Covering topics ranging from web filters to laws aimed at preventing the flow of information, this book explores freedom-and censorship-of the Internet and considers the advantages and disadvantages of policies at each end of the spectrum. Combining reference entries with perspective essays, this timely book undertakes an impartial exploration of Internet censorship, examining the two sides of the debate in depth. On the one side are those who believe censorship, to a greater or lesser degree, is acceptable; on the other are those who play the critical role of information freedom fighters. In…mehr
Covering topics ranging from web filters to laws aimed at preventing the flow of information, this book explores freedom-and censorship-of the Internet and considers the advantages and disadvantages of policies at each end of the spectrum. Combining reference entries with perspective essays, this timely book undertakes an impartial exploration of Internet censorship, examining the two sides of the debate in depth. On the one side are those who believe censorship, to a greater or lesser degree, is acceptable; on the other are those who play the critical role of information freedom fighters. In Internet Censorship: A Reference Handbook , experts help readers understand these diverse views on Internet access and content viewing, revealing how both groups do what they do and why. The handbook shares key events associated with the Internet's evolution, starting with its beginnings and culminating in the present. It probes the motivation of newsmakers like Julian Assange, the Anonymous, and WikiLeaks hacker groups, and of risk-takers like Private Bradley Manning. It also looks at ways in which Internet censorship is used as an instrument of governmental control and at the legal and moral grounds cited to defend these policies, addressing, for example, why the governments of China and Iran believe it is their duty to protect citizens by filtering online content believed to be harmful.Hinweis: Dieser Artikel kann nur an eine deutsche Lieferadresse ausgeliefert werden.
Die Herstellerinformationen sind derzeit nicht verfügbar.
Autorenporträt
Bernadette H. Schell
Inhaltsangabe
Preface 1 Background and History Internet Censorship Defined Censorship versus National Security, and Why There Will Never be Total Freedom of the Press or a Total Lack of Press and Internet Censorship Adequate Information Release by Governments versus Internet Censorship: WikiLeaks, Manning, and Snowden What the Internet Is as Compared to an Intranet The Internet's Colorful History: Internet Development, Hacking Exploits, and (Eventually) Concerns about Internet Censorship The Global Growth of Internet Usage Gaining Authorized and Unauthorized Access to the Internet-and How Hacking May Be Related to Internet Censorship Online Users' Concerns about Censorship and the General State of Online Censorship in 2012 Conclusion References 2 Problems, Controversies, and Solutions A Look at PC, Mobile Phone, and Internet Usage Globally Cultural and Legal Jurisdictional Factors Influencing the Digital Divide The Differences between Freedom of Information, Internet Freedom, and Internet Censorship Recent Trends in Internet Censorship According to the Freedom on the Net 2012 Report Online Activities in Jurisdictions "Under the Microscope": Their Strong Support for Internet Openness and Their Hard-Core Tactics Used to Reinforce Internet Censorship The Role of Web Filters and Firewalls, Business-Government Policies, and Laws Aimed at Internet Censorship The Internet's Continuing Evolution: A Comparison of Internet Censorship in 2005 and 2012 Key Tactics That Have Restricted Free Speech and Encouraged Internet Censorship in Countries in Recent Years How Can Progress Continue to Be Made in Reducing Internet Censorship? Conclusion References 3 Perspectives Hacktivism, Cyber Warriors, and Censorship, Thomas J. Holt Internet Censorship and the European Union: External Cohesiveness versus Internal Disharmony, Michael Johns 30 Years after Orwell's Nineteen Eighty-Four: Pseudo-Privacy Online, Michael Bachmann Cybersecurity Is Not Censorship, Dorothy E. Denning Between Liberty and Harmony: Philosophical Perspectives on Censorship in the Age of the Internet, Alanda D. Theriault 4 Profiles 2600: The Hacker Quarterly American Civil Liberties Union Anonymous Julian Assange (1971-) Black Hat and DefCon Hacker Conferences The Page-Brin Google, Inc. Team Canada's Copyright Modernization Act of 2012 (Formerly Bill C-11) Cran Campbell (1949-) Center for Internet and Society Citizen Lab at the University of Toronto Copyright Armageddon: 3D Printers Electronic Frontier Foundation Freedom House William H. Gates (a.k.a Bill Gates) (1955-) Iceland's Planned Internet Porn Ban Steve Jobs (1955-2011) and Steve Wozniak ("The Woz") (1950-) Liu Xiabo (1955-) and Liu Xia (1959-) Bradley Manning (a.k.a Chelsea 1988-) OpenNet Initiative Psiphon Software Public Knowledge Reporters Without Borders Neda Salehi (1983-2009) Yekaterina Samutsevich (1983-) Edward Snowden (1984-) Aaron Swartz (1987-2013) The Censorware Project Trans-Pacific Partnership Agreement WikiLeaks Malala Yousafzai (1998-) Bassem Youssef (1975-) References 5 Data and Documents Statistics on Internet Usage Worldwide A Closer Look at the Freedom on the Net 2012 Findings Internet Legislation in the United States Related to Privacy, Security, Trust, and Censorship 18 U.S.C. Health Insurance Portability and Accountability Act of 1996 Digital Millennium Copyright Act of 1998 Gramm-Leach Bliley Act of 1999 (Financial Services Modernization Act) Trademark Law, Patent Law, and the U.S. Anti-cybersquatting Consumer Protection Act of 1999 USA PATRIOT Act of 2001 and PATRIOT Act II Cybersecurity Enhancement Act of 2002 or Homeland Security Act of 2002 PROTECT Act of 2003, COPPA of 1998, and CIPA of 2000 CAN-SPAM Act of 2003 Cybersecurity Enhancement Act of 2005/2002 Recent Internet Laws Not Passed in the United States Related to Privacy, Security, Trust, and Censorship: CISPA, SOPA, and PIPA-and Why SOPA and PIPA Internet Legislation Attempts Globally Related to Privacy, Security,Trust, and Censorship: The Budapest Convention on Cybercrime Anti-Counterfeiting Trade Agreement Trans-Pacific Partnership Agreement The United Nations: Unprecedented Power over Web Content and Infrastructure? Conclusion References 6 Resources 7 Chronology Glossary Index About the Author
Preface 1 Background and History Internet Censorship Defined Censorship versus National Security, and Why There Will Never be Total Freedom of the Press or a Total Lack of Press and Internet Censorship Adequate Information Release by Governments versus Internet Censorship: WikiLeaks, Manning, and Snowden What the Internet Is as Compared to an Intranet The Internet's Colorful History: Internet Development, Hacking Exploits, and (Eventually) Concerns about Internet Censorship The Global Growth of Internet Usage Gaining Authorized and Unauthorized Access to the Internet-and How Hacking May Be Related to Internet Censorship Online Users' Concerns about Censorship and the General State of Online Censorship in 2012 Conclusion References 2 Problems, Controversies, and Solutions A Look at PC, Mobile Phone, and Internet Usage Globally Cultural and Legal Jurisdictional Factors Influencing the Digital Divide The Differences between Freedom of Information, Internet Freedom, and Internet Censorship Recent Trends in Internet Censorship According to the Freedom on the Net 2012 Report Online Activities in Jurisdictions "Under the Microscope": Their Strong Support for Internet Openness and Their Hard-Core Tactics Used to Reinforce Internet Censorship The Role of Web Filters and Firewalls, Business-Government Policies, and Laws Aimed at Internet Censorship The Internet's Continuing Evolution: A Comparison of Internet Censorship in 2005 and 2012 Key Tactics That Have Restricted Free Speech and Encouraged Internet Censorship in Countries in Recent Years How Can Progress Continue to Be Made in Reducing Internet Censorship? Conclusion References 3 Perspectives Hacktivism, Cyber Warriors, and Censorship, Thomas J. Holt Internet Censorship and the European Union: External Cohesiveness versus Internal Disharmony, Michael Johns 30 Years after Orwell's Nineteen Eighty-Four: Pseudo-Privacy Online, Michael Bachmann Cybersecurity Is Not Censorship, Dorothy E. Denning Between Liberty and Harmony: Philosophical Perspectives on Censorship in the Age of the Internet, Alanda D. Theriault 4 Profiles 2600: The Hacker Quarterly American Civil Liberties Union Anonymous Julian Assange (1971-) Black Hat and DefCon Hacker Conferences The Page-Brin Google, Inc. Team Canada's Copyright Modernization Act of 2012 (Formerly Bill C-11) Cran Campbell (1949-) Center for Internet and Society Citizen Lab at the University of Toronto Copyright Armageddon: 3D Printers Electronic Frontier Foundation Freedom House William H. Gates (a.k.a Bill Gates) (1955-) Iceland's Planned Internet Porn Ban Steve Jobs (1955-2011) and Steve Wozniak ("The Woz") (1950-) Liu Xiabo (1955-) and Liu Xia (1959-) Bradley Manning (a.k.a Chelsea 1988-) OpenNet Initiative Psiphon Software Public Knowledge Reporters Without Borders Neda Salehi (1983-2009) Yekaterina Samutsevich (1983-) Edward Snowden (1984-) Aaron Swartz (1987-2013) The Censorware Project Trans-Pacific Partnership Agreement WikiLeaks Malala Yousafzai (1998-) Bassem Youssef (1975-) References 5 Data and Documents Statistics on Internet Usage Worldwide A Closer Look at the Freedom on the Net 2012 Findings Internet Legislation in the United States Related to Privacy, Security, Trust, and Censorship 18 U.S.C. Health Insurance Portability and Accountability Act of 1996 Digital Millennium Copyright Act of 1998 Gramm-Leach Bliley Act of 1999 (Financial Services Modernization Act) Trademark Law, Patent Law, and the U.S. Anti-cybersquatting Consumer Protection Act of 1999 USA PATRIOT Act of 2001 and PATRIOT Act II Cybersecurity Enhancement Act of 2002 or Homeland Security Act of 2002 PROTECT Act of 2003, COPPA of 1998, and CIPA of 2000 CAN-SPAM Act of 2003 Cybersecurity Enhancement Act of 2005/2002 Recent Internet Laws Not Passed in the United States Related to Privacy, Security, Trust, and Censorship: CISPA, SOPA, and PIPA-and Why SOPA and PIPA Internet Legislation Attempts Globally Related to Privacy, Security,Trust, and Censorship: The Budapest Convention on Cybercrime Anti-Counterfeiting Trade Agreement Trans-Pacific Partnership Agreement The United Nations: Unprecedented Power over Web Content and Infrastructure? Conclusion References 6 Resources 7 Chronology Glossary Index About the Author
Es gelten unsere Allgemeinen Geschäftsbedingungen: www.buecher.de/agb
Impressum
www.buecher.de ist ein Internetauftritt der buecher.de internetstores GmbH
Geschäftsführung: Monica Sawhney | Roland Kölbl | Günter Hilger
Sitz der Gesellschaft: Batheyer Straße 115 - 117, 58099 Hagen
Postanschrift: Bürgermeister-Wegele-Str. 12, 86167 Augsburg
Amtsgericht Hagen HRB 13257
Steuernummer: 321/5800/1497
USt-IdNr: DE450055826