Democracy would suffer if Google left China, says MIT panel
IDG News Service - Analyzing the quarrel between Google and China raises questions of how the Web helps an oppressed country develop democracy, according to participants in an MIT panel discussion.
"The search engine has become an important tool to help the central government become more transparent," said panelist Xiaojian Zhao, a Chinese journalist studying at MIT on a fellowship, during the discussion Wednesday. "The search engine will aid Chinese democracy."
Yasheng Huang, China program professor at MIT's Sloan School of Management, agreed, but went a step further, saying that the Internet has fostered freedom and transparency in China more than the combination of foreign aid, the rise of the middle class and other economic growth factors.
"Google leaving China undermines that process," Huang said.
The clamor began last December when Google claimed that Gmail accounts of Chinese human rights activists were targeted by hackers using malware and phishing scams, while some accounts were breached. While no evidence has been uncovered to indisputably prove that claim, the Chinese government is widely believed to have sponsored the attacks.
Google reacted to the security issues in early January, stopping the censoring of its search results in China. The Chinese government mandated censorship as a condition of Google operating its search services there. In a blog post announcing its decision, Google said that it was reevaluating its Chinese business and realized that disobeying the government may force it to exit the country. To provide unrestricted search, Google redirected users from its Chinese Web site to its Hong Kong search engine.
Chinese Web users can access the country's top search engine, Baidu, but Huang said he does not trust the site because money influences its rankings. Since Google stopped filtering its results, instead of Baidu's top three results being paid rankings, the top 10 results are now paid, he said.
Ultimately, Google and China's dispute is a conflict between the Internet's basic premise of unrestricted access and the government's desire for control.
"The Internet was born on unfettered access, a strong value behind freedom," Huang said. "China has a different set of values, there is an emphasis on control."
And increasing levels of dissent among China's population have motivated the government to further tighten the Internet, said Craig Simons, a journalist who covered China for 10 years and is studying at MIT on a fellowship. The number of protests against the government over pollution and social conditions has increased as people use the Web to communicate by e-mail, blogs and bulletin boards, Simon said. This led hackers to target e-mail accounts of dissenters, he said.
"There is a massive liberalization at the bottom so the government is tightening controls at the top," Simons said. "The government has taken the position that they need to take control of content on the Internet."
- After Google-China dust-up, cyberwar emerges as a threat
- Targeted attacks test enterprise security controls
- Is the U.S. the nation most vulnerable to cyberattack?
- In cyberwar, who's in charge?
- Schmidt: Private sector key to stopping Google-style attacks
- Threat of cyberattacks from overseas high, federal IT execs say
- Estonia readies for the next cyberattack
- Think tank in Estonia ponders war in cyberspace
- Botnets 'the Swiss Army knife of attack tools'
- 'Cyber War' author: U.S. needs radical changes to protect against attacks
- Special report: Web giants attacked
- 18 Hot IT Certifications for 2014
- CIOs Opting for IT Contractors Over Hiring Full-Time Staff
- 12 Best Free iOS 7 Holiday Shopping Apps
- For CMOs Big Data Can Lead to Big Profits
- Slideshow: 5 ways to lock down your mobile device
- Slideshow: 10 mistakes companies make after a data breach
- How to rob a bank: A social engineering walk through
- Which smartphone is the most secure?
If you think getting it right from day one is always what matters, you probably haven't been following technology too closely.
- IT Certification Study Tips
- Register for this Computerworld Insider Study Tip guide and gain access to hundreds of premium content articles, cheat sheets, product reviews and more.
- Mitigating DDoS Attacks with F5 Technology
- This document examines various DDoS attack methods and the application of specific ADC technologies to block attacks in the DDoS threat spectrum while...
- The DDoS Threat Spectrum
- Bolstered by favorable economics, today's global botnets are using distributed denial-of-service (DDoS) attacks to target firewalls, web services, and applications, often simultaneously.
- Defending Against Denial of Service Attacks
- By utilizing end-user interviews, this whitepaper explores a deeper understanding of DDoS defense plans and reveals the knowledge gaps around the Denial of...
- Strategic Solutions for Government IT
- This paper outlines why F5 is the optimum partner to help achieve the levels of security, performance and availability that are vital to...
Top Considerations for Moving to a Cloud Delivery Model for ITSM
Find out whether SaaS-based ITSM is right for you
- Software-as-a-service is more than just a cloud-based delivery model-it's a new approach to service that lets companies optimize utilization of in-house IT resources... All Government IT White Papers
- Pre-Engineered solutions from VCE Simplify Core Infrastructure Implementation In this video, the CTO of Purdue Pharma, a privately held pharmaceutical company explains how Purdue transformed their data center infrastructure with VCE.
- Integrated Infrastructure: Simplify Operations, Speed Deployments and Reduce Costs George Weiss, Gartner Vice President and Analyst, and Praveen Akkiraju, CEO of VCE, provide practical information regarding the various aspects of Integrated Infrastructures...
- Video: 5 Secrets To Scaling Enterprise Apps Watch this video to learn how to successfully scale enterprise apps>>
- Collaboration 2013: Where Mobility Meets Connectivity Mobility and collaboration are quickly converging and users are demanding more capabilities. It's no longer enough to enable file sharing. This Webcast dives...
- Modernizing SAP environments with minimum risk - a path to Big Data Hear from top IDC analyst, Richard Villars, about the path you can start taking now to enable your organization to get the benefits...
- All Government IT Webcasts
Does your organization offer extensive benefits, cool perks, competitive salaries, opportunities for training and advancement? Then get it recognized!
Nominate your company or another deserving organization for Computerworld's 2014 Best Places to Work in IT list now through Dec. 12, 2013.