Liberation vs. Control in Cyberspace
Deibertt, Ronald & Rafal Rohozinski. "Liberation vs. control: The future of cyberspace."
Journal of Democracy, 21.4 (2010): 43-56
The Internet is a paradox. On one hand, You Tube and Twitter have been widely credited with creating a more open and liberated world, and giving rise to the Arab Spring and other global pro-democracy movements. Yet while the Internet facilitates communication, it also allows for a greater degree of control of ideas through surveillance. "Even in democratic countries, surveillance systems penetrate every aspect of life, as people implicitly (and perhaps unwittingly) consent to the greatest invasion of personal privacy in history" (Deibertt & Rohozinski 2010: 44). What is unique about the Internet is the degree to which people are complicit in sharing information, enabling themselves to be observed, not its 'liberated' aspects: users are completely unaware of the degree to which they are laying their lives bare for all to see, including governments and other organizations that do not have their best interests at heart [THESIS].
Liberation: From what and for whom?
The Internet has made it easier for 'hate groups' to connect and engage in nefarious online and off-line activities. It has made it far easier for cyber-criminals to harvest unwitting user's information. Users are unaware of this the extent to which they expose potentially sensitive information on Facebook and other sites which encourage the personal sharing of data between users.
Enclosing the commons: Next-generation controls
Legal measures
There is also a rise in the drive to use capitalism as a defense to regulate the Internet. "At the most basic level, government interventions in cyberspace have come through the introduction of slander, libel, copyright-infringement, and other laws to restrict communications and online activities" (Deibert & Rohozinski 2010: 50). While some of these lawsuits may be necessary, the over-use of copyright protections can stifle smaller entities that do not have the means to defend themselves in the legal system against frivolous lawsuits. They can also be used by governments as a legitimized technique of censorship.
Informal requests
Governments can also use semi-coercive means or veiled threats to obtain information from private companies about users. "Authorities can make informal 'requests' of private companies" (Deibert & Rohozinski 2010: 51). Corporations may volunteer information simply because it is easier to do so -- after all it is not their information that is at stake, and the government may treat them better if they do so, yet their clients…
Anthropological Exploration of the Zapatistas of Chiapas, Mexico Zapatista Army of National Liberation coded EZLN is a Mexican organization. The organization takes its name from their leader, Emiliano Zapata. The organization has a formidable influence on the southern region of Mexico. It follows that this liberation movement was essential in fighting for the rights of poor Mexican farmers. The Army came into operation on the November 17, 1983. The leader of
technologies, modern media has the ability to absorb and become influenced by cultures from all around the world. The media of the eastern world, such as in Saudi Arabia and Nigerian have been influenced by the west, particularly the United States of America. Marwan Kraidy's (2009) "Reality Television, Gender, and Authenticity in Saudi Arabia" and Brian Larkin's (2004) "Degraded Images, Distorted Sounds: Nigerian Video and the Infrastructure of Piracy"
End Notes 1) Given the recent tardy but well-meaning responses by the federal, state and local officials in the Gulf Coast, it can be assumed that the nation remains relatively unprepared for a terrorist attack of September 11-proportions. The U.S. is struggling to negotiate a nuclear arms treaty with Iran and North Korea (the latter having recently agreed to forego additional nuclear weapons testing in exchange for light-water nuclear reactors, a
policy makers underestimate internet independence? YouTube independence of positing video content The internet moderated terrorism Regulating the internet for anti-terrorism Freedom and Terrorism on the Internet The purpose of the study is to explore the use of internet by terrorist organizations and the degree of independence that terrorist enjoy while conducting and coordinating their terrorism activities from the cyberspace. The topic is an area of interest for the researcher as it is significantly relevant
The fact that industrial control systems may be vulnerable to infiltration by other citizens, or international parties puts laws pertaining to intersection of systems transmission at the forefront of priorities for us all. At present, telecommunications interference of private citizens holds an up to a five-year prison sentence by U.S. federal law. How cyberterrorism is addressed, when the stakes are heightened, leaves a whole host of opportunities for citizens, and
Security Information is the Power. The importance of collecting, storing, processing and communicating the relevant information presently is viewed as crucial in order to achieve success in almost all the fields be it business firms, individuals or organizations. An integrated set of components assisting collection, store, process and communication of information is termed as information system. Increasing dependence on information systems is noticed in order to excel in the respective fields
Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.
Get Started Now