Ethics in Information Technology, Second Edition 1 Computer & Society Week 6 Marwan Al-Namari.

Slides:



Advertisements
Similar presentations
Chapter 5 Freedom of Expression
Advertisements

Freedom of Expression Prepared By Najib sani & Muhammad Tajuddeen M.
Slides prepared by Cyndi Chie and Sarah Frye A Gift of Fire Third edition Sara Baase Chapter 3: Freedom of Speech.
Obscenity Obscenity Defamation Defamation Hate Speech Hate Speech Boundaries of Free Speech.
Freedom of Speech Chapter 37.
Obscenity – is anything that treats sex or nudity in an offensive or lewd manner, violates recognized standards of decency, and lacks serious literary,
Ethics in Information Technology, Fourth Edition
Free speech in the United States Technology and the public network of information A fine line between aggression and expression Strengthening the first.
Freedom of Speech. Purpose for Freedom of Speech: To guarantee to each person a right of Free expression, in the Spoken and the Written word, and by all.
Ethics in Information Technology, Second Edition
Access to Electronic Media Acceptable Use Policy August 8, 2011 Meece Middle School.
1 Freedom of Expression Prepared By Joseph Leung.
Pornography and the Internet Amanda Gillespie Donna Jones EDCI 564.
Group Community: A World Without Borders Kimberly Carter David Dobin Tim Hammond Chris Rushing.
A Gift of Fire, 2edChapter 5: Freedom of Speech in Cyberspace1 PowerPoint ® Slides to Accompany A Gift of Fire : Social, Legal, and Ethical Issues for.
Freedom of Speech Professor Matt Thatcher. 2 Last Class l Workplace privacy –how is electronic monitoring different from traditional monitoring? –types.
Workplace Monitoring Store & review messages (keyword search): 46.5% Store & review computer files (keyword search): 36.1% Monitor Internet connections:
Chapter Jacob Niedermier Keith Miller Changing Communications Paradigms The Internet gave us many more chances to voice our opinions.
Freedom of Speech in Cyberspace 1. The U.S. Constitution - The 1 st Amendment: The 1 st Amendment Congress shall make no law respecting an establishment.
Slides prepared by Cyndi Chie and Sarah Frye (and Liam Keliher) A Gift of Fire Third edition Sara Baase Chapter 3: Freedom of Speech.
Chapter 5 Freedom of Expression
Filtering, CIPA, Internet Safety, and Your Sanity Art Wolinsky Andy Carvin
Brandon Hall CSC 540.  The US Government first attempted to filter the Internet in the early 90’s.  This was an attempt to protect minors against the.
BY: ASHLEY ESTEP, ALYSIA GEORGE, AND ASHLEY MOFFETT Internet Safety.
Ethics in Information Technology
Freedom of Speech in Cyberspace
A Gift of Fire Third edition Sara Baase
Bootcamp 2009 Porn, Predators, and the Pressure to Police Jennifer Stisa Granick, Civil Liberties Director.
CS 4001Mary Jean Harrold1 Class 23 ŸFreedom of speech in cyberspace ŸAssign ŸAssignment 8—due 11/13 ŸTerm paper—due 11/20.
CS 4001Mary Jean Harrold1 Class 24 ŸFreedom of speech in cyberspace ŸAssign ŸAssignment 8—due today ŸTerm paper—due 11/20.
Ch3 Freedom of Speech The US Constitution.
Complying with CIPA: What Libraries Need to Know Bob Bocher Technology Consultant Wisconsin Department of Public Instruction State Division for Libraries,
Ethics in Information Technology, Second Edition Chapter 5 Freedom of Expression.
LIBS100 July 20, 2005 First Amendment Library Bill of Rights.
Chapter 19: Civil Liberties: First Amendment Freedoms Section 3
Chapter 18 Obscenity & Pornography. Pornography Protected by First Amendment Unless child pornography-not protected PgP BUSA331 Chapter 182.
Cybersex, Porn, and Filtering Information Technology and Social Life April 18, 2005.
Freedom of Speech. 1 st Amendment The essential, core purpose of the 1 st Amendment is self-governance. It enables people to obtain information from.
TTS1133 : INTERNET ETHICS AND CYBER LAW CHAPTER FOUR: Freedom of Expression 1Prepared By: Razif Razali.
Freedom of Speech and Press. The Big Idea While the 1st and 14th Amendments gives Americans the right to express ideas freely, the Constitution and the.
1. What are some freedoms that we have in our daily lives as US citizens? 2. Can your freedoms ever be taken away or limited? (explain!)
Freedom of Speech First Amendment Expression, Speech and Symbolic Speech.
Freedom of Speech  Seems like a dumb question, but why is it so important to a democratic government?  Ability to debate actions and policies of elected.
1 Freedom of Speech In Cyberspace Changing Communications Paradigms Changing Communications Paradigms Offensive Speech and Censorship in Cyberspace AnonymitySpam.
CptS 401 Adam Carter. Quiz Question 7 Obscene speech is protected by the First Amendment. A. True B. False 2.
October 21, 2008 Jennifer Q.; Loriane M., Michelle E., Charles H. Internet Safety.
Understanding CIPA Renee Hobbs LSC 530 Texts and Tools for Children and Youth.
ICS 424: Freedom of expression Aj. Thoranin Intarajak.
Slides prepared by Cyndi Chie and Sarah Frye A Gift of Fire Third edition Sara Baase Chapter 3: Freedom of Speech.
Freedom of Speech Computers in the World.
Constitutional Review The truth your founding fathers never told you!
Laws and Rules That Govern Internet Safety Ashley Martin.
School Accounts Presented by: Mrs. Mazzola.
Chapter Five Civil Liberties. Copyright © Houghton Mifflin Company. All rights reserved.5 | 2 The Politics of Civil Liberties Civil liberties: protections.
1. Vagueness and Overbreadth: Laws governing free speech must be clear and specific. > Laws that unnecessarily prohibit too much expression are considered.
LIBS100 March 23, 2005 First Amendment Library Bill of Rights.
A Gift of Fire, 2edChapter 5: Freedom of Speech in Cyberspace1 Anonymity Common Sense and the Internet Early publications by some of our Founding Fathers.
Ethics in Information Technology, Fourth Edition Chapter 5 Freedom of Expression.
Presented by Ika Novita Dewi, MCS
CHAPTER 5 FREEDOM OF EXPRESSION.
Freedom of Expression.
Bill of Rights- First Amendment Notes
Free Speech and Free Press
Limits to the Freedom of Speech
A Gift of Fire Third edition Sara Baase
Constitutional Issues
Freedom of Speech in Cyberspace
A Gift of Fire Third edition Sara Baase
A Gift of Fire Third edition Sara Baase
Freedom of Speech “Freedom of speech and expression is the heart of a democratic society.”
Presentation transcript:

Ethics in Information Technology, Second Edition 1 Computer & Society Week 6 Marwan Al-Namari

Ethics in Information Technology, Second Edition2 Free Speech and Limits “I disapprove of what you say, but I will defend to death your right to say it!” – biographer of Francois Voltaire "The most stringent protection of free speech would not protect a man falsely shouting fire in a theater and causing a panic." -- Justice Oliver Wendell Holmes, Jr., in 1919, United States Supreme Court

Ethics in Information Technology, Second Edition3 Freedom of expression & First Amendment Rights Right to freedom of expression –Important right for free people everywhere –Guaranteed by the First Amendment in USA Definition of free speech includes –Nonverbal, visual, and symbolic forms of expression –Right to speak anonymously

Ethics in Information Technology, Second Edition4 First Amendment Rights (continued) Not protected by the First Amendment –Obscene speech –Defamation –Incitement of panic –Incitement to crime –“Fighting words” –Sedition

Ethics in Information Technology, Second Edition5 Obscene Speech Speech is considered obscene when –Average person finds the work appeals to the prurient interest –Work depicts or describes sexual conduct in an offensive way –Lacks serious literary, artistic, political, or scientific value

Ethics in Information Technology, Second Edition6 Defamation Publication of a statement of alleged fact that is –False –Harms another person Harm is often of a financial nature Slander –Oral defamatory statement Libel –Written defamatory statement

Ethics in Information Technology, Second Edition7 Offensive Speech and Censorship in Cyberspace What is offensive speech? –Political or religious speech. –Pornography. –Racial slurs. –Nazi materials. –Abortion information. –Depictions of violence –How to make Bombs –Alcohol ads.

Ethics in Information Technology, Second Edition8 Freedom of Expression: Key Issues Controlling access to information on the Internet Anonymity Defamation Hate speech Pornography

Ethics in Information Technology, Second Edition9 Controlling Access to Information on the Internet Material Inappropriate for Children –Technology Changes the Context On the Web, children have access to the same ‘adult’ text, images, videos, etc. as adults. Online proprietors don’t know the customer is not an adult. –Protecting Children It is illegal to create, possess or distribute child pornography, regardless of the medium.

Ethics in Information Technology, Second Edition10 Controlling Access to Information on the Internet Material Inappropriate for Children –There is no doubt that there is material on the Web that most people would consider inappropriate for children. –There is much on the Web that is extremely offensive to adults. –It is not surprising that some people see the Internet as a scary place for children.

Ethics in Information Technology, Second Edition11 Controlling Access to Information on the Internet Censorship Laws –Communications Decency Act (CDA, 1996) Publicity and public pressure lead Congress to pass this act. Anyone who made available to anyone under 18 any communication that is obscene or indecent would be subject to a $100,000 fine and two years in prison. In 1997, the CDA was ruled unconstitutional because it was too vague and too broad in protecting children online and because less restrictive means are available.

Ethics in Information Technology, Second Edition12 Controlling Access to Information on the Internet Censorship Laws (cont’d) –Child Online Protection Act (COPA, 1998) Commercial Web sites that make available to minors materials “harmful to minors”, as judged by community standards would be subject to a $50,000 fine and six months in jail. In 2000 and 2003, COPA was ruled unconstitutional by a federal court.

Ethics in Information Technology, Second Edition13 Controlling Access to Information on the Internet Censorship Laws (cont’d) –Children’s Internet Protection Act (CIPA, 2000) Any school or library receiving federal Internet funds must install filtering software on all Internet terminals. Filters must block sites containing child pornography, obscene material, and any material deemed “harmful to minors.” A federal appeals court ruled a major part of CIPA unconstitutional in 2002 but the Supreme Court upheld the law in 2003.

Ethics in Information Technology, Second Edition14 Controlling Access to Information on the Internet Internet Access in Libraries and Schools –Filtering Software Benefit: prevent access to inappropriate material on the Internet by screening words or phrases, blocking sites according to rating system, or disallowing access to specific sites in a list. Problems: can be ineffective—kids get around the filters; the words, phrases, rating systems, etc. are subjective; “banned” keywords can be overly restrictive for adult users and for legitimate use by minors.

Ethics in Information Technology, Second Edition15 Controlling Access to Information on the Internet –Filtering Software URL filtering –Blocks URLs or domain names Keyword filtering –Blocks key words or phrases Dynamic content filtering –Web site’s content is evaluated immediately before being displayed –Uses »Object analysis »Image recognition

Ethics in Information Technology, Second Edition16 Controlling Access to Information on the Internet (continued) Popular Internet filters –ContentProtect –CYBERsitter –NetNanny –CyberPatrol –HateFilter

Ethics in Information Technology, Second Edition17 Controlling Access to Information on the Internet (continued) ICRA rating system –Questionnaire for Web authors –Generates a content label Uses Platform for Internet Content Selection (PICS) standard –Users can configure browsers to read the label to block content –Relies on Web authors to rate their site –Complement to other filtering techniques

Ethics in Information Technology, Second Edition18 Controlling Access to Information on the Internet (continued) ISP blocking –Blocking is performed on the ISP server –ClearSail/Family.NET prevents access to certain Web sites

Ethics in Information Technology, Second Edition19 Legal Overview: Children’s Internet Protection Act (CIPA) Federally financed schools and libraries must block computer access to –Obscene material –Pornography –Anything considered harmful to minors Schools and libraries subject to CIPA do not receive Internet access discounts unless they certify that Internet safety measures are in place –Required to adopt a policy to monitor the online activities of minors

Ethics in Information Technology, Second Edition20 Legal Overview: Children’s Internet Protection Act (CIPA) (continued) CIPA does not require the tracking of Internet use by minors or adults Acceptable use policy agreement is an essential element of a successful program in schools –Signed by Students Parents Employees Difficulty implementing CIPA in libraries because their services are open to people of all ages –Including adults with First Amendment rights

Ethics in Information Technology, Second Edition21 Anonymity Principle of anonymous expression –People can state opinions without revealing their identity –In the wrong hands, it can be a tool to commit illegal or unethical activities

Ethics in Information Technology, Second Edition22 Anonymity Common Sense and the Internet –Early publications by some of our Founding Fathers were published under pseudonyms. –Jonathon Swift published his humorous and biting political satire Gulliver’s Travels anonymously. –In the nineteenth century, when it was not considered proper for women to write books, women writers such as Mary Ann Evans published under male pseudonym. –Today, there are publications on the Net that are posted anonymously.

Ethics in Information Technology, Second Edition23 Anonymity Common Sense and the Internet –Whistleblowers may choose to release information via anonymous postings. –To send anonymous , one sends the message to a r er service, where the return address is stripped off and the message is resent to the intended recipient. –Several businesses, like Anonymizer.com and Zero-Knowledge Systems, provide a variety of sophisticated tools and services that enable us to send and surf the Web anonymously.

Ethics in Information Technology, Second Edition24 Defamation and Hate Speech Actions that can be prosecuted include –Sending threatening private messages over the Internet to a person –Displaying public messages on a Web site describing intent to commit acts of hate-motivated violence –Libel directed at a particular person

Ethics in Information Technology, Second Edition25 Defamation and Hate Speech (continued) Some ISPs voluntarily agree to prohibit subscribers from sending hate messages –Does not violate subscribers’ First Amendment rights –ISPs must monitor the use of their service –Take action when terms are violated

Ethics in Information Technology, Second Edition26 Manager’s Checklist for Handling Freedom of Expression in the Workplace