Real-Name Registration Regulation in China

Author(s):  
Kenneth C. C. Yang ◽  
Yowei Kang

On February 4, 2015, China announced its new regulations that require all Chinese Internet users to register with their real names. The heightened control of Internet clearly demonstrates Chinese government's concerns over increasing social unrests and the abilities of Chinese Internet users to access information not censored by the government. However, the real-name registration regime has posed the greatest challenge to the anonymity of the Internet that many Chinese users have valued in an authoritarian society. Furthermore, the real-name registration system also impinges on Chinese Internet users' privacy, political freedom, and freedom of speech. This book chapter analyzes microblog discussions to examine existing Chinese censorship and control systems on the Internet, to investigate government's rhetoric to justify its censorship and control systems, and to identify major themes in Chinese netizens' reactions and discourses.

Author(s):  
Kenneth C. C. Yang ◽  
Yowei Kang

On February 4, 2015, China announced its new regulations that require all Chinese Internet users to register with their real names. The heightened control of Internet clearly demonstrates Chinese government's concerns over increasing social unrests and the abilities of Chinese Internet users to access information not censored by the government. However, the real-name registration regime has posed the greatest challenge to the anonymity of the Internet that many Chinese users have valued in an authoritarian society. Furthermore, the real-name registration system also impinges on Chinese Internet users' privacy, political freedom, and freedom of speech. This book chapter analyzes microblog discussions to examine existing Chinese censorship and control systems on the Internet, to investigate government's rhetoric to justify its censorship and control systems, and to identify major themes in Chinese netizens' reactions and discourses.


Author(s):  
Shefali Virkar

The Information Revolution has greatly impacted how nation-states and societies relate to one another; particularly wherein new, or hitherto less powerful, actors have emerged to bypass and influence established channels of power, altering the manner in which nation-states define their interests, power bases, security, and increasingly, their innate ability to govern and control flows of information. This book chapter investigates the ‘winner-takes-all' hypothesis relative to how the Internet, its associated platforms, and technologies have been harnessed to enhance the activities of both transnational terrorist networks and the organisations, clusters, and individuals dedicated to researching and combating them. The issues covered by this research raise important questions about the nature and the use of technology by state and non-state actors in an asymmetric ‘information war'; of how ideas of terrorism, surveillance, and censorship are conceptualised, and manner in which the role of the nation-state in countering and pre-empting threats to national security has been redefined.


2018 ◽  
Vol 10 (3-4) ◽  
Author(s):  
Abd Hadi Borham

The development of communication and information technology (ICT) has been developed by the government since the 1980s. This development has contributed to the increasing use of the internet as a new medium for the purpose of partnership, business and knowledge. This socio-cultural change, based on the new media, has led to the receipt of information and forming a new environment in all aspects including religious life. The development of the internet in Malaysia has given a direct impression on the development of Islamic da'wah. Today's society gains exposure to Islam easily through social media such as facebook, newsgroups, e-groups and others. Therefore, this article aims to examine the impact of the new media toward Islamic da'wah. Data was obtained on library research through secondary data such as journal articles, government reports, books etc. Analysis shows that the flooding of Islamic information in the new media has affected the da’wah among internet users especially in the acceptance of Islamic understanding in aqidah, ibadah and akhlak


Author(s):  
Emanuele Bardone ◽  
Lorenzo Magnani

Recently the impressive growth of the Web, and the Internet in general, has been considered as a promise that may both challenge and boost our representation of democratic institutions. It is well known that modern democracies are based on the possibility to control and even replace who rules by the force of the best arguments. More generally, the control of the government, and the effectiveness of democracy, is possible, if the citizens can access information. Hence, the promise of the Internet mainly relies on the fact that people may more freely access information, because it seems it cannot be controlled or manipulated by the political power. In the first part of this outline we will depict a cognitive framework to deal with the relationships between Internet and democracy. We shall show that Internet, as an information technology, can be considered as a cognitive and moral mediator; it can provide stories, texts, images, combined with sounds, so that the information fosters not only a cognitive, but also an emotional and moral understanding. In this sense, the Internet represents a kind of redistribution of the moral effort through managing objects and information to overcome the poverty and the unsatisfactory character of the options available. In the last part we will illustrate that Internet, as a moral mediator, may enhance democracy in two respects. First, it affords civic engagement and participation; second, it allows people to face different sources of information so that almost everyone can verify and test the information delivered by traditional media.


2018 ◽  
Vol 13 ◽  
pp. 3288-3300
Author(s):  
Rudy Agus Gemilang Gultom ◽  
Asep Adang Supriyadi ◽  
Tatan Kustana

Nowadays, the extremism, radicalism and terrorism groups have taken advantages the use of Internet access to support their activities, i.e, member recruitment, propaganda, fundraising, cyberattack actions against their targets, etc. This is one of the issues of cyber security as a negative impact of internet utilization especially by the extremism, radicalism and terrorism groups. They know the benefits of the internet services and social media can be used to facilitate the control of information in their organizational command and control system.  In order to tackle this cyber security issue, the internet users in Association of Southeast Asian Nations (ASEAN) member countries should get more understanding as well as protection from their government against the danger of cyber extremism, cyber radicalism or cyber terrorism activities over the Internet. Therefore, this paper tries to explain the need of an ASEAN Cyber Security Framework standard in order to countering cyber terrorism activities via Internet as well as introducing the initial concept of Six-Ware Cyber Security Framework (SWCSF). 


2020 ◽  
Vol 15 (47) ◽  
pp. 5-34
Author(s):  
Marta Mitrović

The paper examines the views of Internet users concerning the protection of their rights on the Internet. The Web survey, conducted by the snowball sampling, included 783 Internet users who expressed their views regarding the ways the state (Serbia) and private agents (Facebook and Google) relate to the right of freedom of expression and privacy on the Internet. Also, the survey was used to examine the individual responsibility of users when it comes to the use of Internet services. Several hypotheses suggested that Internet users in Serbia do not have confidence in the country and private actors on the issue of protecting their rights. However, users also do not demonstrate a satisfactory level of individual responsibility. The most important findings indicate that: 1) only one-sixth of the respondents consider that the Government of the Republic of Serbia does not violate the privacy of Internet users; 2) almost half of the respondents do not feel free to express their views criticizing the government; 3) almost 90% of users are not satisfied how Facebook protects their privacy, while it is 1% lower in the case of Google; 4) a third of respondents answered positively to the question whether they had read terms of use of the analyzed companies, but half of them did not give a correct answer to the main questions; 5) only 8.9% of respondents who claimed to have read terms of use are aware of the fact that Facebook shares their data with third parties.


2020 ◽  
Vol 1 (2) ◽  
pp. 75-85
Author(s):  
Irma Amelia Dewi ◽  
Lisye Fitria ◽  
Arie Desrianty ◽  
Alif Ulfa Afifah ◽  
M. Faishal Dzaky

Nowadays, the benefits of using the internet can be felt in society or even in the industrial world, either for business or just for entertainment purposes. Until 2017, Indonesia is one of the countries with the highest internet users globally, with around 112,6 million internet users. On the other hand, many small businesses have not used the internet to advertise their products. This project's main objective is to design and develop a company profile website of CV Rian as one of the brick micro-industry in Nagrek, West Java, enabling people to search and access information easily and quickly. This project uses Waterfall Model as Sofware Development Life Cycle (SDLC), MySQL as the database, and PHP for server-side scripting. The database is used for storing posts, admin data, and images. 


2018 ◽  
Vol 1 (1) ◽  
pp. 48
Author(s):  
Charles W. Marwa

This paper is devoted to uncover difficulties in establishing liability in online defamation in Tanzania. The focus is on the effectiveness of the current laws and regulations relating to online defamation; and the lack of awareness on the part of the general public on legal and practical challenges in establishing liability over defamatory comments occurring on the internet. The investigator discovered that, the existing legal framework in Tanzania cover issues of establishing liability in online defamation suffers from a number of inadequacies. Moreover the legal and practical challenges includes, the weakness of some law and regulations covering online defamation, limitation periods, jurisdiction and choice of law issues, investigation and admissibility of electronic evidence and its authenticity, identifying anonymous defendant and the rights to privacy. The author recommends that the government has to consider amending its law by taking on board the forgotten stakeholders opinions that would address by dealing with specific issues of liability in online defamation to internet users, Internet Service providers(ISP’s) and intermediary for their defamatory comments.


2011 ◽  
pp. 129-152 ◽  
Author(s):  
Brian S. Krueger

While more is probably known about the causes of political participation than any other political behavior, the research program suffers in that it generally assumes citizens operate within an unproblematic surveillance context. This chapter argues that the growing use of the Internet for political participation and the government’s expanded electronic surveillance capacities make this assumption increasingly dubious. Drawing on Michel Foucault’s insights concerning surveillance and resistance, I develop empirical hypotheses related to surveillance and Internet political participation. Testing these hypotheses using data derived from a unique probability sample survey of U.S. Internet users, surveillance is shown to influence online political activity. Those who oppose the current administration, and who perceive the government monitors their Internet behavior, participate in politics online at the highest rates. Next, I test whether perceptions of online surveillance lead to a similar higher probability of conventional offline political activity. The results suggest that for those opposed to the regime’s policies, online surveillance increases the likelihood of engagement in offline political participation.


Sign in / Sign up

Export Citation Format

Share Document