Professional Search in Pharmaceutical Research

Total Page:16

File Type:pdf, Size:1020Kb

Professional Search in Pharmaceutical Research Professional Search in Pharmaceutical Research Alex Kohn München 2009 Professional Search in Pharmaceutical Research Alex Kohn Dissertation an der Fakultät für Mathematik, Informatik und Statistik der Ludwig‐Maximilians‐Universität München vorgelegt von Alex Kohn München, den 24.11.2009 Erstgutachter: Prof. Dr. François Bry (Ludwig‐Maximilians‐Universität München) Zweitgutachter: Prof. Dr. Steffen Staab (Universität Koblenz‐Landau) Tag der mündlichen Prüfung: 19.01.2010 Abstract In the mid 90s, visiting libraries – as means of retrieving the latest literature – was still a common necessity among professionals. Nowadays, professionals simply access information by ‘googling’. Indeed, the name of the Web search engine market leader “Google” became a synonym for searching and retrieving information. Despite the increased popularity of search as a method for retrieving relevant information, at the workplace search engines still do not deliver satisfying results to professionals. Search engines for instance ignore that the relevance of answers (the satisfaction of a searcher’s needs) depends not only on the query (the information request) and the document corpus, but also on the working context (the user’s personal needs, education, etc.). In effect, an answer which might be appropriate to one user might not be appropriate to the other user, even though the query and the document corpus are the same for both. Personalization services addressing the context become therefore more and more popular and are an active field of research. This is only one of several challenges encountered in ‘professional search’: How can the working context of the searcher be incorporated in the ranking process; how can unstructured free‐text documents be enriched with semantic information so that the information need can be expressed precisely at query time; how and to which extent can a company’s knowledge be exploited for search purposes; how should data from distributed sources be accessed from into one‐single‐entry‐point. This thesis is devoted to ‘professional search’, i.e. search at the workplace, especially in industrial research and development. We contribute by compiling and developing several approaches for facing the challenges mentioned above. The approaches are implemented into the prototype YASA (Your Adaptive Search Agent) which provides meta‐search, adaptive ranking of search results, guided navigation, and which uses domain knowledge to drive the search processes. YASA is deployed in the pharmaceutical research department of Roche in Penzberg – a major pharmaceutical company – in which the applied methods were empirically evaluated. Being confronted with mostly unstructured free‐text documents and having barely explicit metadata at hand, we faced a serious challenge. Incorporating semantics (i.e. formal knowledge representation) into the search process can only be as good as the underlying data. Nonetheless, we are able to demonstrate that this issue can be largely compensated by incorporating automatic metadata extraction techniques. The metadata we were able to extract automatically was not perfectly accurate, nor did the ontology we applied contain considerably “rich semantics”. Nonetheless, our results show that already the little semantics incorporated into the search process, suffices to achieve a significant improvement in search and retrieval. We thus contribute to the research field of context‐based search by incorporating the working context into the search process – an area which so far has not yet been well studied. v Zusammenfassung Die seit den 90er Jahren vorherrschende Informationsflut als auch das Aufkommen neuer Technologien haben die Prozesse des Informationszugriffes auf nie dagewesene Art und Weise geprägt. Das Ergebnis dieses Wandels ist, daß Menschen heutzutage nach Informationen ‚googeln’ anstatt Bibliotheken zu durchstöbern. Tatsächlich ist der Name des derzeitigen Internet‐Suchmaschinen‐Marktführers Google zu einem Synonym für die Suche nach Informationen geworden. Dieses Phänomen betrifft insbesondere auch Experten, für die Suche nach Informationen ein Teil des alltäglichen Geschäftes ist. Folglich sind Suchmaschinen nicht nur im Web die erste Wahl um Informationen zu finden sondern auch im Intranet von Firmen. Obwohl die Verwendung von Suchmaschinen bei Experten – insbesondere bei Fachkräften in Unternehmen – sehr populär geworden ist, liefern Suchmaschinen im Intranet immer noch nicht zufriedenstellende Ergebnisse. Eine mögliche Ursache unter anderen ist, daß Suchmaschinen häufig den Kontext des Suchenden (persönliche Bedürfnisse, Hintergrundwissen, usw.) ignorieren. Tatsächlich ist aber die Relevanz eines Suchergebnisses, nicht nur von der eigentlichen Suchanfrage und der Dokumentsammlung abhängig, sondern auch vom Arbeitskontext des Suchenden. Folglich kann eine Antwort – bei gleichbleibender Suchanfrage und identischem Korpus – für den einen Benutzer relevant sein und für den anderen Benutzer nicht. Die Einbeziehung des Kontexts bei der Suche ist ein aktives Forschungsfeld und wird zunehmend auch in Personalisierungsdiensten führender Internet‐Suchmaschinen berücksichtigt. Kontext‐basierte Suche ist nur eine von vielen Herausforderungen im Umfeld von spezialisierten Suchmaschinen: Wie kann der Arbeitskontext des Suchenden in die Ermittlung der Rangfolge der Ergebnisdokumente einbezogen werden; Wie können vorhandene Daten mit semantischen Informationen bereichert werden, so daß die Frage präzise formuliert werden kann; Wie und zu welchem ausmaß kann das Vorwissen eines Unternehmens dazu genutzt werden die Suche zu verbessern; Wie sollen verteilte Daten in einem Suchportal zusammengefaßt werden. Die vorliegende Dissertation befaßt sich dem Thema „Expertensuche“, d.h. Suche am Arbeitsplatz, insbesondere in der Forschung und Entwicklung. Ein Beitrag dieser Arbeit liegt in der Zusammenstellung und Entwicklung von Ansätzen, mit denen den zuvor genannten Herausforderungen begegnet werden kann. Die Ansätze werden in dem Prototyp YASA (Your Adaptive Search Agent) implementiert, welcher Meta‐ Suche, adaptive Sortierung von Suchergebnissen und unterstütztes Navigieren ermöglicht. Zahlreiche Prozesse profitieren dabei von domänen‐spezifischem Wissen. YASA wird in der pharmazeutischen Forschungsabteilung von Roche in Penzberg (ein größeres Pharma Unternehmen) produktiv genutzt. Letzteres bietet ein ideales Umfeld für die empirische Untersuchung der angewandten Prinzipien. vi Die überwiegende Speicherung der Daten in Form unstrukturierter Textdokumente und das Fehlen expliziter Metadaten, stellten eine ernste Herausforderung dar. Die Einbindung von Semantik (traditionell als formale Wissensrepräsentation verstanden) kann nämlich nur so gut sein wie die zugrundeliegenden Daten. Nichtsdestotrotz sind wir in der Lage dieses Problem durch Einbindung automatischer Metadaten‐Extraktionsmethoden weitgehend zu umgehen. Die Metadaten, welche wir extrahieren konnten, waren weder perfekt noch war die daraus resultierende und von uns verwendete Ontologie semantisch betrachtet besonders reich. Unsere Ergebnisse zeigen aber, daß bereits ein bißchen Semantik die Informationsbeschaffung deutlich erleichtert. Der Beitrag der Arbeit liegt also auf dem Gebiet der kontext‐basierten Suche, d.h. der Einbeziehung des Arbeitskontexts in den Suchprozeß – ein Gebiet, welches bis jetzt noch nicht gut erforscht wurde. vii Acknowledgements “It is with words as with sunbeams. The more they are condensed, the deeper they burn.” Robert Southey (1774 – 1843) I would like to thank my scientific mentor and advisor Prof. François Bry, who – always optimistic and positive – helped me discover my research interests as well as to find and shape my ideas. I appreciated the discussions with him, his feedback, and his friendly attitude throughout my dissertation. I am also grateful to Prof. Steffen Staab for his willingness to scientific cooperation. The experience and knowledge he provided were particularly enlightening and helpful for my research. Next, I thank my supervising tutor Dr. Alexander Manta at Roche and the company itself for offering me the scientific and financial opportunity to pursue my doctoral thesis. In countless discussions, Alexander guided me in times of despair, doubt, and idea hunting. His open mindedness gave me a lot of flexibility and freedom during my research. Special thanks to my colleague Dr. Stefan Klostermann who provided valuable insights about research at Roche and guidance during my first year. Thanks to my colleagues from In Silico Sciences who gave me advice and support in all questions related to bioinformatics and statistics. Thanks to the technical staff of Scientific Research Informatics for their support with servers and hardware upgrades. Special thanks to all colleagues from Pharma Research who participated in the evaluation of YASA. Finally, a great and warm thanks to Tobias Högel, who wrote his diploma thesis under my supervision, and to Florian Stadler and Marc Gössling, whom I partially supervised during their internship at Roche. Their contribution and dedication helped me tremendously. Thanks to my current as well as past fellow students in the PMS department at the University of Munich, Paula‐Lavinia Pătrânjan, Sacha Berger, Edgar Stoffel, Tim Furche, Benedikt Linse, Michael Eckert, Stephan Leutenmayr, Alexander Pohl, Christoph Wieser, Jakub Kotowski, Klara Weiand, and Olga Poppe who made the time at the university always a pleasure. Special thanks to Dr. Norbert Eisinger who gave me valuable feedback
Recommended publications
  • THE BUSINESS of CENSORSHIP: CONTENT MANAGEMENT and the CHINESE ECONOMY By
    THE BUSINESS OF CENSORSHIP: CONTENT MANAGEMENT AND THE CHINESE ECONOMY by JOSHUA CLARK B.A. (Hons.), Queen's University at Kingston, 2009 MASTER OF ARTS in THE FACULTY OF GRADUATE STUDIES (Political Science) THE UNIVERSITY OF BRITISH COLUMBIA (Vancouver) August 2010 ©Joshua Clark, 2010 Abstract Content control and censorship on the Internet are increasingly important topics for scholars of democratization, media and communications. Most studies have examined the relationship between the Internet, content management and various elements important to democratization such as the formation of civil society organizations. This thesis attempts to expand this discussion by examining the effects of online content management on economic systems, using the People's Republic of China as an example. China features a globally integrated economy that is increasing dependent on manufacturing and services while simultaneously maintaining one of the most extensive online content management systems in the world. This paper attempts to show how the Communist Party of China is able to reconcile the need for connectivity in order to drive their economy while maintaining political control. It also discusses the long-term implications of this strategy. The first section consists of a series of quantitative and qualitative tests to determine how various classes of websites are managed. These tests reveal that in order to maintain the flow of information necessary for a globally integrated economy, the Chinese Communist Party utilizes strategies that manage but not block the information flows related to business. This survey is followed by a case study examining the relationship between Google and China, and the implications of Chinese regulation and control for the broader economy.
    [Show full text]
  • The Filtering Matrix
    The Filtering Matrix Filtering and Surveillance Practices Worldwide Nart Villeneuve Director of Technical Research The Citizen Lab / OpenNet Initiative University of Toronto Internet Challenges Bloggers and independent media challenge traditional corporate and state-owned media VoIP is seen as a threat by traditional tele-communications companies Offshore gambling and banking sites challenge existing laws and regulations File sharing services have significantly impacted the area of copyright and intellectual property Spam, child pornography, identity theft, computer break-ins and terrorism present significant security concerns Borders in Cyberspace In an effort to counter the once borderless Internet, states are seeking to create informational boundaries in cyberspace. Informational Borders Although decentralized there are significant ªchoke pointsº at which controls can be placed on the Internet Technical & non-technical mechanisms used to censor and control access to the Internet Filtering is the technical mechanism through which such controls are operationalized Internet Filtering Internet content filtering is a term that refers to the techniques by which control is imposed on access to information on the Internet The motivations for state-directed Internet filtering include those with: a specific emphasis on e-commerce: tax, copyright, VoIP a specific emphasis on children: child pornography, violence a specific emphasis on content cultural: pornography and gambling political: dissidents and independent media security: (cyber)terrorism and hacking Filtering Techniques DNS filtering: modification to DNS servers to prevent a domain name from resolving to the correct IP address. IP filtering: entries are made in routing equipment that stop all outgoing requests for a specific IP address URL filtering: filtering technology that (a) reassembles the packets for traffic flowing through its network, (b) reads each http request, and (c) if the URL in the request matches one of the URLs (or keywords) specified in a blocklist, block the http request.
    [Show full text]
  • Amnesty International Report 2014/15 the State of the World's Human Rights
    AMNESTY INTERNATIONAL OF THE WORLD’S HUMAN RIGHTS THE STATE REPORT 2014/15 AMNESTY INTERNATIONAL REPORT 2014/15 THE STATE OF THE WORLD’S HUMAN RIGHTS The Amnesty International Report 2014/15 documents the state of human rights in 160 countries and territories during 2014. Some key events from 2013 are also reported. While 2014 saw violent conflict and the failure of many governments to safeguard the rights and safety of civilians, significant progress was also witnessed in the safeguarding and securing of certain human rights. Key anniversaries, including the commemoration of the Bhopal gas leak in 1984 and the Rwanda genocide in 1994, as well as reflections on 30 years since the adoption of the UN Convention against Torture, reminded us that while leaps forward have been made, there is still work to be done to ensure justice for victims and survivors of grave abuses. AMNESTY INTERNATIONAL This report also celebrates those who stand up REPORT 2014/15 for human rights across the world, often in difficult and dangerous circumstances. It represents Amnesty International’s key concerns throughout 2014/15 the world, and is essential reading for policy- THE STATE OF THE WORLD’S makers, activists and anyone with an interest in human rights. HUMAN RIGHTS Work with us at amnesty.org AIR_2014/15_cover_final.indd All Pages 23/01/2015 15:04 AMNESTY INTERNATIONAL Amnesty International is a global movement of more than 7 million people who campaign for a world where human rights are enjoyed by all. Our vision is for every person to enjoy all the rights enshrined in the Universal Declaration of Human Rights and other international human rights standards.
    [Show full text]
  • Roll Your Own Search Results with Google's New Searchwiki
    866-536-8614 | Contact Us www.peakpositions.com Roll Your Own Search Results With Google's New SearchWiki. In an attempt to offer a more customized search experience, and to stay ahead of competitors, Google will soon be rolling out its SearchWiki feature to everyone using its services while logged into a Google account. The feature, which has been in testing with select users over the last few months, will allow people to shift around, annotate, add, and delete search results to their liking. "Have you ever wanted to mark up Google search results?" asked a post on The Official Google Blog. "Maybe you're an avid hiker and the trail map site you always go to is in the 4th or 5th position and you want to move it to the top. Or perhaps it's not there at all and you'd like to add it. Or maybe you'd like to add some notes about what you found on that site and why you thought it was useful. Starting today you can do all this and tailor Google search results to best meet your needs." SearchWiki will actually live up to its name and act as a wiki so that users can see notes made by other users, and view what pages others have added or deleted. As to what the point of the SearchWiki is, well, Google isn't saying just yet. Google is known for its secretive, magical PageRank system that promotes important search results while demoting others, and PageRank already has some degree of human input on the Google end.
    [Show full text]
  • Middle East, North Africa
    MIDDLE EAST, NORTH AFRICA Iran: Armed Forces Ready to Take Over National Intranet Project OE Watch Commentary: The Islamic Republic launched plans to build a national intranet in 2005, driven by the Iranian leadership’s belief that the Islamic Republic is engaged in a cultural war against the West and that unfettered communications pose a threat to the Islamic Republic’s internal security. Almost 15 years later and more than five years after the project was supposed to be completed, efforts to build a national intranet continue (See: “Iran: Progress on National Intranet,” OE Watch, July 2018; “Comprehensive Legal System for the Country’s Internet and Cyberspace,” OE General Mohammed Bagheri, speaking to military elites at the Islamic Revolutionary Guard Corps’ Ground Forces Martyr Modarres Primary Combat Training School. Watch, October 2017). Source: Fars News Agency, https://media.farsnews.com/Uploaded/Files/Images/1398/04/24/13980424000739_Test_PhotoN.jpg In the excerpted article from the Fars News Agency, an outlet close to the Islamic Revolutionary Guard Corps (IRGC), Major General Mohammad Bagheri, chief-of-staff of the Armed Forces, suggests that Iran’s military—presumably the IRGC from whose ranks Bagheri arose—could take charge of the project. His comments likely reflect frustration on the part of the IRGC and other hardline ideologues that the project to cut the Islamic Republic off from the World Wide Web remains delayed with no end date in sight. To advocate for such a position, he argues that foreign “control” of Iranian bandwidth is a danger to Iran, saying, “Foreigners control seventy per cent of the bandwidth in our country and we have just left the door open for them to come and influence public opinion and the youth here.” Beyond the excerpts provided here, Bagheri’s speech was wide-ranging.
    [Show full text]
  • A Survey of Defensive Measures for Digital Persecution in the Global South
    future internet Article A Survey of Defensive Measures for Digital Persecution in the Global South Louis Edward Papa 1,2 and Thaier Hayajneh 2,* 1 Graduate School of Arts and Science, Fordham University, New York, NY 10023, USA; [email protected] 2 Fordham Center for Cybersecurity, Fordham University, New York, NY 10023, USA * Correspondence: [email protected] Received: 27 July 2020; Accepted: 25 September 2020; Published: 29 September 2020 Abstract: This paper examines the phenomenon of digital persecution in the Global South and evaluates tools that defend against it. First, the paper explains the nature of persecution and its digital incarnation. It then provides a contextual overview of real-world instances of digital persecution in seven Global South countries. The possible defensive technologies against censorship and surveillance are discussed. The article goes on to discuss barriers to technology adoption in the Global South, explains the security implication of these difficulties, and examines the role that human computer interaction (HCI) metrics could play in overcoming these challenges. Finally, the paper surveys the viability of sixteen security tools in a Global South context. The survey results were mixed, with 37.5% of the reviewed tools being deemed to be inviable for use in the Global South to defend against persecution. Prescriptive recommendations are provided for creating security tools that are universal, simple, and effective. Keywords: persecution; oppression; free software; global south; cybersecurity; HCI; human rights 1. Introduction In a few short years, most internet users will be the poor of the Global South. Internet technology is often presented as a panacea for the common troubles in developing economies.
    [Show full text]
  • Moving Beyond Regulatory Mechanisms: a Typology of Internet Control Regimes
    Portland State University PDXScholar Dissertations and Theses Dissertations and Theses Spring 3-21-2014 Moving Beyond Regulatory Mechanisms: A Typology of Internet Control Regimes Richard Reid Hunt Portland State University Follow this and additional works at: https://pdxscholar.library.pdx.edu/open_access_etds Part of the Internet Law Commons Let us know how access to this document benefits ou.y Recommended Citation Hunt, Richard Reid, "Moving Beyond Regulatory Mechanisms: A Typology of Internet Control Regimes" (2014). Dissertations and Theses. Paper 1801. https://doi.org/10.15760/etd.1801 This Thesis is brought to you for free and open access. It has been accepted for inclusion in Dissertations and Theses by an authorized administrator of PDXScholar. Please contact us if we can make this document more accessible: [email protected]. Moving Beyond Regulatory Mechanisms: A Typology of Internet Control Regimes by Richard Reid Hunt A thesis submitted in partial fulfillment of the requirements for the degree of Master of Science in Political Science Thesis Committee: Bruce Gilley, Chair David Kinsella Wu-chang Feng Portland State University 2014 © 2014 Richard Reid Hunt i Abstract This paper examines national Internet control from a policy regime perspective. The mechanisms through which governments attempt to control the Internet may be devel- oped and implemented by different institutions and agencies, or fall outside of a formal regulatory structure entirely. As such, the totality of the institutions and practices of na- tional Internet control is better conceptualized not as a regulatory regime, but as a control regime. After a survey of the critical policy and control dimensions, a six-part typology of control regimes is proposed.
    [Show full text]
  • Recherche D'information Sur Le
    Recherche d’information sur le web (RIW) et moteurs de recherche : le cas des lycéens Kien Quach Tat To cite this version: Kien Quach Tat. Recherche d’information sur le web (RIW) et moteurs de recherche : le cas des lycéens. Education. École normale supérieure de Cachan - ENS Cachan, 2011. Français. NNT : 2011DENS0068. tel-00719199 HAL Id: tel-00719199 https://tel.archives-ouvertes.fr/tel-00719199 Submitted on 19 Jul 2012 HAL is a multi-disciplinary open access L’archive ouverte pluridisciplinaire HAL, est archive for the deposit and dissemination of sci- destinée au dépôt et à la diffusion de documents entific research documents, whether they are pub- scientifiques de niveau recherche, publiés ou non, lished or not. The documents may come from émanant des établissements d’enseignement et de teaching and research institutions in France or recherche français ou étrangers, des laboratoires abroad, or from public or private research centers. publics ou privés. THESE DE DOCTORAT DE L’ECOLE NORMALE SUPERIEURE DE CACHAN Présentée par Kien QUACH TAT pour obtenir le grade de DOCTEUR DE L’ECOLE NORMALE SUPERIEURE DE CACHAN Domaine : SCIENCES DE L’EDUCATION Sujet de la thèse : RECHERCHE D’INFORMATION SUR LE WEB ET MOTEURS DE RECHERCHE : LE CAS DES LYCEENS Composition du jury Rapporteurs : M. BARON Georges-Louis , Professeur des Universités Mme SIMONNOT Brigitte , Professeur des Universités Examinateurs : Mme GRANDBASTIEN Monique , Professeur Emérite Mme DROT-DELANGE Béatrice , Enseignant-Chercheur M. BLONDEL François-Marie , Ingénieur de recherche M. BRUILLARD Eric , Professeur des Universités (directeur) Laboratoire : UMR Sciences Tecniques Éducation Formation (ENS CACHAN/INRP) 61, avenue du Président Wilson, 94235 CACHAN CEDEX, France Remerciements Tout d’abord, je voudrais remercier chaleureusement mon directeur de la thèse, Professeur des universités Éric Bruillard pour son accueil, ses judicieux conseils, sa disponibilité et sa proposition de chemin de la recherche.
    [Show full text]
  • Cuba 2017 Human Rights Report
    CUBA 2017 HUMAN RIGHTS REPORT EXECUTIVE SUMMARY Cuba is an authoritarian state led by Raul Castro, who is president of the Council of State and Council of Ministers, Communist Party (CP) first secretary, and commander in chief of security forces. The constitution recognizes the CP as the only legal party and the leading force of society and of the state. The government postponed October municipal elections due to recovery efforts related to Hurricane Irma but conducted them in November, although they were neither free nor fair. A CP candidacy commission prescreened all candidates, and the government actively worked to block non-CP approved candidates. The national leadership, including members of the military, maintained effective control over the security forces. The most significant human rights issues included torture of perceived political opponents; harsh and life-threatening prison conditions; politically motivated, sometimes violent, detentions and arrests; a complete absence of judicial independence; arbitrary arrest and detention that was politically motivated and sometimes violent; trial processes that effectively put the burden on the defendant to prove innocence; and political prisoners. There was arbitrary interference with privacy, including search-and-seizure operations in homes and monitoring and censoring private communications. Freedom of expression was limited to expression that “conforms to the goals of socialist society,” with strict censorship punishing even distribution of the Universal Declaration of Human Rights. There were bans on importation of informational materials; strict control of all forms of media; restrictions on the internet, including severely limiting availability and site blocking; restrictions on academic freedom, including punishment for any deviation from the government line; criminalization of criticism of government leaders; and severe limitations on academic and cultural freedom, including on library access.
    [Show full text]
  • Syria: Syrian Telecommunications Establishment, Syrian Computer Society
    2 ENEMIES OF THE INTERNET / 12 MARCH 2014 //////////////////////////////////////////////////////////////////////////////////////// INTRODUCTION ........................................................................................................... 4 EUROPE AND CENTRAL ASIA .................................................................................. 8 Belarus: Operations and Analysis Centre ....................................................... 8 Russia: Federal Security Service ............................................................................ 10 Turkmenistan: TurkmenTelecom ............................................................................. 12 United Kingdom: Government Communications Headquarters ....................... 13 Uzbekistan: Expert Commission on Information and Mass Communication ................................................................................. 16 AMERICAS .................................................................................................................... 18 Cuba: Ministry of Informatics and Communications ............................................ 18 USA: National Security Agency ............................................................................... 20 MIDDLE EAST AND NORTH AFRICA ............................................................................... 23 Bahrain: Ministry of Interior, National Security Apparatus ............................................................................ 23 Iran: Supreme Council for Cyberspace, Working Group
    [Show full text]
  • 2013 National Network of Fusion Centers Final Report
    2013 National Network of Fusion Centers Final Report May 2012 June 2014 wid on e ti SA a R N NSI I e nitiativ B / 2013 National Network of Fusion Centers Final Report 2013 National Network of Fusion Centers Final Report May 2012 June 2014 This page is intentionally left blank. ii / 2013 National Network of Fusion Centers Final Report Table of Contents Executive Summary ............................................................................................................................................................ v Introduction ......................................................................................................................................................................... 1 Overview..............................................................................................................................................................................................1 Background ........................................................................................................................................................................................1 Reading This Report ........................................................................................................................................................................7 Methodology ....................................................................................................................................................................... 9 Findings ...............................................................................................................................................................................13
    [Show full text]
  • Asian-Pacific Law & Policy Journal
    A Comparative Study of Internet Content Regulations in the United States and Singapore: The Invincibility of Cyberporn Joseph C. Rodriguez ý Asian-Pacific Law & Policy Journal - - - - - http://www.hawaii.edu/aplpj Copyright © 2000 APLPJ Asian-Pacific Law & Policy Journal 1 APLPJ 9: 1 A Comparative Study of Internet Content Regulations in the United States and Singapore: The Invincibility of Cyberporn I. INTRODUCTION II. BACKGROUND A. History and Basic Structure of the Internet B. Current State of Internet Usage and Content C. Immediate Future of the Internet III. SINGAPORE A. Historical and Ideological Influences B. Evolution and Characteristics of Political Structures C. Role of Law in Singapore Society D. Modern Singapore E. Singapore Internet Policy and Regulatory Framework F. Implementation and Enforcement IV. UNITED STATES A. Philosophical Underpinnings B. Constitutional Basis and Political Structure C. Role of Law in U.S. Society D. Digital Economy E. U.S. Internet Policy and Regulatory Efforts F. Implementation and Enforcement V. ANALYSIS A. Differences in the Internet Content Regulations in the U.S. and Singapore Illustrate a Fundamental Difference in the Role of the Individual in the Two Nations B. Differences in the Internet Content Regulations Illustrate a Fundamental Difference in the Role of Law in the U.S. and Singapore VI. CONCLUSION I. INTRODUCTION In one dimly lit alley of the Internet, in an area known as newsgroups, we find among the over twenty-three thousand different newsgroups categorized by area of interest newsgroups with titles such as “alt.binaries.erotica.bestiality,” “alt.binaries.pictures.child.erotica.male,” or “alt.erotica.female.plumpers.”1 We also find that capitalism lives on as a peek inside the first category reveals a promotion for a bestiality Website2 superimposed on an image of a human 1 Internet newsgroups available via the news server <news.aloha.net> (accessed on Feb.
    [Show full text]