SlideShare a Scribd company logo
1 of 14
Download to read offline
Web Censorship and Public Awareness:
The case of Internet regulation in Japan


              Chris Salzberg
To censor:

to examine in order to suppress or delete anything 
            considered objectionable

               (Merriam­Webster)
What does “Web Censorship” mean?

    Different meanings in different contexts:
    
        Censorship by governments against freedom of expression 
        and free access to information
    
        Filtering of content seen as “harmful” to society
    
        Violation of privacy rights: web monitoring, eavesdropping
    
        “Censorship” against file sharing (copyrighted content)

    What is “anti­censorship”?
“The Age of Net Regulation is Coming”
 
     In the last year, moves toward net regulation:
     1.Internet content (transmission + broadcasting = ?)
     2.Copyright legislation (file sharing)
     3.Mobile web access (filtering, “harmful” content)
 
     Fears about: “deai” (dating) sites, obscene/voilent 
     content, child porn, “adult” anime, net bullying, 
     death threats (Akihabara massacre), etc. etc. etc.
Filtering of “harmful” content

    Bill by LDP/DPJ passed into law on June 11th

    Included in the bill:
    
        Obligation on PC makers to pre­install national 
        standards­based filtering software on PCs/mobile phones
    
        Filtering on mobile phones for users under age 18
    
        ISPs required to eliminate harmful content/services

    Government decides what is “harmful”
Support for Regulation

    A survey on regulation of “harmful content” (2007):
    
        67.8% said the Internet should be regulated
    
        22.7% said they lean toward regulation
    
        3.1% said they lean toward non­regulation
    
        1.4% said the Internet should not be regulated

    76% support web filtering, 51% want police to 
    strengthen monitoring, 87% support manga porn 
    regulation
Opposition to Regulation





    Some of the greatest opposition from companies: 
    DENA, Yahoo, Microsoft, Rakuten, Net Star

    Emphasizing positives of an open Internet
Opposition strategies

    More so than free access to information, opposition 
    strategies emphasize economic considerations:
    
        Regulation will stop innovation/creativity
    
        Japan will be left behind, outcompeted

    Also emphasizes knowledge issues:
    
        Many proposals are technologically contradictory
    
        Lack of transparency in legislation
The “people” are killing the Internet

    Oppression of the people by governments and 
    corporations is not seen as a major concern

    Conern is about other citizens:
    
        Bullying, death threats, dating sites, obscene content, 
        copyright violation, etc. etc.

    Conclusion: it is the people who are killing the 
    Internet, gov't needs to step in and regulate
The future is now





    Citizen media coverage of Akihabara killings:
    
        Instantaneous through Ustream, 2000­3000 viewers
    
        No editing or censorship of footage
    
        Large public backlash, criticism
Summary

    “Web censorship” means different things to 
    different people/groups/nations

    Different opposition strategies:
    
        Technological problems with censorship
    
        Lack of transparency in process
    
        Economic considerations, innovation/creativity

    Awareness and literacy are key

More Related Content

What's hot

Lim Jus394 Sea Censorship
Lim Jus394 Sea CensorshipLim Jus394 Sea Censorship
Lim Jus394 Sea Censorship
merlyna
 
Privacy law and policy 2 - LIS550
Privacy law and policy 2 - LIS550 Privacy law and policy 2 - LIS550
Privacy law and policy 2 - LIS550
Brian Rowe
 
Internet Freedom 2.1
Internet Freedom 2.1Internet Freedom 2.1
Internet Freedom 2.1
Dhruva Jaishankar
 
Open Letter to President Obama Opposing Backdoors and Defective Encryption
Open Letter to President Obama Opposing Backdoors and Defective EncryptionOpen Letter to President Obama Opposing Backdoors and Defective Encryption
Open Letter to President Obama Opposing Backdoors and Defective Encryption
Alvaro Lopez Ortega
 

What's hot (20)

Where next for the Regulation of Investigatory Powers Act?
Where next for the Regulation of Investigatory Powers Act?Where next for the Regulation of Investigatory Powers Act?
Where next for the Regulation of Investigatory Powers Act?
 
Turkey aside
Turkey asideTurkey aside
Turkey aside
 
2019: Regulating disinformation with artificial intelligence (AI)
2019: Regulating disinformation with artificial intelligence (AI)2019: Regulating disinformation with artificial intelligence (AI)
2019: Regulating disinformation with artificial intelligence (AI)
 
Oxford Internet Institute 19 Sept 2019: Disinformation – Platform, publisher ...
Oxford Internet Institute 19 Sept 2019: Disinformation – Platform, publisher ...Oxford Internet Institute 19 Sept 2019: Disinformation – Platform, publisher ...
Oxford Internet Institute 19 Sept 2019: Disinformation – Platform, publisher ...
 
Internet Censorship
Internet CensorshipInternet Censorship
Internet Censorship
 
Artificial intelligence governance in the Obama & Trump years
Artificial intelligence governance in the Obama & Trump yearsArtificial intelligence governance in the Obama & Trump years
Artificial intelligence governance in the Obama & Trump years
 
Lim Jus394 Sea Censorship
Lim Jus394 Sea CensorshipLim Jus394 Sea Censorship
Lim Jus394 Sea Censorship
 
Governance and Information Technology
Governance and Information TechnologyGovernance and Information Technology
Governance and Information Technology
 
Cyber Surveillance - Honors English 1 Presentation
Cyber Surveillance - Honors English 1 PresentationCyber Surveillance - Honors English 1 Presentation
Cyber Surveillance - Honors English 1 Presentation
 
Internet Surveillance
Internet SurveillanceInternet Surveillance
Internet Surveillance
 
The Largest Democracy - India
The Largest Democracy - IndiaThe Largest Democracy - India
The Largest Democracy - India
 
Freedom on the net 2018
Freedom on the net 2018Freedom on the net 2018
Freedom on the net 2018
 
Polinter11
Polinter11Polinter11
Polinter11
 
Privacy law and policy 2 - LIS550
Privacy law and policy 2 - LIS550 Privacy law and policy 2 - LIS550
Privacy law and policy 2 - LIS550
 
Analysis of cyber crime bill 2016
Analysis of cyber crime bill 2016 Analysis of cyber crime bill 2016
Analysis of cyber crime bill 2016
 
Internet Freedom 2.1
Internet Freedom 2.1Internet Freedom 2.1
Internet Freedom 2.1
 
SCL Annual Conference 2019: Regulating social media platforms for interoperab...
SCL Annual Conference 2019: Regulating social media platforms for interoperab...SCL Annual Conference 2019: Regulating social media platforms for interoperab...
SCL Annual Conference 2019: Regulating social media platforms for interoperab...
 
At The Brink of Digital Authoritarian
At The Brink of Digital AuthoritarianAt The Brink of Digital Authoritarian
At The Brink of Digital Authoritarian
 
Computer and network surveillance
Computer and network surveillanceComputer and network surveillance
Computer and network surveillance
 
Open Letter to President Obama Opposing Backdoors and Defective Encryption
Open Letter to President Obama Opposing Backdoors and Defective EncryptionOpen Letter to President Obama Opposing Backdoors and Defective Encryption
Open Letter to President Obama Opposing Backdoors and Defective Encryption
 

Similar to Internetregulationjapan

China’s Internet Security _Dichotomy of National Security and Human Rights in...
China’s Internet Security _Dichotomy of National Security and Human Rights in...China’s Internet Security _Dichotomy of National Security and Human Rights in...
China’s Internet Security _Dichotomy of National Security and Human Rights in...
Emily Võ
 
A week is a long time in computer ethics
A week is a long time in computer ethicsA week is a long time in computer ethics
A week is a long time in computer ethics
UltraUploader
 
Running Head THE CHANGING NATURE OF CYBER CRIME 1 .docx
Running Head THE CHANGING NATURE OF CYBER CRIME 1          .docxRunning Head THE CHANGING NATURE OF CYBER CRIME 1          .docx
Running Head THE CHANGING NATURE OF CYBER CRIME 1 .docx
jeanettehully
 
Freedom of expression
Freedom of expressionFreedom of expression
Freedom of expression
Gerwin Ocsena
 
Manipulating Social Media to Undermine Democracy 2017 Final
Manipulating Social Media to Undermine Democracy 2017 Final Manipulating Social Media to Undermine Democracy 2017 Final
Manipulating Social Media to Undermine Democracy 2017 Final
Alireza Ghahrood
 
Lessons on netfreedom+best practices in cyber security
Lessons on netfreedom+best practices in cyber securityLessons on netfreedom+best practices in cyber security
Lessons on netfreedom+best practices in cyber security
Freedom House
 

Similar to Internetregulationjapan (19)

International politics in the age of the internet
International politics in the age of the internetInternational politics in the age of the internet
International politics in the age of the internet
 
China’s Internet Security _Dichotomy of National Security and Human Rights in...
China’s Internet Security _Dichotomy of National Security and Human Rights in...China’s Internet Security _Dichotomy of National Security and Human Rights in...
China’s Internet Security _Dichotomy of National Security and Human Rights in...
 
Cst group project#2, intro++
Cst group project#2, intro++Cst group project#2, intro++
Cst group project#2, intro++
 
Censorship down under
Censorship down underCensorship down under
Censorship down under
 
Internet governance
Internet governanceInternet governance
Internet governance
 
A week is a long time in computer ethics
A week is a long time in computer ethicsA week is a long time in computer ethics
A week is a long time in computer ethics
 
Digital Repression and Techno-Authoritarianism
Digital Repression and Techno-AuthoritarianismDigital Repression and Techno-Authoritarianism
Digital Repression and Techno-Authoritarianism
 
Internet Censorship across the World
Internet Censorship across the WorldInternet Censorship across the World
Internet Censorship across the World
 
Future of democracy and civic innovation
Future of democracy and civic innovationFuture of democracy and civic innovation
Future of democracy and civic innovation
 
Running Head THE CHANGING NATURE OF CYBER CRIME 1 .docx
Running Head THE CHANGING NATURE OF CYBER CRIME 1          .docxRunning Head THE CHANGING NATURE OF CYBER CRIME 1          .docx
Running Head THE CHANGING NATURE OF CYBER CRIME 1 .docx
 
Freedom of expression
Freedom of expressionFreedom of expression
Freedom of expression
 
"Digital.Report+" - expert magazine for ICT policy professionals
"Digital.Report+" - expert magazine for ICT policy professionals"Digital.Report+" - expert magazine for ICT policy professionals
"Digital.Report+" - expert magazine for ICT policy professionals
 
Moral Censorship on The Internet
Moral Censorship on The InternetMoral Censorship on The Internet
Moral Censorship on The Internet
 
Freedom or Control in Virtual Worlds
Freedom or Control in Virtual WorldsFreedom or Control in Virtual Worlds
Freedom or Control in Virtual Worlds
 
The Rise of Internet Freedom Activism
The Rise of Internet Freedom ActivismThe Rise of Internet Freedom Activism
The Rise of Internet Freedom Activism
 
Texas policy 2016
Texas policy 2016Texas policy 2016
Texas policy 2016
 
Manipulating Social Media to Undermine Democracy 2017 Final
Manipulating Social Media to Undermine Democracy 2017 Final Manipulating Social Media to Undermine Democracy 2017 Final
Manipulating Social Media to Undermine Democracy 2017 Final
 
The securitization of online activism
The securitization of online activismThe securitization of online activism
The securitization of online activism
 
Lessons on netfreedom+best practices in cyber security
Lessons on netfreedom+best practices in cyber securityLessons on netfreedom+best practices in cyber security
Lessons on netfreedom+best practices in cyber security
 

More from rmackinnon

iSummit keynote: Free Culture & Free Speech
iSummit keynote: Free Culture & Free SpeechiSummit keynote: Free Culture & Free Speech
iSummit keynote: Free Culture & Free Speech
rmackinnon
 
China the Internet and Corporate Responsibility
China the Internet and Corporate ResponsibilityChina the Internet and Corporate Responsibility
China the Internet and Corporate Responsibility
rmackinnon
 
Yahoo!, the Shi Tao Case, and lessons for corporate social responsibility
Yahoo!, the Shi Tao Case, and lessons for corporate social responsibilityYahoo!, the Shi Tao Case, and lessons for corporate social responsibility
Yahoo!, the Shi Tao Case, and lessons for corporate social responsibility
rmackinnon
 
Journalism 2.0: The future of news
Journalism 2.0: The future of newsJournalism 2.0: The future of news
Journalism 2.0: The future of news
rmackinnon
 

More from rmackinnon (18)

Can authoritarianism survive the Internet? Yes it can...
Can authoritarianism survive the Internet? Yes it can...Can authoritarianism survive the Internet? Yes it can...
Can authoritarianism survive the Internet? Yes it can...
 
国际互联网治理 - 我们都是国际网民!
国际互联网治理 -我们都是国际网民!国际互联网治理 -我们都是国际网民!
国际互联网治理 - 我们都是国际网民!
 
Document 1: Green Dam Technical Requirements
Document 1: Green Dam Technical RequirementsDocument 1: Green Dam Technical Requirements
Document 1: Green Dam Technical Requirements
 
China's Censorship 2.0 (Green Dam update)
China's Censorship 2.0 (Green Dam update)China's Censorship 2.0 (Green Dam update)
China's Censorship 2.0 (Green Dam update)
 
Internet & Activism: 20 Years After Tiananmen
Internet & Activism: 20 Years After TiananmenInternet & Activism: 20 Years After Tiananmen
Internet & Activism: 20 Years After Tiananmen
 
Lecture @ Fudan J-School
Lecture @ Fudan J-SchoolLecture @ Fudan J-School
Lecture @ Fudan J-School
 
The Tao of the Web: China and the future of the Internet
The Tao of the Web: China and the future of the InternetThe Tao of the Web: China and the future of the Internet
The Tao of the Web: China and the future of the Internet
 
Chinese social media and political discourse
Chinese social media and political discourseChinese social media and political discourse
Chinese social media and political discourse
 
Cyber-ocracy vs. Cyber-tarianism: The Chinese Internet
Cyber-ocracy vs. Cyber-tarianism: The Chinese InternetCyber-ocracy vs. Cyber-tarianism: The Chinese Internet
Cyber-ocracy vs. Cyber-tarianism: The Chinese Internet
 
OSi Forum - supplementary videos
OSi Forum - supplementary videosOSi Forum - supplementary videos
OSi Forum - supplementary videos
 
Censorship by Chinese Blog-hosting Companies
Censorship by Chinese Blog-hosting CompaniesCensorship by Chinese Blog-hosting Companies
Censorship by Chinese Blog-hosting Companies
 
iSummit keynote: Free Culture & Free Speech
iSummit keynote: Free Culture & Free SpeechiSummit keynote: Free Culture & Free Speech
iSummit keynote: Free Culture & Free Speech
 
China the Internet and Corporate Responsibility
China the Internet and Corporate ResponsibilityChina the Internet and Corporate Responsibility
China the Internet and Corporate Responsibility
 
Yahoo!, the Shi Tao Case, and lessons for corporate social responsibility
Yahoo!, the Shi Tao Case, and lessons for corporate social responsibilityYahoo!, the Shi Tao Case, and lessons for corporate social responsibility
Yahoo!, the Shi Tao Case, and lessons for corporate social responsibility
 
Journalism 2.0: The future of news
Journalism 2.0: The future of newsJournalism 2.0: The future of news
Journalism 2.0: The future of news
 
Cc Hku
Cc HkuCc Hku
Cc Hku
 
Global Voices May9
Global Voices May9Global Voices May9
Global Voices May9
 
Web2hku
Web2hkuWeb2hku
Web2hku
 

Recently uploaded

Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Victor Rentea
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
WSO2
 

Recently uploaded (20)

Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering Developers
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelMcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 

Internetregulationjapan

  • 3. What does “Web Censorship” mean?  Different meanings in different contexts:  Censorship by governments against freedom of expression  and free access to information  Filtering of content seen as “harmful” to society  Violation of privacy rights: web monitoring, eavesdropping  “Censorship” against file sharing (copyrighted content)  What is “anti­censorship”?
  • 4. “The Age of Net Regulation is Coming”  In the last year, moves toward net regulation: 1.Internet content (transmission + broadcasting = ?) 2.Copyright legislation (file sharing) 3.Mobile web access (filtering, “harmful” content)  Fears about: “deai” (dating) sites, obscene/voilent  content, child porn, “adult” anime, net bullying,  death threats (Akihabara massacre), etc. etc. etc.
  • 5. Filtering of “harmful” content  Bill by LDP/DPJ passed into law on June 11th  Included in the bill:  Obligation on PC makers to pre­install national  standards­based filtering software on PCs/mobile phones  Filtering on mobile phones for users under age 18  ISPs required to eliminate harmful content/services  Government decides what is “harmful”
  • 6.
  • 7.
  • 8.
  • 9. Support for Regulation  A survey on regulation of “harmful content” (2007):  67.8% said the Internet should be regulated  22.7% said they lean toward regulation  3.1% said they lean toward non­regulation  1.4% said the Internet should not be regulated  76% support web filtering, 51% want police to  strengthen monitoring, 87% support manga porn  regulation
  • 10. Opposition to Regulation  Some of the greatest opposition from companies:  DENA, Yahoo, Microsoft, Rakuten, Net Star  Emphasizing positives of an open Internet
  • 11. Opposition strategies  More so than free access to information, opposition  strategies emphasize economic considerations:  Regulation will stop innovation/creativity  Japan will be left behind, outcompeted  Also emphasizes knowledge issues:  Many proposals are technologically contradictory  Lack of transparency in legislation
  • 12. The “people” are killing the Internet  Oppression of the people by governments and  corporations is not seen as a major concern  Conern is about other citizens:  Bullying, death threats, dating sites, obscene content,  copyright violation, etc. etc.  Conclusion: it is the people who are killing the  Internet, gov't needs to step in and regulate
  • 13. The future is now  Citizen media coverage of Akihabara killings:  Instantaneous through Ustream, 2000­3000 viewers  No editing or censorship of footage  Large public backlash, criticism
  • 14. Summary  “Web censorship” means different things to  different people/groups/nations  Different opposition strategies:  Technological problems with censorship  Lack of transparency in process  Economic considerations, innovation/creativity  Awareness and literacy are key