1 Freedom of Speech In Cyberspace Changing Communications Paradigms Changing Communications Paradigms Offensive Speech and Censorship in Cyberspace AnonymitySpam.

Slides:



Advertisements
Similar presentations
Slides prepared by Cyndi Chie and Sarah Frye A Gift of Fire Third edition Sara Baase Chapter 3: Freedom of Speech.
Advertisements

Freedom of Speech Chapter 37.
Chapter 13.4 Freedom of the Press Government Mr. Biggs.
Ethics in Information Technology, Fourth Edition
Civil Liberties and Public Policy Chapter 4. The Bill of Rights– Then and Now Civil Liberties – Definition: The legal constitutional protections against.
Free speech in the United States Technology and the public network of information A fine line between aggression and expression Strengthening the first.
Ethics in Information Technology, Second Edition
Censorship on the Internet
Background Information Definition:. Background Information Controversy Ex)
1 Freedom of Expression Prepared By Joseph Leung.
CptS 401, Spring /10/2011 Chapter : Freedom of Speech I See Dilbert cartoons about freedom of speech:
Group Community: A World Without Borders Kimberly Carter David Dobin Tim Hammond Chris Rushing.
Regulating speech How the Net changes attitudes and assumptions, and creates new societal tensions 1 and unintended consequences March 10, 2011Harvard.
A Gift of Fire, 2edChapter 5: Freedom of Speech in Cyberspace1 PowerPoint ® Slides to Accompany A Gift of Fire : Social, Legal, and Ethical Issues for.
Freedom of Speech Professor Matt Thatcher. 2 Last Class l Workplace privacy –how is electronic monitoring different from traditional monitoring? –types.
Workplace Monitoring Store & review messages (keyword search): 46.5% Store & review computer files (keyword search): 36.1% Monitor Internet connections:
Chapter Jacob Niedermier Keith Miller Changing Communications Paradigms The Internet gave us many more chances to voice our opinions.
Freedom of Speech in Cyberspace 1. The U.S. Constitution - The 1 st Amendment: The 1 st Amendment Congress shall make no law respecting an establishment.
Slides prepared by Cyndi Chie and Sarah Frye (and Liam Keliher) A Gift of Fire Third edition Sara Baase Chapter 3: Freedom of Speech.
Chapter 5 Freedom of Expression
Freedom of Speech and Freedom of Assembly. The Purpose of Freedom of Speech 1 to guarantee to each person a right of free expression, in the spoken and.
Brandon Hall CSC 540.  The US Government first attempted to filter the Internet in the early 90’s.  This was an attempt to protect minors against the.
BY: ASHLEY ESTEP, ALYSIA GEORGE, AND ASHLEY MOFFETT Internet Safety.
Internet Censorship In order of appearance: Dmitriy Bespalov Ilya Braude Brian McBurney Yaroslav Volkov.
Ethics in Information Technology
VassilevaCMPT 408 – Freedom of Speech 1 Freedom of Speech - Objectives 1.Discuss the different legal treatment of different medial regarding Freedom of.
Freedom of Speech in Cyberspace
Chapter 3: Freedom of Speech.
A Gift of Fire Third edition Sara Baase
A Gift of Fire Third edition Sara Baase
CS 4001Mary Jean Harrold1 Class 23 ŸFreedom of speech in cyberspace ŸAssign ŸAssignment 8—due 11/13 ŸTerm paper—due 11/20.
Freedom of Speech. acts/funddocs/billeng.htm Amendment I “Congress shall make no law respecting an establishment.
CS 4001Mary Jean Harrold1 Class 24 ŸFreedom of speech in cyberspace ŸAssign ŸAssignment 8—due today ŸTerm paper—due 11/20.
Civil Liberties and Public Policy
Ch3 Freedom of Speech The US Constitution.
IS 490 Notes for Baase Textbook, Chapter 3. Check the Homework Page for the weekly assignment (it's due next Monday). Go to the Angel Page for this course,
Ethics in Information Technology, Second Edition 1 Computer & Society Week 6 Marwan Al-Namari.
Ethics in Information Technology, Second Edition Chapter 5 Freedom of Expression.
LIBS100 July 20, 2005 First Amendment Library Bill of Rights.
Chapter 19: Civil Liberties: First Amendment Freedoms Section 3
Chapter 18 Obscenity & Pornography. Pornography Protected by First Amendment Unless child pornography-not protected PgP BUSA331 Chapter 182.
Cybersex, Porn, and Filtering Information Technology and Social Life April 18, 2005.
Media Law: Understanding Freedom of Expression Chapter Outline  History  Today’s Media Law  Controversies.
CptS 401 Adam Carter. Quiz Question 7 Obscene speech is protected by the First Amendment. A. True B. False 2.
October 21, 2008 Jennifer Q.; Loriane M., Michelle E., Charles H. Internet Safety.
Understanding CIPA Renee Hobbs LSC 530 Texts and Tools for Children and Youth.
ICS 424: Freedom of expression Aj. Thoranin Intarajak.
Slides prepared by Cyndi Chie and Sarah Frye A Gift of Fire Third edition Sara Baase Chapter 3: Freedom of Speech.
Freedom of Speech Computers in the World.
Thinking about tech challenges to free speech New technologies always challenge old regulatory regimes—print, telegraph, telephone, radio, internet Why.
Copyright © 2009 Pearson Education, Inc. Publishing as Longman. Civil Liberties and Public Policy Chapter 4  1 st Amendment Edwards, Wattenberg, and Lineberry.
Slides prepared by Cyndi Chie and Sarah Frye A Gift of Fire Third edition Sara Baase Chapter 3: Freedom of Speech.
Laws and Rules That Govern Internet Safety Ashley Martin.
1 Internet – The Good, the Bad, and the Ugly Module 4 Section 3.
FREEDOM OF SPEECH COSC 380 Eric Carroll Courtney Wirtz Adolphe Ngabo.
The 1 st Amendment U.S. Government Ms. Kemp. 1 st Amendment Rights Press Press Religion Religion Petition Petition Assembly Assembly Speech Speech.
1. Vagueness and Overbreadth: Laws governing free speech must be clear and specific. > Laws that unnecessarily prohibit too much expression are considered.
LIBS100 March 23, 2005 First Amendment Library Bill of Rights.
A Gift of Fire, 2edChapter 5: Freedom of Speech in Cyberspace1 Anonymity Common Sense and the Internet Early publications by some of our Founding Fathers.
Presented by Ika Novita Dewi, MCS
CHAPTER 5 FREEDOM OF EXPRESSION.
Freedom of Expression.
The First Amendment An introduction & overview of freedom of religion and freedom of expression.
Bill of Rights- First Amendment Notes
Limits to the Freedom of Speech
A Gift of Fire Third edition Sara Baase
Constitutional Issues
Freedom of Speech in Cyberspace
A Gift of Fire Third edition Sara Baase
A Gift of Fire Third edition Sara Baase
Presentation transcript:

1 Freedom of Speech In Cyberspace Changing Communications Paradigms Changing Communications Paradigms Offensive Speech and Censorship in Cyberspace AnonymitySpam Ensuring Valuable and Diverse Content

2 Changing Communications Paradigms Regulatory Paradigms Regulatory Paradigms –Communication technologies differ with respect to their degree of First Amendment protection and government regulation. –Print Media: Strongest First Amendment protection. Strongest First Amendment protection. –Broadcast Media: Less First Amendment protection than print media. Less First Amendment protection than print media. –Common Carrier: Content not controlled and the carrier is not responsible for content. Content not controlled and the carrier is not responsible for content.

3 Changing Communications Paradigms Regulatory Paradigms (cont ’ d) Regulatory Paradigms (cont ’ d) –Internet, BBSs, commercial online services, and the WWW: Not exactly print media. Not exactly print media. Not exactly broadcast media. Not exactly broadcast media. Not exactly common carrier. Not exactly common carrier. Q : Who controls the distribution of news, information, and opinion at the online service you use? at the Web sites you frequent?

4 Changing Communications Paradigms The First Amendment The First Amendment –Protects Citizens From Government Prohibits restriction of speech, press, peaceful assembly, and religion. Prohibits restriction of speech, press, peaceful assembly, and religion. –Subsequent Interpretations Address: Offensive and/or controversial speech and ideas, Offensive and/or controversial speech and ideas, Spoken and written words, Spoken and written words, Pictures, art, and other forms of expression and opinion, and Pictures, art, and other forms of expression and opinion, and Commercial speech (e.g. advertising). Commercial speech (e.g. advertising). Q : Should all speech be constitutionally protected?

5 Offensive Speech and Censorship in Cyberspace Speech Might Include: Speech Might Include: Political or religious speech. Political or religious speech. Pornography. Pornography. Sexual or racial slurs. Sexual or racial slurs. Nazi materials. Nazi materials. Libelous statements. Libelous statements. Abortion information. Abortion information. Alcohol ads. Alcohol ads. Q : Identify other forms of speech found in cyberspace that some consider offensive.

6 Offensive Speech and Censorship in Cyberspace Miller v. California Miller v. California –Material is considered obscene if all three parts are met: 1. It depicts sexual (or excretory) acts whose depiction is specifically prohibited by state law, and 2. It depicts these acts in a patently offensive manner, appealing to the prurient interest as judged by a reasonable person using community standards, and 3. It has no serious literary, artistic, social, political, or scientific value. Q : Historically, how have local “community standards” affected censorship of speech in cyberspace?

7 Offensive Speech and Censorship in Cyberspace Material Inappropriate for Children Material Inappropriate for Children –Technology Changes the Context On the Web, children have access to the same ‘ adult ’ text, images, videos, etc. as adults. On the Web, children have access to the same ‘ adult ’ text, images, videos, etc. as adults. Online proprietors don ’ t know the customer is not an adult. Online proprietors don ’ t know the customer is not an adult. –Protecting Children Regardless of the medium: –It is illegal to create, possess or distribute child pornography. –It is illegal to lure children into sexual activity. Q : How should children be protected from access in cyberspace to adult material?

8 Offensive Speech and Censorship in Cyberspace Censorship Laws Censorship Laws –Communications Decency Act (CDA, 1996) Publicity and public pressure lead Congress to pass this act. Publicity and public pressure lead Congress to pass this act. Anyone who made available to anyone under 18 any communication that is obscene or indecent would be subject to a $100,000 fine and two years in prison. Anyone who made available to anyone under 18 any communication that is obscene or indecent would be subject to a $100,000 fine and two years in prison. In 1997, the CDA was ruled unconstitutional because it was too vague and too broad in protecting children online and because less restrictive means are available. In 1997, the CDA was ruled unconstitutional because it was too vague and too broad in protecting children online and because less restrictive means are available. Q : Should content on the Internet have as much First Amendment protection as printed material?

9 Offensive Speech and Censorship in Cyberspace Censorship Laws (cont ’ d) Censorship Laws (cont ’ d) –Child Online Protection Act (COPA, 1998) Commercial Web sites that make available to minors materials “ harmful to minors ”, as judged by community standards would be subject to a $50,000 fine and six months in jail. Commercial Web sites that make available to minors materials “ harmful to minors ”, as judged by community standards would be subject to a $50,000 fine and six months in jail. In 2000 and 2003, COPA was ruled unconstitutional by a federal court. In 2000 and 2003, COPA was ruled unconstitutional by a federal court. Q : How are children protected from “harmful” material outside of Cyberspace?

10 Offensive Speech and Censorship in Cyberspace Censorship Laws (cont ’ d) Censorship Laws (cont ’ d) –Children ’ s Internet Protection Act (CIPA) Any school or library receiving federal Internet funds must install filtering software on all Internet terminals. Any school or library receiving federal Internet funds must install filtering software on all Internet terminals. Filters must block sites containing child pornography, obscene material, and any material deemed “ harmful to minors. ” Filters must block sites containing child pornography, obscene material, and any material deemed “ harmful to minors. ” A federal appeals court ruled a major part of CIPA unconstitutional in 2002 but the Supreme Court upheld the law in A federal appeals court ruled a major part of CIPA unconstitutional in 2002 but the Supreme Court upheld the law in Q : How does CIPA affect adults accessing online material at a public library that uses filtering software?

11 Offensive Speech and Censorship in Cyberspace Limiting Internet Access in Libraries and Schools Limiting Internet Access in Libraries and Schools –Filtering Software Benefit: prevent access to inappropriate material on the Internet by screening words or phrases, blocking sites according to rating system, or disallowing access to specific sites in a list. Benefit: prevent access to inappropriate material on the Internet by screening words or phrases, blocking sites according to rating system, or disallowing access to specific sites in a list. Problems: can be ineffective — kids get around the filters; the words, phrases, rating systems, etc. are subjective; “ banned ” keywords can be overly restrictive for adult users and for legitimate use by minors. Problems: can be ineffective — kids get around the filters; the words, phrases, rating systems, etc. are subjective; “ banned ” keywords can be overly restrictive for adult users and for legitimate use by minors. Q : What has been your experience with filtering software?

12 Offensive Speech and Censorship in Cyberspace Challenging Old Regulatory Paradigms and Special Interests Challenging Old Regulatory Paradigms and Special Interests –License required: To practice law. To practice law. To publish traditional newsletters about commodities and futures investing (prior to 2000). To publish traditional newsletters about commodities and futures investing (prior to 2000). –No license required: To create downloadable, self-help legal software. To create downloadable, self-help legal software. To publish newsletters about, developing software for, and operating Web sites concerning commodities and futures investing (since 2000). To publish newsletters about, developing software for, and operating Web sites concerning commodities and futures investing (since 2000). Q : Is online advertising of wine free speech or disregard for the regulatory rights of state governments?

13 Offensive Speech and Censorship in Cyberspace Censorship On the Global Net Censorship On the Global Net –Global Impact Avoiding censorship: the global nature of the Net allows restrictions (or barriers) in one country to be circumvented by using networks in other, less restrictive countries. Avoiding censorship: the global nature of the Net allows restrictions (or barriers) in one country to be circumvented by using networks in other, less restrictive countries. Creating censorship: the global nature of the Net makes it easier for one nation to impose restrictive standards on others. Creating censorship: the global nature of the Net makes it easier for one nation to impose restrictive standards on others. Q : Why are online gambling sites established offshore?

14 Anonymity Common Sense and the Internet Common Sense and the Internet Early publications by some of our Founding Fathers were published under pseudonyms. Early publications by some of our Founding Fathers were published under pseudonyms. Today, there are publications on the Net that are posted anonymously. Today, there are publications on the Net that are posted anonymously. Q : What are the drawbacks of anonymous Web postings?

15 Anonymity Is Anonymity Protected? Is Anonymity Protected? –Conflicts between political freedom of speech and campaign regulations: Anonymity protects against retaliation and embarrassment. Anonymity protects against retaliation and embarrassment. Anonymity violates rules established by the Federal Elections Commission (FEC) Anonymity violates rules established by the Federal Elections Commission (FEC) Q : Should anonymous political speech on the Web be regulated?

16 Anonymity Anonymity vs. Community Anonymity vs. Community –Supporters of anonymity: Say it is necessary to protect privacy and free speech. Say it is necessary to protect privacy and free speech. –Opponents of anonymity: Believe it is anti-social and allows criminals to hide from law enforcement. Believe it is anti-social and allows criminals to hide from law enforcement. Q : How is the practice of anonymity online similar/dissimilar to strong encryption?

17 Spam What Is the Problem? What Is the Problem? –Unsolicited, mass is cheap to senders but may impose costs on the recipient ’ s time and/or the recipient ’ s online account. is cheap to senders but may impose costs on the recipient ’ s time and/or the recipient ’ s online account. may contain objectionable content (political, commercial ads, solicitations for funds, pornography, etc.). may contain objectionable content (political, commercial ads, solicitations for funds, pornography, etc.). may contain a disguised return address. may contain a disguised return address. may pass through filters. may pass through filters. invades privacy. invades privacy. creates a financial and managerial burden on ISPs. creates a financial and managerial burden on ISPs. Q : How do you handle spam?

18 Spam Cases and Free Speech Issues Cases and Free Speech Issues –AOL v. Cyber Promotions AOL and other service providers have successfully sued spammers because of the cost burden imposed. AOL and other service providers have successfully sued spammers because of the cost burden imposed. –Disgruntled Intel Employee Initially, a court ruled that non-commercial spam to Intel employees at their Intel accounts was a form of trespass. Initially, a court ruled that non-commercial spam to Intel employees at their Intel accounts was a form of trespass. The CA Supreme Court ruled that it was not. The CA Supreme Court ruled that it was not. Q : Is the forwarding of pre-written observations or opinions from human- rights groups spam or expressions of free speech? (Or both?)

19 Spam Solutions Solutions Technology: filters that screen out spam. Technology: filters that screen out spam. Market Pressure: services that list spammers. Market Pressure: services that list spammers. Business Policy: at the discretion of the recipient, all e- mail would be charged a microfee. Business Policy: at the discretion of the recipient, all e- mail would be charged a microfee. Law: create restrictions that are consistent with the First Amendment. Law: create restrictions that are consistent with the First Amendment. Vigilantism: punish spammers by hacking into their phone or computer systems. Vigilantism: punish spammers by hacking into their phone or computer systems. Q : Which solution above, or others, do you support?

20 Ensuring Valuable and Diverse Content Points to Consider: Points to Consider: Is there a balance between commercial and educational information on the Web? Is there a balance between commercial and educational information on the Web? Should diverse content on the Web be subsidized with taxes? Should diverse content on the Web be subsidized with taxes? Should valuable content on the Web be regulated? Should valuable content on the Web be regulated? Do we need to ensure the existence of sites containing civic information? Do we need to ensure the existence of sites containing civic information? Are more sites that promote the arts and culture needed? Are more sites that promote the arts and culture needed? Q : How do we ensure valuable and diverse content in traditional forms of media?