China to expand real-name registration for Twitter-like microblogs
China is already conducting trials of the real-name system in five cities
IDG News Service - China plans to require users of the country's Twitter-like microblogs to register with their real identities, and has already begun trials of the system in five cities, according to a Chinese official.
The real-name registration marks the latest attempt by Chinese authorities to tighten control over the country's social networking sites, which have also become forums for people to express opinions critical of the government. The country's microblogging sites have about 250 million users, according to the China Internet Network Information Center.
China supports microblogs, said Wang Chen, the head of China's State Council Information Office, during a Wednesday media briefing. "Microblogs, on the one hand, can reflect the public's sentiment," he said. "They can also create accountability, and promote the society's development."
But China also wants to ensure the Internet's "healthy development", Wang said. Although microblogs can reflect the people's will, they can also be used to spread harmful and irrational opinions and information. He pointed to pornography and the fabrication of rumors as major problems.
The real-name microblog registration began as trials in the major cities of Beijing, Shanghai, Tianjin, Guangzhou and Shenzhen from late last year. Once the pilot programs are completed, they will then be expanded to other parts of the country, Wang said. He did not give a firm date, or state specifically where the real-name registration will be expanded to.
The new regulations could scare China's Internet users from posting comments on microblogs, according to analysts. Chinese authorities have gone as far to detain microblog users accused of fabricating online rumors.
Beijing's city government announced last month it would also require users of microblogs to register with their real names. The text of the regulations states that users cannot post on topics that will damage China's national honor or lead to illegal gatherings that will disturb civil order.
"I think initially, some users will feel more cautious about what they post, or feel less inclined to post unless it is a topic they feel very strongly about," said Mark Natkin, managing director of Beijing-based Marbridge Consulting. "But over time, it will become normal and users will be less sensitive to it."
Chinese officials have yet to state how the new real-name requirements will be implemented. "In other real-name systems, it has often been discovered that it was very difficult to implement, or users found ways to circumvent them," Natkin said.
Wang said the regulation will first be enforced on new users of microblogs, and then extended to existing users. Users will still have the choice of selecting their own screen names to be displayed on their accounts.
China already censors the Internet for anti-government content, and has blocked foreign websites such as Facebook, Twitter and YouTube. A spokesman for Sina, a Chinese company operating one of the country's largest Twitter-like microblogging sites, declined to comment on the plans to enforce real-name registration.
- 18 Hot IT Certifications for 2014
- CIOs Opting for IT Contractors Over Hiring Full-Time Staff
- 12 Best Free iOS 7 Holiday Shopping Apps
- For CMOs Big Data Can Lead to Big Profits
- Slideshow: 5 ways to lock down your mobile device
- Slideshow: 10 mistakes companies make after a data breach
- How to rob a bank: A social engineering walk through
- Which smartphone is the most secure?
- IT Certification Study Tips
- Register for this Computerworld Insider Study Tip guide and gain access to hundreds of premium content articles, cheat sheets, product reviews and more.
- Mitigating DDoS Attacks with F5 Technology
- This document examines various DDoS attack methods and the application of specific ADC technologies to block attacks in the DDoS threat spectrum while...
- The DDoS Threat Spectrum
- Bolstered by favorable economics, today's global botnets are using distributed denial-of-service (DDoS) attacks to target firewalls, web services, and applications, often simultaneously.
- Defending Against Denial of Service Attacks
- By utilizing end-user interviews, this whitepaper explores a deeper understanding of DDoS defense plans and reveals the knowledge gaps around the Denial of...
- Strategic Solutions for Government IT
- This paper outlines why F5 is the optimum partner to help achieve the levels of security, performance and availability that are vital to...
- Leveraging Managed Security Services to Fight Growing Cybersecurity Threats
- IT Infrastructure-as-a-Service enables agile responses to constantly changing threats. All Government IT White Papers
- Modernizing SAP environments with minimum risk - a path to Big Data Hear from top IDC analyst, Richard Villars, about the path you can start taking now to enable your organization to get the benefits...
- The Power of the Citrix Mobility Solution, XenMobile Does everything become a smartphone? Or does the smartphone begin to do everything? How can we afford to support BYOD? Rather, how can...
- BYOD Happens: How to Secure Mobility How to navigate the journey of securing mobility, including the BYOD corruption of IT, the top ten mobility strategies, and the mobility management...
- HR and Finance Were made for Each Other View now >>
- The Value of Human Capital for Finance Professionals View now >>
- All Government IT Webcasts
Does your organization offer extensive benefits, cool perks, competitive salaries, opportunities for training and advancement? Then get it recognized!
Nominate your company or another deserving organization for Computerworld's 2014 Best Places to Work in IT list now through Dec. 12, 2013.