Jae-Hyun Seong Comp. 450 May 2008.  What is Internet?  Why do people use the Internet?  Why do people want to censor the Internet?  Why do people.

Slides:



Advertisements
Similar presentations
Elephants and Mice Revisited: Law and Choice of Law on the Internet Professor Peter P. Swire Moritz College of Law Ohio State University Penn Law Review.
Advertisements

By Andy Scott, Michael Murray and Adam Kanopa
Unit 1 Living in the Digital WorldChapter 1 Lets Communicate Internet Safety.
The Internet.
Copyright or Copywrong. What is a copyright and what can be copyrighted? What is “Fair Use” and what four factors determine “Fair Use”? What are the two.
Internet Safety/Cyber Ethics
The Anti-Piracy Campaign: The Drag Behind Their Efforts Jamal Haskin.
Internet Piracy. History In the 1980’s mail was used to distribute pirated material Pirated material originally consisted of copyrighted games, software,
MIS PERSONAL, LEGAL, ETHICAL, AND ORGANIZATIONAL ISSUES OF INFORMATION SYSTEMS CHAPTER 4 Hossein BIDGOLI Phishing that bites Paying for Privacy Pirates.
Copyright Infringement
CENSORSHIP Jack Homer Frederick Abreu James Carroll Minsoo Kim.
The Internet. What is the Internet? A community with about 100 million users Available in almost every country about 160,000 people are added each month.
Lesson 19 Internet Basics.
DIGITAL Download Sharing and Copying. Digital Download Process of downloading content or materials with the elimination of physical media. (dvd/cdrom)
Internet Basics مهندس / محمد العنزي
CJ © 2011 Cengage Learning Chapter 17 Cyber Crime and The Future of Criminal Justice.
MIS PERSONAL, LEGAL, ETHICAL, AND ORGANIZATIONAL ISSUES OF INFORMATION SYSTEMS CHAPTER 4 LO1 Describe information technologies that could be used in computer.
 What is network?  Types of network ◦ LAN – Local Area - Ethernet ◦ WAN – Wide Area - Internet ◦ MAN – Metro. Area - LAN
Computer Skills Preparatory Year Presented by: L.Obead Alhadreti.
The Social Context of Computing Foundation Computing Never underestimate the power of human stupidity.
Internet Fundamentals and Background
The Internet Present By Tianyi Xiao ID : C  The Internet is a global system of interconnected computer networks that use the standard Internet.
Digital Citizenship By Web Design.  It is a system to teach students and teachers the way to use technology correctly. As new technology appears we all.
Cyber Crime & Security Raghunath M D BSNL Mobile Services,
The Global Economy “Its All Relative” Copyright © Texas Education Agency, All rights reserved.
Cyber Crimes.
ISNE101 Dr. Ken Cosh. Review  Dependability  Reliability  How do we improve it?  Security  Threats & Countering the Threats.
Internet On Society And Everyday Life Joseph Chase.
OBJECTIVE 3 ELECTRONIC COMMUNICATIONS. USES OF COMPUTING Pros Made tasks such as clerical work and computing easier and faster Buying, banking, and paying.
Intellectual property rights & Internet A research about the effect of Internet on Intellectual property rights & tort in China Qiong Tang Course: Internet.
ITIS 1210 Introduction to Web-Based Information Systems Chapter 45 How Hackers can Cripple the Internet and Attack Your PC How Hackers can Cripple the.
Computer Ethics. 2 Networking * The Internet is a network of networks that uses two protocols, known as TCP/IP, to control the exchange of data. * The.
© C.R. Business Education Creations WebQuest The History of the Internet.
Privacy & Security Online Ivy, Kris & Neil Privacy Threat - Ivy Is Big Brother Watching You? - Kris Identity Theft - Kris Medical Privacy - Neil Children’s.
Security and Ethical Challenges Chapter 13 McGraw-Hill/IrwinCopyright © 2011 by The McGraw-Hill Companies, Inc. All rights reserved.
Legal issues. Computer Misuse Act 1990 Deals with misuse of ICT systems.
An Overview of the Internet: The Internet: Then and Now How the Internet Works Major Features of the Internet.
Computer Ethics A Necessity for the new era. Why is Computer Ethics Important? The creation and existence of new questions that older laws cannot answer.
Ethics and Computer Invaders. What are ‘Ethics’? Personal code of conduct accepted by society Using technology appropriately.
IT internet security. The Internet The Internet - a physical collection of many networks worldwide which is referred to in two ways: The internet (lowercase.
Do you believe in this? Due to its very nature, the Internet is NOT a safe or secure environment. It is an ever-changing medium where anyone and everyone.
Moral, Social and Ethical issues associated with the Internet
Chapter 9: The Internet and World Wide Web Two contrasting views: Media Critic Marshall McCLuhan: the Internet would help create a “global village” of.
Chapter 2 The Internet and the World Wide Web. 2 Objectives Brief history Internet Access Six Internet Services –Web – –Chat (instant messenger)
Electronic Marketing: Integrating Electronic Resources into the Marketing Process, 2e 11/5/2015  2004 Joel Reedy and Shauna Schullo Electronic Marketing.
The Internet. 2 So what is the internet? The internet is global network that connects most of the world’s personal computers. The World Wide Web is a.
SURVEILLANCE The Fears of the Digital Age. Privacy –Identity –Anonymity Logging –Tracking Hacking Censorship State Security/Anti Terror Online The Discussion.
3.05 Protect Your Computer and Information Unit 3 Internet Basics.
October 21, 2008 Jennifer Q.; Loriane M., Michelle E., Charles H. Internet Safety.
Get Safe Online Expert advice for everyone In association with.
Slides prepared by Cyndi Chie and Sarah Frye A Gift of Fire Third edition Sara Baase Chapter 3: Freedom of Speech.
How would you define a computer? Computers are... Electronic devices that receives (input), processes & stores data & produces a result (output).
Intellectual Property. Confidential Information Duty not to disclose confidential information about a business that would cause harm to the business or.
Lecture2 Networking. Overview and spam World Wide Web Censorship Freedom of expression Children and inappropriate content Breaking trust on the.
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
The way we communicate has changed over time. The Internet has changed many aspects of our lives, including the way we communicate with each other, how.
Computer Security Keeping you and your computer safe in the digital world.
Copyright Computer crime and cyber security.
Freedom Independence Transition
Abby Dan Stevo Jimmy What does this all mean?.
Internet Fundamentals and Background
Internet Fundamentals and Background
Computers and the Internet
Chapter 13 Security and Ethical Challenges.
How did the internet develop?
A Gift of Fire Third edition Sara Baase
Unit# 5: Internet and Worldwide Web
Essentials of the legal environment today, 5e
"The Internet's pace of adoption eclipses all other technologies that preceded it. Radio was in existence 38 years before 50 million people tuned in; TV.
A Gift of Fire Third edition Sara Baase
Presentation transcript:

Jae-Hyun Seong Comp. 450 May 2008

 What is Internet?  Why do people use the Internet?  Why do people want to censor the Internet?  Why do people oppose Internet censorship?  What do people think about Censorship?  Is Internet censorship possible?  Why is Internet Censorship hard?  Impact of Internet  Conclusion

 Also known as "the Net," is a worldwide system of computer networks.  It is a network of networks in which users at any one computer can, if they have permission, get information from any other computer.

September 2000:380 million online users February 2008: 1,320 million online users

 Friends / Dating  News  Shopping  Directions  Research / Study  Games  Leisure  Escape from the reality (Freedom)

 Internet Piracy  Free distribution(Mp3, DivX, Games)  Company profit loss.  Identity theft.  Hacking into secret Information.  Duplication of information / Plagiarizing.  Viruses.  According to “State of the Net consumer report published in September 2006, damages from viruses totaled $5.2 billion.  Spyware caused nearly a million people to replace their PCs.  Religious / Political Issues (China, Germany).  Child Pornography.  Too much freedom.

 Violates freedom of speech rights of the 1 st Amendment of U.S. Constitution.  Internet is still in its early ages and deserves to be given a chance to prove itself.  Laws of one country can’t hold jurisdiction in another because it has no borders - This means that domestic laws cannot rule over foreign laws.  It is good how it is, restriction of the internet will only reduce freedom.

Georgia Institute of Technology’s College of Computing surveyed people online

 Internet is immense - Tracking down criminals is an extremely hard task.  Internet is anonymous - Difficult to determine the identity & age of user.  Internet has no physical boundaries – Hard to tell when a law is broken.  Once any information is posted online, deleting this material becomes almost impossible.  Duplication of information.  Spam mail.  Anti-Spam and Popup blockers are inefficient.

 Government would have to monitor: ▪ ▪ News ▪ Forum/website ▪ IRC (Internet Relay Chat) channels ▪ Database linked to a server ▪ FTP (File Transfer Protocol) sites  Costly and time consuming.  Tracking every move of every individual in this world is almost impossible.

 Internet has attracted people in the Entertainment, Marketing & Business fields.  Piracy plays a huge role in the impact of the Internet (Hackers, Crackers, Phreakers).  Free distribution of games, applications, movies, and mp3 damaged software, film, and music industry.  Internet “Underground” sparked possible Internet censorship ideologies.  In October 1998, United States passed the Digital Millennium Copyright Act (DMCA) that made software cracking and distributing illegal.  In May 22, 2001, Europe passed the European Union Copyright Directive (EUCD).  Distribution of illegal software still remains, eliminating piracy would be as hard as tracking down every single computer in this world.

 Internet is too complex of a network for censorship to effectively occur.  It is a fairly new and unique environment and requires more investigation / experience.  Violates the 1 st Amendment of the U.S. Constitution.  Lack of physical boundaries causes confusion as to where violations occur.  Future law enforcements on Internet censorship will decrease freedom and there will always be opposition.  The Internet is anonymous, and if lied, can’t be proved wrong.  Information hiding is risky due to hackers and copies can be made with no effort.  Thus complete efficient Internet censorship will be impossible.  Every country should allow their users to have freedom online.

 According to “State of the Net” published in September 2006, damages from viruses totaled $5.2 billion for consumers  Spyware prompted nearly a million people to replace their PCs.

 ADVANTAGES:  More social interaction.  Students read more books.  Healthier (No Radioactivity / Back Pains). DISADVANTAGES:  Slow access to information.  Inconvenient.  Reduced entertainment.

 ADVANTAGES:  Quick and easy access of information.  Entertainment increase.  Online shopping.  Technology advancements. DISADVANTAGES:  Piracy (Hackers, Crackers, Phreakers, etc.).  Less social society.  Unhealthy.  Information and Identity theft.

 1971 –  1972 – Telnet (Remote Connection to Computers)  1973 – FTP (File Transfer Protocol)  1974 – Ethernet (Local Network Protocol)

 During the cold war of 1969, the Advanced Research Projects Agency (ARPA) of the U.S. government designed ARPANET.  ARPANET was a top secret military medium of communication to send information in case of emergency such as nuclear attacks.  The first data exchange over this new network occurred between computers at UCLA and Stanford.  Only used by government personal and professionals, the need for censorship never crossed anyone’s mind. In contrast to today’s Internet, the network was considered extremely safe because it was a top secret project.

 The adoption of the internet has outpaced any other electronics ever designed.  The adoption of the following by 50 million people took:  Radio (38 years)  TV (13 years)  PC (16 years)  Internet (4 years)