Should Human Flesh Search Engines be legal? He Wang May 19 th, 2010

Similar documents
TITLE SOCIAL MEDIA AND COLLABORATION POLICY

Acceptable Use Policy ("AUP")

HIPAA Privacy and Security. Rochelle Steimel, HIPAA Privacy Official Judy Smith, Staff Development January 2012

PPR TOKENS SALE PRIVACY POLICY. Last updated:

Acceptable Use Policy

SECURITY & PRIVACY DOCUMENTATION

Midstate Telephone & Midstate Communications. Acceptable Use Policy

Cyber Risks in the Boardroom Conference

You may contact The Translation Network by at You may also call The Translation Network at

Kenex (Electro-Medical) Limited. Privacy Statement. Kenex (Electro-Medical) Limited (Kenex) have been in business for over 40 years and have

Acceptable Use Policy

Analysis on computer network viruses and preventive measures

The Republic of Korea. economic and social benefits. However, on account of its open, anonymous and borderless

Introduction to Ethical Hacking. Chapter 1

Privacy & Cookie Statement

The Simulation Study of Spread and Evolution about Network Opinion on Education

LightGig Communications, LLC Privacy Policy

Case 1:18-cr TSE Document 2 Filed 06/20/18 Page 1 of 9 PageID# 2 IN THE UNITED STATES DISTRICT COURT FOR THE EASTERN DISTRICT OF VIRGINIA

ACCEPTABLE USE POLICY

Thailand Initiatives and Challenges in Cyber Terrorism

This guide is for informational purposes only. Please do not treat it as a substitute of a professional legal

Policy recommendations. Technology fraud and online exploitation

Privacy Policy. How we handle your information you provide to us. Updated: 14 March 2016

Last updated 31 March 2016 This document is publically available at

ITNP023 - Autumn Aims

BUZCOIN TOKENS SALE PRIVACY POLICY. Last updated:

Acceptable Use Policy

BISHOP GROSSETESTE UNIVERSITY. Document Administration. This policy applies to staff, students, and relevant data subjects

Northern Virginia Community College Social Media Guidelines

Managing Your Affiliates and Partners in the Financial Industry

Chapter 13: The IT Professional

Legal notice and Privacy policy

FERPA & Student Data Communication Systems

UNTITLED HIP HOP PROJECT Privacy Policy. 1. Introduction

The Coming Design Wars

State of Israel Prime Minister's Office National Cyber Bureau. Unclassified

Lesson Three: False Claims Act and Health Insurance Portability and Accountability Act (HIPAA)

VETS FIRST CHOICE PRIVACY POLICY FOR PARTICIPATING VETERINARY PRACTICES

Computer Use and File Sharing Policy

Acceptable Use Policy

Spam. Time: five years from now Place: England

Electronic Network Acceptable Use Policy

When Recognition Matters WHITEPAPER CLFE CERTIFIED LEAD FORENSIC EXAMINER.

Terms and Conditions 01 January 2016

I. INFORMATION WE COLLECT

RippleMatch Privacy Policy

II.C.4. Policy: Southeastern Technical College Computer Use

Eagles Charitable Foundation Privacy Policy

A Modern European Data Protection Framework

HKISPA Response to the Consultation Paper on the Proposals to Contain the Problem of Unsolicited Electronic Messages.

CANADA S ANTI-SPAM LEGISLATION: Getting ready for July 1 st, 2014

Vulnerability disclosure

NEWS CORP AUSTRALIA PRIVACY POLICY

OPD PRESS/PUBLIC COMMENT/LEGISLATIVE/GUBERNATORIAL/ COMMENT POLICY (rev )

EDENRED COMMUTER BENEFITS SOLUTIONS, LLC PRIVACY POLICY. Updated: April 2017

Cyber Security Guidelines for Securing Home and Small Office Routers

Privacy Policy. You may exercise your rights by sending a registered mail to the Privacy Data Controller.

Legal Foundation and Enforcement: Promoting Cybersecurity

LAWGIX LAWYERS, LLC. External Privacy Policy Policy ID: 3214 Date Last Revised: January 16, Internal Use Only 1

That Can Be Me, Inc. Privacy Policy

NOOTRY TERMS OF SERVICE

DONE FOR YOU SAMPLE INTERNET ACCEPTABLE USE POLICY

Ferrous Metal Transfer Privacy Policy

Acceptable Use Policy (AUP)

Federal Trade Commission Protecting Consumer Privacy. J. Howard Beales, III, Director Bureau of Consumer Protection Federal Trade Commission

WORKSHOP CYBER SECURITY AND CYBERCRIME POLICIES FOR AFRICAN DIPLOMATS. Okechukwu Emmanuel Ibe


The NextGen cyber crime battlefield. Why organizations will always lose this battle

Network Security Whitepaper. Good Security Policy Ensures Payoff from Your Security Technology Investment

Department of Veterans Affairs VA DIRECTIVE April 17, 2006 WEB PAGE PRIVACY POLICY

Glenwood Telecommunications, Inc. Acceptable Use Policy (AUP)

ProgressTestA Unit 5. Vocabulary. Grammar

Introduction to the Personal Data (Privacy) Ordinance

Cellular Site Simulator Usage and Privacy

Cybersecurity Considerations for GDPR

Canadian Anti-Spam Legislation (CASL) FREQUENTLY ASKED QUESTIONS

Acceptance. Changes to this Policy

Legal, Ethical, and Professional Issues in Information Security

300 Lena Drive Aurora, Ohio P: F: Page 1 of 5

Financial Regulations, Enforcement & Cybersecurity

COUNCIL OF THE EUROPEAN UNION. Brussels, 28 January 2003 (OR. en) 15723/02 TELECOM 78 JAI 307 PESC 593

Draft Resolution for Committee Consideration and Recommendation

The types of personal information we collect and hold

Hacking and Cyber Espionage

Data Protection Privacy Notice

Legal framework of ensuring of cyber security in the Republic of Azerbaijan

THE SECRET AND THE TRUTH OF THE AGES BY MARK CORDOVA

Privacy Policy. Company registry number: Budapest, Gönczy Pál utca em. Homepage: contact: Phone:

REGULATION BOARD OF EDUCATION FRANKLIN BOROUGH

Administration of Interconnection between Networks and Faced Issues. Wang Jian

CRYPTALGO HOLDINGS AG - Privacy Policy page 1 of 5

PRIVACY POLICY. Service. Information Collected

Privacy Policy... 1 EU-U.S. Privacy Shield Policy... 2

VIACOM INC. PRIVACY SHIELD PRIVACY POLICY

Cyber Smarts Using Social Media Wisely

A proposal to solve the patient data problem. (Yes, this is a manifesto)

Cybersecurity A Regulatory Perspective Sara Nielsen IT Manager Federal Reserve Bank of Kansas City

National Strategies. Key Domain Primary Direction

Emergency Nurses Association Privacy Policy

S.W.I.F.T. Intelligent Management Pack White Paper

Transcription:

Should Human Flesh Search Engines be legal? He Wang May 19 th, 2010

Question Do you know what s the most powerful search engine? Baidu? Google? Yahoo!? Bing???? Human Flesh Search Engines

What s Human Flesh Search Engines? provide technical/professional traditional search Q&A support engines:baidu,google,yahoo!,bing.. reveal private/classified information about specific People: Netizens individuals or organizations Interaction:people exchange theirs Or whatever you want to know!!! information in the internet Curiosity:They are keen to know the truth, or they are lonely. By definition, human flesh search is the use of modern information technology (TV, Computer, Radio, Newspapers, etc.), shifting from the traditional Web-based information search to the Relational networks in community activities, changing boring search process to One person ask questions and gets a million of responses

Some typical cases The first time HFSE came into the spotlight was in 2001. An anonymous netizen posted a beautiful girl s picture on MOP forum (a famous forum in China ), saying that she was his girlfriend. Interested netizens soon found out that the girl is a model for Microsoft, so they publicized her personal information to prove that the anonymous netizen was a liar. It took only two days to have this girl s information posted once again on MOP forum. Since then, a real sense, be called "human flesh search" the Internet search operations was born. A 41-year-old nurse named Wang Jue was suspended from her job when netizens using Human Flesh Search dug out her personal details while probing a video that showed her stabbing a kitten in the eyes with her high heels, and crushing its head. This is a landmark event for the human flesh search. At this point, the human flesh search theme have changed from initial banter, entertainment content to promote truth, virtue and beauty. There was observed a peak of Human Flesh Search when a husband whose wife committed suicide because of his betrayal, a man who disrupted torch relay in Paris, and a girl from northeastern China who dared to criticize those affected by the massive earthquake(sichuan, China) became targets. If you LOVE him(her),put him(her) to the Human Flesh Search Engines, because you will know everything about him(her) If you HATE him(her),put him(her) to the Human Flesh Search Engines, because there is HELL!!!

HFSE is like a double-edged sword Justice side Helps a lot of people find their families during the earthquake occurred in May 2008, Sichuan, China A powerful tool used by netizens to supervise special group like government officials and Public figures. Enforce the majority s opinion. Evil side HFSE places personal privacy and personal reputation at risk. HFSE may cause crime sometimes. No relative law to regulate HFSE.

legality Human flesh search engines are a powerful tool. Instead of using automatic algorithms to obtain results, human flesh searches can often deliver more valuable results for some gossip searches and for searches with no single answer, so it can have many uses, including online tracing and it can do it better than Baidu or Google. We can say that the human flesh search engines have more potential search power than machines. The initiators and participants of the Human flesh search are often the internet vigilante mob, they will defend the weak or even lose their mind when angry things happen. Those who mistreated the vulnerable are likely to incur the wrath of netizens. Human flesh searches discover the perpetrator's name, identity, home address and other personal information, which is then widely publicized. They may not live a normal life, lose their job, or even lose their family as a result!!!

legality Everything have two sides. Now, our task is to improve the legal system and prevent the violation of personal privacy. Holding a positive attitude The human flesh search engines can not only expose the truth behind some incidents, enforce social and moral order in the shortest time, but also extend to places that a network cannot reach to, thereby broadening the way people access knowledge and fully mobilizing the power of human networks. This carries forward the internet spirit of cooperation. Holding a negative attitude The unauthorized disclosure of personal information is a blatant violation of privacy. It can cause somebody s social esteem to drop and create emotional stress, thus infringing on his reputational rights. The participants have a tendency to become internet vigilante mobs. This should be regulated by the legal system!

My Opinions Network knowledge sharing is an inevitable trend of social progress. Human flesh search engines are an Internet revolution of fully mobilizing the masses of the Internet. It promotes cooperation by many different people. As a tool for group activities, human flesh searches also need to comply with relevant laws and regulations, not contrary to public order and the good ethics and morals of society. As the facilitator of human flesh search (such as forums and other websites), will undoubtedly have to bear more social responsibility, they should refine the resources of human flesh search engine and constraint inappropriate speech and behavior. I believe that the human flesh search will develop healthily and become standard, and it will serve society at last.

Human Flesh Search Engines What will you do???

Have a good day!

References [1] Dongxiao Liu, Binghamton University, Human flesh search engine, it is a next generation search engine? Available from World Wide Web: www.cprsouth.org/wp-content/uploads/drupal/dongxiao%20liu.pdf [2] TOM DOWNEY, NYTimes.com, March 3, 2010 Human-flesh search engine in China Available from World Wide Web: http://www.nytimes.com/2010/03/07/magazine/07human-t.html [3] Yang Zhuo-chao PUBLIC ADMINISTRATION & LAW 2009. 7 Available from World Wide Web: http://d.wanfangdata.com.cn/periodical_xzyf200907038.aspx [4] Times Online, June 25, 2008 Human flesh search engines: Chinese vigilantes that hunt victims on the web Available from World Wide Web: http://technology.timesonline.co.uk./tol/news/tech_and_web/article4213681.ece [5] CHINA DAILY, 2008-08-27, 'Human Flesh Search' a crime? Available from World Wide Web: http://www.chinadaily.com.cn/life/2008-08/27/content_6975306.htm [6] How web search engine. (n.d.). How Web Search Engines Work. Available from World Wide Web: http://www.webopedia.com/didyouknow/internet/2003/ HowWebSearchEnginesWork.asp [7] Google s Marissa Mayer: Social search is the future By Doug Sherrets January 31, 2008 Available from World Wide Web: http://venturebeat.com/ 2008/01/31/googles-marissa-mayer-social-search-is-the-future/