Censorship Thomas Morrissy and Sam Joiner. Individual rights as determined by the government o Adults should be able to read see and hear what they.

Slides:



Advertisements
Similar presentations
Freedom of Speech (Part 3)
Advertisements

Haygrove School – E Safety Induction E Safety Update #protecting your professional identity.
On-line Child Protection Year 10 E-safety. E-safety awareness and guidance is directly taught the Year 10 PSHE programme and ICT course. Safeguarding.
Slides prepared by Cyndi Chie and Sarah Frye A Gift of Fire Third edition Sara Baase Chapter 3: Freedom of Speech.
Free speech in the United States Technology and the public network of information A fine line between aggression and expression Strengthening the first.
Seyyed Ali Araghchi COP Expert Child Online Protection in Iran Activities and Suggestions.
Cyber and Internet Safety El Rodeo School September 11, 2013.
RahulMIN KU WHAT TO DO IF CYBER-BULLYING OCCURS Firstly protect your number- only give it to friends and don’t leave your mobile where others can.
Cyber Bullying i-SAFE survey of 150,000 high school students 57% said hurtful or angry things to another person, had someone say hurtful or angry.
Your Rights Under the Internet Law By: Sannita S. Lam.
Film,Video and Computer Games Classification Regulation.
A Gift of Fire, 2edChapter 5: Freedom of Speech in Cyberspace1 PowerPoint ® Slides to Accompany A Gift of Fire : Social, Legal, and Ethical Issues for.
Chapter Jacob Niedermier Keith Miller Changing Communications Paradigms The Internet gave us many more chances to voice our opinions.
Freedom of Speech in Cyberspace 1. The U.S. Constitution - The 1 st Amendment: The 1 st Amendment Congress shall make no law respecting an establishment.
Free speech in the United States: Expression vs. Hostility Seeking a Balance: Enhancing the First Amendment Challenges.
STRATEGIES. Non-Technical Measures to Protect Kids Online.
Date of Presentation Guidelines for Industry on Child Online Protection © UNICEF/NYHQ /OLIVIER ASSELIN.
Awareness raising session for Parents and Carers.
Filtering, CIPA, Internet Safety, and Your Sanity Art Wolinsky Andy Carvin
Internet Censorship In order of appearance: Dmitriy Bespalov Ilya Braude Brian McBurney Yaroslav Volkov.
Luxembourg 12 September Public consultation 12 September 2003 Horst Forster Director, INFSO/E European Commission Safer Internet plus
A Gift of Fire Third edition Sara Baase
W HAT IS B ULLYING ?  An intentional act of aggression or series of acts that occur in a school setting  Persistent or pervasive  Directed at another.
CS 4001Mary Jean Harrold1 Class 24 ŸFreedom of speech in cyberspace ŸAssign ŸAssignment 8—due today ŸTerm paper—due 11/20.
Ch3 Freedom of Speech The US Constitution.
Media Literacy: Australian context & framework Nerida O’Loughlin General Manager, Outputs Division International Media Literacy Research Forum May 15 th,
 What are the risks?  Technologies your children use  Tips for protection  Advice and help  Questions? Topics.
Understanding CIPA to Fight the Filter Mark E. Moran CEO, Dulcinea Media.
The Legal, Safe and Ethical Use of Technology in the Classroom Gabriella Wheeler s
Content Control. Extreme Regimes Myanmay (Burma) - Possession of modem without permission punishable by years gaol Cuba - Internet access only through.
Lesson 4: Taking Perspectives on Cyberbullying THE CYBER BULLYING VIRUS
Michael Coonan Content Assessment International Training Program Melbourne, September 2006 Strategies for regulating online content.
A USTRALIAN M EDIA R EGULATION Media Influence. W HY WE REGULATE There are a number of reasons why we believe it is necessary to regulate the media. One.
Expression on the Net Is it possible to control what is seen and by whom on the network? Like a book? Newpapers? Phone call? Television? Where to regulate:
1 Freedom of expression and freedom of the media INFORMATION SOCIETY Federal Ministry for Foreign Affairs of Austria.
1 Freedom of Speech In Cyberspace Changing Communications Paradigms Changing Communications Paradigms Offensive Speech and Censorship in Cyberspace AnonymitySpam.
S. Hashem - Nov Towards A “Safer” Internet for Our Children Dr. Sherif Hashem Executive Vice President IT Industry Development Agency
Use of information technology in the educational system in Bulgaria State policy of implementing security and safety measures of pupils in network.
CptS 401 Adam Carter. Quiz Question 7 Obscene speech is protected by the First Amendment. A. True B. False 2.
October 21, 2008 Jennifer Q.; Loriane M., Michelle E., Charles H. Internet Safety.
Understanding CIPA Renee Hobbs LSC 530 Texts and Tools for Children and Youth.
ICS 424: Freedom of expression Aj. Thoranin Intarajak.
 We assume the head librarians role  Recently updated the library computer systems  New resource for patrons – internet access  Teenager caught viewing.
Slides prepared by Cyndi Chie and Sarah Frye A Gift of Fire Third edition Sara Baase Chapter 3: Freedom of Speech.
Freedom of Speech Computers in the World.
What vulnerabilities do you face in cyberspace?  Cyberbullying  Cyberstalking  Racial hatred  Exposure to violent, disturbing and/or illegal material.
EU activities against cyber crime Radomír Janský Unit - Fight against Organised Crime Directorate-General Justice, Freedom and Security (DG JLS) European.
HART RESEARCH ASSOTESCIA Key findings from telephone survey of parents of children who access the Internet, conducted for Who Needs Parental Controls?
Slides prepared by Cyndi Chie and Sarah Frye A Gift of Fire Third edition Sara Baase Chapter 3: Freedom of Speech.
Laws and Rules That Govern Internet Safety Ashley Martin.
Acceptable Use Policies and Internet Safety Melissa Borger Jamie Grauel Sam Westbrook Liz Robb Melissa Borger Jamie Grauel Sam Westbrook Liz Robb.
“How do I keep my child safe online?” Miss Johnstone Computing Co-ordinator “Parents / Carers are the one important factor in the home environment to keep.
Protecting Children from Bullying and Cyberbullying: Awareness Raising and Public Policies: Some examples from Ireland Brian O’Neill Dublin Institute of.
Ministry of Education & Religious Affairs, Culture & Civilisation Greek School Network nternet-safety.sch.gr.
Film and Publication Board 09/10 Operational Plan (High level)
Quotation about Anger and Violence. “Violence kills so many Americans and sends so many others into the healthcare system that we must consider it a public.
Ian McGraw Education Safeguarding Team Surrey County Council.
Expert Consultation on Bullying Florence 9-10 May 2016 The role of legislation in preventing and addressing bullying and cyberbullying Mánus de Barra Child.
1 Belfast, Horst Forster European Commission Belfast,
Cyber and Internet Safety (Parents’ Night)
Media regulation.
Children’s Internet Protection Act (CIPA)
Our Children and Social Media
A Gift of Fire Third edition Sara Baase
Freedom of Speech in Cyberspace
Brian O’Neill Dublin Institute of Technology 9/10 May Florence
A Gift of Fire Third edition Sara Baase
Japan’s Efforts to Promote a Safer Internet Environment for Children
A Gift of Fire Third edition Sara Baase
PRESENTATION OUTLINE Introduction.
Presentation transcript:

Censorship Thomas Morrissy and Sam Joiner

Individual rights as determined by the government o Adults should be able to read see and hear what they want o Minors should be protected from material likely to harm or disturb them o Everyone should be protected from exposure to unsolicited material that they find offensive; o The need to take account of community concerns about: o Depictions that condone or incite violence, particularly sexual violence and the portrayal of a persons in a demeaning manner Individual Rights

Laissez-faire approach o Individuals are capable of determining the quality of internet content and the governments should not intervene in the 'marketplace of ideas' Interventionist approach o Government's' role is to ensure that the law deals with online phenomenon like racial hatred and pornography o This approach will involve:  enacting legislation  imposing obligations on ISPs  strengthening enforcement agencies

Internet Censorship in Australia One of the strictest in the West Arguments for: o Protection of children o Privacy o Makes the internet a safer and cleaner place Arguments against: o Internet Service Providers say that it can be too easily bypassed o Enforcement too onerous o Filter may block material than has nothing to do with the type of content that the law aims to fight

Mobile Censorship Australian Communications Authority guidelines: o Mobile phones with chat services were to monitor all content o The ABA had been given the power to remove all outlawed content or services o Phone companies were to check a customer's age before making any content that would be classified MA15+ or R18+ available

Legislation Broadcasting Services Act 1992 Allows the Australian Communications and Media Authority (ACMA) to ban content from Australia o Refused classification (or X18+) o R18+ o MA15+

Legislation Howard government introduced a filtering scheme that was imposed on all Internet Service Providers (ISP) Labor Party proposed to extend censorship into a mandatory filtering that would ban potential refused content material Argued that it would not only block inappropriate material, it would also combat child pornagraphy

Future Directions In order to combat cyber crime, there must be enforceable laws Government provides public goods that enable individuals and businesses to use the internet o cable network and communication laws o criminal laws o laws governing property rights o enforcement agencies