SlideShare ist ein Scribd-Unternehmen logo
1 von 28
Internet Content Regulation: What it means in 2010 Illustration by John Ritter, The Atlantic Monthly Wendy Qi Digital Markets Course -Professor Suzanne Scotchmer © 2010 - Free use with attribution
Defining Internet Content Regulation Overview  |  Regulatory Objectives  |  Regulatory Methods  |  Case Studies  |  Impacts “ Internet content regulation ” will be defined as any sort of widespread content restriction or monitoring as mandated, either explicitly or otherwise, by government or regulatory bodies
The Internet: From a Regulatory Perspective Overview  |  Regulatory Objectives  |  Regulatory Methods  |  Case Studies  |  Impacts 1958 …  1995    1998  2000   2002  2004  2006  2008  2009 2010 Introduction of first popularized Web browser, Netscape Internet censorship laws introduced in Victoria, Western AU and New Territory; US introduces and retains Communication Decency Act (CDA)  Google threatens to withdraw from China following major cyber-attack  Yahoo! IPOs for $33.8 million at $13 per share Australian Commonwealth Parliament passes Internet censorship bill Google popularizes search engine methodology Iranian election controversy launches first “Twitter-revolution” Yahoo! enters China market; 2.1 million internet users in China in Jan. 1999  Introduction of Napster and commercial digital content management Poland to institute Internet censorship bill French court issues landmark ruling ordering Yahoo to pull Nazi auction pages from France Yahoo! signs  Public Pledge on Self-Discipline for the Chinese Internet Industry Google.cn launches in China Introduction and strike-down of the “Green Dam Youth Project” Ayatollah Montarezi publishes memoir online criticizing ideological foundations of the Islamic state ( Dec. 2000) Iranian judiciary chief calls for establishment of special committee for internet-related crimes France passes security bill known as LOPPSI2 (includes state sanctioned computer Trojans) Finland makes plans to become first 100% free cyber-”paradise” Cyril Houri introduces geographical targeting Internet content technology Internet begins as a US project for ARPA/DARPA to link radar systems Dot-com bubble
Which countries regulate Internet content? Overview   |  Regulatory Objectives  |  Regulatory Methods  |  Case Studies  |  Impacts ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],According to RWB’s definition, ~60 countries experienced some sort of Web censorship in 2009, up from 30 in 2008.
Which countries regulate Internet content? Overview   |  Regulatory Objectives  |  Regulatory Methods  |  Case Studies  |  Impacts Legend Reporters without Borders, August 2009 Unknown No censorship Some censorship Under surveillance Heavy surveillance
Why regulate the Internet? Overview  |  Regulatory Objectives   |  Regulatory Methods  |  Case Studies  |  Impacts Social Values Political objectives Economic incentives
How is the Internet regulated? Overview  |  Regulatory Objectives  |  Regulatory Methods   |  Case Studies  |  Impacts Four Primary Modes - Lawrence Lessig “ West Coast Code”: Primarily technical means of regulating data Norms Law Markets Architecture Offline social norms translate into online scenarios Creates virtual marketplace of information; offline laws of supply and demand reflected online “ East Coast Code” Offline legal terms apply to online situations
How is the Internet regulated? Overview  |  Regulatory Objectives  |  Regulatory Methods   |  Case Studies  |  Impacts Technical (architecture) Manual Self censorship (policy) Corporate (law & policy) IP blocks Routers “ Natural” barriers Language Socioeconomic class  Hardware blocks (e.g., change in WiFi codes) Hired human filters Volunteer forces - stay-at-home mome Reducing/eliminating anonymity
Where can the Internet be regulated technically? Overview  |  Regulatory Objectives  |  Regulatory Methods   |  Case Studies  |  Impacts Home or individual computer level filtering can be achieved through the installation of filtering software that restricts an individual computer’s ability to access certain sites. Individual computers Filtering of institutional level networks using technical blocking and/or induced self-censorship occurs in companies, government organizations, schools and cybercafés.  Institutions Government-mandated filtering is most commonly implemented by Internet Service Providers (ISPs) using methods such as search result removals, take-downs, or technical blocking.   Internet service providers (ISPs) State-directed implementation of national content filtering schemes and blocking technologies affecting Internet access across entire backbone -- often done at “international gateway” Internet backbone
Where can the Internet be regulated technically? Overview  |  Regulatory Objectives  |  Regulatory Methods   |  Case Studies  |  Impacts An example - Internet backbone Search done on Google.cn “ According to certain local laws, regulations, and policies, certain results of this search have been restricted.”
Overview  |  Regulatory Objectives  |  Regulatory Methods   |  Case Studies  |  Impacts
Overview  |  Regulatory Objectives  |  Regulatory Methods   |  Case Studies  |  Impacts
Case Study | China Overview  |  Regulatory Objectives  |  Regulatory Methods  |  Case Studies   |  Impacts Credit: Associated Press Population:  ~1.34 billion (June 2009 est.) Users Online:  384 million (29% of total population) - over 90% have broadband access Level of online regulation:  Very high   Chinese government request cooperation of corporations such as Yahoo and Google as part of doing business in China High/Pervasive Corporate Uses selected, publicized arrests as a means of deterring potential offenders High/Pervasive - Moderate Self-censorship Human censors will regularly comb forums and blogs to eliminate any offensive material High/Pervasive Manual Sophisticated filters used to block potentially offensive sites be re-routing IP addresses; “Green Dam Youth Project”  High/Pervasive Technical Articles critical of Chinese government published only in English/French; publications allowed only for certain socioeconomic groups Moderate “ Natural” barriers Examples Degree of use Regulation Filter Type
Case Study | China Overview  |  Regulatory Objectives  |  Regulatory Methods  |  Case Studies   |  Impacts Credit: Associated Press Population:  ~1.34 billion (June 2009 est.) Users Online:  384 million (29% of total population) - over 90% have broadband access Level of online regulation:  Very high   ,[object Object],[object Object],[object Object],[object Object],[object Object],WHY IT MATTERS “ The question is no longer how the Internet will affect China. It is how China will affect the Internet.” - Professor Peter Yu, Drake University Law School
Case Study | Iran Overview  |  Regulatory Objectives  |  Regulatory Methods  |  Case Studies   |  Impacts Credit: Wikipedia Population:  66,429,284 (July 2009 est.) Users Online:  32,200,000 (48.5% of total population) Level of online regulation:  Very high   Incidents where companies that sell mobile infrastructure network must also share how to monitor content (ex: Nokia) Moderate Corporate Revolutionary Guard and arrests deter certain online behaviors High/pervasive Self-censorship The Iranian Revolutionary Guard protects Internet content standards; blogs written as part of the Iranian parliamentarian voluntary force (comparable to China’s “fifty-cent” army) High/pervasive Manual Increasing reliance on Iranian-developed ISPs that do not use Western technologies. Heavy surveillance continues to be widely practiced.  All public Internet traffic is routed through proxy servers. High/pervasive Technical Low “ Natural” barriers Examples Degree of use Filter Type
Case Study | Iran Overview  |  Regulatory Objectives  |  Regulatory Methods  |  Case Studies   |  Impacts ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],WHY IT MATTERS Population:  66,429,284 (July 2009 est.) Users Online:  32,200,000 (48.5% of total population) Level of online regulation:  Very high
Case Study | Iran Overview  |  Regulatory Objectives  |  Regulatory Methods  |  Case Studies   |  Impacts Copyright © 2009 Creators Syndicate
Case Study | France Overview  |  Regulatory Objectives  |  Regulatory Methods  |  Case Studies   |  Impacts Population:  64,057,792 (July 2009 est.) Users Online:  43,100,134 (69.3% of total population)  Level of online regulation:  Low-Moderate   Credit: Wikipedia N/A Corporate Laws will allow for new database of citizen online activity High/pervasive Self-censorship N/A Manual State-run computer trojans and requires ISPs to block certain sites on the government’s blacklist High/pervasive Technical N/A “ Natural” barriers Examples Degree of use Regulation Filter Type
Case Study | France Overview  |  Regulatory Objectives  |  Regulatory Methods  |  Case Studies   |  Impacts Credit: Wikipedia ,[object Object],[object Object],[object Object],[object Object],WHY IT MATTERS Population:  64,057,792 (July 2009 est.) Users Online:  43,100,134 (69.3% of total population)  Level of online regulation:  Low-Moderate
Policy Overview  |  Regulatory Objectives  |  Regulatory Methods  |  Case Studies  |   Impacts ,[object Object],[object Object],[object Object],[object Object],[object Object]
Policy Overview  |  Regulatory Objectives  |  Regulatory Methods  |  Case Studies  |   Impacts A case for country-based regulation and policy: Suppose there are three nations each with 100 people. 51 want to ban online gambling in nation A, 75 want to ban in nation B, and 30, want to ban in nation C.  Global Regulation:  144 unhappy with policy, 156 happy with policy.  Country-based regulation:  Nation A: Ban; Nation B: Ban; Nation C: Permit Total: 196 happy with policy, 104 unhappy with policy
Public response Overview  |  Regulatory Objectives  |  Regulatory Methods  |  Case Studies  |   Impacts ,[object Object],[object Object],[object Object],[object Object],[object Object]
How Tor Works Overview  |  Regulatory Objectives  |  Regulatory Methods  |  Case Studies  |   Impacts
How Tor Works Overview  |  Regulatory Objectives  |  Regulatory Methods  |  Case Studies  |   Impacts
How Tor Works Overview  |  Regulatory Objectives  |  Regulatory Methods  |  Case Studies  |   Impacts
Economic implications Overview  |  Regulatory Objectives  |  Regulatory Methods  |  Case Studies  |   Impacts Trade barriers:  Just as in offline markets, government regulation can result in trade barriers (e.g., protection of domestic Internet firms in China) Black markets:  Emergence of Internet usage in areas like the North Korean/Chinese border through Web-enabled phones running on Chinese services
Legal Implications Overview  |  Regulatory Objectives  |  Regulatory Methods  |  Case Studies  |   Impacts How are borders defined?  Do we define border based on where the technology company is headquartered? Where servers are hosted? Or where the end user is? Redefining of “market power”  How can one government’s laws reflect new business pratices? ( Example:  Microsoft dot-net-passport security and EU global privacy standards)
What are the effects?  Overview  |  Regulatory Objectives  |  Regulatory Methods  |  Case Studies  |   Impacts ,[object Object],[object Object],[object Object],[object Object],[object Object]

Weitere ähnliche Inhalte

Was ist angesagt?

The Internet State Filter
The Internet State FilterThe Internet State Filter
The Internet State FilterAndrew Davies
 
POLS 3620 Internet freedom
POLS 3620 Internet freedomPOLS 3620 Internet freedom
POLS 3620 Internet freedomroypong
 
Social media impact on freedom of expression and privacy
Social media impact on freedom of expression and privacySocial media impact on freedom of expression and privacy
Social media impact on freedom of expression and privacyYasmin AbdelAziz
 
Censorship Regimes On The Chinese Internet
Censorship Regimes On The  Chinese InternetCensorship Regimes On The  Chinese Internet
Censorship Regimes On The Chinese InternetAnders Pedersen
 
Internet decency legislation
Internet decency legislationInternet decency legislation
Internet decency legislationTgarmon34
 
Marsden Regulating Disinformation Kluge 342020
Marsden Regulating Disinformation Kluge 342020Marsden Regulating Disinformation Kluge 342020
Marsden Regulating Disinformation Kluge 342020Chris Marsden
 
Internet Governance by Its History (1966-2000)
Internet Governance by Its History (1966-2000)Internet Governance by Its History (1966-2000)
Internet Governance by Its History (1966-2000)Jeremy Pesner
 
Freedom Trends and Assumptions - A Global Assessment of Internet and Digital ...
Freedom Trends and Assumptions - A Global Assessment of Internet and Digital ...Freedom Trends and Assumptions - A Global Assessment of Internet and Digital ...
Freedom Trends and Assumptions - A Global Assessment of Internet and Digital ...Freedom House
 
International politics in the age of the internet
International politics in the age of the internetInternational politics in the age of the internet
International politics in the age of the internetJeffrey Hart
 
Presentation at COMPACT Project event in Riga - Disinformation, Media literac...
Presentation at COMPACT Project event in Riga - Disinformation, Media literac...Presentation at COMPACT Project event in Riga - Disinformation, Media literac...
Presentation at COMPACT Project event in Riga - Disinformation, Media literac...Oles Kulchytskyy
 
CIPA Overview
CIPA OverviewCIPA Overview
CIPA Overviewedtecher
 
China’s Internet Security _Dichotomy of National Security and Human Rights in...
China’s Internet Security _Dichotomy of National Security and Human Rights in...China’s Internet Security _Dichotomy of National Security and Human Rights in...
China’s Internet Security _Dichotomy of National Security and Human Rights in...Emily Võ
 
CTO-CybersecurityForum-2010-John Carr
CTO-CybersecurityForum-2010-John CarrCTO-CybersecurityForum-2010-John Carr
CTO-CybersecurityForum-2010-John Carrsegughana
 

Was ist angesagt? (20)

The Internet State Filter
The Internet State FilterThe Internet State Filter
The Internet State Filter
 
Online Harms White Paper April 2019 Bill Dutton
Online Harms White Paper April 2019 Bill DuttonOnline Harms White Paper April 2019 Bill Dutton
Online Harms White Paper April 2019 Bill Dutton
 
POLS 3620 Internet freedom
POLS 3620 Internet freedomPOLS 3620 Internet freedom
POLS 3620 Internet freedom
 
Social media impact on freedom of expression and privacy
Social media impact on freedom of expression and privacySocial media impact on freedom of expression and privacy
Social media impact on freedom of expression and privacy
 
Censorship Regimes On The Chinese Internet
Censorship Regimes On The  Chinese InternetCensorship Regimes On The  Chinese Internet
Censorship Regimes On The Chinese Internet
 
Internet decency legislation
Internet decency legislationInternet decency legislation
Internet decency legislation
 
Marsden Regulating Disinformation Kluge 342020
Marsden Regulating Disinformation Kluge 342020Marsden Regulating Disinformation Kluge 342020
Marsden Regulating Disinformation Kluge 342020
 
Polinter11
Polinter11Polinter11
Polinter11
 
Dutton china-sjtu-2015
Dutton china-sjtu-2015Dutton china-sjtu-2015
Dutton china-sjtu-2015
 
Internet Governance by Its History (1966-2000)
Internet Governance by Its History (1966-2000)Internet Governance by Its History (1966-2000)
Internet Governance by Its History (1966-2000)
 
COMMON GOOD DIGITAL FRAMEWORK
COMMON GOOD DIGITAL FRAMEWORKCOMMON GOOD DIGITAL FRAMEWORK
COMMON GOOD DIGITAL FRAMEWORK
 
Freedom Trends and Assumptions - A Global Assessment of Internet and Digital ...
Freedom Trends and Assumptions - A Global Assessment of Internet and Digital ...Freedom Trends and Assumptions - A Global Assessment of Internet and Digital ...
Freedom Trends and Assumptions - A Global Assessment of Internet and Digital ...
 
International politics in the age of the internet
International politics in the age of the internetInternational politics in the age of the internet
International politics in the age of the internet
 
Fotn 2015 colombia
Fotn 2015 colombiaFotn 2015 colombia
Fotn 2015 colombia
 
Presentation at COMPACT Project event in Riga - Disinformation, Media literac...
Presentation at COMPACT Project event in Riga - Disinformation, Media literac...Presentation at COMPACT Project event in Riga - Disinformation, Media literac...
Presentation at COMPACT Project event in Riga - Disinformation, Media literac...
 
The path from e government to open government in vietnam
The path from e government to open government in vietnamThe path from e government to open government in vietnam
The path from e government to open government in vietnam
 
Overview Of Wcu Research (16 Dec2009)Sj
Overview Of Wcu Research (16 Dec2009)SjOverview Of Wcu Research (16 Dec2009)Sj
Overview Of Wcu Research (16 Dec2009)Sj
 
CIPA Overview
CIPA OverviewCIPA Overview
CIPA Overview
 
China’s Internet Security _Dichotomy of National Security and Human Rights in...
China’s Internet Security _Dichotomy of National Security and Human Rights in...China’s Internet Security _Dichotomy of National Security and Human Rights in...
China’s Internet Security _Dichotomy of National Security and Human Rights in...
 
CTO-CybersecurityForum-2010-John Carr
CTO-CybersecurityForum-2010-John CarrCTO-CybersecurityForum-2010-John Carr
CTO-CybersecurityForum-2010-John Carr
 

Andere mochten auch

6a8aa414e3815e1c61e980af467b5870.concepcoes pedagogicas aula 18 04
6a8aa414e3815e1c61e980af467b5870.concepcoes pedagogicas aula 18 046a8aa414e3815e1c61e980af467b5870.concepcoes pedagogicas aula 18 04
6a8aa414e3815e1c61e980af467b5870.concepcoes pedagogicas aula 18 04prefeitura municipal de logradouro
 
Regulating converged services in a future internet of people and things
Regulating converged services in a future internet of people and thingsRegulating converged services in a future internet of people and things
Regulating converged services in a future internet of people and thingsOliver Damian
 
Internet regulation slide
Internet regulation slideInternet regulation slide
Internet regulation slideyiranzheng
 
Internet Creativity Vs Internet Regulation
Internet Creativity Vs  Internet RegulationInternet Creativity Vs  Internet Regulation
Internet Creativity Vs Internet RegulationMathias Klang
 
Internet content regulation
Internet content regulationInternet content regulation
Internet content regulationZoanCafe
 
Internet regulation-Yiran
Internet regulation-YiranInternet regulation-Yiran
Internet regulation-Yiranyiranzheng
 
Regulation and the Internet of Things
Regulation and the Internet of ThingsRegulation and the Internet of Things
Regulation and the Internet of Thingsblogzilla
 

Andere mochten auch (8)

6a8aa414e3815e1c61e980af467b5870.concepcoes pedagogicas aula 18 04
6a8aa414e3815e1c61e980af467b5870.concepcoes pedagogicas aula 18 046a8aa414e3815e1c61e980af467b5870.concepcoes pedagogicas aula 18 04
6a8aa414e3815e1c61e980af467b5870.concepcoes pedagogicas aula 18 04
 
Regulating converged services in a future internet of people and things
Regulating converged services in a future internet of people and thingsRegulating converged services in a future internet of people and things
Regulating converged services in a future internet of people and things
 
Internet regulation slide
Internet regulation slideInternet regulation slide
Internet regulation slide
 
Internet Creativity Vs Internet Regulation
Internet Creativity Vs  Internet RegulationInternet Creativity Vs  Internet Regulation
Internet Creativity Vs Internet Regulation
 
Internet content regulation
Internet content regulationInternet content regulation
Internet content regulation
 
MEGA Style magazine Spring 2015
MEGA Style magazine Spring 2015MEGA Style magazine Spring 2015
MEGA Style magazine Spring 2015
 
Internet regulation-Yiran
Internet regulation-YiranInternet regulation-Yiran
Internet regulation-Yiran
 
Regulation and the Internet of Things
Regulation and the Internet of ThingsRegulation and the Internet of Things
Regulation and the Internet of Things
 

Ähnlich wie Internet Content Regulation: What it means in 2010

Internet governance and the filtering problems
Internet governance and the filtering problemsInternet governance and the filtering problems
Internet governance and the filtering problemsTan Tran
 
Digital Repression and Techno-Authoritarianism
Digital Repression and Techno-AuthoritarianismDigital Repression and Techno-Authoritarianism
Digital Repression and Techno-AuthoritarianismCharles Mok
 
Cst group project#2, intro++
Cst group project#2, intro++Cst group project#2, intro++
Cst group project#2, intro++Roxanne St Ives
 
Wikimania 2013 keynote: One Internet Two Systems
Wikimania 2013 keynote: One Internet Two SystemsWikimania 2013 keynote: One Internet Two Systems
Wikimania 2013 keynote: One Internet Two SystemsCharles Mok
 
Digital Authoritarianism, Asian Techno-Geopolitics and Technology Fragmentation
Digital Authoritarianism, Asian Techno-Geopolitics and Technology FragmentationDigital Authoritarianism, Asian Techno-Geopolitics and Technology Fragmentation
Digital Authoritarianism, Asian Techno-Geopolitics and Technology FragmentationCharles Mok
 
Sail regulation governance 101018
Sail regulation governance 101018Sail regulation governance 101018
Sail regulation governance 101018SAIL
 
Internet Governance and Open Source Software
Internet Governance and Open Source SoftwareInternet Governance and Open Source Software
Internet Governance and Open Source SoftwareSeaparo Phala
 
Lessons on netfreedom+best practices in cyber security
Lessons on netfreedom+best practices in cyber securityLessons on netfreedom+best practices in cyber security
Lessons on netfreedom+best practices in cyber securityFreedom House
 
Google in China
Google in China Google in China
Google in China guestfbc5d4
 
ArticlesJournal of Contemporary Criminal Justice26(1) 10.docx
ArticlesJournal of Contemporary Criminal Justice26(1) 10.docxArticlesJournal of Contemporary Criminal Justice26(1) 10.docx
ArticlesJournal of Contemporary Criminal Justice26(1) 10.docxwraythallchan
 
Review of Previous ETAP Forums - Deepak Maheshwari
Review of Previous ETAP Forums - Deepak MaheshwariReview of Previous ETAP Forums - Deepak Maheshwari
Review of Previous ETAP Forums - Deepak Maheshwarivpnmentor
 
An Overview of the Battle for the Control of the Internet
An Overview of the Battle for the Control of the InternetAn Overview of the Battle for the Control of the Internet
An Overview of the Battle for the Control of the InternetDibussi Tande
 
Net Neutrality Capacity Building Seminar
Net Neutrality Capacity Building SeminarNet Neutrality Capacity Building Seminar
Net Neutrality Capacity Building SeminarExcel Asama
 
Net Neutrality Capacity Building Seminar
Net Neutrality Capacity Building SeminarNet Neutrality Capacity Building Seminar
Net Neutrality Capacity Building SeminarExcel Asama
 
Google in China presentation
Google in China presentationGoogle in China presentation
Google in China presentationguestfbc5d4
 

Ähnlich wie Internet Content Regulation: What it means in 2010 (20)

Internet governance and the filtering problems
Internet governance and the filtering problemsInternet governance and the filtering problems
Internet governance and the filtering problems
 
Digital Repression and Techno-Authoritarianism
Digital Repression and Techno-AuthoritarianismDigital Repression and Techno-Authoritarianism
Digital Repression and Techno-Authoritarianism
 
Cst group project#2, intro++
Cst group project#2, intro++Cst group project#2, intro++
Cst group project#2, intro++
 
Freedom unesco-2011
Freedom unesco-2011Freedom unesco-2011
Freedom unesco-2011
 
Internet governance
Internet governanceInternet governance
Internet governance
 
Wikimania 2013 keynote: One Internet Two Systems
Wikimania 2013 keynote: One Internet Two SystemsWikimania 2013 keynote: One Internet Two Systems
Wikimania 2013 keynote: One Internet Two Systems
 
Digital Authoritarianism, Asian Techno-Geopolitics and Technology Fragmentation
Digital Authoritarianism, Asian Techno-Geopolitics and Technology FragmentationDigital Authoritarianism, Asian Techno-Geopolitics and Technology Fragmentation
Digital Authoritarianism, Asian Techno-Geopolitics and Technology Fragmentation
 
Sail regulation governance 101018
Sail regulation governance 101018Sail regulation governance 101018
Sail regulation governance 101018
 
Internet Governance and Open Source Software
Internet Governance and Open Source SoftwareInternet Governance and Open Source Software
Internet Governance and Open Source Software
 
Lessons on netfreedom+best practices in cyber security
Lessons on netfreedom+best practices in cyber securityLessons on netfreedom+best practices in cyber security
Lessons on netfreedom+best practices in cyber security
 
Google in China
Google in China Google in China
Google in China
 
ArticlesJournal of Contemporary Criminal Justice26(1) 10.docx
ArticlesJournal of Contemporary Criminal Justice26(1) 10.docxArticlesJournal of Contemporary Criminal Justice26(1) 10.docx
ArticlesJournal of Contemporary Criminal Justice26(1) 10.docx
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Review of Previous ETAP Forums - Deepak Maheshwari
Review of Previous ETAP Forums - Deepak MaheshwariReview of Previous ETAP Forums - Deepak Maheshwari
Review of Previous ETAP Forums - Deepak Maheshwari
 
Internet Censorship
Internet CensorshipInternet Censorship
Internet Censorship
 
An Overview of the Battle for the Control of the Internet
An Overview of the Battle for the Control of the InternetAn Overview of the Battle for the Control of the Internet
An Overview of the Battle for the Control of the Internet
 
Net Neutrality Capacity Building Seminar
Net Neutrality Capacity Building SeminarNet Neutrality Capacity Building Seminar
Net Neutrality Capacity Building Seminar
 
Net Neutrality Capacity Building Seminar
Net Neutrality Capacity Building SeminarNet Neutrality Capacity Building Seminar
Net Neutrality Capacity Building Seminar
 
Oni Iran 2009
Oni Iran 2009Oni Iran 2009
Oni Iran 2009
 
Google in China presentation
Google in China presentationGoogle in China presentation
Google in China presentation
 

Internet Content Regulation: What it means in 2010

  • 1. Internet Content Regulation: What it means in 2010 Illustration by John Ritter, The Atlantic Monthly Wendy Qi Digital Markets Course -Professor Suzanne Scotchmer © 2010 - Free use with attribution
  • 2. Defining Internet Content Regulation Overview | Regulatory Objectives | Regulatory Methods | Case Studies | Impacts “ Internet content regulation ” will be defined as any sort of widespread content restriction or monitoring as mandated, either explicitly or otherwise, by government or regulatory bodies
  • 3. The Internet: From a Regulatory Perspective Overview | Regulatory Objectives | Regulatory Methods | Case Studies | Impacts 1958 … 1995 1998 2000 2002 2004 2006 2008 2009 2010 Introduction of first popularized Web browser, Netscape Internet censorship laws introduced in Victoria, Western AU and New Territory; US introduces and retains Communication Decency Act (CDA) Google threatens to withdraw from China following major cyber-attack Yahoo! IPOs for $33.8 million at $13 per share Australian Commonwealth Parliament passes Internet censorship bill Google popularizes search engine methodology Iranian election controversy launches first “Twitter-revolution” Yahoo! enters China market; 2.1 million internet users in China in Jan. 1999 Introduction of Napster and commercial digital content management Poland to institute Internet censorship bill French court issues landmark ruling ordering Yahoo to pull Nazi auction pages from France Yahoo! signs Public Pledge on Self-Discipline for the Chinese Internet Industry Google.cn launches in China Introduction and strike-down of the “Green Dam Youth Project” Ayatollah Montarezi publishes memoir online criticizing ideological foundations of the Islamic state ( Dec. 2000) Iranian judiciary chief calls for establishment of special committee for internet-related crimes France passes security bill known as LOPPSI2 (includes state sanctioned computer Trojans) Finland makes plans to become first 100% free cyber-”paradise” Cyril Houri introduces geographical targeting Internet content technology Internet begins as a US project for ARPA/DARPA to link radar systems Dot-com bubble
  • 4.
  • 5. Which countries regulate Internet content? Overview | Regulatory Objectives | Regulatory Methods | Case Studies | Impacts Legend Reporters without Borders, August 2009 Unknown No censorship Some censorship Under surveillance Heavy surveillance
  • 6. Why regulate the Internet? Overview | Regulatory Objectives | Regulatory Methods | Case Studies | Impacts Social Values Political objectives Economic incentives
  • 7. How is the Internet regulated? Overview | Regulatory Objectives | Regulatory Methods | Case Studies | Impacts Four Primary Modes - Lawrence Lessig “ West Coast Code”: Primarily technical means of regulating data Norms Law Markets Architecture Offline social norms translate into online scenarios Creates virtual marketplace of information; offline laws of supply and demand reflected online “ East Coast Code” Offline legal terms apply to online situations
  • 8. How is the Internet regulated? Overview | Regulatory Objectives | Regulatory Methods | Case Studies | Impacts Technical (architecture) Manual Self censorship (policy) Corporate (law & policy) IP blocks Routers “ Natural” barriers Language Socioeconomic class Hardware blocks (e.g., change in WiFi codes) Hired human filters Volunteer forces - stay-at-home mome Reducing/eliminating anonymity
  • 9. Where can the Internet be regulated technically? Overview | Regulatory Objectives | Regulatory Methods | Case Studies | Impacts Home or individual computer level filtering can be achieved through the installation of filtering software that restricts an individual computer’s ability to access certain sites. Individual computers Filtering of institutional level networks using technical blocking and/or induced self-censorship occurs in companies, government organizations, schools and cybercafés. Institutions Government-mandated filtering is most commonly implemented by Internet Service Providers (ISPs) using methods such as search result removals, take-downs, or technical blocking. Internet service providers (ISPs) State-directed implementation of national content filtering schemes and blocking technologies affecting Internet access across entire backbone -- often done at “international gateway” Internet backbone
  • 10. Where can the Internet be regulated technically? Overview | Regulatory Objectives | Regulatory Methods | Case Studies | Impacts An example - Internet backbone Search done on Google.cn “ According to certain local laws, regulations, and policies, certain results of this search have been restricted.”
  • 11. Overview | Regulatory Objectives | Regulatory Methods | Case Studies | Impacts
  • 12. Overview | Regulatory Objectives | Regulatory Methods | Case Studies | Impacts
  • 13. Case Study | China Overview | Regulatory Objectives | Regulatory Methods | Case Studies | Impacts Credit: Associated Press Population: ~1.34 billion (June 2009 est.) Users Online: 384 million (29% of total population) - over 90% have broadband access Level of online regulation: Very high Chinese government request cooperation of corporations such as Yahoo and Google as part of doing business in China High/Pervasive Corporate Uses selected, publicized arrests as a means of deterring potential offenders High/Pervasive - Moderate Self-censorship Human censors will regularly comb forums and blogs to eliminate any offensive material High/Pervasive Manual Sophisticated filters used to block potentially offensive sites be re-routing IP addresses; “Green Dam Youth Project” High/Pervasive Technical Articles critical of Chinese government published only in English/French; publications allowed only for certain socioeconomic groups Moderate “ Natural” barriers Examples Degree of use Regulation Filter Type
  • 14.
  • 15. Case Study | Iran Overview | Regulatory Objectives | Regulatory Methods | Case Studies | Impacts Credit: Wikipedia Population: 66,429,284 (July 2009 est.) Users Online: 32,200,000 (48.5% of total population) Level of online regulation: Very high Incidents where companies that sell mobile infrastructure network must also share how to monitor content (ex: Nokia) Moderate Corporate Revolutionary Guard and arrests deter certain online behaviors High/pervasive Self-censorship The Iranian Revolutionary Guard protects Internet content standards; blogs written as part of the Iranian parliamentarian voluntary force (comparable to China’s “fifty-cent” army) High/pervasive Manual Increasing reliance on Iranian-developed ISPs that do not use Western technologies. Heavy surveillance continues to be widely practiced. All public Internet traffic is routed through proxy servers. High/pervasive Technical Low “ Natural” barriers Examples Degree of use Filter Type
  • 16.
  • 17. Case Study | Iran Overview | Regulatory Objectives | Regulatory Methods | Case Studies | Impacts Copyright © 2009 Creators Syndicate
  • 18. Case Study | France Overview | Regulatory Objectives | Regulatory Methods | Case Studies | Impacts Population: 64,057,792 (July 2009 est.) Users Online: 43,100,134 (69.3% of total population) Level of online regulation: Low-Moderate Credit: Wikipedia N/A Corporate Laws will allow for new database of citizen online activity High/pervasive Self-censorship N/A Manual State-run computer trojans and requires ISPs to block certain sites on the government’s blacklist High/pervasive Technical N/A “ Natural” barriers Examples Degree of use Regulation Filter Type
  • 19.
  • 20.
  • 21. Policy Overview | Regulatory Objectives | Regulatory Methods | Case Studies | Impacts A case for country-based regulation and policy: Suppose there are three nations each with 100 people. 51 want to ban online gambling in nation A, 75 want to ban in nation B, and 30, want to ban in nation C. Global Regulation: 144 unhappy with policy, 156 happy with policy. Country-based regulation: Nation A: Ban; Nation B: Ban; Nation C: Permit Total: 196 happy with policy, 104 unhappy with policy
  • 22.
  • 23. How Tor Works Overview | Regulatory Objectives | Regulatory Methods | Case Studies | Impacts
  • 24. How Tor Works Overview | Regulatory Objectives | Regulatory Methods | Case Studies | Impacts
  • 25. How Tor Works Overview | Regulatory Objectives | Regulatory Methods | Case Studies | Impacts
  • 26. Economic implications Overview | Regulatory Objectives | Regulatory Methods | Case Studies | Impacts Trade barriers: Just as in offline markets, government regulation can result in trade barriers (e.g., protection of domestic Internet firms in China) Black markets: Emergence of Internet usage in areas like the North Korean/Chinese border through Web-enabled phones running on Chinese services
  • 27. Legal Implications Overview | Regulatory Objectives | Regulatory Methods | Case Studies | Impacts How are borders defined? Do we define border based on where the technology company is headquartered? Where servers are hosted? Or where the end user is? Redefining of “market power” How can one government’s laws reflect new business pratices? ( Example: Microsoft dot-net-passport security and EU global privacy standards)
  • 28.

Hinweis der Redaktion

  1. Wendy: Remember to bring picture of the map to the front
  2. Wendy: Remember to bring picture of the map to the front The concept of internet censorship isn’t new. Since it’s
  3. It’s hard to differentiate, especially as you get into the territory of “partial control” -- what free spech means in the U.S. is different from what it may mean in Complete control: Very limited INTRANET -- not even a true internet. Substantial control: Heavy regulation occurs; in many cases, employs sophisticated filtering systems. Perhaps the two most known cases are around China and Iran because of the series of recent events but all these nations have
  4. Can be seen as an “O(1)” attack at the Internet bacbone level
  5. Can be seen as an “O(1)” attack at the Internet bacbone level
  6. Can be seen as an “O(1)” attack at the Internet bacbone level
  7. Can be seen as an “O(1)” attack at the Internet bacbone level