Moderator in Government-Initiated Online Discussions

Author(s):  
Arthur R. Edwards

In an older version of a Dutch Internet dictionary the moderator is defined as “a person who exercises censorship on a mailing list or newsgroup.”1 In the libertarian tradition of the Internet, moderation has often been viewed as conflicting with free speech and unrestrained communication (Tsagarousianou, 1998). However, as the history of the famous PEN-experiment (Public Electronic Network) in Santa Monica (1990-96) already showed, the free speech principle has to be weighed against other legitimate concerns, like the need to facilitate a genuine discussion and to counteract possible abuses of the medium (Docter & Dutton, 1998).

Author(s):  
David T. A. Wesley

Established U.S. law has long held that computer code is a language, like any other language, and is therefore subject to same free speech protections afforded other forms of speech under the First Amendment of the United States Constitution. Computer code also protects free speech through cryptography that enables protected communication between two or more parties. This article will consider the legal history of computer code as free speech and how it can be used to promote other forms of free speech through cryptography and secure communications. It will further argue that the deep web and dark web are direct results of these precedents, and while they can be abused by cybercriminals and malicious state actors, they are also indispensable in promoting free speech and human rights.


ADALAH ◽  
2020 ◽  
Vol 4 (2) ◽  
Author(s):  
Munadhil Abdul Muqsith

Abstract:The internet developed for the first time in Indonesia in the early 1990s. Starting from the pagayuban network, it is now expanding without boundaries anywhere. A survey conducted by the Indonesian Internet Service Providers Association (APJII) said that the number of internet users in Indonesia in 2012 reached 63 million people or 24.23 percent of the country's total population. Next year, that figure is predicted to increase by close to 30 percent to 82 million users and continue to grow to 107 million in 2014 and 139 million or 50 percent of the total population in 2015. million people. This matter also results in political communication with the internet media, or is often said to be cyber politics. Cyber politics in Indonesia has faced growth in recent years. There are many facilities that support the growth of cyber politics, such as Facebook, Twitter, mailing list, YouTube, and others.Keywords: Cyberpolitik, Internet  Abstrak:Internet berkembang pertama kali di Indonesia pada awal tahun 1990-an. Diawali dari pagayuban network kini berkembang luas tanpa batas dimanapun juga. Suatu survei yang diselenggarakan Asosiasi Penyelenggara Jasa Internet Indonesia (APJII) mengatakan kalau jumlah pengguna internet di Indonesia tahun 2012 menggapai 63 juta orang ataupun 24,23 persen dari total populasi negeri ini. Tahun depan, angka itu diprediksi naik dekat 30 persen jadi 82 juta pengguna serta terus berkembang jadi 107 juta pada 2014 serta 139 juta ataupun 50 persen total populasi pada 2015. juta orang. Perihal ini pula berakibat pada komunikasi politik dengan media internet, ataupun kerap diucap dengan cyber politic. Cyber politic di Indonesia hadapi pertumbuhan sebagian tahun terakhir. Banyaknya fasilitas yang menunjang pertumbuhan cyber politic semacam terdapatnya facebook, Twitter, mailing list, youtobe, serta lain-lain.Kata Kunci: Cyberpolitik, Internet 


Author(s):  
Dan Jerker B. Svantesson

Internet jurisdiction has emerged as one of the greatest and most urgent challenges online, severely affecting areas as diverse as e-commerce, data privacy, law enforcement, content take-downs, cloud computing, e-health, Cyber security, intellectual property, freedom of speech, and Cyberwar. In this innovative book, Professor Svantesson presents a vision for a new approach to Internet jurisdiction––for both private international law and public international law––based on sixteen years of research dedicated specifically to the topic. The book demonstrates that our current paradigm remains attached to a territorial thinking that is out of sync with our modern world, especially, but not only, online. Having made the claim that our adherence to the territoriality principle is based more on habit than on any clear and universally accepted legal principles, Professor Svantesson advances a new jurisprudential framework for how we approach jurisdiction. He also proposes several other reform initiatives such as the concept of ‘investigative jurisdiction’ and an approach to geo-blocking, aimed at equipping us to solve the Internet jurisdiction puzzle. In addition, the book provides a history of Internet jurisdiction, and challenges our traditional categorisation of different types of jurisdiction. It places Internet jurisdiction in a broader context and outlines methods for how properly to understand and work with rules of Internet jurisdiction. While Solving the Internet Puzzle paints a clear picture of the concerns involved and the problems that needs to be overcome, this book is distinctly aimed at finding practical solutions anchored in a solid theoretical framework.


Cryptography ◽  
2021 ◽  
Vol 5 (2) ◽  
pp. 14
Author(s):  
Xavier Boyen ◽  
Udyani Herath ◽  
Matthew McKague ◽  
Douglas Stebila

The conventional public key infrastructure (PKI) model, which powers most of the Internet, suffers from an excess of trust into certificate authorities (CAs), compounded by a lack of transparency which makes it vulnerable to hard-to-detect targeted stealth impersonation attacks. Existing approaches to make certificate issuance more transparent, including ones based on blockchains, are still somewhat centralized. We present decentralized PKI transparency (DPKIT): a decentralized client-based approach to enforcing transparency in certificate issuance and revocation while eliminating single points of failure. DPKIT efficiently leverages an existing blockchain to realize an append-only, distributed associative array, which allows anyone (or their browser) to audit and update the history of all publicly issued certificates and revocations for any domain. Our technical contributions include definitions for append-only associative ledgers, a security model for certificate transparency, and a formal analysis of our DPKIT construction with respect to the same. Intended as a client-side browser extension, DPKIT will be effective at fraud detection and prosecution, even under fledgling user adoption, and with better coverage and privacy than federated observatories, such as Google’s or the Electronic Frontier Foundation’s.


2003 ◽  
Vol 28 (1) ◽  
pp. 10-14 ◽  
Author(s):  
Christian David ◽  
Catherine Granger ◽  
Nicole Picot

The French national museum libraries service comprises 21 libraries specialising in the history of western art and archaeology. The central library, which is at the head of the network, was automated first and has completed its retrospective conversion. At first this library catalogued the material acquired for all the others; then a number of them were able in their turn to computerise and thus contribute directly to the union catalogue of the national museum libraries. This can now be consulted on the internet site of the Ministry of Culture.


2016 ◽  
Vol 39 (3) ◽  
pp. 341-356 ◽  
Author(s):  
Olivia Rose Marcus ◽  
Merrill Singer

In this article, the authors provide a layered analysis of Ebola-chan, a visual cultural artifact of the 2014–2015 Ebola outbreak. Rather than considering her as a two-dimensional anime character (i.e. as a simple iconic coping mechanism and/or a fear response), this recent Internet meme is analyzed using an integrated semiotic and structural approach that involves discussion of the genesis of disaster humor in light of the changing world of the Internet, the history of anthropomorphism of disease, and the biosocial nature of an infectious disease epidemic. Our analysis is designed to advance both the anthropology of the Internet and the anthropology of infectious disease. As a multi-vocal symbol with different meanings for different audiences, Ebola-chan represents a social response to a lethal epidemic in the digital age.


Author(s):  
Dave Headlam

The information age has pushed music performance into the era of music informance, in which information and performance are combined in an integrated way. The types of presentation formats and analytical information found in public music theory are ideal for music informance, and present-day explorations of informance on the Internet have a history of noted musical informants including Leonard Bernstein and Glenn Gould. In order to continue to be relevant and to thrive in our connected world, live and recorded music scenarios need to develop ever more innovative ways to enhance music performance with information effectively presented in music informance.


2021 ◽  
pp. 1-13
Author(s):  
Fernando Rebollar ◽  
Rocío Aldeco-Perez ◽  
Marco A. Ramos

The general population increasingly uses digital services, meaning services which are delivered over the internet or an electronic network, and events such as pandemics have accelerated the need of using new digital services. Governments have also increased their number of digital services, however, these digital services still lack of sufficient information security, particularly integrity. Blockchain uses cryptographic techniques that allow decentralization and increase the integrity of the information it handles, but it still has disadvantages in terms of efficiency, making it incapable of implementing some digital services where a high rate of transactions are required. In order to increase its efficient, a multi-layer proposal based on blockchain is presented. It has four layers, where each layer specializes in a different type of information and uses properties of public blockchain and private blockchain. An statistical analysis is performed and the proposal is modeled showing that it maintains and even increases the integrity of the information while preserving the efficiency of transactions. Besides, the proposal can be flexible and adapt to different types of digital services. It also considers that voluntary nodes participate in the decentralization of information making it more secure, verifiable, transparent and reliable.


Author(s):  
Rodney A. Smolla

This personal and frank book offers an insider's view on the violent confrontations in Charlottesville during the “summer of hate.” Blending memoir, courtroom drama, and a consideration of the unhealed wound of racism in our society, the book shines a light on the conflict between the value of free speech and the protection of civil rights. The author has spent his career in the thick of these tempestuous and fraught issues, from acting as lead counsel in a famous Supreme Court decision challenging Virginia's law against burning crosses, to serving as co-counsel in a libel suit brought by a fraternity against Rolling Stone magazine for publishing an article alleging that one of the fraternity's initiation rituals included gang rape. The author has also been active as a university leader, serving as dean of three law schools and president of one and railing against hate speech and sexual assault on US campuses. Well before the tiki torches cast their ominous shadows across the nation, the city of Charlottesville sought to relocate the Unite the Right rally; the author was approached to represent the alt-right groups. Though the author declined, he came to wonder what his history of advocacy had wrought. Feeling unsettlingly complicit, the author joined the Charlottesville Task Force, and realized that the events that transpired there had meaning and resonance far beyond a singular time and place. Why, he wonders, has one of our foundational rights created a land in which such tragic clashes happen all too frequently?


Sign in / Sign up

Export Citation Format

Share Document