Views
Graph
Explorer
Focus
Down
Load 1 level
Load 2 levels
Load 3 levels
Load 4 levels
Load all levels
All
Dagre
Focus
Down
Load 1 level
Load 2 levels
Load 3 levels
Load 4 level
Load all levels
All
Tree
SpaceTree
Focus
Expanding
Load 1 level
Load 2 levels
Load 3 levels
Down
All
Down
Radial
Focus
Expanding
Load 1 level
Load 2 levels
Load 3 levels
Down
All
Down
Box
Focus
Expanding
Down
Up
All
Down
Page ✓
Article
Outline
Document
Down
All
Canvas
Time
Timeline
Calendar
Request email digest
Past 24 hours
Past 2 days
Past 3 days
Past week
Add
Add page
Add comment
Add citation
Edit
Edit page
Delete page
Share
Link
Bookmark
Embed
Social media
Login
Member login
Register now for a free account
🔎
Prohibitions may vary across cultures
Issue
1
#121815
The forms of expression that should be prohibited or limited may vary across different cultures.
CONTEXT
(Help)
-
London Conference on Cyberspace »
London Conference on Cyberspace
London Conference on Cyberspace☜The London Conference on Cyberspace – held at the Queen Elizabeth II Conference Centre on 1-2 November 2011 – launched a global dialogue to develop a better collective understanding of how to protect and preserve the tremendous opportunities that the development of cyberspace offers us all.☜F1CEB7
▲
Thematic debates »
Thematic debates
Thematic debates☜Thematic debates explored at the London Conference on Cyberspace.☜5CD992
▲
Safe and reliable access »
Safe and reliable access
Safe and reliable access☜How can safe and reliable access to cyberspace be assured?☜FFB597
▲
Freedom of expression »
Freedom of expression
Freedom of expression☜Exploring the issue of freedom of expression in cyberspace.☜FFB597
▲
Some forms of expression should be prohibited. »
Some forms of expression should be prohibited.
Some forms of expression should be prohibited.☜Some forms of expression should be prohibited in cyberspace☜59C6EF
▲
What forms of expression should be prohibited? »
What forms of expression should be prohibited?
What forms of expression should be prohibited?☜What forms of expression should be restricted in cyberspace?☜FFB597
■
Prohibitions may vary across cultures
Prohibitions may vary across cultures☜The forms of expression that should be prohibited or limited may vary across different cultures.☜FFB597
●
Cultural differences are no justificaiton for censorship »
Cultural differences are no justificaiton for censorship
Cultural differences are no justificaiton for censorship☜☜59C6EF
Heading
Summary
Click the button to enter task scheduling information
Open
Details
Enter task details
Message text
Select assignee(s)
Due date (click calendar)
RadDatePicker
RadDatePicker
Open the calendar popup.
Calendar
Title and navigation
Title and navigation
<<
<
November 2024
>
<<
November 2024
S
M
T
W
T
F
S
44
27
28
29
30
31
1
2
45
3
4
5
6
7
8
9
46
10
11
12
13
14
15
16
47
17
18
19
20
21
22
23
48
24
25
26
27
28
29
30
49
1
2
3
4
5
6
7
Reminder
No reminder
1 day before due
2 days before due
3 days before due
1 week before due
Ready to post
Copy to text
Enter
Cancel
Task assignment(s) have been emailed and cannot now be altered
Lock
Cancel
Save
Comment graphing options
Choose comments:
Comment only
Whole thread
All comments
Choose location:
To a new map
To this map
New map options
Select map ontology
Options
Standard (default) ontology
College debate ontology
Hypothesis ontology
Influence diagram ontology
Story ontology
Graph to private map
Cancel
Proceed
+Comments (
0
)
- Comments
Add a comment
Newest first
Oldest first
Show threads
+Citations (
1
)
- Citations
Add new citation
List by:
Citerank
Map
Link
[1]
LondonCyber: on the ways to counter treats posed to cybersecurity
Author:
Alexander Yakovenko - Ambassador of the Russian Federation to the UK
Cited by:
David Price
5:09 PM 29 October 2011 GMT
Citerank:
(8)
121539
International security
How can problems between states be prevented and managed?
8
FFB597
,
121541
Cyber crime
How can cyber crime be prevented and pursued more effectively?
8
FFB597
,
121770
Use of IT for politico-military goals
The use of information and telecommunication technologies for politico-military goals presents a threat to international security.
9
59C6EF
,
121774
Mutual notification of attacks
Sharing information about attempts of cyberattacks on infrastructures of critical units.
9
59C6EF
,
121775
Sharing information on best practices
9
59C6EF
,
121776
Joint pursuit of criminals
States need to co-operate in the joint pursuit of the perpetrators of cyberspace-based criminal activities.
9
59C6EF
,
121818
Use of IT for terrorist goals
The use of information and telecommunication technologies for terrorist goals presents a threat to international security.
9
59C6EF
,
121819
Use of IT for criminal activity
The use of information and telecommunication technologies for criminal activity presents a threat to international security.
9
59C6EF
URL:
http://rusemb.org.uk/article/109
Excerpt / Summary
It should, however, be recognized that these freedoms are not absolute. And this is not a contradiction. They may be naturally limited by cultural traditions that have been evolving for centuries in national cultures. Something normal for one culture may be unacceptable for another.
+About
- About
Entered by:-
David Price
NodeID:
#121815
Node type:
Issue
Entry date (GMT):
10/29/2011 5:07:00 PM
Last edit date (GMT):
10/29/2011 5:08:00 PM
Show other editors
Incoming cross-relations:
0
Outgoing cross-relations:
0
Average rating:
0
by
0
users
x
Select file to upload