1 / 85

Week 3 - Blogs, Censorship , Pornography and Gambling

1. Week 3 - Blogs, Censorship , Pornography and Gambling. Comprehension Objectives. Describe the nature of Web 2.0 Blogs Definition of a blog? Types of blogs Typical features of a blog Characteristics of successful blogs Internet resources about blogging . Activity Objectives.

zamora
Télécharger la présentation

Week 3 - Blogs, Censorship , Pornography and Gambling

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. 1 Week 3 - Blogs, Censorship, Pornography and Gambling

  2. Comprehension Objectives • Describe the nature of Web 2.0 • Blogs • Definition of a blog? • Types of blogs • Typical features of a blog • Characteristics of successful blogs • Internet resources about blogging

  3. Activity Objectives • Plan a blog • Set up an account at Blogger.com and create, publish, and edit a blog • Create labels and add a category archive to a blog • Insert a poll onto a blog • Place a link list on a blog

  4. What Is Web 2.0? • Was there a Web 1.0? • How did Web 2.0 develop? • What’s the essence of Web 2.0? • Reliance upon users to create content, using • Social media and sharing sites • Wikis • Tags to categorize content (folksonomy)

  5. How Does Web 2.0 Make Money? • Heavy reliance upon advertising, but • Other methods possible, e.g. threadless

  6. Blogs Topic List Posts Archives Blogroll Subscription Links Comments

  7. Types of Blogs • Personal Blogs • Political Blogs • Social awareness Blogs • Media blogs • Corporate blogs

  8. Successful Blogs • Update frequently and stay on topic • Maintain a professional look • Be innovative • Connect with others • Become indexed

  9. Planning a Blog • What’s your Topic? • What will you call your blog? • What’s your URL? • How often will you post? • Will you accept comments/posts written by others?

  10. Setting Up A Blog • For personal sites, use a free host • Blogger (www.blogger.com) • WordPress (www.wordpress.com) • LiveJournal (www.livejournal.com) • Commercial sites may want more flexibility by using a paid site

  11. Use Blogger.com

  12. Name and Theme Your Blog

  13. Create Your First Post

  14. Edit Previous Posts

  15. Create Labels and a Category Archive

  16. Insert a Poll and Link List Add Gadget Brings Up This List

  17. Internet Resources That Educate People About Blogging • Daily Blog Tips • (www.dailyblogtips.com) • Tips for New Bloggers • (www.tips-for-new-bloggers.blogspot.com) • Blogging Tips • (www.bloggingtips.com) How often will you post? • YouTube Blogger Help (www.youtube.com/user/BloggerHelp)

  18. CENSORSHIP • What are the most censored networks in the World?

  19. Intensity of Internet Censorship Source: OpenNet Initiative(ONI)

  20. Advantages for society • Protection from dangerous concepts • Violence • pornography

  21. Advantages for gov’t • Control the public opinions • Stop collaboration of undesirables • Limit publics control of speech • Think what happened in the middle east?

  22. Negatives of online Censorship

  23. Negatives

  24. Negatives

  25. Negatives ----Cannot distinguish domestic situation. ----Can not learn more about other countries.

  26. Negatives • Tiananmen Square protests of 1989

  27. Negatives

  28. Censorship on the internet of China • No political discussion • The government screen sensitive topic • All information carried out by the government • The system moniter people’s talking

  29. Twitter,Facebook and Youtube in China

  30. The raise developing of use Weibo,Renren,QQ in China

  31. Theory • What is censorship? • What are the benefits? • What are the costs? • What are the relevant theories?

  32. Theory • What is censorship? • Spam Filters? • Mother turning off TV programs for kids?

  33. Theory • What are the benefits? • Stabilizing society? • Strengthening political power/vested interests? • Net safety? Limiting porn? Child protection?

  34. Theory • What are the costs? • Implementation costs • Type 1 errors (e.g. spam in your inbox) • Type 2 errors (e.g. “good” mail in your spambox)

  35. Technologies of Censorship • Commonly used technologies • IP blocking • TCP/IP packet filtering • TCP/IP content filtering • DNS filtering • HTTP proxy filtering • Denial of service

  36. Technologies of Censorship • The Blocking Techniques of the Great Firewall of China • Shielding the domain names as sensitive words • Shielding the IP of the domain names • Interfering with the DNS analysis

  37. Technologies of Censorship • Anti-Blocking Techniques • SSL encryption against the key words censorship • Escaping the IP shielding by changing IP for websites • The use of foreign DNS Lookup service • Use “Tor” to keep away from DNS interference

  38. Pornography and the net

  39. Statistics on the pornography industry • It is estimated that the porn industry is worth $57 billion. • This comprises of: Adult videos ($20 billion) • Escort Services ($11 billion) • Magazines ($ 7.5 billion) • Sex Clubs ($ 5 billion) • Phone Sex ($ 4.5 billion) • Cable & Pay Per View ($ 2.5 billion) • Internet ($ 2.5 billion) • The US porn industry generates more revenue then ABC, CBS and NBC networks put together (6.2 billion)

  40. Statistics on online pornography • Websites containing pornographic content make up for 12% of total websites, that is 4.2 million websites. • 25% of daily search engine requests are related to pornography. • 8% of emails sent daily contain pornographic content. • Gnutella (P2P application) has 116 thousand daily requests for child pornography. • In September 2003 more than 32 million individuals visited pornographic websites. • According to Dr. Weiss (2000) sex is the most searched topic on the Internet.

  41. What implications does this have on your organisation? • 30% of Web surfing is not work related. • 70% of pornography downloads occur between 9am-5pm (SexTracker) • 20% of employees examined by the Secure Computing Corporation (2005) visited pornographic websites while at work.

  42. Pornography by definition • What is pornography? • Is all content of a pornographic nature illegal?

  43. Pornography by definition • The word pornography has evolved considerably from the Greek language. In Late Greek the word 'pornographos' was used to describe writing about prostitutes and encounters with prostitutes (Dictionary.com 2004). • The Merriam Webster Dictionary of Law (1996) defines pornography as material that depicts erotic behaviour and is intended to cause sexual excitement. • The Webster New World Encyclopedia (1992) defines pornography as obscene literature, pictures, photos or films of no academic merit, intended only to arouse sexual desires.

  44. Pornography by definition • The Webster’s New World Encyclopedia and the Merrian Webster Dictionary of Law focus on different themes. • The Webster’s New World Encyclopedia focuses on “obscene” content which is the lowest form of pornography. • While the Merrian Webster Dictionary of Law focus on “erotic” content which is seen by some psychologists more acceptable form of pornography. • The problem is that there are many forms and definitions of pornography.

  45. Pornography as an online risk Access to pornography can pose the following problems for an organisation: • Legal liability • Loss of production to non-work related content • Loss of bandwidth.

  46. Pornography as an online risk 1. Legal liability Employees can be directly or indirectly liable for sexual harassment based on a hostile work environment. • Direct liability is classified when the employee’s supervisors sends pornographic content that is perceived to be offensive by the employee. • If the wrongful conduct is directed at the employer as he/she is responsible for the conduct of the supervisor (Overly 2002).

  47. Pornography as an online risk • Indirect liability results when the employer fails to restrict or correct activity that creates a hostile working environment. • This is commonly what happens to employer’s who do not have a content filtering solution as well as an effective acceptable use policy (AUP) in place. It is necessary to take the right steps to prevent such liability.

  48. Pornography as an online risk 2. Loss of productivity • Around 20% of employees view content of pornographic nature during work hours. • One in five men and one in eight women admitted to using their work’s Internet as the main channel for accessing sexually explicit material (Secure Computing Corporation 2005).

  49. Pornography as an online risk A survey conducted by Valt.com revealed how often employees used the corporate Internet facilities to surf non work related sites (Witzke 2002): • 34.9% claimed “a few times a week” • 38.1% claimed “a few times a day” • 14.6% claimed “I surf the Web constantly” • 12.4% claimed “never, that’s unethical”.

  50. Pornography as an online risk 3. Loss of bandwidth • In some organisations network surveys have found that P2P file sharing networks (containing pornography) have been responsible for consuming up to 80% of the bandwidth. • This can have a crippling effect on the networking resources.

More Related