China Approves Network Real-name System

来源 :CHINA TODAY | 被引量 : 0次 | 上传用户:tudouaimangguo
下载到本地 , 更方便阅读
声明 : 本文档内容版权归属内容提供方 , 如果您对本文有版权争议 , 可与客服联系进行内容授权或下架
论文部分内容阅读
  POPULARIZATION of the Internet has without doubt facilitated huge improvements in people’s lives, but it has also spawned cybercrime and cyber-bullying. Consequently, the network real-name system, hailed as the solution to such undesirable phenomena, has been a focus of public attention and discussion. On February 4, the State Internet Information Office published the Internet User Account Name Management Regulations, (the regulations) which came into effect on March 1.
  The regulations specify the management of Internet user account names, information service suppliers and their services, and user behavior. They stipulate that, according to the “background real name, foreground voluntary” principle, Internet information service suppliers require Internet information service users to undergo real identity information authentication before registering their accounts.
  Although insiders acknowledge that the regulations do not amount to an entire network real-name system, they nevertheless signify the onset of overall popularization of this system.
   Argument for the Real-name System
  The network real-name system stems from Internet development. It was first proposed to cope with cybercrime, cyber-bullying and the ominously discordant cyberspace environment. A decade of debate about online real name authentication preceded publication of the regulations.
  Professor Li Xiguang of Tsinghua University proposed during a talk on journalism reform in 2002 that the National People’s Congress enact a law prohibiting the use of pseudonyms for online articles or opinions. In Prof. Li’s view, anyone expressing opinions online should be held legally responsible as to do otherwise is irresponsible. He hence advocates publishing articles under real names.
  The network real-name system has since been widely discussed among government departments and the lay public, and relevant departments of the central authorities and provincial governments have carried out policy trials.
  The network real-name system has the obvious merits of dramatically reducing illegal and criminal behavior online and curbing Internet rumor-mongering and slander. It thus helps to create a harmonious and healthy cyberspace environment by refining netizens’ online behavior and protecting young adults from bullying and pornography. The system also improves e-business dealers’integrity and credibility and helps to establish a sound credit system by cracking down on copyright piracy and infringement.   Xie Youping, director of the Judicial and Procedural System Research Center of Fudan University, regards freedom of speech as a natural right of rich connotations that includes the freedom either to speak or to keep silent. In his view, the freedom to speak can be enacted under either a real name or a pseudonym, but this understanding applies to the real rather than virtual world.
  “Taking into consideration the difference between the virtual and real worlds, whether or not netizens should be entitled to freedom of anonymous speech is debatable. Hidden pitfalls and dangers exist under the ethos of anonymous speech, whereas the real-name system could ensure a sound and healthy cyberspace environment. Freedom of anonymous speech, therefore, must be balanced against such other factors as state security, social order and people’s personal dignity,” Xie said. He went on, “The network real-name system is intended not to gag but to protect freedom of speech. Its introduction will not give the webmaster carte blanche as regards deleting posts, as that would be an infringement of people’s freedom of speech. Under the real-name system, the webmaster’s sole function is to report publication of rumors to the judicial authority, which then deals with the matter.”
   Drawbacks
  There are, however, cons as well as pros to the network real-name system.
  First, the real-name system could escalate website attacks that result in greater leakage of personal information, so triggering even worse cybercrime. South Korea serves as a perfect example for opponents of the system. As the first country to advance comprehensively the network real-name system, South Korea witnessed after its introduction a drop in average online forum participation from 2,585 to 737. Worse still, South Korea’s major websites became principal targets for hacker attacks and consequently large-scale personal information leakage, rocking the foundation of the country’s network realname system. Eventually the South Korean government gave up on the system and in 2012, just four years after implementation, started dismantling it.
  The network real-name system could also prejudice human rights issues. Certain netizens believe that, according to the ideology of personal freedom, they have the right to use either their real names or pseudonyms as they choose. The real-name system could also block channels that enable public supervision of the government and expressions of public dissatisfaction. One main example of the realname system’s potentially detrimental effect occurred on November 23, 2010. A young man named Wang Peng from Gansu Province was arrested after reporting to the authorities his classmate’s fraudulent passing of the civil service examination through his high-ranking parents’ connections. Although Wang was later acquitted of the baseless charge, the matter became a main reason why a number of netizens oppose– even fear – the real-name system. Coupled with the overwhelming public power that more privileged citizens wield, the real-name system, in precluding any discretion, intensifies the vulnerability of individuals who do not have connections.   Associate Professor Shao Zhize of Zhejiang University holds that protecting cyberspace security necessitates giving priority to the protection of the rights and interests of netizens who express their opinions online. Cyberspace serves as an effective release valve through which to diffuse contradictions and vent different voices which the network real-name system could impede, so exacerbating social discordancy.
  It must be acknowledged that the waning vibrancy of microblogs is attributable to introduction of the realname system. As microbloggers must now be prepared to take the consequences for anything they say, it constitutes a hugely inhibiting factor.
   Make the Virtual World Real
  As of December 2014, China’s netizen population reached 649 million, and the Internet popularization rate stood at 47.9 percent. Moreover, 54.5 percent of netizens expressed trust in information obtained from the Internet, as compared with 35.1 percent in 2007.
  Over the past years, netizens have become used to a virtual world wherein they can exist under another identity. They therefore need time to adapt to the real-name system. Cyber credibility is fast becoming an important facet of social credibility, and a fundamental social foundation for further development of e-business and Internet finance. The new regulations are hence expected to enhance netizens’ trust in cyberspace and improve online service providers and Internet supervision departments’awareness of the importance of protecting their personal information, as well as rights and interests.
其他文献
IN early 2014, Chinese Premier Li Keqiang resolutely declared war on pollution. In April that year, the Environmental Protection Law, adopted in 1989, was revised to be officially implemented from Jan
期刊
AFTER the United States army withdrew from Iraq in 2012, the Iraqi central government approved a dozen infrastructure projects to be undertaken with foreign enterprises. The government expected throug
期刊
TWO paintings, interactive World and Com- mon homeland, hang in the China Hall of the UN Headquarters in New York. They reflect, in UN Secretary General Ban Ki-moon’s opinion, China’s important role i
期刊
BEING in sync with the latest global develop- ments is one thing China’s post-90s generation has in common with the youth of the U.S. By the time I or any of my generation had even heard of Windows, B
期刊
WHEN Bing returned home during military va- cation, Qi paid him a visit, carrying her baby. When she stepped inside his house, the place, which was packed and boisterous, immediately slipped into sile
期刊
AN arid climate and infertile land kept Dingxi City in Northwest China’s Gansu Province, on the upper reaches of the Yellow River, in a state of poverty for centuries. Qing Dynasty (1644-1911) governo
期刊
LOCATED in Kunshan, Jiangsu Province, Jinxi is a popular destination for local residents and tourists from Shanghai because it is easily accessible from there via train or expressway.  Jinxi is a mere
期刊
HAVING spent a de- cade running businesses worldwide, I thought the time had come. I made one of the most important decisions of my life – go entrepreneurial! If I were to tell you that I had cherishe
期刊
ON an old and gnarled pomegranate tree, heavy with red fruits, a mother bird feeds her nestlings. The scene that depicts autumn, harvest and parenthood is accomplished with a few subtle brushstrokes,
期刊
CHINESE Premier Li Keqiang attended the 17th China-EU leaders’ meeting in Brussels and visited the headquarters of the Organization for Economic Cooperation and Development (OECD) in Paris during a tr
期刊