SlideShare a Scribd company logo
1 of 11
Internet Censorship Mike McKenty, Erin Kelly, Nick Lubsen, Pat Walsh
Censorship on Facebook Privacy regarding “News Feed” and/or Personal Information. Content posted or shared Content Monitered
Censorship on Facebook Censoring pictures uploaded/User Interface Inappropriate pictures are banned If posted, facebook automatically blocks viewers from viewing the picture Myspace not strongly controlled, Facebook strongly controlled.
Censorship on Facebook Student-police relationship  Police are permitted to create any fake name they want. Can they convict people for what they post on Facebook? Causes self-censorship or inhibition
Email Censorship Spam programs Block hackers from getting into email. Possibility for these programs to backfire.
Email Censorship Government controlled Allowed to hack into personal accounts. Great debate over this access. Some feel it is an invasion of privacy, others believe it’s to protect the U.S. from foreign invaders.
Email Censorship Bulk email is usually blocked. Advertisements are blocked. Selling email addresses to other companies for money. Precautions for concern of spam.
Censorship Within Google Started in late 1990’s Dramatically risen Controversy in China Google is torn between core values, and profit Censorship is number one barrier
Censorship Within Google Asia and Middle East Google becoming greedy “don’t be evil” philosophy Human rights activist get involved
Censorship Within Google Youtube becoming a problem Renouncing Censorship Google’s growth continues
Video on Internet Censorship http://www.youtube.com/watch?v=XPAvg6CU6sI

More Related Content

What's hot

Privacy issues in social networking
Privacy issues in social networkingPrivacy issues in social networking
Privacy issues in social networkingBryan Tran
 
The Dark Side of Social Media: Privacy Concerns
The Dark Side of Social Media: Privacy ConcernsThe Dark Side of Social Media: Privacy Concerns
The Dark Side of Social Media: Privacy ConcernsCorinne Weisgerber
 
Online Safety Tips for Parents
Online Safety Tips for ParentsOnline Safety Tips for Parents
Online Safety Tips for ParentsKristi Richburg
 
How to keep your teens safe on social media
How to keep your teens safe on social mediaHow to keep your teens safe on social media
How to keep your teens safe on social mediaKwazi Communications
 
Social Media And Privacy October 9 2009
Social Media And Privacy October 9 2009Social Media And Privacy October 9 2009
Social Media And Privacy October 9 2009canadianlawyer
 
Dangers to social media
Dangers to social mediaDangers to social media
Dangers to social mediaRyan Ward
 
Social Media and Media Abuse for Parents
Social Media and Media Abuse for ParentsSocial Media and Media Abuse for Parents
Social Media and Media Abuse for ParentsDave Tinker, CFRE
 
Social media privacy issues
Social media privacy issuesSocial media privacy issues
Social media privacy issuesNousheen Arshad
 
Social media security
Social media securitySocial media security
Social media securityMosoco Ltd
 
Social Network Privacy, Security and Identity:One
Social Network Privacy, Security and Identity:OneSocial Network Privacy, Security and Identity:One
Social Network Privacy, Security and Identity:OneInflection Point Global
 
Social Media for Police Departments
Social Media for Police DepartmentsSocial Media for Police Departments
Social Media for Police DepartmentsTurell Group
 
Kyle Cyber Bullying
Kyle Cyber BullyingKyle Cyber Bullying
Kyle Cyber Bullyinghoskei
 
Social Media Basics: Security Loopholes with Twitter & Other Social Media
Social Media Basics: Security Loopholes with Twitter & Other Social MediaSocial Media Basics: Security Loopholes with Twitter & Other Social Media
Social Media Basics: Security Loopholes with Twitter & Other Social MediaTyler Shields
 
L2 rules of netiquette
L2 rules of netiquetteL2 rules of netiquette
L2 rules of netiquetterowenick
 

What's hot (19)

Privacy issues in social networking
Privacy issues in social networkingPrivacy issues in social networking
Privacy issues in social networking
 
Cyber stalking
Cyber stalking Cyber stalking
Cyber stalking
 
The Dark Side of Social Media: Privacy Concerns
The Dark Side of Social Media: Privacy ConcernsThe Dark Side of Social Media: Privacy Concerns
The Dark Side of Social Media: Privacy Concerns
 
Online Safety Tips for Parents
Online Safety Tips for ParentsOnline Safety Tips for Parents
Online Safety Tips for Parents
 
Social Media Safety Tips
Social Media Safety TipsSocial Media Safety Tips
Social Media Safety Tips
 
How to keep your teens safe on social media
How to keep your teens safe on social mediaHow to keep your teens safe on social media
How to keep your teens safe on social media
 
Social Media And Privacy October 9 2009
Social Media And Privacy October 9 2009Social Media And Privacy October 9 2009
Social Media And Privacy October 9 2009
 
Dangers to social media
Dangers to social mediaDangers to social media
Dangers to social media
 
Social Media and Media Abuse for Parents
Social Media and Media Abuse for ParentsSocial Media and Media Abuse for Parents
Social Media and Media Abuse for Parents
 
Social media privacy issues
Social media privacy issuesSocial media privacy issues
Social media privacy issues
 
cyber stalking
cyber stalking cyber stalking
cyber stalking
 
Social media-threats
Social media-threatsSocial media-threats
Social media-threats
 
Social media security
Social media securitySocial media security
Social media security
 
Social Network Privacy, Security and Identity:One
Social Network Privacy, Security and Identity:OneSocial Network Privacy, Security and Identity:One
Social Network Privacy, Security and Identity:One
 
Social Media for Police Departments
Social Media for Police DepartmentsSocial Media for Police Departments
Social Media for Police Departments
 
Kyle Cyber Bullying
Kyle Cyber BullyingKyle Cyber Bullying
Kyle Cyber Bullying
 
Social Media Basics: Security Loopholes with Twitter & Other Social Media
Social Media Basics: Security Loopholes with Twitter & Other Social MediaSocial Media Basics: Security Loopholes with Twitter & Other Social Media
Social Media Basics: Security Loopholes with Twitter & Other Social Media
 
Stephanie nichole ho
Stephanie nichole hoStephanie nichole ho
Stephanie nichole ho
 
L2 rules of netiquette
L2 rules of netiquetteL2 rules of netiquette
L2 rules of netiquette
 

Viewers also liked

Censorship Powerpoint
Censorship PowerpointCensorship Powerpoint
Censorship Powerpointmmentis117
 
Internet Censorship
Internet CensorshipInternet Censorship
Internet Censorshipqwsny
 
Internet censorship
Internet censorshipInternet censorship
Internet censorshipmateo davis
 
Censorship in Media by Terence J. Grant
Censorship in Media by Terence J. GrantCensorship in Media by Terence J. Grant
Censorship in Media by Terence J. GrantTerence J. Grant
 
Censorship on the Internet
Censorship on the InternetCensorship on the Internet
Censorship on the Internetno0orcom
 
Censorship essay
Censorship essayCensorship essay
Censorship essayOliviaBolt
 
Internet Censorship
Internet CensorshipInternet Censorship
Internet Censorshipbecnicholas
 
Censorship essay (2)
Censorship essay (2)Censorship essay (2)
Censorship essay (2)OliviaBolt
 
G+ do's & don'ts
G+ do's & don'ts G+ do's & don'ts
G+ do's & don'ts Zaydaploon
 
Understanding hate speech within a digital context
Understanding hate speech within a digital contextUnderstanding hate speech within a digital context
Understanding hate speech within a digital contextLeeRoyChetty
 
Internet Censorship across the World
Internet Censorship across the WorldInternet Censorship across the World
Internet Censorship across the WorldNitine
 
internet filtering and government legislation
internet filtering and government legislationinternet filtering and government legislation
internet filtering and government legislationlily_ji
 
10과 internet censorship
10과 internet censorship10과 internet censorship
10과 internet censorshipKyeongah So
 
Aeon management reviews velachery/ aeon Management Chennai
Aeon management  reviews velachery/ aeon Management ChennaiAeon management  reviews velachery/ aeon Management Chennai
Aeon management reviews velachery/ aeon Management ChennaiAEON MANAGEMENT LIMITED
 
Censorship and Media (COMM514): Session #2
Censorship and Media (COMM514): Session #2Censorship and Media (COMM514): Session #2
Censorship and Media (COMM514): Session #2pergam
 

Viewers also liked (20)

Censorship Powerpoint
Censorship PowerpointCensorship Powerpoint
Censorship Powerpoint
 
Internet Censorship
Internet CensorshipInternet Censorship
Internet Censorship
 
Censorship
CensorshipCensorship
Censorship
 
Internet censorship
Internet censorshipInternet censorship
Internet censorship
 
Censorship in Media by Terence J. Grant
Censorship in Media by Terence J. GrantCensorship in Media by Terence J. Grant
Censorship in Media by Terence J. Grant
 
Censorship on the Internet
Censorship on the InternetCensorship on the Internet
Censorship on the Internet
 
Censorship essay
Censorship essayCensorship essay
Censorship essay
 
Internet Censorship
Internet CensorshipInternet Censorship
Internet Censorship
 
Censorship
CensorshipCensorship
Censorship
 
Censorship in Media
Censorship in MediaCensorship in Media
Censorship in Media
 
Media censorship
Media censorshipMedia censorship
Media censorship
 
Censorship essay (2)
Censorship essay (2)Censorship essay (2)
Censorship essay (2)
 
G+ do's & don'ts
G+ do's & don'ts G+ do's & don'ts
G+ do's & don'ts
 
Understanding hate speech within a digital context
Understanding hate speech within a digital contextUnderstanding hate speech within a digital context
Understanding hate speech within a digital context
 
Internet censorship
Internet censorshipInternet censorship
Internet censorship
 
Internet Censorship across the World
Internet Censorship across the WorldInternet Censorship across the World
Internet Censorship across the World
 
internet filtering and government legislation
internet filtering and government legislationinternet filtering and government legislation
internet filtering and government legislation
 
10과 internet censorship
10과 internet censorship10과 internet censorship
10과 internet censorship
 
Aeon management reviews velachery/ aeon Management Chennai
Aeon management  reviews velachery/ aeon Management ChennaiAeon management  reviews velachery/ aeon Management Chennai
Aeon management reviews velachery/ aeon Management Chennai
 
Censorship and Media (COMM514): Session #2
Censorship and Media (COMM514): Session #2Censorship and Media (COMM514): Session #2
Censorship and Media (COMM514): Session #2
 

Similar to Internet Censorship Power Point

Cohoes Jan 13 Cyberbullying
Cohoes Jan 13 CyberbullyingCohoes Jan 13 Cyberbullying
Cohoes Jan 13 Cyberbullyingkschermerhorn
 
Lecture in Empowerment Technologies week 2.pptx
Lecture in Empowerment Technologies week 2.pptxLecture in Empowerment Technologies week 2.pptx
Lecture in Empowerment Technologies week 2.pptxDominicCaling
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber BullyingTeamBanana
 
How big is your digital footprint fall 2012
How big is your digital footprint fall 2012How big is your digital footprint fall 2012
How big is your digital footprint fall 2012kschermerhorn
 
Learn internet governance initiative child online safety by shreedeep rayamaj...
Learn internet governance initiative child online safety by shreedeep rayamaj...Learn internet governance initiative child online safety by shreedeep rayamaj...
Learn internet governance initiative child online safety by shreedeep rayamaj...Shreedeep Rayamajhi
 
Learn internet governance initiative child online safety by shreedeep rayamaj...
Learn internet governance initiative child online safety by shreedeep rayamaj...Learn internet governance initiative child online safety by shreedeep rayamaj...
Learn internet governance initiative child online safety by shreedeep rayamaj...Shreedeep Rayamajhi
 
Disadvantages of Digital Identity
Disadvantages of Digital IdentityDisadvantages of Digital Identity
Disadvantages of Digital IdentityDigital-identity
 
Cyber bullyingchurch
Cyber bullyingchurchCyber bullyingchurch
Cyber bullyingchurchJack Jones
 
Kevin Cullen Cyber Bullying
Kevin Cullen Cyber BullyingKevin Cullen Cyber Bullying
Kevin Cullen Cyber BullyingKevin
 
Social media is a waste of time
Social media is a waste of timeSocial media is a waste of time
Social media is a waste of timeHamseOmer1
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullyingkpwillia
 
Post 1CyberstalkingCyberstalking is defined as the online st.docx
Post 1CyberstalkingCyberstalking is defined as the online st.docxPost 1CyberstalkingCyberstalking is defined as the online st.docx
Post 1CyberstalkingCyberstalking is defined as the online st.docxstilliegeorgiana
 

Similar to Internet Censorship Power Point (20)

Media Law
Media LawMedia Law
Media Law
 
Cohoes Jan 13 Cyberbullying
Cohoes Jan 13 CyberbullyingCohoes Jan 13 Cyberbullying
Cohoes Jan 13 Cyberbullying
 
Stephanie nichole ho
Stephanie nichole hoStephanie nichole ho
Stephanie nichole ho
 
Lecture in Empowerment Technologies week 2.pptx
Lecture in Empowerment Technologies week 2.pptxLecture in Empowerment Technologies week 2.pptx
Lecture in Empowerment Technologies week 2.pptx
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullying
 
How big is your digital footprint fall 2012
How big is your digital footprint fall 2012How big is your digital footprint fall 2012
How big is your digital footprint fall 2012
 
Learn internet governance initiative child online safety by shreedeep rayamaj...
Learn internet governance initiative child online safety by shreedeep rayamaj...Learn internet governance initiative child online safety by shreedeep rayamaj...
Learn internet governance initiative child online safety by shreedeep rayamaj...
 
Learn internet governance initiative child online safety by shreedeep rayamaj...
Learn internet governance initiative child online safety by shreedeep rayamaj...Learn internet governance initiative child online safety by shreedeep rayamaj...
Learn internet governance initiative child online safety by shreedeep rayamaj...
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Boushrat 9 a
Boushrat   9 aBoushrat   9 a
Boushrat 9 a
 
Disadvantages of Digital Identity
Disadvantages of Digital IdentityDisadvantages of Digital Identity
Disadvantages of Digital Identity
 
Cyber bullyingchurch
Cyber bullyingchurchCyber bullyingchurch
Cyber bullyingchurch
 
Negative effects of Facebook Use
Negative effects of Facebook UseNegative effects of Facebook Use
Negative effects of Facebook Use
 
Kevin Cullen Cyber Bullying
Kevin Cullen Cyber BullyingKevin Cullen Cyber Bullying
Kevin Cullen Cyber Bullying
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Social media is a waste of time
Social media is a waste of timeSocial media is a waste of time
Social media is a waste of time
 
Cyberbullying and Cybercrime
Cyberbullying and CybercrimeCyberbullying and Cybercrime
Cyberbullying and Cybercrime
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Facebook
FacebookFacebook
Facebook
 
Post 1CyberstalkingCyberstalking is defined as the online st.docx
Post 1CyberstalkingCyberstalking is defined as the online st.docxPost 1CyberstalkingCyberstalking is defined as the online st.docx
Post 1CyberstalkingCyberstalking is defined as the online st.docx
 

Recently uploaded

Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 

Recently uploaded (20)

Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 

Internet Censorship Power Point

  • 1. Internet Censorship Mike McKenty, Erin Kelly, Nick Lubsen, Pat Walsh
  • 2. Censorship on Facebook Privacy regarding “News Feed” and/or Personal Information. Content posted or shared Content Monitered
  • 3. Censorship on Facebook Censoring pictures uploaded/User Interface Inappropriate pictures are banned If posted, facebook automatically blocks viewers from viewing the picture Myspace not strongly controlled, Facebook strongly controlled.
  • 4. Censorship on Facebook Student-police relationship Police are permitted to create any fake name they want. Can they convict people for what they post on Facebook? Causes self-censorship or inhibition
  • 5. Email Censorship Spam programs Block hackers from getting into email. Possibility for these programs to backfire.
  • 6. Email Censorship Government controlled Allowed to hack into personal accounts. Great debate over this access. Some feel it is an invasion of privacy, others believe it’s to protect the U.S. from foreign invaders.
  • 7. Email Censorship Bulk email is usually blocked. Advertisements are blocked. Selling email addresses to other companies for money. Precautions for concern of spam.
  • 8. Censorship Within Google Started in late 1990’s Dramatically risen Controversy in China Google is torn between core values, and profit Censorship is number one barrier
  • 9. Censorship Within Google Asia and Middle East Google becoming greedy “don’t be evil” philosophy Human rights activist get involved
  • 10. Censorship Within Google Youtube becoming a problem Renouncing Censorship Google’s growth continues
  • 11. Video on Internet Censorship http://www.youtube.com/watch?v=XPAvg6CU6sI