Covert censorship in libraries: a discussion paper
نویسنده
چکیده
Librarians, through their professional associations, have long been committed to the social justice principle of free access to information. External censorship challenges to library collections threaten this principle overtly. However, censorship can also occur in libraries in various covert and often unconcious ways. This discussion paper raises concerns about current librarian practices and library processes which can effectively censor library collections from within. The paper concludes by highlighting specific areas of practice in which librarians need to be vigilant for such covert censorship.
منابع مشابه
Not Up for Discussion: Applying Lukes’ Power Model to the Study of Health System Corruption; Comment on “We Need to Talk About Corruption in Health Systems”
This companion paper suggests the potential benefits of applying Steven Lukes’ dimensions of power model to the study of corruption in health systems. Lukes’ model sets out three “faces of power” classified by their influence on political discourse, resulting in overt, covert and latent discussion of issues depending on the degree of their alignment with the agenda of d...
متن کاملDNS-sly: Avoiding Censorship through Network Complexity
We design DNS-sly, a counter-censorship system which enables a covert channel between a DNS client and server. To achieve covertness and deniability in the upstream direction, DNS-sly applies user personalization, adapting to individual behaviors. In the downstream direction, it utilizes CDN-related DNS responses to embed data, while retaining statistical covertness. We show DNS-sly achieves do...
متن کاملPoster: Games Without Frontiers: Investigating Video Games as a Covert Channel
Censorship circumvention tools face an arms race as they work to evade increasingly motivated censors. Tools which have distinctive features can be detected and blocked by censors (e.g., Tor is actively targeted by censors around the world). As a result, there is increasing interest in disguising censorship circumvention traffic as benign protocols. SkypeMorph [1] and StegoTorus [2] are two plu...
متن کاملDeltaShaper – Video Stream Synthesis for Internet Censorship Circumvention
Citizens living in countries ruled by repressive regimes may have access to rightful information blocked or may be prevented from sharing such information freely on the Internet. In spite of all efforts to hinder the transmission of potentially compromising data, even the most oppressive regimes cannot afford to block all channels with the outside world, as these may be instrumental to preserve...
متن کاملUnobservable Covert Streaming for Internet Censorship Circumvention
This work studies the possibility of using the encrypted video channel of widely used video-conferencing applications, such as Skype, as a carrier for an unobservable covert channel that can be used to access arbitrary information on the Internet. Such channel can be used by citizens living in countries ruled by repressive regimes to exert their civil rights without being detected and/or blocke...
متن کامل