Is There a Link Between Digital Media and Good Governance? What the Academics Say
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
Ronald J. Deibert
April 13, 2013 Ronald J. Deibert A. BIOGRAPHICAL INFORMATION 1. PERSONAL Ronald James Deibert, Munk School of Global Affairs, Observatory Site, 313, 416-946-8916 2. DEGREES - Phd 1995 University of British Columbia - Thesis: Hypermedia: Modes of Communication in World Order Transformation Supervisor Professor Mark Zacher. - MA 1990 Queen’s University 3. EMPLOYMENT Professor, Department of Political Science, University of Toronto, 2011-present Associate Professor 2001-2011 Assistant Professor 1996-2001 Director, The Canada Centre for Global Security Studies, 2010-present Director, The Citizen Lab (http://www.citizenlab.org/), 2001-present Vice President, Global Policy and Outreach, Psiphon Inc., 2008-2010 4. HONOURS 2013 – Order of Ontario and Queen Elizabeth II Diamond Jubilee Medal 2013 - Partners in Research Technology Ambassador Award 2013 -Canadian Library Association Award for the Advancement of Intellectual Freedom in Canada 2011 - UNESCO Press Freedom Award (awarded to Citizen Lab) 2010 - Canadian Journalists for Free Expression Vox Libera Award (awarded to Citizen Lab) 2010 - Carolyn Tuohy Award for Public Policy 2002 - University of Toronto Outstanding Teaching Award 2002 - The Northrop Frye Distinguished Teaching and Research Award 2002-2004 - Ford Foundation Research Scholar of Information and Communication Technologies 5. PROFESSIONAL AFFILIATIONS AND ACTIVITIES Editorial Board: International Political Sociology, International Studies Perspectives, Astropolitics, Explorations in Media Ecology; Security Dialogue. Advisory Boards: Human Rights in China, Access Now, Lake Ontario Waterkeepers, Privacy International. Steering Committee, World Movement for Democracy, National Endowment for Democracy B. ACADEMIC HISTORY 6. A. RESEARCH ENDEAVOURS Director, Citizen Lab, 2001-present Director, Canada Centre for Global Security Studies, 2010-present Founder, Principal Investigator, OpenNet Initiative, 2002-present Founder, Principal Investigator, Information Warfare Monitor, 2002-2012 Co-Inventor, Psiphon B. -
Annotated Bibliography Digital Transnational Repression
Annotated Bibliography Digital Transnational Repression By Noura Al-Jizawi, Siena Anstis, Sophie Barnett, Sharly Chan, Adam Sen, and Ronald J. Deibert Last Updated: May 2021 Copyright Copyright © 2021 Citizen Lab, “Digital transnational Repression,” by Noura Al-Jizawi, Siena Anstis, Sharly Chan, Adam Sen, and Ronald J. Deibert. Licensed under the Creative Commons BY-SA 4.0 (Attribution-ShareAlike Licence) Electronic version first published in 2020 by the Citizen Lab. Citizen Lab engages in research that investigates the intersection of digital technologies, law, and human rights. Document Version: 2.0 New changes in this annual update include: ● Change of terminology from “transnational digital repression” to “digital transnational repression” to align with the discourse ● New summaries collected between October 2020 - May 2021 and added to the document The Creative Commons Attribution-ShareAlike 4.0 license under which this report is licensed lets you freely copy, distribute, remix, transform, and build on it, as long as you: ● give appropriate credit; ● indicate whether you made changes; and ● use and link to the same CC BY-SA 4.0 licence. However, any rights in excerpts reproduced in this report remain with their respective authors; and any rights in brand and product names and associated logos remain with their respective owners. Uses of these that are protected by copyright or trademark rights require the rightsholder’s prior written agreement. 2 Acknowledgements The design of this document is by Mari Zhou. About the Citizen Lab, Munk School of Global Aairs & Public Policy, University of Toronto The Citizen Lab is an interdisciplinary laboratory based at the Munk School of Global Affairs & Public Policy, University of Toronto, focusing on research, development, and high-level strategic policy and legal engagement at the intersection of information and communication technologies, human rights, and global security. -
Psiphon User Guide
PSIPHON USER GUIDE Psiphon is a free and open source web proxy that helps internet users bypass content-filtering systems used by governments in countries like China, Iran, Saudi Arabia, and Vietnam. It was developed by the Citizen Lab's CiviSec Project at the University of Toronto and was first released in December 2006. In this how to guide, learn how to provide a proxy service to someone behind a firewall with psiphon . If you are behind a firewall and want to learn how to connect to psiphon and access blocked content, check out this how to guide . Psiphon, unlike other circumvention services, is not intended to be a public, open proxy service. It’s based on a “web of trust” system so psiphon nodes are harder to block. What this means is that a person in an unrestricted location (one that is not behind a firewall) provides a psiphon proxy service to a person they are familiar with who is going online in a place where online access is limited. This is known as a psiphonode . A psiphonite is a psiphon user living in a censored country. The psiphonite connects to a psiphonode (set up by someone they know and trust) to access information freely. NOTE: Psiphon only works on Windows and Linux. There is no Mac version yet. Step 1. First, you should be in a location where you have open access to the internet. You should know someone in another location where access is limited. You will be providing a psiphonode for this person. Tip! If you do not know any psiphon users, but still want to provide a psiphonode, you can find users on psiphon’s Facebook page or Twitter page. -
Local Nets on a Global Network: Filtering and the Internet Governance Problem
Local Nets on a Global Network: Filtering and the Internet Governance Problem The Harvard community has made this article openly available. Please share how this access benefits you. Your story matters Citation chapter in Jack Balkin et al., The Global Flow of Information Citable link http://nrs.harvard.edu/urn-3:HUL.InstRepos:4324404 Terms of Use This article was downloaded from Harvard University’s DASH repository, and is made available under the terms and conditions applicable to Other Posted Material, as set forth at http:// nrs.harvard.edu/urn-3:HUL.InstRepos:dash.current.terms-of- use#LAA Local Nets on a Global Network: Filtering and the Internet Governance Problem John G. Palfrey, Jr.† (Chapter in Jack Balkin et al., The Global Flow of Information) August, 2010 Introduction. More than three dozen states around the world take part in censoring what their citizens can see and do on the Internet. This practice is increasingly widespread, with extensive filtering regimes in place in China, Iran, Burma (Myanmar), Syria, and Uzbekistan. Censorship using technological filters is often coupled with restrictive laws related to what the press can publish, opaque surveillance practices, and severe penalties for people who break the state’s rules of using the Internet. This trend has been emerging since at least 2002. As Internet use overall and the practice of online censorship grow, heads of state and their representatives have been gathering to discuss the broad topic of “Internet governance” at a series of high-profile, global meetings. These meetings have taken the form of periodic World Summits on the Information Society and, more recently, meetings of the Internet Governance Forum. -
Joan Shorenstein Center Comments from Former Fellows Shorenstein
Comments from Joan Shorenstein Center Shorenstein Center Former Fellows on the Press, Politics and Public Policy Fellowship Program “My semester as a Shorenstein Fellow was immeasurably rewarding— The Joan Shorenstein Center on the Press, Politics and Public Policy is intellectually, professionally, and personally. Those four months were an a research center at Harvard University’s John F. Kennedy School of induplicable gift.” Government. It was established in 1986 to promote a greater under- standing of the media by public officials, to improve coverage by Daniel Okrent, author, journalist, and consultant, Time Inc. Fellow, Spring 2006 media professionals of government and politics, to better anticipate the consequences of public policies that affect media and the First “Stimulating discussions, fascinating speakers, and colleagues who remain friends Amendment, and to increase knowledge about how the media affect to this day—all this comes to mind when I recall my time as a Fellow at the our political processes and governmental institutions. The Center Shorenstein Center.” includes a faculty of scholars and pracitioners who, through their research and teaching programs, are creating a body of knowledge Holli A. Semetko, Vice Provost for International Affairs and Professor of Political Science, Emory University Fellow, Spring 1994 about the press, politics and public policy in theory and in practice. “Four months at the Shorenstein Center gave me a chance to research an For information on how to apply for a Fellowship, issue that is close to my heart. It was an opportunity to go back to the days of please visit our website, the University and learn from the Center and Kennedy School faculty on a variety www.shorensteincenter.org of topics. -
October 26, 2018 Access Now Amnesty International Article 19
October 26, 2018 Access Now Amnesty International Article 19 Center for Democracy and Technology Committee to Protect Journalists Electronic Frontier Foundation Human Rights in China Human Rights Watch Independent Chinese PEN Centre International Service for Human Rights PEN International Privacy International Reporters Without Borders WITNESS Professor Ronald Deibert, Citizen Lab, University of Toronto Rebecca MacKinnon, Ranking Digital Rights Xiao Qiang, Research Scientist, Founder and Director of the Counter-Power Lab, School of Information, University of California at Berkeley Professor Lokman Tsui, The Chinese University of Hong Kong Dear Sirs and Madams, I am writing in regards to your recent letter. We appreciate the opportunity to have met with many of you and your teams and welcome the opportunity to further engage on these important issues. Since our founding, Google has been committed to making the world’s information available to everyone. We believe that knowledge is empowering and that a society with more information is better off than one with less. Providing access to information to people around the world is central to our mission. To further that mission, several years ago we launched our Next Billion Users initiative, dedicated to providing people in emerging markets with customized products and solutions so they can use the power of the internet, including through mobile devices, to better their lives. Many of these innovations have also helped users in economically developed markets, including across much of Europe and in the United States. We have likewise continued to look at ways to serve the 1.4 billion people — including 800 million internet users — who live in China. -
Of Privatized Control Séverine Arsène
The impact of China on global Internet governance in an era of privatized control Séverine Arsène To cite this version: Séverine Arsène. The impact of China on global Internet governance in an era of privatized control. Chinese Internet Research Conference, May 2012, Los Angeles, United States. hal-00704196v2 HAL Id: hal-00704196 https://hal.archives-ouvertes.fr/hal-00704196v2 Submitted on 23 Jan 2014 HAL is a multi-disciplinary open access L’archive ouverte pluridisciplinaire HAL, est archive for the deposit and dissemination of sci- destinée au dépôt et à la diffusion de documents entific research documents, whether they are pub- scientifiques de niveau recherche, publiés ou non, lished or not. The documents may come from émanant des établissements d’enseignement et de teaching and research institutions in France or recherche français ou étrangers, des laboratoires abroad, or from public or private research centers. publics ou privés. The impact of China on global Internet governance in an era of privatized control Séverine Arsène Ph.D in political science, Science Po, France Yahoo! Fellow in residence, Georgetown University (2011‐2012) [email protected] CIRC 2012 Communication Over the last ten years, China has become one of the most prominent actors of the global Internet. It not only has the largest online population (513 million in January 20121). Chinese corporations like ZTE and Huawei are also leaders on the global market for Internet infrastructures and mobile devices. Chinese financial institutions strongly support Chinese corporations’ development overseas by providing funds for massive infrastructure projects, particularly in the telecommunication sector. Furthermore the Chinese government and other private actors are playing an increasingly important role in international fora where Internet governance is discussed, such as the ICANN and the IGF. -
Antonio Tajani MEP President of the European Parliament [email protected]
Antonio Tajani MEP President of the European Parliament [email protected] 12 June 2018 Mr President, Article 13 of the EU Copyright Directive Threatens the Internet As a group of the Internet’s original architects and pioneers and their successors, we write to you as a matter of urgency about an imminent threat to the future of this global network. The European Commission’s proposal for Article 13 of the proposed Directive for Copyright in the Digital Single Market Directive was well-intended. As creators ourselves, we share the concern that there should be a fair distribution of revenues from the online use of copyright works, that benefits creators, publishers, and platforms alike. But Article 13 is not the right way to achieve this. By requiring Internet platforms to perform automatic filtering all of the content that their users upload, Article 13 takes an unprecedented step towards the transformation of the Internet from an open platform for sharing and innovation, into a tool for the automated surveillance and control of its users. Europe has been served well by the balanced liability model established under the Ecommerce Directive, under which those who upload content to the Internet bear the principal responsibility for its legality, while platforms are responsible to take action to remove such content once its illegality has been brought to their attention. By inverting this liability model and essentially making platforms directly responsible for ensuring the legality of content in the first instance, the business models and investments of platforms large and small will be impacted. The damage that this may do to the free and open Internet as we know it is hard to predict, but in our opinions could be substantial. -
5 Intermediary Censorship
5 Intermediary Censorship Ethan Zuckerman Introduction When academics, journalists, or Internet users discuss ‘‘Internet censorship,’’ they are usually referring to the inability of users in a given country to access a specific piece of online content. For instance, when Internet policymakers from around the world came to Tunisia for the 2005 World Summit on the Information Society, they discovered that the Tunisian government was blocking access to several sites, including Yezzi.org, an online freedom of speech campaign.1 This model of Internet filtering, where Internet service providers (ISPs) implement directives issued by government authorities and block connections to selected Web addresses, has been extensively documented by the OpenNet Initiative using in- country testing. Identifying potential cases of filtering by ISPs is likely to be easier in the future with the advent of tools like Herdict (www.herdict.org), which invite end users to be involved with in-country testing on a continuing basis. Given aggressive national filtering policies implemented in countries like Saudi Arabia, China, and Vietnam, state-sponsored ISP-level Web filtering has been an appro- priate locus for academic study. However, ISPs are only one possible choke point in a global Internet. As the Internet increases in popularity around the world, we are begin- ning to see evidence of Internet filtering at other points in the network. Of particular interest are online service providers (OSPs) that host social networking services, blogs, and Web sites. Because so many Internet users are dependent on OSPs to publish con- tent, censorship by these entities has the potential to be a powerful control on online speech. -
Supreme Court of the United States
Nos. 19-416 & 19-453 IN THE Supreme Court of the United States NESTLÉ USA, INC., Petitioner, v. JOHN DOE I, et al., Respondents. –––––––––––––––––––––––––––––– CARGILL, INC., Petitioner, v. JOHN DOE I, et al., Respondents. ON WRITS OF CERTIORARI TO THE UNITED STATES CouRT OF APPEALS FOR THE NINTH CIRcuIT BRIEF OF AMICI CURIAE ACCESS NOW, ARTICLE 19, CENTER FOR LONG-TERM CYBERSECURITY, ELECTRONIC FRONTIER FOUNDATION, PRIVACY INTERNATIONAL AND PROFESSOR RONALD DEIBERT IN SUPPORT OF RESPONDENTS SOPHIA COPE Counsel of Record CINDY COHN ELECTRONic FRONTIER FOUNDATION 815 Eddy Street San Francisco, CA 94109 (415) 436-9333 [email protected] Attorneys for Amici Curiae 298803 i TABLE OF CONTENTS Page TABLE OF CONTENTS..........................i TABLE OF CITED AUTHORITIES ..............iii INTEREST OF AMICI CURIAE ..................1 INTRODUCTION AND SUMMARY OF ARGUMENT ................................5 ARGUMENT....................................7 I. ATS Policy Supports Preserving U.S. Corporate Liability Under the Statute.........7 II. United Nations Policy Supports Preserving U.S. Corporate Liability Under the ATS.......8 III. The Technology Industry Plays a Major Role in Human Rights Abuses Worldwide.....11 A. Researchers Chronicle the Widespread Problem of Technology Companies’ Complicity in Human Rights Abuses .....12 B. American Technology Companies Have Been Complicit in Human Rights Abuses in Foreign Countries............18 ii Table of Contents Page IV. Voluntary Mechanisms for Holding the Technology Industry Accountable for Human Rights Abuses are Inadequate ..............25 A. Limits of Multi-Stakeholder Initiatives ...28 B. OECD Guidelines for Multinational Enterprises ..........................29 C. Global Network Initiative...............33 CONCLUSION .................................35 iii TABLE OF CITED AUTHORITIES Page Cases Balintulo v. Ford Motor Co., 796 F.3d 160 (2d Cir. -
Democratization and Development Alejandro Toledo Thomas Carothers Brian Levy Kenneth Wollack & K
October 2010, Volume 21, Number 4 $12.00 Democratization and Development Alejandro Toledo Thomas Carothers Brian Levy Kenneth Wollack & K. Scott Hubli Liberation vs. Control in Cyberspace Ronald Deibert & Rafal Rohozinski What Does Democracy Mean? Michael Bratton Tianjian Shi & Jie Lu Larry Diamond Fares Braizat Yun-han Chu & Min-hua Huang April Longley Alley on Yemen’s Multiple Crises Mark Thompson on the Philippines Richard Madsen on Religion in China Nic Cheeseman on African Elections Success Stories from “Emerging Africa” Steven Radelet liberation vs. control: the future of cyberspace Ronald Deibert and Rafal Rohozinski Ronald Deibert is associate professor of political science and director of the Citizen Lab at the Munk School of Global Affairs, University of Toronto. Rafal Rohozinski is a principal with the SecDev Group and former director of the Advanced Network Research Group of the Cam- bridge Security Programme. Together they are the founders of the In- formation Warfare Monitor and the OpenNet Initiative. The following essay is adapted from their Access Controlled: The Shaping of Power, Rights, and Rule in Cyberspace (MIT Press, 2010), coedited with John Palfrey and Jonathan Zittrain. Every day there seems to be a new example of the ways in which hu- man ingenuity combines with technology to further social change. For the Green Movement in Iran, it was Twitter; for the Saffron Revolution in Burma, it was YouTube; for the “color revolutions” of the former Soviet Union, it was mobile phones. No matter how restrictive the regu- lations or how severe the repercussions, communities around the world have exhibited enormous creativity in sidestepping constraints on tech- nology in order to exercise their freedoms. -
Analysis of Philanthropic Opportunities to Mitigate the Disinformation/ Propaganda Problem
FALL 2017 ANALYSIS OF PHILANTHROPIC OPPORTUNITIES TO MITIGATE THE DISINFORMATION/ PROPAGANDA PROBLEM Prepared for: Authored by: Kelly Born, Hewlett Foundation Nell Edgington, Social Velocity About the Foundation The William and Flora Hewlett Foundation is a nonpartisan, private charitable foundation that advances ideas and supports institutions to promote a better world. Launched in 2014, the Hewlett Foundation’s Madison Initiative focuses on strengthening democracy and its institutions – Congress, in particular – to be more effective in a polarized age. The initiative is nonpartisan in its approach and supports organizations across the ideological spectrum – think tanks, advocacy groups, academic researchers and civic leadership organizations – who seek to understand and improve the political system so that our elected representatives are better equipped to solve society’s greatest problems. Learn more at www.hewlett.org. Note: The foundation does not lobby or earmark grant funds for prohibited lobbying activities, as defined in the federal tax laws. The foundation’s funding for policy work is limited to permissible forms of support only, such as general operating support grants that grantees can allocate at their discretion and project support grants for nonlobbying activities (e.g., public education and nonpartisan research). Additionally, the foundation may fund nonpartisan political activities by grantees in compliance with the electioneering rules. The foundation does not engage in or use its resources to support or oppose political candidates or parties. 2 Analysis of Philanthropic Opportunities to Mitigate the Disinformation/Propaganda Problem Hewlett.org TABLE OF CONTENTS I. Executive Summary __________________________________________________________ 4 II. The Disinformation/Propaganda Problem and Its Evolution ____________________________ 7 III. Potential Solutions: What’s Known and Still to be Known ________________________ 17 IV.