing Backdoors and Defective Encryption
Open Letter to President Obama Opposing Backdoors and Defective EncryptionOpen Letter to President Obama Opposing Backdoors and Defective Encryption
Open Letter to President Obama Opposing Backdoors and Defective Encryption
 

Similar to Web Censorship in Japan and Public Support

International politics in the age of the internet
International politics in the age of the internetInternational politics in the age of the internet
International politics in the age of the internetJeffrey Hart
 
China’s Internet Security _Dichotomy of National Security and Human Rights in...
China’s Internet Security _Dichotomy of National Security and Human Rights in...China’s Internet Security _Dichotomy of National Security and Human Rights in...
China’s Internet Security _Dichotomy of National Security and Human Rights in...Emily Võ
 
Cst group project#2, intro++
Cst group project#2, intro++Cst group project#2, intro++
Cst group project#2, intro++Roxanne St Ives
 
Censorship down under
Censorship down underCensorship down under
Censorship down underErhan Boduk
 
A week is a long time in computer ethics
A week is a long time in computer ethicsA week is a long time in computer ethics
A week is a long time in computer ethicsUltraUploader
 
Digital Repression and Techno-Authoritarianism
Digital Repression and Techno-AuthoritarianismDigital Repression and Techno-Authoritarianism
Digital Repression and Techno-AuthoritarianismCharles Mok
 
Internet Censorship across the World
Internet Censorship across the WorldInternet Censorship across the World
Internet Censorship across the WorldNitine
 
Running Head THE CHANGING NATURE OF CYBER CRIME 1 .docx
Running Head THE CHANGING NATURE OF CYBER CRIME 1          .docxRunning Head THE CHANGING NATURE OF CYBER CRIME 1          .docx
Running Head THE CHANGING NATURE OF CYBER CRIME 1 .docxjeanettehully
 
Freedom of expression
Freedom of expressionFreedom of expression
Freedom of expressionGerwin Ocsena
 
"Digital.Report+" - expert magazine for ICT policy professionals
"Digital.Report+" - expert magazine for ICT policy professionals"Digital.Report+" - expert magazine for ICT policy professionals
"Digital.Report+" - expert magazine for ICT policy professionalsVadim Dryganov
 
Moral Censorship on The Internet
Moral Censorship on The InternetMoral Censorship on The Internet
Moral Censorship on The InternetJacob Gee
 
Freedom or Control in Virtual Worlds
Freedom or Control in Virtual WorldsFreedom or Control in Virtual Worlds
Freedom or Control in Virtual WorldsJyrki Kasvi
 
The Rise of Internet Freedom Activism
The Rise of Internet Freedom ActivismThe Rise of Internet Freedom Activism
The Rise of Internet Freedom ActivismUniversity of Sydney
 
Manipulating Social Media to Undermine Democracy 2017 Final
Manipulating Social Media to Undermine Democracy 2017 Final Manipulating Social Media to Undermine Democracy 2017 Final
Manipulating Social Media to Undermine Democracy 2017 Final Alireza Ghahrood
 
The securitization of online activism
The securitization of online activismThe securitization of online activism
The securitization of online activismjwilso
 
Lessons on netfreedom+best practices in cyber security
Lessons on netfreedom+best practices in cyber securityLessons on netfreedom+best practices in cyber security
Lessons on netfreedom+best practices in cyber securityFreedom House
 

Similar to Web Censorship in Japan and Public Support (19)

International politics in the age of the internet
International politics in the age of the internetInternational politics in the age of the internet
International politics in the age of the internet
 
China’s Internet Security _Dichotomy of National Security and Human Rights in...
China’s Internet Security _Dichotomy of National Security and Human Rights in...China’s Internet Security _Dichotomy of National Security and Human Rights in...
China’s Internet Security _Dichotomy of National Security and Human Rights in...
 
Cst group project#2, intro++
Cst group project#2, intro++Cst group project#2, intro++
Cst group project#2, intro++
 
Censorship down under
Censorship down underCensorship down under
Censorship down under
 
Internet governance
Internet governanceInternet governance
Internet governance
 
A week is a long time in computer ethics
A week is a long time in computer ethicsA week is a long time in computer ethics
A week is a long time in computer ethics
 
Digital Repression and Techno-Authoritarianism
Digital Repression and Techno-AuthoritarianismDigital Repression and Techno-Authoritarianism
Digital Repression and Techno-Authoritarianism
 
Internet Censorship across the World
Internet Censorship across the WorldInternet Censorship across the World
Internet Censorship across the World
 
Future of democracy and civic innovation
Future of democracy and civic innovationFuture of democracy and civic innovation
Future of democracy and civic innovation
 
Running Head THE CHANGING NATURE OF CYBER CRIME 1 .docx
Running Head THE CHANGING NATURE OF CYBER CRIME 1          .docxRunning Head THE CHANGING NATURE OF CYBER CRIME 1          .docx
Running Head THE CHANGING NATURE OF CYBER CRIME 1 .docx
 
Freedom of expression
Freedom of expressionFreedom of expression
Freedom of expression
 
"Digital.Report+" - expert magazine for ICT policy professionals
"Digital.Report+" - expert magazine for ICT policy professionals"Digital.Report+" - expert magazine for ICT policy professionals
"Digital.Report+" - expert magazine for ICT policy professionals
 
Moral Censorship on The Internet
Moral Censorship on The InternetMoral Censorship on The Internet
Moral Censorship on The Internet
 
Freedom or Control in Virtual Worlds
Freedom or Control in Virtual WorldsFreedom or Control in Virtual Worlds
Freedom or Control in Virtual Worlds
 
The Rise of Internet Freedom Activism
The Rise of Internet Freedom ActivismThe Rise of Internet Freedom Activism
The Rise of Internet Freedom Activism
 
Texas policy 2016
Texas policy 2016Texas policy 2016
Texas policy 2016
 
Manipulating Social Media to Undermine Democracy 2017 Final
Manipulating Social Media to Undermine Democracy 2017 Final Manipulating Social Media to Undermine Democracy 2017 Final
Manipulating Social Media to Undermine Democracy 2017 Final
 
The securitization of online activism
The securitization of online activismThe securitization of online activism
The securitization of online activism
 
Lessons on netfreedom+best practices in cyber security
Lessons on netfreedom+best practices in cyber securityLessons on netfreedom+best practices in cyber security
Lessons on netfreedom+best practices in cyber security
 

More from rmackinnon

Can authoritarianism survive the Internet? Yes it can...
Can authoritarianism survive the Internet? Yes it can...Can authoritarianism survive the Internet? Yes it can...
Can authoritarianism survive the Internet? Yes it can...rmackinnon
 
国际互联网治理 - 我们都是国际网民!
国际互联网治理 -我们都是国际网民!国际互联网治理 -我们都是国际网民!
国际互联网治理 - 我们都是国际网民!rmackinnon
 
Document 1: Green Dam Technical Requirements
Document 1: Green Dam Technical RequirementsDocument 1: Green Dam Technical Requirements
Document 1: Green Dam Technical Requirementsrmackinnon
 
China's Censorship 2.0 (Green Dam update)
China's Censorship 2.0 (Green Dam update)China's Censorship 2.0 (Green Dam update)
China's Censorship 2.0 (Green Dam update)rmackinnon
 
Internet & Activism: 20 Years After Tiananmen
Internet & Activism: 20 Years After TiananmenInternet & Activism: 20 Years After Tiananmen
Internet & Activism: 20 Years After Tiananmenrmackinnon
 
Lecture @ Fudan J-School
Lecture @ Fudan J-SchoolLecture @ Fudan J-School
Lecture @ Fudan J-Schoolrmackinnon
 
The Tao of the Web: China and the future of the Internet
The Tao of the Web: China and the future of the InternetThe Tao of the Web: China and the future of the Internet
The Tao of the Web: China and the future of the Internetrmackinnon
 
Chinese social media and political discourse
Chinese social media and political discourseChinese social media and political discourse
Chinese social media and political discoursermackinnon
 
Cyber-ocracy vs. Cyber-tarianism: The Chinese Internet
Cyber-ocracy vs. Cyber-tarianism: The Chinese InternetCyber-ocracy vs. Cyber-tarianism: The Chinese Internet
Cyber-ocracy vs. Cyber-tarianism: The Chinese Internetrmackinnon
 
OSi Forum - supplementary videos
OSi Forum - supplementary videosOSi Forum - supplementary videos
OSi Forum - supplementary videosrmackinnon
 
Censorship by Chinese Blog-hosting Companies
Censorship by Chinese Blog-hosting CompaniesCensorship by Chinese Blog-hosting Companies
Censorship by Chinese Blog-hosting Companiesrmackinnon
 
iSummit keynote: Free Culture & Free Speech
iSummit keynote: Free Culture & Free SpeechiSummit keynote: Free Culture & Free Speech
iSummit keynote: Free Culture & Free Speechrmackinnon
 
China the Internet and Corporate Responsibility
China the Internet and Corporate ResponsibilityChina the Internet and Corporate Responsibility
China the Internet and Corporate Responsibilityrmackinnon
 
Yahoo!, the Shi Tao Case, and lessons for corporate social responsibility
Yahoo!, the Shi Tao Case, and lessons for corporate social responsibilityYahoo!, the Shi Tao Case, and lessons for corporate social responsibility
Yahoo!, the Shi Tao Case, and lessons for corporate social responsibilityrmackinnon
 
Journalism 2.0: The future of news
Journalism 2.0: The future of newsJournalism 2.0: The future of news
Journalism 2.0: The future of newsrmackinnon
 
Global Voices May9
Global Voices May9Global Voices May9
Global Voices May9rmackinnon
 

More from rmackinnon (18)

Can authoritarianism survive the Internet? Yes it can...
Can authoritarianism survive the Internet? Yes it can...Can authoritarianism survive the Internet? Yes it can...
Can authoritarianism survive the Internet? Yes it can...
 
国际互联网治理 - 我们都是国际网民!
国际互联网治理 -我们都是国际网民!国际互联网治理 -我们都是国际网民!
国际互联网治理 - 我们都是国际网民!
 
Document 1: Green Dam Technical Requirements
Document 1: Green Dam Technical RequirementsDocument 1: Green Dam Technical Requirements
Document 1: Green Dam Technical Requirements
 
China's Censorship 2.0 (Green Dam update)
China's Censorship 2.0 (Green Dam update)China's Censorship 2.0 (Green Dam update)
China's Censorship 2.0 (Green Dam update)
 
Internet & Activism: 20 Years After Tiananmen
Internet & Activism: 20 Years After TiananmenInternet & Activism: 20 Years After Tiananmen
Internet & Activism: 20 Years After Tiananmen
 
Lecture @ Fudan J-School
Lecture @ Fudan J-SchoolLecture @ Fudan J-School
Lecture @ Fudan J-School
 
The Tao of the Web: China and the future of the Internet
The Tao of the Web: China and the future of the InternetThe Tao of the Web: China and the future of the Internet
The Tao of the Web: China and the future of the Internet
 
Chinese social media and political discourse
Chinese social media and political discourseChinese social media and political discourse
Chinese social media and political discourse
 
Cyber-ocracy vs. Cyber-tarianism: The Chinese Internet
Cyber-ocracy vs. Cyber-tarianism: The Chinese InternetCyber-ocracy vs. Cyber-tarianism: The Chinese Internet
Cyber-ocracy vs. Cyber-tarianism: The Chinese Internet
 
OSi Forum - supplementary videos
OSi Forum - supplementary videosOSi Forum - supplementary videos
OSi Forum - supplementary videos
 
Censorship by Chinese Blog-hosting Companies
Censorship by Chinese Blog-hosting CompaniesCensorship by Chinese Blog-hosting Companies
Censorship by Chinese Blog-hosting Companies
 
iSummit keynote: Free Culture & Free Speech
iSummit keynote: Free Culture & Free SpeechiSummit keynote: Free Culture & Free Speech
iSummit keynote: Free Culture & Free Speech
 
China the Internet and Corporate Responsibility
China the Internet and Corporate ResponsibilityChina the Internet and Corporate Responsibility
China the Internet and Corporate Responsibility
 
Yahoo!, the Shi Tao Case, and lessons for corporate social responsibility
Yahoo!, the Shi Tao Case, and lessons for corporate social responsibilityYahoo!, the Shi Tao Case, and lessons for corporate social responsibility
Yahoo!, the Shi Tao Case, and lessons for corporate social responsibility
 
Journalism 2.0: The future of news
Journalism 2.0: The future of newsJournalism 2.0: The future of news
Journalism 2.0: The future of news
 
Cc Hku
Cc HkuCc Hku
Cc Hku
 
Global Voices May9
Global Voices May9Global Voices May9
Global Voices May9
 
Web2hku
Web2hkuWeb2hku
Web2hku
 

Recently uploaded

The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clashcharlottematthew16
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfPrecisely
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfRankYa
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 

Recently uploaded (20)

The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdf
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 

Web Censorship in Japan and Public Support

  • 3. What does “Web Censorship” mean?  Different meanings in different contexts:  Censorship by governments against freedom of expression  and free access to information  Filtering of content seen as “harmful” to society  Violation of privacy rights: web monitoring, eavesdropping  “Censorship” against file sharing (copyrighted content)  What is “anti­censorship”?
  • 4. “The Age of Net Regulation is Coming”  In the last year, moves toward net regulation: 1.Internet content (transmission + broadcasting = ?) 2.Copyright legislation (file sharing) 3.Mobile web access (filtering, “harmful” content)  Fears about: “deai” (dating) sites, obscene/voilent  content, child porn, “adult” anime, net bullying,  death threats (Akihabara massacre), etc. etc. etc.
  • 5. Filtering of “harmful” content  Bill by LDP/DPJ passed into law on June 11th  Included in the bill:  Obligation on PC makers to pre­install national  standards­based filtering software on PCs/mobile phones  Filtering on mobile phones for users under age 18  ISPs required to eliminate harmful content/services  Government decides what is “harmful”
  • 6.
  • 7.
  • 8.
  • 9. Support for Regulation  A survey on regulation of “harmful content” (2007):  67.8% said the Internet should be regulated  22.7% said they lean toward regulation  3.1% said they lean toward non­regulation  1.4% said the Internet should not be regulated  76% support web filtering, 51% want police to  strengthen monitoring, 87% support manga porn  regulation
  • 10. Opposition to Regulation  Some of the greatest opposition from companies:  DENA, Yahoo, Microsoft, Rakuten, Net Star  Emphasizing positives of an open Internet
  • 11. Opposition strategies  More so than free access to information, opposition  strategies emphasize economic considerations:  Regulation will stop innovation/creativity  Japan will be left behind, outcompeted  Also emphasizes knowledge issues:  Many proposals are technologically contradictory  Lack of transparency in legislation
  • 12. The “people” are killing the Internet  Oppression of the people by governments and  corporations is not seen as a major concern  Conern is about other citizens:  Bullying, death threats, dating sites, obscene content,  copyright violation, etc. etc.  Conclusion: it is the people who are killing the  Internet, gov't needs to step in and regulate
  • 13. The future is now  Citizen media coverage of Akihabara killings:  Instantaneous through Ustream, 2000­3000 viewers  No editing or censorship of footage  Large public backlash, criticism
  • 14. Summary  “Web censorship” means different things to  different people/groups/nations  Different opposition strategies:  Technological problems with censorship  Lack of transparency in process  Economic considerations, innovation/creativity  Awareness and literacy are key