A Gift of Fire Fourth edition Sara Baase

Slides:



Advertisements
Similar presentations
Freedom of Speech (Part 3)
Advertisements

Chapter 12 Prostitution, Pornography, & the Sex Trade
Slides prepared by Cyndi Chie and Sarah Frye A Gift of Fire Third edition Sara Baase Chapter 3: Freedom of Speech.
Freedom of Speech Chapter 37.
Obscenity – is anything that treats sex or nudity in an offensive or lewd manner, violates recognized standards of decency, and lacks serious literary,
Ethics in Information Technology, Fourth Edition
Anonymity and SPAM The Good, the Bad and the Ugly!
MIS PERSONAL, LEGAL, ETHICAL, AND ORGANIZATIONAL ISSUES OF INFORMATION SYSTEMS CHAPTER 4 Hossein BIDGOLI Phishing that bites Paying for Privacy Pirates.
1 Freedom of Expression Prepared By Joseph Leung.
Group Community: A World Without Borders Kimberly Carter David Dobin Tim Hammond Chris Rushing.
A Gift of Fire, 2edChapter 5: Freedom of Speech in Cyberspace1 PowerPoint ® Slides to Accompany A Gift of Fire : Social, Legal, and Ethical Issues for.
Chapter Jacob Niedermier Keith Miller Changing Communications Paradigms The Internet gave us many more chances to voice our opinions.
Chapter 7.6 Content Regulation. 2 History of Censorship Legal source of American speech protection is the 1791 First Amendment to the U.S. Constitution:
Freedom of Speech in Cyberspace 1. The U.S. Constitution - The 1 st Amendment: The 1 st Amendment Congress shall make no law respecting an establishment.
Slides prepared by Cyndi Chie and Sarah Frye (and Liam Keliher) A Gift of Fire Third edition Sara Baase Chapter 3: Freedom of Speech.
INTERNET and CODE OF CONDUCT
Chapter 5 Freedom of Expression
MIS PERSONAL, LEGAL, ETHICAL, AND ORGANIZATIONAL ISSUES OF INFORMATION SYSTEMS CHAPTER 4 LO1 Describe information technologies that could be used in computer.
Brandon Hall CSC 540.  The US Government first attempted to filter the Internet in the early 90’s.  This was an attempt to protect minors against the.
Internet Censorship In order of appearance: Dmitriy Bespalov Ilya Braude Brian McBurney Yaroslav Volkov.
Ethics in Information Technology
Freedom of Speech in Cyberspace
Chapter 3: Freedom of Speech.
A Gift of Fire Third edition Sara Baase
A Gift of Fire Third edition Sara Baase
Freedom of Speech. acts/funddocs/billeng.htm Amendment I “Congress shall make no law respecting an establishment.
Internet regulation National limits of Internet Content.
CS 4001Mary Jean Harrold1 Class 24 ŸFreedom of speech in cyberspace ŸAssign ŸAssignment 8—due today ŸTerm paper—due 11/20.
Ch3 Freedom of Speech The US Constitution.
IS 490 Notes for Baase Textbook, Chapter 3. Check the Homework Page for the weekly assignment (it's due next Monday). Go to the Angel Page for this course,
Ethics in Information Technology, Second Edition Chapter 5 Freedom of Expression.
Computer Ethics. 2 Networking * The Internet is a network of networks that uses two protocols, known as TCP/IP, to control the exchange of data. * The.
Acceptable Use Policy.  The District system includes:  A network of computers that serves all the schools  Saved files on a server for student work.
1 Freedom of Speech In Cyberspace Changing Communications Paradigms Changing Communications Paradigms Offensive Speech and Censorship in Cyberspace AnonymitySpam.
CptS 401 Adam Carter. Quiz Question 7 Obscene speech is protected by the First Amendment. A. True B. False 2.
October 21, 2008 Jennifer Q.; Loriane M., Michelle E., Charles H. Internet Safety.
Issues and Problems Concerning the Internet Copyright ◦ Users pass off as others work and post it as their own work without giving credit to the source.
ICS 424: Freedom of expression Aj. Thoranin Intarajak.
Slides prepared by Cyndi Chie and Sarah Frye A Gift of Fire Third edition Sara Baase Chapter 3: Freedom of Speech.
Freedom of Speech Computers in the World.
Slides prepared by Cyndi Chie and Sarah Frye A Gift of Fire Third edition Sara Baase Chapter 3: Freedom of Speech.
1 Internet – The Good, the Bad, and the Ugly Module 4 Section 3.
FREEDOM OF SPEECH COSC 380 Eric Carroll Courtney Wirtz Adolphe Ngabo.
Tyler Rapp.  I strongly believe anonymous posting should be legal  Why? You have the right, guaranteed to you by the 1 st Amendment in the United States.
A Gift of Fire, 2edChapter 5: Freedom of Speech in Cyberspace1 Anonymity Common Sense and the Internet Early publications by some of our Founding Fathers.
Welcome! The objective of this 16 slide presentation is to: 1. Identify the fundamental issues about Freedom of Speech. 2. Describe positive and negative.
Social Media LCBMS Guidance Staff.
Acceptable Use Policy (Draft)
Social and computational issues in Social Informatics Lesson-2
A Gift of Fire Fourth edition Sara Baase
Media Regulation GOVT 2305, Module 7.
E-Safety Briefing
Learn how to protect yourself against common attacks
Presented by Ika Novita Dewi, MCS
CHAPTER 5 FREEDOM OF EXPRESSION.
Freedom of Expression.
Freedom Independence Transition
A Gift of Fire Third edition Sara Baase
Social, Legal, and Ethical Issues for Computing Technology
Topic 5: Online Communities Press F5 to view!
Control & Censorship & Freedom of Speech
Media Regulation October 19, 2017.
Jeopardy iT Final Jeopardy iT $100 $100 $100 $100 $100 $100 $200 $200
Limits to the Freedom of Speech
A Gift of Fire Third edition Sara Baase
Constitutional Issues
Freedom of Speech in Cyberspace
Behind the Machine “The Good, The Bad, and the Ugly”
A Gift of Fire Third edition Sara Baase
A Gift of Fire Third edition Sara Baase
Presentation transcript:

A Gift of Fire Fourth edition Sara Baase Chapter 3: Freedom of Speech

What We Will Cover Communication Paradigms Controlling Speech Posting, Selling, and Leaking Sensitive Material Anonymity The Global Net: Censorship and Political Freedom Net Neutrality Regulations or the Market? 133

Communication Paradigms Free-speech Principles Really for offensive and/or controversial speech and ideas Covers spoken and written words, pictures, art, and other forms of expression of ideas and opinions Restriction on the power of government, not individuals or private businesses Publishers do not have to publish material they consider offensive, poorly written, or unlikely to appeal to their customers for any reason. Rejection or editing by a publisher is not a violation of the writer’s First Amendment rights. Web sites, search engine companies, and magazines may decline specific advertisements if they so choose. That does not violate the advertiser’s freedom of speech. 137-138

Controlling Speech Offensive speech: What is it? What is illegal? Answers depend on who you are. Most efforts to censor the Internet focus on pornographic and other sexually explicit material The state of Georgia tried to ban pictures of marijuana from the Internet. A doctor argued for regulating medical discussion on the Net so that people would not get bad advice. The Chinese government restricts reporting of emergencies (such as major accidents or disasters) and how the government handles them. The French government approved a law banning anyone except professional journalists from recording or distributing video of acts of violence. The distinctions between categories such as erotica, art, and pornography are not always clear, and different people have very different personal standards. 139

Obscenity Depicts a sexual act against state law Depicts these acts in a patently offensive manner that appeals to prurient (excessive ) interest as judged by a reasonable person using community standards Lacks literary, artistic, social, political or scientific value The First Amendment does not protect obscenity, but how does one determine something is obscene? The 1973 Supreme Court Miller v. California decision established a three-part guideline for determining whether material is obscene under law. The second point – the application of community standards – was a compromise intended to avoid the problem of setting a national standard of obscenity in so large and diverse a country. Thus, small conservative or religious towns could restrict pornography to a greater extent than cosmopolitan urban areas. 140

Controlling Speech Freedom of speech guidelines Distinguish speech from action. Advocating illegal acts is (usually) legal. Laws must not chill expression of legal speech. Do not reduce adults to reading only what is fit for children. Solve speech problems by least restrictive means. 142

Controlling Speech Alternatives to censorship Filters Blocks sites with specific words, phrases or images Parental control for sex and violence Updated frequently but may still screen out too much or too little Not possible to eliminate all errors What should be blocked? 145

Controlling Speech Alternatives to censorship Policies Commercial services, online communities, and social networking sites develop policies to protect members. Video game industry developed rating system that provides an indication for parents about the amount of sex, profanity, and violence in a game. 145

Controlling Speech Discussion Question Why is ‘least restrictive means’ important? Do you consider the Internet an appropriate tool for young children? Why or why not? 141-145

Controlling Speech Sexting Sending sexually suggestive or explicit text or photos, usually by cellphone or social media Can meet the definition of child pornography if subject is under 18 Many young people (like many adults) do not think about how quickly something intended for one person or small group spreads to a large audience, or how difficult it is to remove something from cyberspace once it is out there. Possession of child pornography is illegal, so children who have pictures of friends under 18 on their phones that prosecutors think meet the definition of child pornography are potentially in violation. Should it be a criminal felony with severe penalties that can include being put in a sex-offender database for many years? What other mechanisms (besides child pornography laws) can we use to discourage sexting? Legislatures in a few states have revised their state’s law in a variety of ways to reduce the penalties for sexting. Some have made it a misdemeanor, rather than a felony, if a younger person sends an illegal photo to another young person of similar age. Some have reduced or eliminated penalties if photos were distributed (among minors) with the consent of the person in the picture. 147

Controlling Speech Spam What’s the problem? Free speech issues Loosely described as unsolicited bulk email Mostly commercial advertisement Angers people because of content and the way it’s sent Free speech issues Spam imposes a cost on recipients Spam filters do not violate free speech (free speech does not require anyone to listen) The term spam, in the context of electronic communications, was adopted in the 1990s to mean unsolicited bulk email. It now applies to text messages, tweets, and phone calls as well. Spam developed because email is extremely cheap compared to printed direct-mail advertising. 148-149

Controlling Speech Spam (cont.) Anti-spam Laws Controlling the Assault of Non-Solicited Pornography and Marketing Act (CAN-SPAM Act) Targets commercial spam Criticized for not banning all spam, legitimized commercial spam The CAN-SPAM act covers labeling of advertising messages (for easier filtering), opt-out provisions, and methods of generating emailing lists. Commercial messages must include: valid mail header information (that is, not faking the “From” line to disguise the sender is prohibited) valid return address clear and honest subject lines 151

Anonymity Positive uses of anonymity Protect political speech Protect against retaliation and embarrassment Anonymizing services used by individuals, businesses, law enforcement agencies, and government intelligence services Anonymizers are services available to send anonymous email. Reporters, human rights activists, citizens in repressive countries, and ordinary people use anonymous email to protect themselves. Businesses, law enforcement agencies, and government intelligence services also use anonymizers. A business might want to keep its research and planning about new products secret from competitors. If competitors can get logs of Web sites that a company’s employees visit, they might be able to figure out what the company is planning. Anonymous Web surfing aids law enforcement investigations. Suppose law enforcement agents suspect a site contains child pornography, terrorist information, copyright-infringing material, or anything else relevant to an investigation. If they visit the site from their department computers, they might be blocked or see a bland page with nothing illegal. (Web sites can determine the IP addresses of a visitor and can block access from specified addresses or put up alternate pages for those visitors.) 159-161

Anonymity Negative uses of anonymity protects criminal and antisocial activities aids fraud, harassment, extortion, distribution of child pornography, theft, and copyright infringement masks illegal surveillance by government agencies Glowing reviews (such as those posted on eBay or Amazon.com) may actually be from the author, publisher, seller, or their friends. U.S. and European countries are working on laws that require ISPs to maintain records of the true identity of each user and maintain records of online activity for potential use in criminal investigations. 161-162

Anonymity Discussion Questions Where (if anywhere) is anonymity appropriate on the Internet? What are some kinds of Web sites that should prohibit anonymity? Where (if anywhere) should laws prohibit anonymity on the Internet? 159-162

The Global Net: Censorship and Political Freedom Tools for communication, tools for oppression (cont.) Attempts to limit the flow of information on the Internet similar to earlier attempts to place limits on other communications media Some countries own the Internet backbone within their countries and block specific sites and content at the border Some countries ban all or certain types of access to the Internet The government of Iran, at various times, blocked the sites of amazon.com, Wikipedia, the New York Times, and YouTube. It also blocked a site advocating the end of the practice of stoning women. Generally, the government says it blocks sites to keep out decadent Western culture. 163-165

The Global Net: Censorship and Political Freedom Tools for communication, tools for oppression (cont.) Avoiding censorship: the global nature of the Net allows restrictions (or barriers) in one country to be circumvented by using networks in other, less restrictive countries. Creating censorship: the global nature of the Net makes it easier for one nation to impose restrictive standards on others. 163-165

The Global Net: Censorship and Political Freedom Discussion Question Will the Internet and related communication technologies be tools for increasing political freedom, or will they give more power to governments to spy on, control, and restrict their people? 163-165

The Global Net: Censorship and Political Freedom Aiding foreign censors and repressive regimes Yahoo and French censorship Yahoo, eBay and others make decisions to comply with foreign laws for business reasons Skype and Chinese control Chinese government requires modified version of Skype To operate in China, the Chinese government requires Skype work in a joint venture with a Chinese communications company (TOM), use a modified version of the Skype software, and filter out sensitive topics from text chat. According to a study by a Canadian university, the modified software allowed widespread surveillance, and TOM stored information from millions of messages. 165-167

The Global Net: Censorship and Political Freedom Aiding foreign censors and repressive regimes Companies who do business in countries that control Internet access must comply with the local laws Google argued that some access is better than no access In 2006, Google disappointed many free speech and human rights advocates by introducing a Chinese version in China, google.cn, that would comply with Chinese law. Its search results did not show sites with banned content. Google co-founder Sergey Brin, who was born in the Soviet Union and experienced totalitarian government, was uneasy with the 2006 censoring decision. Google stopped operating the censored search engine in 2010. The company withdrew most operations from China but offered its search service through Hong Kong, which, though part of China, has different laws. The main impetus for the change was the highly sophisticated hack attack originating in China on Google and about 30 other companies. A primary goal of the attack appeared to be access to Gmail accounts of Chinese human rights activists. 165-167