Export your learner materials as an interactive game, a webpage, or FAQ style cheatsheet.
Unsaved Work Found!
It looks like you have unsaved work from a previous session. Would you like to restore it?
Total Categories: 6
Internet censorship is exclusively defined as the suppression of content hosted within a state's own borders.
Answer: False
The definition of internet censorship extends beyond content hosted solely within a state's borders, encompassing the control or suppression of information accessible, published, or viewed on the Internet, which may include resources located outside the censoring state's jurisdiction.
The internet's distributed nature poses no significant challenge to censors attempting to control information.
Answer: False
The distributed architecture of the internet presents a significant challenge to censors, particularly concerning information hosted outside their direct jurisdiction, necessitating complex technical interventions.
John Gilmore's 1993 perspective suggested that internet censorship was inherently difficult and the network would naturally circumvent it.
Answer: True
John Gilmore's early perspective posited that the internet's design inherently resisted censorship, suggesting it would naturally route around such impediments.
According to the source material, what is the fundamental definition of internet censorship?
Answer: The legal control or suppression of what can be accessed, published, or viewed on the Internet.
Internet censorship is fundamentally defined as the legal control or suppression of content accessible, published, or viewed on the Internet. This definition encompasses various forms of restriction imposed by authorities or entities.
What fundamental challenge does the internet's distributed nature present to censors?
Answer: It makes controlling information hosted outside their jurisdiction difficult.
The distributed architecture of the internet poses a significant challenge for censors, primarily by complicating the control of information hosted beyond their immediate geographical or legal jurisdiction.
Self-censorship is primarily motivated by a desire to increase online visibility.
Answer: False
Self-censorship is typically motivated by factors such as fear of legal repercussions, moral or religious considerations, or the desire to conform to societal norms, rather than a primary aim to increase online visibility.
Governments never use claims like copyright infringement or defamation as justifications for suppressing online content.
Answer: False
Governments and other entities frequently utilize claims such as copyright infringement, defamation, and obscenity as justifications for suppressing or removing online content.
Protecting existing economic interests is a recognized motive for implementing internet filtering.
Answer: True
Protecting established economic interests, such as blocking competing services or preserving market monopolies, is indeed a recognized motive for implementing internet filtering and censorship.
Internet controls are typically associated with democratic systems to ensure fair elections.
Answer: False
Pervasive internet controls and censorship are more commonly associated with authoritarian regimes, often employed to suppress dissent and maintain political power, rather than with democratic systems aiming for fair elections.
Content related to minority or religious groups challenging the ruling regime is rarely targeted for political censorship.
Answer: False
Content associated with minority or religious groups that challenge ruling regimes is frequently targeted for political censorship, alongside other politically sensitive topics.
Security concerns are never used as a justification for internet filtering.
Answer: False
Security concerns, such as blocking websites associated with extremist groups or protecting national infrastructure from cyber threats, are frequently cited as justifications for implementing internet filtering.
What is a common motivation for self-censorship mentioned in the text?
Answer: Fear of legal repercussions or other consequences.
Self-censorship is often motivated by apprehension regarding potential legal consequences, societal backlash, or other adverse outcomes associated with publishing certain information.
Which of the following is cited as a legal or quasi-legal justification used to suppress online content?
Answer: Copyright infringement claims.
Claims related to copyright infringement, defamation, and obscenity are frequently employed as legal or quasi-legal justifications for the suppression or removal of online content.
Which of the following is identified as a primary motive for internet filtering?
Answer: Protecting existing economic interests.
Protecting existing economic interests, such as safeguarding established industries from disruptive new online services, is recognized as a significant motive behind the implementation of internet filtering.
Internet controls and censorship are often associated with which type of political system?
Answer: Authoritarian regimes
Extensive internet controls and censorship are frequently characteristic of authoritarian regimes, where they are employed as tools to suppress dissent and maintain political stability.
Common security-related justifications for internet filtering include:
Answer: Blocking websites associated with insurgents, extremists, or terrorists.
Security concerns frequently serve as a justification for internet filtering, particularly in efforts to block access to websites linked to extremist ideologies or terrorist activities, thereby safeguarding national security.
Packet filtering involves inspecting data packets for specific keywords to block content.
Answer: True
Packet filtering is a technique used in internet censorship that involves inspecting data packets, particularly TCP packets, for specific keywords or patterns to determine whether to terminate the transmission.
Internet censorship enforcement can only occur at the Internet Service Provider (ISP) level.
Answer: False
Internet censorship enforcement can occur at multiple levels within a country's infrastructure, including ISPs, institutional networks, application service providers, and even individual devices.
IP address blocking is a censorship method that exclusively affects HTTP traffic.
Answer: False
IP address blocking can affect various IP-based protocols, not exclusively HTTP traffic. If a website shares an IP address with other services, blocking that IP can inadvertently affect unrelated content.
DNS filtering works by preventing the translation of domain names into IP addresses.
Answer: True
DNS filtering interferes with the Domain Name System resolution process, either by preventing the translation of domain names into IP addresses or by redirecting the request to an incorrect IP address.
URL filtering relies on blocking specific IP addresses associated with undesirable websites.
Answer: False
URL filtering operates by scanning the Uniform Resource Locator (URL) string for specific keywords, irrespective of the associated IP address. Blocking IP addresses is a distinct censorship method.
A connection reset in censorship involves sending packets to terminate a TCP connection when specific content is detected.
Answer: True
A connection reset is a censorship technique where a firewall intercepts traffic, detects specific content, and sends TCP reset packets to terminate the connection between the user and the server.
Network disconnection is a complex censorship method requiring sophisticated technical infrastructure.
Answer: False
Network disconnection, such as shutting down routers or unplugging cables, is a relatively straightforward censorship method that does not necessarily require highly sophisticated technical infrastructure.
Over-blocking occurs when censorship fails to block all intended content.
Answer: False
Over-blocking refers to censorship measures that inadvertently block legitimate or permissible content in addition to the targeted material. The failure to block all intended content is termed under-blocking.
'Over-blocking' refers to censorship measures failing to block all targeted content.
Answer: False
Over-blocking describes censorship that blocks more content than intended, including legitimate material. The failure to block all targeted content is known as under-blocking.
Which technical method involves interfering with the Domain Name System (DNS) resolution process?
Answer: DNS filtering and redirection
DNS filtering and redirection directly interfere with the Domain Name System (DNS) resolution process, either by preventing domain name translation or by redirecting users to unintended IP addresses.
Enforcement of internet censorship technologies can occur at multiple levels. Which of the following is NOT mentioned as a level of enforcement?
Answer: International Telecommunication Union (ITU) headquarters
While enforcement occurs at levels such as ISPs, individual devices, and application service providers, the ITU headquarters is an international body and not a direct enforcement point for national censorship technologies.
What is the primary mechanism of IP address blocking as a censorship method?
Answer: Denying access to a specific IP address.
IP address blocking functions by denying network access to a particular IP address, thereby preventing communication with any services hosted at that address.
How does URL filtering work?
Answer: By scanning Uniform Resource Locator (URL) strings for keywords.
URL filtering operates by examining the Uniform Resource Locator (URL) string for specific keywords or patterns to determine whether to permit or block access to the requested resource.
What happens during a 'connection reset' in the context of internet censorship?
Answer: A firewall blocks a TCP connection and sends reset packets.
During a connection reset in censorship, a firewall interrupts a TCP connection and transmits reset packets to both endpoints, effectively terminating the communication session.
Which of the following is a method of network disconnection used for censorship?
Answer: Physically turning off internet routers.
Physically disabling or shutting down internet routers is a direct method of network disconnection employed for censorship purposes.
What is 'under-blocking' in the context of internet censorship?
Answer: Blocking only a small portion of the intended content.
Under-blocking refers to the situation where censorship measures are insufficient and fail to block all of the content that was intended to be restricted.
Schools and libraries may implement content restrictions, viewing these actions as ethical rather than censorship.
Answer: True
Institutions such as schools and libraries may implement content restrictions, often framing these actions as ethical measures to protect users or maintain an appropriate environment, rather than as censorship.
Portal censorship and search result removal make websites more visible to users.
Answer: False
Portal censorship and the removal of websites from search engine results render those sites less visible, often making them effectively invisible to users who are unaware of their existence.
Denial-of-service (DoS) attacks are primarily used by state actors to permanently block websites.
Answer: False
Denial-of-service (DoS) attacks are typically used to disrupt services temporarily by overwhelming a target system, and they are not exclusively employed by state actors nor are they primarily for permanent website blocking.
Commercial filtering software is exclusively used for personal use and never by governments for censorship.
Answer: False
Commercial filtering software is utilized by governments for censorship purposes, in addition to personal use. Vendors sell these products globally, which can be repurposed for state-sponsored content control.
Concerns about commercial filtering software vendors include their potential complicity with repressive governments.
Answer: True
A significant concern regarding commercial filtering software vendors is their potential complicity in censorship through the sale of their products to repressive regimes, thereby enabling state control over information.
Non-technical censorship methods only involve enacting laws and regulations.
Answer: False
Non-technical censorship methods encompass a broader range of actions beyond laws and regulations, including threats, confiscation of equipment, arrests, and physical intimidation of publishers and service providers.
Deplatforming involves suspending or banning controversial speakers or their content from online platforms.
Answer: True
Deplatforming is a form of internet censorship where individuals or content deemed controversial are removed or banned from online platforms, services, or payment processors.
'Financial deplatforming' refers to the denial of banking services to controversial individuals or organizations.
Answer: True
Financial deplatforming describes the practice of denying essential banking and financial services to individuals or organizations, thereby restricting their ability to conduct transactions.
Terms of Service agreements typically grant web operators very limited power to remove content.
Answer: False
Terms of Service agreements commonly include clauses, such as 'at our sole discretion,' which grant web operators significant latitude and broad power to remove content or terminate user accounts.
Wikipedia strictly prohibits any editor from modifying or deleting content on its platform.
Answer: False
Wikipedia's collaborative editing model allows any editor to modify or delete content as part of its standard operational procedures, subject to community guidelines and administrator oversight.
'Social filtering' involves censoring topics that contradict accepted societal norms.
Answer: True
Social filtering refers to the practice of censoring topics or content that are deemed to contradict or challenge widely accepted societal norms, often including material related to hate speech, pornography, or blasphemy.
Commercial filtering software vendors can be involved in censorship by selling tools to governments.
Answer: True
Commercial filtering software vendors play a role in global internet censorship by supplying tools that governments can utilize for content control and surveillance purposes.
Non-technical censorship methods include confiscation of equipment and threats against publishers.
Answer: True
Non-technical censorship encompasses a range of coercive measures, including the confiscation of publishing equipment and the use of threats or intimidation against individuals involved in content creation or dissemination.
Which of the following entities might implement internet access restrictions, and view them as ethical behavior rather than censorship?
Answer: Schools and libraries.
Institutions such as schools and libraries may implement content restrictions, often framing these actions as ethical measures to protect users or maintain an appropriate environment, rather than as censorship.
Portal censorship and search result removal primarily impact a website by:
Answer: Making it invisible to users unaware of its existence.
Portal censorship and search result removal significantly reduce a website's visibility, effectively making it inaccessible to users who do not already know of its existence.
Denial-of-service (DoS) attacks can be used in relation to censorship by:
Answer: Overwhelming a target system to disrupt services and limit access.
Denial-of-service (DoS) attacks can be employed in censorship efforts by overwhelming target systems, thereby disrupting services and limiting user access to online platforms or websites.
Commercial filtering software vendors have faced concerns regarding:
Answer: Potential complicity in censorship by selling to repressive regimes.
Concerns have been raised that commercial filtering software vendors may facilitate censorship by selling their products to authoritarian governments, thereby potentially enabling human rights violations.
Which of the following is an example of a non-technical method of internet censorship?
Answer: Arresting or prosecuting publishers
Arresting or prosecuting individuals involved in publishing online content is a non-technical method of censorship, distinct from technical measures like DNS spoofing, packet filtering, or IP address blocking.
What is 'deplatforming' as described in the article?
Answer: Suspending or banning controversial speakers from online platforms.
Deplatforming refers to the practice of removing or banning individuals or their content from online platforms, often justified by terms of service violations related to hate speech or harmful content.
The phrase 'at our sole discretion' found in Terms of Service agreements typically grants web operators:
Answer: Broad rights regarding content removal.
The inclusion of phrases like 'at our sole discretion' in Terms of Service agreements typically confers broad authority upon web operators to manage content and user accounts with significant autonomy.
How does Wikipedia handle content removal?
Answer: Any editor can modify or delete content as part of the normal editing process.
Wikipedia operates on a collaborative model where content modification and deletion are integral parts of the editing process, accessible to any registered editor, subject to community consensus and policies.
What does 'social filtering' refer to in the context of internet censorship?
Answer: Censorship of topics considered antithetical to accepted societal norms.
Social filtering denotes the censorship of topics or content that are perceived to conflict with established societal norms, often including material related to hate speech, obscenity, or blasphemy.
Which types of network tools and applications are frequently targeted for censorship?
Answer: Media sharing sites and social networks.
Platforms facilitating user-generated content and social interaction, such as media sharing sites and social networks, are frequently targeted for censorship due to their potential for disseminating information and organizing activities.
What role do commercial filtering software vendors play in global internet censorship?
Answer: They sell products that can be used by governments for censorship.
Commercial filtering software vendors contribute to global internet censorship by marketing and selling products that governments can employ for content control and surveillance.
In 2014, approximately 400 million people were estimated to use VPNs primarily for enhancing online privacy.
Answer: True
Data from around 2014 suggests that over 400 million individuals utilized Virtual Private Networks (VPNs), often for the dual purposes of circumventing internet censorship and enhancing their online privacy.
Internet censorship circumvention aims to remove content entirely, not just bypass access restrictions.
Answer: False
Internet censorship circumvention primarily focuses on bypassing access restrictions to reach censored content, rather than aiming for the complete removal of the content itself.
Using VPNs and proxy websites are common methods for circumventing internet censorship.
Answer: True
Virtual Private Networks (VPNs) and proxy websites are widely recognized and commonly employed tools for circumventing internet censorship measures and accessing restricted content.
Using circumvention methods to bypass internet censorship carries no legal risks for users.
Answer: False
Engaging in internet censorship circumvention can carry significant legal risks in certain jurisdictions, potentially leading to penalties such as fines, imprisonment, or other forms of reprisal if users are found to be violating local laws.
The widespread adoption of HTTPS has made internet censorship completely ineffective.
Answer: False
While HTTPS encryption limits the ability of censors to inspect the content of traffic, it does not render censorship completely ineffective. Domain names often remain visible, allowing for domain-level blocking, and other censorship methods persist.
User resilience against censorship is primarily determined by the speed of their internet connection.
Answer: False
User resilience against censorship is influenced more by factors such as awareness of information manipulation, the demand for uncensored content, and the ability to afford circumvention tools, rather than solely by internet connection speed.
'Sneakernet' refers to using encrypted tunnels to bypass internet censorship.
Answer: False
'Sneakernet' is a method of circumventing censorship that involves the physical transfer of data via removable media (e.g., USB drives), distinct from using encrypted tunnels like VPNs.
HTTPS encryption completely prevents censors from identifying the websites users visit.
Answer: False
While HTTPS encryption obscures the content of internet traffic, it does not completely prevent censors from identifying visited websites, as the domain name is often still visible during the TLS handshake, allowing for domain-level filtering.
What was the estimated number of people using VPNs around 2014 for censorship circumvention or privacy?
Answer: Over 400 million
Global data from approximately 2014 estimated that more than 400 million individuals were utilizing VPNs, often for purposes of bypassing internet censorship or enhancing online privacy.
What is the main challenge posed by internet censorship circumvention to censors?
Answer: It allows users to regain access as long as an uncensored system exists.
The primary challenge for censors posed by circumvention techniques is that they enable users to regain access to restricted information, provided that alternative, uncensored pathways or systems remain available.
Which of the following is a common tool used for circumventing internet censorship?
Answer: Virtual Private Networks (VPNs)
Virtual Private Networks (VPNs) are widely employed as common tools to circumvent internet censorship by encrypting traffic and routing it through servers in different locations.
What risk might users face when using circumvention methods to bypass internet censorship?
Answer: Potential violation of local laws and subsequent punishment.
Utilizing circumvention methods to bypass internet censorship can expose users to legal risks, potentially leading to penalties if such actions contravene local legislation.
How has the increased use of HTTPS affected internet censorship?
Answer: It obscures the content of traffic, limiting keyword-based filtering, but domain names may remain visible.
HTTPS encryption hinders censors' ability to inspect traffic content, thereby limiting keyword-based filtering. However, domain names often remain visible, allowing for domain-level blocking strategies.
What factor influences user resilience against censorship attempts, according to the source?
Answer: Awareness that information is being manipulated.
Awareness of information manipulation is a key factor influencing user resilience against censorship, potentially motivating users to seek out alternative information sources and employ circumvention strategies.
What is 'sneakernet' in the context of circumventing internet censorship?
Answer: The physical transfer of data via removable media.
'Sneakernet' refers to the method of transferring data physically, typically using removable media like USB drives, as a means to bypass internet censorship or access restricted information.
How does the use of HTTPS impact internet censorship techniques?
Answer: It obscures the content of traffic, limiting keyword-based filtering, but domain names may remain visible.
HTTPS encryption enhances user privacy by obscuring traffic content, thereby limiting the effectiveness of keyword-based filtering. However, domain name visibility can still permit certain forms of censorship.
The extent of internet censorship is uniform across all countries globally.
Answer: False
The extent of internet censorship varies significantly across the globe, ranging from moderate restrictions in some nations to severe limitations in others.
A 2012 Internet Society survey found that a significant majority of respondents believed internet access should be a basic human right.
Answer: True
The 2012 Internet Society survey indicated that a substantial majority of respondents (83%) affirmed the belief that internet access should be recognized as a basic human right.
The 'right to be forgotten' allows individuals to permanently erase any mention of themselves online.
Answer: False
The 'right to be forgotten,' particularly as interpreted in the EU, allows individuals to request the removal of links to certain personal information from search engine results under specific conditions, but it does not grant the power to permanently erase all online mentions.
State-mandated internet filtering is most commonly found in East Asia, Central Asia, and the Middle East/North Africa regions.
Answer: True
State-mandated internet filtering is indeed most prevalent in regions such as East Asia, Central Asia, and the Middle East/North Africa, although it is also practiced in varying degrees in other parts of the world.
In France and Germany, content related to Nazism or Holocaust denial is typically blocked due to specific laws.
Answer: True
France and Germany have specific legal frameworks that mandate the blocking of content related to Nazism and Holocaust denial.
The 'splinternet' concept describes the unified and globally consistent nature of the internet.
Answer: False
The 'splinternet' concept refers to the fragmentation of the global internet into distinct national or regional networks, often due to differing censorship policies and national firewalls, rather than its unified nature.
'Rivercrab' is a formal term used in international law to describe internet censorship.
Answer: False
'Rivercrab' is a colloquial or slang term, particularly used in Asia, referring to the act of censoring the internet, not a formal legal term.
South Korea's Telecommunications Business Act (TBA) was the world's first internet censorship law.
Answer: True
The Telecommunications Business Act (TBA) passed by South Korea is noted as the world's first piece of legislation specifically addressing internet censorship.
The OpenNet Initiative (ONI) reported in 2009 that internet filtering was documented in fewer than twenty countries.
Answer: False
By 2009, the OpenNet Initiative (ONI) documented internet filtering in over forty countries, indicating a widespread practice rather than limited to fewer than twenty.
Freedom House's 'Freedom on the Net' reports assess internet freedom by rating countries based on content limitations and user rights violations.
Answer: True
The 'Freedom on the Net' reports by Freedom House provide comprehensive assessments of internet freedom globally, evaluating countries based on criteria including obstacles to access, content limitations, and violations of user rights.
Reporters Without Borders (RSF) designates countries as 'Enemies of the Internet' solely for practicing general online surveillance.
Answer: False
Reporters Without Borders (RSF) designates countries as 'Enemies of the Internet' not solely for online surveillance, but for systematic repression of internet users and grave violations of freedom of information, which often includes censorship beyond mere surveillance.
In March 2013, Reporters Without Borders identified China, Iran, Syria, Vietnam, and North Korea as 'State Enemies of the Internet'.
Answer: False
In March 2013, Reporters Without Borders identified Bahrain, China, Iran, Syria, and Vietnam as 'State Enemies of the Internet,' not North Korea.
The V-Dem Digital Societies Project measures aspects like disinformation and state regulation of digital media.
Answer: True
The V-Dem Digital Societies Project is an annual initiative that quantifies various dimensions of internet censorship, including the prevalence of disinformation and the extent of state regulation over digital media.
The #KeepItOn project tracks and advocates against internet shutdowns and blockages.
Answer: True
The #KeepItOn project, maintained by Access Now, actively monitors and advocates against the implementation of internet shutdowns, throttling, and other forms of network blockages worldwide.
A 2010 BBC World Service poll indicated that most internet users globally viewed the internet as a force for restriction.
Answer: False
A 2010 BBC World Service poll found that the majority of global internet users perceived the internet as a force for good and freedom, not restriction.
The 2012 Internet Society survey revealed a strong consensus that the internet should never be governed.
Answer: False
The 2012 Internet Society survey indicated that a majority of users (82%) agreed the internet should be governed to protect the community, contrary to the notion that it should never be governed.
Lack of transparency regarding government filtering activities makes it difficult to understand the extent of censorship.
Answer: True
The opacity surrounding government filtering practices, often involving misleading error messages or justifications, significantly hinders the ability to ascertain the true scope and nature of internet censorship.
The Arab Spring uprisings led to a decrease in internet censorship globally.
Answer: False
The Arab Spring uprisings, characterized by extensive internet use for mobilization, paradoxically led to an increase in internet censorship and shutdowns in several countries, although some nations did subsequently reduce their censorship levels.
Egypt's 2011 internet block involved shutting down approximately 3500 Border Gateway Protocol (BGP) routes.
Answer: True
During the 2011 Egyptian revolution, the government implemented a significant internet block by disabling approximately 3500 Border Gateway Protocol (BGP) routes, effectively isolating large portions of the country's network.
During Russia's 2022 invasion of Ukraine, the government blocked access to Telegram and WhatsApp.
Answer: False
Reports indicate that during Russia's 2022 invasion of Ukraine, access to platforms like Twitter and Facebook was blocked or restricted, while Telegram and WhatsApp remained accessible, though VPN usage increased to bypass restrictions.
The 'Great Firewall' is a term associated with the internet censorship system in the United States.
Answer: False
The 'Great Firewall' is the widely recognized colloquial term for the extensive internet censorship and surveillance system implemented in the People's Republic of China.
The OpenNet Initiative (ONI) focused on promoting internet freedom globally.
Answer: False
The OpenNet Initiative (ONI) was primarily focused on monitoring and reporting on internet filtering and surveillance practices worldwide, rather than actively promoting internet freedom.
The 'Online Survival Kit' is a resource provided by Reporters Without Borders to help users bypass censorship.
Answer: True
The 'Online Survival Kit' is indeed a resource developed by Reporters Without Borders as part of their efforts to equip users with knowledge and tools to navigate and circumvent internet censorship.
RFC 9505 is a document detailing technical methods used globally for internet censorship.
Answer: True
RFC 9505, titled 'A Survey of Worldwide Censorship Techniques,' serves as a technical document that outlines the various methods employed globally for internet censorship.
The 'splinternet' concept describes the fragmentation of the internet into national or regional networks.
Answer: True
The 'splinternet' concept posits that the global internet is increasingly fragmenting into separate national or regional networks, often as a consequence of national firewalls and censorship policies.
The term 'rivercrab' is slang used in Asia for the act of censoring the internet.
Answer: True
'Rivercrab' is indeed internet slang, particularly prevalent in Asia, used colloquially to refer to the act of censoring internet content.
The primary goal of the #KeepItOn project is to promote internet shutdowns for national security.
Answer: False
The #KeepItOn project's primary objective is to advocate against internet shutdowns and blockages, aiming to protect internet access and freedom of expression, not to promote shutdowns for national security.
Reporters Without Borders (RSF) helps understand internet censorship by publishing lists of 'Enemies of the Internet'.
Answer: True
Reporters Without Borders (RSF) contributes to the understanding of internet censorship by publishing influential lists, such as 'Enemies of the Internet,' which highlight countries engaging in severe repression of online freedom.
The EU's 'right to be forgotten' requires search engines to remove any legally published information upon request.
Answer: False
The EU's 'right to be forgotten' does not mandate the removal of all legally published information; rather, it allows individuals to request the delisting of search engine results containing outdated, irrelevant, or excessive personal data under specific legal conditions.
How does the article describe the variation in internet censorship globally?
Answer: The extent varies significantly, from moderate to severe limitations.
The degree of internet censorship is highly variable across nations, ranging from moderate levels of control to severe restrictions on access and expression.
What did a 2012 Internet Society survey reveal about user attitudes towards the internet?
Answer: A majority agreed that censorship should exist in some form online.
The 2012 Internet Society survey indicated that while a majority believed internet access should be a human right, a significant portion also agreed that some form of censorship should be present online.
The 'right to be forgotten' ruling by the European Court of Justice primarily placed responsibility on:
Answer: Search engines to comply with data privacy laws regarding linked information.
The European Court of Justice ruling on the 'right to be forgotten' primarily assigned responsibility to search engines to manage requests for the removal of links to personal information, aligning with data privacy regulations.
Which regions are most associated with state-mandated internet filtering?
Answer: East Asia, Central Asia, and the Middle East/North Africa.
State-mandated internet filtering is predominantly observed in regions including East Asia, Central Asia, and the Middle East/North Africa, although it is not exclusive to these areas.
In France and Germany, specific laws commonly lead to the blocking of what type of content?
Answer: Content related to Nazism or Holocaust denial.
Specific legislation in France and Germany mandates the blocking of content pertaining to Nazism and Holocaust denial due to historical and legal sensitivities within those nations.
The term 'splinternet' refers to:
Answer: The fragmentation of the internet into national or regional networks.
The 'splinternet' concept describes the phenomenon of the global internet fragmenting into distinct national or regional networks, often influenced by censorship policies and national firewalls.
What is the colloquial meaning of 'rivercrab' in the context of internet censorship?
Answer: The act of censoring the internet.
In colloquial usage, particularly within Asian internet communities, 'rivercrab' is slang referring to the act of censoring internet content.
What did the OpenNet Initiative report regarding internet filtering levels in various countries by 2009?
Answer: Filtering was documented in over 40 countries.
By 2009, the OpenNet Initiative had documented the practice of internet filtering in more than forty countries worldwide, indicating its widespread nature.
What is the purpose of the 'Freedom on the Net' reports published by Freedom House?
Answer: To rate countries based on their internet freedom, including content limits and user rights.
The 'Freedom on the Net' reports by Freedom House aim to assess and rate global internet freedom by evaluating factors such as access obstacles, content limitations, and user rights violations within various countries.
Reporters Without Borders (RSF) designates a country as an 'Enemy of the Internet' if its government:
Answer: Engages in systematic repression of internet users and violates freedom of information.
Reporters Without Borders designates a country as an 'Enemy of the Internet' when its government systematically represses internet users and infringes upon freedom of information, extending beyond mere censorship of news.
Which of the following was identified by Reporters Without Borders in March 2013 as a 'State Enemy of the Internet'?
Answer: Bahrain
In March 2013, Reporters Without Borders identified Bahrain among the 'State Enemies of the Internet' due to its government's systematic repression of online users and violations of freedom of information.
What does the V-Dem Digital Societies Project measure annually?
Answer: Various aspects of internet censorship, including disinformation and shutdowns.
The V-Dem Digital Societies Project annually measures diverse facets of internet censorship, encompassing disinformation campaigns, digital media freedom, state regulation, and the occurrence of internet shutdowns.
What key finding emerged from a 2010 BBC World Service global opinion poll regarding the internet?
Answer: The internet was viewed by most users as a force for good and freedom.
A 2010 BBC World Service poll revealed that the majority of global internet users perceived the internet primarily as a positive force for good and freedom, rather than a source of restriction.
How did the Arab Spring uprisings influence internet censorship practices, according to the source?
Answer: It resulted in increased censorship, including internet shutdowns.
The extensive use of the internet during the Arab Spring uprisings led to heightened censorship measures in several countries, including the implementation of internet shutdowns, as authorities sought to control information flow.
What technical measure did Egypt employ during the 2011 revolution to block internet access?
Answer: Shutting down approximately 3500 Border Gateway Protocol (BGP) routes.
During the 2011 Egyptian revolution, the government implemented a broad internet block by disabling approximately 3500 Border Gateway Protocol (BGP) routes, effectively disconnecting large segments of the country's network.
What is the 'splinternet' concept related to?
Answer: The fragmentation of the internet into national or regional networks.
The 'splinternet' concept describes the trend of the global internet fragmenting into separate national or regional networks, often driven by censorship policies and differing regulatory environments.