Pew survey: Tech companies will have mixed record on dealing with repressive regimes
- 05 July, 2012 22:40
Internet experts are divided over whether technology companies will cooperate in the coming decade with repressive regimes that seek to limit or monitor individual Internet use, according to a study released Monday by the Pew Research Center and Elon University.
Roughly half the Internet experts responding to a 2011 online survey believed that by 2020, technology companies based in democratic countries will be expected to adhere to norms for protecting international users' freedom of expression under potentially repressive regimes.
However, about 40 percent said the desire for profits would lead the companies to intentionally limit their products' usefulness for political dissent in order to operate in countries with repressive regimes. Ten percent did not respond to the question.
"It's going to be a mix of the two scenarios, both trends are going to continue," said Janna Anderson, the study's co-author and the director of Elon's Imagining the Internet Center.
The study addressed the tactics of "spying, blocking and filtering" that governments have sometimes used to limit citizen protests, Anderson said. In written explanations of their answers, some of the respondents also considered technology companies' ability to create systems that are resistant to central control. Those systems can make it more difficult for governments to block services, as the Egyptian regime of Hosni Mubarak did to Twitter during the protests that led to its ouster last year.
One example of the sorts of scenarios probed in the survey involves Google's operations in China. The company has navigated between pressure from the Chinese government to filter search results and pressure from people in the West to provide Chinese citizens with unfettered access to the Web.
Neither Google nor Twitter immediately responded to requests for comment.
Respondents to the survey emphasized the great potential that Internet technology holds for individuals.
"Far beyond platitudes like 'don't be evil,' the engineers who develop new technologies will have both the inclination and incentive to design them to be resistant to central control and to undermine autocratic behaviors," wrote Jeffrey Alexander, a senior analyst at SRI International.
But they were cynical about larger organizations, both governments and corporations.
"Most companies will publicly state that they are doing everything possible to protect citizens while making countless concessions and political decisions that will end up harming citizens," wrote Danah Boyd, a senior researcher at Microsoft Research.
"Technology is a double-edged sword,'" Anderson said.
The report was originally scheduled to be released on Tuesday. It was released a day early because on Monday the United Nations Human Rights Council endorsed a resolution supporting the right to free expression on the Internet.
Cameron Scott covers search, web services and privacy for The IDG News Service. Follow Cameron on Twitter at CScott_IDG.
Join the CIO Australia group on LinkedIn. The group is open to CIOs, IT Directors, COOs, CTOs and senior IT managers.
- Customer Success - St. John Ambulance Australia
- Hybrid IT Service Management: A Requirement for Virtualisation and Cloud Computing
- Expanding Web Single Sign-On to Cloud and Mobile Environments
- Real-Time Protection Against Malware Infection
- Five Strategies to Help You Carve Out Costs With Open Source Solutions
Why change management doesn’t work
Larry Page wants to see your medical records
Dual-Persona Smartphones Not a BYOD Panacea
After two-year hiatus, EFF accepts bitcoin donations again
CIOs struggle to deliver timely mobile business apps: survey
Real-Time Protection Against Malware Infection
Malware is at such high levels (more than 60 million unique samples per year) that protecting an endpoint with traditional antivirus software, has become futile. More than 100,000 new types of malware are now released every day, and antivirus vendors are racing to add new protection features to try to keep their protection levels up. Read more.
Customer Success - Slater & Gordon Lawyers
Lawyers work hard, and they work fast. Any activity that takes their focus away from the task at hand represents lost productivity and lost revenue. Slater & Gordon Lawyers needed to filter spam and email-borne malware and provide high availability for email. Results from the business solution they chose include 250 hours of IT staff time reclaimed annually for other tasks, long delays in email delivery alleviated, reduced email-related storage costs, and email failover to the cloud in minutes, avoiding hours-long outages. Find out how they got these results.
Choice and Control – Considerations for Developing Enterprise Cloud Strategies
Enterprise-wide cloud implementation can be a challenging process, requiring a thoughtful, strategic approach. In this whitepaper, IBM® shares considerations for developing enterprise cloud strategies. It looks into how the rapid-scale enterprise-class environment can help enable the type of agile infrastructure that aids organisations in quickly meeting the demands of an ever-evolving marketplace, thereby providing true business value. Read now.