Slides prepared by Cyndi Chie and Sarah Frye1 Freedom of Speech.

Slides:



Advertisements
Similar presentations
Internet Safety and Standard Operating Procedures School Board Meeting-February 14, 2012.
Advertisements

Slides prepared by Cyndi Chie and Sarah Frye A Gift of Fire Third edition Sara Baase Chapter 3: Freedom of Speech.
First Amendment Rights. Freedom of Speech Freedom of Expression Absolutely Protected Speech Prior Restraint (PR) Void for Vagueness Least Drastic Means.
Freedom of Speech Chapter 37.
Ethics in Information Technology, Fourth Edition
Civil Liberties and Public Policy Chapter 4. The Bill of Rights– Then and Now Civil Liberties – Definition: The legal constitutional protections against.
Ethics in Information Technology, Second Edition
Access to Electronic Media Acceptable Use Policy August 8, 2011 Meece Middle School.
1 Freedom of Expression Prepared By Joseph Leung.
Group Community: A World Without Borders Kimberly Carter David Dobin Tim Hammond Chris Rushing.
A Gift of Fire, 2edChapter 5: Freedom of Speech in Cyberspace1 PowerPoint ® Slides to Accompany A Gift of Fire : Social, Legal, and Ethical Issues for.
Freedom of Speech Professor Matt Thatcher. 2 Last Class l Workplace privacy –how is electronic monitoring different from traditional monitoring? –types.
Workplace Monitoring Store & review messages (keyword search): 46.5% Store & review computer files (keyword search): 36.1% Monitor Internet connections:
Chapter Jacob Niedermier Keith Miller Changing Communications Paradigms The Internet gave us many more chances to voice our opinions.
Freedom of Speech in Cyberspace 1. The U.S. Constitution - The 1 st Amendment: The 1 st Amendment Congress shall make no law respecting an establishment.
Slides prepared by Cyndi Chie and Sarah Frye (and Liam Keliher) A Gift of Fire Third edition Sara Baase Chapter 3: Freedom of Speech.
Chapter 5 Freedom of Expression
Freedom of Speech and Freedom of Assembly. The Purpose of Freedom of Speech 1 to guarantee to each person a right of free expression, in the spoken and.
Brandon Hall CSC 540.  The US Government first attempted to filter the Internet in the early 90’s.  This was an attempt to protect minors against the.
Ethics in Information Technology
Freedom of Speech in Cyberspace
Chapter 3: Freedom of Speech.
A Gift of Fire Third edition Sara Baase
A Gift of Fire Third edition Sara Baase
CS 4001Mary Jean Harrold1 Class 23 ŸFreedom of speech in cyberspace ŸAssign ŸAssignment 8—due 11/13 ŸTerm paper—due 11/20.
Freedom of Speech. acts/funddocs/billeng.htm Amendment I “Congress shall make no law respecting an establishment.
CS 4001Mary Jean Harrold1 Class 24 ŸFreedom of speech in cyberspace ŸAssign ŸAssignment 8—due today ŸTerm paper—due 11/20.
Civil Liberties and Public Policy. The Bill of Rights– Then and Now Civil Liberties – Definition: The legal constitutional protections against the government.
Civil Liberties and Public Policy
Ch3 Freedom of Speech The US Constitution.
IS 490 Notes for Baase Textbook, Chapter 3. Check the Homework Page for the weekly assignment (it's due next Monday). Go to the Angel Page for this course,
Ethics in Information Technology, Second Edition 1 Computer & Society Week 6 Marwan Al-Namari.
Ethics in Information Technology, Second Edition Chapter 5 Freedom of Expression.
Computer Ethics. 2 Networking * The Internet is a network of networks that uses two protocols, known as TCP/IP, to control the exchange of data. * The.
LIBS100 July 20, 2005 First Amendment Library Bill of Rights.
The Bill of Rights The First 10 Amendments. Amendment 1 Protects 5 freedoms Religion Assembly Press Petition Speech.
Chapter 19: Civil Liberties: First Amendment Freedoms Section 3
Media Law: Understanding Freedom of Expression Chapter Outline  History  Today’s Media Law  Controversies.
Freedom of Speech and Press. The Big Idea While the 1st and 14th Amendments gives Americans the right to express ideas freely, the Constitution and the.
1 Freedom of Speech In Cyberspace Changing Communications Paradigms Changing Communications Paradigms Offensive Speech and Censorship in Cyberspace AnonymitySpam.
CptS 401 Adam Carter. Quiz Question 7 Obscene speech is protected by the First Amendment. A. True B. False 2.
October 21, 2008 Jennifer Q.; Loriane M., Michelle E., Charles H. Internet Safety.
Understanding CIPA Renee Hobbs LSC 530 Texts and Tools for Children and Youth.
ICS 424: Freedom of expression Aj. Thoranin Intarajak.
Slides prepared by Cyndi Chie and Sarah Frye A Gift of Fire Third edition Sara Baase Chapter 3: Freedom of Speech.
Freedom of Speech Computers in the World.
Copyright © 2009 Pearson Education, Inc. Publishing as Longman. Civil Liberties and Public Policy Chapter 4  1 st Amendment Edwards, Wattenberg, and Lineberry.
Chapter 14 How Universal is access to Computers and the Web.
Civil Liberties and Public Policy Chapter 4. The Bill of Rights– Then and Now Civil Liberties – Definition: The legal constitutional protections against.
Slides prepared by Cyndi Chie and Sarah Frye A Gift of Fire Third edition Sara Baase Chapter 3: Freedom of Speech.
Laws and Rules That Govern Internet Safety Ashley Martin.
1 Internet – The Good, the Bad, and the Ugly Module 4 Section 3.
School Accounts Presented by: Mrs. Mazzola.
1 st ten amendments basic freedoms protect citizens from a overly-powerful central gov’t.
FREEDOM OF SPEECH COSC 380 Eric Carroll Courtney Wirtz Adolphe Ngabo.
The 1 st Amendment U.S. Government Ms. Kemp. 1 st Amendment Rights Press Press Religion Religion Petition Petition Assembly Assembly Speech Speech.
1. Vagueness and Overbreadth: Laws governing free speech must be clear and specific. > Laws that unnecessarily prohibit too much expression are considered.
A Gift of Fire, 2edChapter 5: Freedom of Speech in Cyberspace1 Anonymity Common Sense and the Internet Early publications by some of our Founding Fathers.
Chapter 19: Civil Liberties: First Amendment Freedoms Section 3.
Presented by Ika Novita Dewi, MCS
CHAPTER 5 FREEDOM OF EXPRESSION.
Freedom of Expression.
Slides prepared by Cyndi Chie and Sarah Frye
A Gift of Fire Fourth edition Sara Baase
Bill of Rights- First Amendment Notes
A Gift of Fire Third edition Sara Baase
Constitutional Issues
Freedom of Speech in Cyberspace
A Gift of Fire Third edition Sara Baase
A Gift of Fire Third edition Sara Baase
Presentation transcript:

Slides prepared by Cyndi Chie and Sarah Frye1 Freedom of Speech

2 Changing Communications Paradigms Regulatory Paradigms Internet, BBSs, commercial online services, and the WWW: Not exactly print media. Not exactly broadcast media. Not exactly common carrier.

3 Changing Communications Paradigms The First Amendment –Protects Citizens From Government Prohibits restriction of speech, press, peaceful assembly, and religion. –Subsequent Interpretations Address: Offensive (tidak sopan) and/or controversial speech and ideas, Spoken and written words, Pictures, art, and other forms of expression and opinion, and Commercial speech (e.g. advertising).

4 Offensive Speech and Censorship in Cyberspace Speech Might Include: Political or religious speech. Pornography. Sexual or racial slurs. Nazi materials. Libelous (pencemaran nama baik) statements. Abortion information. Alcohol ads.

5 Offensive Speech and Censorship in Cyberspace –Material is considered obscene (cabul) if all three parts are met: 1. It depicts sexual acts whose depiction (penggambaran) is specifically prohibited by state law, and 2. It depicts these acts in a patently offensive (tidak sopan, menjijikkan) manner, appealing to the prurient (birahi) interest as judged by a reasonable person using community standards, and 3. It has no serious literary, artistic, social, political, or scientific value.

6 Not Obscene (tidak Cabul) ??

7 Obscene (Cabul)

8 Material Inappropriate for Children –Technology Changes the Context On the Web, children have access to the same ‘adult’ text, images, videos, etc. as adults. Online proprietors don’t know the customer is not an adult. –Protecting Children Regardless of the medium: It is illegal to create, possess or distribute child pornography. It is illegal to lure children into sexual activity.

9 Limiting Internet Access in Libraries and Schools –Filtering Software Benefit: prevent access to inappropriate material on the Internet by screening words or phrases, blocking sites according to rating system, or disallowing access to specific sites in a list. Problems: can be ineffective—kids get around the filters; the words, phrases, rating systems, etc. are subjective; “banned” keywords can be overly restrictive for adult users and for legitimate use by minors.

10 Anonymity Common Sense and the Internet Early publications by some of our Founding Fathers were published under pseudonyms. Today, there are publications on the Net that are posted anonymously.

11 Is Anonymity Protected? –Conflicts between political freedom of speech and campaign regulations: Anonymity protects against retaliation (balas dendam) and embarrassment. Anonymity violates rules established by the Federal Elections Commission (FEC)

12 Anonymity vs. Community –Supporters of anonymity: Say it is necessary to protect privacy and free speech. –Opponents of anonymity: Believe it is anti-social and allows criminals to hide from law enforcement.

13 Spam What Is the Problem? –Unsolicited, mass is cheap to senders but may impose costs on the recipient’s time and/or the recipient’s online account. may contain objectionable content (political, commercial ads, solicitations for funds, pornography, etc.). may contain a disguised (penyembunyian) return address. may pass through filters. invades privacy. creates a financial and managerial burden (beban) on ISPs.

14

15 Solutions Technology: filters that screen out spam. Market Pressure: services that list spammers. Business Policy: at the discretion (kebijaksanaan, keleluasaan) of the recipient, all would be charged a microfee. Law: create restrictions that are consistent with the First Amendment. Vigilantism (sukarelawan?): punish spammers by hacking into their phone or computer systems.

16 How To Make A :Pipe BombHow To Make A :Pipe Bomb - [ Terjemahkan laman ini ] Highly controversial retailers and service providers of the internet. Adult, recreational drugs, international pharmacy sites, secret banking, documents, k - Tembolok - Halaman sejenisTerjemahkan laman iniTembolok Halaman sejenis I Am a Gay Bomb Maker! - VideoI Am a Gay Bomb Maker! - Video 4 menit 43 detik - 27 Agu 2008 u could prolly make a actually little sparkler bomb outa that if u knew wat u were..... Why you teach us to make "bomb"?!!!! I made one and it...

17 How to make a bomb in 3 easy steps!!!!!!!!!!!!!!!!!!How to make a bomb in 3 easy steps!!!!!!!!!!!!!!!!!! - [ Terjemahkan laman ini ]Terjemahkan laman ini How to make a bomb in three easy steps. Although these places didnt technicaly sponser thew site, feel free to send them nasty for even appearing k - Tembolok - Halaman sejenisTembolokHalaman sejenis Web video teaches terrorists to make bomb vest - Nightly News with...Web video teaches terrorists to make bomb vest - Nightly News with... - [ Terjemahkan laman ini ]Terjemahkan laman ini 22 Dec NBC News has obtained a video, posted in an obscure Islamic chat room, that offers detailed instructions on how to make a sophisticated k - Tembolok - Halaman sejenisTembolokHalaman sejenis How To Make A Bomb EASY! - Truveo Video SearchHow To Make A Bomb EASY! - Truveo Video Search - [ Terjemahkan laman ini ]Terjemahkan laman ini How To Make a Bomb with any Cell phone. VERY INTERESTING educational purposes only. COME LEARN HOW TO MAKE A BOMB WITH YOUR CELLPHONE just like in WAR and k - Tembolok - Halaman sejenis TembolokHalaman sejenis

18 How to Be a Terrorist - TIMEHow to Be a Terrorist - TIME - [ Terjemahkan laman ini ] [OPEN_P]It reads like a cross between a driver's manual and a guide for revolutionary Boy Scouts. Among other things, it contains admonitions to drive Halaman sejenisTerjemahkan laman iniHalaman sejenis Keepers of Lists - Top 90 Signs You May Be A TerroristKeepers of Lists - Top 90 Signs You May Be A Terrorist - [ Terjemahkan laman ini ] Our humble order of monks, keeps the net's funniest list of lists k - Tembolok - Halaman sejenisTerjemahkan laman iniTembolokHalaman sejenis The Terrorist's HandbookThe Terrorist's Handbook - [ Terjemahkan laman ini ] Gunzenbomz Pyro-Technologies, a division of Chaos Industries (CHAOS), is proud to present this first edition of The Terrorist's Handbook k - Tembolok - Halaman sejenisTerjemahkan laman iniTembolokHalaman sejenis Hasil video untuk how to be a terroristHasil video untuk how to be a terrorist YouTube - how to be a NINJA in one minute 1 menit 15 detik YouTube - how to be a NINJA in one minute 9/11 How To Save A Life -- The Fray FIRST EVER... 2 menit 41 detik 9/11 How To Save A Life -- The Fray FIRST EVER... If You Were a Terrorist, How Would You Attack? - Freakonomics Blog...If You Were a Terrorist, How Would You Attack? - Freakonomics Blog... - [ Terjemahkan laman ini ]Terjemahkan laman ini Hearing about these rules got me thinking about what I would do to maximize terror if I were a terrorist with limited resources.... freakonomics.blogs.nytimes.com/2007/08/08/if-you-were-a-terrorist-how-would- you-attack/ - 77k - Tembolok - Halaman sejenisTembolokHalaman sejenis

19 Lintas Berita - Cara Mudah Membuat Kulit RISOLLintas Berita - Cara Mudah Membuat Kulit RISOL Cara Mudah Membuat Kulit RISOL. Risol, salah satu penganan yang cukup digemari anggota keluarga, disediakan hangat-hangat tentu lebih nikmat k - Tembolok - Halaman sejenisTembolokHalaman sejenis blacktopaz - Risol Egois - a recipeblacktopaz - Risol Egois - a recipe Resep ini tercipta ketika tante ku pengen coba bikin risol…... Cara membuat: Kulit: 1. Campur terigu dan garam dengan air, aduk rata.... ditaku.multiply.com/reviews/item/5 - 32k - Tembolok - Halaman sejenisTembolokHalaman sejenis We R Mommies | WRM Indonesia Tepung Roti dan tepung terigu secukupnya untuk lapisan risol - Telur 1 (satu) butir dikocok pakai garpu, untuk lapisan risol. Cara Membuat :... wrm-indonesia.org/content/view/1290/1/ - 26k - Tembolok - Halaman sejenisTembolokHalaman sejenis Risol « Corat-Coret Keluarga Abu Al MairaRisol « Corat-Coret Keluarga Abu Al Maira Celupkan risol ke dalam kocokan telur, lalu angkat dan tiriskan. Gulingkan risol ke dalam... Cara membuat: Ayak terigu, taruh dalam mangkuk bersama garam.... abualmaira.wordpress.com/2007/11/26/risol/ - 36k - Tembolok - Halaman sejenisTembolok Halaman sejenis Koleksi Resep Keluarga Nugraha - Australia Cara Membuat Risol Bihun: 1. Tumis bawang putih sampai harum. 2. Masukkan wortel dan bihun sambil diaduk hingga matang. 3. Ambil selembar kulit lumpia, k - Tembolok - Halaman sejenisTembolok Halaman sejenis