The Success Of A Nation's Soccer Team: A Bellwether Regarding A Nation's Electronic Information Infrastructure, The Legal Regulations That Govern The Infrastructure, The Resulting Citizen-Trust In Its Government And Its E-Readiness In Nigeria, The DPRK, China, Japan, South Korea, The Netherlands And The United States Page: 507
67 p.View a full description of this article.
Extracted Text
The following text was automatically extracted from the image on this page using optical character recognition software:
THE SUCCESS OF A NATION'S SOCCER TEAM
numerous Chinese citizens may be arrested for posting something to the internet
or reading a forbidden site that the Chinese government was unable to censor,
even though they may not even be aware that they have violated a regulation.
Amnesty International ("AI") claims the Chinese government maintains the
world's largest prison for those who violate electronic technology regulations.273
AI further alleges that it has documentation of more than fifty individuals who
are imprisoned in China for posting messages on the internet that are offensive
or threatening to the Chinese government. One individual subjected to such
imprisonment in China, named Huang Qi, set up a web site that discussed some
content that was deemed threatening to the Chinese government.275 He was
arrested by the Ministry of Information Industry, otherwise known as the "great
firewall of China," in June of 2000.276 Following his secretive trial, Huang Qi
was sentenced to five years in prison in May of 2003.277
F. Effect of Chinese Eli and Its Regulations
The negative effect on China's EII is beginning to be manifested as the
Chinese government eschews open relationships with private businesses, and
then fails to comply with contractual agreements. For example, China has
tenuously agreed to arms-length business relationships with Microsoft,
Facebook, and Google as long as Microsoft will open its source code, and
278
Facebook and Google agree to certain censorship requests. It has also become
apparent that, after agreeing to perform business with Google, the Chinese
government directed domestic hackers to trespass the Google infrastructure and
hack their site.279 One of the wikileaks cables released in December of 2010
revealed an allegation by a United States Embassy source in Beijing that the
attacks against Google were ordered by the Politburo, the governing group of
China's Communist Party.280 Growing evidence also suggests that the Chinese
government has also intentionally hacked into many sensitive servers in the
United States.281 Some of these web violations redirected large volumes of
internet traffic, such as secretive communications of the United States armed
service, away from their directed targets and into the hands of members of the
Chinese government.282 These types of cyber-attacks, coupled with vague
273. Id.
274. Id.
275. Id.
276. Id.
277. Id.
278. Loretta Chao & Owen Fletcher, Google Losing Ground in China, WALL ST. J., (March 31,
2011), http://online.wsj.com/article/SB10001424052748704530204576234693138486996.html.
279. Loretta Chao, China Touts Crackdown on Hackers, WALL ST. J., (Dec. 2, 2010)
http://online.wsj.com/article/SB10001424052748703865004575648302067137596.html.
280. Id
281. Id
282. Id2012]
507
Upcoming Pages
Here’s what’s next.
Search Inside
This article can be searched. Note: Results may vary based on the legibility of text within the document.
Tools / Downloads
Get a copy of this page or view the extracted text.
Citing and Sharing
Basic information for referencing this web page. We also provide extended guidance on usage rights, references, copying or embedding.
Reference the current page of this Article.
Helge, Kris. The Success Of A Nation's Soccer Team: A Bellwether Regarding A Nation's Electronic Information Infrastructure, The Legal Regulations That Govern The Infrastructure, The Resulting Citizen-Trust In Its Government And Its E-Readiness In Nigeria, The DPRK, China, Japan, South Korea, The Netherlands And The United States, article, December 1, 2012; [Highland Heights, Kentucky]. (https://digital.library.unt.edu/ark:/67531/metadc132979/m1/41/: accessed April 24, 2024), University of North Texas Libraries, UNT Digital Library, https://digital.library.unt.edu; .