1 ABCT2103 Topic 10 TOPIC 10 LEGAL AND ETHICAL ISSUES
AND IMPLICATIONS
1. Identify the laws or acts that
relate to new media;
2. Discuss the problems that relate to
ethics and legal parameters in new media technology; and
3. Analyse
the legal implications of the problems in new media.
INTRODUCTION
The convergence of communication and
multimedia in the new media technology industry has resulted in the blurring of
distinction between the producer and the customer, the amateur and the
professional, the private and the public. Everyone can now use and create
content to share with others without strict requirements. New media, the
Internet particularly, is seen as a media that offers more freedom compared to
old media.
Even though the technologies and
applications convergence in new media do challenge the traditional regulatory
regime, every government including Malaysia, tries to control this media
because it has the potential of being misused and may threaten national
security. Since the introduction of the Multimedia Super Corridor, the
Malaysian government tried to strengthen national cyber laws that ultimately
led to the formation of the Malaysian Communications and Multimedia Commission
(MCMC) and the legislation of Communications and Multimedia Act 1998.
ACTIVITY 10.1
Issues of abuse are often discussed
when we speak of new media. This can be seen in new media content such as
weblogs which are regarded as unethical and inappropriate, and may even
jeopardise national security. When legal action is taken against them, there
are objections because new media is supposed to be more independent compared to
old media. What do you think of this matter? Discuss with your course mates.
ACTIVITY 10.1
10.1 REGULATORY
AND LEGAL ISSUES
Have you heard about the slander issue
involving Siti Nurhaliza or the pornographic pictures of Linda Rafar through
the Internet? These are among the controversial issues some years ago. Recently
there were some blogs that displayed content which insulted the late Sultan of
Johor and the state government; and the blogger "Penarik Beca", Abu Bakar Mohd
Rashid, who imposed a picture of a dog on the logo of the Royal Malaysian
Police (PDRM) in his blog which was seen as an insult to PDRM as well as an
attempt to incite people to hate the police. These are some examples of ethical
issues related to the regulatory and legal regime arising from new media.
ACTIVITY 10.2
Browse the Internet and try to find websites
or blogs similar to the issues highlighted above. List as many as you can and
discuss in a group why such phenomena exist. Should we allow it to happen or
should legal action be taken?
Today, the Internet and new media has
become a tool of necessity and can be used by everyone. Unfortunately, these
facilities have been abused by some of the users to publish and disseminate
inappropriate contents. It is being used in unethical ways to express their
dissatisfaction about something or someone.
Some offences in new media are as
follows:
Inciting
and fostering hatred to the Agong and Sultans;
Spreading
false information which can threaten national security;
Insulting
religion;
Inciting
racial sentiments;
Fraud
activities involving false banking websites and investment;
Copyright
infringement;
Slander
with intention to bring damage on image, dignity and the good name of someone
in the eyes of society; and
Dissemination
of pornography, obscene, and indecent content.
Even though there are several laws on
this new media, the Internet in particular appears to be a refuge for anyone
who wants to escape prosecution for offences against information and
communication laws. The global nature of the Internet and its network
infrastructure complicate the law. As a communication network, the Internet
promotes “regulatory arbitrage” where people can “arrange their affairs so that
they evade domestic regulations by structuring their communications or
transactions to take advantage of foreign regulatory regimes”. (Froomlin, in
Flew, 2004). The uses of new media have raised issues that are being debated by
various
parties. The main issues may be
categorised as what is depicted in Table 10.1.
Table 10.1: Legal Issues Concerning New Media
Cyberspace and business
|
Electronic
commerce, online contract law, online gambling and online financial law.
|
Freedom of speech
|
Freedom of
expression, obscenity, pornography and online indecency and cultural rights.
|
Intellectual properties
|
Copyright law,
patent law and trademark law.
|
Access issue
|
Educational use,
gender and race and unequal access to the Internet.
|
Security issues
|
Cybercrime,
cyberfraud, online harassment, hacking, identity theft and terrorism.
|
Privacy issues
|
Cryptography and
privacy protection for transaction, data security and personal information
privacy.
|
Even though the adaptation of
legislation in new media is necessary, according to Flew (2004), the legal
implications of the Internet’s development and ICT are made even more complex
by specific features of its relationship with existing laws, regulatory
framework, and the ideas that underpin them. This is due to the nature of the
Internet which is intangible, graphically free and ever changing.
Van Djik (2006) suggests three kinds of
solutions: legal solution, self regulation, and technological protection.
Table 10.2: Types of Solution for legal ICT Problems
Legal solutions
|
Adaptation of laws and regulation
|
Self-regulation
|
Code of conduct
and good practice
Hot lines
(reporting offences)
Market
regulation: licenses, public domain software, advertising
Mediation (civil
conflict resolution)
Information
agents (self-services)
Rating and filtering (self-services)
|
Technical solutions
|
Rating and
filtering (software)
Build-in
software
Embedded
software, scrambling, and coding
techniques
Encryption
Data metering
and digital right management
|
Source: van Djik, 2006
10.2 CURRENT
MEDIA LEGISLATION IN MALAYSIA.
In Malaysia, the media regulatory
agency is under two ministries, namely the Ministry of Home Affairs (print
media) and Ministry of Information, Communication and Culture (electronic
media). Refer to Figure 10.1 for a view of the regulatory regime in this
country.
Figure 10.1: The
regulatory regime in Malaysia
New media, the Internet, is seen as a
medium of communication and subject to the laws of the Communications and
Multimedia Act 1998. However, other laws can be used for the offence of cyber
media or related to the Internet.
Table 10.3: Laws that may be applied for new media
offences
Type of Offence
|
Laws that can be
|
Applied Authority
|
Incitement/ sedition
|
Sedition Act 1948
|
PDRM
|
Safety threats
|
Internal
Security Act 1960
Penal Code
|
PDRM
|
Cheating
|
Direct Sales Act
1993
Companies Act
1965
Bank and Finance
Institutions Act 1989
Capital Market and Services Act 2007
|
Ministry of
Domestic Trade
Cooperative and Consumerism
(MDTCC)
Malaysia
Companies Commission
Malaysian
National Bank
Security Commission
|
Copyright
|
Copyright Act 1987
|
MDTCC
|
Slander/Libel
|
Penal Code
Communications and Multimedia Act 1998
|
PDRM
MCMC
|
Obscenity
|
Communications
and Multimedia Act 1998
|
MCMC
|
10.2.1 Telecommunications Acts
The process of convergence, which is
one of the characteristics of new media, has blurred many distinctions between
the old and new media. Therefore, the laws or regulations that are related to
the media in Malaysia have had to be changed from time to time. It began with
the Telecommunications Act, 1950 and with the introduction of the ATUR
(Automatic Telephone Using Radio) in 1986 pertaining to regulations of mobile
services. We also had the Broadcasting Act 1988, Telephone Regulations 1996,
and Postal Act 1996 which were implemented to regulate and control activities
in broadcasting, usage of the telephone and postal services respectively. The
table below shows the evolution of telecommunication regulations in Malaysia.
Table 10.4: Evolution of Telecommunication Regulations
in Malaysia
Year
|
Main Regulations (Acts) and Changes
|
1950
|
Telecommunications
Act, 1950
|
1986
|
ATUR Regulations
1986
|
1988
|
Broadcasting Act
1988
|
1996
|
Telephone
Regulations 1996
Postal Act 1996
|
1997
|
Digital
Signature Act, 1997
Computer Crime
Act, 1997
Copyright Act,
1997
|
1998
|
Multimedia and
Communications Act 1998
Malaysian Communications and Multimedia Commission
Act 1998
|
The development of ICT and the
introduction of Multimedia Super Corridor (MSC) necessitated the drafts and
approval of several acts in 1997, namely the Digital Signature Act, Computer
Crimes Act, and Copyright Act (Amendments). This collection of acts is known as
Malaysian cyber laws.
To fulfil the need to regulate an
increasingly convergent communication and multimedia products and industry, the
Malaysian Communications and Multimedia Commission MCMC was created pursuant to
the Malaysian Communications and Multimedia Commission Act (1998) as a new
regulator for the communications and multimedia industry in Malaysia. At the
same time, the Communications and Multimedia Act (1998) was passed.
ACTIVITY 10.3
Cyber laws are created to regulate ICT.
Define cyber law and show
how important this law is in Malaysia.
Discuss the key points in each of the
following Acts:
(a) Digital Signature Act, 1997;
(b) Computer Crimes Act, 1997; and
(c) Copyright Act (Amendments), 1997.
10.2.2 Communications and Multimedia
Act (CMA)1998
The Communications and Multimedia Act
is a cyber law that has been set up as a framework for intervention by the
Malaysian government in monitoring communication and multimedia industry. The
activities and services controlled under this act includes traditional
broadcasting, telecommunication and online services, including facilities and
networks which have been used in providing the services and content provided
through the facilities and networks.
The aims of this act are as follows:
To
make Malaysia a world centre and focal point for communications and
information services and multimedia
content.
To
encourage the existence of civil society based on information.
To
grow and nurture local information resources and cultural activities to
facilitate national identity and global diversity.
To
regulate the long-term benefit for end users.
To
encourage a high level of consumer confidence in providing services.
To
ensure equal and affordable services through national infrastructure.
To
create a robust application environment for end users.
To
facilitate the efficient allocation of resources such as skilled labour,
capital, knowledge and national assets.
To
encourage capacity building and efficiency in the industries.
To
ensure the reliability and integrity of information security and network.
Cyber laws are created to regulate ICT.
Define cyber law and show how important this law is in Malaysia.
Discuss the key points in each of the
following Acts:
(a) Digital Signature Act, 1997;
(b) Computer Crimes Act, 1997; and
(c) Copyright Act (Amendments), 1997.
ACTIVITY 10.3
This Act is the basis to all cyber laws
in Malaysia and describes the Malaysian ICT development policy. The Act also
puts the promise of no censorship on the Internet under Section 3 (3).
Following the approval of this Act, a special ministry was set up to embrace
the communications and multimedia elements in them.
The Ministry was initially known as the
Ministry of Energy, Water and Communications, but currently it is under the
purview of the Ministry of Information, Communication and Culture. This Act is
the longest cyber law among the six cyber laws enacted in Malaysia so far.
10.2.3 Malaysian Communications and
Multimedia Commission Act 1998
Based on this Act, it provides
permission for the establishment of a Malaysian Communications and Multimedia Commission,
the sole regulatory body for communications and multimedia industry. In
addition to this, the Malaysian Communications and Multimedia Commission also
regulates the Postal industry and is the Certifying Agency pursuant to the
Digital Signature Act (1997).
The Malaysian Communications and
Multimedia Commission Act 1998 stipulated that the power and functions of the
Commission shall include the following:
To
advise the Minister on all matters concerning the national policy objectives
for communications and multimedia activities;
To
implement and enforce the provisions of the communications and multimedia law;
To
regulate all matters relating to communications and multimedia activities not
provided for in the communications and multimedia law;
To
consider and recommend reforms to the communications and multimedia law;
To
supervise and monitor communications and multimedia activities;
To
encourage and promote the development of the communications and multimedia
industry;
To
encourage and promote self-regulation in the communications and multimedia
industry;
To
promote and maintain the integrity of all persons licensed or otherwise
authorised under the communications and multimedia industry;
To
render assistance in any form to, and to promote cooperation and coordination
amongst persons engaged in communications and multimedia activities; and
To
carry out any function under any written law as may be prescribed by the
Minister by notification published in the Gazette.
The Commission shall have all such
powers as may be necessary for, or in connection with, or reasonably incidental
to, the performance of its functions under the communications and multimedia
laws (www.skmm.gov.my).
10.3 THE
DIGITAL DIVIDE
We have seen the rapid development in
ICT which create new innovations from time to time, however, the majority of
the population in developing countries still do not have access to digital
technologies. This gap may be seen in different dimensions such as physical
access, legal issues, affordability, and age.
In Europe, major changes were made in
telecommunication policies in 1998 relating to the liberalisation of
telecommunication markets that initiated a free market, more competition and
dropping prices. However, in many developing countries, telecommunication is
still centralised and is often strictly controlled by the state.
This gap has become broader based on
the UNDP Report which indicated that the OECD countries spent $520 billion on
research and development in 1998. This total amount is more than the combined
economic output of the world's 30 poorest countries. OECD countries, with only
19% of the world's population, also accounted for 91% of the 347,000 new
patents issued. This is of course tied to the system of intellectual property
which ultimately deprived many poorer countries from accessing all the latest
knowledge. In the end these countries are totally left out of the game.
The digital divide occurs all around
the world, which means that there are gaps between communities and other
communities in access to ICT, information access through ICT, and understanding
and using the information from ICT.
Based on the Organisation of Economic
Co-operation and Development (OECD), a digital divide is defined as follows:
"….. the gap between individuals, households,
businesses and geographic areas at
different socio-economic levels with regard both to
their opportunities to access information and communication technologies (ICTs)
and to their use of the Internet for a wide variety of activities. The digital
divide reflects various differences among and within countries."
ACTIVITY 10.3
The digital divide has become an issue
that is frequently discussed by various parties.
Discuss what you think are the implications of this
phenomenon.
Digital divide is caused by several
factors including economy, geography, computer skill, and language knowledge
and literacy. Exposure to ICT and its use is widespread among communities in
large cities where the ICT infrastructure is well and complete. Meanwhile,
rural communities have less exposure. This causes imbalances and disparities in
various aspects such as knowledge in ICT, computer skills and ownership, access
to Internet and online communication.
ITU World Telecommunication showed that
while 71% of the population in developed countries are online, only 21% of the
population in developing countries are online. By the end of 2010, Internet
user penetration in Africa will reach 9.6%, far behind both the world average
(30%) and the developing country average (21%). While in developing countries
72.4% of households have a TV, only 22.5% have a computer and only 15.8% have
Internet access (compared to 98%, 71% and 65.6% respectively in developed
countries).
A report from ITU also indicates that
there is a strong growth in fixed (wired) broadband subscriptions, in both
developed and developing countries: at the end of 2010, fixed (wired) broadband
subscriptions will reach an estimated 555 million globally (or 8% penetration),
up from 471 million (or 6.9% penetration) a year earlier. However, penetration
levels in developing countries remain low: 4.4 subscriptions per 100 people
compared to 24.6 in developed countries. Africa is still left behind in this
new technology with a penetration rate of less than 1%.
Figure 10.2: Internet users by regions,
2005-2010
Figure 10.3: Broadband Divide Between
Developed and Developing Countries, 2000-2010
Figure 10.4: Broadband Divide by
region, 2010
This gap is not only caused by material
resources, but it also involves other factors such as temporal resources
(having the time to use new media), mental resources (sufficient technical
knowledge), social resources (network and ties), and cultural resources (the
status and other cultural rewards to motivate people to get access). All of
these can be related to personal inequalities such as age, job or occupation,
level of education and household role. Therefore, Van Djik (2006) categorised
this digital divide as follows.
Motivational
access (motivation of use);
Material
and physical access;
Skills
access;
Usage
access; and
Usage
gap.
The digital divide is also detected in
Malaysia, especially in the rural areas, and this calls for a serious and
concerted effort to overcome it. Only 14% of people in the rural sectors have
access to the Internet compared to 85% of urban users in 1998. The majority of
Broadband users in Malaysia in 2010 is located in Kuala Lumpur, followed by
Penang, Selangor and Negeri Sembilan (www.skmm.gov.my ). Refer to Table 10.
Table 10.5: Broadband penetration rate
per 100 households by state.
ACTIVITY 10.4
There are many plans or initiatives to
bridge the digital divide in Malaysia. Discuss the efforts that have been
undertaken by our government.
10.4 PRIVACY ON THE INTERNET
The issue of privacy is an issue that
is quite important when it comes to matters related to Internet-based
technologies especially pertaining to personal privacy concerning transactions
or transmission of data via the Internet. For instance, electronic transactions
usually leave data trails and the potential of privacy invasion is huge. This
is the most prominent of consumer concerns about online shopping or purchasing.
Increased usage of social networking
sites like Facebook, LinkedIn, Friendster, Bebo, and Tagged are also seen as
areas of concern, especially when it involves underaged children. Most of these
websites are easily used to create a user profile that provides personal
details, photographs, and videos that may be viewed by others. Therefore, it is
suggested that only people whom the individual knows, should be added as a friend
to ensure privacy.
One of the main concerns of privacy
issues is identity theft. In Malaysia, cases of identity theft on the Internet
are now frequently reported. It usually involves the activities of user-based
websites online banking by cyber criminals using phishing tactics, including
producing fake websites that resembles the real banking website. Users who
cheat will enter the password in the fake website and the information will be
obtained by cyber criminals.
A study conducted by Norton Cybercrime
Report (NCR) in 2010 found that 83 percent of adult victims of cyber crimes are
victims of computer viruses, credit card fraud and online identity theft. A
total of 159 identity theft cases involving Internet banking customers were
recorded for the first nine months of 2010. This number increased by 27 cases
compared to the 132 cases reported for the same period the previous year.
Privacy threats on the Internet can
come in various ways such as below:
1. Cookies
2. HTTP
3. Browsers
4. Downloading freeware or shareware
5. E-commerce
6. E-mail
7. E-mail and cryptography
8. Spam
9. Internat Relay Chat
10. Internet Service Providers (ISP)
Do some research and find out how each
of these threats can threaten.
ACTIVITY 10.5
There is no doubt that the Internet has
much to offer but as users we can give away a lot of information about
ourselves if we are not careful. Information, which is either personal or
professional, may be stolen without our knowledge and our privacy may be
invaded by anyone be it criminal hackers or marketing
companies and corporate bosses.
Therefore, privacy issues relating to
personal data have raised the following
concerns:
Insecure
electronic transmissions;
Data
trails and logs of email messages;
Online
transactions; and
Tracking
of web pages visited.
Privacy may be defined as “the claim of
individuals, groups or institutions to determine when, how and to what extent
information about them is communicated to others”. (Westin, 1967: 7). In terms
of legal theory, according to van Djik (2006), privacy is a particular right of
freedom which is a right of no interference in private life. However, the
classic definition of privacy may be accessed from Justin Brandeis (1928):
“Privacy is the right to be left
alone·the most comprehensive of rights and the right most valued by free
people.” Van Djik (2006) categorised it into three types:
Physical privacy
- the right to selective intimacy.
|
This applies to
the inviolability of the body and fulfilment of intimate human need, allowing
the presence of only a very small selection of other persons, especially
regarding biotechnology and biometric which is become intertwined with
information technology.
|
Relational
privacy - the right to make contacts selectively.
|
The
relationships and behaviour in one’s private life at home, work, and others
might be threatened by the use of communication networks and information
systems. For example, digital telephone conversation and tracking traffic
between telephone numbers, and Internet address.
|
Informational
privacy - the
right
to selective
disclosure.
|
Regarding the
grip the individual has and keeps over his or her personal data and over the
information based on these data. Always referring to protection of personal
data and security.
|
There
are several ways to protect your privacy via the Internet or new media technology
and it can be divided into the following:
1.
Legal protection.
Needed
as a framework and backbone for other protection. For example, the United
States has the Privacy Act (1974), Electronic Communications Privacy Act
(1986), and Childrens's Online Privacy Protection (1994), while the EU has the
European Privacy Directive 8 (1998).
2.
Social protection/ self-regulation.
Users
as individuals or collective attempt to safeguard privacy themselves using
their own expertise, actions, and technical means such as a filtering software
(P3 or TRUSTe).
3.
System-technical and organisational protection.
Protected
by privacy regulations and reliable personal data protection.
4.
Technical alternatives.
Need
development by technicians and scientists and it involves local control,
concentration of intelligence terminals, offline equipments, and privacy-enhancing
technologies.
Legal
framework for the protection of privacy consists of three parts, namely national
legislation, international legislation and treaties, and codes of conduct and professional
codes. The right to privacy is covered in most constitutions of countries. At
an international level, we can refer to the Treaties of Rome and Strasbourg (European
Council) and Treaty on Civil Rights and Political Rights (UN).
Some
important principles or rules, as below, are used in legislative protection of informational
privacy which is formulated by the OECD and European Council (van Djik, 2006:
150):
The use limitation principles: The smallest possible amount of personal data
should be gathered and used for the
purpose given.
The principle of purpose specifications: Only personal data for strictly
specified purposes should be collected
and processed.
Quality: Personal data must be correct, complete and up to date. They have to
be well protected by means of security
The principle of transparent or openness: The people involved have the right to
know what personal data are collected, for what purpose, who has access to that
data, and to whom they are passed on.
Codes
of conduct and professional codes are valuable additions to legislation. Codes
of conduct exist in the form of organisation self-regulation and it applies in
electronic banking or information services between employers and trade unions,
or between producers and consumers while professional codes are made for
information workers or researchers to ensure the privacy of certain information.
INNOVATIONS
IN COMMUNICATION TECHNOLOGY
Technology
and innovation are changing our ability to develop, organise, and share
information, and the way in which we communicate. No doubt, with such
innovation we have many choices to get what we need and what we want.
Communication
technology allows an organisation to get the latest updates from different
parts of the world where its business is located and also allows them to have
increased regulation. The latest innovations in web-conferencing have made it
possible for businessmen to interact with each other in a better way. The
innovations in communication technology have also initiated a marked difference
in the way education is imparted and has led to an improvement in the quality
of education.
We
can also make online banking transactions through the click of a mouse and
travel to foreign countries without carrying any cash. The impact of
globalisation on the banking industry has been enormous and today we can see
various banks being streamlined through effective communication channels.
Generally,
the innovations allow us to do everything via electronic application and it
involves a variety of areas such as below:
1 -
Learning systems and repositories;
2 -
Research and computationally based science;
3 -
Science for participation of educators and public in scientific research;
4 -
Health records and information systems;
5 -
Storage archival systems and indestructible data for telephone systems, etc;
6 -
Content and digital rights management systems;
7 -
Manufacturing process control and manufacturing systems;
8 -
Small Business systems;
9 -
Community for self organising community broadband networks;
10 -
Strategy for integration of workflow and information systems;
11 -
University student registration systems and admin systems; and
12 -
Government for integrating and delivering government services.
There
is definitely a positive impact from this technology, but it has also led to
some challenges. Therefore, we have two options with this new technology:
(1)
technological based change and innovation, generally good, and improve our
human prospects,
(2)
technological advancement as inherently bad, threaten our civil and economic
life, and ultimately dehumanising.
For
Blythe (www.ecorridors.vt.edu), the development of technology changes our
societal sense of what is “right” and what is “wrong”, and between what seems
to be “ethical” and "fair" on the one hand, and our laws on the other. Despite
the efficiency of access to digital format or materials, prevalence of
peer-to-peer, high bandwidth Internet connection and free distance
communication, and anonymity of access to digital movie, video and software,
there are some disruptive incidents involving intellectual property (IP) and
fair use as well as individual privacy. The use of some software may also lead
to privacy infringement. Some users are not aware that vendor license sometimes
has some terms that allow them to modify our computer system.
As
an example, “You agree that in order to protect the integrity of content and
software protected by digital rights management (“Secure Content”), Microsoft
may provide security related updates to the OS Components that will be
automatically downloaded onto your computer. These security updates may disable
your ability to copy and/or play Secure Content and use other software on your
computer. If we provide such security update, we will use reasonable efforts to
post notices on a web site explaining the update”.
This
term gives the right to Microsoft to look and modify any file in our computers.
In KaZaa-a file sharing program that lets users download music, pictures,
software and video lips-license agreement there is a term that stipulates that,
“You
hereby grant Brilliant Digital
Entertainment the right to access and use the unused computing power and
storage space on your computer/s and/or Internet access or bandwidth for the
aggregation of content and use in distributed computing”. The user acknowledges
and authorises this use without the right of compensation.
ACTIVITY 10.6
1. What are copyright properties and
why is this right protected in many nations?
2. What is the meaning of fair use?
Despite that, in the name of fair use,
each year the music industry loses about $4.2 billion to piracy worldwide. So
much so, 85% of music recordings and 60% of movies released do not generate
enough revenue to cover their costs. All stakeholders in this industry such as
producers, publishers, retailers, the record companies, and creative artists
lose their earnings. The abuse of fair use or copyright property nowadays can
easily be done because anything can be copied and shared via the Internet. For
example, we can upload photos and share it in Flickr and Picasa; we can share
videos on Facebook or YouTube, and all these activities can be accessed by
everyone and they can reuse it without our knowledge.
10.6 GENDER
ISSUES.
Gender issues in ICT and new media
technology have been discussed since the mid 1990s when people began to talk
about Information Society. A series of papers on this issue has been presented
in many conferences such as the World Telecommunications Development Conference
and Conference on Women and Economic Development. In 2001, the United Nations
Secretary-General established a high-level Information and Communication
Technologies (ICT) Task Force with Plan of Action.
ACTIVITY 10.7
Studies by Pierre Montagnier that were
presented in WSIS Thematic Meeting in 2005 identified important trends as
follows:
In Internet activities, downloading
software is more of a male activity while seeking health information on injury,
disease or nutrition is more of a female activity. Sending and receiving e-mail
is a very common activity for women.
(a) In Korea, one of the most connected
countries in the world, the share of women researchers is only 10%. Since 2002,
the gender gap in Internet usage rate increased significantly in the older age
category (50-60), but it is rapidly closing in the younger generation (6-19
years, 20’s and 30’s). Perhaps the gender gap will disappear in the next ten
years.
(b) Among ICT-using occupations, women
tend to have a much higher share of clerical occupations and a lower share of
scientific and professional jobs. The share of women in ICT-using occupations
in OECD countries indicates a disparity of between 40-60%.
(c) The share of women in the ICT
industry (producing ICTs) is low, particularly in manufacturing industry and in
computer & service industry.
(d) Women’s low share of ICT
specialists’ jobs has not increased since 1998. In 2005, only 25% of all
software engineers in the US were women. On the other hand, the number of women
who have relative specialisation in computing in Mexico is higher than other
countries.
(web.worldbank.org)
What do you think about the problem of
gender inequity in ICT use? Discuss. The gender gap exists in ICT use,
especially among older age groups, and in areas of newer technologies. The
differences can be seen from where men and women access the Internet. Men are
more likely to access from both home and work in many countries, while women
are more likely to access from educational establishments and home.
In the information technology sector,
women make up only a small percentage of managerial, maintenance, and design
personnel in networks, operating systems, or software. According to the UN
entity for Gender Equality and the Empowerment of Women (UNIFEM), women hold 9%
of mid- to upper-level IT related jobs in engineering and make up 28.5% of
computer programmers and 26.9% of systems analysts.
In terms of the use of ICTs, there are
significant differences in patterns of use across the
whole population. For example, in their
on-line activities women are more likely to engage in shopping and
health-related activities, while men are more likely to play games and visit
sports pages. These differences are present for all age groups.
Gender issues exist in differential
access and impact of the new technologies on
men and women. Generally, it can be
seen as below:
. Physical
access to infrastructure.
Infrastructure is developed in urban
areas, and the bulk of women live in rural areas, especially in developing and
African countries. Access to this new media technology is difficult for women
in poorer and less urbanised areas where telecommunications infrastructures are
poor and unaffordable.
They have a smaller chance than men to
access new technologies because the phone lines are fewer, there are no relay
stations for mobile phones and no earth stations for satellites.
(c) The share of women in the ICT
industry (producing ICTs) is low, particularly in manufacturing industry and in
computer & service industry.
(d) Women’s low share of ICT
specialists’ jobs has not increased since 1998. In 2005, only 25% of all
software engineers in the US were women. On the other hand, the number of women
who have relative specialisation in computing in Mexico is higher than other
countries. (web.worldbank.org)
. Social
and cultural issues
Specific barriers for the majority of
women include illiteracy, unfamiliarity with the dominant languages of the
Internet, domestic responsibilities, and the fact that the information
delivered by ICTs is not that valuable to them.
Furthermore, since the infrastructure
are more in urban areas, women have difficulties using it because their
mobility (both in the sense of access to transport and ability to leave the
home) is also more limited than men. They also have limited time to spend on
new technology because of their heavy responsibilities in domestic tasks.
. Education
and skills
There is gender bias in attitudes
towards women studying or using information technology. For example, in Africa
many mathematics and science teachers have views that girls cannot think or
work scientifically and that science is too mechanical and technical for girls,
thus discouraging female students. In some countries, there are cultural
discriminations against women having access to education and technology.
Furthermore, this new technology requires literacy, language, computer skills
and information literacy.
. Financial
issue
When it involves paying for information
access, such as at a rural information centre or a cyber cafe, women are less
likely to have the disposable income to do so.
. Language
and content.
Women’s viewpoints, knowledge,
experiences and concerns are inadequately reflected on the Internet, while
gender stereotypes predominate. These concerns content that relate to issues of
sexism and portrayal of women in the media.
Besides that, English is a predominant
language in the new media and that is a problem for a majority of women because
their national language is not English, especially in places such as Latin
America, Eastern Europe and Africa. This excludes them or limits the benefits
that they can get from using ICTs.
Even though the gap between men and
women in Internet usage is now relatively small, gender equality in ICT-related
education and training and ICT access is still not yet fully achieved. Men tend
to have a slightly higher share in Internet users (except in Honduras, Ireland,
New Zealand, Nicaragua, and Thailand).
10.7 ACCESS
FOR THE DISABLED.
Access to ICT for disabled people has
been incorporated as one of the clauses in the Convention on the Protection and
Promotion of the Rights and Dignity of Persons with Disabilities, which was
adopted by the United Nations (UN) in 2006.
“To enable persons with disabilities to
live independently and participate fully in all aspects of life, States Parties
shall take appropriate measures to ensure to persons with disabilities access,
on an equal basis with others, to the physical environment, to transportation,
to information and communications, including information and communications
technologies and systems, and to other facilities and services open or provided
to the public, both in urban and in rural areas.”
ICT has been identified as an important
aspect of the wider strategy for the social inclusion of disabled people and
for help to be given to this group to participate fully in the social and
economic life of their communities. New technologies can offer them the ability
to compensate for physical or functional limitations, thus allowing them to
enhance their social and economic integration in communities by enlarging the
scope of activities available to them.
In USA, Section 508 of the
Rehabilitation Act of 1973 requires federal websites to provide individuals
with disabilities access to and use of website information and data that is
comparable to that provided to the general public. Each agency must ensure that
such electronic information technology is accessible to individuals with
disabilities unless an undue burden would be imposed on the agency.
When compliance imposes an undue
burden, Section 508 requires agencies to at least provide the information by an
alternative means that allows disabled individuals access to it. Alternate
methods may include, but are not limited to, voice, fax, relay service,
Internet posting, captioning, text-to-speech synthesis, and audio description.
In Malaysia, despite the provision of
incentives, strategies and access to information and communication technology
in the disabled policy, it is still not able to bridge the digital gap. Most of
the websites in the country is difficult to be accessed by disabled people,
especially with the the lack of software that can translate it into the Malay
language. This has resulted in reference texts in the Malay language to sound
more like the English pronunciation which makes it difficult for blind people
in this country to understand it.
10.8 INFORMATION
RESTRICTIONS AND CENSORSHIP.
Recently, the Malaysian government
through the MCMC has taken action to block 10 websites which allowed illegal
downloading of files and videos. They are Warez-BB.org, ThePirateBay, Movie2k,
MegaVideo, PutLocker, DepositFiles, DuckLoad, FileServe, FilesTube, and MegaUpload.
Instructions are given to an Internet Service Provider (ISP) to take that
action based on the request by the Ministry of Domestic Trade, Cooperatives and
Consumer Affairs to prevent access to those websites which is seen to violate
the Copyright Act 1987. This action has initiated various reactions from the
public; some in support and some against.
Ideally, new media is a channel that
could provide any information such as technical, scientific, political,
economic and even gossip, as long as there are no restrictions on the
dissemination and information, including that which may be construed as
"threatening national security”. Information which is considered as dangerous
for national concerns can be censored in order to retain the status quo of the ruling
political power or to avoid the danger towards national harmony of the country.
Other countries also have censored the
contents or information involving new media. The German government, for
example, in December 1995, ordered CompuServe to block access to illegal
materials under the law of that country. They warned the Germany Internet
Access Provider (IAP) that they would be charged with abetting terrorists, if
they do not restrict the information that may motivate terrorism on the web.
In January 1996, Deutsche Telecom,
blocked the German people to access the URL Ernst Zuendel, the German activist
residing in Toronto, Canada, on suspicion of disseminating information on
anti-Jewish and neo-Marxists on the Internet. In UK, their IAP established Internet
Watch Foundation (IWF) with the permission of the police and the government to
report material that is unlawful to the police, besides asking the IAP to
remove or block it.
China has many laws related to the
Internet. One such law states that spreading any message that has been defined
as "illegal" and "anything that violates the constitution
affecting the dignity and interests of China" is prohibited. In 2000, a total
of 1,000 Internet offences have been reported by the Chinese government.
China has take action to block websites
such as YouTube, Twitter and Facebook, as well as applying a Great Firewall
filter to block its citizens rather than allowing them to watch the images and
read ideas that are posted on illicit web pages outside the country. Besides
that, all Internet users in China are required to register with the police and
to sign an agreement not to do things that would harm the country-including
state secrecy, to spread information that could damage national security and
pornography on the internet.
ACTIVITY 10.8
In most closed countries, new media
technology creates a space of freedom which would not otherwise exist. Its
potential to disseminate news irritates dictators and eludes traditional
censorship methods. Some regimes use it - mainly on Facebook and Twitter - to monitor dissidents and infiltrate
their networks.
Discuss the statement above in terms of
the pro and contra of the freedom of information? Can the restrictions and
censorship of something that is not appropriate ensure the safety and harmony
of the country?
There is less censorship on the
Internet in most developed countries. Most of the censorship are to prevent
children pornography or to monitor websites that incite hatred of religion,
race and culture. But some developing countries do not impose any form of
censorship and there are developing countries that impose some form of
censorship on the Internet. Reporters Without Borders stated that the list of
Internet enemies are Burma, Cuba, China, Iran, North Korea, Saudi Arabia,
Syria, Turkmenistan, Uzbekistan and Vietnam. Malaysia is under the surveillance
list with Australia, Bahrain, Belarus, Egypt, Eritrea, France, Libya, Russia,
South Korea, Sri Lanka, Thailand, Tunisia, Turkey, United Arab Emirates, and
Venezuela.
In
Malaysia, the government continues to provide the assurance that the
government's policy of not censoring the Internet will continue to be
implemented as stated in the Communications and Multimedia Act 1998, "not
anything in this Act shall be construed as permitting the censorship of the
Internet". But as the body which is responsible, MCMC has the power to act
if there is any party who abuse or violate several provisions in the law of the
country.
Internet
restriction or censorship involves control or suppression of the publishing or
accessing of information on the Internet. There are various way to filter or
censor Internet content. One way is through technical censorship such as IP
blocking, DNS filtering and redirection, URL filtering, packet filtering,
reverse surveillance, and connection reset. There are also some software that
can be used, usually by users, to filter Internet content such as Cyber Patrol
Filtering Software, Sites Blocked, CYBERsitter, Bess Filtering Services,
CleanNet, McAfee Office (Guard Dog), and American Family Filter.
Filtering
or censorship might be done to content related to the following themes:
Political: Express views in opposition to those of the current government.
Content more broadly related to human rights, freedom of expression, minority
rights, and religious movements is also considered here.
Social: Material related to sexuality, gambling, and illegal drugs and alcohol,
as well as other topics that may be socially sensitive or perceived as
offensive.
Conflict/security: Content related to armed conflicts, border disputes,
separatist movements, and militant groups is included in this category.
Internet tools: Web sites that provide e-mail, Internet hosting, search,
translation, Voice-over Internet Protocol (VoIP) telephone service, and
circumvention methods are grouped in this category.
ACTIVITY
10.9
Malaysia is not implementing Internet
censorship.
Joseph Kaos Jr
Tuesday, December 14th, 2010 13:31:00
KUALA LUMPUR: Malaysia does not intend to implement an internet
filter similar to China's Green Dam project, the Deputy Information,
Communication and Culture Minister Datuk Joseph Salang Gandum told the Dewan
Rakyat today.
Salang said the government will leave
it to the discretion of internet users to practice good usage, rather than use
censorship to cull abuse of the internet.
He also clarified that a survey by the
Malaysian Communications and Multimedia Commission (MCMC) to study on China's
internet filter operation was simply, a "study".
"The study on China does not mean
that we want to impose internet censorship like them. We just wanted to see how
effective their programme is, and what we can learn from it. But it does not
mean we want to impose the same thing," said Salang, responding to a Nurul
Izzah Anwar (PKR-Pantai Dalam)'s supplementary question during Question Time.
Salang said Malaysia, as a sovereign
nation, can make their own decisions and does not have to be dictated by what
other countries do.
The deputy minister also urged bloggers
to exercise caution in their blog entries, and to refrain from insulting the
country as well as its rulers.
"The alternative media is no
longer "alternative", in fact it has become the preferred media among
the public now. Since the government does not intend to censor internet
content, bloggers and internet users must exercise caution," said Salang.
Source: www.mmail.com.my
What do you think of this statement?
Does Malaysia actually censor Internet content? Should the government apply
censorship in this new media? Discuss.
Freedom, prosperity and the development
of a society depend on education as well as on unrestricted access to
knowledge, thought, culture and information.
The right of access to information and
ideas is vital for any society. Therefore, the restriction and censorship of
information are seen as crucial and is a controversial issues to many people
because it is always related to freedom of information and democracy. Any
attempt to impose censorship on the Internet will be greeted with loud protests
from various parties who see information access as one of the rights of
humanity. Any restriction or censorship will be seen as a violation of human
rights and denying their freedom to receive information that can increase their
awareness about the world.
The
global nature of the Internet and its network infrastructure complicate the
law.
The
legal implications of the Internet’s development and ICT are made even more
complex by specific features of its relationship with existing laws, regulatory
framework, and the ideas that underpin them.
The
Malaysian Communications and Multimedia Commission MCMC was created pursuant to
the Malaysian Communications and Multimedia Commission Act (1998) as a new
regulator for the communications and multimedia industry in Malaysia.
The deputy minister also urged bloggers
to exercise caution in
their blog entries, and to refrain from
insulting the country as well as its rulers.
"The alternative media is no
longer "alternative", in fact it has become the preferred media among
the public now. Since the government does not intend to censor internet
content, bloggers and internet users must exercise caution," said Salang.
Source: www.mmail.com.my
What do you think of this statement?
Does Malaysia actually censor Internet content? Should the government apply
censorship in this new media? Discuss.
The
Communications and Multimedia Act is a cyber law set up by the Malaysian
government to monitor communication and the multimedia industry.
The
majority of the population in developing countries still do not have access to
new media technologies.
The
digital divide gap is not only caused by material resources, but it also involves
other factors such as temporal resources (having the time to use new media),
mental resources (sufficient technical knowledge), social resources (network
and ties), and cultural resources (the status and other cultural rewards to
motivate people to get access).
The
digital divide is also detected in Malaysia especially in the rural areas.
Electronic
transaction usually leave data trails and the potential of privacy invasion is
huge.
One of
the main concerns of privacy issues is identity theft.
Legal
framework for the protection of privacy consists three parts, namely national
legislation, international legislation and treaties, and codes of conduct and
professional codes.
In the
information technology sector, women make up only small percentages of
managerial, maintenance, and design personnel in networks, operating systems,
or software.
The
gap to ICT access between gender exists, especially in older age groups, and in
areas of newer technologies.
Access
to ICT for disabled people has been incorporated as one of the clauses in the
Convention on the Protection and Promotion of the Rights and Dignity of Persons
with Disabilities, which was adopted by the United Nations (UN)
in 2006.
Censorship
Digital divide
Legislation
Privacy
Security
Self-regulation
1. List all legal and ethical issues
related to the new media technology.
2. Explain the importance of
Communication and Multimedia Act 1998 to the new media technology industry in
the Malaysian context.
3. What is meant by digital divide?
4. Discuss the advantages and the
disadvantages of open source to public / users.
1. There are several ways to protect
the privacy of our information. List and explain each of it.
2. Restriction and censorship of information will always be a
controversial issue. Explain the reasons.
No comments:
Post a Comment