Вы находитесь на странице: 1из 61

:

2012

. , . , . , .
.

:
[ ] / . . . . .:
, , 2012
, , ,
, .
,
,

.



117418 . ,
, 47, 1918
.: +7 495 956 9508
newmedia@nes.ru
http://www.newmediacenter.ru
http://www.nes.ru

This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivs 3.0 Unported License.
To view a copy of this license, visit http://creativecommons.org/licenses/by-nc-nd/3.0/ or send a letter to
Creative Commons, 444 Castro Street, Suite 900, Mountain View, California, 94041, USA.

14

25

32

36

45

49

15
,
. , , , .1
, , - .2
. . (2008) , 40,7
10 12 ( 1700
12 ) , , .3 57% 1511
,
, .4
, Yahoo!, 2011 , .
( /
[ ], / [-]), 36 10
12- . 45 13 17 .5 2010
, 7000 2800
14 , ,
.6 ,
-
(), 25 2009 2011 .
25000 . 14 ,
12 11 16 ,
, 10 , ,
, ,
- - .7
, 21 11 16
.8
, . ,
2010 436 ,
2012
, 1 2012
,


. ( / ..) , (, ) (, ).10 ,
, .11
.
, , , ,
. , -
: ;
,
;
, . , , ()
- (),
.12 ,
(FOSI) (GRID), :
, , ,

, , ,
.13


.9 ,
. , , .
: , , , , ,
, , , , , .
(,
), (, , ) (),
(, , ), /
(), () ( ).

, . ,
, , ,
, .
,
,
.
,

(, , , , ). 2.1.
, , :
-, ,
,
, . ,
,
. ,
,
.
-, , , ,
,
. , ,


. .

-,

. , (, , , , , , ),

, . ,
, ( , , , , , ),
.

,

KJM


,

KJM


,

, ,

DOCA

KJM


,

KJM


,

CIPA
, -

(, ,
)

,
,

, -


, -
-


,

,





, ,

2.1:

,
. 11 1992 ( 2006 ) / (
18 ), -. 33 , . / , , . 34
, /
, . , , , ,
[] . 31 , , .
, , - 36 - ,
18 .14 2010 , - ,
, .15
, ,
. . 2004

, , ,
, . , ,
, . 3 , ,

, , , ,
. 6 ( 363 364 ) ,
/ .16 2005 -

10

1:

1979
( 1997 ) ( 363-367). 152,
,
/ , . ,
152 153. , , , ,

363, .
364 , , .
364, ,
.
.18
ISC 2004
.
www.net.china.cn.
, , ,
. , ,
,
, , , , , , , ,
.
30.000 .19 , 2010 ,
,
, ,
.20
,
.
.21

11


. 19 11 , ,
, , , ,
, .17

, 2011 , (TIB) , 5651 . ,


- , , 138 . , ,
, , , , ,
, Verbot (). ,
(BTK) , 22
2011 .
, 28
2010 , / , - .
, - ,
. :
, , . , BTK
22 .
16 . ,
(- ),
: ,
, ,
, BTK. ,
, 22 .
, , , , , BTK . ,
,
. ,
.

3:
2000/375/JHA 29 2000 2004/68/
JHA 22 2003 . -, ,
.

12

2:

- ,
-,
.

, ,
,
,
.
.24
, , 2000/31/
( 44-46) ,
.25

13

,
, 2004/68/JHA.22
,
2010 , 2011 , 27 2011 .23 - .
2004/68/JHA,
,
.
( 19), , -
, , ,
( 21).
, , 21 :

, ,
-
.
, ( ).

, .

.

,
. ,
. :
, ; ,
, .
, ,
, . ,
,

, . ,
( , )
, ,
.
, ,
, , ,
. (,
, ),
( ).

14


, , ,
IP-, DNS (
) URL .26 IP- DNS, , . IP-
,
.27
,
. IP-
, , . , ,
.28 DNS
DNS , IP- . 29
DNS , IP-,
, , (, ). Bharti
IP- 0.0.0.0.30
DNS ,
, URL, . DNS : URL,
IP-, , URL
.31 , DNS - , IP- (
).32 , DNS
YouTube.33
URL ( ).
(Child
Sexual Abuse Anti-Distribution Filters CSAADF)
DNS , , , ,
, , , . - CSAADF , , .34

15

,
, , , ( , ).
, , , .

, ,
, , , - ( DNS - URL),
.38
, . IP, DNS URL . ,
CIRCAMP Cleanfeed , .39
, , IP-, / URL. , ,
-, Facebook
AOL, .40 - (
) ,
100%.41



,
.
CIRCAMP DNS , Cleanfeed , ,
.42 , , ; ,
.43
Cleanfeed, CIRCAMP , .44
,
; -

16

URL , , - . ( IP-)
, ,
URL.35
( -),
.36 URL :
,
; ,
, , , , URL
. , IP DNS, , URL.37


,

, .48
, 2001-2003 ,
10-30% .49
2005-2006
Google and MSN, 685
AOL, MSN Yahoo!, 15 . , , ,
22,1 ,
Google, 23 , MSN. ,

1,1 .
7,6 ,
.50 Jugendschutz im Internet 2010 , ,
.
(befriedigend) , . .
[ ] .51 : ,
,
.
, , ,
, (FTP), IP- (VoIP).52 ,
,
, .53
,
, ,
.54

17

.45 ,


.46 , ,
, , .47


-,
( . ). , , ,55
20%, , ,
, .
, call-
. -
.
,
. ,56

12 90 ( 2003 .).
, , ,
, .
- ,
, .
.
e-intensity, BCG
,
: , , ,
.57 ,
, : -
.58
():
4
.
15 ; 16 ,
;
, 10 , -

18

. 1.

: , 2011.

* ,
, ,
.

- - - (6768% 29% 34%


)60
48%61,
. 2011 -

19

; , ,
30
.59

18 55 .
, 7%.62

20

,
, . BCG63, .
, .


.
-.
-. -,
. , -
,
, . 100 . 5,5 . .64
-, ,
( , )
.
-. , -, .
, . -,
( 10000 , .. 1%65 (. . 2),

21

. 2. 66

,
,
-.
, ,
.
, .
, , .
, . , , , ..
. ,

, ,
, . , , ,
, ,
, . , - .
:
, , , ..
.
.
,
,
, , ..
,
-.
, , , .
-, , , . ,
,
125.8 . .
( 2008 .
7,23 .68),
.
-, -
, . ,
e-readiness,
, ,
.69
-,
-, -.
2010 27
50 - . 2,6 / 1,8 /,

22

-
.67


, .71 Boston Consulting Group
$19,3 . ., 1,6% .
, ,

- , 2015 3,7% ( 5%
),
.72 -
. , ,
, - ,
.
,
. ,
,73 , , , , .

23

(. . 3). 80%
256 / 5 /.70

24

. 3. 50

, , - ,
. ,
, ,
( 1988 , 1978
2003 ),
- (ISP) .
2008 , .
,
. British Telecom, ,
, Cleanfeed,
(IWF), ( URL) -. , Cleanfeed
, , . , ,
. 2010
16 739 URL-
43 190 .
Freedom House , IWF 500 800
, OpenNet Initiative -- 800 1200.
IWF -,
. , ,
, , .
. URL-,
(, , ),
, . ,
, ( ), , URL-
. . ,
, IWF , -

25

, , Cleanfeed, ,
Ofcom Cleanfeed
. 2010 (MPA) British Telecom
Cleanfeed ,
BT 2011 .

. -, 1
2003 (Staatsvertrag ber den Schutz der Menschenwrde und den Jugendschutz
in Rundfunk und Telemedien JMStV). 4, ,
: ,
, -,
, , ,
.. 5 , ,
. (KJM)
JMStV, ,
. ,
(Bundesprfstelle fr Medien jugendgefhrende - BPjM).
-, JMStV, , 24 5 Jugendschutzgesetz (JuSchG).
-, 2009 ,
-
(ZugErschwG).
, (Bundeskriminalamt BKA) , IP- URL.
- -
, 10000 ,
, IP- URL-, -

26

. , ,
, , . IWF
/
, , .
INHOPE . IWF , , , - -,
- .

, ZugErschwG 23 2010
, BKA . ZugErschwG 2011
2012 . ZugErschwG,
, ,
URL-, IWF ( JMStV).

(FSM), ( INHOPE). -
( ).
, INHOPE
, , INHOPE .
, , BPjM,
-, FSM.
, , ,
, .
6, 1 2004-575 2004
, , , -, .
, .
- (AFA), 1997
, . 1998 AFA (Point de Contact), , , . 2004 AFA
.
(www.pointdecontact.net), , ,
,
,
.

27

-. ,

-. , , .


, . -,
, ,
, , , ,
, ,
, . -, (
) .
. ZugErschwG 2009 ,

, . .
, ,
. ,
- / . ,
.
- ,
-
, , , ,
. , Vodafone , 18+ Vodafone Live!
( ) ... - 18+.
, Internet Watch Foundation.

28

, : URL, . ,
, ,
URL INHOPE
.

-, . ,
. URL , , ,
. 2010 ,
, , , , , , , , .
, , , , , .
. , Cleanfeed, , , . IP-,
/ URL, ,
. (Other technical/pratical
drawbacks:URL blocking is increasingly difficult to implement as the number of users
grow; it is inefficient in proceeding against a certain type of content, say pornography,
while building a blacklist of URLs is labour-intensive.)
, , .
, IWF -- , ,
Cleanfeed -- , ,
, . , ; , .
-; . . Cleanfeed
, . ,
-
. , , ,
.
, , . , 2008 IWF , heavy-metal
Scorpions, , .
, - IWF -

29

.
,

.
URL , , , DNS , , ,
. (IP
).

30

. , 2000-
, , /
, . CM / Rec (2009) 5 -
, - 2009 , - - 10
. , , ZugErschwG
. , .

/
?

,
(ZugErschwG)

:
IWF,
(BT &
Cleanfeed)

:

(Eco, Jugendschutz,
FSM)

:

(Point de Contact)

; ,

,

,

,
,
,

,
,
,



; ;

,

/. IWF

;


;

;


;

URL

URL

URL

; ,

IWF.

; ,

.

; ,

Point de Contact.

31


, . ,
, .
. .
- .
(World Wide Web Consortium W3C), ,
(CDA) 1995/6 , (PICS).74
.
, , , , . -, RSACi
( ), SafeSurf.75 , , , ,
SafeSurf. , . -,
. ,
.
Microsystems PICS
1996 , Netscape Microsoft
PICS . RSACi Internet
Explorer 3-6 Netscape 4.5.76 CDA,
1997 , PICS . ; .
, ,

32

, CDA
, PICS
.
, W3C,
, PICS.77
Bertelsmann Stiftung
()
(ICRA), RSACi,
PICS. 2000,
2005 2008 .78 , .
,

, , . (
, ).79
. ,
. ,
PICS, ICRA .
, , 10.000 .
, ICRA, .
,
. . Google, , ,
. ,
, .
: , , , ..,
?

33

PICS. PICS
: (
, 120.000), ,
HTTP, HTML -
,
. :

PICS, RSACi ICRA


. PICS
W3C (POWDER). PICS
POWDER .81 ,
POWDER , W3C
2009 . POWDER ,
, , , , , .82 Quatro Plus,
POWDER, , . i-Sieve, , , ,
-.83 Quatro Plus
, ,
, , , , , .84

(RTA), , (ASACP).
-,
.
, . , , .85
, IAJ MIC ,

, .

34

, ( RSACi), , ICRA. .
PICS:
, ; . ,
, 100% (.. ),
.
: .
ICRA,
.
ICRAplus 2005/6 , . 2008 .80

.
, ( ) . , PICS ICRA,
.
,

. , .
, RTA , ,
, .
. ICRA,

. , , ,
. ,
.90

35

, IAJ
, .86
SafetyOnline2, IAJ
0 4. ( 0
) , , .87 .
2009 NTT Communications
ONC Kids Care.
. .88 NTT Resonant Kids-goo , .89

,
/ .
.
, , .
, ,
. 2005 AFA
.91
: (Enfants),
(liste blanche); (adolescent),
,
, ,
; , , (adulte),
. / ,
.92
, .93 , ,
.94 PointSmart
2009 :
... ,
, , ,
;

, ,
, , .95

36

98/560/EC 1998
-, ,
.96
2006 , 2006/952/EC,
- ,
, , ,
, ,
. , .97
,
:
(SIAP) 1999-2004 ,
2004-08 2009-13 .98
SIAP - , ,
.99 ,
SIAP
,

( (Insafe), ),
, .100 ,
16 2008 , : ,
-
,
-, -,
, , .101
,
2010 ,
.102 , , , -

37

6.1

37 -.105 , ,

, 1 2011 . , : Apple, BSkyB,
BT, Dailymotion, Deutsche Telekom, Facebook, France Telecom - Orange, Google,
Hyves, KPN, Liberty Global, LG Electronics, Mediaset, Microsoft, Netlog, Nintendo,
Nokia, Opera Software, Research In Motion, RTL Group, Samsung, Sulake,
Telefonica, TeliaSonera, Telenor Group, Tuenti, Vivendi Vodafone.
2012 . :
,
,
( ), , ,
. , ( ),
2012 .106

- 2.0.
2009 ,
,
.107 - , , ,
, ,
, ,
,
,
, .
Google, Facebook, Bebo, DailyMotion, MySpace
Yahoo Europe.108

38

. 36 - - , 40
, - .103 -,
. - INHOPE -
, , , .104

, ,
.
, , ,
.
, , . , ,
.

6.2


. ,
, , -, - . , ,
,
.110
2001 .

39

2011 . -, , Arto, Bebo, Facebook, Giovani,


Hyves, IRC-Galleria, Myspace, Nasza-Klasa, Netlog, One, Rate, SchuelerVZ (Vznet
Netzwerke), Tuenti Zap. Dailymotion, Habbo Hotel,
Skyrock, Stardoll, Windows Live, Xbox Live ( ), Flickr, Yahoo! Pulse YouTube. , , ,
( ),
,
, ,
.109 , ,
.
. ,
, ;
, . , ,
, .

2004 Orange,
O2, T-Mobile, Virgin Mobile Vodafone .
. , 2008
, ,
. .114
2006
(CEOP). , , ,
( , ), , .115 , -
.116 ,
28 2011 , BT, Sky, TalkTalk Virgin
.
, ( ),
.117
KJM
-. KJM Selbstkontrolle Freiwillige der Filmwirtschaft (FSK) UnterhaltungsSoftware Selbstkontrolle (USK), ,
.118 , Freiwillige
Selbstkontrolle Multimedia-Diensteanbieter (FSM), 1997

.

40

, , . ,
, , , .111 , 1999 , 11
, , - (CHIS).
,
, ,
(UKCCIS)
2008 , .112 , , ,
.113

(ISPA) 2006 www.


cyertipline.com,
, .
2008 (. ). ISPA
,
, ,
, , .120
2004
.121 2009 .
: ,
( SchoolNet)
.
,
, , .122
, ,
, .
(NCECC) , , ,
. 123
NCECC , -.124
(IAJ) , 277 2001 (MIC)
, (METI).

41

, ,
JMStV. Google , Google.de .119
KJM, FSM
.

IAJ / , - .125

42


. , , (CGI.br),
1995 .
. CGI , SaferNet
, .126

, -
-,

.127 CGI.br, ,
, ,
. 2005 ,

, . 2008
Google SaferNet. Google
Orkut. ,
, ( 180 ),
. Google
, SaferNet
.128
- (ABRANET)
2007 , Cdigo De AutoRegulamentao De Operadores De Rede E De Servios Internet.
II, ,
, , , , , , ,
, , .
, ,
.
III, -

,

.
18:

,

-.
,
, .133
( 24) , , , .
77 (1) (ECT) 2002 ,
, . SAISPA .134
SAISPA ECT. 78 ECT, , ,
.
,
, .135

43

,
, , . , /
.129 - (ISPAI)
, 1998 ,
[] . ,

, -
. , ( 5.1).130
- (IISPA) 1996
.131 IISPA 2010/ 2011 . ,
,
.
, - .132
- (SAISPA) 17:

,
,
,
.
, -

.
10 , - URL,
.138 ISC
-,
[...] ,
-, [...] -,
[] - .139

44

, , ,
. ,
. - (ISC)
2001 , , ,
ISC .
, , ISC 170 ,
, , .
.136 ISC, , -,
2004 .137 9, :

, , .140
,
,
19 20 (ICCPR),141
19 , :
;
,
.142
10 (ECHR)
, II
, , , ,
.143 , , , .
, Jugendschutz.net
.144
2000- ,
/
,
. CM/Rec(2008)6

-,
-, , :
-
, , ,
, [] ,

45

,

10
II . .146 CM/
Rec(2009)5
, 2009 -, ,

10 .147
19 III , , , -, ,
, -, , , .148 , ,
.149
;
5651.
,
,
2011
.150

.


. , Google, Facebook Yahoo!, 18
-
.
, , .151
, ,
, .
, -

46


, 10
.145

, , , .158 ,


.159
.160
,

, .
(Google, Microsoft Yahoo!),
, ,

2008 (Global
Network Initiative GNI).161 . -, , ; -,
,
;
-,
/
.162 , [] ,
,

, , ,
.163
. ,

47

, , ,
.152 5651
, ,
. 2009 , , 5651, 2601, 433 ,
2008 , TIB .153
(), 2010 , 2009
3700 .154 2010
5000 .155 2011 ,
(Engelliweb.com), TIB 3027 , , 2735 ,
. .156 , .157

48

,
, ,
, .
, ( ) .164

, ,
, . ,
, ,
, . 20 , . ,
. , .


1.

. , , . .165
, , (2000),
, 242 .166 ( , ).
2. PICS ICRA
,
, 436.
, ,
, , : (
), ( -

49

3. 436 .169
, 100%
.
.
.170
. ,
, .
, , ,
.171 (
19[3] ICCPR) ,
436
, . 436 ,
. ,
? ,
, .
4.

, . ,
500 .
,
20%,
2-5%
.
, . IP
( 600
300 ),

50

)
. 436
. , , , , .

. , .167
() . ,

, , , ,
.168

5. ( )
, . ,
Internet Watch Foundation,
, 40 ,
1,5 , , .


,
,
, . ,
.174 ,
(2008) , , ,

.175 ,
, .176
, , , 2010 , UKCCIS,
. -
, ,
, .177 , 2008 2009 , . , PointSmart.ClickSafe
(ISFTF), , , , , , . ISFTF:
-, ,


.
, ,

51

, 1000 .172 URL , ,


10 IP .173

,
. , 2011 .179 , .180

, ,
.181 , , , ,
. , , , , .182 :

- ,
,
,
, .
, , , :
, ,
, .
,
.183
, ,
.184
, ,
.
Google, Kids Online ()
,

52

, ,
, .
-

.
,
,
, , .
, , , ,


.178

:
, ,

.187 , , , .
, 60 .188 , ,
.189
: , ,
, http://old.saferunet.ru/hotline/content.php/ http://hotline.
friendlyrunet.ru/?l=ru,
,
,
, 436.190
;
, .191
, , .192
, .
,
, , , .193 , , , .
.194
, .195
, , , .
-,
Google, .196
, . , , , ,
.197

53

, .185
.

.186

- . Kids Online,
,
, , . . , ,
,
, , .201 - , Kids Online, , .

54

.

. Google,


.198 ,
,
, , .
, Google () Yandex (
) (Google ) . YouTube ( )
.199 ,
, ,
( ),
, ,
.

.200



436 , . , , , , .
, , ,
, , , , , ,
, .
,
-.

,
, , , ,
, .

55

1 .: D. Boyd & H. Jenkins, Myspace and Deleting


Online Predators Act (DOPA), MIT Tech Talk, May 2006.
URL: http://www.danah.org/papers/MySpaceDOPA.html;
J. Wolak, D. Finkelhor, K. Mitchell, M. Ybarra, Online
Predators and Their Victims, American Psychologist,
63/2 (2008), pp. 111-28; U.S. Department of Health and
Human Services, Fourth National Incidence Study of Child
Abuse and Neglect (NIS-4): Report to Congress, 2010.
( : 5.01.2012)
URL:http://www.acf.hhs.gov/programs/opre/abuse_neglect/
natl_incid/nis4_report_congress_full_pdf_jan2010.Pdf; S.
Wastler, The Harm in Sexting?: Analyzing the Constitutionality of Child Pornography Statutes That Prohibit the
Voluntary Production, Possession, and Dissemination of
Sexually Explicit Images by Teenagers, Harvard Journal of
Law & Gender, 33/2 (2010), pp. 687-702. ( :
8.01.2012)
URL: http://www.law.harvard.edu/students/orgs/jlg/
vol332/687-702.pdf ( : 8.01.2012)
2 .: F. Lazarinis, Online risks obstructing safe Internet
access for students, The Electronic Library, 28/1 (2010), pp.
157-70 (esp. pp. 160-4); U. Gasser, C. Maclay, J. Palfrey,
Working Towards a Deeper Understanding of Digital Safety
for Children and Young People in Developing Nations,
Berkman Center for Internet and Society at Harvard University/UNICEF, June 16, 2010, pp. 16-25. URL: http://
cyber.law.harvard.edu/sites/cyber.law.harvard.edu/files/Gasser_Maclay_Palfrey_Digital_Safety_Developing_Nations_
Jun2010.pdf ( : 16.12.2011)
3 M. Valcke, T. Schellens, H. Van Keer, M. Gerarts, Primary
school childrens safe and unsafe use of the Internet at home
and at school, Computers in Human Behavior, 23 (2007), p.
2844
4 S. Livingstone & M. Bober, UK Children Go Online: Surveying the Experiences of Young People and Their Parents,
London, 2004.
URL: http://eprints.lse.ac.uk/395/1/UKCGOsurveyreport.pdf
( : 27.12.2011)
. : S. Livingstone, M. Bober, E.J. Helsper, Internet
Literacy Among Children and Young People: Findings From
the UK Children Go Online Project, London, 2005.
URL: http://eprints.lse.ac.uk/397/1/UKCGOonlineLiteracy.
pdf. ( : 27.12.2011)
, (2005) ,
( 1257
9- 19- )
(. 21).
5 Yahoo! 2011 Online Safety Survey, October 2011.
URL: http://epsolution.zenfs.com/wpprod/14/2011/10/
Yahoo-2011-Online-Safety-Report_short-version.pdf (
: 28.12.2011)

6 Norton Online Family Report, 2010, pp. 3, 8.


Accessed 2/12/11 at: URL: http://us.norton.com/theme.
jsp?themeid=norton_online_family_report&inid=us_
hho_downloads_home_link_nofreport. ( :
2.12.2011) :
,
,
,
(SNS).
7 S. Livingstone, L. Haddon, A. Grzig, K. Olafsson, EU
Kids Online, September 2011, p. 22. URL: www2.lse.ac.uk/
media@lse/.../EU_Kids_FinalReport_Sept11.pdf (
: 5.12.2011)
8 , . 28-29.
9 : http://graph.document.
kremlin.ru/page.aspx?1;1538732 : http://www.
rg.ru/2010/12/31/deti-inform-dok.html
10 Communication on Illegal and Harmful Content 1996

,
,
.

. . : C. Walker & Y. Akdeniz, The
Governance of the Internet in Europe with Special Reference to Illegal and Harmful Content, Criminal Law Review,
December 1998, pp. 5-19.
11 Y. Akdeniz, Who Watches the Watchmen? The Role
of Filtering Software in Internet Content Regulation, in
Organization for Security and Co-Operation in Europe,
Representative on Freedom of the Media ed., The Media
Freedom Internet Cookbook (Vienna, 2004), pp. 101-25.
J. Iannotta, Nontechnical strategies to reduce childrens
exposure to inappropriate material on the internet. Summary
of a Workshop (Washington, 2001); M. Valcke, B. De Wever,
H. Van Keer, T. Schellens, Long-term study of safe Internet
use of young children, Computers & Education, 57 (2011),
p. 1294.
12 Valcke et al (2007), p. 2839. Valcke et al (2011), p. 1298;
S. Livingstone & L. Haddon, Risky Experiences for Children Online: Charting European Research on Children and
the Internet, Children & Society, 22/4 (2008), pp. 314-23.
13 Family Online Safety Institute (FOSI) & Global Resource
and Information Directory (GRID), Family State of Online
Safety Report, 2011, p. 56.
URL: http://www.nominettrust.org.uk/sites/default/files/
SOSR_Web.pdf ( : 27.11.2011)
14 URL: http://www.npc.gov.cn/englishnpc/Law/200712/12/content_1383869.htm; http://www.china.org.cn/english/government/207411.htm ( : 8.12.2011).
15 L. Yuxiao, The course of building the legal system for
the Internet in China, China.org.cn.
URL: http://www.china.org.cn/business/2010internetfo
rum/2010-11/08/content_21296546.htm ( :
8.12.2011)
16 ;
URL: http://www.icclr.law.ubc.ca/china_ccprcp/files/Presentations%20and%20Publications/47%20The%20Current%20
Situation%20of%20Cybercrime%20in%20China_English.
pdf ( : 8.12.2011).
17URL: http://www.cecc.gov/pages/virtualAcad/index.
phpd?showsingle=24396 ( : 8.12.2011).
18 URL: http://www.npc.gov.cn/englishnpc/Law/200712/13/content_1384075.htm ( : 8.12.2011).

56

41 Ofcom, p. 39ff.
42 D. Bambauer, Cybersieves, Duke Law Journal, 59/3
(2009), p. 477; D.C. Nunziato, How (not) to censor:
procedural first amendment values and Internet censorship
worldwide, Georgetown Journal of International Law, 42
(2011), pp. 1136-41, 1149, 1154, 1156; Stalla-Bourdillon,
p. 290. , , ,

: Transparent government regulation that
follows well-defined legal procedures is offset by reduced
effectiveness in preventing users from being aware of and
accessing sensitive content online (. 177).
43 C. Marsden, Net Neutrality: Towards a Co-regulatory
Solution (London, 2010). URL: http://papers.ssrn.com/sol3/
papers.cfm?abstract_id=1533428&download=yes (
: 11.12.2011); C. Ahlert, C. Marsden, C. Yung,
How liberty disappeared from Cyberspace: the mystery
shopper tests Internet content self-regulation, 2004, p. 2.
URL: http://pcmlp.socleg.ox.ac.uk/sites/pcmlp.socleg.ox.ac.
uk/files/liberty.pdf( : 11.12.2011).
44 McIntyre, p. 15.
45 , , ,
, ,
, ,
. . : M. Mueller, Networks and
States: The Global Politics of Internet Governance (Cambridge, 2010).
46 Akdeniz (2010), pp. 265-6, 269; Nunziato, p. 1155;
Stalla-Bourdillon, p. 290; R. Deibert & N. Villeneuve, Firewalls and Power: An Overview of Global State Censorship
of the Internet, in A. Murray, M. Klang (eds), Human Rights
in the Digital Age (London, 2005), pp. 123-4.
47 McIntyre, pp. 13-4.
48 Akdeniz (2010), p. 270.
49 C. Hunter, Internet Filter Effectiveness: Testing Over and
Underinclusive Blocking Decisions of Four Popular Filters,
Social Science Computer Review, 18/2 (2000), pp. 214-22;
K. Mitchell, D. Finkelhor, J. Wolak, The Exposure of Youth
to Unwanted Sexual Material On the
Internet: A National Survey of Risk, Impact, and Prevention,
Youth and Society, 34/3 (2003), pp. 330-58; P. Greenfield,
P. Rickwood, H. Tran, Effectiveness of Internet Filtering
Software Products. CSIRO Mathematical and Information Sciences, 2001. URL: http://pandora.nla.gov.au/
pan/53049/20051005-0000/www.aba.gov.au/newspubs/documents/filtereffectiveness.pdf ( : 7.01.2012).
50 P.B. Stark, The Effectiveness of Internet Content Filters,
2007, pp. 12-4. URL: http://statistics.berkeley.edu/~stark/
Preprints/filter07.pdf ( : 9.01.2012).
51 Jugendschutz.net, Jugendschutz im Internet. Ergebnisse
der Recherchen und Kontrollen. Bericht 2010, p. 15. URL:
http://www.jugendschutz.net/pdf/bericht2010.pdf (
: 30.11.2011).
52 Akdeniz (2004), pp. 112-13; Akdeniz (2010), p. 270;
Faris, Wang, Palfrey, p. 165.
53 See: M. Kerr & H. Stattin. What Parents Know, How
They Know it, and Several Forms of Adolescent Adjustment: Further Support for a Reinterpretation of Monitoring,
Developmental Psychology, 36/3 (2000), pp. 366-80; T.
Rooney, Trusting Children: How Do Surveillance Technologies Alter a Childs Experience of Trust, Risk, and Responsibility, Surveillance & Society, 7, 3/4 (2010), pp. 344-55.
URL:http://www.surveillance-and-society.org/ojs/index.php/
journal/article/view/trust/0 ( : 10.01.2012).;
G. Marx & V. Steeves, From the Beginning: Children as

57

19 URL: http://ciirc.china.cn/about/txt/2006-06/08/content_124005.htm ( : 8.12.2011).


20 State Council Information Office, The Internet in China.
URL: http://www.china.org.cn/government/whitepaper/
node_7093508.htm ( : 8.12.2011)..
. Basic Principles and Practices of Internet
Administration, URL: http://www.china.org.cn/government/whitepaper/2010-06/08/content_20207983.htm (
8.12.2011).
21 .
22 URL: http://www.ispai.ie/docs/cepdir.pdf (
: 6.12.2011).

: URL: http://www.statewatch.org/news/2011/
jun/eu-council-sexual-exploitation-1st-reading-analysis-11987-11.pdf ( : 6.12.2011).
23 URL: http://europa.eu/rapid/pressReleasesAction.do?refer
ence=IP/11/1255&format=HTML&aged=0&language=EN&
guiLanguage=en ( : 6.12.2011).
24 URL: http://www.statewatch.org/news/2011/jun/eucouncil-sexual-exploitation-1st-reading-analysis-11987-11.
pdf ( : 6.12.2011).
25URL: http://eur-lex.europa.eu/LexUriServ/LexUriServ.do?
uri=OJ:L:2000:178:0001:0016:EN:PDF ( :
6.12.2011).
26 . .
27 S.J. Murdoch & R. Anderson, Tools and Technology
of Internet Filtering, in R. Deibert et al, Access Denied, p.
59ff; V. Varadharajan, Internet filtering Issues and Challenges, IEEE Security and Privacy (July/August 2010), pp.
62-3.
28 R. Faris & N. Villeneuve, Measuring Global Internet
Filtering, in R. Deibert et al (eds.), Access Denied, pp. 13-4;
Murdoch & Anderson, p. 66; Varadharajan, p. 63.
29 Zittrain & Palfrey, p. 37. Murdoch & Anderson, p. 60ff;
Varadharajan, p. 63.
30 Faris & Villeneuve, p. 14.
31 Varadharajan, p. 63.
32 Murdoch & Anderson, p. 66.
33 Palfrey (2010), pp. 10-1; J. Veron Ferraz et al, pp. 2, 45,
47-9.
34 McIntyre, p. 8; Akdeniz (2010), p. 270.
35 Faris & Villeneuve, p. 15; Zittrain & Palfrey, pp. 36-7, 48;
S. Murdoch, R. Clayton, R.N.M. Watson, Ignoring the Great
Firewall of China, I/S. A Journal of Law and Policy for the
Information Society, 3/2 (2007), pp. 272-96; Varadharajan,
p. 63.
36 Ibid, pp. 63-4.
37 Palfrey (2010), p. 11; Zittrain & Palfrey, pp. 33-4; Murdoch & Anderson, p. 68.
38 Ibid, pp. 67-8; P. Esselaar, What ISPs can do about
undesirable content, ISPA, May 2008, p. 17ff. URL: http://
old.ispa.org.za/files/ISP_undesirable_content.pdf (
: 8.11.2011). Akdeniz (2004), p. 114; Palfrey
(2010), pp. 11-12; McIntyre, p. 20; Eneman, pp. 231-2;
Akdeniz (2010), pp. 263, 269; Zittrain & Palfrey, p. 34;
Ofcom, pp. 5-6, 8.
39 Cleanfeed

IP ,
,
HTTP .
-
(Varadharajan, p. 64).
40 McIntyre, p. 12; Murdoch & Anderson, p. 68.

81 URL: http://www.w3.org/2009/08/pics_superseded.html;
POWDER , .: http://www.w3.org/TR/powderdr/ ( : 4.01.2012).
82 URL: http://i-sieve.com/powder/; http://philarcher.org/
powder/ ( : 4.01.2012).
83 URL: http://www.quatro-project.org/home; http://isieve.com/contentfiltering/index.php ( :
4.01.2012); European Commission, Background Report on
Cross Media Rating and Classification, and Age Verification
Solutions, Safer Internet Forum, 25-26 September 2008, p.
14. URL: http://ec.europa.eu/information_society/activities/
sip/docs/pub_consult_age_rating_sns/reportageverification.
pdf ( : 4.01.2012).
84 URL: http://www.quatro-project.org/scope (
: 4.01.2012).
85 URL: http://www.rtalabel.org/ ( :
4.01.2012).
86 S.S. Lim, Regulatory Initiatives for Managing Online
Risks and Opportunities for Youths the East Asian Experience, manuscript, 2011. URL: http://www.ca-store.jp/
Default.aspx?sc_lang=ja-JP; and NetSTAR: http://www.netstar-inc.com/eng/index.html ( : 7.12.2011).
87 URL: http://www.nmda.or.jp/enc/rating/rating_standard.
html ( : 7.12.2011).
88URL: http://kidscare.ocn.ne.jp/. . : http://www.
japantoday.com/category/technology/view/ocn-provideschildren-with-safer-internet; http://www.ntt.com/csr_e/
report2011/data/st_ict.html ( : 5.12.2011).
NTT Com
.com KIDS LoiLo.
89 URL: http://www.ntt.com/csr_e/report2008/safety.html
( : 7.12.2011).
90 Cf. Archer, p. 22.
91 URL: www.afa-france.com/AccordAFAFamille.pdf (
: 5.12.2011).
92 URL: http://www.pointdecontact.net/protectiondelenfance.aspx#controle ( : 5.12.2011).
93 Y. Akdeniz, To Block or Not to Block: European
Approaches to Content Regulation, and Implications for
Freedom of Expression, Computer Law & Security Review,
26/3 (2010), p. 262; Valcke et al (2011), p. 1296; S. Kierkegaard, Cybering, online grooming and age-play, Computer
Law & Security Report, 24/1 (2008), p. 41.
94 Akdeniz (2004), pp. 118-9; Sophie Stalla-Bourdillon,
Chilling ISPs when private regulators act without
adequate public framework, Computer Law & Security
Review, 26/3 (2010), p. 290.
95 PointSmart.ClickSafe: Task Force Recommendations for
Best Practices for Online Safety and Literacy, July 2009,
pointsmart.org, p. ii. URL: http://www.pointsmartreport.org/
PointSmartReport.pdf ( : 28.12.2011).
96 URL: http://europa.eu/legislation_summaries/audiovisual_and_media/l24030b_en.htm ( :
6.12.2011).
97 URL: http://europa.eu/legislation_summaries/audiovisual_and_media/l24030a_en.htm;http://eur-lex.europa.eu/
LexUriServ/LexUriServ.do?uri=OJ:L:2006:378:0072:0077:E
N:PDF ( : 6.12.2011).
98 URL: http://eur-lex.europa.eu/LexUriServ/LexUriServ.
do?uri=CELEX:31999D0276:EN:HTML; Also on Safer
Internet plus program: http://eur-lex.europa.eu/LexUriServ/
LexUriServ.do?uri=CELEX:32005D0854:EN:NOT; on Safer
Internet program: http://eur-lex.europa.eu/LexUriServ/LexUriServ.do?uri=OJ:L:2008:348:0118:0127:EN:PDF (
: 6.12.2011).

58

Subjects and Agents of Surveillance, Surveillance & Society, 7, 3/4 (2010), pp. 192-230.
54 J. Nolan, K. Raynes-Goldie, M. McBride, The Stranger
Danger: Exploring Surveillance, Autonomy, and Privacy in
Childrens Use of Social Media, Canadian Children Journal,
36/2 (2011), pp. 24-32 (esp. pp. 29-31).
55 URL: http://www.acma.gov.au/webwr/_assets/main/
lib310554/isp-level_internet_content_filtering_trial-report.
pdf
56URL: http://www.inquisitr.com/17448/the-economic-costof-internet-censorship-in-australia/
57 BCG , . 15-19
58
59 http://fom.ru/blogs/10119#link1
60
61
62
63
64

URL: http://www.inquisitr.
com/17448/the-economic-cost-of-internet-censorship-inaustralia/
65 URL: http://www.abc.net.au/news/2008-10-24/the-highprice-of-internet-filtering/552148
66 .,
, Anti-Malware.ru, 17.10.11 URL: http://www.
anti-malware.ru/parental_control_test_2011#part1
67URL: http://techwiredau.com/2008/10/interview-withmark-newton-of-internode-re-australian-internet-filter/
68URL:http://www.inquisitr.com/17448/the-economic-costof-internet-censorship-in-australia/
69 URL: http://otago.ourarchive.ac.nz/bitstream/
handle/10523/1173/Peter_Brooking_Dissertation.
pdf?sequence=4
70URL: http://royal.pingdom.com/2010/11/12/real-connection-speeds-for-internet-users-across-the-world/
71 The growth machine, The Economist, May 16th
2002,Catch the wave, The Economist, Feb 18th
1999,Knowledge is power, The Economist, Sep 21st 2000,
First will be last, The Economist, Sep 26th 2002
72
( the
Boston Consulting Group), . 1-2
73 .
http://ria.ru/
society/20100528/239678643.html
74 URL: http://www.w3.org/PICS/ ( :
4.01.2012).
75 RSACi, .: W3C, Recreational Software Advisory
Council Launches Objective, Content-Labeling Advisory
System for the Internet, 28/2/96. URL: http://www.w3.org/
PICS/960228/RSACi.html ( : 4.01.2012).
76 P. Archer, ICRAFail. A Lesson For the Future, p.
4. URL: http://philarcher.org/icra/ICRAfail.pdf (
: 4.01.2012).
77 J.P. Kesan & R.C. Shah, Shaping Code, pp. 28-34
(quote: p. 34). URL: http://www.hks.harvard.edu/m-rcbg/
Conferences/rpp_rulemaking/Kesan_Shaping_code.pdf(
: 4.01.2012).
78 URL: http://ec.europa.eu/information_society/activities/
sip/projects/completed/filtering_content_labelling/filtering/
icrasafe/index_en.htm ( : 4.01.2012).
79 Archer, p. 4.
80 , . 4.

Home Office Task Force on Child Protection on the Internet,


Good practice guidance for the providers of social networking and other interactive services 2008. URL: http://www.
manchesterscb.org.uk/docs/Home%20Office%20Task%20
Force%20in%20CP%20on%20the%20Internet.pdf (
: 30.11.2011).
112 http://www.chis.org.uk/about (Accessed 30/11/11).
113 URL: http://www.education.gov.uk/ukccis/about (
: 30.11.2011).
114 Office of Communications, UK code of practice for
the self-regulation of news forms of content on mobiles.
Review, 11/8/08, p. 2. URL: http://stakeholders.ofcom.
org.uk/binaries/research/media-literacy/ukcode.pdf (
: 30.11.2011).
115 URL: http://ceop.police.uk/ ( :
30.11.2011).
116 URL: http://www.thinkuknow.co.uk/; http://ceop.police.
uk/About-Us/How-we-do-it/ ( : 30.11.2011).
117 UKCCIS, ISPs Launch New Code of Practice on Parental Controls, 1/11/11. URL: http://www.education.gov.uk/
ukccis/news/a00199819/isps-launch-new-code-of-practiceon-parental-controls ( : 30.11.2011).
118 KJM, Zwei neue Selbstkontrollen fr das Internet:
KJM erkennt FSK.online und USK.online an, 19/9/11.
URL:http://www.kjm-online.de/de/pub/aktuelles/pressemitteilungen/pressemitteilungen_2011/pm_152011.cfm (
: 29.11.2011).
119 Freedom House, Freedom on the Net 2011: Germany,
pp. 4-5. URL: http://www.freedomhouse.org/images/File/
FotN/Germany2011.pdf ( : 29.11.2011); R.
Faris, S. Wang, J. Palfrey, Censorship 2.0, Innovations,
Spring 2008, pp. 169-70.
120 URL: http://www.usispa.org/about-ussipa/foundingprinciples ( : 8.12.2011).
121 ECPAT, Global Monitoring Report on the Status of
Action Against Commercial Sexual Exploitation of Children. Canada,, 2006, p. 13. URL: http://www.ecpat.net/
A4A_2005/PDF/Americas/Global_Monitoring_ReportCANADA.pdf ( : 2.12.2011).
122 , c. 13.
123 , cc. 13, 15.
124 URL: http://www.cpc.gc.ca/en/canadian-internet-childexploitation-cicec ( : 2.12.2011).
125 URL: http://www.iajapan.org/index-en.html (
: 19.12.2011).
126 URL: http://www.cgi.br/; http://www.saferinternetday.
org/web/brazil/home/-/blogs/sid-2011:-brazilian-agenda-forsid-2011;jsessionid=637ACE4BA313B029DE3DF5BEF863
FA9B ( : 19.12.2011).
127URL: http://www.prsp.mpf.gov.br/noticias-prsp/crimesciberneticos ( : 19.12.2011).
128 Termo de Ajustamento de Conduta, URL: http://www.
prsp.mpf.gov.br/crimes-ciberneticos/TACgoogle.pdf (
: 19.12.2011).
129 URL: http://www.abranet.org.br/; http://www.abranet.
org.br/index.php?option=com_content&view=article&id
=54&Itemid=60; http://www.midiaindependente.org/pt/
blue/2008/07/424182.shtml ( : 19.12.2011).
130 URL: http://www.ispai.in/codeOfConduct.php (
: 12.12.2011).
131 URL: http://www.apjii.or.id/en/ ( :
17.12.2011).
132 URL: http://www.hivos.nl/esl/community/partner/50009010 ( : 8.12.2011).
133 URL: http://ispa.org.za/code-of-conduct/ (

59

99 URL: http://ec.europa.eu/information_society/activities/
sip/docs/prog_evaluation/comm_final_eval_siap_en.pdf
( : 6.12.2011).
100 European Commission, Proposal for a Decision of
the European Parliament and of the Council Establishing a
Multiannual Community Program on Protecting Children
Using the Internet and Other Communication Technologies,
27/2/2008, p. 3. URL: http://ec.europa.eu/information_society/activities/sip/docs/prog_2009_2013/decision_en.pdf
( : 6.12.2011); E. Peterson & G.W. Ulferts,
Government Control of Communications Technology,
International Business and Economics Research Journal, 8/9
(2009), p. 21.
101 URL: http://ec.europa.eu/information_society/activities/sip/policy/programme/current_prog/index_en.htm(
: 6.12.2011).
102 European Commission, A Digital Agenda for Europe,
26/8/2010 URL: http://eur-lex.europa.eu/LexUriServ/
LexUriServ.do?uri=COM:2010:0245:FIN:EN:PDF (
: 6.12.2011).
103 Action 36, URL: http://ec.europa.eu/information_society/newsroom/cf/fiche-dae.cfm?action_id=194&pillar_
id=45&action=Action%2036%3A%20Support%20reporting%20of%20illegal%20content%20online%20and%20
awareness%20campaigns%20on%20online%20safety%20
for%20;
Action 40: http://ec.europa.eu/information_society/
newsroom/cf/fiche-dae.cfm?action_id=198&pillar_
id=45&action=Action%2040%3A%20Member%20
States%20to%20implement%20harmful%20content%20
alert%20hotlines ( : 6.12.2011).
104 . . Safer Internet site: http://www.
saferinternet.org/web/guest/about-us ( :
6.12.2011).
105 Action 37, URL: http://ec.europa.eu/information_society/newsroom/cf/fiche-dae.cfm?action_id=195&pillar_
id=45&action=Action%2037%3A%20Foster%20self-regulation%20in%20the%20use%20online%20services (
: 6.12.2011).
106 Coalition to Make Internet a Safer Place for Children,
Statement of Purpose of the Coalition, 1/12/11. URL:
http://ec.europa.eu/information_society/activities/sip/docs/
ceo_coalition_statement.pd f ( : 6.12.2011).
107 Facebook MySpace
, . : C. Chang,
Internet Safety Survey: Who Will Protect the Children?,
Berkeley Technology Journal, 25 (2010), pp. 503-5.
108 Safer Networking Principles for the EU, 10/2/09.
URL: http://ec.europa.eu/information_society/activities/
social_networking/docs/sn_principles.pdf ( :
6.12.2011).
109 ,
,
.
:http://ec.europa.eu/information_society/
activities/social_networking/eu_action/implementation_princip_2011/index_en.htm
110 J. Zittrain & J. Palfrey, Reluctant Gatekeepers: Corporate Ethics on a Filtered Internet, in R. Deibert et al (eds.),
Access Denied: the Practice and Policy of Global Internet
Filtering (Cambridge, Mass., 2008), p. 106.
111 URL: http://webarchive.nationalarchives.gov.
uk/20100413151441/police.homeoffice.gov.uk/operationalpolicing/crime-disorder/child-protection-taskforce.html(
: 30.11.2011).

New Internet Rules Criticized, Washington Post, 1/8/11.


URL: http://www.washingtonpost.com/world/indias-newinternet-rules-criticized/2011/07/27/gIQA1zS2mI_story.
html ( : 18.10.2011); N. Ganapathy, New
Indian Net Censorship Law Draws Criticism, Asianewsnet.
net, 20/5/11 URL: http://www.asianewsnet.net/home/news.
php?id=19008&sec=1 ( : 18.10.2011)
152 Nunziato, pp. 1148-9.
153 Akdeniz, Report of the OSCE Representative, pp.
11-12.
154 Ibid, pp. 2, 13.
155 Freedom House, Freedom on the Net 2011: Turkey,
pp. 3-4.
156 Correspondence with Engelliweb.com, 19/10/11.
157 Blocking of useful sites and/or minority views: Akdeniz
(2004), pp. 111-12.
158 Ibid, pp. 108-9, 115-18.
159 M. Eneman, Internet Service Provider (ISP) filtering of Child-Abusive Material: A Critical Reflection of Its
Effectiveness, Journal of Sexual Aggression, 16/2 (2010),
pp. 224-5, 234.
. : S. Kierkegaard, To Block or Not to Block
European Child Porno Law in Question, Computer Law
and Security Review, 27 (2011), p. 573-84 (esp. pp. 581ff,
583-4).
160 Nunziato, pp. 1145-6; UN Human Rights Council, 2011.
161 . GNI.
URL: http://www.globalnetworkinitiative.org/corecommitments/index.php ( : 30.11.2011).
162 Nunziato, pp. 1128-9. See also: Ofcom, pp. 7-8; UN
Human Rights Council, 2011.
163 McIntyre, p. 21.
164 S.R. Morrison, What the Cops Cant Do, Internet
Service Providers Can: Preserving Privacy in Email Contents, SSRN eLibrary, 2011. URL: http://papers.ssrn.com/
sol3/papers.cfm?abstract_id=1729000 ( :
9.01.2012).
165 Akdeniz (2004), pp. 101-2; Kierkegaard (2008), pp.
41-2; Valcke et al (2011), p. 1296.
166 URL: http://treaties.un.org/Pages/ViewDetails.aspx?src=TREATY&mtdsg_no=IV-11c&chapter=4&lang=en; http://www2.ohchr.org/english/law/
crc-sale.htm; Article 242: http://www.consultant.ru/popular/
ukrf/10_35.html#p4224 ( : 7.01.2012).
167 J. Varon Ferraz et al, p. 49.
168 RAEK,
29 2010 . 436-
,
, 22/9/11. URL: http://raec.ru/times/
detail/761/ ( : 10.01.2012).
169 , :
R. Deibert & R. Rohozinski, Control and Subversion in
Russian Cyberspace, in R. Deibert et al (eds), Access Controlled, pp. 22ff, 26.
170 Prime,
, 2/11/11. URL:
http://www.1prime.ru/news/pressreleases/106/%7B06878E60-829F-4814-AE2D0BD3FB3C9FB6%7D.uif ( : 7.01.2012).
171 . , p. @@@.
172 J. Parry, M. Gorton et al, Internet content filtering. A
Report to DCITA, 4 April 2003, Project number CLJ29,
Version 1.0.
173 N. Villeneuve, Why Block by IP address?, 14 February 2005. URL: http://www.nartv.org/2005/02/14/why-block-

60

: 8.12.2011).
134 URL: http://ispa.org.za/code-of-conduct/request-a-takedown/ ( : 8.12.2011).
135 URL: http://www.info.gov.za/view/
DownloadFileAction?id=68060 ( :
8.12.2011).
136 URL:http://www.isc.org.cn/ ( :
8.12.2011).
137URL: http://www.isc.org.cn/english/Specails/Self-regulation/listinfo-15321.html ( : 8.12.2011).
138 .
139 http://www.gov.cn/english/2010-06/08/content_1622956_6.htm
140 Deibert & Villeneuve (2005), pp. 122-3; M. Eneman,
The New Face of Child Pornography, in A. Murray & M.
Klang (eds), Human Rights in the Digital Age, pp. 32ff,
37-9; R. Wong, Privacy: Charting its Developments and
Prospects, in A. Murray & M. Klang (eds), Human Rights
In the Digital Age, p. 147-61; M. Rundle & M. Birdling,
Filtering and the International System: A Question of Commitment, in R.Deibert et al (eds), Access Denied, p. 77ff;
Zittrain & Palfrey, p. 44ff.
141URL: http://www2.ohchr.org/english/law/ccpr.htm (
: 8.01.2012).
142URL: http://www.un.org/en/documents/udhr/index.
shtml#a19 ( : 8.01.2012).
143 URL: http://www.hri.org/docs/ECHR50.html (
: 8.01.2012).
144 URL: http://www.jugendschutz.net/rechtsextremismus/
( : 22.11.2011).
145URL: https://wcd.coe.int/ViewDoc.jsp?id=1266285 (
: 8.01.2012).
146 Akdeniz (2010), p. 268.
147 URL: https://wcd.coe.int/ViewDoc.
jsp?id=1470045&Site=CM ( : 8.01.2012).
148 URL: http://www2.ohchr.org/english/law/ccpr.htm (
: 8.01.2012).
149 Zittrain & Palfrey, p. 45
150 . : Reporters Without Borders,
Online Censorship Now Bordering on the Ridiculous in
Turkey, 29/4/11 URL: http://en.rsf.org/turkey-onlinecensorship-now-bordering-on-29-04-2011,40194.html
( : 11.10.2011); OSCE, Internet Filtering
and Changes to Press Law Further Limit Media Freedom
in Turkey, 17/5/11; M. Celikkafa & S.A. Diehn, Internet
Filter in Turkey Sparks Fears of Censorship, Deutsche
Welle, 21/11/11. URL: http://www.dw-world.de/dw/article/0,,15543036,00.html ( : 22.11.2011); S.
Ayhan, There is No Internet Censorship; However OneMillion Websites are Banned, Milliyet, 23/5/11. URL:
http://cyberlaw.org.uk/category/turkey/ ( :
22.11.2011).
151 S. Sengupta, Indias Courts Grapple With Web Censorship, New York Times, 14 January 2012. URL: http://
india.blogs.nytimes.com/2012/01/14/indias-courts-grapplewith-web-censorship/ ( : 15.01.2012); H.
Timmons, India Asks Google, Facebook to Screen User
Content, New York Times, 5 December 2011. URL: http://
india.blogs.nytimes.com/2011/12/05/india-asks-googlefacebook-others-to-screen-user-content/ ( :
5.01.2012).
. : K. Tanna, Internet Censorship in India: Is It
Necessary and Does It Work? 2004. URL: http://www.
ketan.net/INTERNET_CENSORSHIP_IN_INDIA.html
( : 18.10.2011); R. Lakshmi, Indias

196 L.T. Musielak, Google-ing China: An ethical analysis


of Googles censoring activities in the Peoples Republic,
undated. URL: http://snl.depaul.edu/writing/Googleing%20
China.pdf; Faris, Wang, Palfrey, p. 169ff; Google
: M. Mellody, The Ethics of
Google in China, 18 April 2010. URL: http://ethics.davidson.edu/wp-content/uploads/2010/01/Mellody-on-Google-inChina.pdf ( : 11.01.2012).
197 Lim, p. 5. ,

: Palfrey (2010), p.
14ff.
198 URL: http://www.google.com/transparencyreport/ (
: 11.01.2012).
199 Google SafeSearch URL: http://www.google.ru/familysafety/tools.html; YouTube URL: http://support.google.
com/youtube/bin/request.py?hl=en&contact_type=abuse;
Yandex URL: http://family.yandex.ru/ ( :
10.01.2012).
200 Maclay, pp. 97-8; Faris, Wang, Palfrey, pp. 180-1, 184.
201 Livingstone et al (2011), p. 44.

61

by-ip-address/ ( : 13.07.2011).
79
174 See also: Zittrain & Palfrey, p. 122; UN Human Rights
Council, 2011; FOSI & GRID, pp. 3, 56; Villeneuve (2010),
p. 66; Valcke et al (2011), p. 1303; Safer Social Networking
Principles for the EU, 2009, pp. 3-5.
175 Byron (2008), p. 206.
176 Ibid, p. 2.
177 T. Bryon, Do we have safer children in a digital world?
A review of progress since the 2008 Byron Review, March
2010, p. 6. URL: http://dera.ioe.ac.uk/709/1/do%20we%20
have%20safer%20children%20in%20a%20digital%20worldWEB.pdf ( : 30.11.2011).
178 Internet Safety Technical Task Force, Enhancing Child
Safety and Online Technologies: Final Report of the Internet
Safety Technical Task Force To the Multi-State Working
Group on Social Networking of State Attorneys General of
the United States, 31 December 2008, pp. 36, 39. URL:
http://cyber.law.harvard.edu/sites/cyber.law.harvard.edu/files/
ISTTF_Final_Report.pdf ( : 7.01.2012). .
: PointSmart.ClickSafe, p. 24ff.
179URL: http://www.dni.ru/tech/2011/8/31/218008.html
( : 10.01.2012).
180 . , : OReilly & ONiell, p. 47.
181 Livingstone et al (2011), p. 44. . Norton
Online Family Report, 2010, p. 15.
182 Akdeniz (2004), p. 114.
183 Ibid, p. 120.
184 Livingstone et al (2011), p. 44. Jones and Finkelhor present a number of features that characterize effective awareness campaigns at: L.M. Jones & D. Finkelhor, Increasing
Youth Safety and Responsible Behavior Online: Putting in
Place Programs that Work, A FOSI Discussion Paper, p. 9.
URL:http://www.unh.edu/ccrc/pdf/fosi_whitepaper_increasingyouthsafety_d9.pdf ( : 10.12.2011).
185 URL: http://www.google.ru/familysafety/tips.html;
http://detionline.com/helpline/about;http://ndfond.ru/menu/
abouthttp://www.smeshariki.ru/http://www.smeshariki.ru/
GameIndex.aspx ( : 10.01.2012).
186 FOSI & GRID, p. 56.
187 PointSmart.ClickSafe, p. II.
188 RAEK, 2011.
189 , :

, 9/9/12.
URL: http://minsvyaz.ru/ru/news/index.php?id_4=42777
( : 10.01.2012).
190
: http://hostdeclaration.ru/;
: http://old.saferunet.ru/hotline/content.php/;URL:http://hotline.friendlyrunet.
ru/?l=ru ( : 10.01.2012).
191 Stalla-Bourdillon, p. 296.
192 Zittrain & Palfrey, pp. 120-1.
193 C.M. Maclay, Protecting Privacy and Expression
Online. Can the Global Network Initiative Embrace the
Character of the Net?, in R. Deibert et al (eds), Access
Denied, pp. 98-100.
194 E. Zuckerman, Intermediary Censorship, in R. Deibert
et al (eds), Access Controlled, pp. 73-4, 80-3.
195 S. Kreimer, Censorship by Proxy: The First Amendment, Internet Intermediaries, and the Problem of the
Weakest Link, University of Pennsylvania Law Review,
155 (2006), p. 11; Ahlert et al, pp. 7-8; J. Varon Ferraz et al,
p. 49.