1 / 9

Internet Governance

Internet Governance. Karen Vasquez Kim Nelson Layne Wesley Pollard Vincent Chow. Image from http://www.indymedia.ie/article/72984. What is Internet Governance?. It was six men of Indostan To learning much inclined, Who went to see the Elephant (Though all of them were blind), ………………….

darin
Download Presentation

Internet Governance

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Internet Governance Karen Vasquez Kim Nelson Layne Wesley Pollard Vincent Chow Image from http://www.indymedia.ie/article/72984

  2. What is Internet Governance? It was six men of Indostan To learning much inclined, Who went to see the Elephant (Though all of them were blind), …………………. And so these men of Indostan Disputed loud and long, Each in his own opinion Exceeding stiff and strong, Though each was partly in the right, And all were in the wrong! Excerpt from the poem “The Blide Men and the Elephant” written by American poet John God- frey Saxe (1816-1887)

  3. stub Our Definition

  4. The Many Facets Of Internet Governance

  5. Content Policy - Human rights (freedom of expression and right to communicate), government (content control), and technology (tools for content control) Issues in a Socio-Cultural Context

  6. Why Bother? • There are issues that we as a society generally agree needs to be controlled. • Child pornography • Justification of genocide • Acts prohibited by international law (ius cogens) Example: Incitement or organisation of terrorist acts • While a consensus about the need to remove this content from the Net has been established, different interpretations remain. For example, what exactly constitutes terrorism-support acts?

  7. Public (Governmental) Filtering of Content. The common element for governmental filtering is an “Internet Index” of websites blocked for access by citizens. If a website is in the “Internet Index,” access will not be granted. Technically speaking, the filtering typically utilises router-based IP blocking, proxy servers, and DNS redi- rection. Filtering of content is carried out in many countries. In addition to countries usually associated with such practices (China, Saudi Arabia, and Singapore) other countries increasingly practice it. For example, Australia has a filtering system for specific national pages. The state of North-Rhine-Westphalia requested ISPs to filter access to mainly, but not solely, neo-Nazi sites. Presently there is a lawsuit against the NSA eavesdropping on Internet Traffic

  8. The second group consists of content that might be sensitive for particu- lar countries, regions, or ethnic groups due to their particular religious and cultural values. Globalised and more intensive communication chal- 4 Internet Governance lenges local cultural and religious values. Most Internet court cases are related to this group of content. In the Yahoo! Case, a French court re- quested Yahoo.com (USA) to prohibit French citizens from accessing parts of a website selling Nazi materials and memorabilia. Germany has very developed jurisprudence, with many court cases against owners of websites hosting Nazi materials. Most content control in Middle Eastern and Asian countries is officially justified as the protection of specific cultural values. This usually includes blocking access to pornographic and gambling websites.

  9. The third group consists of politically and ideologically sensitive content. In essence, this involves Internet censorship. Transparency Internation- al has reported a number of such practices in China, Burma, and Saudi Arabia.

More Related