49,628 research outputs found

    The Evolving Landscape of Internet Control

    Get PDF
    Over the past two years, we have undertaken several studies at the Berkman Center designed to better understand the control of the Internet in less open societies. During the years we've been engaged in this research, we have seen many incidents that have highlighted the continuing role of the Internet as a battleground for political control, including partial or total Internet shutdowns in China, Iran, Egypt, Libya, and Syria; many hundreds of documented DDoS, hacking, and other cyber attacks against political sites; continued growth in the number of countries that filter the Internet; and dozens of well documented cases of on- and offline persecution of online dissidents. The energy dedicated to these battles for control of the Internet on both the government and dissident sides indicated, if nothing else, that both sides think that the Internet is a critical space for political action. In this paper, we offer an overview of our research in the context of these changes in the methods used to control online speech, and some thoughts on the challenges to online speech in the immediate future

    Syria’s relaxation of internet controls – has it made any difference? (guest blog)

    Get PDF
    In February, as uprisings swept the Middle East, Syria, the ‘enemy of the Internet’, lifted a five-year ban on some select social media websites – among them Facebook, YouTube and Blogspot. What difference has it made? Journalist Amanda Nunn, who lived in Syria until recently, reports on what her contacts there tell her

    Kebijakan Turki Terhadap Suriah Dalam Memerangi Kelompok Terorisme Isis (Islamic State Iraq and Syria) Tahun 2014

    Full text link
    This research purpose is to explins about the policy Turks against the government of Syria in the face of terrorist groups ISIS (Islamic State Iraq And Syria), an attack that emanated ISIS in the city Kobani, which is a town located on the border between the Turkish government and the government of Syria, attacks on this border makes Turkey should take development policy measures against Syria This research applying qualitative methods and library research,the Author used security theory of Barry Buzan with the level of the Nation Analysis with realish prespektive. The source of this research are from Of Book, Journals, Publications, Articles,News And Internet. The results of this research indicate that by working together between the government and ethnic Kurdish Syria make Turkey government refused to help Syria in dealing with terrorist groups ISIS because the Turkish government wants to maintain the stability of national security, political and social

    Entertaining Satan: Why We Tolerate Terrorist Incitement

    Get PDF
    Words are dangerous. That is why governments sometimes want to suppress speech. The law of free speech reflects a settled decision that, at the time that law was adopted, the dangers were worth tolerating. But people keep dreaming up nasty new things to do with speech. Recently, the Islamic State of Iraq and Syria (ISIS) and other terrorist organizations have employed a small army of Iagos on the internet to recruit new instruments of destruction. Some of what they have posted is protected speech under present First Amendment law. In response, scholars have suggested that there should be some new exception to the law of free speech. Thus far, no workable exception has been suggested

    Syrian Refugees and the Digital Passage to Europe: Smartphone Infrastructures and Affordances

    Get PDF
    This research examines the role of smartphones in refugees’ journeys. It traces the risks and possibilities afforded by smartphones for facilitating information, communication, and migration flows in the digital passage to Europe. For the Syrian and Iraqi refugee respondents in this France-based qualitative study, smartphones are lifelines, as important as water and food. They afford the planning, navigation, and documentation of journeys, enabling regular contact with family, friends, smugglers, and those who help them. However, refugees are simultaneously exposed to new forms of exploitation and surveillance with smartphones as migrations are financialised by smugglers and criminalized by European policies, and the digital passage is dependent on a contingent range of sociotechnical and material assemblages. Through an infrastructural lens, we capture the dialectical dynamics of opportunity and vulnerability, and the forms of resilience and solidarity, that arise as forced migration and digital connectivity coincide

    Effect of culture on acceptance of telemedicine in Middle Eastern countries: Case study of Jordan and Syria

    Get PDF
    © Mary Ann Liebert, INC.We investigated issues that affect the use and adoption of telemedicine in Middle Eastern countries, taking the Hashemite Kingdom of Jordan and the Syrian Arab Republic as case studies. Our study is based on interviews with key stakeholders (including doctors, technicians, engineers, and decision makers) and questionnaires administered to key stakeholders (including patients), ensuring opinion was gained from people from a full range of backgrounds and roles in the healthcare system. We found doctor and patient resistance was a major issue preventing the adoption of telemedicine in both countries, followed by poor infrastructure, lack of funding, and lack of information technology training. Our research identifies that culture is a greater issue than technical matters for the adoption of telemedicine in Middle Eastern countries. Based on our preliminary results we developed a guideline framework for each country that might be applied to telemedicine projects at the pre-implementation phase. The proposed guideline framework was validated through a return visit to the stakeholders and seeking further opinion

    Russia's Mid-East Role

    Full text link

    A Summary of the OpenNet Initiative's First Global Study of Internet Filtering

    Get PDF
    Finds that twenty-five out of forty-one countries surveyed block or filter Internet content, indicating a global trend towards Internet censorship

    Addressing Radicalisation into the Classroom - A New Approach to Teacher and Pupil Learning

    Get PDF
    This article examines one response to the UK Governments directive that radicalisation and extremism should be tackled in all UK secondary schools. The small scale study, which is set in the broader literature of teaching often difficult PHSE topics to young people in secondary school and also the use of simulations as tools for learning in the classroom, analyses the responses of teachers to being trained with and using ‘Zak’ a bespoke research based simulation on the radicalisation process. An analysis of the teacher’s’ responses indicated that it was recognised that the principales of adults manipulating children, whether for sexual gratification or radicalisation, are considered to be very important topics for staff working with young people in school settings to address. It was also recognised as to be a flexible learning tool which enabled various pathways to be explored with young people in lessons to explore and raise issues regarding many aspects of e- safety, not just radicalisation. Additionally, the teachers remarked that the social media ‘Facebook’ format of the simulation was appreciated by the young people and this appeal resulted in their immersion with it as a teaching aid. Also of significance was how the ‘Zak’ package was delivered into schools with the staff reporting that the inter-professional training delivered by specialist police trainers and the accompanying materials enhanced the learning and confidence of the teachers on this multi-faceted and complex topic
    • …
    corecore