To build a network blacklist.

Source: Internet
Author: User

Intermediary transaction SEO diagnosis Taobao guest Cloud host technology Hall

With the rapid development of Internet, especially the rapid development of WEB2.0 user's manufacture content, the problem of governance and management becomes more and more complicated, and "blacklist" becomes a means of frequent adoption. For example, yesterday, two messages about the blacklist:

(news) The National Copyright Bureau, the Ministry of Public Security, the Ministry of Information Services jointly convened a press conference, announced 2010 crackdown on cyber Piracy special Governance "sword Network Action" launched, the operation will establish a blacklist of pirated web sites system. The list will be published on the National Copyright Administration Website on a regular basis and CC to the three major telecommunications operators, for the blacklist site to provide access again, operating services of the telecommunications operators to pursue their joint tort liability, the circumstances will be a serious criminal attack.

(News II) a celebrity "look at their own microblog blacklist, there are 12 pages, hundreds of people." This is their own micro-blogging principles, the Tao is different from the conspiracy, boring people and he long-winded what? including those who do not know how to be polite, abusive, feel uncomfortable, pull black, so the people who pull the black while a lot of. ”

In the news, it can be seen that for infringing pirated websites, the method adopted is:

(1) "The State Copyright Bureau after the determination of the announcement",

(2) "Three major operators no longer provide access", such as the provision will be prosecuted for joint tort liability, or even criminal attack. That is, the state copyright administration determines that piracy has legal benefits, the access provider must stop access.

There are four questions:

(1) Whether the National Copyright Administration has the corresponding law enforcement qualification, even if the national Copyright Administration has the corresponding authorization;

(2) Not only three major operators are access providers, this site may also be abroad, the three major operators do not necessarily stop access;

(3) Many websites provide users to upload, if a user uploaded content for piracy, how to deal with, there is no clear saying;

(4) If the website operator considers it illegal or unreasonable to stop the access, who should complain to?

It is appropriate to do so, and not to say. But there is a very clear problem here, that is, the blacklist has been stopped, the perpetrators of the infringement (that is, the Pirates of profit) have not received the corresponding punishment. The cost of setting up a website is very low, the infringing person is likely to build multiple sites at the same time, or once the site is blacklisted and stop access, to enable a new site. Such a blacklist does not effectively combat illegal crime, and as the blacklist continues to increase, the effectiveness of governance will become worse.

In message two, the celebrity puts hundreds of people on the Twitter blacklist, which is more interesting. Put the other side to the blacklist, but the other party can not by adding you as a friend automatically received your tweet, in other words, you say, don't let the people in the blacklist see directly, but these people can still send or comment through your friends to see your content, or through the direct input of your microblog address to see all the tweets you send. At the same time, you can not see what he sent, you will not enter his microblog address to see his microblog. Your ears are clean, but you can not see a different voice, the saying is good, audit is clear, you gave up a rare opportunity.

In fact, you do not like the words, ignore the good, even if he replies to your microblog, unless it is really "framed", you ignore is, you do not respond, he is not interesting, there is an old saying, "a slap does not ring", you can not "together" up.

Back to the blacklist, with the rapid development of the Internet, mobile communications, the blacklist has seen more, the mailbox blacklist, mobile phone blacklist, small ads blacklist, junk SMS blacklist, website blacklist ... At present, these blacklists do have a certain management role, but the role is very effective. The reason is simple, this approach "palliative not cure", a certain e-mail blacklisted, the same spam will be affected, because the cost of access to a new mailbox is very low, and the sender can get profiteering, and the current management mechanism, on its basic no loss.

Only by breaking the interest chain, so that the illegal profiteering winners for their behavior to pay a painful price, can really curb these through the Internet, telecommunications network of illegal activities. and the establishment of the blacklist is only a stupid way, far from omnipotent.

China to establish blacklist system for infringing pirated websites

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.