2010
DOI: 10.1080/09512748.2010.522249
|View full text |Cite
|
Sign up to set email alerts
|

North Korea's Internet strategy and its political implications

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
4
0

Year Published

2012
2012
2024
2024

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 11 publications
(5 citation statements)
references
References 13 publications
0
4
0
Order By: Relevance
“…A step removed from this extreme approach -albeit still with non-trivial costs -is the highly sophisticated Chinese "Great Firewall", probably the best example of blocking sensitive information without fatally hurting either government communications or commercial activity (Economist 2013). Country experts anticipate that even North Korea will eventually take the Chinese and Cuban path of establishing 'such a 'Mosquito-Net" model of internet access, which facilitates the"use [of] the Internet as a propaganda machine in addition to taking advantage of it economically, [...] while keeping out information deemed threatening by the regime" (Chen, Ko, and Lee 2010; see also Ko, Lee, and Jang 2009).…”
Section: Online: Infrastructurementioning
confidence: 99%
“…A step removed from this extreme approach -albeit still with non-trivial costs -is the highly sophisticated Chinese "Great Firewall", probably the best example of blocking sensitive information without fatally hurting either government communications or commercial activity (Economist 2013). Country experts anticipate that even North Korea will eventually take the Chinese and Cuban path of establishing 'such a 'Mosquito-Net" model of internet access, which facilitates the"use [of] the Internet as a propaganda machine in addition to taking advantage of it economically, [...] while keeping out information deemed threatening by the regime" (Chen, Ko, and Lee 2010; see also Ko, Lee, and Jang 2009).…”
Section: Online: Infrastructurementioning
confidence: 99%
“…An estimated 50,000 privileged citizens have access to a domestic Intranet controlled by the Korean Computer Center ("How Widespread" 2012). Called Kwangmyong, it came online in 2000 and offers a search engine, technical texts, a message/ chat function, and official news to the select group who can access approved content (Chen, Ko, and Lee 2010;"Weird But Wired" 2007). Internet access is reserved for a handful of trusted elites, estimated by one expert to be no more than a few dozen families (Bruce 2012a(Bruce , 2012b.…”
Section: North Korea: the Value Of Studying Ict Policiesmentioning
confidence: 99%
“…18 The characteristics and associated benefits of cyber tactics make them very attractive for use by states and even terror groups alike. 19 Sovereignty, Cyberspace, and the Emergence of Internet Bubbles…”
Section: Sovereignty Conflict and Cyber Proxy Wars: Setting The Gener...mentioning
confidence: 99%