Person: Palfrey, John
Loading...
Email Address
AA Acceptance Date
Birth Date
Research Projects
Organizational Units
Job Title
Last Name
Palfrey
First Name
John
Name
Palfrey, John
28 results
Search Results
Now showing 1 - 10 of 28
Publication Accountability and Transparency at ICANN: An Independent Review(2010) Gasser, Urs; Burkert, Herbert; Palfrey, John; Zittrain, JonathanPublication A Citizens’ Choice Framework for Net Neutrality(2010) Palfrey, JohnPublication Public Discourse in the Russian Blogosphere: Mapping RuNet Politics and Mobilization(2010) Etling, Bruce; Alexanyan, Karina; Kelly, John; Faris, Robert; Palfrey, John; Gasser, UrsWe analyzed Russian blogs to discover networks of discussion around politics and public affairs. Beginning with an initial set of over five million blogs, we used social network analysis to identify a highly active ‘Discussion Core’ of over 11,000. These were clustered according to long term patterns of citations within posts, and the resulting segmentation characterized through both automated and human content analysis. Key findings include: * Unlike their counterparts in the US and elsewhere, Russian bloggers prefer platforms that combine features typical of blogs with features of social network services (SNSs) like Facebook. Russian blogging is dominated by a handful of these “SNS hybrids.” * While the larger Russian blogosphere is highly divided according to platform, there is a central Discussion Core that contains the majority of political and public affairs discourse. This core is comprised mainly, though not exclusively, of blogs on the LiveJournal platform.Publication Internet Filtering in China 2004-2005(Harvard University, Harvard Law School, 2005) Zittrain, Jonathan; Palfrey, John; Deibert, Ronald; Rohozinski, Rafal; Villeneuve, Nart; Bambauer, DerekChina's Internet filtering regime is the most sophisticated effort of its kind in the world. Compared to similar efforts in other states, China's filtering regime is pervasive, sophisticated, and effective. It comprises multiple levels of legal regulation and technical control. It involves numerous state agencies and thousands of public and private personnel. It censors content transmitted through multiple methods, including Web pages, Web logs, on-line discussion forums, university bulletin board systems, and e-mail messages. Our testing found efforts to prevent access to a wide range of sensitive materials, from pornography to religious material to political dissent. We sought to determine the degree to which China filters sites on topics that the Chinese government finds sensitive, and found that the state does so extensively. Chinese citizens seeking access to Web sites containing content related to Taiwanese and Tibetan independence, Falun Gong, the Dalai Lama, the Tiananmen Square incident, opposition political parties, or a variety of anti-Communist movements will frequently find themselves blocked. Contrary to anecdote, we found that most major American media sites, such as CNN, MSNBC, and ABC, are generally available in China (though the BBC remains blocked). Moreover, most sites we tested in our global list's human rights and anonymizer categories are accessible as well. While it is difficult to describe this widespread filtering with precision, our research documents a system that imposes strong controls on its citizens' ability to view and to publish Internet content. This report was produced by the OpenNet Initiative, a partnership among the Advanced Network Research Group, Cambridge Security Programme at Cambridge University, the Citizen Lab at the Munk Centre for International Studies, University of Toronto, and the Berkman Center for Internet & Society at Harvard Law School.Publication 2010 Circumvention Tool Usage Report(2011-12-09) Roberts, Harold; Zuckerman, Ethan; York, Jillian C; Faris, Robert; Palfrey, JohnCircumvention tools allow users to bypass Internet filtering to access content otherwise blocked by governments, workplaces, schools, or even the blocked sites themselves. There are a number of different types of these tools: blocking-resistant tools, simple web proxies, virtual private network (VPN) services, and open HTTP/SOCKS proxies. But every type of circumvention tool provides the same basic functionality — proxying user connections to provide access to otherwise blocked sites. In the following report, we use a variety of methods to evaluate the usage of the first three of these four types of tools to test two hypotheses. First, even though much of the media attention on circumvention tools has been given to a handful of tools — notably Freegate, Ultrasurf, Tor, and Hotspot Shield — we find that these tools represent only a small portion of overall circumvention usage and that the attention paid to these tools has been disproportionate to their usage, especially when compared to the more widely used simple web proxies. Second, even when including the more widely-used simple web proxies, we find that overall usage of circumvention tools is still very small in proportion to the number of Internet users in countries with substantial national Internet filtering.Publication Political Change in the Digital Age: The Fragility and Promise of Online Organizing(John Hopkins University Press, 2010) Etling, Bruce; Faris, Robert; Palfrey, JohnWe conclude that policymakers and scholars that have been most optimistic about the impact of digital tools have over-emphasized the role of information, specifically access to alternative and independent sources of information and unfiltered access to the Internet. We argue, in contrast, that more attention should be paid to the means of overcoming the difficulties of online organization in the face of authoritarian governments in an increasingly digital geopolitical environment.Publication The Challenge of Developing Effective Public Policy on the Use of Social Media by Youth(Federal Communications Bar Association, Indiana University Maurer School of Law, 2010) Palfrey, JohnPublication Local Nets on a Global Network: Filtering and the Internet Governance Problem(NYU Press, 2010-08-05) Palfrey, JohnPublication Cornerstones of Law Libraries for an Era of Digital-Plus(2010) Palfrey, JohnPublication Youth, Creativity, and Copyright in the Digital Age(MIT Press, 2009) Palfrey, John; Gasser, Urs; Simun, Miriam; Barnes, Rosalie FayNew digital networked technologies enable users to participate in the consumption, distribution, and creation of content in ways that are revolutionary for both culture and industry. As a result, "Digital Natives"—young people growing up in the digital world with access to the technologies and the skills to use them in sophisticated ways—are now confronting copyright law on a regular basis. This article presents qualitative research conducted with students age 12-22 that explores youth understanding, attitudes, and discourse on the topic of digital creativity and copyright law. Our findings suggest that young people operate in the digital realm overwhelmingly ignorant of the rights, and to a lesser degree the restrictions, established in copyright law. They often engage in unlawful behavior, such as illegal peer-to-peer music downloading, yet they nevertheless demonstrate an interest in the rights and livelihoods of creators. Building upon our findings of the disconnect between technical, legal, and social norms as pertaining to copyright law, we present the initial stages of the development of an educational intervention that posits students as creators: the Creative Rights copyright curriculum. Educating youth about copyright law is important for empowering young people as actors in society, both in terms of their ability to contribute to cultural knowledge with creative practices and to engage with the laws that govern society.
- «
- 1 (current)
- 2
- 3
- »