Analyzing Internet Censorship Papers
VerifiedAdded on 2020/02/19
|16
|3596
|190
AI Summary
This assignment requires a critical analysis of two research papers dealing with internet censorship. The first paper examines the fundamental concepts and challenges of internet censorship, while the second focuses on network security within the context of censorship and the influence of social media on circumventing these restrictions. The analysis should highlight key findings, arguments, and implications presented in each paper.
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.
Running head: INTRODUCTION TO RESEARCH
Introduction to Research
Name of the Student
Name of the University
Author’s Note
Introduction to Research
Name of the Student
Name of the University
Author’s Note
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
1
INTRODUCTION TO RESEARCH
Table of Contents
1.1 Broad Scan............................................................................................................................2
1.1.1 Research Journal.....................................................................................................................2
1.1.2 Filling System.........................................................................................................................3
1.1.3 Bibliographic file from broad scan.........................................................................................3
1.2 Selected Paper 1.........................................................................................................................3
1.2.1 Literature review.....................................................................................................................3
1.2.2 Challenges in the Internet Censorship....................................................................................4
1.3 Selected paper 2.........................................................................................................................7
1.3.1 Literature review.....................................................................................................................7
1.3.2 Problem Definition.................................................................................................................7
1.4 Conclusion...............................................................................................................................10
1.5 Introduction..............................................................................................................................11
INTRODUCTION TO RESEARCH
Table of Contents
1.1 Broad Scan............................................................................................................................2
1.1.1 Research Journal.....................................................................................................................2
1.1.2 Filling System.........................................................................................................................3
1.1.3 Bibliographic file from broad scan.........................................................................................3
1.2 Selected Paper 1.........................................................................................................................3
1.2.1 Literature review.....................................................................................................................3
1.2.2 Challenges in the Internet Censorship....................................................................................4
1.3 Selected paper 2.........................................................................................................................7
1.3.1 Literature review.....................................................................................................................7
1.3.2 Problem Definition.................................................................................................................7
1.4 Conclusion...............................................................................................................................10
1.5 Introduction..............................................................................................................................11
2
INTRODUCTION TO RESEARCH
1.1 Broad Scan
The topic is selected and searched on the internet with the help of different keywords. The
search has been done using different platform including google scholar, VU library and
IEEE. There are many literature papers were found out of which two are taken in this
document for analysis.
1.1.1 Research Journal
Date Task Action Comment
Please Fill Searched the topic Chose some topics Selected one topic
Find papers on
different sources like,
scholar
Read them and save
few of them
Made the folder to
save related work for
collection.
Literature reading Read two papers
from collection
Found Good topic for
follow up
Literature Reading Read two more
papers
Not very correlated
with my research.
Discard them.
Select 4 final
documents
Read all of them one
by one
Select final two for
reviewing
Start assignment Started with citation
of sources and
bibliography
Inserted the citations
related my work
Start up to reviewing
the first paper
Read all the paper
thrice
Put some comments
or lines in my
literature review
section.
INTRODUCTION TO RESEARCH
1.1 Broad Scan
The topic is selected and searched on the internet with the help of different keywords. The
search has been done using different platform including google scholar, VU library and
IEEE. There are many literature papers were found out of which two are taken in this
document for analysis.
1.1.1 Research Journal
Date Task Action Comment
Please Fill Searched the topic Chose some topics Selected one topic
Find papers on
different sources like,
scholar
Read them and save
few of them
Made the folder to
save related work for
collection.
Literature reading Read two papers
from collection
Found Good topic for
follow up
Literature Reading Read two more
papers
Not very correlated
with my research.
Discard them.
Select 4 final
documents
Read all of them one
by one
Select final two for
reviewing
Start assignment Started with citation
of sources and
bibliography
Inserted the citations
related my work
Start up to reviewing
the first paper
Read all the paper
thrice
Put some comments
or lines in my
literature review
section.
3
INTRODUCTION TO RESEARCH
Reading of paper Made notes of
important theories or
invention
Put them on paper in
my own words.
Review of second
paper
Read all the paper Picked some of their
important work and
reviewed on my
document
Writing Wrote down the two
papers
Fill all the fields and
prepared the
assignment
1.1.2 Filling System
Source Keywords No. of returned
literature
No. collected literature
Google Scholar Censorship 953 2
VU Library Internet Censorship 6743 3
IEEE Issues in Internet
Censorship
15,674 5
Google Scholar Internet Issues 10,650 2
1.1.3 Bibliographic file from broad scan
Akgul, M. and Kirlidog, M., 2015. Internet censorship in Turkey. Internet Policy Review, 4(2),
pp.1-22.
Aryan, S., Aryan, H. and Halderman, J.A., 2013, August. Internet Censorship in Iran: A First
Look. In FOCI.
INTRODUCTION TO RESEARCH
Reading of paper Made notes of
important theories or
invention
Put them on paper in
my own words.
Review of second
paper
Read all the paper Picked some of their
important work and
reviewed on my
document
Writing Wrote down the two
papers
Fill all the fields and
prepared the
assignment
1.1.2 Filling System
Source Keywords No. of returned
literature
No. collected literature
Google Scholar Censorship 953 2
VU Library Internet Censorship 6743 3
IEEE Issues in Internet
Censorship
15,674 5
Google Scholar Internet Issues 10,650 2
1.1.3 Bibliographic file from broad scan
Akgul, M. and Kirlidog, M., 2015. Internet censorship in Turkey. Internet Policy Review, 4(2),
pp.1-22.
Aryan, S., Aryan, H. and Halderman, J.A., 2013, August. Internet Censorship in Iran: A First
Look. In FOCI.
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
4
INTRODUCTION TO RESEARCH
Bitso, C., Fourie, I. and Bothma, T.J., 2013. Trends in transition from classical censorship to
Internet censorship: selected country overviews. Innovation: journal of appropriate
librarianship and information work in Southern Africa, 2013(46), pp.166-191.
Du, Y.R., 2016. Same events, different stories: Internet censorship in the Arab Spring seen from
China. Journalism & Mass Communication Quarterly, 93(1), pp.99-117.
Jiang, Y., 2015. Cyber-Nationalism in China. Challenging Western media portrayals of internet
censorship in China (p. 156). University of Adelaide Press.
Khattak, S., Elahi, T., Simon, L., Swanson, C.M., Murdoch, S.J. and Goldberg, I., 2016. SOK:
Making sense of censorship resistance systems. Proceedings on Privacy Enhancing
Technologies, 2016(4), pp.37-61.
Leung, D.K. and Lee, F.L., 2014. Cultivating an active online counterpublic: Examining usage
and political impact of Internet alternative media. The International Journal of
Press/Politics, 19(3), pp.340-359.
McPherson, R., Houmansadr, A. and Shmatikov, V., 2016. Covertcast: Using live streaming to
evade internet censorship. Proceedings on Privacy Enhancing Technologies, 2016(3), pp.212-
225.
Moodley, P. and Singh, R.J., 2016. Parental regulation of internet use: issues of control,
censorship and cyberbullying. Mousaion, 34(2), pp.15-30.
Spacey, R., Cooke, L., Muir, A. and Creaser, C., 2014. Regulating use of the Internet in public
libraries: A review. Journal of Documentation, 70(3), pp.478-497.
INTRODUCTION TO RESEARCH
Bitso, C., Fourie, I. and Bothma, T.J., 2013. Trends in transition from classical censorship to
Internet censorship: selected country overviews. Innovation: journal of appropriate
librarianship and information work in Southern Africa, 2013(46), pp.166-191.
Du, Y.R., 2016. Same events, different stories: Internet censorship in the Arab Spring seen from
China. Journalism & Mass Communication Quarterly, 93(1), pp.99-117.
Jiang, Y., 2015. Cyber-Nationalism in China. Challenging Western media portrayals of internet
censorship in China (p. 156). University of Adelaide Press.
Khattak, S., Elahi, T., Simon, L., Swanson, C.M., Murdoch, S.J. and Goldberg, I., 2016. SOK:
Making sense of censorship resistance systems. Proceedings on Privacy Enhancing
Technologies, 2016(4), pp.37-61.
Leung, D.K. and Lee, F.L., 2014. Cultivating an active online counterpublic: Examining usage
and political impact of Internet alternative media. The International Journal of
Press/Politics, 19(3), pp.340-359.
McPherson, R., Houmansadr, A. and Shmatikov, V., 2016. Covertcast: Using live streaming to
evade internet censorship. Proceedings on Privacy Enhancing Technologies, 2016(3), pp.212-
225.
Moodley, P. and Singh, R.J., 2016. Parental regulation of internet use: issues of control,
censorship and cyberbullying. Mousaion, 34(2), pp.15-30.
Spacey, R., Cooke, L., Muir, A. and Creaser, C., 2014. Regulating use of the Internet in public
libraries: A review. Journal of Documentation, 70(3), pp.478-497.
5
INTRODUCTION TO RESEARCH
Xu, W.W. and Feng, M., 2015. Networked Creativity on the Censored Web 2.0: Chinese Users'
Twitter-based Activities on the Issue of Internet Censorship. Journal of Contemporary Eastern
Asia, 14(1).
Yang, F., 2016. Rethinking China’s Internet censorship: The practice of recoding and the politics
of visibility. new media & society, 18(7), pp.1364-1381.
Yang, Q. and Liu, Y., 2014. What’s on the other side of the great firewall? Chinese Web users’
motivations for bypassing the Internet censorship. Computers in human behavior, 37, pp.249-
257.
1.2 Selected Paper 1
Bitso, C., Fourie, I. and Bothma, T.J., 2013. Trends in transition from classical censorship to
Internet censorship: selected country overviews. Innovation: journal of appropriate
librarianship and information work in Southern Africa, 2013(46), pp.166-191.
1.2.1 Literature review
The censorship has extended its branch to the resources found over the Internet. These
resources includes the emails and social networking tool that help in connecting with various
number of people in the world. Many countries have imposed restriction in the enforcement. This
article focuses on the trends of the Internet Censorship in the countries including Australia,
China, Chile, Finland, Singapore and Turkey. The background of the Internet Censorship has
been discussed in the journal. Censorship might be imposed on various stakeholders of the
company in the market. The government legal authorities in the state has been able to maintain
the censorship in the region by using the legal activities (Bitso, Fourie and Bothma 2013).
INTRODUCTION TO RESEARCH
Xu, W.W. and Feng, M., 2015. Networked Creativity on the Censored Web 2.0: Chinese Users'
Twitter-based Activities on the Issue of Internet Censorship. Journal of Contemporary Eastern
Asia, 14(1).
Yang, F., 2016. Rethinking China’s Internet censorship: The practice of recoding and the politics
of visibility. new media & society, 18(7), pp.1364-1381.
Yang, Q. and Liu, Y., 2014. What’s on the other side of the great firewall? Chinese Web users’
motivations for bypassing the Internet censorship. Computers in human behavior, 37, pp.249-
257.
1.2 Selected Paper 1
Bitso, C., Fourie, I. and Bothma, T.J., 2013. Trends in transition from classical censorship to
Internet censorship: selected country overviews. Innovation: journal of appropriate
librarianship and information work in Southern Africa, 2013(46), pp.166-191.
1.2.1 Literature review
The censorship has extended its branch to the resources found over the Internet. These
resources includes the emails and social networking tool that help in connecting with various
number of people in the world. Many countries have imposed restriction in the enforcement. This
article focuses on the trends of the Internet Censorship in the countries including Australia,
China, Chile, Finland, Singapore and Turkey. The background of the Internet Censorship has
been discussed in the journal. Censorship might be imposed on various stakeholders of the
company in the market. The government legal authorities in the state has been able to maintain
the censorship in the region by using the legal activities (Bitso, Fourie and Bothma 2013).
6
INTRODUCTION TO RESEARCH
Different laws and policies are implemented over the Internet that helps in maintaining the
security of the data and information over the Internet.
There are various sources for gathering the knowledge and information related to
different topics are available over the internet. Therefore, the censorship on the internet plays an
important role in maintaining the security of the data and information over the internet. The easy
access to the Internet has allowed different users to access the internet at any time (Cui and Wu
2017). Therefore, different illegal activities are prevailing over the internet. There are various
trends in the Internet including the positive trend and negative trend. The negative trend includes
issues in the internet privacy, security of the internet data and information (Bitso, Fourie and
Bothma 2013). On the other hand, the positive data expresses the freedom of speech for the users
over the Internet censorship. The use of the ICT in the IT sector have helped maintaining the
balance between the internet data and information. The Internet has provided many opportunities
to the users at a global scale that helps in maintaining the data and information.
1.2.2 Challenges in the Internet Censorship
The internet censorship has faced many challenges in the operations. The cyber-attacks is
one of the major challenges faced by the internet censorship. The cyber-bullying is considered a
challenge regarding the internet censorship. It can affect both mentally and physically to the
users of the internet that can harass the user (Yang 2016). Internet is considered as important
educational resources that helps in collecting different information regarding various topics.
Various issues are prevailing over the internet including the pornography and illegal websites.
There are various illegal websites that provides the formulas for making a bomb or drugs, which
is dangerous for the people in the society. This can cause huge damage to the people in the
society (Zhong 2016).
INTRODUCTION TO RESEARCH
Different laws and policies are implemented over the Internet that helps in maintaining the
security of the data and information over the Internet.
There are various sources for gathering the knowledge and information related to
different topics are available over the internet. Therefore, the censorship on the internet plays an
important role in maintaining the security of the data and information over the internet. The easy
access to the Internet has allowed different users to access the internet at any time (Cui and Wu
2017). Therefore, different illegal activities are prevailing over the internet. There are various
trends in the Internet including the positive trend and negative trend. The negative trend includes
issues in the internet privacy, security of the internet data and information (Bitso, Fourie and
Bothma 2013). On the other hand, the positive data expresses the freedom of speech for the users
over the Internet censorship. The use of the ICT in the IT sector have helped maintaining the
balance between the internet data and information. The Internet has provided many opportunities
to the users at a global scale that helps in maintaining the data and information.
1.2.2 Challenges in the Internet Censorship
The internet censorship has faced many challenges in the operations. The cyber-attacks is
one of the major challenges faced by the internet censorship. The cyber-bullying is considered a
challenge regarding the internet censorship. It can affect both mentally and physically to the
users of the internet that can harass the user (Yang 2016). Internet is considered as important
educational resources that helps in collecting different information regarding various topics.
Various issues are prevailing over the internet including the pornography and illegal websites.
There are various illegal websites that provides the formulas for making a bomb or drugs, which
is dangerous for the people in the society. This can cause huge damage to the people in the
society (Zhong 2016).
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
7
INTRODUCTION TO RESEARCH
As commented by Bitso, Fourie and Bothma (2013), there are websites that provides fake
news regarding any subject that is used to divert the thoughts and views of the common people in
the society. The increase in the digitalization over the internet have given rose to the issues in the
internet censorship. The transaction over the internet has increased these days that have caused
issues in the data breaching during the transaction. Many cases of hacking of the money have
caused financial loss to the users of the Internet. The theft of the intellectual property has been a
major concern in the distributed networks and the violation in the copyright. The internet
censorship is related to different forms of the government systems. Therefore, various
government of different companies have tried to implement the data mining.
The governments of Australia, China and South Africa are responsible for the policies
under the internet censorship. This has been a prior issues for the government to analyses the
challenges faced by the individuals in the society. Other parties in the government are
responsible for the censorship in the literature in content rating system and private censorship.
This has created issues in the libraries and hospital management systems in the market. The use
of the internet has been increased in all over the world that have caused many issues in the cyber
world (Bitso, Fourie and Bothma 2013). The use of the internet has provided the use of many
illegal websites that are helping in increasing the crimes over the internet.
The easy access to the Internet has allowed different users to access the internet at any
time. Therefore, different illegal activities are prevailing over the internet. There are various
trends in the Internet including the positive trend and negative trend. The negative trend includes
issues in the internet privacy, security of the internet data and information. The censorship in the
internet helps in maintaining the security of the data and information in the cloud server.
Therefore, the security of the data and information over the internet is an important issue in the
INTRODUCTION TO RESEARCH
As commented by Bitso, Fourie and Bothma (2013), there are websites that provides fake
news regarding any subject that is used to divert the thoughts and views of the common people in
the society. The increase in the digitalization over the internet have given rose to the issues in the
internet censorship. The transaction over the internet has increased these days that have caused
issues in the data breaching during the transaction. Many cases of hacking of the money have
caused financial loss to the users of the Internet. The theft of the intellectual property has been a
major concern in the distributed networks and the violation in the copyright. The internet
censorship is related to different forms of the government systems. Therefore, various
government of different companies have tried to implement the data mining.
The governments of Australia, China and South Africa are responsible for the policies
under the internet censorship. This has been a prior issues for the government to analyses the
challenges faced by the individuals in the society. Other parties in the government are
responsible for the censorship in the literature in content rating system and private censorship.
This has created issues in the libraries and hospital management systems in the market. The use
of the internet has been increased in all over the world that have caused many issues in the cyber
world (Bitso, Fourie and Bothma 2013). The use of the internet has provided the use of many
illegal websites that are helping in increasing the crimes over the internet.
The easy access to the Internet has allowed different users to access the internet at any
time. Therefore, different illegal activities are prevailing over the internet. There are various
trends in the Internet including the positive trend and negative trend. The negative trend includes
issues in the internet privacy, security of the internet data and information. The censorship in the
internet helps in maintaining the security of the data and information in the cloud server.
Therefore, the security of the data and information over the internet is an important issue in the
8
INTRODUCTION TO RESEARCH
market. The use of the internet censorship in different sector helps in maintaining the security of
the data and information (Weaver 2017). Other parties in the government are responsible for the
censorship in the literature in content rating system and private censorship. The violation of the
rights has been an issue in the internet censorship that has been prevailing in the society. Many
networks are banned for use under the internet censorship. This decreases the use of the internet
in the world. The educational resource for the students have become less due to the internet
censorship. The websites are not allowed to visit by the students that have declined the sources
for the educational data and information.
The social gaps among the people have been increased that have mentioned in the
internet censorship over the internet. The use of the internet censorship have been optimizing the
security protocols of the internet servers. This has been a prior issues for the government to
analyses the challenges faced by the individuals in the society (Gebhart and Kohno 2017). This
has created issues in the libraries and hospital management systems in the market. The use of the
internet has been increased in all over the world that have caused many issues in the cyber world.
The use of the internet has provided the use of many illegal websites that are helping in
increasing the crimes over the internet. This can be further analyzed in the form of the cyber-
attacks in the companies. The cyber-attacks in the server of the company has been a major
problem in the case of the internet censorship. The use of the internet censorship has helped in
controlling the cyber-attacks in the company.
1.3 Selected paper 2
Xu, W.W. and Feng, M., 2015. Networked Creativity on the Censored Web 2.0: Chinese Users'
Twitter-based Activities on the Issue of Internet Censorship. Journal of Contemporary Eastern
Asia, 14(1).
INTRODUCTION TO RESEARCH
market. The use of the internet censorship in different sector helps in maintaining the security of
the data and information (Weaver 2017). Other parties in the government are responsible for the
censorship in the literature in content rating system and private censorship. The violation of the
rights has been an issue in the internet censorship that has been prevailing in the society. Many
networks are banned for use under the internet censorship. This decreases the use of the internet
in the world. The educational resource for the students have become less due to the internet
censorship. The websites are not allowed to visit by the students that have declined the sources
for the educational data and information.
The social gaps among the people have been increased that have mentioned in the
internet censorship over the internet. The use of the internet censorship have been optimizing the
security protocols of the internet servers. This has been a prior issues for the government to
analyses the challenges faced by the individuals in the society (Gebhart and Kohno 2017). This
has created issues in the libraries and hospital management systems in the market. The use of the
internet has been increased in all over the world that have caused many issues in the cyber world.
The use of the internet has provided the use of many illegal websites that are helping in
increasing the crimes over the internet. This can be further analyzed in the form of the cyber-
attacks in the companies. The cyber-attacks in the server of the company has been a major
problem in the case of the internet censorship. The use of the internet censorship has helped in
controlling the cyber-attacks in the company.
1.3 Selected paper 2
Xu, W.W. and Feng, M., 2015. Networked Creativity on the Censored Web 2.0: Chinese Users'
Twitter-based Activities on the Issue of Internet Censorship. Journal of Contemporary Eastern
Asia, 14(1).
9
INTRODUCTION TO RESEARCH
1.3.1 Literature review
This paper deals with the network security over the internet and the impact of the social
media in the internet censorship. The population over the internet has been increasing rapidly in
a daily basis that have raised different problems in the market. The use of the internet has ease
the life of an individual by providing a huge amount of information knowledge regarding various
fields (Cui and Wu 2016). The use of the social media has helped in connecting millions of
people together. The creative interface of the social media have attracted any users to access
these websites (Xu and Feng 2015). There are many illegal websites regarding the social media
that causes harm to the society. The virtual world have created a debate on the activism versus
slacktivism that have caused different issues over the life of the people in the society.
1.3.2 Problem Definition
Internet Censorship has been a current topic in the field of authentication regimes over
the internet. Different countries are allowing the internet censorship in their governmental
criteria. For example, in Iran the government have implemented “Halal Internet” that shields the
country from other western countries. The Russian Government maintain the list of the banned
internet websites and stores all the data and information within the country server for providing
protection (Xu and Feng 2015). The use of the internet censorship has provided many advantages
to the users for protecting their internet and devices.
The legislative changes in the government different countries have changed the issues
related with the internet censorship in the market. The coding scheme in the various countries
have helped in protecting the data and information over the internet. The hackers are not aware
of the coding section of the data that prevents the data and information from breached.
INTRODUCTION TO RESEARCH
1.3.1 Literature review
This paper deals with the network security over the internet and the impact of the social
media in the internet censorship. The population over the internet has been increasing rapidly in
a daily basis that have raised different problems in the market. The use of the internet has ease
the life of an individual by providing a huge amount of information knowledge regarding various
fields (Cui and Wu 2016). The use of the social media has helped in connecting millions of
people together. The creative interface of the social media have attracted any users to access
these websites (Xu and Feng 2015). There are many illegal websites regarding the social media
that causes harm to the society. The virtual world have created a debate on the activism versus
slacktivism that have caused different issues over the life of the people in the society.
1.3.2 Problem Definition
Internet Censorship has been a current topic in the field of authentication regimes over
the internet. Different countries are allowing the internet censorship in their governmental
criteria. For example, in Iran the government have implemented “Halal Internet” that shields the
country from other western countries. The Russian Government maintain the list of the banned
internet websites and stores all the data and information within the country server for providing
protection (Xu and Feng 2015). The use of the internet censorship has provided many advantages
to the users for protecting their internet and devices.
The legislative changes in the government different countries have changed the issues
related with the internet censorship in the market. The coding scheme in the various countries
have helped in protecting the data and information over the internet. The hackers are not aware
of the coding section of the data that prevents the data and information from breached.
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
10
INTRODUCTION TO RESEARCH
Dimension Category Definition
Technological Reporting Describing processes of troubleshooting the problems
and technological problems
Sentiment Expressing anger and frustration
Commentary Expressing views related to a technology issue
Solution Giving tips and guide for solving a technological
problem
Mobilization Engage others for joining an event and collective actions
on a technologic problem
Political Sharing news Forwarding news articles
Commentary Expressing opinions about a political issue
Mobilization Engaging others to join a political cause
Creative Expression The use of code words to for discussions of sensitive events and topics
Table 1: Content coding scheme
The use of the SNA programs Node XL and UCINET have helped in extracting the
salient features and influencing other users. The in-degree centrality is used for sorting the users
for targeting and retweeting the other users for getting the feedback. Many cases of hacking of
the money have caused financial loss to the users of the Internet. The analysis for capturing the
topology of action performed in the Twitter discussion. The pilot coding helps in revealing the
INTRODUCTION TO RESEARCH
Dimension Category Definition
Technological Reporting Describing processes of troubleshooting the problems
and technological problems
Sentiment Expressing anger and frustration
Commentary Expressing views related to a technology issue
Solution Giving tips and guide for solving a technological
problem
Mobilization Engage others for joining an event and collective actions
on a technologic problem
Political Sharing news Forwarding news articles
Commentary Expressing opinions about a political issue
Mobilization Engaging others to join a political cause
Creative Expression The use of code words to for discussions of sensitive events and topics
Table 1: Content coding scheme
The use of the SNA programs Node XL and UCINET have helped in extracting the
salient features and influencing other users. The in-degree centrality is used for sorting the users
for targeting and retweeting the other users for getting the feedback. Many cases of hacking of
the money have caused financial loss to the users of the Internet. The analysis for capturing the
topology of action performed in the Twitter discussion. The pilot coding helps in revealing the
11
INTRODUCTION TO RESEARCH
themes that lead to the development of the final coding of the schemes for focusing in these
areas.
Figure 1: Self-disclosure on Twitter profiles
(Source: Xu and Feng 2015)
The internet censorship has provided resistance to the data and information during the
transfer process. The collective approach of the legislation and internet censorship have helped in
securing the transfer of data and information. On the other hand, the use of the strict internet
security have blocked different websites over the internet that have limited the amount of
information for the users, The users are not allowed to access different websites as these websites
are banned under the internet censorship (McPherson, Houmansadr and Shmatikov 2016). The
censorship in the internet helps in maintaining the security of the data and information in the
cloud server. The use of the internet censorship in different sector helps in maintaining the
INTRODUCTION TO RESEARCH
themes that lead to the development of the final coding of the schemes for focusing in these
areas.
Figure 1: Self-disclosure on Twitter profiles
(Source: Xu and Feng 2015)
The internet censorship has provided resistance to the data and information during the
transfer process. The collective approach of the legislation and internet censorship have helped in
securing the transfer of data and information. On the other hand, the use of the strict internet
security have blocked different websites over the internet that have limited the amount of
information for the users, The users are not allowed to access different websites as these websites
are banned under the internet censorship (McPherson, Houmansadr and Shmatikov 2016). The
censorship in the internet helps in maintaining the security of the data and information in the
cloud server. The use of the internet censorship in different sector helps in maintaining the
12
INTRODUCTION TO RESEARCH
security of the data and information. The increase in the digitalization over the internet have
given rose to the issues in the internet censorship. The bold statements of the political dilemmas
have helped in maintaining the strictness of the internet censorship in the media. The
politicization of the issues have fosters have a strong sense in the citizenship for the social
background of the society. The collective section in the agenda of the internet censorship have
escalated in many ways for entertaining the social awareness in the scenario (Xu and Feng 2015).
This has allowed many countries including North Korea where the internet censorship have been
a speech-control area. There are websites that provides fake news regarding any subject that is
used to divert the thoughts and views of the common people in the society. The government legal
authorities in the state has been able to maintain the censorship in the region by using the legal
activities The transaction over the internet has increased these days that have caused issues in the
data breaching during the transaction. The theft of the intellectual property has been a major
concern in the distributed networks and the violation in the copyright.
1.4 Conclusion
It can be concluded that both the papers have mentioned the issues of the internet
censorship in the cyber world. The basic idea of the internet censorship has been mentioned in
the discussion that helps in maintaining the fundamentals of the internet censorship. The first
paper has focused in the issues of the internet censorship with different case studies of the world.
Therefore, the security of the data and information over the internet is an important issue in the
market. The use of the internet censorship has been focuses in the paper that provides a broad
view of the internet censorship in the society. The background of the Internet Censorship has
been discussed in the journal. Censorship might be imposed on various stakeholders of the
company in the market.
INTRODUCTION TO RESEARCH
security of the data and information. The increase in the digitalization over the internet have
given rose to the issues in the internet censorship. The bold statements of the political dilemmas
have helped in maintaining the strictness of the internet censorship in the media. The
politicization of the issues have fosters have a strong sense in the citizenship for the social
background of the society. The collective section in the agenda of the internet censorship have
escalated in many ways for entertaining the social awareness in the scenario (Xu and Feng 2015).
This has allowed many countries including North Korea where the internet censorship have been
a speech-control area. There are websites that provides fake news regarding any subject that is
used to divert the thoughts and views of the common people in the society. The government legal
authorities in the state has been able to maintain the censorship in the region by using the legal
activities The transaction over the internet has increased these days that have caused issues in the
data breaching during the transaction. The theft of the intellectual property has been a major
concern in the distributed networks and the violation in the copyright.
1.4 Conclusion
It can be concluded that both the papers have mentioned the issues of the internet
censorship in the cyber world. The basic idea of the internet censorship has been mentioned in
the discussion that helps in maintaining the fundamentals of the internet censorship. The first
paper has focused in the issues of the internet censorship with different case studies of the world.
Therefore, the security of the data and information over the internet is an important issue in the
market. The use of the internet censorship has been focuses in the paper that provides a broad
view of the internet censorship in the society. The background of the Internet Censorship has
been discussed in the journal. Censorship might be imposed on various stakeholders of the
company in the market.
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
13
INTRODUCTION TO RESEARCH
The second paper focuses on the use of the social media in the interruption of the internet
censorship. The impact of the social media on the internet censorship has been described in the
paper. The legislative changes regarding the change in the internet censorship has been discussed
properly in the report. It provides the glimpses of the issues in the internet censorship over the
cyber world. The virtualization effect of the internet censorship has been focused on the impact
of the internet censorship in the world.
1.5 Introduction
This research paper deals with the issues of the Internet Censorship in the cyber world. Internet
Censorship have helped in maintaining the security of the data and information if the users over
the internet.
This document analyses two-research paper related to the topic and discusses the issues related to
the internet censorship. The first paper deals with the basic concept of the internet censorship and
issues involving in the internet censorship. The second paper deals with the network security in
the internet censorship and social media impact. The impact of the social media on the internet
censorship has been focused in the report.
INTRODUCTION TO RESEARCH
The second paper focuses on the use of the social media in the interruption of the internet
censorship. The impact of the social media on the internet censorship has been described in the
paper. The legislative changes regarding the change in the internet censorship has been discussed
properly in the report. It provides the glimpses of the issues in the internet censorship over the
cyber world. The virtualization effect of the internet censorship has been focused on the impact
of the internet censorship in the world.
1.5 Introduction
This research paper deals with the issues of the Internet Censorship in the cyber world. Internet
Censorship have helped in maintaining the security of the data and information if the users over
the internet.
This document analyses two-research paper related to the topic and discusses the issues related to
the internet censorship. The first paper deals with the basic concept of the internet censorship and
issues involving in the internet censorship. The second paper deals with the network security in
the internet censorship and social media impact. The impact of the social media on the internet
censorship has been focused in the report.
14
INTRODUCTION TO RESEARCH
References
Cui, D. and Wu, F., 2016. Moral goodness and social orderliness: An analysis of the official
media discourse about Internet governance in China. Telecommunications Policy, 40(2), pp.265-
276.
Cui, D. and Wu, F., 2016. Moral goodness and social orderliness: An analysis of the official
media discourse about Internet governance in China. Telecommunications Policy, 40(2), pp.265-
276.
Gebhart, G. and Kohno, T., 2017, April. Internet Censorship in Thailand: User Practices and
Potential Threats. In Security and Privacy (EuroS&P), 2017 IEEE European Symposium on (pp.
417-432). IEEE.
McPherson, R., Houmansadr, A. and Shmatikov, V., 2016. Covertcast: Using live streaming to
evade internet censorship. Proceedings on Privacy Enhancing Technologies, 2016(3), pp.212-
225.
Weaver, K.D., 2017. Censorship in the Digital Age the World Over. In Encyclopedia of
Information Science and Technology, Fourth Edition (pp. 7292-7301). IGI Global.
Yang, F., 2016. Rethinking China’s Internet censorship: The practice of recoding and the politics
of visibility. new media & society, 18(7), pp.1364-1381.
Zhong, Z.J., Zhong, Z.J., Wang, T., Wang, T., Huang, M. and Huang, M., 2017. Does the Great
Fire Wall cause self-censorship? The effects of perceived internet regulation and the justification
of regulation. Internet Research, 27(4), pp.974-990.
INTRODUCTION TO RESEARCH
References
Cui, D. and Wu, F., 2016. Moral goodness and social orderliness: An analysis of the official
media discourse about Internet governance in China. Telecommunications Policy, 40(2), pp.265-
276.
Cui, D. and Wu, F., 2016. Moral goodness and social orderliness: An analysis of the official
media discourse about Internet governance in China. Telecommunications Policy, 40(2), pp.265-
276.
Gebhart, G. and Kohno, T., 2017, April. Internet Censorship in Thailand: User Practices and
Potential Threats. In Security and Privacy (EuroS&P), 2017 IEEE European Symposium on (pp.
417-432). IEEE.
McPherson, R., Houmansadr, A. and Shmatikov, V., 2016. Covertcast: Using live streaming to
evade internet censorship. Proceedings on Privacy Enhancing Technologies, 2016(3), pp.212-
225.
Weaver, K.D., 2017. Censorship in the Digital Age the World Over. In Encyclopedia of
Information Science and Technology, Fourth Edition (pp. 7292-7301). IGI Global.
Yang, F., 2016. Rethinking China’s Internet censorship: The practice of recoding and the politics
of visibility. new media & society, 18(7), pp.1364-1381.
Zhong, Z.J., Zhong, Z.J., Wang, T., Wang, T., Huang, M. and Huang, M., 2017. Does the Great
Fire Wall cause self-censorship? The effects of perceived internet regulation and the justification
of regulation. Internet Research, 27(4), pp.974-990.
15
INTRODUCTION TO RESEARCH
INTRODUCTION TO RESEARCH
1 out of 16
Related Documents
Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
© 2024 | Zucol Services PVT LTD | All rights reserved.