Anonymous, 22 Jul 2019
Research on Middle East, Islam and digital media
create content
Do you want to publish your call for papers or article on Digital Islam?
more
newsletter
Register for Newsletter
more
keyword: Internet security

Middle East and Western-Made Censorship Tools Report

The OpenNet Initiative published its report West Censoring East: The Use of Western Technologies by Middle East Censors, 2010-2011 authored by Helmi Noman and Jillian C. York. The paper "analyze the use of American- and Canadian-made software for the purpose of government-level filtering in the Middle East and North Africa." It provides a detailed list of software companies (including their policies towards the state censorship) and their products that prevent citizens from accessing the internet content.

Reporters Without Borders' Internet Enemies Report 2011

Reporters Without Borders published a new report on online freedom of expression and cyber censorship, the report is titled Internet Enemies. Countries labeled as "Internet Enemies" in 2011 are Burma, China, Cuba, Iran, North Korea, Saudi Arabia, Syria, Turkmenistan, Uzbekistan and Vietnam. Tunisia and Egypt have been dropped from the “Internet Enemies” list and added to the “Under Surveillance” list. Other countries in this category are (for various reasons) Australia, Bahrain, Belarus, Eritrea, France, Libya, Malaysia, Russia, South Korea, Sri Lanka, Thailand, Turkey, United Arab Emirates and Venezuela. The 100-page report gives detailed information on the current situation in these countries.

Implications of Unblocking Social Media in Syria

In her article published on Al Jazeera English, Jillian York from Harvard Law School's Berkman Centre for Internet and Society discusses the current social media unblocking in Syria. She describes the online censorship in the country and focuses on possible negative effects of the free access to social media networks. She warns that "free access does not mean freedom of expression" and gives the example of Tunisia where social media tools were used for surveillance of activists under the former regime.

2010 Circumvention Tool Usage Report

Circumvention tools allow users to bypass Internet filtering to access content otherwise blocked by governments, workplaces, schools, or even the blocked sites themselves. The following report uses a variety of methods to evaluate the usage of these tools to test two hypotheses. First, even though much of the media attention on circumvention tools has been given to a handful of tools — notably Freegate, Ultrasurf, Tor, and Hotspot Shield — the report finds that these tools represent only a small portion of overall circumvention usage and that the attention paid to these tools has been disproportionate to their usage, especially when compared to the more widely used simple web proxies. Second, even when including the more widely-used simple web proxies, the report finds that overall usage of circumvention tools is still very small in proportion to the number of Internet users in countries with substantial national Internet filtering.

New Tool to Halalify the Internet

After launching the world's first Islamic orientated internet search engine I'mHalal in September 2009, its founders are now coming with a new initiative called halalify.org. It invites all webmasters to integrate the Halalify button on their website and start the Halalification of the Internet. The Halalify button counts how many users specified a certain web page to be Halal and this data are used to build an index of information that will be publicized in an open directory. The index is also used by ImHalal.com for its secondary database (Democratic Search Algorithm) to rate relevancy of the content of websites.
 
Wagner, Ben, Deep Packet Inspection and Internet Censorship: International Convergence on an ‘Integrated Technology of Control’. Academia.edu: Follow research, presented at the 3rd Annual Giganet Symposium in December 2008 abstract PDF
 
Shalhoub, Zeinab Karake, Trust, privacy, and security in electronic business: the case of the GCC countries. Information Management and Computer Security, Vol.14, No. 3, 2006 abstract full text
 
Martinkova, Libuse, Unsolicited Religious E-mail: Researching New Context of Religious Communication. Masaryk University Journal of Law and Technology. Vol. 2, No. 2, 2008 abstract full text

Unsolicited Religious E-mail: Researching New Context of Religious Communication

Most of the unsolicited e-mail is usually of business character and thus interpreted as something what teases and intrudes the privacy of mailboxes. However, specific number of the e-mails, labeled as spam, is represented by the messages with religious content. This paper deals with the descriptive typology of religious spam mail, distinguishing especially the missionary e-mails, chain letters and hoaxes in the new context of religious communication and the Internet. The study also tries to analyze the scheme of production and distribution of religious spam, including the impact to the recipients.
 
Qin, J.; Zhou, Y.; Lai, G.; Reid, E.; Sageman, M.; Chen, H., The Dark Web Portal Project: collecting and analyzing the presence of terrorist groups on the Web. In: Proceedings of the Conference on Intelligence and Security Informatics Conference 2005. Berlin: Springer-Verlag, 2005 abstract PDF
page 2 of 325 items