REPORT Freedom of Expression on the Internet

Total Page:16

File Type:pdf, Size:1020Kb

REPORT Freedom of Expression on the Internet Organization for Security and Co-operation in Europe The Office of the Representative on Freedom of the Media DUNJA MIJATOVIĆ REPORT Freedom of Expression on the Internet A study of legal provisions and practices related to freedom of expression, the free flow of information and media pluralism on the Internet in OSCE participating States The report has been commissioned by the Office of the OSCE Representative on Freedom of the Media. It was prepared by Professor Yaman Akdeniz, Faculty of Law, Istanbul Bilgi University, Turkey.* This report presents the conclusions of the first comprehensive research on Internet content regulation in the OSCE region. A preliminary report was prepared and published in view of the OSCE review conference and OSCE Astana Summit 2010. The information contained in this report is based on data received from OSCE participating States as well as bona fide sources in response to a questionnaire sent out on 23 September 2010. * Yaman Akdeniz’ recent publications include Internet Child Pornography and the Law: National and International Responses (London: Ashgate, 2008: ISBN: 0 7546 2297 5), Racism on the Internet, Council of Europe Publishing, 2010 (ISBN 978-92-871-6634-0). For further information about his work see <http://cyberlaw.org.uk/about/>. Akdeniz can be contacted at [email protected]. 2 TABLE OF CONTENTS INTRODUCTION 4 OSCE COMMITMENTS 7 METHODOLOGY 8 A. INTERNET ACCESS 10 B. INTERNET CONTENT REGULATION 13 C. BLOCKING,F,CR ILTERING AND ONTENT EMOVAL 22 D. LICENSING AND LIABILITY RELATED ISSUES, AND HOTLINES TO REPORT ILLEGAL CONTENT 28 E. CONCLUSIONS AND RECOMMENDATIONS 33 OVERVIEW OF LAWS AND PRACTICES ON INTERNET CONTENT REGULATION IN THE OSCE AREA 37 A. INTERNET ACCESS 37 Internet Access – A Fundamental Human Right 37 Legal provisions which could restrict users’ access to the Internet 38 Legal provis io ns gua ranteeing or regulating “Net Neutrality” 40 Conclusion to Part A 47 B. INTERNET CONTENT REGULATION 48 Legal provisions outlawing racist content, xenophobia, and hate speech on the Internet 51 Legal provisions outlawing the denial, gross minimisation, approval or justification of genocide or crimes against humanity 64 Legal provisions outlawing incitement to terrorism, terrorist propaganda and/or terrorist use of the Internet 69 Legal provisions criminalizing Child Pornography 81 Legal provisions outlawing obscene and sexually explicit (pornographic) content 99 Legal Provisions Outlawing Internet Piracy 103 Legal provisions outlawing libel and insult (defamation) on the Internet 115 Legal provisions outlawing the expression of views perceived to be encouraging extremism 127 Legal provisions outlawing the distribution of “harmful content” 133 Legal provisions outlawing a ny other categories of Internet content 135 Conclusion to Part B 136 C. BLOCKING, FILTERING, AND CONTENT REMOVAL 139 European Union and Council of Europe policies and projects on blocking access to websites 139 Legal provisions which require closing down and/or blocking access to websites and access to Web 2.0 based services 149 Policies on Filtering Software and Children’s Access to Harmful Content 174 Legal provisions requiring schools, libraries, and Internet cafes to use filtering and blocking systems and softw are 176 Conclusion to Part C 181 D. LICENSING AND LIABILITY RELATED ISSUES, AND HOTLINES TO REPORT ILLEGAL CONTENT 186 Hotlines to report alle gedly illeg al content 208 Conclusion to Part D 219 APPENDIX II: RESPONSE STATISTICS 229 APPENDIX III: RESPONSE FREQUENCIES 230 3 Introduction Whenever new communications and media platforms have been introduced, their innovation and application was met with scepticism, fear or outright banning by the ruling parties and authorities who feared the unknown medium, and its capacity to oust them from power. Therefore, new (mass) media historically face suspicion, and are liable to excessive regulation as they spark fear of potential detrimental effects on society, security and political power structures. This has proven true in the publication and transmission of certain types of content from the printing press through the advent of radio, television and satellite transmissions, as well as other forms of communication systems. During the 1990s, as attention turned to the Internet and as access to this borderless new communications platform increased, the widespread availability of various content, including sexually explicit content and other types of content deemed to be harmful for children, stirred up a ‘moral panic’1 shared by many states and governments and certain civil-society representatives and concerned citizens. Prior to the 1990s, information and content was predominantly within the strict boundaries and control of individual states, whether through paper-based publications, audio-visual transmissions limited to a particular area or even through public demonstrations and debates. Much of the media content made available and the discussions it triggered remained confined within territorially defined areas. Today, however, information and content, with its digital transmission and widespread availability through the Internet, do not necessarily respect national rules or territorial boundaries. This dissolution of the “sovereignty” of content control, coupled with the globalization of information, comes along with an increased multilingualism observable in many countries. The increasing popularity of user-driven interactive Web 2.0 applications and services such as YouTube, Facebook and Twitter seem to eliminate virtual Internet borders even further by creating a seamless global public sphere. This, inevitably complicates state-level efforts to find an appropriate balance between the universal right to freedom of opinion and expression, which includes the right to receive and impart information, and the prohibition on certain types of content deemed illegal by nation- state authorities or intergovernmental organizations. With the widespread availability of the Internet and increasing number of users, online content regulation became an important focus of governments and supranational bodies across the globe. Today, many OSCE participating States feel the need to react to the development of the Internet as a major media and communication platform. Governments think that it is, on the one hand, the infrastructure that requires protective measures and, on the other hand, content made available that necessitates regulation. The past few years have shown that more people access the Internet, more content is made available online and more states feel obliged to regulate online content. A number of countries across the OSCE region have introduced new legal provisions in response to the availability and dissemination of certain types of (illegal or unwanted) content. Governments are particularly concerned about the availability of terrorist propaganda,2 racist content,3 hate speech, sexually explicit content, including child 1 Cohen, S., Folk Devils and Moral Panics: Creation of Mods and Rockers, Routledge: 30th Anniversary edition, 2002; Jenkins, P., Intimate Enemies: Moral Panics in Contemporary Great Britain, Aldine De Gruyter, 1992. 2 See generally Weimann, G., Terror on the Internet: The New Arena, the New Challenges (Washington: US Institute of Peace, 2006). 3 For a detailed assessment of legal issues surrounding racist content and hate speech on the Internet see Akdeniz, Y., Racism on the Internet, Council of Europe Publishing, 2010 (ISBN 978-92-871-6634-0); Akdeniz, Y., “Introduction,” in Legal Instruments for Combating Racism on the Internet, Council of Europe Publishing, Human Rights and Democracy Series, 2009, pp 7-37. 4 pornography,4 as well as state secrets and content critical to certain governments or business practices. However, the governance of illegal as well as harmful (which falls short of illegal) Internet content may differ from one country to another and variations are evident within the OSCE participating States.5 “Harm criteria” remain distinct within different jurisdictions with individual states deciding what is legal and illegal based upon different cultural, moral, religious and historical differences and constitutional values. Typically, the stance taken by many states is that what is illegal and punishable in an offline form must at least be treated equally online. There are, however, several features of the Internet which fundamentally affect approaches to its governance and while rules and boundaries still exist, enforcement of existing laws, rules and regulations to digital content becomes evidently complex and problematic. Despite the introduction of new laws or amendments to existing laws criminalizing publication or distribution of certain types of content, in almost all instances extraterritoriality remains a major problem when content hosted or distributed from outside the jurisdiction is deemed illegal in another.6 Therefore, the question of jurisdiction over content adds to the challenges faced by the governments and regulators. Which country’s laws should apply for content providers or for Web 2.0 based platform providers? Should the providers be liable in the country where the content has been uploaded, viewed, or downloaded or where the server is placed or where the responsible providers reside? Many of these questions remain unanswered. Some countries fear the Internet could undermine their judicial sovereignty; others embrace the Internet and praise its global nature. However, the Internet certainly has created
Recommended publications
  • Can Self-Censorship in News Media Be Detected Algorithmically? A
    Can Self-Censorship in News Media be Detected Algorithmically? A Case Study in Latin America Rongrong Tao1, Baojian Zhou2, Feng Chen2, Naifeng Liu2, David Mares3, Patrick Butler1, Naren Ramakrishnan1 1 Discovery Analytics Center, Department of Computer Science, Virginia Tech, Arlington, VA, USA 2 Department of Computer Science, University at Albany, SUNY, Albany, NY, USA 3 University of California at San Diego, San Diego, CA, USA [email protected], {bzhou6, fchen5, nliu3}@albany.edu, [email protected] [email protected], [email protected] Abstract Censorship in social media has been well studied and pro- vides insight into how governments stifle freedom of expres- sion online. Comparatively less (or no) attention has been paid to detecting (self) censorship in traditional media (e.g., news) using social media as a bellweather. We present a novel unsupervised approach that views social media as a sensor to detect censorship in news media wherein statisti- cally significant differences between information published in the news media and the correlated information published in social media are automatically identified as candidate cen- Figure 1: Worldwide freedom of the press (2014). The higher the sored events. We develop a hypothesis testing framework score, the worse the press freedom status. to identify and evaluate censored clusters of keywords, and a new near-linear-time algorithm (called GraphDPD) to identify the highest scoring clusters as indicators of censor- Social media censorship often takes the form of active cen- ship. We outline extensive experiments on semi-synthetic sors identifying offending posts and deleting them and there- data as well as real datasets (with Twitter and local news fore tracking post deletions supports the use of supervised media) from Mexico and Venezuela, highlighting the capa- learning approaches [8, 4, 1, 11].
    [Show full text]
  • Media Literacy Policy in Pakistan
    Hacettepe University Graduate School of Social Sciences Department of Communication Sciences MEDIA LITERACY POLICY IN PAKISTAN Sana ZAINAB Master Thesis Ankara, 2019 MEDIA LITERACY POLICY IN PAKISTAN Sana ZAINAB Hacettepe University Graduate School of Social Sciences Department of Communication Sciences Master Thesis Ankara, 2019 YAYIMLAMA VE FİKRİ MÜLKİYET HAKLARI BEYANI Enstitü tarafından onaylanan lisansüstü tezimin tamamını veya herhangi bir kısmını, basılı (kağıt) ve elektronik formatta arşivleme ve aşağıda verilen koşullarla kullanıma açma iznini Hacettepe Üniversitesine verdiğimi bildiririm. Bu izinle Üniversiteye verilen kullanım hakları dışındaki tüm fikri mülkiyet haklarım bende kalacak, tezimin tamamının ya da bir bölümünün gelecekteki çalışmalarda (makale, kitap, lisans ve patent vb.) kullanım hakları bana ait olacaktır. Tezin kendi orijinal çalışmam olduğunu, başkalarının haklarını ihlal etmediğimi ve tezimin tek yetkili sahibi olduğumu beyan ve taahhüt ederim. Tezimde yer alan telif hakkı bulunan ve sahiplerinden yazılı izin alınarak kullanılması zorunlu metinleri yazılı izin alınarak kullandığımı ve istenildiğinde suretlerini Üniversiteye teslim etmeyi taahhüt ederim. Yükseköğretim Kurulu tarafından yayınlanan “Lisansüstü Tezlerin Elektronik Ortamda Toplanması, Düzenlenmesi ve Erişime Açılmasına İlişkin Yönerge” kapsamında tezim aşağıda belirtilen koşullar haricince YÖK Ulusal Tez Merkezi / H.Ü. Kütüphaneleri Açık Erişim Sisteminde erişime açılır. o Enstitü / Fakülte yönetim kurulu kararı ile tezimin erişime açılması mezuniyet
    [Show full text]
  • Regulating Violence in Video Games: Virtually Everything
    Journal of the National Association of Administrative Law Judiciary Volume 31 Issue 1 Article 7 3-15-2011 Regulating Violence in Video Games: Virtually Everything Alan Wilcox Follow this and additional works at: https://digitalcommons.pepperdine.edu/naalj Part of the Administrative Law Commons, Comparative and Foreign Law Commons, and the Entertainment, Arts, and Sports Law Commons Recommended Citation Alan Wilcox, Regulating Violence in Video Games: Virtually Everything, 31 J. Nat’l Ass’n Admin. L. Judiciary Iss. 1 (2011) Available at: https://digitalcommons.pepperdine.edu/naalj/vol31/iss1/7 This Comment is brought to you for free and open access by the Caruso School of Law at Pepperdine Digital Commons. It has been accepted for inclusion in Journal of the National Association of Administrative Law Judiciary by an authorized editor of Pepperdine Digital Commons. For more information, please contact [email protected], [email protected], [email protected]. Regulating Violence in Video Games: Virtually Everything By Alan Wilcox* TABLE OF CONTENTS I. INTRODUCTION ................................. ....... 254 II. PAST AND CURRENT RESTRICTIONS ON VIOLENCE IN VIDEO GAMES ........................................... 256 A. The Origins of Video Game Regulation...............256 B. The ESRB ............................. ..... 263 III. RESTRICTIONS IMPOSED IN OTHER COUNTRIES . ............ 275 A. The European Union ............................... 276 1. PEGI.. ................................... 276 2. The United
    [Show full text]
  • CHRIS BRONK, Ph.D. 4403 Oak Forest Dr. Missouri City, TX 77459 W
    CHRIS BRONK, Ph.D. 4403 Oak Forest Dr. Missouri City, TX 77459 W: 713.743.5593 C: 832.729.6205 rcbronk <at> central.uh.edu http://www.uh.edu/technology/departments/ilt/people/faculty/?l=bronk&f=chris PROFESSIONAL EXPERIENCE UNIVERSITY OF HOUSTON, Houston, TX Associate Professor, Information Sciences Technology 2020 – Present Assistant Professor, Information & Logistics Technology 2014 – 2020 Program Coordinator, Cybersecurity 2021 – Present Associate Director, Center for Information Security Research and Education 2014 – Present Research Associate, Hobby School of Public Affairs 2018 – Present RICE UNIVERSITY, Houston, TX Director – Program on Energy and Cybersecurity, Center for Energy Studies 2013 – 2014 Fellow – Baker Institute for Public Policy 2006 – 2014 Adjunct Associate Professor – Department of Computer Science 2011 – Present Lecturer – Department of Computer Science 2007 – 2011 UNIVERSITY OF TORONTO, Toronto, ONT Senior Fellow in Cyber Geopolitics – Canada Ctr. for Security Studies 2012 – 2014 SYRACUSE UNIVERSITY, Syracuse, NY Senior Research Fellow – Dept. of Electrical & Computer Engineering 2010 U.S. DEPARTMENT OF STATE, Washington, D.C. Senior Advisor – Office of eDiplomacy 2009 – 2015 Foreign Service Officer 2002 – 2007 SYRACUSE LANGUAGE SYSTEMS, Syracuse, NY Technical Staff Coordinator/Software Developer 1995 – 2000 EDUCATION SYRACUSE UNIVERSITY MAXWELL SCHOOL, Syracuse, NY Ph.D. in Political Science, 2006 * Dissertation: In Confidence: Information Technology, Secrecy and the State. * Subfields: International Relations and Public Administration MA in Political Science, 2001 YONSEI UNIVERSITY, Seoul, S. Korea Coursework in Asian Studies and Korean, 2001 – 2002 UNIVERSITY OF WISCONSIN, Madison, WI BS in History, with distinction, 1995 OXFORD UNIVERSITY, Oxford, UK Coursework in International Politics and History, 1992 HONORS UNIVERSITY OF HOUSTON • College of Technology Faculty Award.
    [Show full text]
  • End of News:Internet Censorship in Turkey
    https://www.freewebturkey.com/end-of-news End of news: Internet censorship in Turkey This report was published as part of the Free Web Turkey project carried out by the Media and Law Studies Association between November 2019 and October 2020. http://www.freewebturkey.com | http://www.mlsaturkey.com About MLSA and Free Web Turkey The Media and Law Studies Association (MLSA) was founded in 2017 and its main field of activity is of- fering legal protection to journalists and people tried in freedom of expression cases. As the MLSA, we aim to provide guidance to websites, media organizations and all content producers facing censorship in digital media on methods of coping with censorship, offering them legal consultancy, tools to avoid censorship and a set of internet services that would ease their efforts within the scope of the Free Web Turkey project, which we have been conducting in the field of internet freedom for a year. Besides, we bring together groups working in the field of digital freedoms and freedom of expression to organize panels, roundtable discussions, publish articles, and conduct training programs for content producers to raise awareness against censorship. Another goal of our project is to organize the network of communication and solidarity between institutions, which is one of the most essential components in combating digital censorship. To this end, we try to keep an up-to- date list of blocked URLs and create a database so that we can run a joint and more powerful campaign against censorship. While doing all these, we aim to protect the freedom of expression in the law, the Constitution and international conventions, and to exercise this right effectively.
    [Show full text]
  • “War of Platforms” the Rivalry Between Cable and DSL to Win the “Triple Play” Customer
    “War of Platforms” The rivalry between Cable and DSL to win the “Triple Play” Customer Executive Summary Competition shifts from individual services to Triple Play Today, television cable as well as DSL are in a position to offer TV, Internet and telephony as a product bundle (“Triple Play“). Thus, for the first time, direct competition ensues between these infrastructures. Throughout Europe, the Triple Play market will grow rapidly, increasing from the current € 0.7 billion to approximately € 7.5 billion by 2010, reflecting a tenfold increase. TV-over-DSL will be utilized by approximately 1.4 million German households by 2010 In the near future, the largest German infrastructure-based DSL providers will be aggressively marketing and offering DSL television. However, in contrast to other European countries, the market potential is limited by the structure of the TV market. TV cable goes Triple Play: 1.6 million German broadband Internet customers by 2010 Cable television is facing an impending growth spurt. Due to accelerated upgrading of the networks, cable will have achieved a 9% market share of broadband households by 2010. Infrastructure platforms are breaking ground in new product territories Cable Satellite DSL DTT TV Analogue TV & Radio Digital Basic TV & Radio Basic Pay-TV Premium Pay-TV NVoD / PPV HDTV uni -uni directional PVR * iTV Standard Partial VoD Potential Internet High Speed Internet Broadband Content Portal bi –bi directional * Telephony Basic Telephone Service Mobile Mobile (Basic, Home Zone) Source: Solon © 2005 Solon Management Consulting War of Platforms “War of Platforms” “Television via Internet“, ”high-speed Internet via televison cable“, “Voice-over-IP“, “Internet In frastructures are via mobile networks” – the operators of various broadband infrastructures (television cable, breaking ground in DSL, UMTS) are advancing into new domains and creating competition for one another.
    [Show full text]
  • Internet Censorship in Turkey: University Students' Opinions
    World Journal on Educational Technology 1 (2009) 46‐56 www.world‐education‐center.org/index.php/wjet Internet censorship in Turkey: University students' opinions * Hasan Ozkan a , Arda Arikan b a Hacettepe University, Faculty of Education, Beytepe, 06800, Ankara, Turkey b Hacettepe University, Faculty of Education, Beytepe, 06800, Ankara, Turkey Received April 30, 2009; revised May 31, 2009; accepted June 22 , 2009 Abstract The aim of this paper is to study university students’ opinions toward online censorship with references to their socio‐ political and economic variables. Considering the upwards trend and the increasing number of online restrictions in Turkey, the opinions of university students (n=138) are thought to give significant findings. The questionnaire aimed to collect data on some chosen aspects of censorship which are internet access regulation by legal authorities, online pornographic content, websites distributing illegal and crime related information and the political and religious aspects of the internet censorship. The findings about these four basic aspects toward the online censorship revealed that despite the high proportion of approval, participants have a confused and inconsistent attitude towards the issue especially within the application and the idea of censorship. In a broader aspect, the findings can be interpreted as a sign of university students’ insufficient knowledge and understanding towards the current situation and the possible future of online censorship in Turkey. Keywords: Internet; censor; censorship;
    [Show full text]
  • 2.2. Broadband Speeds 37 2.3
    DIRECTORATE GENERAL FOR INTERNAL POLICIES POLICY DEPARTMENT A: ECONOMIC AND SCIENTIFIC POLICY INDUSTRY, RESEARCH AND ENERGY Entertainment x.0 to Boost Broadband Deployment STUDY Abstract We explore the definition of broadband and explain its interaction with European policy goals; analyse available data in order provide a detailed, objective and realistic picture of the broadband deployment, adoption, and usage situation in the EU from a number of different perspectives; and assess the drivers of broadband today, with particular emphasis on audiovisual and entertainment services. Measures to promote demand in general and the distribution of IP- based audiovisual content in particular, would appear to be warranted. IP/A/ITRE/ST/2012-18 October 2013 PE 507.479 EN This document was requested by the European Parliament's Committee on Industry, Research and Energy AUTHORS Mr J Scott Marcus (WIK-Consult GmbH) Ms Ilsa Godlovitch(WIK-Consult GmbH) Mr Pieter A Nooren (TNO) Mr Dieter Elixmann(WIK-Consult GmbH) Mr Bram van den Ende (TNO) with the support of Prof Jonathan Cave (RAND Europe) RESPONSIBLE ADMINISTRATORS Mr Fabrizio Porrino Mr Mariusz Maciejewski Policy Department A: Economic and Scientific Policy European Parliament B-1047 Brussels E-mail: [email protected] LINGUISTIC VERSIONS Original: EN ABOUT THE EDITOR To contact the Policy Department A or to subscribe to its newsletter please write to: PoldepH [email protected] Manuscript completed in October 2013. © European Union, 2013. This document is available on the Internet at: http://www.europarl.europa.eu/studies DISCLAIMER The opinions expressed in this document are the sole responsibility of the author and do not necessarily represent the official position of the European Parliament.
    [Show full text]
  • Progress in Empirical Research on Children's
    Volume XII Number 2, November 1983 ISSN:0091-3995 Sex Information and Education Council of the U.S. PROGRESS IN EMPIRICAL RESEARCH ON CHILDREN’S SEXUALITY Ernest Borneman, PhD President, Austrian Society for Research in Sexology President, German Society for Research in Sociological Sexology [Throughout my years of attending local, regional, national, impossible in most countries of the western world. The result is and international conferences, I have rarely heard a paper that not only ignorance but a plethora of false information. provoked such intense and prolonged discussion as did Dr. When my first research team began its work some 40 years Ernest Borneman’s presentation at the Sixth World Congress of ago, we believed, for instance, that a boy’s first pollution (emis- Sexology he/d in Washington, D.C. in May 7983. For days after sion of semen at times other than during coitus) indicated that his talk, wherever conference participants gathered, someone his semen had become fertile. We believed, too, that a girl would invariably ask; “Did you hear Borneman’s paper!” and could not be impregnated before she had her menarche. We thus trigger engrossed interaction. Both the methodology and accepted these assumptions because they seemed obvious. It the interpretation of his findings prompted heated reaction never occurred to us to question or test them. pro and con. I a/so had the opportunity of using Dr. Borne- Then we heard of a nine-year-old girl who had been raped man’s paper with our New York University international and had borne a child prior to her menarche.
    [Show full text]
  • The German Internet Industry 2016-2019 the German Industry 2016-2019 Internet
    The German Internet Industry 2016-2019 The German Industry 2016-2019 Internet WE ARE SHAPING THE INTERNET. Table of Contents 1. Introduction .5 1.1 Reality check of the claims in the previous studies .6 1.2 Infographic explaining the underlying concepts of the market model .7 2. The German Internet Industry in Facts and Figures .10 2.1 Projections 2012–2019 .10 2.2 The Impact of the Commercial Internet on Germany as an Industry Location .13 3. A detailed look at the individual layers and segments .16 of the Internet industry 3.1 NETWORK, INFRASTRUCTURE & OPERATIONS .16 3.1.1 Colocation & Housing .18 3.1.2 Internet Exchanges .20 3.1.3 Internet Backbone, Transit & CDN .22 3.1.4 Fixed Internet Access Network .24 3.1.5 Mobile Internet Access Network .26 3.2 SERVICES & APPLICATIONS .28 3.2.1 Cloud Computing – Public IaaS .30 3.2.2 Cloud Computing – Public PaaS .32 3.2.3 Cloud Computing – Public SaaS .34 3.2.4 Web Hosting & Domains .36 3.3 AGGREGATION & TRANSACTIONS .38 3.3.1 Online Advertising & Internet Presence .40 3.3.2 Portals & Classified Marketplaces .42 3.3.3 Billing & Payment .44 3.3.4 E-Commerce B2B .46 3.3.5 E-Commerce B2C .48 3.4 PAID CONTENT .50 3.4.1 Gaming .52 3.4.2 Gambling .54 3.4.3 TV & Video .56 3.4.4 Music & Radio .58 3.4.5 E-Publishing .60 4. 20 Years of eco in Germany .62 4.1 eco is shaping the Internet .62 4.2 The Development of eco in figures .63 4.3 Worldwide Distribution of Member Companies .64 4.4 eco Services .65 5.
    [Show full text]
  • Do Digital Information Technologies Help Unemployed Job Seekers Find a Job? Evidence from the Broadband Internet Expansion in Germany
    A Service of Leibniz-Informationszentrum econstor Wirtschaft Leibniz Information Centre Make Your Publications Visible. zbw for Economics Gürtzgen, Nicole; Nolte, André; Pohlan, Laura; van den Berg, Gerard J. Working Paper Do Digital Information Technologies Help Unemployed Job Seekers Find a Job? Evidence from the Broadband Internet Expansion in Germany IZA Discussion Papers, No. 11555 Provided in Cooperation with: IZA – Institute of Labor Economics Suggested Citation: Gürtzgen, Nicole; Nolte, André; Pohlan, Laura; van den Berg, Gerard J. (2018) : Do Digital Information Technologies Help Unemployed Job Seekers Find a Job? Evidence from the Broadband Internet Expansion in Germany, IZA Discussion Papers, No. 11555, Institute of Labor Economics (IZA), Bonn This Version is available at: http://hdl.handle.net/10419/180573 Standard-Nutzungsbedingungen: Terms of use: Die Dokumente auf EconStor dürfen zu eigenen wissenschaftlichen Documents in EconStor may be saved and copied for your Zwecken und zum Privatgebrauch gespeichert und kopiert werden. personal and scholarly purposes. Sie dürfen die Dokumente nicht für öffentliche oder kommerzielle You are not to copy documents for public or commercial Zwecke vervielfältigen, öffentlich ausstellen, öffentlich zugänglich purposes, to exhibit the documents publicly, to make them machen, vertreiben oder anderweitig nutzen. publicly available on the internet, or to distribute or otherwise use the documents in public. Sofern die Verfasser die Dokumente unter Open-Content-Lizenzen (insbesondere CC-Lizenzen) zur Verfügung gestellt haben sollten, If the documents have been made available under an Open gelten abweichend von diesen Nutzungsbedingungen die in der dort Content Licence (especially Creative Commons Licences), you genannten Lizenz gewährten Nutzungsrechte. may exercise further usage rights as specified in the indicated licence.
    [Show full text]
  • Sexuelle Grenzverletzungen Und Gewalt Mittels Digitaler
    Arne Dekker, Thula Koops & Peer Briken Sexualisierte Grenzverletzungen und Gewalt mittels digitaler Medien Expertise 1 INHALT EINLEITUNG Arne Dekker, Thula Koops, Peer Briken .......................................... 3 SYNOPSE IN 10 THESEN Arne Dekker, Thula Koops, Peer Briken ...................... 6 LITERATURÜBERSICHT Thula Koops, Arne Dekker, Peer Briken ...................... 12 1 Sexuelle Grenzverletzungen online ........................................................................ 12 1.1 Unfreiwillige Konfrontation mit sexuellem Bildmaterial ................................... 12 1.2 Unfreiwillige sexuelle Annäherung ..................................................................... 15 2 Vorbereitung von sexualisierter Gewalt offline ...................................................... 21 2.1 Grooming ............................................................................................................. 21 2.2 Anbahnung von Kindersextourismus und Kinderprostitution ............................. 29 2.3 Vernetzung von Tätern im Internet ...................................................................... 31 3 Grenzverletzungen mittels bildlicher und filmischer Darstellungen ..................... 32 3.1 Darstellungen der sexualisierten Ausbeutung von Kindern und Jugendlichen ... 32 3.2 Selbstgenerierte Inhalte / Sexting und dessen Missbrauch .................................. 43 3.3 Gefahren durch Live-Video-Chat ........................................................................ 54 4 Prävention und Hilfsangebote
    [Show full text]