Internet regulation has evolved from self-regulation to the criminalization of conduct to state control of information available, accessed and submitted. Criticism has been leveled at the different forms of state control and the methods employed to enforce state control. After the terrorist attack on the USA on 11 September 2001, governments justify Internet state control as a law enforcement and national security tool against the abuse and misuse of the Internet for the commission of serious crimes, such as phishing, child pornography; terrorism and copyright infringement. Some Internet users and civil rights groups perceive state control as an abomination which results in an unjustifiable infringement of civil rights. Since countries worl...
Terrorist and extremist movements have long exploited mass communications technology in pursuit of t...
Recent years have seen increasing pressure on Internet intermediaries that provide a platform for an...
In the introduction the author points out that widespread application of modern information technolo...
Internet regulation has evolved from self-regulation to the criminalization of conduct to state cont...
With the spread of modern means of technology among individuals in societies and the widespread use ...
Social, economic, and technological developments are widely accepted as powerful forces that affect ...
Both global governance and the sub-set of issues that may be termed 'internet governance' are vast a...
Reports on a new generation of Internet controls that establish a new normative terrain in which sur...
A result of the creation of the Internet is that the real world no longer is the only space in which...
The development of the internet and digital technologies represent a major opportunity for humanity ...
This paper shall focus on the transformative nature of technology, namely in facilitating criminal a...
Regulation of Internet Abstract The internet is today one of the most rapidly evolving technological...
Over the last decade, the Internet has transformed how information can be made available-it is now u...
Cybersecurity and Human Rights in the Age of Cyberveillance is a collection of articles by distingui...
With internet regulation and censorship on the rise, states increasingly engaging in online surveill...
Terrorist and extremist movements have long exploited mass communications technology in pursuit of t...
Recent years have seen increasing pressure on Internet intermediaries that provide a platform for an...
In the introduction the author points out that widespread application of modern information technolo...
Internet regulation has evolved from self-regulation to the criminalization of conduct to state cont...
With the spread of modern means of technology among individuals in societies and the widespread use ...
Social, economic, and technological developments are widely accepted as powerful forces that affect ...
Both global governance and the sub-set of issues that may be termed 'internet governance' are vast a...
Reports on a new generation of Internet controls that establish a new normative terrain in which sur...
A result of the creation of the Internet is that the real world no longer is the only space in which...
The development of the internet and digital technologies represent a major opportunity for humanity ...
This paper shall focus on the transformative nature of technology, namely in facilitating criminal a...
Regulation of Internet Abstract The internet is today one of the most rapidly evolving technological...
Over the last decade, the Internet has transformed how information can be made available-it is now u...
Cybersecurity and Human Rights in the Age of Cyberveillance is a collection of articles by distingui...
With internet regulation and censorship on the rise, states increasingly engaging in online surveill...
Terrorist and extremist movements have long exploited mass communications technology in pursuit of t...
Recent years have seen increasing pressure on Internet intermediaries that provide a platform for an...
In the introduction the author points out that widespread application of modern information technolo...