Skip to main content

Home/ Internetni praktikum/ Group items tagged governence

Rss Feed Group items tagged

sintija

BBC News - Viewpoint: Changing the way the internet is governed is risky - 0 views

  • Viewpoint: Changing the way the internet is governed is risky
  • the US Department of Commerce has the power to decide how the internet works
  • internet is already governed
  • ...15 more annotations...
  • It's important to realise that without governance the internet could not function.
  • avoid two different web sites having the same name
  • International Corporation for Assigned Names and Numbers (Icann)
  • governance of the internet is effectively done by multiple stakeholders
  • WGIG would report on a solution acceptable to all but would move governance to an international body.
  • US government ultimately "controls" the internet
  • The internet overseers
  • UN summit
  • US refused to relinquish control of the Root Zone file, which is basically the key to governing the internet.
  • formed the Working Group on Internet Governance (WGIG).
  • in 2003 in Geneva
  • Russians
  • International Telecommunications Union (ITU), another UN agency, to be given responsibility for internet governanc
  • A great advantage of the current governance structure is that it supports rapid developments, provided that the US Department of Commerce remains at arm's length
  • internet governance needs to help the internet evolve rather than dictate how it must develop.
Maj Krek

Google and Skyhook: the internet privacy invasion | openDemocracy - 1 views

  • every v isitor
  • “Location Based Browsing
  • Location Based Browsing”,
  • ...28 more annotations...
  • address of every visitor
  • “Location Based Browsing
  • most governments are unaware that a second American company, Skyhook, is driving around
  • Google, Microsoft and Firefox all claim we can switch off Location Based Browsing
  • ensure every website
  • most governments are unaware that a second American company, Skyhook, is driving around the world’s streets
  • we can switch off Location Based Browsing
  • Up until now, our router MAC address was unknown and worthless to anybody.
  • most governments are unaware that a second American company, Skyhook, is driving around the world’s streets , including Britain’s, gathering wi-fi data from people’s homes and businesses.
  • To ensure every website in the world can contact Google and ask the home address of every visitor to any page on their website
  • Up until now, our router MAC address was unknown and worthless to anybody.
  • Up until now, our router MAC address was unknown and worthless to anybody.
  • address of
  • Up until now, our router MAC address was unknown and worthless to anybody.
  • Up until now, our router MAC address was unknown and worthless to anybody
  • Up until now, our router MAC address was unknown and worthless to anybod
  • website
  • Location Based Browsing
  • their
  • Location Based Browsing
  • Street View project
  • every website
  • in the world can
  • contact Google and ask
  • the home
  • To ensure every
  • most governments are unaware that a second American company, Skyhook, is driving around
  • isitor to any page on their website. Websites can have a little piece of software (known as XSS) installed to grab our router’s MAC address from our browser if we visit any page on their site. This software is undetectable to the user, the browser does not warn us what is happening and has no setting to prevent it. The website owner can then send your MAC address to Google Location Services. At this point, without verifying that you have given permission, Google can provide your home address.
Urška Cerar

What Does Google Do If the Government Comes Looking for Your Emails? - Rebecca J. Rosen... - 0 views

  • Every single day, dozens of requests from law-enforcement officials, courts, and other government agencies pour into Google's offices, requesting that Google hand over different pieces of information its users have amassed
  • many of these requests are legitimate
  • It's important for law enforcement agencies to pursue illegal activity and keep the public safe.
  • ...5 more annotations...
  • once a request has been deemed valid, Google will notify users when possible.
  • Google says, "When we receive such a request, our team reviews the request to make sure it satisfies legal requirements and Google's policies.
  • Google will not provide a user's search-query information or the contents of a user's account (email content, pictures, documents, etc.) without a warrant.
  • Google has advocated for updating ECPA, "so the same protections that apply to your personal documents that you keep in your home also apply to your email and online documents."
  • If Google can establish clear practices now that somehow balance the competing needs of law-enforcement agencies and private users, that effort will pay off
Anja Pirc

Online privacy: Difference Engine: Nobbling the internet | The Economist - 0 views

  • TWO measures affecting the privacy internet users can expect in years ahead are currently under discussion on opposite sides of the globe. The first hails from a Senate committee’s determination to make America’s online privacy laws even more robust. The second concerns efforts by the International Telecommunications Union (ITU), an intergovernmental body under the auspices of the United Nations, to rewrite its treaty for regulating telecommunications around the world, which dates from 1988, so as to bring the internet into its fief.
  • The congressional measure, approved overwhelmingly by the Senate Judiciary Committee on November 29th, would require criminal investigators to obtain a search warrant from a judge before being able to coerce internet service providers (ISPs) to hand over a person’s e-mail. The measure would also extend this protection to the rest of a person’s online content, including videos, photographs and documents stored in the "cloud"—ie, on servers operated by ISPs, social-network sites and other online provider
  • a warrant is needed only for unread e-mail less than six months old. If it has already been opened, or is more than six months old, all that law-enforcement officials need is a subpoena. In America, a subpoena does not need court approval and can be issued by a prosecutor. Similarly, a subpoena is sufficient to force ISPs to hand over their routing data, which can then be used to identify a sender’s various e-mails and to whom they were sent. That is how the FBI stumbled on a sex scandal involving David Petraeus, the now-ex director of the CIA, and his biographer.
  • ...7 more annotations...
  • No-one imagined that ISPs would one day offer gigabytes of online storage free—as Google, Yahoo!, Hotmail and other e-mail providers do today. The assumption back then was that if someone had not bothered to download and delete online messages within six months, such messages could reasonably be considered to be abandoned—and therefore not in need of strict protection.
  • wholesale access to the internet, powerful mobile phones and ubiquitous social networking have dramatically increased the amount of private data kept online. In the process, traditional thinking about online security has been rendered obsolete. For instance, more and more people nowadays keep their e-mail messages on third-party servers elsewhere, rather than on their own hard-drives or mobile phones. Many put their personal details, contacts, photographs, locations, likes, dislikes and inner thoughts on Google, Facebook, Twitter, Flickr, Dropbox and a host of other destinations. Bringing online privacy requirements into an age of cloud computing is only fit and proper, and long overdue.
  • the international telecoms treaty that emerged focused on how telephone traffic flows across borders, the rules governing the quality of service and the means operators could adopt to bill one another for facilitating international calls. As such, the regulations applied strictly to telecoms providers, the majority of which were state owned.
  • he goal of certain factions is to grant governments the authority to charge content providers like Amazon, Google, Facebook and Twitter for allowing their data to flow over national borders. If enacted, such proposals would most certainly deter investment in network infrastructure, raise costs for consumers, and hinder online access for precisely those people the ITU claims it wants to help.
  • a proposal sponsored by the United States and Canada to restrict the debate in Dubai strictly t
  • o conventional telecoms has met with a modicum of success, despite stiff opposition from Russia plus some African and Middle-Eastern countries. Behind closed doors, the conference has agreed not to alter the ITU’s current definition of “telecommunications” and to leave the introductory text concerning the existing treaty’s scope intact.
  • The sticking point has been what kind of organisations the treaty should apply to. Here, one word can make a huge difference. In ITU jargon, the current treaty relates only to “recognised operating agencies”—in other words, conventional telecoms operators. The ITU wants to change that to simply “operating agencies”. Were that to happen, not only would Google, Facebook and other website operators fall under the ITU’s jurisdiction, but so too would all government and business networks. It seems the stakes really are as high as the ITU’s critics have long maintained
Patricija Čelik

Internet pornography: safety plans do not go far enough - charities - Telegraph - 0 views

  • The Government yesterday launched a consultation on a possible change in the law to give parents more control over the material their children are viewing online.
  • Internet service providers have been in talks with the Government about ways of enabling parents to block sites containing sexually or gambling as well as forums glorify suicide and self-harm.
  • a report by MPs who called for a full “opt-in” which would automatically block adult material unless the user chose to deactivate it. Google has argued that an automatic block as a “mistake”, while Virgin Media, BT, TalkTalk and Sky have developed versions of the “active choice” system which makes users chose whether they want parental controls when they sign up, rather than imposing them automatically.
  • ...1 more annotation...
  • Claire Walker, head of policy, at the charity Family Lives, which this week published a hard hitting report on online dangers, said parents would be more secure with an automatic block.
Katja Jerman

Digital rights advocates wary of new 'six strikes' initiative for online piracy | Techn... - 0 views

  • The Copyright Alert System (CAS) was devised by a coalition of internet service providers (ISPs), content owners and the US government to curb illegal downloading by alerting "casual infringers" when illegal filesharing is detected on their IP address
  • Initially, the alerts are intended to be educational. They tell the customer what happened and how they can prevent it from happening again. If pirating continues to happen through the IP address, users will receive the message again, followed by messages that ask them to confirm they have seen the alerts. The fifth and sixth alert are called mitigation alerts and will temporarily slow users' internet speeds, depending on the ISP.
  • CAS has also been criticized because the person who audited the MarkMonitor software to ensure that it fairly identifies copyright violations is a former lobbyist for the Recording Industry Association of America (RIAA), one of the industry groups fronting money for system.
  • ...12 more annotations...
  • Jill Lesser, executive director of the Center for Copyright Information said in an interview with On the Media that the program is meant to abet the "casual infringer".
  • McSherry said that people engaged in wholesale commercial infringement wouldn't be fazed by the system because they are familiar with ways around the system.
  • The newest attempt to thwart illegal filesharing in the United States launched Monday and while the "six strikes and you're out" initiative seems to offer light penalties, digital rights advocates are concerned that it lacks transparency.
  • Copyright Alert System (CAS)
  • was devised by a coalition of internet service providers (ISPs), content owners and the US government to curb illegal downloading by alerting "casual infringers" when illegal filesharing is detected on their IP address.
  • Initially, the alerts are intended to be educational.
  • . If pirating continues to happen through the IP address, users will receive the message again, followed by messages that ask them to confirm they have seen the alerts. The fifth and sixth alert are called mitigation alerts and will temporarily slow users' internet speeds, depending on the ISP.
  • It's certainly not how we should be doing copyright policy,
  • it's a private copyright system and it doesn't have the protections and balances that the public copyright system has.
  • to ensure that it fairly identifies copyright violations is a former lobbyist
  • McSherry said that people engaged in wholesale commercial infringement wouldn't be fazed by the system because they are familiar with ways around the system
  • This failed to have a significant effect on pirating, and the industry stopped suing these type of casual users several years ago.
  •  
    article 1
Miha Naprudnik

Controlling the web - Fault Lines - Al Jazeera English - 0 views

  • SOPA, the Stop Online Piracy Act, and PIPA, the Protect Intellectual Property Act, were meant to crack down on the illegal sharing of digital media. The bills were drafted on request of the content industry, Hollywood studios and major record labels. 
  • The US government says it must be able to fight against piracy and cyber attacks. And that means imposing more restrictions online. But proposed legislation could seriously curb freedom of speech and privacy, threatening the internet as we know it.
  • Can and should the internet be controlled? Who gets that power? How far will the US government go to gain power over the web? And will this mean the end of a free and global internet?
Jan Majdič

Leader: Social Networks | Comment is free | The Guardian - 0 views

  • The internet has always revolved around social networking, but the explosion of a fresh generation of communal sites such as MySpace, Bebo and Facebook is taking the phenomenon into new and unchartered territory.
  • One of those applications called iLike - pigging-backing on Facebook's global network - has already attracted more than 6 million members, and is growing by 1 million every few days, making it one of the fastest growing companies of any kind ever
  • A new generation accustomed to instant networking, and unashamed about living more of their lives online, is bound to change the organisations they work for and maybe the way they are governed, or at least the way their governments communicate with them
Neža Zidanič

Warning over social networking 'snooping' technology - Telegraph - 0 views

  • New stalking software capable of tracking people’s movements and predicting future behaviour using data from social networking websites has been developed, it emerged today.
  • The sophisticated technology relies on websites such as Facebook and Twitter to build a detailed picture of people’s lives in a move that could raise concerns over breach of privacy and civil liberties.
  • t was claimed that the technology could be transformed into a "Google for spies" and used by governments as a means of monitoring and controlling people online.
  • ...1 more annotation...
  • Users may be posting information that they believe will be viewed only by their friends, but instead, it is being viewed by government officials or pulled in by data collection services like the Riot search."
Nuša Gregoršanec

BBC News - Wikipedia founder Jimmy Wales on the internet's future - 0 views

  • Wikipedia founder Jimmy Wales on the internet's future
  • Censorship is the biggest threat to the development of the internet, according to Wikipedia's founder Jimmy Wales.
  • More than 40 countries practise censorship
  • ...4 more annotations...
  • Wikipedia has encountered particular difficulties with censorship in the past in China. The Chinese government periodically blocked the site between 2004 and 2008, when restrictions were lifted to coincide with the Olympics.
  • What really excites Mr Wales is the idea of many people in the developing world using the internet for the first time.
  • "Massive numbers of people are going to come online from cultures we don't normally interact with."
  • This could have huge implications for governments which are unused to dealing with a well informed networked public. However, Mr Wales acknowledged one potential pitfall of all the extra users blogging and adding other material.
metapavlin

Kim Dotcom: the internet cult hero spoiling for a fight with US authorities | Technolog... - 0 views

  • We want to show the world that we are innovators. We want to show the world that cloud storage has a right to exist. And, of course, when you launch something like this, you can expect some controversy. The content industry is going to react really emotionally about this. The US government will probably try and destroy the new business … you've got to stand up against that, and fight that, and I'm doing that … I will not allow them to chill me."
  • Megaupload was created initially as a service that allows you to send large files because email attachments had limitations … and that's still the case today. The popularity and initial growth was all around that. This was never set up with the intent to be some kind of piracy haven. If the US government says that we are a mega-conspiracy, a mafia that has created this kind of thing to be a criminal network of pirates, they're completely wrong … for them it was about shutting it down and dealing with it later on the fly. They are hacking the legal system."
Jernej Prodnik

The New Westphalian Web - By Katherine Maher | Foreign Policy - 0 views

  • The New Westphalian Web The future of the Internet may lie in the past. And that's not a good thing. BY KATHERINE MAHER | FEBRUARY 25, 2013
  • But 30 years ago, humanity gave birth to one of the most disruptive forces of our time. On Jan. 1, 1983, the implementation of TCP/IP -- a standard protocol to allow computers to exchange data over a network -- turned discrete clusters of research computers into a distributed global phenomenon. It was essentially the work of three men: two engineers to write the protocol, and one to carry out the plan. It was a birth so quiet no one even has a photo of the day; a recent post by one of TCP/IP's authors, Vint Cerf, was able to turn up only a commemorative pin.
    • Jernej Prodnik
       
      To je blizu tehnološkemu determinizmu, za razvoj interneta je šlo ogromno raziskovalnega denarja (iz in za "vojaško-industrijski kompleks").
  • ...5 more annotations...
  • This Internet was wild and wooly, unknown and unregulated
    • Jernej Prodnik
       
      Huh.
  • Like all new frontiers, cyberspace's early settlers declared themselves independent -- most famously in 1996, in cyberlibertarian John Perry Barlow's "A Declaration of the Independence of Cyberspace." Barlow asserted a realm beyond borders or government, rejecting the systems we use to run the physical universe. "Governments of the Industrial World," he reproached, "You have no sovereignty where we gather.… Cyberspace does not lie within your borders."
  • With the flip of a switch, three engineers had undone the work of more than 100 princes and diplomats.
    • Jernej Prodnik
       
      !!!
Patricija Čelik

International cooperation is needed to make the internet safe for the world - Telegraph - 0 views

  • However, a severe downside is the challenge to data security and personal privacy. The internet is now overrun with cyber attacks and hackers. Internet security has become a very serious and common concern for the entire world.
  • Recently the American company Mandiant published a report on cyber security. This report accuses China of being the origin of most cyber attacks and portrays China as an arch-hacker.
  • Cyber attacks by nature are transnational, anonymous and deceptive. It is extremely difficult to ascertain the source of any attack. Cyber attacks launched from stolen or faked IP addresses take place around the world on daily basis.
  • ...3 more annotations...
  • China is a serious victim of cyber attacks.
  • The Chinese government is committed to international cooperation against cyber crime.
  • In September 2011 China and Russia jointly submitted to the United Nations a draft International Code of Conduct for Information Security. China is deeply sincere in seeking cooperation to tackle cyber crime. This common threat needs the participation of the whole international community.
anonymous

Facebook Workers Try to Spend Less Than 1 Second Determining Whether Content Is 'Approp... - 0 views

  • Facebook
  • safer
  • Woodrow Wilson
  • ...14 more annotations...
  • online bullying
  • Internet
  • Facebook
  • ATLANTIC
  • she traveled to Facebook headquarters to see how they dealt with so-called "third party" reports of about inappropriate content.
  • how long he might spend deciding if a page should stay up or come down.
  • they "optimize for half a second." Half a second!
  • Middle- and high-schoolers are all on Facebook and that means all their drama is on Facebook, too.
  • reports
  • Facebook's
  • come up with some remarkable tools for managing conflict on its site.
  • they claim to have ways of handling problems like this, which serves as a defense to the suggestion that perhaps a government agency should try to regulate them, especially around minors' use of the service.
  • It costs money
  • they'll catch most baldly inappropriate content if they give their reviewers half a second to look at each page.
Janja Petek

Forty years of the internet: how the world changed for ever | Technology | The Guardian - 1 views

  • In October 1969, a student typed 'LO' on a computer - and the internet was born
  • Towards the end of the summer of 1969
  • a large grey metal box was delivered to the office of Leonard Kleinrock, a professor at the University of California in Los Angeles.
  • ...32 more annotations...
  • At 10.30pm, as Kleinrock's fellow professors and students crowded around, a computer was connected to the IMP, which made contact with a second IMP, attached to a second computer, several hundred miles away at the Stanford Research Institute, and an undergraduate named Charley Kline tapped out a message.
  • It's impossible to say for certain when the internet began, mainly because nobody can agree on what, precisely, the internet is.
  • It's interesting to compare how much has changed in computing and the internet since 1969 with, say, how much has changed in world politics.
  • On the other hand, the breakthrough accomplished that night in 1969 was a decidedly down-to-earth one
  • Twelve years after Charley Kline's first message on the Arpanet, as it was then known, there were still only 213 computers on the network; but 14 years after that, 16 million people were online, and email was beginning to change the world; the first really usable web browser wasn't launched until 1993, but by 1995 we had Amazon, by 1998 Google, and by 2001, Wikipedia, at which point there were 513 million people online. Today the figure is more like 1.7 billion.
  • on New Year's Day 1994 – only yesterday, in other words – there were an estimated 623 websites.
  • On the one hand, they were there because of the Russian Sputnik satellite launch, in 1957, which panicked the American defence establishment, prompting Eisenhower to channel millions of dollars into scientific research, and establishing Arpa, the Advanced Research Projects Agency, to try to win the arms technology race. The idea was "that we would not get surprised again,"
  • "In a few years, men will be able to communicate more effectively through a machine than face to face," they declared.
  • The few outsiders who knew of the box's existence couldn't even get its name right: it was an IMP, or "interface message processor"
  • It was already possible to link computers by telephone lines, but it was glacially slow, and every computer in the network had to be connected, by a dedicated line, to every other computer, which meant you couldn't connect more than a handful of machines without everything becoming monstrously complex and costly.
  • The solution, called "packet switching" – which owed its existence to the work of a British physicist, Donald Davies – involved breaking data down into blocks that could be routed around any part of the network that happened to be free, before getting reassembled at the other end.
  • Still, Kleinrock recalls a tangible sense of excitement that night as Kline sat down at the SDS Sigma 7 computer, connected to the IMP, and at the same time made telephone contact with his opposite number at Stanford. As his colleagues watched, he typed the letter L, to begin the word LOGIN.
  • One of the most intriguing things about the growth of the internet is this: to a select group of technological thinkers, the surprise wasn't how quickly it spread across the world, remaking business, culture and politics – but that it took so long to get off the ground.
  • In 1945, the American presidential science adviser, Vannevar Bush, was already imagining the "memex", a device in which "an individual stores all his books, records, and communications", which would be linked to each other by "a mesh of associative trails", like weblinks.
  • And in 1946, an astonishingly complete vision of the future appeared in the magazine Astounding Science Fiction. In a story entitled A Logic Named Joe, the author Murray Leinster envisioned a world in which every home was equipped with a tabletop box that he called a "logic":
  • Instead of smothering their research in the utmost secrecy – as you might expect of a cold war project aimed at winning a technological battle against Moscow – they made public every step of their thinking, in documents known as Requests For Comments.
  • Deliberately or not, they helped encourage a vibrant culture of hobbyists on the fringes of academia – students and rank amateurs who built their own electronic bulletin-board systems and eventually FidoNet, a network to connect them to each other.
  • n argument can be made that these unofficial tinkerings did as much to create the public internet as did the Arpanet. Well into the 90s, by the time the Arpanet had been replaced by NSFNet, a larger government-funded network,
  • It was the hobbyists, making unofficial connections into the main system, who first opened the internet up to allcomers.
  • This was the software known as TCP/IP, which made it possible for networks to connect to other networks, creating a "network of networks", capable of expanding virtually infinitely
  • Nevertheless, by July 1992, an Essex-born businessman named Cliff Stanford had opened Demon Internet, Britain's first commercial internet service provider.
  • After a year or so, Demon had between 2,000 and 3,000 users,
  • the @ symbol was introduced in 1971, and the first message, according to the programmer who sent it, Ray Tomlinson, was "something like QWERTYUIOP".
  • A couple of years later I got my first mobile phone, which came with two batteries: a very large one, for normal use, and an extremely large one, for those occasions on which you might actually want a few hours of power
  • For most of us, though, the web is in effect synonymous with the internet, even if we grasp that in technical terms that's inaccurate: the web is simply a system that sits on top of the internet, making it greatly easier to navigate the information there, and to use it as a medium of sharing and communication.
  • The first ever website was his own, at CERN: info.cern.ch.
  • The idea that a network of computers might enable a specific new way of thinking about information, instead of just allowing people to access the data on each other's terminals, had been around for as long as the idea of the network itself: it's there in Vannevar Bush's memex, and Murray Leinster's logics.
  • Web browsers crossed the border into mainstream use far more rapidly than had been the case with the internet itself: Mosaic launched in 1993 and Netscape followed soon after, though it was an embarrassingly long time before Microsoft realised the commercial necessity of getting involved at all. Amazon and eBay were online by 1995. And in 1998 came Google, offering a powerful new way to search the proliferating mass of information on the web.
  • Google, and others, saw that the key to the web's future would be helping users exclude almost everything on any given topic, restricting search results to the most relevant pages.
  • It is absurd – though also unavoidable here – to compact the whole of what happened from then onwards into a few sentences: the dotcom boom, the historically unprecedented dotcom bust, the growing "digital divide", and then the hugely significant flourishing, over the last seven years, of what became known as Web 2.0.
  • The most confounding thing of all is that in a few years' time, all this stupendous change will probably seem like not very much change at all.
  • Will you remember when the web was something you accessed primarily via a computer? Will you remember when there were places you couldn't get a wireless connection? Will you remember when "being on the web" was still a distinct concept, something that described only a part of your life, instead of permeating all of it? Will you remember Google?
Patricija Čelik

As 'Do Not Track' Effort Seems to Stall, Web Companies Race to Look Privacy-Friendly - ... - 0 views

  • Increasingly, Internet companies are pushing each other to prove to consumers that their data is safe and in their control.
  • “It’s not just privacy advocates and regulators pushing,” Mr. Lynch said. “Increasingly, people are concerned more about privacy as technology intersects their life.”
  • In some instances, established companies are trying to gain market advantage by casting themselves as more privacy-friendly than their rivals.
  • ...2 more annotations...
  • To some degree, these developments signal that the industry is working hard to stave off government regulation, which is moving at a glacial pace anyway. There seems to be no movement on broad privacy legislation on Capitol Hill, and no consensus has been reached on standards for “Do Not Track,” a browser setting that would let Internet users indicate that they did not want their activity tracked by marketers.
  • Whether Internet users are ready to pay to protect their personal data is unclear, though surveys have repeatedly pointed to consumer anxiety.
petra funtek

Why has the Internet changed so little? | openDemocracy - 1 views

  • Why has the Internet changed so little?
  • The Internet Age was meant to change everything - internationalism, commerce, journalism, government - all would be transformed, made equal and boundless by the click. It's time to admit this has simply failed to happen, and what is more interesting than the bad forecasting is the reason that they seemed so tempting in the first place.
  • More generally, the global medium of the internet would shrink the universe, promote dialogue between nations, and foster global understanding. In brief, the internet would be an unstoppable force: like the invention of print and gunpowder, it would change society permanently and irrevocably.
  • ...1 more annotation...
  • Internet-centrism, a belief that the internet is the alpha and omega of technologies, an agency that overrides all obstacles, and has the power to determine outcomes, lies at the heart of most of these prophecies.
petra funtek

After Leveson: the internet needs regulation to halt 'information terrorism' | Media | ... - 1 views

  • After Leveson: the internet needs regulation to halt 'information terrorism'
  • We are heading into a future of no regulation with the internet where its monoliths will have plenty of clout, pretty well unfettered by democratic national governments (but not totalitarian ones, like China).
  • How does information terrorism work?What's coming in the future could be far more deadly, involving widespread smears, character assassinations and the destruction of companies and maybe even institutions. And by then we may not have a vigorous press to hold it to account.
  • ...4 more annotations...
  • it is no longer reasonable for the big players - the Googles, Facebooks, YouTubes and Twitters - to say: "Nothing to do with us, guv, we only provide the pipes. What goes through them, that's up to the folk who put it there."
  • To illustrate an example of information misuse, it's worth recounting the alarming experience of a work colleague at the hands of Facebook. Someone he did not know took his name and set up a Facebook page purporting to be his, along with a photo and several intimate details, some true, some false.
  • Citing "freedom of expression", which like motherhood and apple pie is impossible to attack, they will host their anonymous contributors' bullying, lies, smears, breathtaking invasions of privacy
  • An entirely new information world is rising in which each of us can be readers and editors, contributors and subscribers, and maybe even proprietors, at the same time.
manca_

Make the unfiltered web illegal, says children's coalition | Technology | guardian.co.uk - 0 views

  • forced to filter the web
  • the government should legally compel ISPs to screen out images of child abuse and underage sex.
  • by blocking such material at source.
  • ...2 more annotations...
  • largely focuses on operating a notice-and-take-down system for illegal content hosted in the UK, including obscene or racially offensive material
  • peer-to-peer filesharing systems
1 - 20 of 32 Next ›
Showing 20 items per page