Characterization of Internet Censorship from Multiple Perspectives

Total Page:16

File Type:pdf, Size:1020Kb

Characterization of Internet Censorship from Multiple Perspectives UCAM-CL-TR-897 Technical Report ISSN 1476-2986 Number 897 Computer Laboratory Characterization of Internet censorship from multiple perspectives Sheharbano Khattak January 2017 15 JJ Thomson Avenue Cambridge CB3 0FD United Kingdom phone +44 1223 763500 http://www.cl.cam.ac.uk/ c 2017 Sheharbano Khattak This technical report is based on a dissertation submitted January 2017 by the author for the degree of Doctor of Philosophy to the University of Cambridge, Robinson College. Technical reports published by the University of Cambridge Computer Laboratory are freely available via the Internet: http://www.cl.cam.ac.uk/techreports/ ISSN 1476-2986 Summary Internet censorship is rampant, both under the support of nation states and private actors, with important socio-economic and policy implications. Yet many issues around Internet censorship remain poorly understood because of the lack of adequate approaches to measure the phenomenon at scale. This thesis aims to help fill this gap by developing three methodologies to derive censorship ground truths, that are then applied to real- world datasets to study the effects of Internet censorship. These measurements are given foundation in a comprehensive taxonomy that captures the mechanics, scope, and dynamics of Internet censorship, complemented by a framework that is employed to systematize over 70 censorship resistance systems. The first part of this dissertation analyzes user-side censorship, where a device near the user, such as the local ISP or the national backbone, blocks the user's online communication. This study provides quantified insights into how censorship affects users, content providers, and Internet Service Providers (ISPs); as seen through the lens of traffic datasets captured at an ISP in Pakistan over a period of three years, beginning in 2011. The second part of this dissertation moves to publisher-side censorship. This is a new kind of blocking where the user's request arrives at the Web publisher, but the publisher (or something working on its behalf) refuses to respond based on some property of the user. Publisher-side censorship is explored in two contexts. The first is in the context of an anonymity network, Tor, involving a systematic enumeration and characterization of websites that treat Tor users differently from other users. Continuing on the topic of publisher-side blocking, the second case study examines the Web's differential treatment of users of adblocking software. The rising popularity of adblockers in recent years poses a serious threat to the online advertising industry, prompting publishers to actively detect users of adblockers and subsequently block them or otherwise coerce them to disable the adblocker. This study presents a first characterization of such practices across the Alexa top 5K websites. This dissertation demonstrates how the censor's blocking choices can leave behind a detectable pattern in network communications, that can be leveraged to establish exact mechanisms of censorship. This knowledge facilitates the characterization of censorship from different perspectives; uncovering entities involved in censorship and targets of censorship, and the effects of such practices on stakeholders. More broadly, this study complements efforts to illuminate the nature, scale, and effects of opaque filtering practices; equipping policy-makers with the knowledge necessary to systematically and effectively respond to Internet censorship. 3 To Shahmeer for putting the colour inside of my world 4 Acknowledgements This work has been shaped by the support and encouragement of a whole host of people, to whom I wish to express my profound gratitude. I am grateful to Ali Khayam for instilling in me a passion for research and exploration. His perennial optimism and energy have been a source of great inspiration to me. He also played a key role in materializing our study of censorship in Pakistan. The seeds of this dissertation were planted during my internship with Vern Paxson at The International Computer Science Institute (ICSI), Berkeley, in Autumn, 2012. I am fortunate to have been mentored by him since then. Vern patiently listened to many ideas and provided feedback on several drafts, teaching me along the way about a range of topics|from soundness and rigour in measurement studies, to effective management of collaborative research. I am immensely grateful to Jon Crowcroft for all the freedom he gave me in pursuing my research interests. Jon's insightful comments on my research work have helped me to see the bigger picture. The consideration and respect he affords to his students has made it a privilege to work with him. My heartfelt thanks to Steven Murdoch for helping me every step of the way. His feedback proved invaluable to shape and develop my research ideas into mature work. From Steven, I learnt going the extra mile to do things right; and the value of patient and consistent hard work. I am deeply indebted to Ross Anderson for his unwaivering support and generous en- couragement. The life lessons he imparted have equipped me with fundamental capabilities to cope with challenging situations. I have greatly benefited from the support and mentorship of Mobin Javed; without her it would not have been the same. I am grateful to all my collaborators: Colleen Swanson, Damon McCoy, David Fifield, Emiliano De Cristofaro, Hamed Haddadi, Ian Goldberg, Julia E. Powles, Laurent Simon, Marjan Falahrastegar, Narseo Vallina-Rodriguez, Rishab Nithyanand, Sadia Afroz, Srikanth Sundaresan, Tariq Elahi, and Zartash Afzal Uzmi. I would like to thank a number of others who facilitated this work: Arturo Filast`o,Bjoern A. Zeeb, Georg Koppen, George Danezis, Juris Vetra, Michael Tschantz, Moritz Bartl, Philipp Winter, and Zakir Durumeric. This work would not have been possible without the cooperation of the anonymous Internet Service Provider in Pakistan and the operators of the Tor exit nodes used in this study. I am grateful to the technical staff at the University of California, Berkeley, University of Cambridge, and University of Michigan for facilitating our scanning experiments. I thank the anonymous IMC, NDSS, IEEE S&P, PETS, and USENIX FOCI reviewers, and our shepherds, Olaf Maennel and Lujo Bauer, whose valuable feedback led to this work being more solid. I am grateful to my Ph.D. examiners, Robert Watson at the Computer Lab and Renata Cruz Teixeira at Inria Paris, for their thorough and constructive feedback; the final draft of this dissertation has 5 benefited greatly from their input. I have been privileged to have had the opportunity to work with many brilliant and helpful people at the Computer Lab. Specifically, I thank Alice Hutchings, Dongting Yu, Ilias Marinos, Kumar Sharad, Richard Mortier, Robert Watson, Rubin Xu, and Sophie Van Der Zee. Special thanks to Julia E. Powles for providing useful comments on framing this work, and generally on effective writing. I am grateful to Caroline Stewart and Lise Gough at the Computer Lab, and Dr Julie Smith at Robinson College in helping me overcome several administrative hurdles that inevitably pop up during graduate years. Thanks to Mateja Jamnik and others involved in women@CL for creating a warm and supportive environment, and for consistently putting together exciting events. I am thankful to Aliya Khalid, Amna Abdul Wahid, Heidi Howard, Jyothish Soman, Mohibi Hussain, Negar Miralaei, Sharmeen Lodhi, and all others who gave freely of their time and friendship. I am deeply grateful to have Jeunese Payne as my friend, who has been a continual source of support. Her kindness and understanding have brightened up many days. Warmest appreciation also to Farwa Bukhari for her relentless support. Finally, I thank my son Shahmeer for being my anchor always|this dissertation is dedicated to him. This work was supported by the Engineering and Physical Sciences Research Council [grant number EP/L003406/1]. 6 Contents 1 Introduction 11 1.1 Background . 11 1.2 Motivation . 14 1.3 Research Question and its Substantiation . 15 1.4 Dissertation Organization and Contributions . 16 1.5 Published Work . 18 1.6 Work Done in Collaboration . 19 2 Internet Censorship and Censorship Resistance 21 2.1 Internet Censorship . 21 2.1.1 Censorship Distinguishers . 22 2.1.2 Scope of Censorship . 22 2.1.3 An Abstract Model of Censorship . 23 2.1.4 Censor's Attack Model . 24 2.2 Censorship Resistance . 28 2.3 Systematization Methodology . 31 2.3.1 Security Properties . 32 2.3.2 Privacy Properties . 33 2.3.3 Performance Properties . 34 2.3.4 Deployability Properties . 35 2.4 Communication Establishment . 36 2.4.1 High Churn Access . 37 2.4.2 Rate-Limited Access . 37 2.4.3 Active Probing Resistance Schemes . 37 2.4.4 Trust-Based Access . 40 2.4.5 Discussion . 40 2.5 Conversation . 42 2.5.1 Access-Centric Schemes . 43 2.5.2 Publication-Centric Schemes . 46 2.5.3 Discussion . 46 2.6 Related Work . 49 2.7 Open Areas and Research Challenges . 50 CONTENTS CONTENTS 2.7.1 Modular System Design . 50 2.7.2 Revisiting Common Assumptions . 51 2.7.3 Security Gaps . 52 2.7.4 Considerations for Participation . 53 2.8 Summary . 54 3 The Consequences of Internet Censorship 55 3.1 Background and Related Work . 55 3.2 Data Sources for the Study . 57 3.2.1 Capture Location and ISP Overview . 57 3.2.2 Data Description . 59 3.2.3 Data Sanitization and Characterization . 59 3.2.4 Final Datasets . 61 3.2.5 User Survey . 61 3.2.6 Ethical Standards . 63 3.3 Establishing Ground Truth . 64 3.3.1 Censorship Indicators . 65 3.3.2 Mechanism of YouTube Censorship . 67 3.3.3 Mechanism of Porn Censorship . 68 3.4 Metrics Relevant to Content Providers . 70 3.5 Changes in User Behaviour . 72 3.5.1 Changes in Traffic . 73 3.5.2 Effects on User Behaviour .
Recommended publications
  • We Need Net Neutrality As Evidenced by This Article to Prevent Corporate
    We need Net Neutrality as evidenced by this article to prevent corporate censorship of individual free speech online, whether its AOL censoring DearAOL.com emails protesting their proposed email fee for prioritized email delivery that evades spam filters, AT&T censoring Pearl Jam which this article is about, or Verizon Wireless censoring text messages from NARAL Pro Choice America. If the FCC won't reclassify broadband under Title II the FTC should regulate Net Neutrality, also the DOJ should investigate corporations engaging in such corporate censorship and if they are violating competition laws break them up. Pearl Jam came out in favor of net neutrality after AT&T censored a broadcast a performance they did in Chicago last Sunday. I guess AT&T didn?t like Pearl Jam?s anti-Bush message. I don?t know if Pearl Jam?s sudden embrace of net neutrality is out of ignorance, or if it?s retaliation. It doesn?t really matter because it should help bring some more awareness to the issue. Here?s the issue with net neutrality, in a nutshell. AT&T wants to charge companies like Amazon, eBay, and Google when people like you and me access their web pages. And if the companies don?t pay, AT&T will make the web sites slower. The idea is that if one company doesn?t pay the fees but a competitor does, AT&T customers will probably opt to use the faster services. IT"S WORTH NOTING: Without content, an Internet connection has no value. Proponents say AT&T built the infrastructure, so they have the right to charge whoever uses it.
    [Show full text]
  • Threat Modeling and Circumvention of Internet Censorship by David Fifield
    Threat modeling and circumvention of Internet censorship By David Fifield A dissertation submitted in partial satisfaction of the requirements for the degree of Doctor of Philosophy in Computer Science in the Graduate Division of the University of California, Berkeley Committee in charge: Professor J.D. Tygar, Chair Professor Deirdre Mulligan Professor Vern Paxson Fall 2017 1 Abstract Threat modeling and circumvention of Internet censorship by David Fifield Doctor of Philosophy in Computer Science University of California, Berkeley Professor J.D. Tygar, Chair Research on Internet censorship is hampered by poor models of censor behavior. Censor models guide the development of circumvention systems, so it is important to get them right. A censor model should be understood not just as a set of capabilities|such as the ability to monitor network traffic—but as a set of priorities constrained by resource limitations. My research addresses the twin themes of modeling and circumvention. With a grounding in empirical research, I build up an abstract model of the circumvention problem and examine how to adapt it to concrete censorship challenges. I describe the results of experiments on censors that probe their strengths and weaknesses; specifically, on the subject of active probing to discover proxy servers, and on delays in their reaction to changes in circumvention. I present two circumvention designs: domain fronting, which derives its resistance to blocking from the censor's reluctance to block other useful services; and Snowflake, based on quickly changing peer-to-peer proxy servers. I hope to change the perception that the circumvention problem is a cat-and-mouse game that affords only incremental and temporary advancements.
    [Show full text]
  • Edri Submission to UN Special Rapporteur David Kaye's Call on Freedom of Expression and the Private Sector in the Digital Age
    EDRi submission to UN Special Rapporteur David Kaye's call on freedom of expression and the private sector in the digital age Introduction EDRi is a not-for-profit association of digital civil rights organisations. Our objectives are to promote, protect and uphold civil rights in the field of information and communication technology. European Digital Rights (EDRi) welcomes the UN Special Rapporteur on freedom of opinion and expression David Kaye’s public consultation on the role of ICT companies vis-à-vis freedom of expression in the digital environment to identify: I. the categories of actors in the ICT sector whose activities implicate the freedom of opinion and expression; II. the main legal issues raised for freedom of opinion and expression within the ICT sector; and III. the conceptual and normative work already done to develop corporate responsibility and human rights frameworks in these spaces, including governmental, inter-governmental, civil society, corporate and multistakeholder efforts. I. ICT actors with a potential to impact freedom of expression and opinion In order to communicate online, it is necessary to rely on a chain of different service providers, often based in different jurisdictions and with whom one may have no direct relationship at all. For example, if "zero-rating" or even data caps are imposed by Internet access providers in a country and you have no organisational and financial capacity to be "zero-rated", your ability to communicate with people that are using such restricted services is limited and there is no "leverage" with the ISPs that connect your intended audience with the Internet.
    [Show full text]
  • Array AG 9.4 CLI Handbook
    Array AG 9.4 CLI Handbook Copyright Statement Copyright Statement Copyright©2000-2018 Array Networks, Inc., 1371 McCarthy Blvd, Milpitas, California 95035, USA. All rights reserved. This document is protected by copyright and distributed under licenses restricting its use, copying, distribution, and compilation. No part of this document can be reproduced in any form by any means without prior written authorization of Array Networks. Documentation is provided “as is” without warranty of any kind, either express or implied, including any kind of implied or express warranty of non-infringement or the implied warranties of merchantability or fitness for a particular purpose. Array Networks reserves the right to change any products described herein at any time, and without notice. Array Networks assumes no responsibility or liability arising from the use of products described herein, except as expressly agreed to in writing by Array Networks. The use and purchase of this product does not convey a license to any patent copyright, or trademark rights, or any other intellectual property rights of Array Networks. Warning: Modifications made to the Array Networks unit, unless expressly approved by Array Networks, could void the user’s authority to operate the equipment. Declaration of Conformity We, Array Networks, Inc., 1371 McCarthy Blvd, Milpitas, CA 95035, 1-866-692-7729; declare under our sole responsibility that the product(s) Array Networks, Array Appliance complies with Part 15 of FCC Rules. Operation is subject to the following two conditions: (1) this device can not cause harmful interference, and (2) this device must accept any interference received, including interference that can cause undesired operation.
    [Show full text]
  • Self-Censorship
    Surrendering to Silence An Account of Self-censorship among Pakistani Journalists A Publication of Media Matters for Democracy Surrendering to Silence An Account of Self-censorship among Pakistani Journalists Lead Researcher Waqas Naeem Research Team Annam Lodhi Hassan Abbas Komal Tariq Zafar Nizamani Editing & Review Sadaf Khan Asad Baig Design and illustrations Aniqa Haider Published by Media Matters for Democracy 2018 Creative Commons Attribution 4.0 International (CC BY 4.0) https://creativecommons.org/licenses/by/4.0/ Some rights reserved. This report is dedicated to to all the Pakistani journalists who bravely bring truth to the public despite increasing pressures on them to self-censor, growing threats, and unending impunity in crimes of violence against media professionals Acknowledgements We would like to acknowledge the eorts of Media Matters team, who worked without complaining, under tight deadlines and despite heavy workloads and extended all requi- site support for this publication through its various stages. Foreword Over the course of our engagement with journalists in Pakistan we have witnessed ups and downs that keep the news industry on its toes. From attacks on journalists to the targeting of their families, from the use and abuse of legal instruments to intimidate, threaten and harass them to conveniently timed information leaks and structured hate campaigns against media workers – the obstructions in the way of a free press in Pakistan are many. However, nothing has been as alarming as the increase in the tendency to self-censor. It is dicult to pinpoint exactly when this trend became noticeable. If one had to identify one pivotal point, it would be the Peshawar Army Public School Attack in December 2014.
    [Show full text]
  • A Privacy Threat for Internet Users in Internet-Censoring Countries
    A Privacy Threat for Internet Users in Internet-censoring Countries Feno Heriniaina R. College of Computer Science, Chongqing University, Chongqing, China Keywords: Censorship, Human Computer Interaction, Privacy, Virtual Private Networks. Abstract: Online surveillance has been increasingly used by different governments to control the spread of information on the Internet. The magnitude of this activity differs widely and is based primarily on the areas that are deemed, by the state, to be critical. Aside from the use of keywords and the complete domain name filtering technologies, Internet censorship can sometimes even use the total blocking of IP addresses to censor content. Despite the advances, in terms of technology used for Internet censorship, there are also different types of circumvention tools that are available to the general public. In this paper, we report the results of our investigation on how migrants who previously had access to the open Internet behave toward Internet censorship when subjected to it. Four hundred and thirty-two (432) international students took part in the study that lasted two years. We identified the most common circumvention tools that are utilized by the foreign students in China. We investigated the usability of these tools and monitored the way in which they are used. We identified a behaviour-based privacy threat that puts the users of circumvention tools at risk while they live in an Internet-censoring country. We also recommend the use of a user-oriented filtering method, which should be considered as part of the censoring system, as it enhances the performance of the screening process and recognizes the real needs of its users.
    [Show full text]
  • Self- Censorship by Pakistani Journalists: Causes and Effects
    130 Journal of Peace, Development and Communication Volume 05, Issue 1, January-March 2021 pISSN: 2663-7898, eISSN: 2663-7901 Article DOI: https://doi.org/10.36968/JPDC-V05-I01-12 Homepage: https://pdfpk.net/pdf/ Email: [email protected] Article: Self- Censorship By Pakistani Journalists: Causes And Effects Muhammad Ayoub Mass Communication Graduate, International Islamic University, Islamabad Author(s): Muhammad Junaid Ghauri PhD in Mass Communication & Lecturer at Department of Media and Communication Studies, International Islamic University Islamabad, Muhammad Tariq Ph.D. scholar, Department of Media and Communication Studies, International Islamic University Islamabad Published: 30th March 2021 Publisher Journal of Peace, Development and Communication (JPDC) Information: Ayoub, Muhammad, et al. (2021). “Self- Censorship By Pakistani Journalists: Causes To Cite this And Effects” Journal of Peace, Development and Communication, vol. Volume 5, no. Article: Issue 1, 2021, pp. 130-142, https://doi.org/10.36968/JPDC-V05-I01-12 Muhammad Ayoub is a Mass Communication graduate from International Islamic University, Islamabad and is a media practitioner based in Islamabad. Muhammad Junaid Ghauri is a PhD in Mass Communication and Lecturer at Department of Media and Communication Studies, International Islamic University Islamabad, Author(s) Pakistan. His research interests include Othering, Orientalism, Political Communication, Note: International Communication, Critical Discourse Analysis, and representation of Islam and Muslims in global
    [Show full text]
  • Internet Censorship in Thailand: User Practices and Potential Threats
    Internet Censorship in Thailand: User Practices and Potential Threats Genevieve Gebhart∗†1, Anonymous Author 2, Tadayoshi Kohno† ∗Electronic Frontier Foundation †University of Washington [email protected] [email protected] 1 Abstract—The “cat-and-mouse” game of Internet censorship security community has proposed novel circumvention and circumvention cannot be won by capable technology methods in response [10, 25, 38]. alone. Instead, that technology must be available, The goal of circumventing censorship and attaining freer comprehensible, and trustworthy to users. However, the field access to information, however, relies on those largely focuses only on censors and the technical means to circumvent them. Thailand, with its superlatives in Internet circumvention methods being available, comprehensible, use and government information controls, offers a rich case and trustworthy to users. Only by meeting users’ needs can study for exploring users’ assessments of and interactions with circumvention tools realize their full technical capabilities. censorship. We survey 229 and interview 13 Internet users in With this goal in mind, the field lacks sufficient inquiry Thailand, and report on their current practices, experienced into the range of user perceptions of and interactions with and perceived threats, and unresolved problems regarding censorship. How do users assess censored content? What is censorship and digital security. Our findings indicate that the range of their reactions when they encounter existing circumvention tools were adequate for respondents to censorship? How does censorship affect the way they not access blocked information; that respondents relied to some only access but also produce information? extent on risky tool selection and inaccurate assessment of blocked content; and that attempts to take action with In addition to guiding more thorough anti-circumvention sensitive content on social media led to the most concrete strategies, these questions about users and censorship can threats with the least available technical defenses.
    [Show full text]
  • Information Commons - a Public Policy Report - by Nancy Kranich
    - the - Information Commons - a public policy report - by Nancy Kranich THE FREE EXPRESSION POLICY PROJECT BRENNAN CENTER FOR JUSTICE at NYU SCHOOL OF LAW e Information Commons: A Public Policy Report © 2004. is report is covered by the Creative Commons “Attribution-No Derivs-NonCommercial” license; see http://creativecommons.org. It may be reproduced in its entirety as long as the Brennan Center for Justice, Free Expression Policy Project is credited, a link to the Project’s Web page is provided, and no charge is imposed. e report may not be reproduced in part or in altered form, or if a fee is charged, without our permission. Please let us know if you reprint. BRENNAN CENTER FOR JUSTICE at NYU SCHOOL OF LAW Democracy Program, Free Expression Policy Project 161 Avenue of the Americas, 12th floor New York NY 10013 Phone: (212) 998-6730 Web site: www.brennancenter.org Free Expression Policy Project: www.fepproject.org Author of the report: Nancy Kranich, Senior Research Fellow, Free Expression Policy Project, 2003-04 Editing: Marjorie Heins, Director, Free Expression Policy Project, 2000-04 Design: Jon Hecht table of contents EXECUTIVE SUMMARY............................................................................................ INTRODUCTION ....................................................................................................... I. OPPORTUNITIES AND CHALLENGES OF THE INFORMATION AGE.. Evolution of the Information Society................................................................... e Promise of the Internet and
    [Show full text]
  • Corporate Censorship and Its Troubling Implications for the First Amendment
    DePaul Law Review Volume 55 Issue 1 Fall 2005 Article 3 Can You Hear Me Now?- Corporate Censorship and Its Troubling Implications for the First Amendment William A. Wines Terence J. Lau Follow this and additional works at: https://via.library.depaul.edu/law-review Recommended Citation William A. Wines & Terence J. Lau, Can You Hear Me Now?- Corporate Censorship and Its Troubling Implications for the First Amendment , 55 DePaul L. Rev. 119 (2005) Available at: https://via.library.depaul.edu/law-review/vol55/iss1/3 This Article is brought to you for free and open access by the College of Law at Via Sapientiae. It has been accepted for inclusion in DePaul Law Review by an authorized editor of Via Sapientiae. For more information, please contact [email protected]. CAN YOU HEAR ME NOW?-CORPORATE CENSORSHIP AND ITS TROUBLING IMPLICATIONS FOR THE FIRST AMENDMENT William A. Wines & Terence J. Lau1 "[M]oney doesn't talk, it swears." -Bob Dylan2 "The problem of power is ... how to get men of power to live for the public rather than off the public." 3 -Robert F. Kennedy "[A] profound national commitment to the principle that debate on public issues should be uninhibited, robust, and wide-open . .. ." 4 -Justice William Brennan INTRODUCTION The "profound national commitment" to "debate on public issues" that Justice Brennan lovingly described in 1964 has recently been forced on life support. 5 Take, for example, Bill Maher's talk show, Politically Incorrect, which appeared for a few years on the ABC net- work. His show was cancelled by ABC in the summer of 20026 when several advertisers pulled out after Mr.
    [Show full text]
  • Internet Content Regulation in Liberal Democracies. a Literature Review
    Internet content regulation in liberal democracies. A literature review. Yana Breindl (Institute of Political Science, Georg-August-Universität Göttingen) DH Forschungsverbund – Working Papers zu Digital Humanities 2 Die Working Papers zu den Digital Humanities werden erstellt von Verbundpartnern des Göttingen Research Campus aus dem „Digital Humanities Forschungsverbund“, einem vom Niedersächsischen Ministerium für Wissenschaft und Kultur (MWK) und der VW-Stiftung geförderten und vom Göttingen Centre for Digital Humanities (GCDH) geleiteten Verbundprojekt (Laufzeit: Jan. 2012 – März 2015). Erschienen März 2013 Online: http://www.gcdh.de/en/publications/ Institut für Politikwissenschaft der Georg-August-Universität Göttingen [email protected] Dieses Werk bzw. sein Inhalt steht unter einer Creative Commons Lizenz (Namensnennung – Weitergabe unter gleichen Bedingungen 2.0 Deutschland). Abstract: This paper presents an overview of the literature on Internet content regulation in general and Internet blocking in particular as part of the research project on “Internet blocking in liberal democracies” of the Digital Humanities Research Collaboration at the Göttingen Centre for Digital Humanities. It starts by presenting the main debates about Internet regulation and governance of the last twenty years. Scholars of Internet governance remain divided about the role played by the nation-state in the digital realm as well as the disruptive potential of the Internet for society and politics in general. There is however broad consensus that new forms of regulation (e.g. “code as law”) have emerged and that private actors play an important part in Internet regulation. The report then assesses the challenges and opportunities presented by digital content for policy-makers before reviewing various points and techniques of control that have been implemented to deal with problematic content.
    [Show full text]
  • Understandings and Practices of Freedom of Expression and Press Freedom in Pakistan: Ethnography of Karachi Journalistic Environment
    Understandings and Practices of Freedom of Expression and Press Freedom in Pakistan: Ethnography of Karachi Journalistic Environment Sadia Jamil MA (Karachi), MSC (Scotland) A thesis submitted for the degree of Doctor of Philosophy at The University of Queensland in 2014 School of Communication and Arts i Abstract This study investigated the relationship between cultural pluralism and the journalists’ attitudes towards freedom of expression and press freedom within the institution of journalism in Pakistan. It sought to identify any shared understanding and practice of these two concepts amongst the Pakistani journalists, who participated in this study. Particularly, this study explored the influence of Pakistan’s religious and socio-political contexts on the journalists’ understandings and practices of these two concepts in Karachi. Thus, this study linked the journalists’ understandings and practices (actions) of freedom of expression and press freedom with the environment in which they operate; and therefore, used the new institutionalism theory as a framework. The new institutionalism theory builds itself in relation to three core aspects, precisely: ‘standardisation’ (of concepts, practices, routines, rules and values); the ‘influence of environment’ on actors’ agency and the role of ‘actors’ agency’ in any institutional setting. The new institutionalism in organisational theory acknowledges journalism as a distinct institution, which is “comprised of shared concepts, practices, norms, values, organisational routines and rules” (Jaasaari and Olsson, 2010, p. 76; Powell and DiMaggio, 1991). In journalism, the theory derives its origin from the early institutional studies that attempted to scope the standardised media routines, news-making process, the patterned roles and values of news workers by using the ethnographic research approach (Galtung and Ruge, 1965; Tuchman, 1978; Gans, 1979; Golding and Elliot, 1979).
    [Show full text]