JiscMail Logo
Email discussion lists for the UK Education and Research communities

Help for CYBER-SOCIETY-LIVE Archives


CYBER-SOCIETY-LIVE Archives

CYBER-SOCIETY-LIVE Archives


CYBER-SOCIETY-LIVE@JISCMAIL.AC.UK


View:

Message:

[

First

|

Previous

|

Next

|

Last

]

By Topic:

[

First

|

Previous

|

Next

|

Last

]

By Author:

[

First

|

Previous

|

Next

|

Last

]

Font:

Proportional Font

LISTSERV Archives

LISTSERV Archives

CYBER-SOCIETY-LIVE Home

CYBER-SOCIETY-LIVE Home

CYBER-SOCIETY-LIVE  June 2007

CYBER-SOCIETY-LIVE June 2007

Options

Subscribe or Unsubscribe

Subscribe or Unsubscribe

Log In

Log In

Get Password

Get Password

Subject:

[CSL] OII News [2007.06.20]: News and events, filtering and identity management

From:

Joanne Roberts <[log in to unmask]>

Reply-To:

Interdisciplinary academic study of Cyber Society <[log in to unmask]>

Date:

Thu, 21 Jun 2007 08:26:47 +0100

Content-Type:

text/plain

Parts/Attachments:

Parts/Attachments

text/plain (480 lines)

From: OII Newsletter [mailto:[log in to unmask]] 
Sent: 20 June 2007 20:05
To: [log in to unmask]
Subject: OII News [2007.06.20]: News and events, filtering and identity
management

Dear friends and colleagues,   
   
'Internet censorship and surveillance are growing global phenomena'   
OpenNet Initiative    
   
1. Internet Filtering: Research Report   
2. Internet Filtering in Thailand   
3. Identity Management   
4. OXlab: 800 people now signed up!   
5. Events Diary   
6. Blog Bites   
7. Student Diary   
8. The Wizard of Oz   
   
   
--------------------------------------------------   
1. Internet Filtering: Research Report   
--------------------------------------------------   
   
'We are still in the very early stages of the struggle for control on
the Internet...but as it turns out, states have not found it so very
hard to assert sovereignty when and where they have felt the need to do
so: the result is the emergence of an increasingly balkanised Internet.
Intead of a world wide web, it's more accurate to say we have a Saudi
Wide Web, an Uzbek Wide Web, a Pakistani Wide Web, a Thai Wide Web, and
so forth...'   
   
Summer is upon us and filtering is in the air...we have a new research
report by Jonathan Zittrain and John Palfrey Jr: chapter 2 from their
forthcoming book 'Internet Filtering: The Politics and Mechanisms of
Control' to be published by MIT Press.   
   
Access Denied: The Practice and Policy of Global Internet Filtering   
http://www.oii.ox.ac.uk/research/publications/RR14.pdf   
   
The OpenNet Initiative (ONI) held a conference in Oxford to launch their
first report on Internet filtering worldwide. If you missed it, you can
watch the discussion and Q&A on our webcasting site:   
http://webcast.oii.ox.ac.uk/?view=Webcast&ID=20070518_198   
   
   
--------------------------------------------------   
2. Internet Filtering in Thailand   
--------------------------------------------------   
   
Professor Kriengsak Chareonwongsak has recently arrived at the OII as a
Visiting Fellow, and will be conducting research over the year on
Internet Filtering in Thailand. We asked him:   
   
Ed: What are you hoping to do during your time at the OII?   
   
KC: The objectives of my intended research at OII are as follows: to
study the policies, laws, structure, system and process of Internet
Filtering in Thailand; to conduct an empirical study of website blocking
in Thailand; to gather information and opinions from those concerned in
any way with the process of Internet Filtering in Thailand (and with
stakeholders who may be impacted by this); and to yield study results
and policy recommendations.   
   
Ed: And how will you be approaching the study?   
   
KC: The methodology of my study includes both qualitative and
quantitative research and is divided into three areas: Literature
survey, In-depth interview and Website surveying. For in-depth
interviewing, the interviewees are sorted into several groups:
Government organization executives in Thailand, executives of Internet
Service Providers (ISPs), webmasters in Thailand, specialists on
Internet and Internet Filtering, and protesters against Thai government
intervention with the journalistic media. For Website surveying, my
study will randomly verify the website access of servers in Thailand,
by: testing errors in Thailand's Internet Filtering measures, testing
transparency by analyzing the contents of blacklisted and
non-blacklisted websites that are blocked, and testing filtering
efficiency by comparing successfully blocked websites officially
declared by the Thai government as blacklisted, with those ISPs under
government concession and ISPs that are independent.   
   
Ed: What is the background to Internet Filtering in Thailand?   
   
KC: Thai people do realize - by government announcement and rumours
within Thai society - that the Thai government has blocked a large
number of websites. Many reasons are claimed by the government and
government organizations for this blocking, for example: that they are
protecting good morality in society, protecting national security, and
so on. But, in fact, the current government, which is backed up by the
National Security Council (NSC), is focusing on the blocking of websites
that contain sensitive political text.   
   
The procedure of examining websites that contain forbidden text is the
duty of the Ministry of ICT, which is informed about improper websites
by the media and net surfers. The authority for blocking websites is
shared by many organizations, such as the MICT, the National Police
Office, the National Security Council, the Minister of Culture, the
Minster of Education and the Minister of Commerce, according to the
scope of their organization's duties by the law. The mechanism for
blocking websites includes: commanding the Communication Authority of
Thailand (which provides connection with the international network) to
block the website, asking ISPs to block the website and providing
software that protects schools from accessing the unacceptable website.

   
Ed: How transparent is this process in Thailand?   
   
KC: The performance of the Thai government in website blocking has been
severely criticized for lacking transparency and accountability so far.
Since Thailand does not adopt any cyber crime laws, website blocking is
operated without checks and balances. Bureaucratic authorities apply
Internet censorship measures using their own judgment and according to
current existing laws that do not suit computer crime cases.   
   
The former government, with Thaksin Shinawatra as Prime Minister, was
the first government to explicitly launch a website blocking policy. In
my opinion, that policy was considered a tool for limiting the right to
perceive information and express opinions, and also a tool for
intervening in all kinds of media sources that opposed the government.
The current government is also criticized in the same way due to its
blocking of websites that belong to academic groups and NGOs who
criticize the government: for example, the website of the Midnight
University http://www.midnightuniv.org, http://www.prachathai.com and
websites belonging to the ex-PM, as well as coup protest groups.   
   
Ed: What are the political / democratic repercussions of filtering? Who
is affected?   
   
KC: The media intervention of the former government was disagreed to so
vehemently that it initiated a mob led by an owner of one media source.
For the current government, the blocking of websites belonging to
academics and NGOs is also widely disagreed to by groups that fight for
media liberty. Aside from reasons for blocking websites, the process of
blocking them is another controversial issue. Not only does the
government block websites or parts of websites having forbidden text,
but it also blocks other related websites. For example, along with the
blocking of http://www.midnightuniv.org, all other websites hosted by
the same company were blocked for transmission, though they had no
connection to the Midnight University.   
   
Ed: You have just read Jonathan's filtering chapter: what did you think?

   
KC: I am impressed by the quality and industriousness of the author of
this paper, as it is a deep and multi-dimensional study that covers the
details and anticipated trends of the issue. However, if I may also
offer some humble criticism of this work, I note that it focuses on
facts and empirical data from research papers, but is weak on linking it
to the contexts and views of people and governments in each country
studied, which may have enabled us to understand the true but underlying
reason for their blocking of websites. My additional comment would be
that the paper provides insufficient policy recommendations on Internet
censorship, that would probably be beneficial to improving the website
blocking policy. However, in my view, this paper provides some important
bedrock for many future studies on the topic of Internet Filtering.   
   
Ed: Thank you ... we look forward to finding out more about your work
over the coming year.   
   
Kriengsak's biography:   
http://www.oii.ox.ac.uk/people/visitors.cfm?id=114   
   
Filtering chapter (pdf):   
http://www.oii.ox.ac.uk/research/publications/RR14.pdf   
   
ONI profile of Thailand:   
http://opennet.net/research/profiles/thailand   
   
ONI Blog:   
http://www.opennetinitiative.net/blog/   
   
   
--------------------------------------------------   
3. Identity Management   
--------------------------------------------------   
   
The problems of identity and personal-information management over the
Internet remain unsolved, despite much debate and a number of competing
initiatives...these problems range from issues of convenience, such as
requirements for multiple usernames and passwords, to the inability to
carry out many transactions that require authentication of the user, to
the security of systems that hold personal information, including
identity information.   
   
The OII organized a public panel to discuss this topic, chaired by
Jonathan Bamford of the Information Commissioner's Office, and with a
keynote by Sir David Normington, the permanent secretary at the Home
Office. Other speakers included Professor Brian Collins (who combines
the roles of academic, civil servant, and IT practitioner) and Dr Stefan
Brands (an expert in privacy-enhancing technologies).   
   
Webcast of public panel and Q&A:   
http://webcast.oii.ox.ac.uk/?view=Webcast&ID=20070611_201   
   
OII Visitor Mary Rundle has been working with the technology and
international policymaking communities to consider how to design
personal data protections into computer code for digital identity
management. We asked:   
   
Ed: What does identity management mean in terms of the web?   
   
MR: You can think of the web as a place that has undergone a sort of
'urbanization', where bustling activity stimulates thinking and where
opportunities abound and present something for everyone -- but also
where vices creep and dangers lurk. The innocent trust prevailing at the
web's beginning has given way to a certain guardedness as people deal
with strangers who on the one hand may show them wonderful aspects of
life they'd never appreciated, or who on the other hand may be reckless
and unconcerned about long-term neighborliness and who may even set out
to deceive them. By offering a user-friendly way for parties to
authenticate and exchange necessary information about each other,
identity management aims to provide a sense of familiarity and the
confidence of reputation. The touted promise is that people will be able
to focus on the subject of their interaction and avoid the hassles of
having to prove who they are and how reliable they will be, and
meanwhile they will feel relatively secure against loss of personal
data, phishing and phraud. With increasing automation in web services,
the expectation is that electronic agents' using these identity
management tools will be able to transact on people's behalf, doing so
at lightning speeds.   
   
Ed: What problems are involved in identity management?   
   
MR: You can think of identity management as a way of lowering risk as
parties interact. While problems include questions like whether
technologies will actually succeed in achieving widespread acceptance,
the more fundamental ones for society include who should have access to
what kind of personal data, what constitutes proper treatment of this
data and how such treatment can be ensured, and, most importantly, who
should decide these matters.   
   
Ed: What has your work shown?   
   
MR: Different stakeholders have different interests. For example,
business enterprises see identity information as an investment and
resource for generating more products for society and profits for
themselves; governments view identity information as an input for
ensuring security and public safety and for providing better services to
the public; and individuals conceive of identity information as part of
their personhood and something they have an intrinsic right to control.
Meanwhile, different jurisdictions carry different legal requirements
that will affect the playing out of these interests. There needs to be
more dialogue, and fair information practices need to be factored into
law and technology.   
   
Ed: How does it relate to identity management from a governmental
perspective?   
   
MR: Governments have a responsibility to work for the public interest in
identity infrastructure. Governments will decide which identity systems
to use in providing government services and will choose to take a
hands-on or hands-off approach for society's uses of the tools. In these
decisions, governments can favor architectures that put individuals in
control of their personal data, or they can choose arrangements that
give control to other entities. They can promote competition in systems
as a check against abuse. They can promote awareness that security and
privacy go hand in hand.   
   
Ed: The UK 'surveillance society'...should we be concerned?   
   
MR: Basic architectural designs in an identity infrastructure can help
prevent the abuse of power. For example, systems can be structured to
have minimal disclosure and limited linkages in data exchanges, and they
can allow audits. Where government asserts a legitimate interest in
having access to information, an ombudsman can help ensure data is
treated properly. As always, accountability is key, and the challenge
here may be equipping the public with understanding in these early
decision-making stages for the identity infrastructure.   
   
Ed: Thankyou!   
   
Mary's biography:   
http://www.oii.ox.ac.uk/people/visitors.cfm?id=79   
   
[Note: A summary by Mary Rundle and Bill Dutton of a related OII
eIdentity workshop will be made available soon]   
   
   
--------------------------------------------------   
4. OXlab: 800 people now signed up!   
--------------------------------------------------   
   
800 people are now signed up for Social Science experiments run by the
Oxford eXperimental Laboratory (OXlab). Recent experiments analysed how
government information is accessed online and how bargaining behaviour
is affected by deadlines. The lab was set up earlier this year as an
effort to establish an experimental facility for the Social Sciences at
the University.   
   
OXlab:   
http://www.oii.ox.ac.uk/research/project.cfm?id=41   
   
Take part in the experiments!   
http://oxlab.oii.ox.ac.uk/public/   
   
   
--------------------------------------------------   
5. Events Diary   
--------------------------------------------------   
   
You can register for all OII events by emailing:   
mailto:[log in to unmask]   
   
Marketers, Audiences and Digital Media   
Speaker: Joseph Turow  (University of Pennsylvania)   
Focus: Exploring the industrial logic of marketers regarding digital
media, the ways they shape constructions of audiences (particularly,
recently, the idea of newfound 'audience power') and the profound
influence that is having in reshaping the entire media system.   
Date: Wed 27 June, 16:00 - 17:00 (OII Seminar Room)   
http://www.oii.ox.ac.uk/events/details.cfm?id=151   
   
Knowledge Ecosystems, Information Pollution, and Open-Source
Intelligence from the Bottom-Up   
Speaker: David Bray (OII Visiting Associate)   
Focus: Knowledge may rapidly lose its relevance in hyperturbulent
environments involving rapid changes in human systems (eg 9/11,
Hurricane Katrina): corporations and world governments increasingly
comprise globally distributed individuals who must exchange
time-sensitive knowledge to deal with these environments, increase
organizational adaptedness, and increase organizational survivability.

Date: Fri 29 June, 12:00 - 13:00 (OII Seminar Room)   
http://www.oii.ox.ac.uk/events/details.cfm?id=153   
   
Virtual Worlds, Virtual Economies, Virtual Institutions   
Speaker:  David Bray (OII Visiting Associate)   
Focus: Virtual worlds are now a reality. More than $45 million USD is
spent in Second Life monthly on virtual assets, with a UK government
panel suggesting the need to extend 'real world' legal protections to
virtual assets, while a US government panel says that taxation of
virtual assets is 'inevitable'.   
Date: Fri 27 July, 12:00 - 13:00 (OII Seminar Room)   
http://www.oii.ox.ac.uk/events/details.cfm?id=152   
   
Cyberintimacies/Cybersolitudes   
Speaker: Sherry Turkle (MIT)   
Focus: The emerging role of 'computational entities' (eg robots or
software agents) that present themselves as having states of mind that
are affected by their interactions with human beings. What is their
emerging role in our psychological, spiritual and moral lives? What
kinds of relationships are appropriate to have with machines? What is a
relationship?   
Date: Thurs 25 October, 17:00 - 18:30 (OII Seminar Room)   
http://www.oii.ox.ac.uk/events/details.cfm?id=150   
   
And for those who could not attend a particular event...the most recent
webcasts are:   
   
Identity Management:   
http://webcast.oii.ox.ac.uk/?view=Webcast&ID=20070611_201   
   
ONI Conference (filtering worldwide):   
http://webcast.oii.ox.ac.uk/?view=Webcast&ID=20070518_198   
   
Union Debate (Internet and democratization):    
http://webcast.oii.ox.ac.uk/index.cfm?view=Webcast&ID=20070518_189   
   
   
--------------------------------------------------   
6. Blog Bites   
--------------------------------------------------   
   
William Dutton:   
http://people.oii.ox.ac.uk/dutton/   
   
The conference served to reinforce the importance of one key mission of
our book  - to broaden awareness of e-research.   
   
An IV pole becomes a companion. A telephone line holds the world
together.   
   
The logo is absolutely wonderful. It is innovative, positive and capable
of supporting an infinite number of variations.   
   
Tobias Escher:   
http://people.oii.ox.ac.uk/escher/   
   
...a site called RateMyTeachers. These sites have come under fire as
teachers complain about cyber bullying: 'She is the worst person ever
and everyone hates her'.   
   
Most software 'only' generates pseudo random numbers which means that
ultimately the numbers are not really, well, random.   
   
...Martin Dimov has been hiding in the OII library for the last months
in order to research about differences between Bulgaria and the United
Kingdom in terms of ICT adoption.   
   
Malte Ziewitz:   
http://people.oii.ox.ac.uk/ziewitz/   
   
I like the notion of a 'shared space'. It sounds good and intuitively
seems to fit a lot of situations, in which people engage in risky
behavior and almost magically coordinate their actions to avoid some
harm.   
   
Blogosphere:    
http://people.oii.ox.ac.uk/   
   
   
--------------------------------------------------   
7. Student Diary   
--------------------------------------------------   
   
Friday of Eighth Week is but a recent memory -- and this will be the
last posting in the Student Diary until October, when a new intake of
DPhil students will be arriving at the Institute.   
   
Meanwhile, Tobias Escher will be presenting a paper at the conference
'Towards a Social Science of Web 2.0' (5-6th Sept, York), where he will
speak about methods for mining the wealth of data on social networking
sites like MySpace and Facebook. He will also discuss some results from
his ongoing DPhil project that aims to analyse the geography of online
social networks and how physical place effects social relations online.

   
http://www.eu.socialtext.net/socsciweb2conf/index.cgi?towards_a_social_s
cience_of_web_2_0   
   
   
--------------------------------------------------   
8. The Wizard of Oz   
--------------------------------------------------   
   
...and continuing on from the subject of identity, you may have noticed
that we have introduced photos on the OII website. You can now discover
the faces behind the voices at:   
   
Faculty:   
http://www.oii.ox.ac.uk/people/faculty.cfm   
   
Students:   
http://www.oii.ox.ac.uk/people/students.cfm   
   
Visitors:   
http://www.oii.ox.ac.uk/people/visitors.cfm   
   
Associates:   
http://www.oii.ox.ac.uk/people/researchassociates.cfm   
   
Support:   
http://www.oii.ox.ac.uk/people/supportstaff.cfm   
   
Enjoy!   
   
   
[Editor: David Sutcliffe]   
   
Oxford Internet Institute   
University of Oxford   
1 St Giles Oxford OX1 3JS   
United Kingdom   
Tel: +44 (0)1865 287210   
Fax: +44 (0)1865 287211   
Email: [log in to unmask]   
Web: http://www.oii.ox.ac.uk


------------------------------------------------------------
To subscribe, change email address or unsubscribe from the OII News
mailing list, please visit:
http://www.oii.ox.ac.uk/mailinglist/

FAQs are available at:
http://www.oii.ox.ac.uk/mailinglist/faqs.cfm

To keep improving the content of the newsletters we need to know what
you think! You can provide feedback by emailing:
mailto:[log in to unmask]

************************************************************************************
Distributed through Cyber-Society-Live [CSL]: CSL is a moderated discussion
list made up of people who are interested in the interdisciplinary academic
study of Cyber Society in all its manifestations.To join the list please visit:
http://www.jiscmail.ac.uk/lists/cyber-society-live.html
*************************************************************************************

Top of Message | Previous Page | Permalink

JiscMail Tools


RSS Feeds and Sharing


Advanced Options


Archives

April 2024
March 2024
February 2024
January 2024
December 2023
November 2023
October 2023
September 2023
August 2023
July 2023
June 2023
May 2023
April 2023
March 2023
February 2023
January 2023
December 2022
November 2022
October 2022
September 2022
August 2022
June 2022
May 2022
March 2022
February 2022
October 2021
July 2021
June 2021
April 2021
March 2021
February 2021
January 2021
December 2020
November 2020
October 2020
September 2020
July 2020
June 2020
May 2020
April 2020
February 2020
January 2020
December 2019
November 2019
October 2019
September 2019
August 2019
July 2019
June 2019
May 2019
March 2019
February 2019
January 2019
December 2018
November 2018
October 2018
September 2018
August 2018
July 2018
June 2018
May 2018
April 2018
March 2018
February 2018
January 2018
December 2017
November 2017
October 2017
September 2017
August 2017
July 2017
June 2017
May 2017
April 2017
March 2017
January 2017
December 2016
November 2016
October 2016
September 2016
August 2016
June 2016
May 2016
April 2016
March 2016
February 2016
January 2016
December 2015
November 2015
October 2015
September 2015
August 2015
July 2015
June 2015
May 2015
April 2015
March 2015
February 2015
January 2015
December 2014
November 2014
October 2014
September 2014
August 2014
June 2014
May 2014
April 2014
March 2014
February 2014
January 2014
December 2013
November 2013
October 2013
September 2013
August 2013
July 2013
June 2013
May 2013
April 2013
March 2013
February 2013
January 2013
December 2012
November 2012
October 2012
September 2012
August 2012
July 2012
June 2012
May 2012
April 2012
March 2012
February 2012
January 2012
December 2011
November 2011
October 2011
September 2011
July 2011
June 2011
May 2011
April 2011
March 2011
February 2011
January 2011
December 2010
November 2010
October 2010
September 2010
August 2010
July 2010
June 2010
May 2010
April 2010
March 2010
February 2010
January 2010
December 2009
November 2009
October 2009
September 2009
July 2009
June 2009
May 2009
April 2009
March 2009
February 2009
January 2009
December 2008
November 2008
October 2008
September 2008
June 2008
May 2008
April 2008
March 2008
February 2008
January 2008
December 2007
November 2007
October 2007
September 2007
June 2007
May 2007
April 2007
March 2007
February 2007
January 2007
2006
2005
2004
2003
2002
2001
2000


JiscMail is a Jisc service.

View our service policies at https://www.jiscmail.ac.uk/policyandsecurity/ and Jisc's privacy policy at https://www.jisc.ac.uk/website/privacy-notice

For help and support help@jisc.ac.uk

Secured by F-Secure Anti-Virus CataList Email List Search Powered by the LISTSERV Email List Manager