Internet Regulation, a New Approach: Outline of a System Formed to Be Controlled by the Internet Users
Internet Regulation, a New Approach: Outline of a System Formed to Be Controlled by the Internet Users
摘要
This paper describes an outline for the proper design of a Fair Internet Regulation System (FIRS), i.e., a system that will be implemented in a national level and encourage the participation of Internet users in enriching and correcting its "behavior". Authors aim to design a system that will be operated in some extent by the Internet users, and so it will be easier to be accepted by Western democracies willing to implement a fair Internet regulation policy. Last, the authors state the importance of using well-designed surveys prior to the implementation of FIRS, announce the launch of an online tool (WebObserver.net) and invite researchers to be part of this international effort.
参考文献27
-
1T.B. Lee, Design Issue for the World Wide Web, available online at: http://www.w3.org/DesignIssues/, 2010.
-
2Internet Censorship: Law & Policy around the World, available online at: http://www.efa.org.au/Issues/Censor/cens3.html#uk, 2008.
-
3Access Denied: The Practice and Policy of Global Internet Filtering, MIT Press, 2008.
-
4Web 2.0 Versus Control 2.0, available online at: http://en.rsf.org/web-2-O-versus-control-2-O- 18-03-201 O, 36697, 2010.
-
5GlobalScan Incordporeated, Four in five regard internet access as a fundamental right: global poll, BBC World Service, 2010.
-
6N. Koumartzis, A. Veglis, Greek Internet Regulation Survey, available online at: http://webobserver.net/?p=373, 2010.
-
7N. Koumartzis, BT's Cleanfeed and Online Censorship in UK: Improvements for a More Secure and Ethically Correct System, Ma Publishing, 2008, available online at: http://webobserver.neff?p=146.
-
8C.A. Depken, Who supports internet censorship?, First Monday 11 (2006).
-
9J. Blau, Report: more governments filter online content, ABC News / Technology, 2007.
-
10S. N. Hamade, Intemet Filtering and Censorship, in: Fifth International Conference on Information Technology: New Generations, IEEE, 2008.
-
1应对设计大纲[J].计算机光盘软件与应用(COMPUTER ARTS数码艺术),2006(7):102-109.
-
2程德杰.谁是中移动最大的敌人[J].现代计算机(中旬刊),2009(2):141-141.
-
3叶纯敏.物联网兴起:个人隐私及信息安全问题遭质疑[J].金融科技时代,2014,22(7):19-19.
-
4联通称针对中移动不对称监管措施将出台[J].IT时代周刊,2008,18(18):22-22.
-
5陈杰.专注数据技术ZRobot开挖金融行业数据金[J].中国科技财富,2016,0(11):56-57.
-
6叶纯青.监管之下的P2P风暴大洗牌[J].金融科技时代,2015,23(9):28-32.
-
7周光斌.浅谈境外不同的短信监管政策[J].重庆通信业,2010(1):63-64.
-
8靳生玺.2011年中小企业数据安全十大趋势[J].网管员世界,2011(3):7-7.
-
9段剑星.浅议商业银行非核心业务系统灾备建设[J].中国金融电脑,2014(7):46-48.
-
10胡海波.我国IDC市场监管政策逐步完善未来需做好信息安全保护工作[J].世界电信,2013(4):66-69.