Browse Definitions :

A quick explanation of the splinternet

The internet began in 1969 as a way for government researchers to share information, known then as ARPANET -- or the Advanced Research Projects Agency Network.

But it wasn't until 1983 that the internet was officially born, using TCP/IP to interconnect devices.

Since that time, world borders have been drawn and digital iron curtains have dropped, fragmenting the internet in multiple pieces known as the splinternet.

This video will give a brief explanation of the splinternet and the problems it can cause in society.

Transcript - A quick explanation of the splinternet

The splinternet is the breaking of one global internet into several smaller and fragmented pieces due to content filtering and censorship.

This division can be caused by religion, politics, government, technology or commerce.

Countries that have created their own versions of the internet include China, Russia, North Korea and Iran, banning citizens from accessing certain websites in the Western world and creating a splinternet.

Commonly banned websites within the splinternet include, but are not limited to:

  • social media sites such as Facebook;
  • streaming media; and
  • foreign news outlets.

In practice, if a citizen tried to access a prohibited website, they would either be blocked completely or redirected to that country's version of the website -- often only containing government-approved content.

The splinternet can be dangerous because content censorship can lead to misinformation, and governments can feed its citizens propaganda, covering up truth on the global internet.

+ Show Transcript
  • routing table

    A routing table is a set of rules, often viewed in table format, that's used to determine where data packets traveling over an ...

  • CIDR (Classless Inter-Domain Routing or supernetting)

    CIDR (Classless Inter-Domain Routing or supernetting) is a method of assigning IP addresses that improves the efficiency of ...

  • throughput

    Throughput is a measure of how many units of information a system can process in a given amount of time.

  • Common Body of Knowledge (CBK)

    In security, the Common Body of Knowledge (CBK) is a comprehensive framework of all the relevant subjects a security professional...

  • buffer underflow

    A buffer underflow, also known as a buffer underrun or a buffer underwrite, is when the buffer -- the temporary holding space ...

  • single sign-on (SSO)

    Single sign-on (SSO) is a session and user authentication service that permits a user to use one set of login credentials -- for ...

  • benchmark

    A benchmark is a standard or point of reference people can use to measure something else.

  • spatial computing

    Spatial computing broadly characterizes the processes and tools used to capture, process and interact with 3D data.

  • organizational goals

    Organizational goals are strategic objectives that a company's management establishes to outline expected outcomes and guide ...

  • talent acquisition

    Talent acquisition is the strategic process employers use to analyze their long-term talent needs in the context of business ...

  • employee retention

    Employee retention is the organizational goal of keeping productive and talented workers and reducing turnover by fostering a ...

  • hybrid work model

    A hybrid work model is a workforce structure that includes employees who work remotely and those who work on site, in a company's...

  • database marketing

    Database marketing is a systematic approach to the gathering, consolidation and processing of consumer data.

  • cost per engagement (CPE)

    Cost per engagement (CPE) is an advertising pricing model in which digital marketing teams and advertisers only pay for ads when ...

  • B2C (Business2Consumer or Business-to-Consumer)

    B2C -- short for business-to-consumer -- is a retail model where products move directly from a business to the end user who has ...