Democracies must recognize that we are in a geopolitical battle over the governance model that will dominate in the 21st century digital context, argues Eileen Donahoe (right), Executive Director of Stanford’s Global… Read more »
China is using its technological rise to develop “digital authoritarianism” to conduct surveillance, control the internet and censor information not just within its borders, but around the world, a… Read more »
Current proposals around disinformation are described in negative terms: they are all about stopping “harms” and mitigating “dangers,” notes Peter Pomerantsev, a director of the Arena Program at the… Read more »
In the span of just two years, the widely shared utopian vision of the internet’s impact on governance has turned decidedly pessimistic, notes Stanford Law School analyst Nate Persily…. Read more »
Concerns are rising that efforts to protect citizens from foreign surveillance will Balkanize the digital world. Blocking websites, bottling up information so it cannot flow freely around the world and… Read more »
WHEN YOU ASK ChatGPT “What happened in China in 1989?” the bot describes how the Chinese army massacred thousands of pro-democracy protesters in Tiananmen Square. But ask the same question to… Read more »
How do you we place democratic principles at the base of creating a digital future so it works for the broadest group of citizens around the world? “That is a… Read more »
People with ties to China’s law enforcement agencies conducted the largest known covert digital influence operation aimed at discrediting the West and promoting Beijing’s agenda across more than 50 social… Read more »
Digital technologies hold tremendous potential to enhance societal wellbeing, including the protection and promotion of democracy and human rights, notes Harvard’s Ziyaad Bhorat. However, citizens, political leaders, and states are… Read more »
Digital authoritarianism is challenging democracy, according to the NED’s International Forum. New forms of digital technology are becoming widely available, and are used to deepen state surveillance, tighten control over… Read more »