Covert censorship in libraries: a discussion paper

نویسنده

  • Kim Moody
چکیده

Librarians, through their professional associations, have long been committed to the social justice principle of free access to information. External censorship challenges to library collections threaten this principle overtly. However, censorship can also occur in libraries in various covert and often unconcious ways. This discussion paper raises concerns about current librarian practices and library processes which can effectively censor library collections from within. The paper concludes by highlighting specific areas of practice in which librarians need to be vigilant for such covert censorship.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Not Up for Discussion: Applying Lukes’ Power Model to the Study of Health System Corruption; Comment on “We Need to Talk About Corruption in Health Systems”

This companion paper suggests the potential benefits of applying Steven Lukes’ dimensions of power model to the study of corruption in health systems. Lukes’ model sets out three “faces of power” classified by their influence on political discourse, resulting in overt, covert and latent discussion of issues depending on the degree of their alignment with the agenda of d...

متن کامل

DNS-sly: Avoiding Censorship through Network Complexity

We design DNS-sly, a counter-censorship system which enables a covert channel between a DNS client and server. To achieve covertness and deniability in the upstream direction, DNS-sly applies user personalization, adapting to individual behaviors. In the downstream direction, it utilizes CDN-related DNS responses to embed data, while retaining statistical covertness. We show DNS-sly achieves do...

متن کامل

Poster: Games Without Frontiers: Investigating Video Games as a Covert Channel

Censorship circumvention tools face an arms race as they work to evade increasingly motivated censors. Tools which have distinctive features can be detected and blocked by censors (e.g., Tor is actively targeted by censors around the world). As a result, there is increasing interest in disguising censorship circumvention traffic as benign protocols. SkypeMorph [1] and StegoTorus [2] are two plu...

متن کامل

DeltaShaper – Video Stream Synthesis for Internet Censorship Circumvention

Citizens living in countries ruled by repressive regimes may have access to rightful information blocked or may be prevented from sharing such information freely on the Internet. In spite of all efforts to hinder the transmission of potentially compromising data, even the most oppressive regimes cannot afford to block all channels with the outside world, as these may be instrumental to preserve...

متن کامل

Unobservable Covert Streaming for Internet Censorship Circumvention

This work studies the possibility of using the encrypted video channel of widely used video-conferencing applications, such as Skype, as a carrier for an unobservable covert channel that can be used to access arbitrary information on the Internet. Such channel can be used by citizens living in countries ruled by repressive regimes to exert their civil rights without being detected and/or blocke...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2006