134,706 research outputs found

    Contested Sovereignties: States, Media Platforms, Peoples, and the Regulation of Media Content and Big Data in the Networked Society

    Get PDF
    This article examines the legal and normative foundations of media content regulation in the borderless networked society. We explore the extent to which internet undertakings should be subject to state regulation, in light of Canada’s ongoing debates and legislative reform. We bring a cross-disciplinary perspective (from the subject fields of law; communications studies, in particular McLuhan’s now classic probes; international relations; and technology studies) to enable both policy and language analysis. We apply the concept of sovereignty to states (national cultural and digital sovereignty), media platforms (transnational sovereignty), and citizens (autonomy and personal data sovereignty) to examine the competing dynamics and interests that need to be considered and mediated. While there is growing awareness of the tensions between state and transnational media platform powers, the relationship between media content regulation and the collection of viewers’ personal data is relatively less explored. We analyse how future media content regulation needs to fully account for personal data extraction practices by transnational platforms and other media content undertakings. We posit national cultural sovereignty—a constant unfinished process and framework connecting the local to the global—as the enduring force and justification of media content regulation in Canada. The exercise of state sovereignty may be applied not so much to secure strict territorial borders and centralized power over citizens but to act as a mediating power to promote and protect citizens’ individual and collective interests, locally and globally

    Cybersecurity policy and its implementation in Indonesia

    Get PDF
    The purpose of state defense is to protect and to save the integrity of the Unitary State of the Republic of Indonesia, the sovereignty of the state, as well as its security from all kinds of threats, whether they are military or non-military ones. One of the nonmilitary threats that potentially threatens the sovereignty and security of the nationstate is the misuse of technology and information in cyberspace. The threat of irresponsible cyber attacks can be initiated by both state and non-state actors. The actors may be an individual, a group of people, a faction, an organization, or even a country. Therefore, the government needs to anticipate cyber threats by formulating cyber security strategies and determining comprehensive steps to defend against cyber attacks; its types and the scale of counter-measures, as well as devising the rules of law

    The Posthuman Reality of Feed-Based Social Media Systems

    Get PDF
    The conceptual boundary between the subject and user parallels the boundary between humanist and posthumanist definitions of human being, and the challenges of new media communications technology today impel this evolution. My dissertation discusses subjectivity as the self-differentiation of a particular set of processes, and the influence of communications media upon this process. Here, it includes the basis of differentiation for an I, including: the question of identity, potential agency, and knowledge. The collage of attributes that constitute a portrait of what I call the user, the subject of online social media, is demonstrably emergent, dispersed, and discursive; in terms of agency and sovereignty, the useras with other instances of posthuman subjectivityis contingent upon its media ecology and is decidedly less free than other definitions of subjectivity (such the self-sovereign individual of the social contract, which comes to be as a negation of contingency). The concept of self-sovereignty excludes the influences of history, and other influences upon the emergence of the subject, emphasizing an exclusively internal causation. The users existence, conversely, is processual and dispersed throughout networks; its being and agency are dividual, not individual. The subjectivity of the user must thus be thought in terms of its mediated contingency, as the self-sovereign agency that is characteristic of humanist traditions is less applicable to todays media ecologies. I argue that the traits of the subject in humanist traditions can be interpreted as the epiphenomena of societies whose information ecology was dominated by logocentric, typographic literacy. Today, with the advent of social media and its users, we can understand from a new vantage how subjectivities are modulated, amplified, and attenuated by technical distributions, particularly the unseen (and unseeable) non-human agents in the computation systems that constitute online social networks

    The Legality of Using Drones to Unilaterally Monitor Atrocity Crimes

    Get PDF

    Always in control? Sovereign states in cyberspace

    Get PDF
    For well over twenty years, we have witnessed an intriguing debate about the nature of cyberspace. Used for everything from communication to commerce, it has transformed the way individuals and societies live. But how has it impacted the sovereignty of states? An initial wave of scholars argued that it had dramatically diminished centralised control by states, helped by a tidal wave of globalisation and freedom. These libertarian claims were considerable. More recently, a new wave of writing has argued that states have begun to recover control in cyberspace, focusing on either the police work of authoritarian regimes or the revelations of Edward Snowden. Both claims were wide of the mark. By contrast, this article argues that we have often misunderstood the materiality of cyberspace and its consequences for control. It not only challenges the libertarian narrative of freedom, it suggests that the anarchic imaginary of the Internet as a ‘Wild West’ was deliberately promoted by states in order to distract from the reality. The Internet, like previous forms of electronic connectivity, consists mostly of a physical infrastructure located in specific geographies and jurisdictions. Rather than circumscribing sovereignty, it has offered centralised authority new ways of conducting statecraft. Indeed, the Internet, high-speed computing, and voice recognition were all the result of security research by a single information hegemon and therefore it has always been in control

    The Prospector\u27s Guide to the Galaxy

    Get PDF

    Peeling Back the Onion of Cyber Espionage after Tallinn 2.0

    Get PDF
    Tallinn 2.0 represents an important advancement in the understanding of international law’s application to cyber operations below the threshold of force. Its provisions on cyber espionage will be instrumental to states in grappling with complex legal problems in the area of digital spying. The law of cyber espionage as outlined by Tallinn 2.0, however, is substantially based on rules that have evolved outside of the digital context, and there exist serious ambiguities and limitations in its framework. This Article will explore gaps in the legal structure and consider future options available to states in light of this underlying mismatch
    • …
    corecore