Expression on the Net Is it possible to control what is seen and by whom on the network? Like a book? Newpapers? Phone call? Television? Where to regulate:

Slides:



Advertisements
Similar presentations
Cyber Bullying Everything you need to know. How is it different from normal bullying? By using technology like mobiles or the internet, this type of bullying.
Advertisements

Slides prepared by Cyndi Chie and Sarah Frye A Gift of Fire Third edition Sara Baase Chapter 3: Freedom of Speech.
Free speech in the United States Technology and the public network of information A fine line between aggression and expression Strengthening the first.
Freedom of Speech. Purpose for Freedom of Speech: To guarantee to each person a right of Free expression, in the Spoken and the Written word, and by all.
Ethics in Information Technology, Second Edition
1 Freedom of Expression Prepared By Joseph Leung.
CptS 401, Spring /10/2011 Chapter : Freedom of Speech I See Dilbert cartoons about freedom of speech:
8 - Free Speech Harvard CSCI E-2a November 17, 2008 Harvard CSCI E-2a November 17, 2008.
Group Community: A World Without Borders Kimberly Carter David Dobin Tim Hammond Chris Rushing.
Regulating speech How the Net changes attitudes and assumptions, and creates new societal tensions 1 and unintended consequences March 10, 2011Harvard.
A Gift of Fire, 2edChapter 5: Freedom of Speech in Cyberspace1 PowerPoint ® Slides to Accompany A Gift of Fire : Social, Legal, and Ethical Issues for.
Forced Internet Filtering Thomas Mahoney. Internet Filtering ► Techniques  Technical blocking  Search result removal  Take-Down  Self-Censorship ►
Freedom of Speech in Cyberspace 1. The U.S. Constitution - The 1 st Amendment: The 1 st Amendment Congress shall make no law respecting an establishment.
Chapter 5 Freedom of Expression
Internet Filtering : Should libraries filter internet content? Paul M. Schoenhard ’00 CS 99, 00W 7 March 2000.
Brandon Hall CSC 540.  The US Government first attempted to filter the Internet in the early 90’s.  This was an attempt to protect minors against the.
BY: ASHLEY ESTEP, ALYSIA GEORGE, AND ASHLEY MOFFETT Internet Safety.
Chapter 17.3 Regulating the Internet. Internet Speech ► Free speech is a key democratic right. The Internet promotes free speech by giving all users a.
Freedom of Speech in Cyberspace
A Gift of Fire Third edition Sara Baase
Anti- bullying week Year 4.
Freedom of Speech. acts/funddocs/billeng.htm Amendment I “Congress shall make no law respecting an establishment.
CS 4001Mary Jean Harrold1 Class 24 ŸFreedom of speech in cyberspace ŸAssign ŸAssignment 8—due today ŸTerm paper—due 11/20.
Chantz Martin.  Put computer in a common place in the house  Use Internet filters and blocks  Talk to children about the dangers of the Internet.
Ch3 Freedom of Speech The US Constitution.
Ethics in Information Technology, Second Edition 1 Computer & Society Week 6 Marwan Al-Namari.
Ethics in Information Technology, Second Edition Chapter 5 Freedom of Expression.
Lesson 4: Taking Perspectives on Cyberbullying THE CYBER BULLYING VIRUS
Chapter 3: 1st Amendment.
Chapter 18 Obscenity & Pornography. Pornography Protected by First Amendment Unless child pornography-not protected PgP BUSA331 Chapter 182.
Expression on the Net Is it possible to control what is seen and by whom on the network? Like a book? Newpapers? Phone call? Television? Where to regulate:
Technology can help us: Communicate with others Gather information Share ideas Be entertained Technology has improved our quality of life!
Freedom of Speech First Amendment Expression, Speech and Symbolic Speech.
1 Freedom of Speech In Cyberspace Changing Communications Paradigms Changing Communications Paradigms Offensive Speech and Censorship in Cyberspace AnonymitySpam.
CptS 401 Adam Carter. Quiz Question 7 Obscene speech is protected by the First Amendment. A. True B. False 2.
October 21, 2008 Jennifer Q.; Loriane M., Michelle E., Charles H. Internet Safety.
How is Democracy Socially Constructed? Is it Through Conflict We Find Social Reality? Presented by: Chelsea Jonson Spring
ICS 424: Freedom of expression Aj. Thoranin Intarajak.
Slides prepared by Cyndi Chie and Sarah Frye A Gift of Fire Third edition Sara Baase Chapter 3: Freedom of Speech.
Freedom of Speech Computers in the World.
Unless otherwise noted, the content of this course material is licensed under a Creative Commons Attribution 3.0 License.
Thinking about tech challenges to free speech New technologies always challenge old regulatory regimes—print, telegraph, telephone, radio, internet Why.
Activity 2 Sharing Images – The Law. Sexting
Slides prepared by Cyndi Chie and Sarah Frye A Gift of Fire Third edition Sara Baase Chapter 3: Freedom of Speech.
1 st ten amendments basic freedoms protect citizens from a overly-powerful central gov’t.
By: Katie Rosengrant, Jacquelyn Brode, & Jamie Wheeler.
Anna Buchanan & Alix Gilmore. 6:43.
Digital Citizenship Project Justin Lann. Netiquette Netiquette on Social Media Sites – A set of social conventions that facilitate interactions over networks.
A Gift of Fire, 2edChapter 5: Freedom of Speech in Cyberspace1 Anonymity Common Sense and the Internet Early publications by some of our Founding Fathers.
Jeopardy CH4CH5CH6CH7 CH8 Q $100 Q $200 Q $300 Q $400 Q $500 Q $100 Q $200 Q $300 Q $400 Q $500 Final Jeopardy.
Keeping our Children Safe on the internet
CHAPTER 5 FREEDOM OF EXPRESSION.
Freedom of Expression.
Discussion 2 Forum 7 Name Question # Group Task Lawrence Spencer 2
Bill of Rights- First Amendment Notes
In order of appearance:
Freedom of Speech … refers to the ability of a person to publicly speak or publish any thought without legal constraints or repercussions. In this section:
Expression on the Net Is it possible to control what is seen and by whom on the network? Like a book? Newpapers? Phone call? Television? Where to regulate:
Expression on the Net Is it possible to control what is seen and by whom on the network? Like a book? Newpapers? Phone call? Television? Where to regulate:
A Gift of Fire Third edition Sara Baase
Constitutional Issues
Follow safety rules so that YOU: Avoid getting HURT.
Theories Behind Freedom of Expression
Freedom of Speech in Cyberspace
Developing a TLP Cyber safety Charter
Chapter 6.1 Regulating the Internet
A Gift of Fire Third edition Sara Baase
A Gift of Fire Third edition Sara Baase
Who owns the Bits? Digital copyright issues are continually evolving.
PRESENTATION OUTLINE Introduction.
Presentation transcript:

Expression on the Net Is it possible to control what is seen and by whom on the network? Like a book? Newpapers? Phone call? Television? Where to regulate: source->ISP->cloud->ISP->desitination Publisher or Distributor? Product manufacturer or trucker? If content is managed/filtered then acting as a publisher (see Oakmont v. Prodigy). Resulted in ISP’s not trying to filter content. Miller test - Community standard with the “average person” test – but where is the community? Bits can go everywhere. (Dirmeyer of Tenn. v. Thomas of CA and the “Nastiest Place on Earth”) In this instance bits were like books No metaphor is perfect, ISP’s ruled as distributor Thomas’ in CA won case based on San Fran. Stanards, lost on Tenn standards. Ruled they did know where the bits were going via telephone # ITEC 102

Communications Decency Act CDA passed in 1996 in response to cyberporn access Crime to use “any interactive computer service to display in a manner available to a person under 18 years of age …” Display provisions ruled unconstitutional Legally put the control at the point of exit from the cloud Result was a “Good Samaritan” clause added to CDA allowing ISP filtering attempts Zeran case – poor taste T-shirts and no recourse due to anonymous postings. In this case ISP was a knowing distributor Original study from CMU published in student pub at Georgetown law review seriously flawed ITEC 102

Who is being harmed? Child Online Protection Act (COPA) 1998 – under 17 Cannot reliably tell if communication link is with human, computer, minor, etc. COPA’s reach ended at U.S. boarders – how to deal with bits from abroad? Speech illegal when incites “imminent lawless action” – rarely met by printed words. Internet bullying problems have resulted in many state anti-bullying laws and proposed federal laws. Hard to specifically define “annoying” – current Deleting online predators act (DOPA) stuck in congress Technological changes happen faster than legal changes ITEC 102