Social, Legal, and Ethical Issues for Computing Technology

Slides:



Advertisements
Similar presentations
Freedom of Speech (Part 3)
Advertisements

Impact of Computers on Society 5. Freedom of Speech.
The First Amendment guarantees people the right to express themselves through speech and writing – Allows everyone to hear opinions and ideas of others.
Slides prepared by Cyndi Chie and Sarah Frye A Gift of Fire Third edition Sara Baase Chapter 3: Freedom of Speech.
Ethics in Information Technology, Fourth Edition
CptS 401 Adam Carter. Discuss Paper Question 4 Anonymizer.com provides tools and services to A. obtain a new identity. B. send and surf the web.
Ethics in Information Technology, Second Edition
Anonymity and SPAM The Good, the Bad and the Ugly!
MIS PERSONAL, LEGAL, ETHICAL, AND ORGANIZATIONAL ISSUES OF INFORMATION SYSTEMS CHAPTER 4 Hossein BIDGOLI Phishing that bites Paying for Privacy Pirates.
Access to Electronic Media Acceptable Use Policy August 8, 2011 Meece Middle School.
1 Freedom of Expression Prepared By Joseph Leung.
A Gift of Fire, 2edChapter 5: Freedom of Speech in Cyberspace1 PowerPoint ® Slides to Accompany A Gift of Fire : Social, Legal, and Ethical Issues for.
Chapter Jacob Niedermier Keith Miller Changing Communications Paradigms The Internet gave us many more chances to voice our opinions.
CENSORSHIP Jack Homer Frederick Abreu James Carroll Minsoo Kim.
Freedom of Speech in Cyberspace 1. The U.S. Constitution - The 1 st Amendment: The 1 st Amendment Congress shall make no law respecting an establishment.
Slides prepared by Cyndi Chie and Sarah Frye (and Liam Keliher) A Gift of Fire Third edition Sara Baase Chapter 3: Freedom of Speech.
INTERNET and CODE OF CONDUCT
Introduction Social Implications & EthicsSocial Implications & Ethics Since the introduction of the Internet, many policies have been introduced as a way.
Brandon Hall CSC 540.  The US Government first attempted to filter the Internet in the early 90’s.  This was an attempt to protect minors against the.
Internet Censorship In order of appearance: Dmitriy Bespalov Ilya Braude Brian McBurney Yaroslav Volkov.
Ethics in Information Technology
Freedom of Speech in Cyberspace
Chapter 3: Freedom of Speech.
A Gift of Fire Third edition Sara Baase
A Gift of Fire Third edition Sara Baase
Freedom of Speech. acts/funddocs/billeng.htm Amendment I “Congress shall make no law respecting an establishment.
CS 4001Mary Jean Harrold1 Class 24 ŸFreedom of speech in cyberspace ŸAssign ŸAssignment 8—due today ŸTerm paper—due 11/20.
Ch3 Freedom of Speech The US Constitution.
IS 490 Notes for Baase Textbook, Chapter 3. Check the Homework Page for the weekly assignment (it's due next Monday). Go to the Angel Page for this course,
Ethics in Information Technology, Second Edition 1 Computer & Society Week 6 Marwan Al-Namari.
Ethics in Information Technology, Second Edition Chapter 5 Freedom of Expression.
Computer Ethics. 2 Networking * The Internet is a network of networks that uses two protocols, known as TCP/IP, to control the exchange of data. * The.
The Internet Industry Week Four. RISE OF THE INTERNET THE INTERNET – a global system of interconnected private, public, academic, business, and government.
Moral, Social and Ethical issues associated with the Internet
Chapter 3: 1st Amendment.
Chapter 9: The Internet and World Wide Web Two contrasting views: Media Critic Marshall McCLuhan: the Internet would help create a “global village” of.
Electronic Marketing: Integrating Electronic Resources into the Marketing Process, 2e 11/5/2015  2004 Joel Reedy and Shauna Schullo Electronic Marketing.
1 Freedom of Speech In Cyberspace Changing Communications Paradigms Changing Communications Paradigms Offensive Speech and Censorship in Cyberspace AnonymitySpam.
CptS 401 Adam Carter. Quiz Question 7 Obscene speech is protected by the First Amendment. A. True B. False 2.
October 21, 2008 Jennifer Q.; Loriane M., Michelle E., Charles H. Internet Safety.
Issues and Problems Concerning the Internet Copyright ◦ Users pass off as others work and post it as their own work without giving credit to the source.
ICS 424: Freedom of expression Aj. Thoranin Intarajak.
Slides prepared by Cyndi Chie and Sarah Frye A Gift of Fire Third edition Sara Baase Chapter 3: Freedom of Speech.
Freedom of Speech Computers in the World.
Slides prepared by Cyndi Chie and Sarah Frye A Gift of Fire Third edition Sara Baase Chapter 3: Freedom of Speech.
Lecture2 Networking. Overview and spam World Wide Web Censorship Freedom of expression Children and inappropriate content Breaking trust on the.
1 Internet – The Good, the Bad, and the Ugly Module 4 Section 3.
FREEDOM OF SPEECH COSC 380 Eric Carroll Courtney Wirtz Adolphe Ngabo.
A Gift of Fire, 2edChapter 5: Freedom of Speech in Cyberspace1 Anonymity Common Sense and the Internet Early publications by some of our Founding Fathers.
The History of Journalism Matters of Law Ethics in a Multimedia World History/Law and Ethics.
Chapter 19: Civil Liberties: First Amendment Freedoms Section 3.
Impact of Computers on Society 5-A. Freedom of Speech.
Judith Davis – Community Safety Officer Northumberland County Council.
Acceptable Use Policy (Draft)
The First Amendment ESSENTIAL QUESTION How do societies balance individual and community rights?
The Internet Industry Week Two.
CHAPTER 5 FREEDOM OF EXPRESSION.
Freedom of Expression.
GOSSIP and CYBERBULLYING
A Gift of Fire Fourth edition Sara Baase
Bill of Rights- First Amendment Notes
KWL Topic: 1st amendment
SOCIAL MEDIA: ARE YOU PLAYING IT SAFE?.
GOSSIP and CYBERBULLYING
A Gift of Fire Third edition Sara Baase
Constitutional Issues
Freedom of Speech in Cyberspace
Behind the Machine “The Good, The Bad, and the Ugly”
A Gift of Fire Third edition Sara Baase
A Gift of Fire Third edition Sara Baase
Presentation transcript:

Social, Legal, and Ethical Issues for Computing Technology CCIT 234 Chapter 3: Freedom of Speech TA: Reem Almogary

Chapter outline: Communications Paradigms Controlling Speech Anonymity Regulating communication media Free speech principles Controlling Speech Offensive speech. Censorship laws and alternative to censorship. Spam. Anonymity The Global Net: Censorship and Political Freedom Aiding foreign censor Net Neutrality

Introduction to communications paradigms The Internet brought us Extraordinary opportunities for access to many voices and points of view all over the world. Internet let us all be publisher, thus Number of blogs passed 150 million by 2010. توضيح ماهي وسائل الاتصال والتعمق بالانترنت The Internet brought us: Extraordinary opportunities for increasing free expression of ideas. Easy and inexpensive communication between people of different countries. Extraordinary opportunities for access to many voices and points of view all over the world.

Introduction to communications paradigms We practice the right “freedom of speech” to “publish” whatever we wish; it is available for anyone who chooses to read it. Due to the risks and misuse of this right “freedom of speech” First Amendment, law granted the free of speech and press First amendment defention is not included in any exam or homework

1.Regulating communication media First amendment protection and Government regulation of communications media: Print media (newspapers, books, magazines). Has the strongest First Amendment protection. Trend toward fewer government restraints on printed words. Legally liable for content they provide. Broadcast (television, radio). The government regulates both the structure of the broadcasting industry and the content of programs. The restriction on broadcast was more than printed media. After slide. Mike Godwin Says: It’s not one to one, telephone ill-suited reaching large number of ppl It’s not One to many, tv newsp ill-suited for feedback from the audience It is Many to many, web you don’t need to be $ or win the approval of publishing First Amendment’s protection of freedom of the press means to individual as it means to NYT. التعديل الأول للدستور الذي يحمي حرية الصحفين وحرية الصحافة ينطبق على الافراد في الانترنت كما هو ينطبق على الجرائد والصحفين Law professor Eric M. Freedman sums up: “Historical experience—with the printing press, secular dramatic troupes, photographs, movies, rock music, broadcasting, sexually explicit telephone services, video games, and other media—shows that each new medium is viewed at first by governments as uniquely threatening, because it is uniquely influential, and therefore a uniquely appropriate target of censorship.”3 -------------

1.Regulating communication media Common carriers (telephone, and the postal system). provide a medium of communication (not content) and must make their service available to everyone. The law prohibited them from controlling the content of material that passes through their system. No responsibility for illegal content they provide.

1.Regulating communication media The World Wide Web became major arena for distribution of news, information, and opinion. Why? Because of: The flexibility of computer communications systems. They do not fit into the publishing, broadcasting, and common carriage paradigms. Does ISP hold responsibility for inappropriate content on internet? No , Telecommunication act This law protect internet service providers, they irresponsible for the content they provide. Telecommunication act 1996 No provider or user of interactive computer service shall be treated as a publisher of any information provided by another information- content provider less restriction on provider better and rich content by users. Communications media providers (publisher, broadcaster)they are legally liable for the content they provide, but internet service providers were irresponsible for the content they provide.

2.Free speech principles The first amendment (which include Freedom of speech right ) covers written and spoken words, pictures, art and other forms of expression of ideas and opinion. Principles and guidelines developed to protect expression: Advocating illegal acts is legal. Does not protect libel and direct, specific threats. Inciting violence is illegal. Intro- We need guidelines for free speech what is exactly legal and what is not Written for offensive and/or controversial speech and ideas, is in the constitution. It restrict the power of government. Website decline specific ads and that’s doesn’t Violate freedom of speech for aders.

Controlling speech What is offensive speech: It could be political, religious, cultural, build bomb or any controversial speech. There are many effort to censor the internet focus on offensive materials. Example of banned china, restrict reporting of emergency and how tho government handle them Georgia banned picture of mariwana French prohibited recording of violence viedo except for journalist Internet was for research and good stuff but then people misuse it. Example of offensive speech: build bomb suicide and alcoholic sexual …..etc

Controlling speech Censorship laws: Communication decency act A variety of groups began a campaign to pass federal legislation to censor the Internet. Communication decency act Restricted indecent material on the net. the censorship provisions of CDA were rejected. Child online protection Act its a crime for websites to make available to minors, material “harmful to minors” as judged by community standards. It require adult provide ID to view material not appropriate to minors. The law was rejected. 2 COPA restricts access to a substantial amount of online speech that is lawful for adults, and COPA’s requirements that adults provide identification to view material not appropriate for minors would have an unconstitutional chilling effect on free speech.

Controlling speech 3. Children's internet protection Act Require libraries and schools (any reception of federal fund) to use filter software on Internet terminals. Outside libraries and schools there was no filters. Adult can ask to disable the filter. It is less restrictive and more desirable to use filtering software than censorship. CIPA was accepted. When internet first used in libraries: Some people look at inappropriate picture for long hours.-box and shield were used, timer and ask theme to stop view inappropriate. Children accessed adult material.- filter SW Children and adult accessed adult and political material. Do we have censorship in KSA, What type of censorship do we have in KSA?

Alternatives to censorship 1. Software filters work in Varity of ways: It can block website with specific word, phrase or image. It can block sites according to rating system. It can block sites according to customized list. But filters are not accurate, they either filter too much or too little. 2. Policies developed by online communication and social networking sites to protect their member: Expelling subscribers who post offensive material. Remove offensive material. Allow subscriber to lock children out from some area. Video game develop rating system

Spam Spam is unsolicited bulk email, nowadays it applies to tweet, messages and phone calls. Most spam is commercial advertising. Why? Because the email advertising is cheap comparing to printed advertising. Spam anger people because the content and the way its sent. E-mail spam, also known as junk e-mail , is a subset of spam that involves nearly identical messages sent to numerous recipients by e-mail . Undesired electronic messages How company can have your email? Buy the list of email. Some use automated software that collect email in the web

Spam spam can’t be banned because of the free of speech right. Freedom of speech does not require the intended listener, or message recipient, to listen. Spam filters do not violate free speech. Variety of filtering products to screen out spam at the recipient’s site was created. Spammers have right to speech. Man was canted nine years because spam email filters can do the following blocking email from specified addresses, by blocking messages with particular words, and by more sophisticated methods.

Spam

Anonymity Anonymity when someone not want to be known to hold certain view. So he Keeps his real identity private. For example, Writing under pseudonyms (aliases, screen name). Early use of anonymity was in publication: In the 19th century, when it was inappropriate for women to write a book, women published under male pseudonyms. Academic people published non scholarly work. Other writer published for the fun of it. Anonymity definition can be found in the book page 176.

Anonymity Positive uses of anonymity: Protect against retaliation. Whistleblowers, reporters and human right activists . Protect against embarrassment. Over personal topic (health, bad habit and victims of violence and abuse). Help people get around their government restrictions on internet access, using anonyms web surfing (surf the internet anonymously). Prevent businesses from collecting information about people web activity and use it for marketing purposes, using anonymous web browser. Reasons why someone go anonymous?

Anonymity Anonymizing will not benefit individual, it benefits business and government as well, for example : when business want to keep project secret from its competitor. To aid in law enforcement.

Anonymity Negative uses of anonymity: If anonymity protects criminal and antisocial activities. For example fraud, harassment and steal confidential business document..etc. Anonymity technology burden law enforcement because it's difficult to track wrongdoers. When anonymous posting can spread false rumors which will damage a business and manipulate stock. When it mask illegal surveillance by government. Third point it is not legal for government to do this type of surveillance but they did it any way cause no one well know this is gov.

The Global Net: Censorship and Political Freedom Internet threaten government in countries that lack of political and cultural freedom. Because web site with content that is illegal in one country can be set up in some other country. Where people (from unfree country) can access the information on the web. The government learned and adopted countermeasure to block the flow of these information.

The Global Net: Censorship and Political Freedom Countries are struggling with the difficulties of modernizing their economy and technology while maintaining tight control over information. Censorship and interception tool that have been used in some countries such as: Saudi Arabia: block topics such as pornography, gambling and information about thwart filters. China: Banned or censored sites, Facebook, Google All religions sites. and Human rights organizations Iran: blocked Wikipedia, amazon and you tube.

The Global Net: Censorship and Political Freedom Censorship and interception tool that have been used in some countries such as: Turkey: They banned YouTube for 2 years. Pakistan: Banned internet. Burma: Banned the use of internet or creation of web pages without official permission. Vietnam :Use software filters to find and block anti communist message.

Aiding foreign censor For companies who offer services in countries with strict censorship, and want to operate within a country, companies must follow the laws of the country. Example of companies who comply with local laws of country: Yahoo and MSN: comply with the Chinese laws and omit stories that offend the government. Google: introduced Chinese version of Google which was censored. but, stopped the censor version 4 years later. companies: Search engine companies, social media companies, and news and entertainment companies based in free countries

Net neutrality regulation or the market “Net neutrality” refers to a variety of proposals for restrictions on how (telephone)companies interact with their customers (internet user) and how they set charges for services. Considering two issues: Should companies be permitted to exclude or give special treatment to content transmitted based on the content itself or on the company that provides it? Should companies be permitted to provide different levels of speed at different prices? مجموعه مقترحه من القيود كيف تتعامل شركات مزودي الانترنت مع المستخدمين وكيف تقدم لهم الخدمة وما هي الأسعار اللي تفرضها على المستخدمين Book definition :refers to a variety of proposals for restrictions on how telephone and cable companies interact with their broadband customers (primarily for Internet services) and how they set charges for services. For example, internet companies like STC and Mobily can't choose to block or slow down websites or content online. The internet was there to help provide a space of free expression

Net neutrality regulation or the market Advocates of Net neutrality: telecommunications companies should: treat all legal content that travels through their networks the same way. charging all customers the same rate for sending information over the Internet. not giving priority to any particular content or customer. Opponents of Net neutrality: will slow the advance of high-speed Internet connection and improvements in infrastructure. unethical interference in the free choices of sellers and buyers. https://www.youtube.com/watch?v=DKB2cCarKUs https://www.youtube.com/watch?v=-fVy-MKykI0