A New Approach to China: Google and Censorship in the Chinese Market

Author(s):  
Jeanne Brett ◽  
Lauren Pilcher ◽  
Lara-Christina Sell

The first across-the-table negotiation between Google and China concluded successfully in 2006, when Google received a license to establish a local domain (google.cn) targeted at Chinese Internet users and not subject to the “Great Firewall.” During these negotiations both Google and the Chinese government struggled to reach an outcome that would be acceptable to their constituents. Google was caught between pleasing its shareholders and preserving its reputation for free access to information, while China was balancing the desire for cutting-edge search technology and the concern that liberal access to information would undermine its political-economic model. In the end, the negotiation resulted in Google operating two domains in China: Google.com and Google.cn. In early 2010, Google announced that its corporate infrastructure had been the target of a series of China-based cyber attacks and accused the Chinese government of attempting to further limit free speech on the web. These incidents led to a public conflict and private negotiations between Google and the Chinese government, which culminated in July 2010 when the Chinese government renewed the google.cn license knowing that Google was redirecting all Chinese customers search to its google.hk.com site This case concerns the changes in Google and the Chinese government's environment that led to Google withdrawing services from google.cn and the Chinese government saving face by renewing the google.cn license. The case is based on the publicly reported events surrounding two series of negotiations between the U.S. technology giant Google and the Chinese Government regarding Google's license in China.

Mousaion ◽  
2016 ◽  
Vol 34 (1) ◽  
pp. 83-100
Author(s):  
Solomon Bopape

The study of law focuses, among other aspects, on important issues relating to equality, fairness and justice in as far as free access to information and knowledgeis concerned. The launching of the Open Access to Law Movement in 1992, the promulgation of the Durham Statement on Open Access to Legal Scholarshipin 2009, and the formation of national and regional Legal Information Institutes (LIIs) should serve as an indication of how well the legal world is committed to freely publishing and distributing legal information and knowledge through the Internet to legal practitioners, legal scholars and the public at large aroundthe world. In order to establish the amount of legal scholarly content which is accessible through open access publishing innovations and initiatives, this studyanalysed the contents of websites for selected open access resources on the Internet internationally and in South Africa. The results of the study showed that there has been a steady developing trend towards the adoption of open access for legal scholarly literature internationally, while in South Africa legal scholarly literature is under the control of commercial publishers. This should be an issue for the legal scholarship which, among its focus, is to impart knowledge about the right of access to information and knowledge.


2015 ◽  
Vol 3 ◽  
pp. 361-367
Author(s):  
Kamila Peszko

The development of IT technology has provided people with free access to the Internet, which is now a place for consumers to look for opportunities to share their observations with others. The Internet user wants to be more aware, and willingly participates in the development of emerging brands. Companies have also found their place on the Internet, where they source information from Internet users. They realize the power of the consumer as a source of marketing information, and "take advantage" of consumer behavior to promote their brands. They analyze information about consumers, especially consumer preferences, and then publish this via social media in ways that might appeal to users and lead them to share it with others. This study describes this relationship between consumers and marketing via the Internet, and how the consumer is a source of marketing information, because of the possibilities created for entrepreneurs in the information society.


2018 ◽  
Vol 12 (2) ◽  
pp. 179-220
Author(s):  
Jozef Andraško ◽  
Matúš Mesarčík

New technologies have irreversibly changed the nature of the traditional way of exercising the right to free access to information. In the current information society, the information available to public authorities is not just a tool for controlling the public administration and increasing its transparency. Information has become an asset that individuals and legal entities also seek to use for business purposes. PSI particularly in form of open data create new opportunities for developing and improving the performance of public administration.In that regard, authors analyze the term open data and its legal framework from the perspective of European Union law, Slovak legal order and Czech legal order. Furthermore, authors focus is on the relation between open data regime, public sector information re-use regime and free access to information regime.New data protection regime represented by General Data Protection Regulation poses several challenges when it comes to processing of public sector information in form of open data. The article highlights the most important challenges of new regime being compliance with purpose specification, selection of legal ground and other important issues.


2012 ◽  
Vol 210 ◽  
pp. 398-418 ◽  
Author(s):  
Yan Hairong ◽  
Barry Sautman

AbstractA recent addition to the global discourse of China's interaction with developing countries has been the claim that the Chinese government exports prison labour to these countries. While no evidence is ever presented to support this claim, it has been widely circulated in international and local media, as well as on the internet. This article examines the origins of the rumour and the mechanisms of its transmission. It shows that while the rumour often originates at the grass roots in developing countries, it is promoted locally and globally by political, economic and media elites with distinct agendas that often involve building support for opposition parties, competition in obtaining contracts, or geo-strategic and ideological rivalry. We analyse the rumour's circulation in light of the larger discourse on China and developing countries, and discuss why Chinese official responses to the claim have proved to be ineffective.


Author(s):  
Ahmed El Gody

Information communication technologies (ICT) have become an effective force for accelerating political, economic, and social development, decreasing poverty, and fostering trade and knowledge; however the uneven distribution, usage, and implementation of ICT resulted in what is known as the “digital divide” between those who have access to and utilization of information resources and those who do not (Internet.com, 2004). The Middle East, with the exception of Israel, is the least ICT connected area worldwide with only 1.4% of the global share (less than half of the world average of 5.2%). ICT adoption and access in the Arab world are far from adequate; only 6% of the Arab world population uses the Internet, while the penetration rate of personal computers is 2.4%, and less than 4 % of the Arab population has access to a ground telephone line (Ajeeb, 2006; NUA, 2005). The trend of globalization forced Arab countries to realize the power of ICT as one of the most important factors in achieving sustainable growth. During the past decade, genuine efforts have been implemented by Arab governments to utilize ICT; as of May 2005, every country in the Arab world (as seen in Table 1)—except Iraq and Libya—has a clear strategy or at least a plan for promoting ICT (Dutta & Coury, 2003). In her book, Technology Strategies for Putting Arab Countries on the Cyber Map, Reem Hunaidi (2002) stated that despite Arab world efforts to utilize ICT, Arabs are still far from bridging the digital divide. Hunaidi stated that the Arab world is still scoring low on the Digital Access Index (as seen in Table 2), adding that bridging the digital divide requires commitment from all development stakeholders, not only Arab governments. The Hunaidi study concluded that development should start within the Arab society through liberating Arab human capabilities, especially those of women questioning how a society can compete in an increasingly globalized world if half of its people remain marginalized (Hunaidi, 2002). The UNDP 2004 report on human development in the Arab world added to Hunaidi’s question stating that the first step in human ICT development is to bridge the gender divide within the Arab world and make use of the latent 50% of the Arab population. The Arab world has the lowest Gender Empowerment Measure (GEM) worldwide next to Sub-Saharan Africa. Nancy Hafkin and Nancy Tagger (2001), in their study “Gender, Information Technology, and Developing Countries”, stated that the degree of gender bias can be vividly seen across the Arab region. Figures indicate that Arab users constitute 4% of Internet users in comparison to 22% of users in Asia, 25% in Europe, 38% in Latin America, and 50% in the United States. Hafkin and Tagger (2001) concluded that several challenges of socio-cultural, political, economic, and education disparities need to be addressed towards advancing Arab women’s active participation in the new networked information society.


2020 ◽  
pp. 0734242X2095389
Author(s):  
Zhang Yu ◽  
Ma Tianshan ◽  
Syed Abdul Rehman Khan

To have a deeper understanding of the Chinese market reaction for different subsidy policies made by the government, we establish a game model of the competition between legal recyclers and illegal recyclers with government involved. Further, we consider the quality differentiation of end-of-life vehicles in every player’s decision-making. With a numerical simulation, the researchers validated this study. Based on the results of this research, we found that compared with the strategy of subsidizing the legal recyclers, subsidizing the end-of-life vehicle owners is more effective, and the legal recyclers would get more business from end-of-life vehicle owners. The quality of end-of-life vehicles plays a vital role when the recyclers make decisions on their recycling behaviour. Moreover, the differential subsidy policy will probably be useless if most of the end-of-life vehicles in the market are in poor quality. So, the Chinese government should adjust its policies on end-of-life vehicle market development based on the quality distribution of end-of-life vehicles, and the quality management should be implemented in the end-of-life vehicle supply chain for the efficiency and effectiveness of subsidy policies.


2018 ◽  
Vol 3 (1) ◽  
pp. 3
Author(s):  
Miles Caudesch

On the layman's level, this Commentary presents the essence of how and why library staff engage with the public while preserving patron privacy. Basic documentation, such as the Library Bill of Rights and the ALA's Intellectual Freedom Manual are referenced, along with an unsettling article about arson. After reading this Commentary, library staff should feel a renewed sense of loyalty to their profession, as well as an uncomfortable realization that every day, someone's life is held in the balance for educational good or for misapplied freedom: it is partially up to the librarian to help each person pursue excellence within the framework of free access to information.


Author(s):  
Vladimir Barannik ◽  
Bogdan Gorodetsky ◽  
Natalia Barannik

Analysis of modern interstate conflicts, trends in the development of forms of warfare. It is shown that confrontation is characterized by various forms, is hidden in nature and is carried out mainly in the political, economic, informational and other spheres. It is proved that a significant part of hybrid wars are information operations used for the destructive impact on society, commercial activities, politics and economics using information and communication space and technologies. The article expresses the need to create a theoretical basis for combating cyber attacks in special telecommunication systems as an integral part of the national security of the state. The development of methods for hiding information as well as providing information during video streaming and images in networks is underway. The basic calculations are given at the initial stages of information hiding and methods for ensuring the latent transfer of data in telecommunication systems.


2021 ◽  
Vol 1 (13) ◽  
pp. 29-38
Author(s):  
Serhii Krivenko ◽  
Natalya Rotaniova ◽  
Yulianna Lazarevska ◽  
Ulyana Karpenko

The problems of the cybersecurity are becoming a daily threat to the business sphere and the Internet users. The field of the cybersecurity is constantly changing, but it is obviously that the cyber threats are becoming more serious and occur more often. The statistics on the number of cyber attacks in 2020 showed a sharp surge in the cybercrime. In the field of the information security, the majority of incidents has been related to attacks on the various distributed information systems recently. At the same time, a significant amount number of the successful attacks are those that carried out using such attacks as "Man in the middle" (MITM). MITM - attacks are dangerous because with their help attackers gain access to the confidential information, not only the companies but also the ordinary users. Therefore, the purpose of this article is to study the types of MITM - attacks, as well as to develop the recommendations for combating such types of attacks. The study was conducted using methods of analysis and description. The object of the study is MITM attacks. The subject of the study is to determine ways to counter attacks such as MITM. As a result of the conducted research the basic types and the technique of carrying out MITM - attacks are considered. The result of the study was the development of the recommendations for the countering MITM attacks. The proposed methods of preventing "Man in the middle" attacks can ensure a certain high level of the computer network security. This study will be useful in ways suggested to prevent MITM attacks, not only for security administrators, but also for Wi-Fi users trying to protect their personal data. The results of the study can also be used to develop better software that can increase the security of any computer network


Sign in / Sign up

Export Citation Format

Share Document