1 Volume 9, Issue 3 (2020) E-ISSN 2164-9170 Pp. 193-213 Decolonizing Risk Communication: Indi

Total Page:16

File Type:pdf, Size:1020Kb

1 Volume 9, Issue 3 (2020) E-ISSN 2164-9170 Pp. 193-213 Decolonizing Risk Communication: Indi 1 Volume 4, Issue 1 (October 2015) Volume 9, Issue 3 (2020) http://w w w.hawaii.edu/sswork/jisd http://scholarspace.manoa.hahttps://ucalgary.ca/journals/jisdwaii.edu/ handle/10125/37602 E-ISSN 2164-9170 E-ISSN 2164-9170 pp. 193-213 pp. 1-15 RDecolonizingeaching Ha Riskrmo Communication:ny Across Ind Indigenousigenous aResponsesnd Main tos tCOVIDream -19 using Social ReMediasear ch Contexts: An Emergent Narrative CaNicoletherine S.E. Kuhn,Burnet tBSc,e Ph.D. Student Josephine Hoy, MS, Ph.D. Student TuUniversitylane Univer sofity Washington University of Washington ShShawonanondora Sarkar, Billiot MA, MI, Ph.D. Student Celena J. McCray, BS WaUniversityshington Un ofiv eWashingtonrsity in St. Lou is Northwest Portland Area Indian Health Board Lauren Alaine White, MPH, Ph.D. Student UniversityKey Wor dofs Michigan Clarita Lefthand-Begay, MS, Ph.D. Indigenous research • power • decolonizing research • critical tUniversityheory of Washington Abstract ReKeywordssearch with: iAmericanndigenous Indiancommu andnitie sAlaska is one Nativeof the fe wAIAN areas o fNative researc hAmerican Indigenous encompCoronavirusassing profou Diseasend cont r2019oversi es , COVIDcomplex-i19tie s, epandemicthical resp o nsocialsibiliti emedias, and risk communication historicculturallyal context adaptedof expl ocommunicationitat ion and harm . FacebookOften th is Tribalcomple xcommunitiesity becomes overwh elmingly apparent to the early career researcher who endeavors to make meaningful contributions to decolonizing research. Decolonizing research has the Abstract capacity to be a cat alyst for the improved wellbeing and positive social change among indigenInou sthis com mexploratoryunities and b estudy,yond. Twee p uexaminerpose of t hihows crit icAmericanal analysis i s Indianto reach and Alaska Native (AIAN) harmongovernmentsy across main sandtrea morganizations and indigeno uares re susingearch csocialontext smedia. We m toar tishareal crit icriticalcal health information about theory coronavirusto deconstru cdiseaset barrier s2019 to d e(COVIDcolonizing- 19)rese awithrch, stheiruch a scitizens. power i n eThroughquities, a thematic analysis of 119 public Facebook posts made by Tribal governments and organizations, we identified three broad and idecategoriesntify strat e gandies t13o o vsubthemes.ercome thes eTribal barrie rgovernmentss. First, we cr itandical lorganizationsy analyze the created risk communication historicmaterialal contex fort o ftheir deco respectivelonizing re scommunitiesearch with in dthatigen fellous ucondermm u(1)nit iriskes. N reduction,ext, (2) meeting community we anamembers’lyze the co nneeds,cept of and“ins i(3)der ”staying and “o uconnectedtsider” rese atorc hcommunity. We identi fandy ba rculture.riers Our findings suggest that and strthroughat egies to socialward f nmediading h AIANarmony communities across indigen oandus a organizationsnd mainstream playedresearch a crucial role in disseminating paradigreliablems and cculturallyontexts. adapted risk communication and vital community information to Tribal citizens during the COVID-19 pandemic. Such communication included clear illustrations, posts and Few amessagesreas enc oaboutmpas sthe th importancee profound ofc omaskingntrovers yup,, c osocialmplex idistancingties, ethi caandl washing one’s hands; mandated border closures; and suggestions for maintaining a sense of connectedness with responsibilities, and historical context as research with indigenous communities community. By doing so they are filling a gap that ensures their communities receive the relevant (Burnette information& Sanders, 2they014 ;need Bur ntoet tmitigatee, Sande andrs, B manageutcher, &risks. Sal o iIns, order2011; toD eundeloria,rstand how to better meet 1991; Smitcommunityh, 2007; S mneeds,ith, 2more012). workT e isde neededpth of toth iimproves tensio nthe is wellbeingoverwhelm anding visibilityly of AIAN people in apparent ttheo tareashe e aofrl yhealth care edisparities,r research etechnology,r who end esocialavors media,to ma andke mtheea manyningf uimpactsl of COVID-19. contributio ns through research with indigenous communities (Burnette & Sanders, 2014; Burnette, Sanders, Butcher, & Rand, 2014). As M ihesuah (2006) aptly notes, “So many indigenous people and our allies are f nding their voices, and they are expressing their thoughts. But speaking out can still be precarious, especially for those who haven’t graduated or haven’t received tenure… ” (p. 131). Licensed under Creative Commons Attribution Non-Commercial Share Alike License KUHN ET AL: Decolonizing risk communication 194 Introduction As the novel coronavirus disease 2019 (COVID-19) outbreak expands, American Indian and Alaska Native (AIAN) communities are experiencing some of the highest rates of infection, hospitalization, and morbidity among all racial groups in the US (Centers for Disease Control and Prevention, 2020). Many of these increased health risks are rooted in the significant ongoing health disparities faced by AIAN peoples (Castor et al., 2006; Jones, 2006) and amplified by persistent lack of adequate and timely support from the US government (Nagle, 2020; O’Neill, 2020; Pickner et al., 2018). These risks are further compounded by the barriers Tribal citizens face when seeking current and relevant health information. Furthermore, AIANs experience invisibility in America (Fryberg & Townsend, 2008; Hammack et al., n.d.), that is perpetuated during the pandemic through the omission of AIANs as a distinct population in critical health data such as national COVID-19 risk assessments and risk communication (Godoy & Wood, 2020; Nagle, 2020). Risk communication refers to “the exchange of real-time information, advice and opinions between experts and people facing threats to their health, economic or social well-being.” (Abrams & Greenhawt, 2020; World Health Organization, n.d.). To circumvent these shortcomings, and to effectively mitigate COVID-19 within Tribal communities, access to culturally relevant and timely risk communication from reliable sources who understand the culture, behaviors and values of these communities is critical (Driedger et al., 2013; Hilleary, 2020). Social media plays an influential role in many communities (Pew Research Center, 2019), including Indigenous communities (Morris & Meinrath, 2009; Rushing & Stephens, 2011; Vigil et al., 2015) where it is being used to transmit health information (Rice et al., 2016; Sweet, 2013).. In this exploratory study, we aimed to shed light on how AIAN governments and organizations are using Facebook to share critical health information with their citizens. Method Criteria and Dataset Our inclusion criteria in this qualitative study were national, regional, and local Tribal governments or organizations in the US with a publicly accessible social media presence and with messaging on COVID-19 risk communication directed at a Tribal community audience. We collected data from January 20, 2020, the date of the first reported COVID-19 case in the US (World Health Organization, 2020), through May 28, 2020. During our data collection window, Journal of Indigenous Social Development Volume 9, Issue 3 (2020) KUHN ET AL: Decolonizing risk communication 195 early exposures and cases were first identified and quickly spread in the Western US near Pacific Northwestern and Southwestern tribes (Holshue et al., 2020; Gamio et al., 2020). Our data collection was driven by three broad categories of communication important to Tribal communities during the COVID-19 pandemic: risk reduction, meeting community members’ needs, and staying connected to community and culture. These categories were informed by our own personal and professional experiences as AIANs connected to tribes and non-Indigenous researchers, as well as Indigenous social media and relevant literature (Belton, 2010; Duarte, 2017; Duarte & Vigil- Hayes, 2017; Molyneaux et al., 2014; Monroe, 2002; Sweet, 2013). We generated our dataset by gathering and enumerating Facebook posts, messages and dates from each of these organizations, agencies or governments. Thematic Analysis We employed thematic analysis (Braun & Clarke, 2006; Crowe et al., 2015), guided by principles in decolonizing and critical Indigenous methodologies (Denzin et al., 2008; Kovach, 2010; Smith, 2013; Wilson, 2008). After familiarizing ourselves with the dataset, our analysis began by reviewing and writing about each post, then discussing with our research team the emerging patterns and subthemes that materialized within the three main categories listed above. This was an iterative process that led to the refinement of each category and subtheme in order to accurately define and describe each of them. Results and Discussion Our dataset included 119 public Facebook posts from 11 Tribal governments and nine Tribal organizations distributed across three broad categories (Table 1): Risk Reduction (26), Meeting Community Needs (78), and Staying Culturally Connected (15). Additionally, 13 distinct subthemes emerged from our analysis (Table 2). We describe how Tribal governments and organizations used social media messaging in two broad communication types: culturally adapted risk communication and community-based responses relating to Tribally focused services or culture. Journal of Indigenous Social Development Volume 9, Issue 3 (2020) KUHN ET AL: Decolonizing risk communication 196 Table 1. Total Facebook Posts per category made by Local, Regional and National Tribal Organizations and Tribal Governments. Source of post Tribal organization Category
Recommended publications
  • Gateways, Sieves, and Domes: on the Infrastructural Topology of the Chinese Stack
    International Journal of Communication 15(2021), 2669–2692 1932–8036/20210005 Gateways, Sieves, and Domes: On the Infrastructural Topology of the Chinese Stack GABRIELE DE SETA1 University of Bergen, Norway This article proposes a topological model capable of accounting for the scale and complexity of China’s digital infrastructure. Beginning with the troubled development of a submarine data cable between Los Angeles and Hong Kong, it identifies the limitations of topographical analyses of ICTs and then reviews theorizations of “the stack” as a topological model of planetary computation. To situate the stack model in the Chinese context, I draw on 3 case studies—QR codes, filtering, and cybersovereignty— exemplifying three topological configurations: the gateway, the sieve, and the dome. These configurations expand the conceptual vocabulary of the stack model at different scales, and provide useful tools for the analysis of computational infrastructures in Asia and beyond. Keywords: China, computation, infrastructure, platforms, sovereignty, stack, topology Unraveling a 12,971-km Cable In 2016, Google and Facebook announced a partnership with the Pacific Light Data Communication Co., Ltd. (PLDC), a broadband communications service provider based in Hong Kong. The partnership revolved around a 12,971-km-long submarine cable crossing the Pacific Ocean from Hermosa Beach, a town near Los Angeles, California, to Deep Water Bay, on the south of Hong Kong Island. Once completed, the Pacific Light Cable Network (PLCN) cable would afford a data transmission rate of 144 terabytes per second, connecting the United States to Hong Kong with one of the lowest latencies worldwide (Hecht, 2018). From the PLDC side, this partnership was framed as an important step in Pacific Rim networking, “the initial step in PLCN’s construction of a global network” (Moss, 2016, para.
    [Show full text]
  • Canadian Cross-Border Data: Your Data May Be Heading South Even When You Are Not
    Canada Institute | May 2019 Canadian Cross-Border Data: Your Data May Be Heading South Even When You Are Not By Jacqueline Orr Canadian data: what goes where? Canada is fast becoming a technology powerhouse with cities across the country such as Waterloo, Calgary, Toronto, Montreal, and Edmonton transforming into tech hubs. They promise that their research centers and internet companies are going to light the way for Canada’s innovation economy. But the state of Canada’s internet is increasingly becoming an oxymoron. While Canada’s internet economy might be self-sustaining, the Canadian internet itself is not. Issues of territoriality are fluid and unbound. This is because Canada’s network infrastructure relies on American networks to transfer and store data. But, when Canadian data enters the United States, it becomes foreign data and is not protected by the same privacy rights as those accorded to U.S. domestic data and its owners. CIRA, the Canadian Internet Registration Authority, states that three-quarters of the Canadian population spends three to four hours a day online.1 CIRA also reports 64 percent of Canadians are concerned about the security of their personal information when it is routed through the United States. Are these concerns justified? This Canada Institute briefing explores key questions about cross-border data travel to better understand the risks and opportunities facing Canadians in an increasingly inter-connected world. There is a glossary at the end of the document. Is it legal for the U.S. government to collect data from Canadians? Yes. U.S. government agencies may collect any foreign data that crosses into U.S.
    [Show full text]
  • Network Sovereignty: Understanding the Implications of Tribal Broadband Networks
    Network Sovereignty: Understanding the Implications of Tribal Broadband Networks Marisa Elena Duarte A dissertation submitted in partial fulfillment of the requirement for the degree of Doctor of Philosophy University of Washington 2013 Reading Committee: Cheryl A. Metoyer Raya Fidel Maria Elena Garcia David Levy Adam Moore Program Authorized to Offer Degree: Information School i © Copyright 2013 Marisa Elena Duarte ii Abstract For tribal leaders, bringing reliable, affordable broadband Internet service to Indian Country is a matter of self-determination. At this point in history, tribal leaders enforce the sovereign rights of tribes by communicating through information and communication technologies (ICTs) mobilized to work across powerful institutions. Tribal leaders who command the processes of broadband Internet deployment within their communities increase their capacity to support the health of tribal lands, waters, and peoples. Whereas freedom of expression and the exercise of all other human rights through the Internet is a human right, and the infrastructure for connecting to the Internet is essential for citizens to self-govern, so does the U.S. federal government, under obligation of the trust relationship they share with federally-recognized tribes, have a responsibility to support the deployment of broadband Internet infrastructure—including networks, devices, spectrum, technical expertise, and policies—throughout Indian Country. This qualitative inquiry reveals how tribal leaders who deploy broadband Internet to their communities must contend with national telecommunications policy, neighboring deployment strategies, regulatory matters, and the development of steady revenue streams to advance robust broadband network design and services. As each of these intersects with the sovereign rights of tribes, it is possible to conceptualize sociotechnical dimensions to future exercises of tribal sovereignty.
    [Show full text]
  • Data Governance in the Digital Age a Cigi Essay Series
    DATA GOVERNANCE IN THE DIGITAL AGE A CIGI ESSAY SERIES I CONTENTS Introduction Data Governance in the Digital Age . 2 Rohinton P. Medhora Rationale of a Data Strategy Considerations for Canada’s National Data Strategy . 6 Teresa Scassa The Economics of Data: Implications for the Data-driven Economy . 14 Dan Ciuriak The Government’s Role in Constructing the Data-driven Economy . 20 Blayne Haggart Canadian Network Sovereignty: A Strategy for Twenty-First-Century National Infrastructure Building . 26 Andrew Clement The Role of a Data Strategy for Canadian Industries Treasure of the Commons: Global Leadership through Health Data . 34 Sachin Aggarwal Monetizing Smart Cities: Framing the Debate . 43 Kurtis McBride Big Data: The Canadian Opportunity . 47 Ian MacGregor Balancing Privacy and Commercial Values Preventing Big Data Discrimination in Canada: Addressing Design, Consent and Sovereignty Challenges . 54 Jonathan Obar and Brenda McPhail Data and the Future of Growth: The Need for Strategic Data Policy . 63 Dan Breznitz Domestic Policy for Data Governance Ungoverned Space: How Surveillance Capitalism and AI Undermine Democracy . 70 Taylor Owen Screen Time, the Brain, Privacy and Mental Health . 75 Norman Doidge Governance Vacuums and How Code Is Becoming Law . 81 Bianca Wylie Measuring the Economy in an Increasingly Digitalized World: Are Statistics Up to the Task? . 86 André Loranger, Amanda Sinclair and James Tebrake International Policy Considerations Data Libera? Canada’s Data Strategy and the Law of the Sea . 92 Ariel Katz Data Rules in Modern Trade Agreements: Toward Reconciling an Open Internet with Privacy and Security Safeguards . 99 Michael Geist Data Minefield? How AI Is Prodding Governments to Rethink Trade in Data .
    [Show full text]
  • Co-Governed Sovereignty Network
    Hui Li · Xin Yang Co-governed Sovereignty Network Legal Basis and Its Prototype & Applications with MIN Architecture 多边共管主权互联网 法理依据及其基于 MIN 架构体系的原型和应用 Co-governed Sovereignty Network Hui Li • Xin Yang Co-governed Sovereignty Network Legal Basis and Its Prototype & Applications with MIN Architecture 123 Hui Li Xin Yang Shenzhen Graduate School Shenzhen Graduate School Peking University Peking University Shenzhen, China Shenzhen, China ISBN 978-981-16-2669-2 ISBN 978-981-16-2670-8 (eBook) https://doi.org/10.1007/978-981-16-2670-8 © The Editor(s) (if applicable) and The Author(s) 2021. This book is an open access publication. Open Access This book is licensed under the terms of the Creative Commons Attribution 4.0 International License (http://creativecommons.org/licenses/by/4.0/), which permits use, sharing, adap- tation, distribution and reproduction in any medium or format, as long as you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons license and indicate if changes were made. The images or other third party material in this book are included in the book’s Creative Commons license, unless indicated otherwise in a credit line to the material. If material is not included in the book’s Creative Commons license and your intended use is not permitted by statutory regulation or exceeds the permitted use, you will need to obtain permission directly from the copyright holder. The use of general descriptive names, registered names, trademarks, service marks, etc. in this publi- cation does not imply, even in the absence of a specific statement, that such names are exempt from the relevant protective laws and regulations and therefore free for general use.
    [Show full text]
  • Mark Zuckerberg in Lagos and the Political Economy of Facebook in Africa
    International Journal of Communication 13(2019), Feature 2045–2061 1932–8036/2019FEA0002 Global Digital Capitalism: Mark Zuckerberg in Lagos and the Political Economy of Facebook in Africa TOKS DELE OYEDEMI University of Limpopo, South Africa In 2016, Facebook cofounder and CEO Mark Zuckerberg traveled to Lagos, Nigeria—the first stop on his first visit to sub-Saharan Africa. The trip was a commercial endeavor, a digital capitalist exploration of the potential of Africa’s largest nation. Zuckerberg’s visit provides a critical lens for examining the colonizing tendencies of global media corporations and the context of Africa in the circuit of digital capitalism. Africa is emerging as a market for digital tools, with increasing penetration of mobile telecommunications services, including mobile Internet. However, it is estimated that about 60% of the continent’s population will still be unconnected in 2020. This low penetration provides an opportunity for digital enterprises such as Facebook to explore the African market. Through benevolent capitalism, Facebook is attempting to capture a huge market in Africa. The lack of investment in an Internet infrastructure in Africa provides both challenges and opportunities for digital capitalists who, in their benevolent pursuit of digital capital, aim for global domination. Keywords: Facebook, Nigeria, Africa, political economy, benevolent capitalism, digital capitalism Critical studies of the political economy of Africa in the global digital economy often describe the traditional forms of capitalist exploitation of Africa with a narrative that limits the place of Africa as the supplier of raw materials for technological devices (Frankel, Chavez, & Ribas, 2016; Grespin, 2010; Sharife, 2008) and as a dumping ground for the developed world’s used technological devices (Pucket, Westervelt, Gutierrez, & Takamiya, 2005; Schmidt, 2006; Sullivan, 2014).
    [Show full text]
  • Tracking the Connective Actions of Native American Advocates on Twitter Morgan Vigil-Hayes Marisa Duarte Nicholet Deschine Parkhurst Dept
    #Indigenous: Tracking the Connective Actions of Native American Advocates on Twitter Morgan Vigil-Hayes Marisa Duarte Nicholet Deschine Parkhurst Dept. of Computer Science School for Social School of Public Affairs UC Santa Barbara Transformation Arizona State University Santa Barbara, CA Arizona State University Tempe, AZ [email protected] Tempe, AZ [email protected] [email protected] Elizabeth Belding Dept. of Computer Science UC Santa Barbara Santa Barbara, CA [email protected] ABSTRACT Author Keywords With fewer than 66% of eligible voters registered and voter social network analysis, social media, civic engagement, turnout rates 5-14 percentage points lower than any other eth- Native American nic group, Native Americans comprise the least participatory ethnic group in U.S. political elections [42, 57, 49, 25]. While INTRODUCTION discourse surrounding Native American issues and interests Native Americans comprise an exceptional class of citizen- has increasingly moved to social media [55, 56], there is a ship within the U.S. While many Native Americans are vot- lack of data about Native American political discourse on ing members of tribal nations, they are also eligible to vote these platforms. Given the heterogeneity of Native Amer- in local, state, and national elections. However, the histori- ican peoples in the U.S., one way to begin approaching a cally agonistic relationship between the U.S. federal govern- holistic understanding of Native American political discourse ment and Native American nations, has discouraged Native on social media is to characterize how Native American ad- American individuals from engaging with electoral politics vocates utilize social media platforms for connective action.
    [Show full text]
  • The Issue of State Sovereignty in Cyberspace
    The Issue of State Sovereignty in Cyberspace Luidmila Terentieva Associate professor, International Private Law Chair, Kutafin Moscow State Law University. Address: 9 Sadovaya-Kudrinskaya Str., Moscow 123242, Russian Federation. E-mail: [email protected] Abstract The author examines a special approach to establishing the sovereignty of the state in relation to cyberspace, the extraterritorial characteristics of which determine the question of the implementation of the territorial supremacy of the state. The author concludes that the understanding of the state’s sovereignty in relation to cyberspace lies not in detailing a set of measures in the form of sovereign powers undertaken in this area, but in constructing the boundaries of cyberspace both in relation to the technical component of the network infrastructure that supports the smooth functioning of the Network, and in in relation to the virtual component of cyberspace. To achieve the goal of the study, the author proposed to combine social, technological and subjective approaches, understanding by cyberspace an artificial telecommunication environment for the implementation of public relations controlled by a wide range of subjects (states, intergovernmental organizations, non- governmental organizations, individuals, etc.), the functioning and maintenance of which is carried out by means of software-technical infrastructure in the form of its physical part (telecommunication networks, computers, servers, routers, processors, satellites, etc.) and a virtual part (operating systems, data transmission standards, hardware applications, software, etc.). Keywords cyberspace, sovereignty, Internet, software, digital rights, information. Acknowledgements: The article was prepared thanks to the financial support of the Russian Foundation for Basic Research (RFFI) as a part of the RFFI’s project “Internet Law: from a Concept to a Methodology of Regulating Trans-Border Rela- tions” — project No.
    [Show full text]
  • Law, Privacy and Surveillance in Canada in the Post-Snowden Era
    Law, Privacy and Surveillance in Canada in the Post-Snowden Era Edited by Michael Geist University of Ottawa Press LAW, PRIVACY AND SURVEILLANCE IN CANADA IN THE POST-SNOWDEN ERA Law, Privacy and Surveillance in Canada in the Post-Snowden Era.indd 1 15-05-19 14:18 Page left blank intentionally 15-05-19 14:18 Law, Privacy and Surveillance in Canada in the Post-Snowden Era.indd 2 LAW, PRIVACY AND SURVEILLANCE IN CANADA IN THE POST-SNOWDEN ERA EDITED BY Michael Geist University of Ottawa Press 2015 Law, Privacy and Surveillance in Canada in the Post-Snowden Era.indd 3 15-05-19 14:18 The University of Ottawa Press gratefully acknowledges the support extended to its publishing list by Canadian Heritage through the Canada Book Fund, by the Canada Council for the Arts, by the Federation for the Humanities and Social Sciences through the Awards to Scholarly Publications Program and by the University of Ottawa. Copy editing: Joanne Muzak Proofreading: Susan James Typesetting: Édiscript enr. Cover design: Llama Communications and Édiscript enr. Library and Archives Canada Cataloguing in Publication Law, privacy, and surveillance in Canada in the post-Snowden era / edited by Michael Geist. (Law, technology and media) Includes bibliographical references. Issued in print and electronic formats. ISBN 978-0-7766-2207-1 (paperback). ISBN 978-0-7766-2183-8 (pdf). ISBN 978-0-7766-2182-1 (epub) 1. Electronic surveillance — Law and legislation — Canada. 2. Privacy, Right of — Canada. 3. Technology and law — Canada. I. Geist, Michael, 1968-, author, editor II. Series: Law, technology and media KE9328.L34 2015 345.71’052 C2015-903727-1 KF9670.L34 2015 C2015-903728-X © Michael Geist, 2015 under Creative Commons License Attribution — Non Commercial Share Alike 3.0 (CC BY-NC-SA 3.0) Printed in Canada Law, Privacy and Surveillance in Canada in the Post-Snowden Era.indd 4 15-05-19 14:18 T able of Contents Acknowledgements ..........................................................................
    [Show full text]
  • From Network Security to Network Autonomous
    International Journal of Advanced Network, Monitoring and Controls Volume 04, No.01, 2019 From Network Security to Network Autonomous Wang Yubian* Yuri Shebzukhov Department of Railway Transportation Control Department of the International Relations Belarusian State University of Transport Belarusian State University of Transport 34, Kirova street,Gomel,246653 Republic of Belarus Republic of Belarus 34, Kirovastreet, Gomel, 246653 *is the communication author. Republic of Belarus e-mail: [email protected] e-mail: [email protected] Abstract—In the 20th century, the emergence of the the Internet by SMEs, and how to reduce the Internet has completely changed the work and life of bandwidth fee for accessing the Internet is a problem. human beings around the world. Today, people are This two major problems are now more difficult to increasingly inseparable from network. The Internet has solve, and why? We need specific analysis of specific been integrated with the global industry, agriculture, issues and tell everyone what solutions we have. education, science,technologyand national defense. The current Internet was originated in the United States. The Internet systems based on IPv4 and IPv6,they are controlled by the United States completely. Computers I. CYBERSPACE connected to the Internet are subject to data retention and backup in the United States. Data security is greatly First of all, there must be a definition of cyberspace. threatened. In addition, due to limitations and loopholes This is very important. How do we adhere to the in the design of the Internet, the Internet is subject to sovereignty of cyberspace?Currently,there is many different types of attacks.
    [Show full text]
  • The Digital Silk Road and China's Technology Influence in Southeast
    The Digital Silk Road and China’s Technology Influence in Southeast Asia By Dai Mochinaga, Senior Researcher, Keio Research Institute at SFC Introduction China’s growing influence in Southeast Asia, in part due to its Belt and Road Initiative (BRI), has raised anxiety in other countries, including those in Southeast Asia and major external powers like the United States, Japan, Australia, and India. Democratic leaders regard the initiative as a long-term threat and have pointed out that Chinese technologies are potentially high-risk, citing concerns over national security, intellectual property theft, and privacy risks. The Digital Silk Road (DSR) both links countries closer to China via information and communication technologies (ICT) and grants China a role in Southeast Asian countries’ technological development. Some aspects of the DSR have the potential to export digital authoritarianism and spread surveillance technologies. Yet despite these concerns, some Southeast Asian countries have widely accepted Chinese technologies, taking some of these risks in part because of China’s cost-effective technology exports, assistance, and other efforts to woo Southeast Asian states. Despite a drop in outbound investment in 2020, in part due to the COVID-19 pandemic, and the need for refinancing of many BRI loans, Beijing appears ready to increase outbound investment in 2021. As part of this investment push, China clearly desires to expand its influence over Southeast Asia’s technological development through the DSR. The DSR is also part of China’s strategy to turn its technology firms, in areas likes artificial intelligence, fifth-generation (5G) telecommunications, and smart cities projects, into globally competitive players, and convince other parts of the world to adopt Chinese technology norms and standards.
    [Show full text]
  • Of Course, Data Can Never Fully Represent Reality’: Assessing the Relationship Between Indigenous Data and IK, TEK, and TK
    Wayne State University Human Biology Open Access Pre-Prints WSU Press 3-30-2020 ‘Of course, data can never fully represent reality’: Assessing the Relationship between Indigenous Data and IK, TEK, and TK Marisa Elena Duarte Arizona State University Morgan Vigil-Hayes Northern Arizona University Sandra Littletree University of Washington Miranda Belarde-Lewis University of Washington Follow this and additional works at: https://digitalcommons.wayne.edu/humbiol_preprints Recommended Citation Duarte, Marisa Elena; Vigil-Hayes, Morgan; Littletree, Sandra; and Belarde-Lewis, Miranda, "‘Of course, data can never fully represent reality’: Assessing the Relationship between Indigenous Data and IK, TEK, and TK" (2020). Human Biology Open Access Pre-Prints. 163. https://digitalcommons.wayne.edu/humbiol_preprints/163 This Article is brought to you for free and open access by the WSU Press at DigitalCommons@WayneState. It has been accepted for inclusion in Human Biology Open Access Pre-Prints by an authorized administrator of DigitalCommons@WayneState. ‘Of course, data can never fully represent reality’: Assessing the Relationship between Indigenous Data and IK, TEK, and TK Marisa Elena Duarte,1* Morgan Vigil-Hayes,2 Sandra Littletree,3 and Miranda Belarde-Lewis3 1Justice and Social Inquiry, School of Social Transformation, Arizona State University, Tempe, Arizona, USA. 2School of Informatics, Computing and Cyber Systems, Northern Arizona University, Flagstaff, Arizona, USA. 3Information School, University of Washington, Seattle, Washington, USA. *Correspondence to: Marisa Elena Duarte, School of Social Transformation, Arizona State University, P.O. Box 876403 Tempe, AZ 85287-6403 USA. E-mail: [email protected]. Short Title: Assessing the Relationship between Indigenous Data and IK, TEK, and TK KEY WORDS: INDIGENOUS KNOWLEDGE, TRADITIONAL ECOLOGICAL KNOWLEDGE, TRADITIONAL KNOWLEDGE, INDIGENOUS DATA SOVEREIGNTY, INFORMATICS, INFORMATION SCIENCE, DATA SCIENCE.
    [Show full text]