SlideShare una empresa de Scribd logo
1 de 25
POLS3620 Contemporary Europe and Asia




Internet Freedom
1001 7526 Chow Tsz Yan
1001 6759 Chuk Ching Pong
Introduction
• 2012: nearly 1/3 of the world’s population has
  used the Internet
• even greater portion possesses a mobile phone

• Concerned with the power of new technologies
  to catalyze political change
• many authoritarian states have taken various
  measures to filter, monitor, or otherwise
  obstruct free speech online
Freedom on the Net 2012

• Conducted by the Freedom House
• U.S.-based (NGO) that conducts research and
  advocacy on democracy, political freedom and
  human right
Examination of three broad
categories:
• A. Obstacles to Access: assesses infrastructural
  and economic barriers to access

• B. Limits on Content: examines filtering and
  blocking of websites

• C. Violations of User Rights: measures legal
  protections and restrictions on online activity
Standards of Measurement
• 0 (the most free) to 100 (the least free)
• Status designation:
  -Free (0-30 points)
  -Partly Free (31-60 points)
  -Not Free (61-100 points)
Scores of Asia
Scores of Eurasia
Scores of Europe & U.S.
Recent development
• A significant uptick in citizen activism related to internet
  freedom, which has produced several notable
  mobilization efforts and legislative victories.

• In several European countries, fierce public opposition
  to the Anti-Counterfeiting Trade Agreement (ACTA) has
  prompted governments to step away from ratification of
  the treaty
• In largely democratic settings, the courts have
  started to play an instrumental role in defending
  internet freedom and overturning laws that may
  infringe on it.

• Hungary:
  Constitutional Court decided in 2011 that the
  country’s restrictive new media regulations would
  not be applicable to online news sources and portals.

• South Korea:
  the Constitutional Court issued its third decision
  favorable to internet freedom in two years, ruling
  against the real-name registration system
Key Trends
New Laws Restrict Free Speech and Prompt
Arrests of Internet Users
• Responding to the rise of user-generated content

• laws that are ostensibly designed to protect
  national security or citizens from cybercrime

• but which are so broadly worded that they can
  easily be turned on political opponent
• Malaysia:
  parliament passed an amendment to the 1950 Evidence
  Act that holds the hosts of online forums, news outlets,
  blogging services, and businesses providing WiFi
  responsible for any seditious content posted by
  anonymous users

• Thailand:
  pressure on intermediaries intensified in May 2012 after
  a forum moderator for the popular online news outlet
  Prachatai received a suspended eight-month jail
  sentence and a fine for not deleting quickly enough an
  anonymous reader’s criticism of the royal family
• China: private companies maintaining whole divisions
  responsible for monitoring and interpreting daily
  Communist Party directives
Surveillance Increases, with Few Checks on
Abuse

• Many governments are seeking less visible
  means to infringe upon internet freedom
• often by increasing their technical capacity or
  administrative authority to access private
  correspondence

• Governments enhanced their surveillance
  abilities
• E.g. South Korea, Thailand
• Surveillance in nondemocratic countries is often
  political in nature, aimed at identifying and
  suppressing government critics and human
  rights activists.

• In China, major microblogging services were
  given a March 2012 deadline to implement real-
  name registration for their users
• Even in more developed democracies, concerns
  have increased that the government is becoming
  too intrusive

• Britain: In 2012, the government announced a
  proposal to expand the existing surveillance
  measures
China’s Case
The Chinese method for controlling social-
media content
• restricting access to international networks while
  coercing their domestic alternatives to robustly
  censor
• monitor user communications according to
  Communist Party directives—has become a
  particularly potent model for other authoritarian
  countries.

• attempts to enhance their technical capacity to
  censor, monitor, or carry out cyberattacks against
  regime opponents.
http://www.idigitaltimes.com/articles/12672/20121111/google-china-search-banned-communist-internet-censorship.htm
Historical and Cultural Perspective
Historical perspective
• Rejection to ‘digital revolution’ , especially in the
  Cold War era

• “ double juggernaut “ of China since 1990s
- China’s reform & an era of rapid technological
  innovations globally

 • Linear development vs dramatic change
Cultural difference

• Western domination of software industry
- reasons behind like openness , free expression ,
  democracy , competitive market , etc

• China with similar software and internet
  advancement
- under fully government surveillance and
  manipulation
Conclusion
 “Technology will make it increasingly difficult for the state to control
  the conformation its people receive … The Goliath of totalitarianism
  will be brought down by the David of the microchip .”

     ─ Ronald Reagan , speech at London’s Guildhall , June 14 , 1989



  “Imagine if the Internet took hold in China . Imagine how freedom
  would spread .”

         ─ George W . Bush , Phoenix , Arizona , December 7 , 1999
Bibliography
• Freedom House, "Freedom on the net 2012." Accessed November 13, 2012.
  http://www.freedomhouse.org/report/freedom-net/freedom-net-2012.

• Kalathil, Shanthi , and Taylor C. Boas . 2003 . Open Networks , Closed Regime : The
  Impact of the Internet on Authoritarian Rule . Washington : The Brookings
  Institution press .

• Herold, David Kurt and Peter Marolt. 2011. Online Society in China :Creating,
  Celebrating, and Instrumentalising the Online Carnival. Media, Culture and Social
  Change in Asia. Vol. 25. Abingdon, Oxon; New York: Routledge.

• Simon, Leslie David, Javier Corrales, and Donald R. Wolfensberger. 2002. Democracy
  and the Internet :Allies Or Adversaries?. Wilson Forum. Washington, D.C.: Woodrow
  Wilson Center Press.

Más contenido relacionado

La actualidad más candente

China’s Internet Security _Dichotomy of National Security and Human Rights in...
China’s Internet Security _Dichotomy of National Security and Human Rights in...China’s Internet Security _Dichotomy of National Security and Human Rights in...
China’s Internet Security _Dichotomy of National Security and Human Rights in...Emily Võ
 
International politics in the age of the internet
International politics in the age of the internetInternational politics in the age of the internet
International politics in the age of the internetJeffrey Hart
 
Political change in the digital age
Political change in the digital agePolitical change in the digital age
Political change in the digital ageKrishna Mohan
 
Presentation slides
Presentation slidesPresentation slides
Presentation slidesandrewdyoung
 
Internet Content Regulation: What it means in 2010
Internet Content Regulation: What it means in 2010Internet Content Regulation: What it means in 2010
Internet Content Regulation: What it means in 2010Wendy Qi
 
online-disinformation-human-rights
online-disinformation-human-rightsonline-disinformation-human-rights
online-disinformation-human-rightsarchiejones4
 
Revitalizing democracy - the power of online tools
Revitalizing democracy - the power of online toolsRevitalizing democracy - the power of online tools
Revitalizing democracy - the power of online toolsMadarasz Csaba
 
Dl Ppt Electronic Democracy
Dl Ppt   Electronic DemocracyDl Ppt   Electronic Democracy
Dl Ppt Electronic Democracyymslot
 
E Democracy Slideshare
E Democracy SlideshareE Democracy Slideshare
E Democracy SlideshareDean McKeown
 
ODDC Context - Investigating the Impact of Kenya’s Open Data Initiative on Ma...
ODDC Context - Investigating the Impact of Kenya’s Open Data Initiative on Ma...ODDC Context - Investigating the Impact of Kenya’s Open Data Initiative on Ma...
ODDC Context - Investigating the Impact of Kenya’s Open Data Initiative on Ma...Open Data Research Network
 
Internet Governance by Its History (1966-2000)
Internet Governance by Its History (1966-2000)Internet Governance by Its History (1966-2000)
Internet Governance by Its History (1966-2000)Jeremy Pesner
 
IGF Hyderabad - Index of Global Internet Freedom
IGF Hyderabad - Index of Global Internet FreedomIGF Hyderabad - Index of Global Internet Freedom
IGF Hyderabad - Index of Global Internet FreedomFreedom House
 
Tracking Social Media Participation: New Approaches to Studying User-Gener...
Tracking  Social  Media  Participation: New Approaches to Studying User-Gener...Tracking  Social  Media  Participation: New Approaches to Studying User-Gener...
Tracking Social Media Participation: New Approaches to Studying User-Gener...Axel Bruns
 

La actualidad más candente (20)

China’s Internet Security _Dichotomy of National Security and Human Rights in...
China’s Internet Security _Dichotomy of National Security and Human Rights in...China’s Internet Security _Dichotomy of National Security and Human Rights in...
China’s Internet Security _Dichotomy of National Security and Human Rights in...
 
International politics in the age of the internet
International politics in the age of the internetInternational politics in the age of the internet
International politics in the age of the internet
 
Political change in the digital age
Political change in the digital agePolitical change in the digital age
Political change in the digital age
 
Presentation slides
Presentation slidesPresentation slides
Presentation slides
 
Internet Content Regulation: What it means in 2010
Internet Content Regulation: What it means in 2010Internet Content Regulation: What it means in 2010
Internet Content Regulation: What it means in 2010
 
online-disinformation-human-rights
online-disinformation-human-rightsonline-disinformation-human-rights
online-disinformation-human-rights
 
Polinter11
Polinter11Polinter11
Polinter11
 
Revitalizing democracy - the power of online tools
Revitalizing democracy - the power of online toolsRevitalizing democracy - the power of online tools
Revitalizing democracy - the power of online tools
 
Dl Ppt Electronic Democracy
Dl Ppt   Electronic DemocracyDl Ppt   Electronic Democracy
Dl Ppt Electronic Democracy
 
E Democracy Slideshare
E Democracy SlideshareE Democracy Slideshare
E Democracy Slideshare
 
Texas policy 2016
Texas policy 2016Texas policy 2016
Texas policy 2016
 
E democracy ppt
E democracy pptE democracy ppt
E democracy ppt
 
ODDC Context - Investigating the Impact of Kenya’s Open Data Initiative on Ma...
ODDC Context - Investigating the Impact of Kenya’s Open Data Initiative on Ma...ODDC Context - Investigating the Impact of Kenya’s Open Data Initiative on Ma...
ODDC Context - Investigating the Impact of Kenya’s Open Data Initiative on Ma...
 
Internet Governance by Its History (1966-2000)
Internet Governance by Its History (1966-2000)Internet Governance by Its History (1966-2000)
Internet Governance by Its History (1966-2000)
 
IGF Hyderabad - Index of Global Internet Freedom
IGF Hyderabad - Index of Global Internet FreedomIGF Hyderabad - Index of Global Internet Freedom
IGF Hyderabad - Index of Global Internet Freedom
 
Icegov2011 2
Icegov2011 2Icegov2011 2
Icegov2011 2
 
Tracking Social Media Participation: New Approaches to Studying User-Gener...
Tracking  Social  Media  Participation: New Approaches to Studying User-Gener...Tracking  Social  Media  Participation: New Approaches to Studying User-Gener...
Tracking Social Media Participation: New Approaches to Studying User-Gener...
 
Internet governance
Internet governanceInternet governance
Internet governance
 
Fotn 2015 colombia
Fotn 2015 colombiaFotn 2015 colombia
Fotn 2015 colombia
 
Dutton china-sjtu-2015
Dutton china-sjtu-2015Dutton china-sjtu-2015
Dutton china-sjtu-2015
 

Similar a POLS 3620 Internet freedom

Freedom Trends and Assumptions - A Global Assessment of Internet and Digital ...
Freedom Trends and Assumptions - A Global Assessment of Internet and Digital ...Freedom Trends and Assumptions - A Global Assessment of Internet and Digital ...
Freedom Trends and Assumptions - A Global Assessment of Internet and Digital ...Freedom House
 
Fotn 2013 summary of findings
Fotn 2013 summary of findingsFotn 2013 summary of findings
Fotn 2013 summary of findingsChafik YAHOU
 
Flew dmrc 11 sept 15
Flew dmrc 11 sept 15Flew dmrc 11 sept 15
Flew dmrc 11 sept 15Terry Flew
 
Digital Repression and Techno-Authoritarianism
Digital Repression and Techno-AuthoritarianismDigital Repression and Techno-Authoritarianism
Digital Repression and Techno-AuthoritarianismCharles Mok
 
Cst group project#2, intro++
Cst group project#2, intro++Cst group project#2, intro++
Cst group project#2, intro++Roxanne St Ives
 
C1729690_PersuasiveAnalysis Research Paper (Argument).docx
C1729690_PersuasiveAnalysis Research Paper (Argument).docxC1729690_PersuasiveAnalysis Research Paper (Argument).docx
C1729690_PersuasiveAnalysis Research Paper (Argument).docxAndrewClark295760
 
ArticlesJournal of Contemporary Criminal Justice26(1) 10.docx
ArticlesJournal of Contemporary Criminal Justice26(1) 10.docxArticlesJournal of Contemporary Criminal Justice26(1) 10.docx
ArticlesJournal of Contemporary Criminal Justice26(1) 10.docxwraythallchan
 
Digital Sovereigns or Consent of the Networked
Digital Sovereigns or Consent of the NetworkedDigital Sovereigns or Consent of the Networked
Digital Sovereigns or Consent of the NetworkedMsifry
 
An Overview of the Battle for the Control of the Internet
An Overview of the Battle for the Control of the InternetAn Overview of the Battle for the Control of the Internet
An Overview of the Battle for the Control of the InternetDibussi Tande
 
MCj-401 Assignment, roll-30.pdf
MCj-401 Assignment, roll-30.pdfMCj-401 Assignment, roll-30.pdf
MCj-401 Assignment, roll-30.pdfHasanAlManjur1
 
Team rocket presentation
Team rocket presentationTeam rocket presentation
Team rocket presentationmoralsus
 
Team rocket presentation
Team rocket presentationTeam rocket presentation
Team rocket presentationbollmanp
 
Ecrea1d Schwate Jan Paper
Ecrea1d Schwate Jan PaperEcrea1d Schwate Jan Paper
Ecrea1d Schwate Jan Paperimec.archive
 
The Political Power of Social Media Technology, the Publ.docx
The Political Power of Social Media Technology, the Publ.docxThe Political Power of Social Media Technology, the Publ.docx
The Political Power of Social Media Technology, the Publ.docxAASTHA76
 
Manipulating Social Media to Undermine Democracy 2017 Final
Manipulating Social Media to Undermine Democracy 2017 Final Manipulating Social Media to Undermine Democracy 2017 Final
Manipulating Social Media to Undermine Democracy 2017 Final Alireza Ghahrood
 

Similar a POLS 3620 Internet freedom (20)

Freedom Trends and Assumptions - A Global Assessment of Internet and Digital ...
Freedom Trends and Assumptions - A Global Assessment of Internet and Digital ...Freedom Trends and Assumptions - A Global Assessment of Internet and Digital ...
Freedom Trends and Assumptions - A Global Assessment of Internet and Digital ...
 
Fotn 2013 summary of findings
Fotn 2013 summary of findingsFotn 2013 summary of findings
Fotn 2013 summary of findings
 
Freedom unesco-2011
Freedom unesco-2011Freedom unesco-2011
Freedom unesco-2011
 
Flew dmrc 11 sept 15
Flew dmrc 11 sept 15Flew dmrc 11 sept 15
Flew dmrc 11 sept 15
 
Digital Repression and Techno-Authoritarianism
Digital Repression and Techno-AuthoritarianismDigital Repression and Techno-Authoritarianism
Digital Repression and Techno-Authoritarianism
 
Society Meets Social Media at reyerson-2015
Society Meets Social Media at reyerson-2015Society Meets Social Media at reyerson-2015
Society Meets Social Media at reyerson-2015
 
Cst group project#2, intro++
Cst group project#2, intro++Cst group project#2, intro++
Cst group project#2, intro++
 
Critical Debates in Internet Studies
Critical Debates in Internet StudiesCritical Debates in Internet Studies
Critical Debates in Internet Studies
 
C1729690_PersuasiveAnalysis Research Paper (Argument).docx
C1729690_PersuasiveAnalysis Research Paper (Argument).docxC1729690_PersuasiveAnalysis Research Paper (Argument).docx
C1729690_PersuasiveAnalysis Research Paper (Argument).docx
 
ArticlesJournal of Contemporary Criminal Justice26(1) 10.docx
ArticlesJournal of Contemporary Criminal Justice26(1) 10.docxArticlesJournal of Contemporary Criminal Justice26(1) 10.docx
ArticlesJournal of Contemporary Criminal Justice26(1) 10.docx
 
Online Harms White Paper April 2019 Bill Dutton
Online Harms White Paper April 2019 Bill DuttonOnline Harms White Paper April 2019 Bill Dutton
Online Harms White Paper April 2019 Bill Dutton
 
Digital Sovereigns or Consent of the Networked
Digital Sovereigns or Consent of the NetworkedDigital Sovereigns or Consent of the Networked
Digital Sovereigns or Consent of the Networked
 
An Overview of the Battle for the Control of the Internet
An Overview of the Battle for the Control of the InternetAn Overview of the Battle for the Control of the Internet
An Overview of the Battle for the Control of the Internet
 
MCj-401 Assignment, roll-30.pdf
MCj-401 Assignment, roll-30.pdfMCj-401 Assignment, roll-30.pdf
MCj-401 Assignment, roll-30.pdf
 
Team rocket presentation
Team rocket presentationTeam rocket presentation
Team rocket presentation
 
Team rocket presentation
Team rocket presentationTeam rocket presentation
Team rocket presentation
 
Network Neutrality: The Origins, Politics and Implications of New Rules for a...
Network Neutrality: The Origins, Politics and Implications of New Rules for a...Network Neutrality: The Origins, Politics and Implications of New Rules for a...
Network Neutrality: The Origins, Politics and Implications of New Rules for a...
 
Ecrea1d Schwate Jan Paper
Ecrea1d Schwate Jan PaperEcrea1d Schwate Jan Paper
Ecrea1d Schwate Jan Paper
 
The Political Power of Social Media Technology, the Publ.docx
The Political Power of Social Media Technology, the Publ.docxThe Political Power of Social Media Technology, the Publ.docx
The Political Power of Social Media Technology, the Publ.docx
 
Manipulating Social Media to Undermine Democracy 2017 Final
Manipulating Social Media to Undermine Democracy 2017 Final Manipulating Social Media to Undermine Democracy 2017 Final
Manipulating Social Media to Undermine Democracy 2017 Final
 

POLS 3620 Internet freedom

  • 1. POLS3620 Contemporary Europe and Asia Internet Freedom 1001 7526 Chow Tsz Yan 1001 6759 Chuk Ching Pong
  • 2. Introduction • 2012: nearly 1/3 of the world’s population has used the Internet • even greater portion possesses a mobile phone • Concerned with the power of new technologies to catalyze political change • many authoritarian states have taken various measures to filter, monitor, or otherwise obstruct free speech online
  • 3. Freedom on the Net 2012 • Conducted by the Freedom House • U.S.-based (NGO) that conducts research and advocacy on democracy, political freedom and human right
  • 4. Examination of three broad categories: • A. Obstacles to Access: assesses infrastructural and economic barriers to access • B. Limits on Content: examines filtering and blocking of websites • C. Violations of User Rights: measures legal protections and restrictions on online activity
  • 5. Standards of Measurement • 0 (the most free) to 100 (the least free) • Status designation: -Free (0-30 points) -Partly Free (31-60 points) -Not Free (61-100 points)
  • 9.
  • 10. Recent development • A significant uptick in citizen activism related to internet freedom, which has produced several notable mobilization efforts and legislative victories. • In several European countries, fierce public opposition to the Anti-Counterfeiting Trade Agreement (ACTA) has prompted governments to step away from ratification of the treaty
  • 11. • In largely democratic settings, the courts have started to play an instrumental role in defending internet freedom and overturning laws that may infringe on it. • Hungary: Constitutional Court decided in 2011 that the country’s restrictive new media regulations would not be applicable to online news sources and portals. • South Korea: the Constitutional Court issued its third decision favorable to internet freedom in two years, ruling against the real-name registration system
  • 13. New Laws Restrict Free Speech and Prompt Arrests of Internet Users • Responding to the rise of user-generated content • laws that are ostensibly designed to protect national security or citizens from cybercrime • but which are so broadly worded that they can easily be turned on political opponent
  • 14. • Malaysia: parliament passed an amendment to the 1950 Evidence Act that holds the hosts of online forums, news outlets, blogging services, and businesses providing WiFi responsible for any seditious content posted by anonymous users • Thailand: pressure on intermediaries intensified in May 2012 after a forum moderator for the popular online news outlet Prachatai received a suspended eight-month jail sentence and a fine for not deleting quickly enough an anonymous reader’s criticism of the royal family • China: private companies maintaining whole divisions responsible for monitoring and interpreting daily Communist Party directives
  • 15. Surveillance Increases, with Few Checks on Abuse • Many governments are seeking less visible means to infringe upon internet freedom • often by increasing their technical capacity or administrative authority to access private correspondence • Governments enhanced their surveillance abilities • E.g. South Korea, Thailand
  • 16. • Surveillance in nondemocratic countries is often political in nature, aimed at identifying and suppressing government critics and human rights activists. • In China, major microblogging services were given a March 2012 deadline to implement real- name registration for their users
  • 17. • Even in more developed democracies, concerns have increased that the government is becoming too intrusive • Britain: In 2012, the government announced a proposal to expand the existing surveillance measures
  • 19. The Chinese method for controlling social- media content • restricting access to international networks while coercing their domestic alternatives to robustly censor • monitor user communications according to Communist Party directives—has become a particularly potent model for other authoritarian countries. • attempts to enhance their technical capacity to censor, monitor, or carry out cyberattacks against regime opponents.
  • 21. Historical and Cultural Perspective
  • 22. Historical perspective • Rejection to ‘digital revolution’ , especially in the Cold War era • “ double juggernaut “ of China since 1990s - China’s reform & an era of rapid technological innovations globally • Linear development vs dramatic change
  • 23. Cultural difference • Western domination of software industry - reasons behind like openness , free expression , democracy , competitive market , etc • China with similar software and internet advancement - under fully government surveillance and manipulation
  • 24. Conclusion “Technology will make it increasingly difficult for the state to control the conformation its people receive … The Goliath of totalitarianism will be brought down by the David of the microchip .” ─ Ronald Reagan , speech at London’s Guildhall , June 14 , 1989 “Imagine if the Internet took hold in China . Imagine how freedom would spread .” ─ George W . Bush , Phoenix , Arizona , December 7 , 1999
  • 25. Bibliography • Freedom House, "Freedom on the net 2012." Accessed November 13, 2012. http://www.freedomhouse.org/report/freedom-net/freedom-net-2012. • Kalathil, Shanthi , and Taylor C. Boas . 2003 . Open Networks , Closed Regime : The Impact of the Internet on Authoritarian Rule . Washington : The Brookings Institution press . • Herold, David Kurt and Peter Marolt. 2011. Online Society in China :Creating, Celebrating, and Instrumentalising the Online Carnival. Media, Culture and Social Change in Asia. Vol. 25. Abingdon, Oxon; New York: Routledge. • Simon, Leslie David, Javier Corrales, and Donald R. Wolfensberger. 2002. Democracy and the Internet :Allies Or Adversaries?. Wilson Forum. Washington, D.C.: Woodrow Wilson Center Press.

Notas del editor

  1. a comprehensive study of internet freedom in 47 countries around the globe. This report is the third in its series and focuses on developments that occurred between January 2011 and May 2012