Fantamag.Com & Storemags.Com

Total Page:16

File Type:pdf, Size:1020Kb

Fantamag.Com & Storemags.Com A plan for Haiti Massachusetts stuns Obama New rules for banks Dark days for lawyers and consultants JANUARY 23RD–29TH 2010 Economist.com The psychology of power Stop! The backlash against big government www.storemags.com & www.fantamag.com Njetj{fcvtjofttftbsfuif fohjoftpgbtnbsufsqmbofu/ Xfbsfmjwjohpobwfszejggfsfouqmbofugspnuifpofxf JCNboepvsCvtjofttQbsuofstbsfxpsljohxjui mjwfepofwfobgfxzfbstbhp/Upebz-bmnptubozuijohjo uipvtboetpgnjetj{fdpnqbojftbspvoeuifxpsme uifxpsmedbocfjotusvnfoufe-joufsdpoofdufeboenbef upcvjmebtnbsufsqmbofu/XfÖsfqspwjejohuifjotjhiut joufmmjhfouÒuiftztufnt-qspdfttftboeefwjdftuibu boeuppmtuifzoffeupxpslnpsfqspevdujwfmzboe fobcmfqiztjdbmhppetupcfefwfmpqfe-nbovgbduvsfe- qspßubcmzÒqpxfsgvm-bggpsebcmftpmvujpotuibudbo cpvhiuboetpme<tfswjdftupcfefmjwfsfe<boecjmmjpot ifmqdpnqbojftjnqspwffgßdjfodz-epnpsfxjuimftt- pgqfpqmfupcpuixpslboemjwf/Jotipsu-pvsqmbofujt bddfmfsbufSPJboetfj{fofxpqqpsuvojujftgbtufs/ cfdpnjohtnbsufs/ XfÖsfbqqmzjohpvsdpmmfdujwfefquiboecsfbeuipg fyqfsjfodfxpsljohxjuijoopwbupstpgbmmtj{ft-bdsptt Uijtjtqpttjcmf-jombshfqbsu-cfdbvtfuifjoopwbujpo fwfszjoevtusz-upbeesfttkvtubcpvuboztj{fqspcmfn- esjwjohbtnbsufsqmbofujtpsjhjobujohboeqspmjgfsbujoh ubtlpsxpslmpbe/ gspnnpsfwbsjfetpvsdftuibofwfscfgpsf/Jogbdu-xifo zpvmpplbubmmuifofxpqqpsuvojujftfnfshjoh-zpvnjhiu Btpvsqmbofucfdpnfttnbsufs-njetj{fcvtjofttft uijoluibuuifzpomzbqqmzupmbshfsfoufsqsjtft/Cvu xjmmxjfmenpsfpguifjoàvfodfuibupodfcfmpohfeup josfbmjuz-njetj{fdpnqbojftibwfcffouiffohjoft pomzuifmbshftufoufsqsjtftÒ boeJCNboepvsCvtjoftt esjwjohfdpopnjdhspxuiboebtnbsufsqmbofugpstpnf Qbsuofstbsfqspwjejohuiftvqqpsuboelopx.ipx ujnfopx/ upifmquvsouifjswjtjpojoupsfbmjuzboeuifjsjefbt joupsftvmut/ Njetj{fboetnbmmfsdpnqbojftsfqsftfounpsfuibo:1& pgbmmcvtjofttftboefnqmpzpwfs:1&pguifxpsmeÖt Njetj{fcvtjofttftbsfuiffohjoftpgbtnbsufsqmbofu/ xpslgpsdf/UifzÖsfsftqpotjcmfgpsdmptfup76&pghmpcbm TffuifdpnqbojftJCNboepvsCvtjofttQbsuofst HEQ/Uifzqspevdfnpsfqbufoutboenpsfjoopwbujpot bsfxpsljohxjuibujcn/dpn0fohjoft2/MfuÖtcvjmeb qfsfnqmpzffuibombshfßsnt/ tnbsufsqmbofu/ JCN-uifJCNmphp-jcn/dpn-TnbsufsQmbofuboeuifqmbofujdpobsfusbefnbsltpgJoufsobujpobmCvtjofttNbdijoftDpsq/-sfhjtufsfejonbozkvsjtejdujpotxpsmexjef/Puifsqspevduboetfswjdfobnft njhiucfusbefnbsltpgJCNpspuifsdpnqbojft/BdvssfoumjtupgJCNusbefnbsltjtbwbjmbcmfpouifXfcbuxxx/jcn/dpn0mfhbm0dpqzusbef/tiunm/ªJoufsobujpobmCvtjofttNbdijoftDpsqpsbujpo3121/ www.storemags.com & www.fantamag.com www.storemags.com & www.fantamag.com Contents The Economist January 23rd 2010 5 8 The world this week 37 New president in Honduras Lobo alone Leaders 38 Brazil’s presidential 11 Big government biopic Stop! Lula, sanitised 12 The Massachusetts 38 A Canadian election misunderstanding The man who fell to earth Just history 13 Sri Lanka’s presidential election Asia Between a rock and a hard Massachusetts After the man 39 The war in Afghanistan Democrats’ stunning loss, Bombs and baksheesh Barack Obama has no choice 13 After the earthquake but to move back to the centre: A plan for Haiti 40 Pakistan’s vulnerable On the cover president leader, page 12. How Scott The size and power of the 14 Reforming banks In disrepute Brown swept up the Bay State The weakest links state is growing, and 40 Sri Lanka’s Tamil and stymied health reform in discontent is on the rise: 15 Ukraine’s presidential diaspora Washington, DC, page 27 leader, page 11. The return election Next year in Jana of big government means An orange and two lemons 41 Political scandals in that policymakers must Japan grapple again with some Letters basic questions. They are Ozawa at bay now even harder to answer, 16 On Pakistan, water, 41 China’s assertiveness pages 23-26 bankers, housing, Choppy waters Socrates, global warming, 42 Protest in Hong Kong e-readers On track for confrontation 43 Banyan Brieng Indonesia’s books of Daily news and views: news 23 The growth of the state slaughter and forgetting analysis, online-only columns, Leviathan stirs again blogs on politics, economics and Haiti The government cannot travel, and a correspondent’s Middle East and Africa rebuild the country. A diary United States 44 Israel and Palestine temporary authority needs to be set up to do so: leader, page E-mail: newsletters and 27 The Massachusetts Do get talking again mobile edition shocker 45 Israel’s prime minister 13. The world’s attempt to aid Economist.com/email The unstoppable truck The media get at his wife Haitians stumbles against extraordinary diculties of Research: search articles since 28 Health reform 45 The Muslim Brothers transport and communication, 1997, special reports Rip it up and start again Whither its new leader? Economist.com/research page 35. Insuring against 29 The housing market 46 Ethiopia’s election disaster, page 73 Print edition: available online Still in the cellar Jangling nerves by 7pm London time each Thursday 29 Reforming West Virginia’s Economist.com/print legal system Europe Small steps Audio edition: available online to 47 Ukraine’s election download each Friday. 30 California’s Central Valley Economist.com/audioedition Five years on in Kiev The Appalachia of the West 49 Germany’s government 32 Antitrust law and football Waiting for Angela Out of many, one? 50 Sweden leans left again 32 Pets in the recession Trouble at home Howls for help 50 The Irish economy Volume 394 Number 8666 33 Lexington Green shoots The fat plateau First published in September 1843 51 Greece’s public nances Ukraine Whoever ends up to take part in "a severe contest between Pull the other one intelligence, which presses forward, and leading the country needs an unworthy, timid ignorance obstructing The Americas 52 Charlemagne encouragement from the our progress." 35 Chaos in Haiti Europe and China European Union: leader, page Editorial oces in London and also: A massive relief eort 15. The presidential election Bangkok, Beijing, Berlin, Brussels, Cairo, Chicago, Delhi, Frankfurt, Hong Kong, limps into gear shows that the orange Jerusalem, Johannesburg, Los Angeles, 36 Lessons from the tsunami revolution is out of pu, no Mexico City, Moscow, New York, Paris, matter who eventually wins, San Francisco, São Paulo, Tokyo, Washington Too much of a good thing? 37 Chile’s presidential page 47 election Piñera promises a gallop 1 Contents continues overleaf www.storemags.com & www.fantamag.com 6 Contents The Economist January 23rd 2010 Britain 72 Europe’s co-operatives Mutual respect 53 Manufacturing blues Another one bites the dust 73 Exchange-traded funds Trillion-dollar babies 54 The return of ination A bungee-jump 73 Catastrophe insurance When calamity strikes 55 Defence-spending cuts You can’t ght in here, this 74 Economics focus is the war room Investment in Asia International Science and technology Base camp Basel New rules Next week 57 Spending on education 75 The psychology of power will make the average bank We publish a special report Investing in brains Absolutely safer. But what about the on online social networks. 58 Schools in poor countries 76 Glaciers and the IPCC outliers? Leader, page 14. O-base camp They are changing the way Regulators are trying to make Reaching the neediest people communicate, work Railways and slime moulds banks better equipped to deal 77 and play, and mostly for the A life of slime with catastrophe, pages 66-68. Business better, says Martin Giles A new round of results, page 70 61 America’s car industry Small cars, big question Books and arts 78 War in Georgia Principal commercial oces: 62 Renault and meddling 25 St James’s Street, London sw1a 1hg politicians Ungodly suering Tel: 020 7830 7000 Fax: 020 7839 2968/9 Attempted carjack 79 Mahathir Mohamad 6 rue Paul Baudry, 75008 Paris, France Tel: +33 153 936 600 Fax: +33 153 936 603 62 The business of What the doctor ordered 79 The music of Carlo 111West 57th Street, New York NY10019 dissecting electronics Tel 1212 5410500 Fax 1212 5419378 The lowdown on teardowns Gesualdo Lurid rhythms 60/F Central Plaza 63 Shenzhen’s fading spirit 18 Harbour Road, Wanchai, Hong Kong of enterprise 80 The European Union Tel 852 2585 3888 Fax 852 2802 7638 No longer so special What is it for? Other commercial oces: 80 Henning Mankell Chicago, Frankfurt, Los Angeles, 64 Professional-services San Francisco and Singapore rms Chewing the fat Lawyers and consultants The Laid-o lawyers, cast-o downturn is sorting the best 81 Indian contemporary art consultants professional-services rms Public notices Subscription service from the rest, page 64. The 65 Schumpeter 81 The Royal Society For our latest subscription offers, visit Consultants in the public Like-minded fellows Economist.com/offers public sector has had its ll of For subscription service, please contact by management consultants: sector telephone, fax, web or mail at the details Schumpeter, page 65 provided below: Obituary Telephone: 1 800 456 6086 (from outside Brieng the US and Canada, 1 314 447 8091) 82 Jyoti Basu Facsimile: 1 866 856 8075 (from outside 66 Reforming banking India’s almost-prime the US and Canada, 1 314 447 8065) Base camp Basel minister Web: Economistsubs.com E-mail: [email protected] Post: The Economist Subscription Services, P.O. Box 46978, Finance and economics 89 Economic and nancial St. Louis, MO 63146-6978, USA 69 The world economy indicators Subscription for 1 year (51 issues) Pulling apart Statistics on 42 United States US$138 70 China’s economy economies, plus closer Canada CN$189 Central heating looks at Israel’s economy Argentina US$287 and gold production Mexico US$240 70 American banks Rest of Latin America US$264 Through FICC and thin Psychology
Recommended publications
  • RISKS Volume 18
    The Risks Digest Volume 18: Issue 1 Forum on Risks to the Public in Computers and Related Systems ACM Committee on Computers and Public Policy, Peter G. Neumann, moderator Volume 18: Issue 1 Friday 5 April 1996 Contents Sixth Computers, Freedom and Privacy Shabbir J. Safdar A Wiretap Incident in New Orleans Shabbir J. Safdar Computer Error Costs MCI $Millions Scott Lucero Teen Accused of Hacking David M Kennedy Only Americans can contact the AT&T operator Tom Gardner Re: Wrong approach to Java security Frank Stuart Re: Risks of rewritable BIOSes Jeremy J Epstein Re: "This is not a bug" messages: MacsBug David A. Lyons Re: The Queen's Speech Allan Engelhardt Re: Notes on e-mail: Use of diaeresis Dan Hicks http://catless.ncl.ac.uk/Risks/18.01.html (1 of 21)2005-04-14 18:22:01 The Risks Digest Volume 18: Issue 1 Daan Sandee On the meaning of "email" Clive Feather Browser return e-mail addresses Walter Roberson Info on RISKS (comp.risks) Sixth Computers, Freedom and Privacy Shabbir J. Safdar <[email protected]> Thu, 04 Apr 1996 16:05:34 -0500 I attended last week's Sixth Computers, Freedom, and Privacy conference in Cambridge MA, where policy-makers, technical experts, and activists came together to hash out the intersection of the three elements of its title. CFP is an unusual place; the closest thing our community can get to "neutral ground" on many issues. This is best expressed by the fact that in the hallways of the hotel, it's not unusual to see those that supported and those that fought the Communications Decency Act hob-nobbing it up, trading friendly swipes about their take on the bill.
    [Show full text]
  • What We Can Learn About China from Research Into Sina Weibo
    CHINESE SOCIAL MEDIA AS LABORATORY: WHAT WE CAN LEARN ABOUT CHINA FROM RESEARCH INTO SINA WEIBO by Jason Q. Ng English Literature, A.B., Brown University, 2006 Submitted to the Graduate Faculty of the Dietrich School of Arts and Sciences in partial fulfillment of the requirements for the degree of Master of Arts of East Asian Studies University of Pittsburgh 2013 fcomfort UNIVERSITY OF PITTSBURGH THE DIETRICH SCHOOL OF ARTS AND SCIENCES This thesis was presented by Jason Q. Ng It was defended on April 9, 2013 and approved by Pierre F. Landry, Associate Professor, Political Science Ronald J. Zboray, Professor, Communication Mary Saracino Zboray, Visiting Scholar, Communication Thesis Director: Katherine Carlitz, Assistant Director, Asian Studies Center ii Copyright © by Jason Q. Ng 2013 iii CHINESE SOCIAL MEDIA AS LABORATORY: WHAT WE CAN LEARN ABOUT CHINA FROM RESEARCH INTO SINA WEIBO Jason Q. Ng, M.A. University of Pittsburgh, 2013 Like all nations, China has been profoundly affected by the emergence of the Internet, particularly new forms of social media—that is, media that relies less on mainstream sources to broadcast news and instead relies directly on individuals themselves to share information. I use mixed methods to examine how three different but intertwined groups—companies, the government, and Chinese Internet users themselves (so-called “netizens”)—have confronted social media in China. In chapter one, I outline how and why China’s most important social media company, Sina Weibo, censors its website. In addition, I describe my research into blocked search terms on Sina Weibo, and explain why particular keywords are sensitive.
    [Show full text]
  • Rachel Coldicutt OBE—Written Evidence (FEO0122)
    Rachel Coldicutt OBE—written evidence (FEO0122) House of Lords Communications and Digital Committee inquiry into Freedom of Expression Online 2. How should good digital citizenship be promoted? How can education help? 2.1 This evidence submission makes the case that good digital citizenship requires a wider choice of platforms, supported by new models of ownership, and increased scrutiny of digital platforms’ business strategies and internal success metrics. Educating users to be better digital citizens is one part of the puzzle, but for education to be effective, digital platforms must be held accountable for creating better civic spaces, and digital citizens must be entitled to exercise due rights and benefit from protections. 2.2 The concept of “good digital citizenship” is not easily defined, and any consideration of it must take into account the differences between life online and life offline. 2.3 Firstly, where is a digital citizen a citizen of? The history and ownership structures of “cyberspace” do not make it easy for individuals to translate the norms that may be expected offline into the online world. Digital governance is a complex topic and, while there is not space to give a complete overview here, it is worth noting that true “digital sovereignty” – the ability of a state or group of states to “act independently in the digital world”1 – is not baked into the products and services that most people use day-to-day. 2.4 It is now generally accepted that a single global Internet has been replaced by the “Splinternet”, a set of discrete socio-political technical territories.2 In 2018, O’Hara and Hall identified four internets – and the cultural values of those four dominant territories define the global digital experience.
    [Show full text]
  • Dolphins in the Net: Internet Content Filters and the Advocate General’S Glawischnig-Piesczek V
    STANFORD Dolphins in the Net: Internet Content Filters and the Advocate General’s Glawischnig-Piesczek v. Facebook Ireland Opinion Daphne Keller Director of Intermediary Liability 2019 559 Nathan Abbot Way Stanford, CA 94305 cyberlaw.stanford.edu Dolphins in the Net: Internet Content Filters and the Advocate General’s Glawischnig- Piesczek v. Facebook Ireland Opinion Daphne Keller1 Stanford Center for Internet and Society September 4, 2019 Table of Contents I. Introduction ...................................................................................................... 2 II. Process and Representation Issues .................................................................. 7 III. Making Facebook Monitor and Filter Users’ Posts ......................................... 11 A. Policy Backdrop ........................................................................................... 12 B. Legal Analysis .............................................................................................. 15 1. Fundamental Rights .....................................................................................17 a. What “Identical” or “Equivalent” Content Is to Be Filtered? .................. 19 i. “Identical” Content ................................................................................ 19 ii. “Equivalent” Content ............................................................................ 22 b. How Much of the Filtered Content Will Be Illegal?................................. 23 c. What Happens if Filters Take Down Legal Content?
    [Show full text]
  • Bishop Fox Cybersecurity Style Guide
    BISHOP FOX CYBERSECURITY STYLE GUIDE VERSION 1.1 JUNE 27, 2018 This work is licensed under a Creative Commons Attribution-ShareAlike 2.0 Generic License. Bishop Fox Contact Information: +1 (480) 621-8967 [email protected] 8240 S. Kyrene Road Suite A-113 Tempe, AZ 85284 Contributing Technical Editors: Brianne Hughes, Erin Kozak, Lindsay Lelivelt, Catherine Lu, Amanda Owens, Sarah Owens We want to thank all of our Bishop Fox consultants, especially Dan Petro, for reviewing and improving the guide’s technical content. Bishop Fox™ 2018/06/27 2 TABLE OF CONTENTS Welcome! ................................................................................................................................. 4 Advice on Technical Formatting ........................................................................................................ 5 What to Expect in the Guide .............................................................................................................. 6 The Cybersecurity Style Guide .............................................................................................. 7 A-Z .......................................................................................................................................................... 7 Appendix A: Decision-making Notes .................................................................................. 96 How We Choose Our Terms ............................................................................................................96 How to Codify Your Own Terms ......................................................................................................97
    [Show full text]
  • Pdf Compiledsquare-Manual0109-Proof
    GNU Essentials GNU Linux Manual of Style for Technical Content Creators 2020 Copyright (c) GNU Essentials ISBN: 978-1-71683-468-4 Manufactured in the United States of America You may distribute the GNU Linux Manual of Style and/or modify the GNU Linux Manual of Style under the following terms: Code GNU General Public License (http://www.gnu.org/licenses/gpl.html), version 3 or later Content Creative Commons Attribution License (http://creativecommons.org/licenses/by/4.0/), version 4.0 or later (Other content used in the book was this license, so this became the preferred license) Trademarks: Respecting the choice to trademark by others, we do not have trademark rules for GNU Essentials, FAQ Linux, R00T magazine or A-Z Technical Writing. Linux® is the registered trademark of Linus Torvalds in the U.S. and other countries. Foreword About the Author Overview Dedication Revision History 1. Documentation Development Life Cycle 1.0 Basics of Technical Authoring...........................................................................................................11 1.1 Documentation Development Life Cycle............................................................................................11 1.2 Example: Get Started Guide..............................................................................................................29 Chapter 2. GNU Linux Style Guidelines 2.0 Headings...........................................................................................................................................35 2.1 Images.............................................................................................................................................
    [Show full text]
  • The Scunthorpe Problem
    THE SCUNTHORPE PROBLEM Darryl Francis Brampton, Cumbria, England [email protected] Scunthorpe is an industrial town in North Lincolnshire, England, with a population of about 80,000. So, what’s the Scunthorpe problem? According to Wikipedia: “The Scunthorpe problem is the blocking of websites, e-mails, forum posts or search results by a spam filter or search engine because their text contains a string of letters that appear to have an obscene or unacceptable meaning. Names, abbreviations, and technical terms are most often cited as being affected by the issue. The problem arises since computers can easily identify strings of text within a document, but interpreting words of this kind requires considerable ability to interpret a wide range of contexts, possibly across many cultures, which is an extremely difficult task for computers at present. As a result, broad blocking rules may result in false positives affecting innocent phrases.” The four letters at the heart of the Scunthorpe problem were the basis for the research in this article. There are many dictionaries of slang which list numerous words beginning with those four letters. An extensive source is the excellent three-volume Green’s Dictionary of Slang, published in 2010; also available at www.greensdictofslang.com. However, the thrust of this article is to document some of the types of words that just coincidentally contain the Scunthorpe tetragram appearing together and in order. Let’s take a look at what can be found in traditional paper dictionaries. Webster’s Second Edition contains two such words: • placuntitis: the same as placentitis, inflammation of the placenta; • placuntoma: the same as placentoma, a tumor developed from the placenta or placental remnants.
    [Show full text]
  • Entity Linking Aleksander Smywinski-Pohl´
    Proceedings of the PolEval 2019 Workshop Maciej Ogrodniczuk, Łukasz Kobyliński (eds.) j Institute of Computer Science, Polish Academy of Sciences Warszawa, 2019 Contents PolEval 2019: Introduction Maciej Ogrodniczuk, Łukasz Kobylinski´ . .5 Results of the PolEval 2019 Shared Task 1: Recognition and Normalization of Temporal Expressions Jan Kocon,´ Marcin Oleksy, Tomasz Berna´s, Michał Marcinczuk´ . .9 Results of the PolEval 2019 Shared Task 2: Lemmatization of Proper Names and Multi-word Phrases Michał Marcinczuk,´ Tomasz Berna´s................................. 15 Results of the PolEval 2019 Shared Task 3: Entity Linking Aleksander Smywinski-Pohl´ . 23 PolEval 2019: Entity Linking Szymon Roziewski, Marek Kozłowski, Łukasz Podlodowski . 37 Results of the PolEval 2019 Shared Task 4: Machine Translation Krzysztof Wołk . 47 The Samsung’s Submission to PolEval 2019 Machine Translation Task Marcin Chochowski, Paweł Przybysz . 55 Results of the PolEval 2019 Shared Task 5: Automatic Speech Recognition Task Danijel Koržinek . 73 Automatic Speech Recognition Engine Jerzy Jamro˙zy, Marek Lange, Mariusz Owsianny, Marcin Szymanski´ . 79 Results of the PolEval 2019 Shared Task 6: First Dataset and Open Shared Task for Automatic Cyberbullying Detection in Polish Twitter Michał Ptaszynski,´ Agata Pieciukiewicz, Paweł Dybała . 89 Simple Bidirectional LSTM Solution for Text Classification Rafał Pronko´ .............................................. 111 4 Comparison of Traditional Machine Learning Approach and Deep Learning Models in Automatic Cyberbullying Detection for Polish Language Maciej Biesek . 121 Przetak: Fewer Weeds on the Web Marcin Ciura . 127 Approaching Automatic Cyberbullying Detection for Polish Tweets Krzysztof Wróbel . 135 Exploiting Unsupervised Pre-Training and Automated Feature Engineering for Low-Resource Hate Speech Detection in Polish Renard Korzeniowski, Rafał Rolczynski,´ Przemysław Sadownik, Tomasz Korbak, Marcin Mo˙zejko .
    [Show full text]
  • Walk the Line
    Walking the Line in Computational Creativity: Paradox and Pitfall in the Mitigation of Automated Offense Tony Veale School of Computer Science, University College Dublin, Ireland. [email protected] Abstract or land too far away to be valued as meaningful or useful. Social media is now the megaphone of choice for many While the “ugly” represents the worst of the rest, the set of digital-age provocateurs. Social networks offer a wealth outputs most likely to cross the line and cause real offense, of examples of egregious misbehaviour by humans, but it also overlaps as much with the “good” as with the “bad.” perhaps more worryingly, they also serve to magnify and Ugliness is not the absence of beauty, nor is it its opposite. weaponize the automated outputs of generative systems. These are complementary qualities that can sit side by side So what responsibilities do the creators of these systems in the same outputs. One can craft an elegant turn of phrase bear for the offenses caused by their creations, and what or a masterly image to express a truly abhorrent viewpoint. can they do to prevent, or mitigate, the worst excesses? If the ugly were just a subset of the bad, we could reduce For those who “make things that make things,” the issue the potential for offense by simply making a system better is further complicated by the potential of our systems to at what it is meant to do. However, as one can sit cheek by accidentally tread on the feelings of others. When does a norm become a troubling stereotype, and how should jowl with the other, an appealing surface is no guarantee a system built on social norms avoid crossing the line? that an appalling message is not lurking beneath.
    [Show full text]
  • Censorship, Privacy and Internet
    Censorship, privacy and Internet Kaido Kikkas SPEAIT 2016/2017 2016 Kaido Kikkas. This document is dual-licensed under the GNU Free Documentation License (v l.2 or newer) and the Creative Commons Attribution-ShareAlike (BY-SA) 3.0 Estonia or newer license "There is nothing new under the sun" (Ecclesiastes) • Censorship has been tracked back to Ancient Egypt • Classical Greek and Roman civilizations had it too • Mentioned in the Bible (persecution of prophets) • Index librorum prohibitorum • The USSR outlawed all religious literature • ... 15.11.16 America the Beautiful • On the one hand, strives to be a model democracy • On the other hand, has a history of hard censorship • Comstock Act (Federal Anti-Obscenity Act) - signed in 1873, has not been voided yet ● Voltaire, Boccaccio, Chaucer.... ● 1001 Nights (considered “youth literature” in the USSR!) ● Dr Dolittle by Hugh Lofting ● Uncle Tom's Cabin by Harriet Beecher Stowe ● Tom Sawyer and Huckleberry Finn by Mark Twain 15.11.16 Internet censorship • A relatively new phenomenon, starting mostly in the nineties • A reason: stems from radically different roots and culture than censorship hardliners – the latter just were not aware of it for awhile 15.11.16 Importance of the issue • Access to information is a condition for being full citizens • Limitations put it under question • Information ==> power ==> money • Suppression of dissent <==> democracy • But recently has been most notable in the “democratic West” 15.11.16 Depends on how you call it • Filtering => "remove dirt, keep the clean stuff“ • Blocking => "denying access“ • Censoring => "(ab)using power to deny access" SAME MEANING, DIFFERENT ATTITUDES 15.11.16 The world in 2011 https://commons.wikimedia.org/wiki/File:Internet_Censorship_and_Surveillance_World_Map.svg 15.11.16 Beginning • 1990 – U.S.
    [Show full text]
  • Accessed Here
    Notes These notes cite sources I consulted while writing Euphemania. A page number from Euphemania appears at left, followed by a keyword or keywords from the relevant passage, then the source. Because most of these sources are listed in the bibliography of Euphemania, only brief citations are given here. If a source is not included in the bibliography, complete publication information is provided. 1. Mincing Words 3 Haruf: Kent Haruf, Plainsong (New York: Knopf, 1999), 127. 4 Churchill: Holder, 404. Although Langworth, 581, questions the authenticity of this episode, as do others, Churchill’s granddaughter Celia Sandys recounts it in a Daily Mail interview, September 6, 2008. 5 environmentalist: Elizabeth Kolbert, “Green Like Me,” New Yorker, August 31, 2009, 73. 5 FBI agent: NBC Nightly News, January 17, 2009. 5 homosexuals: Ayto, 105–7; Bertram, 163, 197, 270–71; Holder, 181, 285; George Pelecanos, The Big Blowdown (New York: St. Martin’s Press, 1996), 193; McHenry, 533–48; Anthony, 202. 6 Müller: Müller, Land of Green Plums, 71. 7 Eupheme, euphemism: David Kravitz, Who’s Who in Greek and Roman Mythology (New York: Clarkson Potter, 1975), 95; Burchfield, “An Outline,” 13; OED. 9 Cape of Good Hope: Griffin, 32; Cape Point, http://www.capepoint.co.za/flying_dutchman/follow_the_map/ (accessed March 25, 2010). 9 emerging consumers: New Yorker, December 21 & 28, 2009, 96. 9 Greeks and Romans: Griffin, 33–34. 9 execution: Griffin, 34; OED. 10 BBC correspondent: Mark Doyle, The World (PRI), November 25, 2008. 12 2008 press account: New Yorker, July 21, 2008. 12 Holder: R. W. Holder, A Dictionary of Euphemisms: How Not to Say What You Mean.
    [Show full text]
  • Cenzura Internetu
    LISTOPAD 2016 BACKGROUND REPORT| XXII | OSN | UNESCO | 01 AMO.CZ Cenzura internetu Konstantin Sulimenko PRAŽSKÝ STUDENTSKÝ SUMMIT | WWW.STUDENTSUMMIT.CZ 1 Úvod Internet za posledních několik desetiletí způsobil revoluci v oblasti komunikace. Zvláštní zpravodaj Rady pro lidská práva ostatně nedávno přístup k internetu dokonce označil za jedno ze základních lidských práv.1 Rozvoj jeho možností však naráží na pokusy o jejich regulaci. V drtivé většině států světa regulace zahrnuje cenzuru nemorálního a nelegálního materiálu, například dětské pornografie, v dalších se pak reguluje i obsah chráněný autorským právem nebo nepovolené zveřejňování osobních údajů. Hlavní část tohoto dokumentu se však zaměřuje na cenzuru informací, které lze skrze internet sdílet, a na cenzuru přístupu k nim. Nejeden autoritářsky řízený stát svobodu vyjadřování i svobodný přístup k informacím v rozporu s platným mezinárodním právem potlačuje. Na UNESCO jakožto na organizaci, která si vzala za cíl chránit svobodu slova, tedy leží úkol určit rámce svobodného pohybu online. Cenzuru pro účely tohoto dokumentu chápeme jako znepřístupnění informace nebo zamezení možnosti tvořit informaci, která je cenzorem považována za škodlivou nebo nežádoucí. 1.1 Historie internetu Původ internetu můžeme odvodit od ARPAnetu (ARPA je odvozeno od Advanced Research Projects Agency) Ministerstva obrany Spojených států amerických.2 Zároveň s tímto projektem vznikaly i další sítě, ať už jako prostředky komerční nebo veřejné sféry, dlouho se je však nedařilo propojit mezi sebou. Zlom nastal
    [Show full text]