Friday, January 30, 2015

Week 3
Date: 27 January 2015
Exercise: Getting The Most Out of Academic Texts
               (Group exercise. Members: Sharon, Alicia, Mei Yee)


Reading response based on the article "Who’s the true enemy of internet freedom – China, Russia or the US?": 


United States of America has been dominating the internet ever since advanced technology infrastructures were built by US conglomerates. As the internet is a powerful communication tool that promotes globalization, the services provided have necessitated countries to rely on them. For example, businesses are able to organize and expand their territories to different parts of the world by taking advantage of advanced telecommunication and easy availability of information. US claimed that its actions help to build a more cohesive world by improving internet infrastructures. This was shown in Google’s expansion in Brazil to make the internet more efficient for them. Such a contribution affirms the country’s strong international position and influence. Hence, it is perceived by the US government that US holds the rights to access international data as long as they belong to US companies. As mentioned in the article, they have tried to bypass legal processes when they require data which belongs to Microsoft but stored in Ireland. However, Microsoft and the authority of Ireland disapproved with US government’s demand. From the viewpoint of US companies, such demand may turn foreign investors away. The disclosure of users’ data may lose users’ confidence in these companies as their privacy is being compromised. Eventually, this can affect business. Some countries have reacted by ending the contract with US companies and have since started building their own infrastructures to gain control of their internet data.

China has been trying to restrict the access to their countries' data from other parts of the world, especially US. Efforts have been made to create inconvenience for the Chinese users when they are using American internet companies’ services, products or operating services. An example of this will be the "short-term and long-term disruptions of Gmail connections". In doing so, China wants to have more control of their technology infrastructure in which Chinese citizens use only services run by domestic companies. This will result in little to no chance of data being accessed by other countries, thus allowing confidential information to remain undisclosed. Furthermore, they can maintain their competitive edge without the risk of being tracked or threatened. Another way to look at this restriction is that this may be another attempt by the Chinese government to maintain its power over its citizens once again. China has been discouraging “freedoms of expression” for a long time due to the undesired outcome that resulted from the Hundred Flowers Campaign by Mao. When there is only one point of view being asserted, it is less likely for the people to not follow it. However, as the number of opinions increases, the chances of people being influenced by other ideals is much higher. Therefore, China wants to gain control of their internet sovereignty to lower the exposure to differing views, especially from people all over the internet and the world.

In our opinion, China, Russia and other countries alike should have the right to gain control of their technological infrastructures and internet data. By having their own internet sovereignty, they bring business to local companies which in turn encourage technological innovation and entrepreneurship in the home country. They will no longer have to depend on US for their technological advances and able to be self-sufficient in improving their condition. Besides this issue, we think that US should not assume that they have access to international data just because of companies, which originate from the US, having access to them. Shown in the case of Ireland and Microsoft, international authorities may not have the same perspective as them. This will, in turn, affect bilateral ties between two countries as this involves an intrusion of private data. However, as internet users, we feel that there is no sole enemy of internet freedom because our data and actions are regulated and easily accessed by other users as well as both national and international authorities. China and Russia should not restrict internet access because of its benefits in spreading academic knowledge. In doing so, they have limited this freedom to receive information for its users. Meanwhile, US should follow protocols to obtain Ireland’s data because services users would not want their personal data to be exposed. As mentioned in the article, “cyberspace has no boundaries”. The internet is meant to be public and information is roamed freely. However, users should exercise caution when using it due to the risks involved.




Source:
Morozov, E. (2015, January 4). Who’s the true enemy of internet freedom – China, Russia or the US? The Guardian/The Observer. Retrieved from http://www.theguardian.com/commentisfree/2015/jan/04/internet-freedom-china-russia-us- google-microsoft-digital-sovereignty
Week 3
Date: 30 January 2015
Exercise: Paraphrasing and Summarising

1. Title: English as a global language
Original text:
“Why a language becomes a global language has little to do with the number of people who speak it. It is much more to do with who those speakers are. Latin became an international language throughout the Roman Empire, but this was not because the Romans were more numerous than the peoples they subjugated. They were simply more powerful. And later, when Roman military power declined, Latin remained for a millennium as the international language of education, thanks to a different sort of power – the ecclesiastical power of Roman Catholicism.”

Source: Crystal, D. (1997). English as a global language. Cambridge: Cambridge
University

Summary:
Latin was the dominant language in the Roman Empire because Romans were highly influential.


2.
Original text:
“These new reactors would all operate at high temperatures, improving their efficiency. And they would include simplified safety features that do not rely on sophisticated backup systems or experienced operators — all are, in principle, ‘meltdown proof’ and can cool themselves down in the event of an accident with minimal, if any, human intervention. . .. Experts agree that reactors will need to be a lot cheaper to run. And to sway a nuclearaverse public, the next generation of reactors will need to produce much less radioactive waste at terrorist‐proof facilities.”

Source: Declan Butler’s “Nuclear power’s new dawn,” taken from Nature, 20 May, 2004 (Vol. 429, p. 238)

Summary:
(Butler (2014)) suggested that the new reactors would be more efficient and safer. They need to be cost efficient and generate less waste in secured facilities.