Verified Document

Liberation Vs. Control In Cyberspace Essay

Liberation vs. Control in Cyberspace Deibertt, Ronald & Rafal Rohozinski. "Liberation vs. control: The future of cyberspace."

Journal of Democracy, 21.4 (2010): 43-56

The Internet is a paradox. On one hand, You Tube and Twitter have been widely credited with creating a more open and liberated world, and giving rise to the Arab Spring and other global pro-democracy movements. Yet while the Internet facilitates communication, it also allows for a greater degree of control of ideas through surveillance. "Even in democratic countries, surveillance systems penetrate every aspect of life, as people implicitly (and perhaps unwittingly) consent to the greatest invasion of personal privacy in history" (Deibertt & Rohozinski 2010: 44). What is unique about the Internet is the degree to which people are complicit in sharing information, enabling themselves to be observed, not its 'liberated' aspects: users are completely unaware of the degree to which they are laying their lives bare for all to see, including governments and other organizations that do not have their best interests at heart [THESIS].

Liberation: From what and for whom?

The Internet has made it easier for 'hate groups' to connect and engage in nefarious online and off-line activities. It has made it far easier for cyber-criminals to harvest unwitting user's information. Users are unaware of this the extent to which they expose potentially sensitive information on Facebook and other sites which encourage the personal sharing of data between users.

Enclosing the commons: Next-generation controls

"Whereas it was once considered impossible for governments to control cyberspace, there are now a wide variety of technical and nontechnical means at their disposal to shape and limit the online flow of information" (Deibert & Rohozinski 2010: 55).
Legal measures

There is also a rise in the drive to use capitalism as a defense to regulate the Internet. "At the most basic level, government interventions in cyberspace have come through the introduction of slander, libel, copyright-infringement, and other laws to restrict communications and online activities" (Deibert & Rohozinski 2010: 50). While some of these lawsuits may be necessary, the over-use of copyright protections can stifle smaller entities that do not have the means to defend themselves in the legal system against frivolous lawsuits. They can also be used by governments as a legitimized technique of censorship.

Informal requests

Governments can also use semi-coercive means or veiled threats to obtain information from private companies about users. "Authorities can make informal 'requests' of private companies" (Deibert & Rohozinski 2010: 51). Corporations may volunteer information simply because it is easier to do so -- after all it is not their information that is at stake, and the government may treat them better if they do so, yet their clients…

Sources used in this document:
Groups that have good intentions are often unaware of that websites can be used to propagate social malware attacks, and have few controls to prevent such abuses. "The advocacy group Reporters Without Borders unknowingly propagated a link to a malicious website posing as a Facebook petition to release the Tibetan activist Dhondup Wangchen" (Deibert & Rohozinski 2010: 54). Using the screen of a reputable group or even a government website can be a convenient screen for a hacker.

A nuanced understanding

The Internet is not inherently good or bad nor is it essentially 'free' by its very nature. Those who would behave in a coercive manner, whether criminals, governments, or corporations, can use the Internet just as easily to engage in surveillance and stifle freedom as it is for advocates of democracy to use it as a vehicle for liberation. The Internet is much more highly regulated than would appear on the surface, and one of its great dangers, in contrast to other forms of speech, is that users are not always aware of how and if they are being controlled, and by whom (Deibert & Rohozinski 2010: 56).
Cite this Document:
Copy Bibliography Citation

Related Documents

Anthropological Exploration of the Zapatistas of Chiapas Mexico
Words: 1828 Length: 6 Document Type: Book Report

Anthropological Exploration of the Zapatistas of Chiapas, Mexico Zapatista Army of National Liberation coded EZLN is a Mexican organization. The organization takes its name from their leader, Emiliano Zapata. The organization has a formidable influence on the southern region of Mexico. It follows that this liberation movement was essential in fighting for the rights of poor Mexican farmers. The Army came into operation on the November 17, 1983. The leader of

Technologies, Modern Media Has the Ability to
Words: 879 Length: 3 Document Type: Term Paper

technologies, modern media has the ability to absorb and become influenced by cultures from all around the world. The media of the eastern world, such as in Saudi Arabia and Nigerian have been influenced by the west, particularly the United States of America. Marwan Kraidy's (2009) "Reality Television, Gender, and Authenticity in Saudi Arabia" and Brian Larkin's (2004) "Degraded Images, Distorted Sounds: Nigerian Video and the Infrastructure of Piracy"

Information Technology Summary and Critique
Words: 975 Length: 3 Document Type: Term Paper

End Notes 1) Given the recent tardy but well-meaning responses by the federal, state and local officials in the Gulf Coast, it can be assumed that the nation remains relatively unprepared for a terrorist attack of September 11-proportions. The U.S. is struggling to negotiate a nuclear arms treaty with Iran and North Korea (the latter having recently agreed to forego additional nuclear weapons testing in exchange for light-water nuclear reactors, a

Freedom and Terrorism Online
Words: 3136 Length: 10 Document Type: Research Paper

policy makers underestimate internet independence? YouTube independence of positing video content The internet moderated terrorism Regulating the internet for anti-terrorism Freedom and Terrorism on the Internet The purpose of the study is to explore the use of internet by terrorist organizations and the degree of independence that terrorist enjoy while conducting and coordinating their terrorism activities from the cyberspace. The topic is an area of interest for the researcher as it is significantly relevant

Cyber-Citizen, USA Cyber-Citizen USA the
Words: 5130 Length: 20 Document Type: Research Paper

The fact that industrial control systems may be vulnerable to infiltration by other citizens, or international parties puts laws pertaining to intersection of systems transmission at the forefront of priorities for us all. At present, telecommunications interference of private citizens holds an up to a five-year prison sentence by U.S. federal law. How cyberterrorism is addressed, when the stakes are heightened, leaves a whole host of opportunities for citizens, and

Security Information Is the Power. The Importance
Words: 5012 Length: 15 Document Type: Term Paper

Security Information is the Power. The importance of collecting, storing, processing and communicating the relevant information presently is viewed as crucial in order to achieve success in almost all the fields be it business firms, individuals or organizations. An integrated set of components assisting collection, store, process and communication of information is termed as information system. Increasing dependence on information systems is noticed in order to excel in the respective fields

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now