Open AccessBook
Access Controlled: The Shaping of Power, Rights, and Rule in Cyberspace
Reads0
Chats0
TLDR
Access Controlled offers six substantial chapters that analyze Internet control in both Western and Eastern Europe and a section of shorter regional reports and country profiles drawn from material gathered by the ONI around the world through a combination of technical interrogation and field research methods.Abstract:
Internet filtering, censorship of Web content, and online surveillance are increasing in scale, scope, and sophistication around the world, in democratic countries as well as in authoritarian states. The first generation of Internet controls consisted largely of building firewalls at key Internet gateways; China's famous "Great Firewall of China" is one of the first national Internet filtering systems. Today the new tools for Internet controls that are emerging go beyond mere denial of information. These new techniques, which aim to normalize (or even legalize) Internet control, include targeted viruses and the strategically timed deployment of distributed denial-of-service (DDoS) attacks, surveillance at key points of the Internet's infrastructure, take-down notices, stringent terms of usage policies, and national information shaping strategies. Access Controlled reports on this new normative terrain. The book, a project from the OpenNet Initiative (ONI), a collaboration of the Citizen Lab at the University of Toronto's Munk Centre for International Studies, Harvard's Berkman Center for Internet and Society, and the SecDev Group, offers six substantial chapters that analyze Internet control in both Western and Eastern Europe and a section of shorter regional reports and country profiles drawn from material gathered by the ONI around the world through a combination of technical interrogation and field research methods. Chapter authors: Ronald Deibert, Colin Maclay, John Palfrey, Hal Roberts, Rafal Rohozinski, Nart Villeneuve, Ethan Zuckerman Information Revolution and Global Politics seriesread more
Citations
More filters
Journal ArticleDOI
The Consequences of the Internet for Politics
TL;DR: The most promising way to study the Internet is to look at the role that causal mechanisms such as the lowering of transaction costs, homophilous sorting, and preference falsification play in intermediating between specific aspects of the Internet and political outcomes as mentioned in this paper.
Journal ArticleDOI
Theorizing the Image for Security Studies: Visual Securitization and the Muhammad Cartoon Crisis
TL;DR: In this article, the authors provide a framework for the study of visual securitization, that is, when images constitute something or someone as threatened and in need of immediate defense.
Journal ArticleDOI
China's "Networked Authoritarianism"
TL;DR: The emergence of Chinese "networked authoritarianism" highlights difficult issues of policy and corporate responsibility that must be resolved in order to ensure that the Internet and mobile technologies can fulfill their potential to support liberation and empowerment as mentioned in this paper.
Journal Article
The Victorian Internet: The Remarkable Story of the Telegraph and the Nineteenth Century's On-Line Pioneers
Journal ArticleDOI
Corrupting the Cyber-Commons: Social Media as a Tool of Autocratic Stability
TL;DR: In this article, the authors lay out four mechanisms that link social media co-optation to autocratic resilience: counter-mobilization, discourse framing, preference divulgence, and elite coordination.
References
More filters
Book
Born Digital: Understanding the First Generation of Digital Natives
John Palfrey,Urs Gasser +1 more
TL;DR: In Born Digital, leading Internet and technology experts John Palfrey and Urs Gasser offer a sociological portrait of these young people, who can seem, even to those merely a generation older, both extraordinarily sophisticated and strangely narrow as discussed by the authors.
Book
Surveillance Society: Monitoring Everyday Life
TL;DR: In this article, the authors discuss the spread of surveillance in the city, body parts and probes, invisible frameworks, and leaky containers in the world, and the future of surveillance.
Journal Article