A Community Without Borders By Brian McLaughlin Thomas Charnock Brian Schweitzer.

Slides:



Advertisements
Similar presentations
LACNIC III Geolocation: New Pressures on RIRs? 12 November, 2002 Andrew McLaughlin Berkman Center, Harvard Law School.
Advertisements

Anti-SPAM activities in Malaysia - Current Situation, Regulatory Environment and Future Developments ITU virtual conference on anti-spam regulation and.
By Brian Langone. Internet censorship is essentially a method used by corporations, governments and others in order to filter what a user can view on.
Slides prepared by Cyndi Chie and Sarah Frye A Gift of Fire Third edition Sara Baase Chapter 3: Freedom of Speech.
Copyrights and Internet Piracy: SOPA and PIPA Essential Questions… What are SOPA and PIPA? Should people make money off of their creativity? How damaging.
Addressing spam and enforcing a Do Not Registry using a Certified Electronic Mail System Information Technology Advisory Group, Inc.
Legal and Ethical Issues: Privacy and Security Chapter Five.
PowerPoint Presentation Possible Topics Related to General Education Area VI Computer Science Appendix B.
Anonymity on the Internet Jess Wilson. Anonymizing Proxy What is a proxy? – An intermediary between you and the internet How does it make you anonymous?
The Digital Divide An Examination of How National and International Laws Affect Access to Information.
Pornography and the Internet Amanda Gillespie Donna Jones EDCI 564.
Group Community: A World Without Borders Kimberly Carter David Dobin Tim Hammond Chris Rushing.
Chapter 7 The environment of electronic commerce: legal, ethical, and tax issues Joseph Mitchum and TsunSheng, Tao.
A Gift of Fire, 2edChapter 5: Freedom of Speech in Cyberspace1 PowerPoint ® Slides to Accompany A Gift of Fire : Social, Legal, and Ethical Issues for.
Workplace Monitoring Store & review messages (keyword search): 46.5% Store & review computer files (keyword search): 36.1% Monitor Internet connections:
LIS 694 Seminar on Information and Communication Policy Issues Dr. donna Bair-Mundy.
Unit 28- Website Development Assignment 1- THEORY P3
Freedom of Speech in Cyberspace 1. The U.S. Constitution - The 1 st Amendment: The 1 st Amendment Congress shall make no law respecting an establishment.
Slides prepared by Cyndi Chie and Sarah Frye (and Liam Keliher) A Gift of Fire Third edition Sara Baase Chapter 3: Freedom of Speech.
Yusuf İ slam Ş EFLEK 11 TM/A 85.  An acceptable use policy is a set of rules applied by the owner/manager of a network, website or large computer system.
J. Chansavang. Use this Powerpoint to gain understanding about the main areas that are affected by computers and technology. Possible research topics.
Internet Censorship In order of appearance: Dmitriy Bespalov Ilya Braude Brian McBurney Yaroslav Volkov.
Chapter 18-Internet Law www World Wide Web-Wild,Wild West? New Global Community has caused many ethical dilemmas Unequal Access increasing wealth gap.
CS 4001Mary Jean Harrold1 Class 24 ŸFreedom of speech in cyberspace ŸAssign ŸAssignment 8—due today ŸTerm paper—due 11/20.
The need for Cyber Safety In a 2008 research commissioned by the National Crime Prevention Council (NCPC) and conducted by Nanyang Technological University,
Chapter 12 by Lisa Reeves Bertin Securing Information in a Network.
2 nd International Summer School Risks and Challenges of the Network Society Karlstad University and HumanIT Theme: Service Provider Responsibility for.
Internet regulation International. An issue of ownership Who owns your phone company? What does your phone company own? Who regulates your phone company?
Ethics in Information Technology, Second Edition 1 Computer & Society Week 6 Marwan Al-Namari.
Computer Ethics. 2 Networking * The Internet is a network of networks that uses two protocols, known as TCP/IP, to control the exchange of data. * The.
The Legal, Safe and Ethical Use of Technology in the Classroom Gabriella Wheeler s
Chapter 17 E-Commerce and Digital Law
Computer Security 2 Keeping your computer safe. Computer Security 2 Computer Security 2 includes two lessons:  Lesson 3: Protecting yourself and your.
CERT AM: Securing NREN in Armenia. Armenian NREN ASNET AM – Connecting more than 40 academic institutes of NAS RA and more than 10 other research, educational.
E-Detective HTTPS/SSL Interception – MITM & Proxy Decision Group
AUP, Netiquette, Copyright & Fair Use Wilkes University – Internet Literacy for Educators Cathy W. Dowd Spring 2009.
1 Freedom of Speech In Cyberspace Changing Communications Paradigms Changing Communications Paradigms Offensive Speech and Censorship in Cyberspace AnonymitySpam.
Google & Industry Best practices BY: ANAHITA ZAMANI ITMGMT 550 – INSTRUCTOR: TONY WOLF SEP
Parental controls 101. What are they? Tools to help parents regulate their children’s internet use. You can set them: At network level. On your child’s.
October 21, 2008 Jennifer Q.; Loriane M., Michelle E., Charles H. Internet Safety.
Chapter 11.  Electronic commerce (e-commerce)  The sale of goods and services by computer over the Internet  Internet (Net)  A collection of millions.
CyberEthics Morality and Law in Cyberspace Chapter 3: Free Speech and Content Control in Cyberspace By Jennifer, Linda, Paul, Paula, and Stephne.
Slides prepared by Cyndi Chie and Sarah Frye A Gift of Fire Third edition Sara Baase Chapter 3: Freedom of Speech.
MIS 2000 Social Implications of IST. Outline Law & Ethics Accountability and Liability Information Rights Privacy Computer Abuse and Crime Intellectual.
HART RESEARCH ASSOTESCIA Key findings from telephone survey of parents of children who access the Internet, conducted for Who Needs Parental Controls?
A CCEPTABLE U SE P OLICY Adrienne Ochs EDU D EFINITION Set of rules enforced by one who runs a network, website or a large computer system that.
Slides prepared by Cyndi Chie and Sarah Frye A Gift of Fire Third edition Sara Baase Chapter 3: Freedom of Speech.
LEFIS ROVANIEMI MEETING 19TH 20TH JANUARY 2007 Privacy In The Web TATYANA STEFANOVA LEX.BG BULGARIA.
CptS 401 Adam Carter. Question In 1999, what materials did the French government ask Yahoo to remove from its website? A. Anti-Islamic blog posts B. Sexually.
 Legal Issues-copyright and fair use, privacy, software piracy, acceptable use  Social Issues- digital divide, cyber bullying, online interaction 
Creating your Global Electronic Business: LEGAL Pitfalls & Opportunities Presentation: Andres Felipe Rodriguez C. CybeRegulation Consulting Group.
Internet Privacy Define PRIVACY? How important is internet privacy to you? What privacy settings do you utilize for your social media sites?
Regan Little. Definition Methods of Screening Types of Firewall Network-Level Firewalls Circuit-Level Firewalls Application-Level Firewalls Stateful Multi-Level.
Domain Day ICANN and Reform Tuesday, 5 November 2002 Milan, Italy Theresa Swinehart, Counsel for International Legal Affairs, ICANN.
Ministry of Education & Religious Affairs, Culture & Civilisation Greek School Network nternet-safety.sch.gr.
© Fundació Catalana per a la Recerca, Campanya "Internet segura", 2001 CONTROL TOOLS Seminar “The Protection of Consumers and Children on the Internet”
Computer Technology Internet, ethics, and . EthicsInternetMisc.Internet
A Gift of Fire, 2edChapter 5: Freedom of Speech in Cyberspace1 Anonymity Common Sense and the Internet Early publications by some of our Founding Fathers.
E Safety & Security Tools 13 th March 2009 Martin Quinn - The Westfield Centre.
Online Safety and Safeguarding and prevention of liability
CS590B690B Detecting network interference
Working to Keep our Children Safe in a World Filled with Technology
In order of appearance:
21st Century Learning Spaces
A Gift of Fire Third edition Sara Baase
Unit# 5: Internet and Worldwide Web
Freedom of Speech in Cyberspace
Data Analysis: Online Scavenger Hunt Participation Project
Data Analysis: Online Scavenger Hunt Participation Project
A Gift of Fire Third edition Sara Baase
Presentation transcript:

A Community Without Borders By Brian McLaughlin Thomas Charnock Brian Schweitzer

What is an online community? Community vs. Webpage Google, Yahoo = Tools IRC, IM have the potential to become communities

Online Communities Allows discussions of more sensitive topics Allows anonymity for victims Could be victimizers? Could lead to virtual borders –Protection –censorship

Borders on the Internet Enforcement –International –National –Producers/ Servers/ Users What is in place? –International/National –Software –Internal Community rules of conduct

International Enforcement An International Organization such as the UN would have to be established Standardized laws for global enforcement Passive enforcement of websites –Users would “police” sites –Report to the International organization sites that violate the law

National Organizations More geographically localized Active Enforcement Screen outside pages for content Monitor internal pages for content More or less content would be allowed in depending on the country filtering web content

Producers Servers and Users Most restrictive Could block sites not contracted with the ISP Web communities more personalized to the user –User would choose ISP that has the content they want Family oriented sites Content unrestricted Commercial/Industry focused Academic focus Active and Passive enforcement

What borders are currently in place

International borders No physical borders on the Internet ICANN –Internet Society –Domain names –Suffixes White Paper –U.S. Department of Commerce Business and Globalization –Maritime laws –Space laws

National Borders Yahoo vs. France –Nazi memorabilia sold in France –France sues Yahoo for violating French law, found guilty in France –Yahoo counter sues France in U.S. courts –Supreme Court in the future

Software Filters Governments and Corporations –Legal, Commercial, Terrorism Technology in Question

Community Rules Subscription Based Passive Enforcement Terms of Service

Service Provider Discretion Termination of Service Suspension of Service Violations –Surveys and polls –Spamming –Hate material –Viruses –Inappropriate content

Conclusions Best solution: International committee –Prevent national intervention that would stifle ideas –Allow Internet to flourish, but not get out of control –Keep ISPs from becoming too powerful