CS 4001Mary Jean Harrold1 Class 24 ŸFreedom of speech in cyberspace ŸAssign ŸAssignment 8—due today ŸTerm paper—due 11/20.

Slides:



Advertisements
Similar presentations
By Brian Langone. Internet censorship is essentially a method used by corporations, governments and others in order to filter what a user can view on.
Advertisements

Slides prepared by Cyndi Chie and Sarah Frye A Gift of Fire Third edition Sara Baase Chapter 3: Freedom of Speech.
Addressing spam and enforcing a Do Not Registry using a Certified Electronic Mail System Information Technology Advisory Group, Inc.
Ethics in Information Technology, Fourth Edition
Free speech in the United States Technology and the public network of information A fine line between aggression and expression Strengthening the first.
Ethics in Information Technology, Second Edition
Censorship on the Internet
Inappropriate Materials. Discussion Question Think of a time in your classroom when a student viewed inappropriate materials. Why were they inappropriate?
Anonymity and SPAM The Good, the Bad and the Ugly!
Background Information Definition:. Background Information Controversy Ex)
Access to Electronic Media Acceptable Use Policy August 8, 2011 Meece Middle School.
1 Freedom of Expression Prepared By Joseph Leung.
Non Profit and Faith Based Agencies, and the role of Information Technology Lakewood Resource & Referral Center nd Street Suite 204 Lakewood, NJ.
Group Community: A World Without Borders Kimberly Carter David Dobin Tim Hammond Chris Rushing.
A Gift of Fire, 2edChapter 5: Freedom of Speech in Cyberspace1 PowerPoint ® Slides to Accompany A Gift of Fire : Social, Legal, and Ethical Issues for.
A Community Without Borders By Brian McLaughlin Thomas Charnock Brian Schweitzer.
Freedom of Speech Professor Matt Thatcher. 2 Last Class l Workplace privacy –how is electronic monitoring different from traditional monitoring? –types.
Workplace Monitoring Store & review messages (keyword search): 46.5% Store & review computer files (keyword search): 36.1% Monitor Internet connections:
Chapter Jacob Niedermier Keith Miller Changing Communications Paradigms The Internet gave us many more chances to voice our opinions.
Freedom of Speech in Cyberspace 1. The U.S. Constitution - The 1 st Amendment: The 1 st Amendment Congress shall make no law respecting an establishment.
Free speech in the United States: Expression vs. Hostility Seeking a Balance: Enhancing the First Amendment Challenges.
Slides prepared by Cyndi Chie and Sarah Frye (and Liam Keliher) A Gift of Fire Third edition Sara Baase Chapter 3: Freedom of Speech.
Chapter 5 Freedom of Expression
Brandon Hall CSC 540.  The US Government first attempted to filter the Internet in the early 90’s.  This was an attempt to protect minors against the.
BY: ASHLEY ESTEP, ALYSIA GEORGE, AND ASHLEY MOFFETT Internet Safety.
Internet Censorship In order of appearance: Dmitriy Bespalov Ilya Braude Brian McBurney Yaroslav Volkov.
Ethics in Information Technology
VassilevaCMPT 408 – Freedom of Speech 1 Freedom of Speech - Objectives 1.Discuss the different legal treatment of different medial regarding Freedom of.
Cisco Confidential © 2011 Cisco and/or its affiliates. All rights reserved. 1 Cloud Computing and Intermediary Liability Issues Global Policy and Government.
Chapter 17.3 Regulating the Internet. Internet Speech ► Free speech is a key democratic right. The Internet promotes free speech by giving all users a.
Freedom of Speech in Cyberspace
Chapter 3: Freedom of Speech.
A Gift of Fire Third edition Sara Baase
A Gift of Fire Third edition Sara Baase
CS 4001Mary Jean Harrold1 Class 23 ŸFreedom of speech in cyberspace ŸAssign ŸAssignment 8—due 11/13 ŸTerm paper—due 11/20.
Freedom of Speech. acts/funddocs/billeng.htm Amendment I “Congress shall make no law respecting an establishment.
Ch3 Freedom of Speech The US Constitution.
IS 490 Notes for Baase Textbook, Chapter 3. Check the Homework Page for the weekly assignment (it's due next Monday). Go to the Angel Page for this course,
Ethics in Information Technology, Second Edition 1 Computer & Society Week 6 Marwan Al-Namari.
Ethics in Information Technology, Second Edition Chapter 5 Freedom of Expression.
Computer Ethics. 2 Networking * The Internet is a network of networks that uses two protocols, known as TCP/IP, to control the exchange of data. * The.
Cybersex, Porn, and Filtering Information Technology and Social Life April 18, 2005.
1 Freedom of Speech In Cyberspace Changing Communications Paradigms Changing Communications Paradigms Offensive Speech and Censorship in Cyberspace AnonymitySpam.
CptS 401 Adam Carter. Quiz Question 7 Obscene speech is protected by the First Amendment. A. True B. False 2.
October 21, 2008 Jennifer Q.; Loriane M., Michelle E., Charles H. Internet Safety.
Issues and Problems Concerning the Internet Copyright ◦ Users pass off as others work and post it as their own work without giving credit to the source.
Rights Of Library Users By Keao White Rationale for this Workshop The purpose of this workshop is to give an in depth presentation covering the rights.
How is Democracy Socially Constructed? Is it Through Conflict We Find Social Reality? Presented by: Chelsea Jonson Spring
Understanding CIPA Renee Hobbs LSC 530 Texts and Tools for Children and Youth.
ICS 424: Freedom of expression Aj. Thoranin Intarajak.
Slides prepared by Cyndi Chie and Sarah Frye A Gift of Fire Third edition Sara Baase Chapter 3: Freedom of Speech.
Freedom of Speech Computers in the World.
Unless otherwise noted, the content of this course material is licensed under a Creative Commons Attribution 3.0 License.
Thinking about tech challenges to free speech New technologies always challenge old regulatory regimes—print, telegraph, telephone, radio, internet Why.
Chapter 14 How Universal is access to Computers and the Web.
Slides prepared by Cyndi Chie and Sarah Frye A Gift of Fire Third edition Sara Baase Chapter 3: Freedom of Speech.
Laws and Rules That Govern Internet Safety Ashley Martin.
1 Internet – The Good, the Bad, and the Ugly Module 4 Section 3.
FREEDOM OF SPEECH COSC 380 Eric Carroll Courtney Wirtz Adolphe Ngabo.
The 1 st Amendment U.S. Government Ms. Kemp. 1 st Amendment Rights Press Press Religion Religion Petition Petition Assembly Assembly Speech Speech.
A Gift of Fire, 2edChapter 5: Freedom of Speech in Cyberspace1 Anonymity Common Sense and the Internet Early publications by some of our Founding Fathers.
Presented by Ika Novita Dewi, MCS
CHAPTER 5 FREEDOM OF EXPRESSION.
Freedom of Expression.
In order of appearance:
A Gift of Fire Third edition Sara Baase
Constitutional Issues
Freedom of Speech in Cyberspace
A Gift of Fire Third edition Sara Baase
A Gift of Fire Third edition Sara Baase
Presentation transcript:

CS 4001Mary Jean Harrold1 Class 24 ŸFreedom of speech in cyberspace ŸAssign ŸAssignment 8—due today ŸTerm paper—due 11/20

CS 4001Mary Jean Harrold2 Freedom of Speech in Cyberspace (cont’d)

CS 4001Mary Jean Harrold3 Offensive Speech and Censorship in Cyberspace ŸCensorship Laws (cont’d) ŸChild Online Protection Act (COPA, 1998) ŸCommercial Web sites that make available to minors materials “harmful to minors”, as judged by community standards would be subject to a $50,000 fine and six months in jail. ŸIn 2000 and 2003, COPA was ruled unconstitutional by a federal court. Q : How are children protected from “harmful” material outside of Cyberspace?

CS 4001Mary Jean Harrold4 Offensive Speech and Censorship in Cyberspace ŸCensorship Laws (cont’d) ŸChildren’s Internet Protection Act (CIPA) Ÿ

CS 4001Mary Jean Harrold5 Offensive Speech and Censorship in Cyberspace ŸCensorship Laws (cont’d) ŸChildren’s Internet Protection Act (CIPA) ŸAny school or library receiving federal Internet funds must install filtering software on all Internet terminals. ŸFilters must block sites containing child pornography, obscene material, and any material deemed “harmful to minors.” ŸA federal appeals court ruled a major part of CIPA unconstitutional in 2002 but the Supreme Court upheld the law in Q : How does CIPA affect adults accessing online material at a public library that uses filtering software?

CS 4001Mary Jean Harrold6 Offensive Speech and Censorship in Cyberspace ŸLimiting Internet Access in Libraries and Schools ŸFiltering Software ŸBenefit: prevent access to inappropriate material on the Internet by screening words or phrases, blocking sites according to rating system, or disallowing access to specific sites in a list. ŸProblems: can be ineffective—kids get around the filters; the words, phrases, rating systems, etc. are subjective; “banned” keywords can be overly restrictive for adult users and for legitimate use by minors. Q : What has been your experience with filtering software?

CS 4001Mary Jean Harrold7 Offensive Speech and Censorship in Cyberspace ŸChallenging Old Regulatory Paradigms and Special Interests ŸLicense required: ŸTo practice law. ŸTo publish traditional newsletters about commodities and futures investing (prior to 2000). ŸNo license required: ŸTo create downloadable, self-help legal software. ŸTo publish newsletters about, developing software for, and operating Web sites concerning commodities and futures investing (since 2000). Q : Is online advertising of wine free speech or disregard for the regulatory rights of state governments?

CS 4001Mary Jean Harrold8 Offensive Speech and Censorship in Cyberspace ŸCensorship On the Global Net ŸGlobal Impact ŸAvoiding censorship: the global nature of the Net allows restrictions (or barriers) in one country to be circumvented by using networks in other, less restrictive countries. ŸCreating censorship: the global nature of the Net makes it easier for one nation to impose restrictive standards on others. Q : Why are online gambling sites established offshore?

CS 4001Mary Jean Harrold9 Anonymity ŸCommon Sense and the Internet ŸEarly publications by some of our Founding Fathers were published under pseudonyms. ŸToday, there are publications on the Net that are posted anonymously. Q : What are the drawbacks of anonymous Web postings?

CS 4001Mary Jean Harrold10 Anonymity ŸIs Anonymity Protected? ŸConflicts between political freedom of speech and campaign regulations: ŸAnonymity protects against retaliation and embarrassment. ŸAnonymity violates rules established by the Federal Elections Commission (FEC) Q : Should anonymous political speech on the Web be regulated?

CS 4001Mary Jean Harrold11 Anonymity ŸAnonymity vs. Community ŸSupporters of anonymity: ŸSay it is necessary to protect privacy and free speech. ŸOpponents of anonymity: ŸBelieve it is anti-social and allows criminals to hide from law enforcement. Q : How is the practice of anonymity online similar/dissimilar to strong encryption?

CS 4001Mary Jean Harrold12 Spam ŸWhat Is the Problem? ŸUnsolicited, mass Ÿis cheap to senders but may impose costs on the recipient’s time and/or the recipient’s online account. Ÿmay contain objectionable content (political, commercial ads, solicitations for funds, pornography, etc.). Ÿmay contain a disguised return address. Ÿmay pass through filters. Ÿinvades privacy. Ÿcreates a financial and managerial burden on ISPs. Q : How do you handle spam?

CS 4001Mary Jean Harrold13 Spam ŸCases and Free Speech Issues ŸAOL v. Cyber Promotions ŸAOL and other service providers have successfully sued spammers because of the cost burden imposed. ŸDisgruntled Intel Employee ŸInitially, a court ruled that non-commercial spam to Intel employees at their Intel accounts was a form of trespass. ŸThe CA Supreme Court ruled that it was not. Q : Is the forwarding of pre-written observations or opinions from human- rights groups spam or expressions of free speech? (Or both?)

CS 4001Mary Jean Harrold14 Spam ŸSolutions ŸTechnology: filters that screen out spam. ŸMarket Pressure: services that list spammers. ŸBusiness Policy: at the discretion of the recipient, all e- mail would be charged a microfee. ŸLaw: create restrictions that are consistent with the First Amendment. ŸVigilantism: punish spammers by hacking into their phone or computer systems. Q : Which solution above, or others, do you support?

CS 4001Mary Jean Harrold15 Ensuring Valuable and Diverse Content ŸPoints to Consider: ŸIs there a balance between commercial and educational information on the Web? ŸShould diverse content on the Web be subsidized with taxes? ŸShould valuable content on the Web be regulated? ŸDo we need to ensure the existence of sites containing civic information? ŸAre more sites that promote the arts and culture needed? Q : How do we ensure valuable and diverse content in traditional forms of media?

CS 4001Mary Jean Harrold16 Class Exercise