Unit7: Presentation

Download Report

Transcript Unit7: Presentation

China’s Tech Generation Finds
New Chairman to Venerate
Lashawn Robinson
China’s Tech Generation Finds New
Chairman to Venerate
• Since the death of chairman Mao Zedoug, A new chairman
has come to represent Chinese youth, the chairman of
Microsoft Bill Gates.
• Bill gates has become the new idol of youths across China.
• Books by Microsoft's chairman are massive best sellers across
China.
• The Chinese edition of Gates The Road Ahead was one of the
most successful books in Chinese history.
• Gates has given $ 30 billion to bring computers and health
care to the rural areas of China.
China’s Tech Generation Finds New
Chairman to Venerate
• China’s internet population jumped by 23% to reach 130
million people in 2006, but nine – tenths of China’s 1.3 billion
citizens are still on the dark side of the digital age.
• Gates outlined his goal to extend internet access to beyond
the globes 1 billion online elite.
• The people of china feel that Gates should win The Nobel
Peace Prize.
• There was a survey done in the U.S that asked where the next
Bill Gates will come from. 60% of the U.S. said Asia.
• China believes that the clone of Gates will come from China.
Questions
•
T/F
•
China’s internet population jumped by 25% to reach 130 million
people in 2006, but nine – tenths of China’s 1.3 billion citizens are
still on the dark side of the digital age.
Answer: False (23%)
Who is the new Chairman of China?
A.
B.
C.
D.
President Obama
Donald Trump
Bill Gates
Bill Cosby
Answer: C (Bill Gates)
New Tech, Old Habits
Alyse Sexton
New Tech, Old Habits
• In these countries if your not in the office, your boss assumes
your not working. These places stress on the fun factor
because they are tired to their desk day and night. They also
fear that sending working home with their laptops could send
valuable information astray.
• Samsung Electronics and LG workers must get permission to
take laptops out of the office
• While cell phones now have web pages and can send emails,
getting into corporate networks is complicated. Yet employees
are still rarely aloud to leave the office with work.
New Tech, Old Habits (cont.)
• Despite fast wireless and broadband
networks. Korean and Japanese companies
aren’t getting the most out of technology.
• Why?
– Smart phones are viewed as toys more than tool.
– Companies worry that laptop-toting computers
could misplace sensitive data
New Tech, Old Habits (cont.)
• Studies show American trains are packed with
business people tapping their blackberries or
Treos, squeezing a few extra minutes into their
work days. In Tokyo or Seoul, commuters stare
intently at their cell phone screens, but they’re
usually playing games, watching video clips, or
sending pictures to friends. While U.S. carriers
companies fight to have the highest internet and
more efficient. Asian companies tend to stress
the fun factor.
Questions
• Why can’t workers take their work home in Asia?
1. Their boss is no fun
2. Employers don’t want information leaked out
3. Employers only want employees to work at the office
• True or false
Companies focus more on fun in the U.S. than
business service?
Iran’s Twitter Revolution? Maybe
Not Yet
By: Shaun Spreen
Summary
• People accused Twitter of being the cause of
riots in Moldova
• Riot caused because the supposed “front
runner” in the election lost.
Theory Disproven
• Most of the users “tweeting” about riots were
nowhere near Moldova
• Most effective planning is by word of mouth
or use of cell phones
Political Outcome
• Mousave was digital front runner.
– Magnified to the rest of the world because of social
network support
– Appealed to urban population (people with access to
twitter)
• Ahmadinejad had most rural support and used
news papers to campaign.
Quiz Time!!!
• Q:Which social networking site was said to
have been the “fuel to the fire” that was the
Moldova riots?
– Answer: Twitter
• T/F: Most of the riot planning was done using
Twitter.
– Answer: False
The List: Look Who’s Censoring
the Internet Now
Andrew Stoffel
Countries Using Censorship
• Countries other than China and Iran are
becoming known for censorship
– Australia, France, India, Argentina, South Korea
• Using new censorship laws to target most of the
major issues:
– Terrorism, child pornography, file-sharing, political
radicalism, celebrity dirt, propaganda
• Variety of things being targeted depending on the
country
What’s Being Targeted?
• Australia
– Focused on targeting child pornography and
terrorism.
– In 2009, a list of 2,935 sites were leaked by
anticensorship site Wikileaks and revealed things
such as online poker, Satanism, and euthanasia.
– Seemingly uncontroversial site Queensland
dentist’s office was also included
What’s Being Targeted? (cont.)
• France
– Targeting file-sharing
– Would deny access to the internet for those
repeatedly caught illegally downloading content
• South Korea
– Targeting North Korea propaganda
– Blocked as many as 120,000 sites from a
government blacklist
What’s Being Targeted? (cont.)
• India
– Targeting radicalism and terrorist tools
– Have shut down Hindu nationalist groups and
other radical groups on social networking sites
– Google Earth was targeted after 2008 Mumbai
terrorists were revealed using it. The motion was
ultimately thrown out.
What’s Being Targeted? (cont.)
• Argentina
– Targeting celebrity dirt
– A judge ruled in the favor of soccer legend Diego
Maradona and 70 other celebrities against Google
and Yahoo! for claiming their names were being
associated with pornography or libelous sites
– This is like suing a newspaper for its content
Questions
• T/F
– Queensland dentist’s office site was banned for
unknown reasons in Australia?
• How many sites are reportedly blocked in South
Korea?
A.
B.
C.
D.
3000
120,000
240,000
None of the above
Dissent Made Safer: How Anonymity
Technology Could Save Free Speech
on the Internet
By: David Talbot
Sarah Taylor
Tor
• Open-source Internet anonymity system--one of
several systems that encrypts data or hides the
accompanying Internet address, and route the data
to its final destination through intermediate
computers called proxies
• Makes it impossible to track who is actually using
the site
• Allows users in countries to speak or read freely
online
Neutral Nodes
• Tor uses address information to build a circuit of
encrypted connections through relays on the
network
• Tor began as military research ( US Naval
Research)
• IP addresses could be linked to physical locations
and the military did not want others to know
their location (for example hotels, and .gov)
Neutral Nodes Cont..
• Two men saw the potential of the program to help
web surfers privacy
• 1st public version for anyone who cared to install it,
although it was very technical
• Original goal was to provide tools for Americans
and Europeans to keep info safe from corporations
• 2006-Torbutton, turn Tor on and off easily (when
on computer runs very slow, when off much faster)
Global Spread
• Syria (Internet Repressor)
– Hunts down bloggers
• Tariq sentenced to prison for 3 years for dwindling the
national feeling
– Blocks many sites
• Facebook, YouTube, Skype
– Use Torbutton to access these sites or
anonymously post blogs
Global Spread Continued
• China
– Most sophisticated internet filterer of the world
– Block IP addresses, domain names and web pages
with certain key words
• Mauritania
– State censorship
– Nasser Weddady (now living in Boston) translated
Tor manual into Arabic
• Government stopped filtering (realized couldn’t disrupt
communication)
Bridging Tor’s Gaps
• Program is not perfect
– Tor publishes everything about its workings, including
the addresses of its relays. (Government could obtain
list of addresses and block)
– Also makes using internet slow (10 x longer)
– Biggest problem: only few have access to this tool
• Trying to create “bridge notes” a constantly changing list of
IP addresses through which people can reach main network
of relays
• Users let their computers serve as a bridge for others
– One last possible issue: could protect distributors of
child pornography
Questions
• Tor helps protect privacy by using government sites as
proxies or bridges. (True or False)
• Which country is know as the most sophisticated
internet filterer?
– A. United sates
– B. Mauritania
– C. Syria
– D. China