A Gift of Fire, 2edChapter 5: Freedom of Speech in Cyberspace1 Anonymity Common Sense and the Internet Early publications by some of our Founding Fathers.

Slides:



Advertisements
Similar presentations
Slides prepared by Cyndi Chie and Sarah Frye A Gift of Fire Third edition Sara Baase Chapter 3: Freedom of Speech.
Advertisements

Addressing spam and enforcing a Do Not Registry using a Certified Electronic Mail System Information Technology Advisory Group, Inc.
Ethics in Information Technology, Fourth Edition
CptS 401 Adam Carter. Discuss Paper Question 4 Anonymizer.com provides tools and services to A. obtain a new identity. B. send and surf the web.
Anonymity and SPAM The Good, the Bad and the Ugly!
1 Freedom of Expression Prepared By Joseph Leung.
Non Profit and Faith Based Agencies, and the role of Information Technology Lakewood Resource & Referral Center nd Street Suite 204 Lakewood, NJ.
A Gift of Fire, 2edChapter 5: Freedom of Speech in Cyberspace1 PowerPoint ® Slides to Accompany A Gift of Fire : Social, Legal, and Ethical Issues for.
A Community Without Borders By Brian McLaughlin Thomas Charnock Brian Schweitzer.
Freedom of Speech Professor Matt Thatcher. 2 Last Class l Workplace privacy –how is electronic monitoring different from traditional monitoring? –types.
Behind the Machine “The Good, The Bad, and the Ugly” Copyright © 2008 by Helene G. Kershner.
Freedom of Speech in Cyberspace 1. The U.S. Constitution - The 1 st Amendment: The 1 st Amendment Congress shall make no law respecting an establishment.
Chapter 5 Freedom of Expression
Ethics in Information Technology
ISSUES Contributions: From what sources does money come? Where does it go? Should amounts be controlled? Expenditures: What can different “players” in.
VassilevaCMPT 408 – Freedom of Speech 1 Freedom of Speech - Objectives 1.Discuss the different legal treatment of different medial regarding Freedom of.
Chapter 3: Freedom of Speech.
A Gift of Fire Third edition Sara Baase
A Gift of Fire Third edition Sara Baase
CS 4001Mary Jean Harrold1 Class 23 ŸFreedom of speech in cyberspace ŸAssign ŸAssignment 8—due 11/13 ŸTerm paper—due 11/20.
Freedom of Speech. acts/funddocs/billeng.htm Amendment I “Congress shall make no law respecting an establishment.
Internet regulation National limits of Internet Content.
CS 4001Mary Jean Harrold1 Class 24 ŸFreedom of speech in cyberspace ŸAssign ŸAssignment 8—due today ŸTerm paper—due 11/20.
Ch3 Freedom of Speech The US Constitution.
Computer Ethics. 2 Networking * The Internet is a network of networks that uses two protocols, known as TCP/IP, to control the exchange of data. * The.
Chapter 3: 1st Amendment.
Chapter 9: The Internet and World Wide Web Two contrasting views: Media Critic Marshall McCLuhan: the Internet would help create a “global village” of.
Protecting Privacy “Most people have figured out by now you can’t do anything on the Web without leaving a record” - Holman W. Jenkins, Jr
1 Freedom of Speech In Cyberspace Changing Communications Paradigms Changing Communications Paradigms Offensive Speech and Censorship in Cyberspace AnonymitySpam.
CptS 401 Adam Carter. Quiz Question 7 Obscene speech is protected by the First Amendment. A. True B. False 2.
October 21, 2008 Jennifer Q.; Loriane M., Michelle E., Charles H. Internet Safety.
Issues and Problems Concerning the Internet Copyright ◦ Users pass off as others work and post it as their own work without giving credit to the source.
Chapter 11.  Electronic commerce (e-commerce)  The sale of goods and services by computer over the Internet  Internet (Net)  A collection of millions.
CyberEthics Morality and Law in Cyberspace Chapter 3: Free Speech and Content Control in Cyberspace By Jennifer, Linda, Paul, Paula, and Stephne.
Slides prepared by Cyndi Chie and Sarah Frye A Gift of Fire Third edition Sara Baase Chapter 3: Freedom of Speech.
Freedom of Speech Computers in the World.
s Protected by Fourth Amendment Right of Privacy By: Xavier Mulligan.
Thinking about tech challenges to free speech New technologies always challenge old regulatory regimes—print, telegraph, telephone, radio, internet Why.
Anti-spam activities in Korea Billy MH Cheon / Korea Network Information Center.
Jeopardy Media If you read the chapter this is easy “That would be a great test question” Chapter stuff Potpourri Q $100 Q $200 Q $300 Q $400 Q $500 Q.
Slides prepared by Cyndi Chie and Sarah Frye A Gift of Fire Third edition Sara Baase Chapter 3: Freedom of Speech.
1 Internet – The Good, the Bad, and the Ugly Module 4 Section 3.
FREEDOM OF SPEECH COSC 380 Eric Carroll Courtney Wirtz Adolphe Ngabo.
Unit 2- Privacy and Cyberspace Kaizen MIDTERM Definition of Terms How is Technology eroding our privacy and anonymity? Protecting privacy online.
The Election Process Elections and Paying for Campaigns.
The 1 st Amendment U.S. Government Ms. Kemp. 1 st Amendment Rights Press Press Religion Religion Petition Petition Assembly Assembly Speech Speech.
Ethical dilemmas arising from information management strategies used by organisations Ethics & Information Systems.
Chapter 19: Civil Liberties: First Amendment Freedoms Section 3.
Welcome! The objective of this 16 slide presentation is to: 1. Identify the fundamental issues about Freedom of Speech. 2. Describe positive and negative.
Concerns of Noncommercial Users Constituency Privacy Conference November 29, 2005 Kathryn A. Kleiman, Esq. Internet Law and Policy Specialist, McLeod,
The Acceptable Use of Technology
Chapter 10 Cyberlaw, Social Media, and Privacy
Presented by Ika Novita Dewi, MCS
CHAPTER 5 FREEDOM OF EXPRESSION.
Freedom of Expression.
Freedom of Speech.
Appendix B Possible Research Topics for CS Taken from A Gift of Fire by Sara Basse PowerPoint Presentation Possible Topics Related to General Education.
A Gift of Fire Fourth edition Sara Baase
And how they relate the Judicial Branch
– Communication Technology in a Changing World
A Gift of Fire Third edition Sara Baase
Constitutional Issues
Ch. 13 Sect. 3 Obj: Explain the issue of freedom of speech
Freedom of Speech in Cyberspace
Behind the Machine “The Good, The Bad, and the Ugly”
Chapter 6.1 Regulating the Internet
A Gift of Fire Third edition Sara Baase
ISSUES Contributions: From what sources does money come? Where does it go? Should amounts be controlled? Expenditures: What can different “players”
A Gift of Fire Third edition Sara Baase
Crash Course in Section 230
Presentation transcript:

A Gift of Fire, 2edChapter 5: Freedom of Speech in Cyberspace1 Anonymity Common Sense and the Internet Early publications by some of our Founding Fathers were published under pseudonyms. Today, there are publications on the Net that are posted anonymously. Q : What are the drawbacks of anonymous Web postings?

A Gift of Fire, 2edChapter 5: Freedom of Speech in Cyberspace2 Anonymity Is Anonymity Protected? Conflicts between political freedom of speech and campaign regulations: Anonymity protects against retaliation and embarrassment. Anonymity violates rules established by the Federal Elections Commission (FEC) Q : Should anonymous political speech on the Web be regulated?

A Gift of Fire, 2edChapter 5: Freedom of Speech in Cyberspace3 Anonymity Anonymity vs. Community Supporters of anonymity: Say it is necessary to protect privacy and free speech. Opponents of anonymity: Believe it is anti-social and allows criminals to hide from law enforcement. Q : How is the practice of anonymity online similar/dissimilar to strong encryption?

A Gift of Fire, 2edChapter 5: Freedom of Speech in Cyberspace4 Spam What Is the Problem? Unsolicited, mass is cheap to senders but may impose costs on the recipient’s time and/or the recipient’s online account. may contain objectionable content (political, commercial ads, solicitations for funds, pornography, etc.). may contain a disguised return address. may pass through filters. invades privacy. creates a financial and managerial burden on ISPs. Q : How do you handle spam?

A Gift of Fire, 2edChapter 5: Freedom of Speech in Cyberspace5 Spam Cases and Free Speech Issues AOL v. Cyber Promotions AOL and other service providers have successfully sued spammers because of the cost burden imposed. Disgruntled Intel Employee Initially, a court ruled that non-commercial spam to Intel employees at their Intel accounts was a form of trespass. The CA Supreme Court ruled that it was not. Q : Is the forwarding of pre-written observations or opinions from human- rights groups spam or expressions of free speech? (Or both?)

A Gift of Fire, 2edChapter 5: Freedom of Speech in Cyberspace6 Spam Solutions Technology: filters that screen out spam. Market Pressure: services that list spammers. Business Policy: at the discretion of the recipient, all would be charged a microfee. Law: create restrictions that are consistent with the First Amendment. Vigilantism: punish spammers by hacking into their phone or computer systems. Q : Which solution above, or others, do you support?