Busted! the Truth About the 50 Most Common Internet Myths

Total Page:16

File Type:pdf, Size:1020Kb

Busted! the Truth About the 50 Most Common Internet Myths BUSTED! THE TRUTH ABOUT THE with 50 MOST summaries in German, Arabic, COMMON Chinese, French, Russian and INTERNET Spanish MYTHS edited by Matthias C. Kettemann and Stephan Dreyer Leibniz Institute for Media Research | Hans-Bredow-Institut internetmythen.de • internetmyths.eu Internet Governance Forum Berlin 25–29 November 2019 TABLE OF CONTENTS 8 | Prefaces 12 | Introduction by the Editors Chapter I: Rights and Rules 18 | Myth #1: What people do on the Internet cannot be regulated. Nikolas Guggenberger 22 | Myth #2: International law does not apply on the Internet. Matthias C. Kettemann 26 | Myth #3: Code is law. Riikka Koulu 30 | Myth #4: Protocols do not have politics. Corinne Cath-Speth 34 | Myth #5: Cybercriminals go free. Amadeus Peters 38 | Myth #6: You can say what you want online. Emily Laidlaw 42 | Myth #7: Internet platforms are not liable for user-generated content. Amélie Pia Heldt 46 | Myth #8: The Internet has always run on multistakeholder approaches. Roxana Radu 50 | Myth #9: On the Internet, everything is free. Kurt M. Saunders 3 Chapter II: Security and Safety 102 | Myth #21: All Internet users experience the same Internet. David Schulze 56 | Myth #10: Cyberwar is coming. Matthias Schulze 106 | Myth #22: We all live in filter bubbles. Sebastian Randerath 60 | Myth #11: Arms control in cyberspace is not possible. Thomas Reinhold 110 | Myth #23: People get their news only via social media. Sascha Hölig 64 | Myth #12: The best cyber defense is a good cyber offense. Sven Herpig 114 | Myth #24: Likes and shares reliably indicate popularity. Ulrike Klinger 68 | Myth #13: Drastic improvements in cybersecurity are urgently needed. Andrew Odlyzko 118 | Myth #25: Fake news is a real problem. Tommaso Venturini 72 | Myth #14: Only criminals want anonymity online. Thorsten Thiel 122 | Myth #26: We are all journalists and news creators now. Michael S. Daubs 76 | Myth #15: The Internet was invented by the Pentagon and designed to survive a nuclear attack. 126 | Myth #27: Millennials are all Internet-savvy “digital natives”. Ian Peter Claudia Lampert 80 | Myth #16: End-to-end encrypted messaging means that pure privacy 130 | Myth #28: The Internet promotes democracy, like during is protected. the “Arab Spring”. Ilja Sperling Laeed Zaghlami 84 | Myth #17: The dark web is a hidden place of evil. 134 | Myth #29: The Internet destroys the integrity of elections. Suzette Leal Franziska Oehmer and Stefano Pedrazzi 138 | Myth #30: Digital rights campaigns are run by bots, not real activists. Chapter III: Inclusion and Integration Alek Tarkowski 90 | Myth #18: The Internet is an emancipatory tool to end all discrimination. 142 | Myth #31: The Internet enables organizing without organization. Katharina Mosene Sebastian Berg 94 | Myth #19: Search engines provide objective results. 146 | Myth #32: Digital work is immaterial. Astrid Mager Fabian Ferrari and Mark Graham 98 | Myth #20: Social media is an accurate mirror of society. Jozef Michal Mintal 4 5 Chapter IV: Infrastructure and Innovation 202 | Myth #45: Privacy is dead. Paula Helm with Tobias Dienlin, Johannes Eichenhofer and 152 | Myth #33: Cyberspace is totally separate from “the real world”. Katharina Bräunlich Daniel Lambach 206 | Myth #46: The Internet never forgets. 156 | Myth #34: There is no “there” on the Internet. Stephan Dreyer Martin Dittus, Sanna Ojanperä, Mark Graham 210 | Myth #47: Data protection law is about controlling data. 160 | Myth #35: The Internet is an Internet. Maximilian von Grafenstein Sebastian Gießmann 214 | Myth #48: Information wants to be free. 164 | Myth #36: We pay to access the Internet, which is provided by others. Mark Perry Bob Frankston 218 | Myth #49: Peer-to-peer technology is about sharing files illegally. 168 | Myth #37: The Internet is in the clouds. Francesca Musiani Daniel Voelsen 222 | Myth #50: Blockchains will solve all our problems. 172 | Myth #38: The Domain Name System guarantees a global Internet. Martin Florian Robin Tim Weis 176 | Myth #39: Net Neutrality is secured across the Internet. 226 | Postscript by Wolfgang Kleinwächter Bernadette Califano, Mariano Zukerfeld 230 | List of Abbreviations 180 | Myth #40: The Internet democratizes innovation. Alina Wernick 232 | Contributors 184 | Myth #41: Network effects cannot be overcome. 240 | Acknowledgements Paul Belleflamme Chapter V: Data and Disruption At the Leibniz Institute for Media Research | Hans-Bredow-Institut, the 190 | Myth #42: Algorithms are always neutral. authors would like to express their thanks to Wolfgang Schulz, Uwe Hasebrink, Matthias Spielkamp Kristina Hein, Jana Lemke, Katharina Mosene, Anna Sophie Tiedeke, Glacier Kwong, Jan Reschke, Johannes Schmees, Johanna Friederike Stelling, 194 | Myth #43: AI will fix it. Johanna Sebauer and Ilse Kettemann. Christian Katzenbach 198 | Myth #44: AI is in the hands of companies. Philippe Lorenz and Kate Saslow 6 7 PREFACE BY VINT G. CERF This is a wide-ranging compilation of opinions a universe of functionality unreachable in the static about the Internet and various truths and myths print form. Content can be searched, translated, about its operation, use and impact. While I organized, repurposed, and adapted in ways limited don’t agree with all of the characterizations only by our ability to imagine and write software to found in this collection, I think it is important implement new capabilities. to examine assertions made about the Internet and its applications both to clarify The profusion of information found in the Net puts a misunderstandings and to understand how some burden on users to think critically about the quality, of these misrepresentations come about. Some accuracy and veracity they find. This takes work and, originate in a kind of zealous hubris about the in some sense, is the price we pay for the information independence of cyberspace, which, on closer freedom found in the online world. Those freedoms Vinton G. Cerf, inspection, is revealed to be more bound to are at risk, however, precisely because the borderless widely considered the physical and political world than one might Internet is more embedded in the political landscape one of “the fathers think. Others strike me as excuses for adopting than its enthusiastic promoters sometimes wish. of the Internet”, positions that are inimical to the beneficial uses Dispelling myths has the benefit of placing a reality is VP and Chief of the present day Internet. What is important lens on this remarkable environment and the resulting Internet Evangelist is for readers to approach these analyses in the clarity can help us to steer a course towards an at Google. He helped spirit of ascertaining useful truths about the Internet whose benefits can consistently outpace its found ICANN and complex artifact that the Internet has become. deficits. was Chairman of its The implementation and use of the Internet varies Board from 2000 to significantly from one jurisdiction to another, 2007. The recipient depending on physical infrastructure, culture, of many honorary societal norms and available technology. The degrees he has been “myths” need to be examined and evaluated in awarded, inter alia, context to be understood and properly evaluated. the National Medal of Technology, the My own biases are sure to be evident owing to Turing Award and my long-time involvement in many aspects of the the Presidential Internet’s creation and evolution, but I continue to Medal of Freedom. believe that, as a platform, it has and will continue to be an extraordinary source of information, innovation and collaboration. The World Wide Web that rides atop the Internet infrastructure has promoted a cornucopia of applications and information infusion comparable to the invention of the printing press. But the unique flexibility of the underlying computing infrastructure provides 8 9 PREFACE BY WOLFGANG SCHULZ In this complex digital world, we – citizens, Everyone who works with these metaphors, images politicians and business leaders – need images and narratives has a great responsibility here. and narratives that help us understand the world This is also and especially true for academia. It we live in. In most cases it is quite enough for us is not enough to carry out individual studies that that these are plausible. We often cannot check refute the thesis of echo chambers and offer more whether they are true, and so the conclusiveness sophisticated concepts. These concepts must also be of a nice analogy or the fascination with a concept conveyable in such a way that they can be connected that brings complex developments down to earth to social discourse. Otherwise, the established is enough for us. myth will remain, even if some scholars know that it is empirically wrong. The authors and editors of The echo chamber, one of the myths described in this book deserve our sincere thanks – not only for Wolfgang Schulz this book, can serve as an example. It has almost drawing attention to this challenge, but also for is Director, Leibniz become a catchphrase to say that “we all live in starting to solve it right away. Institute for Media echo chambers” at the opening of conferences. Research | Hans- While this sounds plausible, it has only one small Bredow-Institut flaw – it‘s not true, at least not in this broad (HBI), Hamburg; sense. It has been demonstrated that – at least Chair of Media in Germany where the “echo chamber” narrative Law and Public is very popular – real echo chambers only exist Law including for smaller extremist groups, not for society at their Theoretical large. Most people still want to be part of an Foundations, overall “societal discourse” and use a broad media University of repertoire to gather information. Hamburg, holder of the UNESCO For the Internet, the services and the social Chair for Freedom practices that the Internet makes possible, of Communication this dependence on conclusive descriptions, and Information, metaphors and explanations is particularly strong. University of The Internet is not tangible, communications Hamburg; Director, over networks are ultimately based on protocol Humboldt Institute standards.
Recommended publications
  • The Internet Beyond Borderless Versus Balkanized
    POROUS TERRITORIES: THE INTERNET BEYOND BORDERLESS VERSUS BALKANIZED LUKE MUNN Western Sydney University (Australia) [email protected] Abstract: If the internet was once viewed as a borderless realm, critics now warn it is in danger of being “balkanized”, splintering into nationalized fragments. Certainly nation-states increasingly see the Internet as “their” internet, a national space to be regulated and actively shaped. The first half of this article charts the technologies that appear to place this vision within reach: data localization, internet shutdowns, and internet filtering. These moves promise to exert sovereign control, to make the inter- net an extension of national territory. Yet by drawing on two recent events in China, this article argues that these territories are messy and their borders are permeable. Pro-government activists jump across the firewall in order to attack individuals and organizations who threaten the stability and security of their motherland. Simultane- ously, individuals scale the firewall in order to question the party line and express solidarity with democratic movements, undermining the political and technical boundaries established by their nation. Internet architectures create a condition where territorialization is constantly being both amplified and undermined by “extra- territorial” activities. These practices demonstrate the everyday porosity of internet territories, providing a messier portrait that goes beyond the dichotomy of borderless vs balkanized. Keywords: territory, fragmentation, balkanization, internet, China. When nations speak of the internet today, they no longer use the language of the virtual, but of soil. At the dawn of the internet, cyberspace was framed as a new realm decoupled from the state. This digital sphere stretched across the globe, making it essentially ungovernable.
    [Show full text]
  • Marconi Society - Wikipedia
    9/23/2019 Marconi Society - Wikipedia Marconi Society The Guglielmo Marconi International Fellowship Foundation, briefly called Marconi Foundation and currently known as The Marconi Society, was established by Gioia Marconi Braga in 1974[1] to commemorate the centennial of the birth (April 24, 1874) of her father Guglielmo Marconi. The Marconi International Fellowship Council was established to honor significant contributions in science and technology, awarding the Marconi Prize and an annual $100,000 grant to a living scientist who has made advances in communication technology that benefits mankind. The Marconi Fellows are Sir Eric A. Ash (1984), Paul Baran (1991), Sir Tim Berners-Lee (2002), Claude Berrou (2005), Sergey Brin (2004), Francesco Carassa (1983), Vinton G. Cerf (1998), Andrew Chraplyvy (2009), Colin Cherry (1978), John Cioffi (2006), Arthur C. Clarke (1982), Martin Cooper (2013), Whitfield Diffie (2000), Federico Faggin (1988), James Flanagan (1992), David Forney, Jr. (1997), Robert G. Gallager (2003), Robert N. Hall (1989), Izuo Hayashi (1993), Martin Hellman (2000), Hiroshi Inose (1976), Irwin M. Jacobs (2011), Robert E. Kahn (1994) Sir Charles Kao (1985), James R. Killian (1975), Leonard Kleinrock (1986), Herwig Kogelnik (2001), Robert W. Lucky (1987), James L. Massey (1999), Robert Metcalfe (2003), Lawrence Page (2004), Yash Pal (1980), Seymour Papert (1981), Arogyaswami Paulraj (2014), David N. Payne (2008), John R. Pierce (1979), Ronald L. Rivest (2007), Arthur L. Schawlow (1977), Allan Snyder (2001), Robert Tkach (2009), Gottfried Ungerboeck (1996), Andrew Viterbi (1990), Jack Keil Wolf (2011), Jacob Ziv (1995). In 2015, the prize went to Peter T. Kirstein for bringing the internet to Europe. Since 2008, Marconi has also issued the Paul Baran Marconi Society Young Scholar Awards.
    [Show full text]
  • Threat Modeling and Circumvention of Internet Censorship by David Fifield
    Threat modeling and circumvention of Internet censorship By David Fifield A dissertation submitted in partial satisfaction of the requirements for the degree of Doctor of Philosophy in Computer Science in the Graduate Division of the University of California, Berkeley Committee in charge: Professor J.D. Tygar, Chair Professor Deirdre Mulligan Professor Vern Paxson Fall 2017 1 Abstract Threat modeling and circumvention of Internet censorship by David Fifield Doctor of Philosophy in Computer Science University of California, Berkeley Professor J.D. Tygar, Chair Research on Internet censorship is hampered by poor models of censor behavior. Censor models guide the development of circumvention systems, so it is important to get them right. A censor model should be understood not just as a set of capabilities|such as the ability to monitor network traffic—but as a set of priorities constrained by resource limitations. My research addresses the twin themes of modeling and circumvention. With a grounding in empirical research, I build up an abstract model of the circumvention problem and examine how to adapt it to concrete censorship challenges. I describe the results of experiments on censors that probe their strengths and weaknesses; specifically, on the subject of active probing to discover proxy servers, and on delays in their reaction to changes in circumvention. I present two circumvention designs: domain fronting, which derives its resistance to blocking from the censor's reluctance to block other useful services; and Snowflake, based on quickly changing peer-to-peer proxy servers. I hope to change the perception that the circumvention problem is a cat-and-mouse game that affords only incremental and temporary advancements.
    [Show full text]
  • Data Localization Requirements Across Different Jurisdictions 70
    The Localisation Gambit Unpacking Policy Measures for Sovereign Control of Data in India 19th March, 2019 By ​Arindrajit Basu, Elonnai Hickok, and Aditya Singh Chawla Edited by ​Pranav M Bidare, Vipul Kharbanda, and Amber Sinha Research Assistance ​Anjanaa Aravindan The Centre for Internet and Society, India Acknowledgements 2 Executive Summary 3 Introduction 9 Methodology 10 Defining and Conceptualizing Sovereign Control of Data 11 Mapping of Current Policy Measures for Localization of Data in India 13 The Draft Personal Data Protection Bill, 2018 13 Draft E-commerce Policy (s) 17 RBI Notification on ‘Storage of Payment System Data’ 19 Draft E-Pharmacy Regulations 20 FDI Policy 2017 20 National Telecom M2M Roadmap 21 Unified Access License for Telecom 21 Companies Act, 2013 and Rules 21 The IRDAI (Outsourcing of Activities by Indian Insurers) Regulations, 2017 22 Guidelines on Contractual Terms Related to Cloud Services 22 Reflecting on Objectives, Challenges and Implications of National Control of Data 24 Enabling Innovation and Economic Growth 24 Enhancing National Security and Law Enforcement Access 34 Law Enforcement Access 34 Protecting Against Foreign Surveillance 36 Threat to fibre-optic cables 37 Widening Tax Base 40 Data Sovereignty and India’s Trade Commitments 41 A Survey of Stakeholder Responses 48 Data Localisation Around the World 49 Conclusions and Recommended Approaches 61 Annexure I 70 Mapping Data Localization Requirements Across Different Jurisdictions 70 Annexure 2 75 A survey of stakeholder responses 75 1 Acknowledgements The authors would like to thank Pranav MB, Vipul Kharbanda, Amber Sinha, and Saumyaa Naidu for their invaluable edits and comments on the draft.
    [Show full text]
  • I: the Conception
    Excerpt from: Mayo, Keenan and Newcomb, Peter. “How the Web Was Won,” Vanity Fair, July 2008. I: The Conception Paul Baran, an electrical engineer, conceived one of the Internet’s building blocks—packet switching— while working at the Rand Corporation around 1960. Packet switching breaks data into chunks, or “packets,” and lets each one take its own path to a destination, where they are re-assembled (rather than sending everything along the same path, as a traditional telephone circuit does). A similar idea was proposed independently in Britain by Donald Davies. Later in his career, Baran would pioneer the airport metal detector. Paul Baran: It was necessary to have a strategic system that could withstand a first attack and then be able to return the favor in kind. The problem was that we didn’t have a survivable communications system, and so Soviet missiles aimed at U.S. missiles would take out the entire telephone- communication system. At that time the Strategic Air Command had just two forms of communication. One was the U.S. telephone system, or an overlay of that, and the other was high-frequency or shortwave radio. So that left us with the interesting situation of saying, Well, why do the communications fail when the bombs were aimed, not at the cities, but just at the strategic forces? And the answer was that the collateral damage was sufficient to knock out a telephone system that was highly centralized. Well, then, let’s not make it centralized. Let’s spread it out so that we can have other paths to get around the damage.
    [Show full text]
  • Tunisia: Freedom of Expression Under Siege
    Tunisia: Freedom of Expression under Siege Report of the IFEX Tunisia Monitoring Group on the conditions for participation in the World Summit on the Information Society, to be held in Tunis, November 2005 February 2005 Tunisia: Freedom of Expression under Siege CONTENTS: Executive Summary p. 3 A. Background and Context p. 6 B. Facts on the Ground 1. Prisoners of opinion p. 17 2. Internet blocking p. 21 3. Censorship of books p. 25 4. Independent organisations p. 30 5. Activists and dissidents p. 37 6. Broadcast pluralism p. 41 7. Press content p. 43 8. Torture p. 46 C. Conclusions and Recommendations p. 49 Annex 1 – Open Letter to Kofi Annan p. 52 Annex 2 – List of blocked websites p. 54 Annex 3 – List of banned books p. 56 EXECUTIVE SUMMARY The International Freedom of Expression Exchange (IFEX) is a global network of 64 national, regional and international freedom of expression organisations. This report is based on a fact-finding mission to Tunisia undertaken from 14 to 19 January 2005 by members of the IFEX Tunisia Monitoring Group (IFEX-TMG) together with additional background research and Internet testing. The mission was composed of the Egyptian Organization of Human Rights, International PEN Writers in Prison Committee, International Publishers Association, Norwegian PEN, World Association of Community Radio Broadcasters (AMARC) and World Press Freedom Committee. Other members of IFEX-TMG are: ARTICLE 19, Canadian Journalists for Free Expression (CJFE), the Centre for Human Rights and Democratic Studies (CEHURDES), Index on Censorship, Journalistes en Danger (JED), Media Institute of Southern Africa (MISA), and World Association of Newspapers (WAN).
    [Show full text]
  • Tunisia Digital Rights & Inclusion 2020 Report.Cdr
    LONDA TUNISIA DIGITAL RIGHTS AND INCLUSION A PARADIGM INITIATIVE PUBLICATION REPORT LONDA TUNISIA DIGITAL RIGHTS AND INCLUSION REPORT A PARADIGM INITIATIVE PUBLICATION Published by Paradigm Initiative Borno Way, Yaba, Lagos, Nigeria Email: [email protected] www.paradigmhq.org Published in April Report written by Yosr Jouini Editorial Team: ‘Gbenga Sesan, Kathleen Ndongmo, Koliwe Majama, Margaret Nyambura Ndung’u, Mawaki Chango, Nnenna Paul-Ugochukwu and Thobekile Matimbe. Design & Layout by Luce Concepts This publication may be reproduced for non-commercial use in any form provided due credit is given to the publishers, and the work is presented without any distortion. Copyright © Paradigm Initiative Creative Commons Attribution . International (CC BY .) CONTENTS INTRODUCTION LONDA INTERNET ACCESS TUNISIA DIGITAL RIGHTS AND INCLUSION REPORT A PARADIGM INITIATIVE PUBLICATION IMPACT OF COVID- REGULATIONS ON DIGITAL RIGHTS AND INCLUSION PRIVACY AND SURVEILLANCE ONLINE FREEDOM OF SPEECH Civil society organizations continue to work to advance digital rights and inclusion in Africa, ensuring best practices are adopted into policy and legislation. This report analyses the state of digital rights and inclusion in Tunisia, examining MISINFORMATION LAWS violations and gaps, investigating the use and application of policy and legislation, highlighting milestones and proffering recommendations for the digital landscape in CONCLUSION AND Tunisia. This edition captures among other issues, the RECOMMENDATIONS digital divide worsened by the COVID- pandemic and unearths infractions on different thematic areas such as privacy, access to information, and freedom of expression with the legislative and policy background well enunciated. @ParadigmHQ TUNISIA DIGITAL RIGHTS AND INCLUSION 2020 REPORT Tunisia is a North African country with a population of .
    [Show full text]
  • "Splinternet" – Danger for Our Citizens, Businesses and Society?
    "Splinternet" – Danger for our citizens, businesses and society? Once upon a time, there was the World Wide Web (www). Just as it was invented by Sir Tim Berners-Lee. John Perry Barlow wrote the "Declaration of the Independence of Cyberspace" in 1996. The Internet was a great promise of freedom. It worked like a continuation of the Gutenberg invention, the printing press: the Internet gave a voice to all citizens whose views and attitudes were suppressed by the media and elites. This had and has great political consequences. 30 years later the opinion about the internet changed: It was thought that monopoly companies like Google, Facebook, etc. control Big Data and Artificial Intelligence, and therefore control us. However, politics followed suit and began to regulate. The concern now is that the state will disenfranchise citizens and restrict companies. There is a fear of new totalitarian regimes. And in this situation, the Internet ("splinternet") is increasingly fragmented. National "Internet" networks are emerging. States treat the Internet as an extension of their national territory. The most recent example is Russia, where Kremlin laws ensure that national Internet traffic goes through state nodes and the state has the right to shut down the global Internet: a sort of digital Iron Curtain. The champion of the national Internet is China. The state monitors and controls Internet content, blocks foreign services and companies (like Facebook) and replaces them with national services and companies that are in line with the Communist Party. The "Great Firewall" is successful. The number of states imitating China's Internet policy is growing: Iran, North Korea, Cuba, Turkey, Saudi Arabia, but also Thailand and Vietnam etc.
    [Show full text]
  • Program on Information Resources Policy
    INCIDENTAL PAPER Growing Up With the Information Age John C. B. LeGates April 2011 Program on Information Resources Policy Center for Information Policy Research Harvard University The Program on Information Resources Policy is jointly sponsored by Harvard University and the Center for Information Policy Research. Chairman Managing Director Anthony G. Oettinger John C. B. LeGates John LeGates began his career as an entrepreneur in the earliest days of computer communications and networking. He was the first to put computers in schools and later in hospitals. He built the first academic computer-resource-sharing network and was a member of the Arpanet NWG, the original Internet design team. Since 1973 he has been a member of the Harvard faculty, where he co-founded the Program on Information Resources Policy. Copyright © 2011 by the President and Fellows of Harvard College. Not to be reproduced in any form without written consent from the Program on Information Resources Policy, Harvard University, Maxwell Dworkin Bldg. 125, 33 Oxford St., Cambridge MA 02138. 617-495-4114 E-mail: [email protected] URL: http://www.pirp.harvard.edu ISBN 0-9798243-3-8 I-11-3 LeGates Life and Times DRAFT February 1, 1998 NOTES ON GROWING UP WITH THE INFORMATION AGE John C. B. LeGates WHAT IS THIS DOCUMENT? In 1997 I was approached by a writer for The New Yorker magazine, who asked if they could do a "life and times" article about me. It would be the feature article in one of their issues - a minimum of twenty pages. Alternatively it might be longer, and be serialized over several issues.
    [Show full text]
  • Internet Drift: How the Internet Is Likely to Splinter and Fracture
    Steve Song Internet Drift: How the Internet is Likely to Splinter and Fracture Future-Proofing Digital our Digital Rights Freedom Fund Future-Proofing our Digital Rights Steve Song Internet Drift: How the Internet is Likely to Splinter and Fracture The idea of a “splinternet” or “Balkanization” of the internet is not new, although the exact manner by which this is becoming a reality is evolving. Early discussions on the topic focused around cultural or policy differences and extraterritoriality that could result in a fractioned internet. For example, China’s Great Firewall is implementation of a national policy which creates an “intranet” connected to the greater Internet. However, there is another shift in internet infrastructure that is less talked of and even more fundamental to its functioning – the physical backbone of fi- bre optic cables crossing oceans and international borders that enables the relatively seamless experience of the Internet regardless of location. Increas- ingly investment and ultimately ownership and control of the cables used to transport information across the world is moving away from telecommunica- tions operators. One example is the increased investment in and ownership of trans-oceanic cables by application and service providers, or platforms, such as Google, Facebook, and Microsoft. Another is the strategic investment in undersea cables by nation states as part of a geo-political cyber strategy. 2 Internet Drift: How the Internet is Likely to Splinter and Fracture Internet Giants and Undersea Cables Historically, undersea cables were either publicly owned or owned and oper- ated by telecommunications network operators (telcos) which had little to do with content or application delivery, unlike digital platforms like Google, Face- book and others that are now beginning to expand their private networks.
    [Show full text]
  • Computer Network
    Computer network A computer network or data network is a telecommunications network that allows computers to exchange data. The connections (network links) between networked computing devices (network nodes) are established using either cable media or wireless media. The best-known computer network is the Internet. Network devices that originate, route and terminate the data are called network nodes. Nodes can include hosts such as servers and personal computers, as well as networking hardware. Two devices are said to be networked when a process in one device is able to exchange information with a process in another device. Computer networks support applications such as access to the World Wide Web, shared use of application and storage servers, printers, and fax machines, and use of email and instant messaging applications. The remainder of this article discusses local area network technologies and classifies them according to the following characteristics: the physical media used to transmit signals, the communications protocols used to organize network traffic, along with the network's size, its topology and its organizational intent. History In the late 1950s, early networks of communicating computers included the military radar system Semi- Automatic Ground Environment (SAGE). In 1960, the commercial airline reservation system semi-automatic business research environment (SABRE) went online with two connected mainframes. In 1962, J.C.R. Licklider developed a working group he called the "Intergalactic Computer Network", a precursor to the ARPANET, at the Advanced Research Projects Agency (ARPA). In 1964, researchers at Dartmouth developed the Dartmouth Time Sharing System for distributed users of large computer systems. The same year, at Massachusetts Institute of Technology, a research group supported by General Electric and Bell Labs used a computer to route and manage telephone connections.
    [Show full text]
  • Impact of Social Media in Arab Spring: Special Emphasis on Tunisia’S Uprising
    Available online at http://www.journalijdr.com ISSN: 2230-9926 International Journal of Development Research Vol. 07, Issue, 08, pp.14227-14231, August, 2017 REVIEW ARTICLE Open Access ORIGINAL RESEARCH ARTICLE IMPACT OF SOCIAL MEDIA IN ARAB SPRING: SPECIAL EMPHASIS ON TUNISIA’S UPRISING *Saifuzzaman Research Scholar, Department of West Asian studies and North African studies, AMU, Aligarh ARTICLE INFO ABSTRACT Article History: Almost immediately after the Arab uprisings began, there was debate over the role and influence Received 19th May, 2017 of social media in the overthrow of Tunisian president Zine al-Abidine Ben Ali and the imminent Received in revised form coup of Mubarak. In covering what some deemed the Facebook or Twitter revolutions, the media 15th June, 2017 focused heavily on young protesters mobilizing in the streets in political opposition, smartphones Accepted 16th July, 2017 in hand. And since then, the violent and sectarian unrest in Syria has brought increased attention Published online 30th August, 2017 to the role of citizen journalism. Social media indeed played a part in the Arab uprisings. Networks formed online were crucial in organizing a core group of activists. Civil society leaders Keywords: in Arab countries emphasized the role of "the internet, mobile phones, and social media” in the protests. Additionally, digital media has been used by Arabs to exercise freedom of speech and as Social Media a space for civic engagement. This paper aims to demonstrate why the role of social media in the Arab Spring Arab Spring cannot be disregarded. This paper does not argue that social media caused the Arab Facebook Spring but was an essential tool impacting the way in which the Arab Spring occurred.
    [Show full text]