142 research outputs found

    Website blocking in the European Union: Network interference from the perspective of Open Internet

    Get PDF
    By establishing an infrastructure for monitoring and blocking networks in accordance with European Union (EU) law on preventive measures against the spread of information, EU member states have also made it easier to block websites and services and monitor information. While relevant studies have documented Internet censorship in non‐European countries, as well as the use of such infrastructures for political reasons, this study examines network interference practices such as website blocking against the backdrop of an almost complete lack of EU‐related research. Specifically, it performs and demonstrates an analysis for the total of 27 EU countries based on three different sources. They include first, tens of millions of historical network measurements collected in 2020 by Open Observatory of Network Interference volunteers from around the world; second, the publicly available blocking lists used by EU member states; and third, the reports issued by network regulators in each country from May 2020 to April 2021. Our results show that authorities issue multiple types of blocklists. Internet Service Providers limit access to different types and categories of websites and services. Such resources are sometimes blocked for unknown reasons and not included in any of the publicly available blocklists. The study concludes with the hurdles related to network measurements and the nontransparency from regulators regarding specifying website addresses in blocking activities.Peer Reviewe

    North Korea and Sino-Soviet Competition

    Get PDF

    Full Volume 84: International Law and Military Operations (2008)

    Get PDF

    Suspect Until Proven Guilty, a Problematization of State Dossier Systems via Two Case Studies: The United States and China

    Get PDF
    This dissertation problematizes the state dossier system (SDS): the production and accumulation of personal information on citizen subjects exceeding the reasonable bounds of risk management. SDS - comprising interconnecting subsystems of records and identification - damage individual autonomy and self-determination, impacting not only human rights, but also the viability of the social system. The research, a hybrid of case-study and cross-national comparison, was guided in part by a theoretical model of four primary SDS driving forces: technology, political economy, law and public sentiment. Data sources included government documents, academic texts, investigative journalism, NGO reports and industry white papers. The primary analytical instrument was the juxtaposition of two individual cases: the U.S. and China. Research found that constraints on the extent of the U.S. SDS today may not be significantly different from China\u27s, a system undergoing significant change amidst growing public interest in privacy and anonymity. Much activity within the U.S., such as the practice of suspicious activity reporting, is taking place outside the domain of federal privacy laws, while ID systems appear to advance and expand despite clear public opposition. Momentum for increasingly comprehensive SDS appears to be growing, in part because the harms may not be immediately evident to the data subjects. The future of SDS globally will depend on an informed and active public; law and policy will need to adjust to better regulate the production and storage of personal information. To that end, the dissertation offers a general model and linguistic toolkit for the further analysis of SDS

    The influence of Arab culture on Arab military effectiveness

    Get PDF
    Thesis (Ph. D.)--Massachusetts Institute of Technology, Dept. of Political Science, 1996.Includes bibliographical references (v. 2, p. 765-792).by Kenneth M. Pollack.Ph.D

    The Making of DĂ©tente

    Get PDF
    Originally published in 1995. In the early 1970s, largely as a result of the debilitating struggle in Vietnam, the United States began to reassess and redefine its basic approach to East-West relations. At the same time, the Soviet Union was awakening to the liabilities that a continuing and unregulated state of hostility would impose on its own internal and external agenda. Keith Nelson details the circumstances and traces the steps that led to the first significant accommodation and easing of tension between the superpowers during the Cold War. "In this important study, Keith Nelson explains the detente period in an imaginative, convincing, and impressively scholarly manner. Although there have been scores of books and memoirs on the subject, none have done the job quite like Nelson's. In particular, he has used post-glasnost Russian memoirs and monographs—and, especially, his own interviews with such key players as Dobrynin and Arbatov—to present one of the most intelligent Kremlinological studies I have ever seen." —Melvin Small, Wayne State Universit

    Red Perimeter Defeated: U.S. Naval Supremacy, Competitive Adaptation, and the Third Battle of the Atlantic, 1946-1981

    Get PDF
    This dissertation examines the long-term military competition between the U.S. and Soviet navies during 1946-81. It investigates the dynamics of naval posture change by integrating insights from military innovation theory with in-depth process tracing, thus providing a much-improved understanding of the Cold War at sea during the most decisive phases of the 'Third Battle of the Atlantic'

    Asian Yearbook of International Law, Volume 2 (1992)

    Get PDF
    The Asian Yearbook of International Law is a major refereed publication dedicated to international law issues as seen primarily from an Asian perspective. Readership: Academics and practitioners who deal with international public law in Asia will appreciate this unique, complete resource. The Asian Yearbook of International Law provides insight into Asian views and practices, especially for non-Asian readers, and also promotes the dissemination of knowledge of international law in Asia
    • 

    corecore