How to Bypass Two Anonymity Revocation Schemes
PETS '08 Proceedings of the 8th international symposium on Privacy Enhancing Technologies
Proceedings of the 40th ACM technical symposium on Computer science education
Membership-concealing overlay networks
Proceedings of the 16th ACM conference on Computer and communications security
On the risks of serving whenever you surf: vulnerabilities in Tor's blocking resistance design
Proceedings of the 8th ACM workshop on Privacy in the electronic society
Communications of the ACM
A global empirical evaluation of new communication technology use and democratic tendency
ICTD'09 Proceedings of the 3rd international conference on Information and communication technologies and development
EMBER: a global perspective on extreme malicious behavior
Proceedings of the Seventh International Symposium on Visualization for Cyber Security
Fighting censorship with algorithms
FUN'10 Proceedings of the 5th international conference on Fun with algorithms
Identifying and resolving hidden text salting
IEEE Transactions on Information Forensics and Security
The role of ICT in cultivating innovation: the case of the UAE
Proceedings of the 4th International Conference on Theory and Practice of Electronic Governance
IDGD'11 Proceedings of the 4th international conference on Internationalization, design and global development
Fighting censorship with algorithms
XRDS: Crossroads, The ACM Magazine for Students - Computer Science in Service of Democracy
Struggling for open information environments: civil society initiatives for media policy change
Proceedings of the 2012 iConference
Dissent in numbers: making strong anonymity scale
OSDI'12 Proceedings of the 10th USENIX conference on Operating Systems Design and Implementation
Making sense of internet censorship: a new frontier for internet measurement
ACM SIGCOMM Computer Communication Review
Hi-index | 0.02 |
Many countries around the world block or filter Internet content, denying access to information--often about politics, but also relating to sexuality, culture, or religion--that they deem too sensitive for ordinary citizens. Access Denied documents and analyzes Internet filtering practices in over three dozen countries, offering the first rigorously conducted study of this accelerating trend. Internet filtering takes place in at least forty states worldwide including many countries in Asia and the Middle East and North Africa. Related Internet content control mechanisms are also in place in Canada, the United States and a cluster of countries in Europe. Drawing on a just-completed survey of global Internet filtering undertaken by the OpenNet Initiative (a collaboration of the Berkman Center for Internet and Society at Harvard Law School, the Citizen Lab at the University of Toronto, the Oxford Internet Institute at Oxford University, and the University of Cambridge) and relying on work by regional experts and an extensive network of researchers, Access Denied examines the political, legal, social, and cultural contexts of Internet filtering in these states from a variety of perspectives. Chapters discuss the mechanisms and politics of Internet filtering, the strengths and limitations of the technology that powers it, the relevance of international law, ethical considerations for corporations that supply states with the tools for blocking and filtering, and the implications of Internet filtering for activist communities that increasingly rely on Internet technologies for communicating their missions. Reports on Internet content regulation in forty different countries follow, with each country profile outlining the types of content blocked by category and documenting key findings. Contributors: Ross Anderson, Malcolm Birdling, Ronald Deibert, Robert Faris, Vesselina Haralampieva, Steven Murdoch, Helmi Noman, John Palfrey, Rafal Rohozinski, Mary Rundle, Nart Villeneuve, Stephanie Wang, and Jonathan Zittrain