SlideShare ist ein Scribd-Unternehmen logo
1 von 15
Freedom of Access to Information Historical Context Totalitarian States censor at production point, Capitalism censors at distribution point. Censorship & the Apartheid State State gets to decide what you can and cannot read, knowledge is something mediated via security apparatus, not civil society (academia, press, etc)
The IBM Case ,[object Object],[object Object],[object Object],[object Object]
Information wants to be Free ,[object Object],[object Object]
[object Object],Information wants to be Open Source
South Africa's Information Age Constitution ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Privacy ,[object Object],[object Object],[object Object],[object Object],[object Object]
Net Neutrality ,[object Object]
Net Neutrality in Africa ,[object Object],[object Object],[object Object],[object Object],[object Object]
Wikileaks ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Egyptian Revolution ,[object Object],[object Object],[object Object],[object Object]
Privacy under threat ,[object Object],[object Object],[object Object]
The Gigaba Plan ,[object Object],Let's RICA the Internet and build a National firewall like China.
The Blackberry Furore ,[object Object],[object Object]
SA Information Bill ,[object Object],[object Object],[object Object],[object Object]
Low-tech Access solutions ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]

Weitere ähnliche Inhalte

Was ist angesagt?

Know Your Rights On #Internet
Know Your Rights On #InternetKnow Your Rights On #Internet
Know Your Rights On #InternetHayder Hamzoz
 
Karen Cook: Technology Outspacing Constitution
Karen Cook: Technology Outspacing ConstitutionKaren Cook: Technology Outspacing Constitution
Karen Cook: Technology Outspacing Constitutionmerlyna
 
Americanizing Palestine Through Internet
Americanizing Palestine Through InternetAmericanizing Palestine Through Internet
Americanizing Palestine Through InternetYeungnam University
 
Internet censorship by ronak
Internet censorship by ronakInternet censorship by ronak
Internet censorship by ronakRonak Karanpuria
 
Open internet in singapore
Open internet in singaporeOpen internet in singapore
Open internet in singaporeBenjamin Ang
 
Internet Censorship across the World
Internet Censorship across the WorldInternet Censorship across the World
Internet Censorship across the WorldNitine
 
Freedom or Control in Virtual Worlds
Freedom or Control in Virtual WorldsFreedom or Control in Virtual Worlds
Freedom or Control in Virtual WorldsJyrki Kasvi
 
G&P - Chapter 10 - Info & Tech
G&P - Chapter 10 - Info & TechG&P - Chapter 10 - Info & Tech
G&P - Chapter 10 - Info & Techcyruskarimian
 
Research on Digital Security Act 2018
Research on Digital Security Act 2018Research on Digital Security Act 2018
Research on Digital Security Act 2018Nilima Tariq
 
Digital security law security of individual or government
Digital security law security of individual or governmentDigital security law security of individual or government
Digital security law security of individual or governmentM S Siddiqui
 
Artificial intelligence governance in the Obama & Trump years
Artificial intelligence governance in the Obama & Trump yearsArtificial intelligence governance in the Obama & Trump years
Artificial intelligence governance in the Obama & Trump yearsAdam Thierer
 
Cyber security and prevention in Bangladesh
Cyber security and prevention in BangladeshCyber security and prevention in Bangladesh
Cyber security and prevention in BangladeshRabita Rejwana
 
Internet privacy and laws
Internet privacy and lawsInternet privacy and laws
Internet privacy and lawsjcmonnett
 
Open Data, Open Government
Open Data, Open GovernmentOpen Data, Open Government
Open Data, Open GovernmentMsifry
 
Freedom of expression
Freedom of expressionFreedom of expression
Freedom of expressionGerwin Ocsena
 
Internetregulationjapan
InternetregulationjapanInternetregulationjapan
Internetregulationjapanrmackinnon
 

Was ist angesagt? (20)

Know Your Rights On #Internet
Know Your Rights On #InternetKnow Your Rights On #Internet
Know Your Rights On #Internet
 
Karen Cook: Technology Outspacing Constitution
Karen Cook: Technology Outspacing ConstitutionKaren Cook: Technology Outspacing Constitution
Karen Cook: Technology Outspacing Constitution
 
Americanizing Palestine Through Internet
Americanizing Palestine Through InternetAmericanizing Palestine Through Internet
Americanizing Palestine Through Internet
 
Communications
CommunicationsCommunications
Communications
 
Internet censorship by ronak
Internet censorship by ronakInternet censorship by ronak
Internet censorship by ronak
 
Open internet in singapore
Open internet in singaporeOpen internet in singapore
Open internet in singapore
 
After 9 11
After 9 11After 9 11
After 9 11
 
Internet Censorship across the World
Internet Censorship across the WorldInternet Censorship across the World
Internet Censorship across the World
 
Freedom or Control in Virtual Worlds
Freedom or Control in Virtual WorldsFreedom or Control in Virtual Worlds
Freedom or Control in Virtual Worlds
 
G&P - Chapter 10 - Info & Tech
G&P - Chapter 10 - Info & TechG&P - Chapter 10 - Info & Tech
G&P - Chapter 10 - Info & Tech
 
Research on Digital Security Act 2018
Research on Digital Security Act 2018Research on Digital Security Act 2018
Research on Digital Security Act 2018
 
e-G8 Summary
e-G8 Summarye-G8 Summary
e-G8 Summary
 
Digital security law security of individual or government
Digital security law security of individual or governmentDigital security law security of individual or government
Digital security law security of individual or government
 
Artificial intelligence governance in the Obama & Trump years
Artificial intelligence governance in the Obama & Trump yearsArtificial intelligence governance in the Obama & Trump years
Artificial intelligence governance in the Obama & Trump years
 
Cyber security and prevention in Bangladesh
Cyber security and prevention in BangladeshCyber security and prevention in Bangladesh
Cyber security and prevention in Bangladesh
 
Internet privacy and laws
Internet privacy and lawsInternet privacy and laws
Internet privacy and laws
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Open Data, Open Government
Open Data, Open GovernmentOpen Data, Open Government
Open Data, Open Government
 
Freedom of expression
Freedom of expressionFreedom of expression
Freedom of expression
 
Internetregulationjapan
InternetregulationjapanInternetregulationjapan
Internetregulationjapan
 

Andere mochten auch

Программа для матери и ребенка спа-центра Quatre Terres
Программа для матери и ребенка спа-центра Quatre TerresПрограмма для матери и ребенка спа-центра Quatre Terres
Программа для матери и ребенка спа-центра Quatre TerresSergey Manvelov
 
Econemp 2-140305160859-phpapp02
Econemp 2-140305160859-phpapp02Econemp 2-140305160859-phpapp02
Econemp 2-140305160859-phpapp02jose bravo
 
Educational Project for Loreto
Educational Project for LoretoEducational Project for Loreto
Educational Project for LoretoJose Luis Tapia
 
2 класс. урок № 3. привет. в зоопарке
2 класс. урок № 3. привет. в зоопарке2 класс. урок № 3. привет. в зоопарке
2 класс. урок № 3. привет. в зоопаркеshpinat
 
Qa chapter 02
Qa chapter 02Qa chapter 02
Qa chapter 02Ann Lunde
 
Foliar Nutrient Resorption and Litterfall Production With Stand Age, Overstor...
Foliar Nutrient Resorption and Litterfall Production With Stand Age, Overstor...Foliar Nutrient Resorption and Litterfall Production With Stand Age, Overstor...
Foliar Nutrient Resorption and Litterfall Production With Stand Age, Overstor...Amber Brant
 
2 класс. обощающий урок по разделу привет. повторение
2 класс. обощающий урок по разделу привет. повторение2 класс. обощающий урок по разделу привет. повторение
2 класс. обощающий урок по разделу привет. повторениеshpinat
 
Empreendendo na Ilha do Silício
Empreendendo na Ilha do SilícioEmpreendendo na Ilha do Silício
Empreendendo na Ilha do SilícioBruno Ghisi
 
презентация японских продуктов
презентация японских продуктовпрезентация японских продуктов
презентация японских продуктовAndreykireenkov
 
Research present
Research presentResearch present
Research presentNicole D.
 
Automatic liquid level control of tank system
Automatic liquid level control of tank systemAutomatic liquid level control of tank system
Automatic liquid level control of tank systemFatahillah Ata
 

Andere mochten auch (20)

Sirs
SirsSirs
Sirs
 
Copyright info
Copyright infoCopyright info
Copyright info
 
Программа для матери и ребенка спа-центра Quatre Terres
Программа для матери и ребенка спа-центра Quatre TerresПрограмма для матери и ребенка спа-центра Quatre Terres
Программа для матери и ребенка спа-центра Quatre Terres
 
Perspective lesson 1zoom
Perspective lesson 1zoomPerspective lesson 1zoom
Perspective lesson 1zoom
 
Econemp 2-140305160859-phpapp02
Econemp 2-140305160859-phpapp02Econemp 2-140305160859-phpapp02
Econemp 2-140305160859-phpapp02
 
Educational Project for Loreto
Educational Project for LoretoEducational Project for Loreto
Educational Project for Loreto
 
2 класс. урок № 3. привет. в зоопарке
2 класс. урок № 3. привет. в зоопарке2 класс. урок № 3. привет. в зоопарке
2 класс. урок № 3. привет. в зоопарке
 
Qa chapter 02
Qa chapter 02Qa chapter 02
Qa chapter 02
 
Foliar Nutrient Resorption and Litterfall Production With Stand Age, Overstor...
Foliar Nutrient Resorption and Litterfall Production With Stand Age, Overstor...Foliar Nutrient Resorption and Litterfall Production With Stand Age, Overstor...
Foliar Nutrient Resorption and Litterfall Production With Stand Age, Overstor...
 
2 класс. обощающий урок по разделу привет. повторение
2 класс. обощающий урок по разделу привет. повторение2 класс. обощающий урок по разделу привет. повторение
2 класс. обощающий урок по разделу привет. повторение
 
Empreendendo na Ilha do Silício
Empreendendo na Ilha do SilícioEmpreendendo na Ilha do Silício
Empreendendo na Ilha do Silício
 
презентация японских продуктов
презентация японских продуктовпрезентация японских продуктов
презентация японских продуктов
 
Northern lights college
Northern lights collegeNorthern lights college
Northern lights college
 
Abstract
AbstractAbstract
Abstract
 
Research present
Research presentResearch present
Research present
 
Algonquin college
Algonquin collegeAlgonquin college
Algonquin college
 
Customer service february 2012
Customer service february  2012Customer service february  2012
Customer service february 2012
 
The How To of Crisis Communications
The How To of Crisis CommunicationsThe How To of Crisis Communications
The How To of Crisis Communications
 
urbanisation
urbanisationurbanisation
urbanisation
 
Automatic liquid level control of tank system
Automatic liquid level control of tank systemAutomatic liquid level control of tank system
Automatic liquid level control of tank system
 

Ähnlich wie #DCI11 Access to Information

DCB1309 - F2_Dark_Net
DCB1309 - F2_Dark_NetDCB1309 - F2_Dark_Net
DCB1309 - F2_Dark_NetPaul Elliott
 
PRIVACY RIGHTS ARE HUMAN RIGHTS (2).pdf
PRIVACY RIGHTS ARE HUMAN RIGHTS (2).pdfPRIVACY RIGHTS ARE HUMAN RIGHTS (2).pdf
PRIVACY RIGHTS ARE HUMAN RIGHTS (2).pdflinda gichohi
 
Digital Repression and Techno-Authoritarianism
Digital Repression and Techno-AuthoritarianismDigital Repression and Techno-Authoritarianism
Digital Repression and Techno-AuthoritarianismCharles Mok
 
Privacy reconsidered
Privacy reconsideredPrivacy reconsidered
Privacy reconsideredBrian Rowe
 
2600 v19 n4 (winter 2002)
2600 v19 n4 (winter 2002)2600 v19 n4 (winter 2002)
2600 v19 n4 (winter 2002)Felipe Prado
 
Cyberterrorism can be in the form of Information attacks which a.docx
Cyberterrorism can be in the form of Information attacks which a.docxCyberterrorism can be in the form of Information attacks which a.docx
Cyberterrorism can be in the form of Information attacks which a.docxwhittemorelucilla
 
Computer Fraud And Abuse Act Of 1986 (CFA)
Computer Fraud And Abuse Act Of 1986 (CFA)Computer Fraud And Abuse Act Of 1986 (CFA)
Computer Fraud And Abuse Act Of 1986 (CFA)Kim Moore
 
Technology evolves so fast
Technology evolves so fast Technology evolves so fast
Technology evolves so fast Jyrki Kasvi
 

Ähnlich wie #DCI11 Access to Information (13)

DCB1309 - F2_Dark_Net
DCB1309 - F2_Dark_NetDCB1309 - F2_Dark_Net
DCB1309 - F2_Dark_Net
 
PRIVACY RIGHTS ARE HUMAN RIGHTS (2).pdf
PRIVACY RIGHTS ARE HUMAN RIGHTS (2).pdfPRIVACY RIGHTS ARE HUMAN RIGHTS (2).pdf
PRIVACY RIGHTS ARE HUMAN RIGHTS (2).pdf
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Digital Repression and Techno-Authoritarianism
Digital Repression and Techno-AuthoritarianismDigital Repression and Techno-Authoritarianism
Digital Repression and Techno-Authoritarianism
 
Cyber Crime Essay
Cyber Crime EssayCyber Crime Essay
Cyber Crime Essay
 
Privacy reconsidered
Privacy reconsideredPrivacy reconsidered
Privacy reconsidered
 
2600 v19 n4 (winter 2002)
2600 v19 n4 (winter 2002)2600 v19 n4 (winter 2002)
2600 v19 n4 (winter 2002)
 
Cyberterrorism can be in the form of Information attacks which a.docx
Cyberterrorism can be in the form of Information attacks which a.docxCyberterrorism can be in the form of Information attacks which a.docx
Cyberterrorism can be in the form of Information attacks which a.docx
 
Internet Privacy Essay
Internet Privacy EssayInternet Privacy Essay
Internet Privacy Essay
 
Essay Cyber Crime
Essay Cyber CrimeEssay Cyber Crime
Essay Cyber Crime
 
Digital Surveillance
Digital SurveillanceDigital Surveillance
Digital Surveillance
 
Computer Fraud And Abuse Act Of 1986 (CFA)
Computer Fraud And Abuse Act Of 1986 (CFA)Computer Fraud And Abuse Act Of 1986 (CFA)
Computer Fraud And Abuse Act Of 1986 (CFA)
 
Technology evolves so fast
Technology evolves so fast Technology evolves so fast
Technology evolves so fast
 

Kürzlich hochgeladen

The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 

Kürzlich hochgeladen (20)

The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 

#DCI11 Access to Information

  • 1. Freedom of Access to Information Historical Context Totalitarian States censor at production point, Capitalism censors at distribution point. Censorship & the Apartheid State State gets to decide what you can and cannot read, knowledge is something mediated via security apparatus, not civil society (academia, press, etc)
  • 2.
  • 3.
  • 4.
  • 5.
  • 6.
  • 7.
  • 8.
  • 9.
  • 10.
  • 11.
  • 12.
  • 13.
  • 14.
  • 15.