Internet Fragmentation: Difference between revisions
| Line 40: | Line 40: | ||
and trade; national security; privacy and data protection; data localization; and fragmentation as an overarching national strategy.<ref name="weg"></ref> | and trade; national security; privacy and data protection; data localization; and fragmentation as an overarching national strategy.<ref name="weg"></ref> | ||
Within these categories, 10 kinds of fragmentation of varying degrees of significance are identified:<ref name=" | Within these categories, 10 kinds of fragmentation of varying degrees of significance are identified:<ref name="wef"></ref> | ||
# Filtering and blocking websites, social networks or other resources offering | # Filtering and blocking websites, social networks or other resources offering undesired contents | ||
undesired contents | |||
# Attacks on information resources offering undesired contents | # Attacks on information resources offering undesired contents | ||
# Digital protectionism blocking users' access to and use of key platforms | # Digital protectionism blocking users' access to and use of key platforms | ||
and tools for electronic commerce | = and tools for electronic commerce | ||
# Centralizing and terminating international interconnection | # Centralizing and terminating international interconnection | ||
# Attacks on national networks and key assets | # Attacks on national networks and key assets | ||