Spamming
Censorship
The practice of indiscriminately broadcasting messages over the
Internet
Electronic Mailbox Protection Act requires those sending spam to indicate the name of the sender prominently and include valid routing information.
Comprises 25% to 50% of all emails
Done via credit – debit cards details , telephone calls , emails , SMS
Solutions :Junk Mail filters , Automatic Junk mail deleters , URL blockers, Anti Spam legislation, do not spam list
Governmental attempts to control broadcasted material
Donham’s First Law of Censorship” “Most citizens are implacably opposed to censorship in any form—except censorship of whatever they personally happen to find offensive”
Children’s Online Protection Act (COPA)
Exemplifies the protective approach
Eg.companies verify viewer’s age before showing online material that is deemed
How Spamming Works:
How Censorship Works:
Case Study 1: Censorship
Google Rethinks China E-Commerce
In an attempt to capture the global eCommerce market, Google introduced a Chinese version of Google.com in 2000. Around the same time, the Chinese government was developing an Internet infrastructure that let them control the flow of information.
In early 2010, reports of cyber-attacks on Google’s web properties. The attacks were targeted at Chinese human rights activists’ .The information and sophistication led Google to come out strongly against the restrictions laid by the Chinese government. The company hinted at shutting down their operations in China if the censorship was not lifted.
Google announced in late 2010 in response to a Chinese-originated hacking attack on them and other US tech companies, they were no longer willing to censor searches in China and would pull out of the country completely if necessary and they pulled out.
However later Google started talking with several unspecified companies in preparation to