11.07.2015 Views

Encyclopedia of Computer Science and Technology

Encyclopedia of Computer Science and Technology

Encyclopedia of Computer Science and Technology

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

76 censorship <strong>and</strong> the InternetIn 2002, computer scientist <strong>and</strong> mathematician StephenWolfram (developer <strong>of</strong> the Mathematica program) publisheda book titled A New Kind <strong>of</strong> <strong>Science</strong> that undertakes themodest project <strong>of</strong> explaining the fundamental structure <strong>and</strong>behavior <strong>of</strong> the universe using the principles <strong>of</strong> cellularautomation. Time will tell whether this turns out to besimply an idiosyncratic (albeit interesting) approach or agenerally useful paradigm.Further ReadingGutowitz, Howard, ed. Cellular Automata. Cambridge, Mass.: MITPress, 1991.“Patterns, Programs, <strong>and</strong> Links for Conway’s Game <strong>of</strong> Life.”Available online. URL: http://www.radicaleye.com/lifepage/.Accessed May 28, 2007.Wojtowicz, Mirek. “Welcome to Mirek’s Celebration.: 1D <strong>and</strong>2D Cellular Automation Explorer.” Available online. URL:http://www.mirwoj.opus.chelm.pl/ca/. Accessed May 28,2007.Wolfram, S. A New Kind <strong>of</strong> <strong>Science</strong>. Champaign, Ill.: WolframMedia, 2002.———. Theory <strong>and</strong> Applications <strong>of</strong> Cellular Automata. Singapore:World Scientific, 1986.censorship <strong>and</strong> the InternetGovernments have always to varying degrees concernedthemselves with the content <strong>of</strong> public media. The growinguse <strong>of</strong> the Internet for expressive activities (see blogs<strong>and</strong> blogging <strong>and</strong> journalism <strong>and</strong> computers) hasprompted authoritarian governments such as that <strong>of</strong> Chinato attempt to block “objectionable” material both throughfiltering techniques (see Web filter) <strong>and</strong> through pressureon service providers. Further, users identified as creators <strong>of</strong>banned content may be subjected to prosecution. Howeverbecause <strong>of</strong> the Internet’s decentralized structure <strong>and</strong> theability <strong>of</strong> users to operate relatively anonymously, Internetcensorship tends to be only partially effective (see anonymity<strong>and</strong> the Internet).In the democratic West, Internet censorship generallyapplies to only a few forms <strong>of</strong> content. Attempts to criminalizethe online provision <strong>of</strong> pornography to minors in the1996 Communications Decency Act have generally beenoverturned by the courts as excessively infringing on theright <strong>of</strong> adults to access such content. However, a succession<strong>of</strong> bills seeking to require schools <strong>and</strong> libraries to installWeb-filtering s<strong>of</strong>tware culminated in the Children’s InternetProtection Act, which was upheld by the U.S. SupremeCourt in 2003.Another area <strong>of</strong> potential censorship involves the rights<strong>of</strong> bloggers <strong>and</strong> other nontraditional journalists to post orlink to documents that might be involved with a legal case.Although the term “censorship” is sometimes limitedto government action under criminal law, there areother ways in which Internet content may be restricted.For example, content providers seek to protect their workfrom unauthorized copying or distribution (see intellectualproperty <strong>and</strong> computing). Civil sanctions can bebrought to bear on violators <strong>of</strong> copyright or in cases <strong>of</strong>libel. However, as with other forms <strong>of</strong> censorlike activityon the Internet, the targeted behavior can be curtailed onlyto a limited extent.Censorship in ChinaChina has played a central role in the debate over censorship.The rapidly growing Chinese economy <strong>of</strong>fersseemingly unlimited market potential for Internet-basedbusinesses <strong>and</strong> sellers <strong>of</strong> s<strong>of</strong>tware <strong>and</strong> hardware. Howeverthe Chinese government’s desire to closely control thespread <strong>of</strong> “subversive” ideas has brought it into collisionwith the liberal ideas shared by many <strong>of</strong> the Internet’s mostimportant developers.Human rights organizations such as Amnesty Internationalhave criticized online service providers such as Yahoo,Google, <strong>and</strong> Micros<strong>of</strong>t for providing the Internet addresses<strong>of</strong> users who have then been arrested. The companies havebeen accused <strong>of</strong> putting the potential pr<strong>of</strong>its <strong>of</strong> China’s hugemarket ahead <strong>of</strong> ensuring free access to information. Generally,the companies say they have no choice but to complywith all local laws <strong>and</strong> legal dem<strong>and</strong>s for information aboutusers. However, critics charge that the technology companieshave <strong>of</strong>ten gone well beyond mere compliance to theprovision <strong>of</strong> sophisticated filtering s<strong>of</strong>tware for Web sites,blogs, <strong>and</strong> online chat <strong>and</strong> discussion groups.The actual extent <strong>of</strong> censorship in China seems to varyconsiderably, depending on shifting political considerations.The nation’s increasingly sophisticated users <strong>of</strong>tenfind ways around the censorship, such as through using“proxy servers” that are inside the “Great Firewall” but canconnect to the outside Internet. (Encrypted protocols suchas VPN [virtual private networks] <strong>and</strong> SSH [secure shell]can also be used, because their content is not detected bymonitoring <strong>and</strong> filtering s<strong>of</strong>tware.)Although generally not as highly organized, Internetcensorship can also be found in countries such as Burma(Myanmar), North Korea, Iran, <strong>and</strong> Syria <strong>and</strong> to a lesserextent in South Korea <strong>and</strong> Saudi Arabia.While Internet censorship can be viewed as being ultimatelya political problem, technical realities limit its effectiveness,<strong>and</strong> curtailing the free exchange <strong>of</strong> information<strong>and</strong> open-ended communication that the Net affords islikely to have economic costs as well.Further ReadingAmnesty International. Available online. URL: http://www.amnestyusa.org. Accessed May 22, 2007.Axelrod-Contrada, Joan. Reno v. ACLU: Internet Censorship. NewYork: Benchmark Books, 2006.Chase, Michael. You’ve Got Dissent! Chinese Dissident Use <strong>of</strong> theInternet <strong>and</strong> Beijing’s Counter-Strategies. Santa Monica, Calif.:RAND Corporation, 2002.Herumin, Wendy. Censorship on the Internet: From Filters to Freedom<strong>of</strong> Speech. Berkeley Heights, N.J.: Enslow, 2004.Reporters without Borders. H<strong>and</strong>book for Bloggers <strong>and</strong> Cyber-Dissidents. Available online. URL: http://www.rsf.org/rubrique.php3?id_rubrique=542. Accessed May 8, 2007.Ringmar, Erik. A Blogger’s Manifesto: Free Speech <strong>and</strong> Censorship inthe Age <strong>of</strong> the Internet. London: Anthem Press, 2007.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!