Welcome to Scribd, the world's digital library. Read, publish, and share books and documents. See more
Download
Standard view
Full view
of .
Look up keyword
Like this
14Activity
0 of .
Results for:
No results containing your search query
P. 1
Collusion Collision

Collusion Collision

Ratings: (0)|Views: 2,664 |Likes:
Published by The SecDev Group
“Collusion and Collision: Searching for Guidance in Chinese Cyberspace” examines how companies have struggled to balance ethical and economic interests in their bid to capture the world’s largest market of internet users. The report provides an overview of the ‘Great Firewall’ of China, the past actions participation of five US technology giants (Google, Yahoo!, Microsoft, Skype and Cisco) in China’s censorship regime, and the legal and ethical obligations and commitments that are violated by censoring online content.
“Collusion and Collision: Searching for Guidance in Chinese Cyberspace” examines how companies have struggled to balance ethical and economic interests in their bid to capture the world’s largest market of internet users. The report provides an overview of the ‘Great Firewall’ of China, the past actions participation of five US technology giants (Google, Yahoo!, Microsoft, Skype and Cisco) in China’s censorship regime, and the legal and ethical obligations and commitments that are violated by censoring online content.

More info:

Published by: The SecDev Group on Sep 19, 2011
Copyright:Attribution Non-commercial No-derivs

Availability:

Read on Scribd mobile: iPhone, iPad and Android.
download as PDF or read online from Scribd
See more
See less

04/22/2013

pdf

 
Table of contents
Acknowledgements iiiOverview: Searching for guidance in Chinese cyberspace 1
Introduction: Mind the gap 3
Part 1. The Golden Shield: China’s strategy for controlling domestic cyberspace 5
1.1 A pyramid of control: China’s internet censorship and surveillance mechanisms 6
1.3 Publicity and public order: Additional considerations 9
Part 2. Complicity: U.S. Corporations in the Chinese Internet Market 10
2.1 Google: “Don’t be evil;” Do make money 112.2 Yahoo!: Going Native 122.3 Microsoft: MSN Spaces and the Bing-Baidu partnership 122.4 Skype: Breaching trust 142.5 Cisco: Selling Surveillance 152.6 Having their cake and eating it too 16
Part 3. Current policy and legal measures 17
3.1 Locutions of liberty: U.S. policy 18
UN Global Compact 21e-G8 21
What is to be done: To new beginnings and new behavior 24Endnotes 25
 
SecDev Analytics
ii
List of boxes
Box 1 Key takeaways: at a Glance 2Box 2 China’s system of control: How it works 5Box 3 How do search engine companies shape Chinese cyberspace? 8

Map of Connectivity 6

Activity (14)

You've already reviewed this. Edit your review.
1 hundred reads
1 thousand reads
haeinous liked this
maximoramallo liked this
Fjorela Kazia liked this
Ta Thanh Dinh liked this
Dan liked this
akif91 liked this
Mohd Zeremy liked this

You're Reading a Free Preview

Download
scribd
/*********** DO NOT ALTER ANYTHING BELOW THIS LINE ! ************/ var s_code=s.t();if(s_code)document.write(s_code)//-->