Person:
Palfrey, John

Loading...
Profile Picture

Email Address

AA Acceptance Date

Birth Date

Research Projects

Organizational Units

Job Title

Last Name

Palfrey

First Name

John

Name

Palfrey, John

Search Results

Now showing 1 - 10 of 28
  • Thumbnail Image
    Publication
    Accountability and Transparency at ICANN: An Independent Review
    (2010) Gasser, Urs; Burkert, Herbert; Palfrey, John; Zittrain, Jonathan
  • Thumbnail Image
    Publication
    Public Discourse in the Russian Blogosphere: Mapping RuNet Politics and Mobilization
    (2010) Etling, Bruce; Alexanyan, Karina; Kelly, John; Faris, Robert; Palfrey, John; Gasser, Urs
    We analyzed Russian blogs to discover networks of discussion around politics and public affairs. Beginning with an initial set of over five million blogs, we used social network analysis to identify a highly active ‘Discussion Core’ of over 11,000. These were clustered according to long term patterns of citations within posts, and the resulting segmentation characterized through both automated and human content analysis. Key findings include: * Unlike their counterparts in the US and elsewhere, Russian bloggers prefer platforms that combine features typical of blogs with features of social network services (SNSs) like Facebook. Russian blogging is dominated by a handful of these “SNS hybrids.” * While the larger Russian blogosphere is highly divided according to platform, there is a central Discussion Core that contains the majority of political and public affairs discourse. This core is comprised mainly, though not exclusively, of blogs on the LiveJournal platform.
  • Thumbnail Image
    Publication
    Internet Filtering in China 2004-2005
    (Harvard University, Harvard Law School, 2005) Zittrain, Jonathan; Palfrey, John; Deibert, Ronald; Rohozinski, Rafal; Villeneuve, Nart; Bambauer, Derek
    China's Internet filtering regime is the most sophisticated effort of its kind in the world. Compared to similar efforts in other states, China's filtering regime is pervasive, sophisticated, and effective. It comprises multiple levels of legal regulation and technical control. It involves numerous state agencies and thousands of public and private personnel. It censors content transmitted through multiple methods, including Web pages, Web logs, on-line discussion forums, university bulletin board systems, and e-mail messages. Our testing found efforts to prevent access to a wide range of sensitive materials, from pornography to religious material to political dissent. We sought to determine the degree to which China filters sites on topics that the Chinese government finds sensitive, and found that the state does so extensively. Chinese citizens seeking access to Web sites containing content related to Taiwanese and Tibetan independence, Falun Gong, the Dalai Lama, the Tiananmen Square incident, opposition political parties, or a variety of anti-Communist movements will frequently find themselves blocked. Contrary to anecdote, we found that most major American media sites, such as CNN, MSNBC, and ABC, are generally available in China (though the BBC remains blocked). Moreover, most sites we tested in our global list's human rights and anonymizer categories are accessible as well. While it is difficult to describe this widespread filtering with precision, our research documents a system that imposes strong controls on its citizens' ability to view and to publish Internet content. This report was produced by the OpenNet Initiative, a partnership among the Advanced Network Research Group, Cambridge Security Programme at Cambridge University, the Citizen Lab at the Munk Centre for International Studies, University of Toronto, and the Berkman Center for Internet & Society at Harvard Law School.
  • Thumbnail Image
    Publication
    2010 Circumvention Tool Usage Report
    (2011-12-09) Roberts, Harold; Zuckerman, Ethan; York, Jillian C; Faris, Robert; Palfrey, John
    Circumvention tools allow users to bypass Internet filtering to access content otherwise blocked by governments, workplaces, schools, or even the blocked sites themselves. There are a number of different types of these tools: blocking-resistant tools, simple web proxies, virtual private network (VPN) services, and open HTTP/SOCKS proxies. But every type of circumvention tool provides the same basic functionality — proxying user connections to provide access to otherwise blocked sites. In the following report, we use a variety of methods to evaluate the usage of the first three of these four types of tools to test two hypotheses. First, even though much of the media attention on circumvention tools has been given to a handful of tools — notably Freegate, Ultrasurf, Tor, and Hotspot Shield — we find that these tools represent only a small portion of overall circumvention usage and that the attention paid to these tools has been disproportionate to their usage, especially when compared to the more widely used simple web proxies. Second, even when including the more widely-used simple web proxies, we find that overall usage of circumvention tools is still very small in proportion to the number of Internet users in countries with substantial national Internet filtering.
  • Thumbnail Image
    Publication
    Political Change in the Digital Age: The Fragility and Promise of Online Organizing
    (John Hopkins University Press, 2010) Etling, Bruce; Faris, Robert; Palfrey, John
    We conclude that policymakers and scholars that have been most optimistic about the impact of digital tools have over-emphasized the role of information, specifically access to alternative and independent sources of information and unfiltered access to the Internet. We argue, in contrast, that more attention should be paid to the means of overcoming the difficulties of online organization in the face of authoritarian governments in an increasingly digital geopolitical environment.
  • Thumbnail Image
    Publication
    The Challenge of Developing Effective Public Policy on the Use of Social Media by Youth
    (Federal Communications Bar Association, Indiana University Maurer School of Law, 2010) Palfrey, John
  • Thumbnail Image
    Publication
  • Thumbnail Image
    Publication
  • Thumbnail Image
    Publication
    Youth, Creativity, and Copyright in the Digital Age
    (MIT Press, 2009) Palfrey, John; Gasser, Urs; Simun, Miriam; Barnes, Rosalie Fay
    New digital networked technologies enable users to participate in the consumption, distribution, and creation of content in ways that are revolutionary for both culture and industry. As a result, "Digital Natives"—young people growing up in the digital world with access to the technologies and the skills to use them in sophisticated ways—are now confronting copyright law on a regular basis. This article presents qualitative research conducted with students age 12-22 that explores youth understanding, attitudes, and discourse on the topic of digital creativity and copyright law. Our findings suggest that young people operate in the digital realm overwhelmingly ignorant of the rights, and to a lesser degree the restrictions, established in copyright law. They often engage in unlawful behavior, such as illegal peer-to-peer music downloading, yet they nevertheless demonstrate an interest in the rights and livelihoods of creators. Building upon our findings of the disconnect between technical, legal, and social norms as pertaining to copyright law, we present the initial stages of the development of an educational intervention that posits students as creators: the Creative Rights copyright curriculum. Educating youth about copyright law is important for empowering young people as actors in society, both in terms of their ability to contribute to cultural knowledge with creative practices and to engage with the laws that govern society.