Filtering Online Content in China

Author(s):  
Jyh-An Lee

This chapter focuses on the Internet filtering mechanism the Chinese government adopted in order to prevent individual users from accessing foreign online content. Based on the case of Internet filtering in China, the author argues that when citizens are regulated by code rather than by the law, they will experience and perceive such code-based controls as natural. From the Chinese case, it should also be noted that the Internet’s effects on politics varies depending upon how its architecture is designed.

Author(s):  
Jeffrey Lane

Chapter 5 shows how the law works on the digital street. It reveals a new approach to gang suppression based on the editorial control of suspects’ online content. This chapter addresses a series of gang indictments in which police and prosecutors utilized social media to define and prosecute youth crews under conspiracy law, a practice that emerged as a stop-and-frisk method on the physical street lost legitimacy. The author shows how prosecutors learned to marshal social media as criminal evidence. This chapter explores also the pushback by teenagers whose code-switching strategies evolved to manage police suspicion. It considers gains in public safety and the collateral costs of the indictments.


2007 ◽  
Vol 7 (1) ◽  
pp. 17-19 ◽  
Author(s):  
Gerry Power

Gerry Power was invited to go to the University of Jos in April 2006 to present workshops to the Law Faculty and other interested legal professionals on using the internet for legal research. He writes about his experiences in dealing with running online workshops whilst coping with electricity shortages and the incredible experience of Nigeria!


2018 ◽  
Vol 14 (2) ◽  
pp. NP1-NP2

James E.K. Parker, Towards an Acoustic Jurisprudence: Law and the Long Range Acoustic Device, Law, Culture and the Humanities (LCH). DOI: 10.1177/1743872115615502 The following corrections have been made to the article: Under heading III.1, another paragraph has been added. This paragraph begins ‘Whereas normal loudspeaker works…’ Under heading III.2, a paragraph has been edited: ‘In effect, what ATC did with the LRAD…’ Under heading III.2, the first sentence of the last paragraph has been expanded to clarify that the G-20 summit was held in Pittsburgh: The LRAD seems to have been used by police for the first time in Georgia in 2007, before receiving its first and most notorious outing on American soil in September 2009 at protests relating to the G-20 Summit being held in Pittsburgh.66 Under heading III.4, the sentence below in the second paragraph has been changed as follows: The law of property provides the conditions for the circulation and ownership of knowledge that enable developments in the science of acoustics at a US university in the 1950s to re-emerge as failed commercial prototypes in Japan in the 1980s only to be taken up again in 1996 by ACT before being patented, trademarked and marketed first as HSS® and then as the LRAD.82 Under heading III.4, the following has been added to the end of the paragraph ‘If the LRAD was originally imagined…’: Not that the presiding judge in the Toronto case would know however. In his discussion of a deposition by Professor David Wood, of Queen’s University, relating to ‘videos posted on the internet’ documenting the LRAD’s use at Pittsburgh, Justice Brown notes that, ‘unfortunately, Professor Wood did not attach any of those media reports or videos as exhibits to his affidavit. As a result, I cannot attach any weight to his statements.’93 Indeed, it’s not clear that any recordings of an LRAD in action were ever actually played in court. As far as I know, the LRAD has yet to feature in the ‘judicial soundscape’. In the conclusion the word ‘copyright’ has been replaced with ‘intellectual property’: The LRAD is the product of diverse institutions, jurisdictions and areas of doctrine, stretching from the law of intellectual property through the law of war to constitutional and labor law. The references and reference numbers have been updated accordingly. All the subsequent versions of the article will be corrected.


2021 ◽  
Vol 2021 ◽  
pp. 1-13
Author(s):  
Qian Huang ◽  
Xue Wen Li

Big data is a massive and diverse form of unstructured data, which needs proper analysis and management. It is another great technological revolution after the Internet, the Internet of Things, and cloud computing. This paper firstly studies the related concepts and basic theories as the origin of research. Secondly, it analyzes in depth the problems and challenges faced by Chinese government management under the impact of big data. Again, we explore the opportunities that big data brings to government management in terms of management efficiency, administrative capacity, and public services and believe that governments should seize opportunities to make changes. Brainlike computing attempts to simulate the structure and information processing process of biological neural network. This paper firstly analyzes the development status of e-government at home and abroad, studies the service-oriented architecture (SOA) and web services technology, deeply studies the e-government and SOA theory, and discusses this based on the development status of e-government in a certain region. Then, the deep learning algorithm is used to construct the monitoring platform to monitor the government behavior in real time, and the deep learning algorithm is used to conduct in-depth mining to analyze the government's intention behavior.


2021 ◽  
Vol 2 (2) ◽  
pp. 416-421
Author(s):  
I Made Satria Wibawa Tangkeban ◽  
I Nyoman Putu Budiartha ◽  
Ni Made Sukaryati Karma

The internet is an electronic and information medium that is developing very rapidly. The internet is widely used in various activities, namely trade, trading activities that use the internet known as e-commerce. Trading on the internet itself raises many problems related to the law and all its risks. Problems that can arise include default. The research aims are to analyze the rights and obligations of the parties in buying and selling transactions via Instagram and the legal consequences that arise if the seller in the sale and purchase transaction through Instagram defaults. The research method used is normative legal research, with using statutory approach. Primary sources of legal materials, sources of secondary legal materials were analyzed using systematic interpretation techniques. The result shows that in the buying and selling activities carried out on Instagram, there are often deviations in rights and obligations that are no longer in accordance with existing norms in society and legal remedies that can be taken if there is a default from one of the parties, be it the seller. and buyers who make online transactions can be sued within the environment of the general court or outside the court and can be subject to direct fines for parties who do not perform in default.


Author(s):  
Clinton Fernandes ◽  
Vijay Sivaraman

This article examines the implications of selected aspects of the Telecommunications (Interception and Access) Amendment (Data Retention) Act 2015, which was passed by the Australian Parliament in March 2015. It shows how the new law has strengthened protections for privacy. However, focusing on the investigatory implications, it shows how the law provides a tactical advantage to investigators who pursue whistleblowers and investigative journalists. The article exposes an apparent discrepancy in the way ‘journalist’ is defined across different pieces of legislation. It argues that although legislators’ interest has been overwhelmingly focused on communications data, the explosion of data generated by the so-called Internet-of-Things (IoT) is as important or more. It shows how the sensors in selected IoT devices lead to a loss of user control and will enable non-stop, involuntary and ubiquitous monitoring of individuals. It suggests that the law will need to be amended further once legislators and investigators’ knowledge of the potential of IoT increases. 


2012 ◽  
Vol 210 ◽  
pp. 398-418 ◽  
Author(s):  
Yan Hairong ◽  
Barry Sautman

AbstractA recent addition to the global discourse of China's interaction with developing countries has been the claim that the Chinese government exports prison labour to these countries. While no evidence is ever presented to support this claim, it has been widely circulated in international and local media, as well as on the internet. This article examines the origins of the rumour and the mechanisms of its transmission. It shows that while the rumour often originates at the grass roots in developing countries, it is promoted locally and globally by political, economic and media elites with distinct agendas that often involve building support for opposition parties, competition in obtaining contracts, or geo-strategic and ideological rivalry. We analyse the rumour's circulation in light of the larger discourse on China and developing countries, and discuss why Chinese official responses to the claim have proved to be ineffective.


2017 ◽  
pp. 251
Author(s):  
Е. И. Наумова

This article is about the problem of conflict in the frame of the formation and development postcapitalist tendencies in society. The result of the introduction of digital technologies in economic is the formation of a number of new types of products — information, knowledge, communication. The non-material type of the product doesn’t keep within the settled and a little mobile laws of material economy, that’s why the law of cost and the law of the surplus value need revision. The Internet as a platform for free exchange and distribution of information and knowledges appears the place of deployment of the conflicts between capitalist monopoles, the state and Internet users. It doesn’t exist accurate criteria, methodology and the theory which allow to create a clear boundary between «piracy» and the possibility of free distribution of information in network space. The ideology of Open Source calls into the question copyright and creates prerequisites for revision of the intellectual property rights concerning a digital product. Monetization of knowledge, information, communication in digital space conducts to the fact that the Internet becomes the additional platform for the generation of profit for the monopolistic corporations. Whereas there is a possibility for using an Internet platform as powerful resource for cooperation, mutual aid and collective production of innovations necessary for development of society. The conflict between capitalist corporations, the state and users can be resolved in case of revision the economic and precepts of law in relation to the digital space with the purpose to draw line between lawful and illegal distribution of non-material products, having kept an opportunity for creative and free using the Internet platform as a resource of social production of the innovations.


Sign in / Sign up

Export Citation Format

Share Document