Democracy would suffer if Google left China, says MIT panel
IDG News Service - Analyzing the quarrel between Google and China raises questions of how the Web helps an oppressed country develop democracy, according to participants in an MIT panel discussion.
"The search engine has become an important tool to help the central government become more transparent," said panelist Xiaojian Zhao, a Chinese journalist studying at MIT on a fellowship, during the discussion Wednesday. "The search engine will aid Chinese democracy."
Yasheng Huang, China program professor at MIT's Sloan School of Management, agreed, but went a step further, saying that the Internet has fostered freedom and transparency in China more than the combination of foreign aid, the rise of the middle class and other economic growth factors.
"Google leaving China undermines that process," Huang said.
The clamor began last December when Google claimed that Gmail accounts of Chinese human rights activists were targeted by hackers using malware and phishing scams, while some accounts were breached. While no evidence has been uncovered to indisputably prove that claim, the Chinese government is widely believed to have sponsored the attacks.
Google reacted to the security issues in early January, stopping the censoring of its search results in China. The Chinese government mandated censorship as a condition of Google operating its search services there. In a blog post announcing its decision, Google said that it was reevaluating its Chinese business and realized that disobeying the government may force it to exit the country. To provide unrestricted search, Google redirected users from its Chinese Web site to its Hong Kong search engine.
Chinese Web users can access the country's top search engine, Baidu, but Huang said he does not trust the site because money influences its rankings. Since Google stopped filtering its results, instead of Baidu's top three results being paid rankings, the top 10 results are now paid, he said.
Ultimately, Google and China's dispute is a conflict between the Internet's basic premise of unrestricted access and the government's desire for control.
"The Internet was born on unfettered access, a strong value behind freedom," Huang said. "China has a different set of values, there is an emphasis on control."
And increasing levels of dissent among China's population have motivated the government to further tighten the Internet, said Craig Simons, a journalist who covered China for 10 years and is studying at MIT on a fellowship. The number of protests against the government over pollution and social conditions has increased as people use the Web to communicate by e-mail, blogs and bulletin boards, Simon said. This led hackers to target e-mail accounts of dissenters, he said.
"There is a massive liberalization at the bottom so the government is tightening controls at the top," Simons said. "The government has taken the position that they need to take control of content on the Internet."
- After Google-China dust-up, cyberwar emerges as a threat
- Targeted attacks test enterprise security controls
- Is the U.S. the nation most vulnerable to cyberattack?
- In cyberwar, who's in charge?
- Schmidt: Private sector key to stopping Google-style attacks
- Threat of cyberattacks from overseas high, federal IT execs say
- Estonia readies for the next cyberattack
- Think tank in Estonia ponders war in cyberspace
- Botnets 'the Swiss Army knife of attack tools'
- 'Cyber War' author: U.S. needs radical changes to protect against attacks
- Special report: Web giants attacked
- Best iPhone, iPad Business Apps for 2014
- 14 Tech Conventions You Should Attend in 2014
- 10 Desktop Apps to Power Your Windows PC
- How to Add New Job Skills Without Going Back to School
- Slideshow: 7 security mistakes people make with their mobile device
- iOS vs. Android: Which is more secure?
- 11 sure signs you've been hacked
If you use ‘password,’ one the worst passwords, as your password, fail to keep antivirus protection updated and don’t bother to deploy security patches to close critical vulnerabilities, then maybe you should consider working for the cybersecurity-clueless federal government; you’d fit right in, according to Senator Tom Coburn's cybersecurity and critical infrastructure report.
- IT Certification Study Tips
- Register for this Computerworld Insider Study Tip guide and gain access to hundreds of premium content articles, cheat sheets, product reviews and more.
- Changing the Way Government Works: Four Technology Trends that Drive Down Costs and Increase Productivity
- This paper discusses four technology-based approaches to improving processes and increasing
productivity while driving down department and agency costs.
- Red Hat Enterprise Linux - The Original Cloud Operating System
- Linux adoption is growing against a number of measures, such as the
number of supercomputers that run Linux and the size of the contributing...
- OpenStack Hype vs. Reality: CIO Quick Pulse
- Open-source architecture can enable IT departments to build infrastructure-as-a-service (IaaS) clouds running on standard hardware.
- Building a Bridge to the Next Generation Data Center
- Selecting a widely adopted operating system is a foundational component of a standardization strategy.
- OpenStack and Red Hat: IDC White paper
- Most OpenStack deployments are by public cloud providers that are early adopters of technology and use OpenStack in a do-it-yourself deployment and support... All Government IT White Papers
- Webinar: Building a Big Data solution that's production-ready Big data solutions are no longer just a nice-to-have.
- Meg Whitman presents Unlocking IT with Big Data During this Web Event you will hear Meg Whitman, President and CEO, HP discuss HAVEn - the #1 Big Data platform, as well...
- The New Way to Work Knowledge Vault This Knowledge Vault focuses on how, in today's increasingly virtual world, it's more important than ever to engage deeply with employees, suppliers, partners,...
- Getting Ready for BlackBerry Enterprise Service 10.2 Find out how BlackBerry® Enterprise Service 10 helps organizations address the full spectrum of EMM challenges, while balancing the needs of both the...
- Containerization Options: How to Choose the Best DLP Solution for Your Organization This webcast outlines a framework for making the right choice when it comes to containerization approaches, along with the pros and cons of...
- All Government IT Webcasts