CYBERLAW 2002 CLASS 5 Introduction to the Problem of Regulating Cyberspace - How Should Internet Activity Be Regulated, and Who Should Regulate It? September.

Slides:



Advertisements
Similar presentations
Chapter 2 Digital Terrorism.
Advertisements

Freedom of Expression Prepared By Najib sani & Muhammad Tajuddeen M.
Jessika Salardi 1055/006. Explaining what cyber bullying is, and how it starts Describe the problems cyber bullying creates in schools and communities.
IGE105 – Communication Technology in a Changing World Dr. Ken Cosh Week 10.
Brian Connett, LCDR, USN US NAVAL ACADEMY
An Endnote on Regulating Cyberspace: Architecture vs Law Author: Graham Greenleaf. Presented by: Oliver Bannatyne, 28 th May 2002.
USA PATRIOT ACT: Is it a legitimate law to protect national security or is it a violation of your Civil Liberties? Essential Question:
Big Brother Might be Watching. Agenda: US Patriot Act Copyright Infringement Social Media Packets.
Cyberterrorism. Critical Infrastructure Vulnerability.
Cyber and Internet Safety El Rodeo School September 11, 2013.
Computers and Society Lecture 1: administrative details and an introduction to the class Professor: Evan Korth New York University.
Review and Social Issues (if time) 6 December. Final Exam Coverage  Classroom presentations Mine Students  Readings  External Speakers.
By: Kyon Johnson. Key Words: Internet- A computer network consisting of a worldwide network of computer networks that use the TCP/IP network protocols.
WESAM SHULDHUN KHALID AL-ZUGHAIBI IPv4 vs. IPv6.
Submitted by: Abhashree Pradhan CA (1)
Day 1. “Congress shall make no law respecting an establishment of religion, or prohibiting the free exercise thereof; or abridging the freedom of speech,
Chapter 17 Citizenship and the Internet. Civic Participation The internet and the World Wide Web help people communicate and collaborate across borders.
Chapter 17 Objectives: 6.04, 6.05, 10.05, Using the Internet Web sites: pages on the World Wide Web that contain text, images, audio, and video.
Legal & Ethical Issues Affecting E-Marketing The student will be able to: Distinguish between what is legal and what is ethical Distinguish between what.
Homeland Security. Learning Topics Purpose Introduction History Homeland Security Act Homeland Defense Terrorism Advisory System Keeping yourself safe.
INTERNET SAFETY Public Hearing  September 8, 2014.
CYBERLAW 2002 Professor Susanna Frederick Fischer Class One: Introduction August 26, 2002.
WHAT IS VIRUS? NAE GRAND CHALLENGE SECURE CYBERSPACE.
Ethical and Social...J.M.Kizza 1 Module 12: New Frontiers for Computer Ethics: Cyberspace Introduction Cyberspace and the Concepts of Telepresence and.
1. What is the Internet? What is 'cyberspace'? Leiner et al A Brief History of the Internet
Information Warfare Playgrounds to Battlegrounds.
OVERVIEW OF CYBER TERRORISM IN INDONESIA PRESENTED BY: SUPT. DRS. BOY RAFLI AMAR SPECIAL DETACHMENT 88 AT – INP ARF SEMINAR ON.
Freedom of Speech Congress shall make no law… abridging the freedom of speech”.
Acceptable Use Policy.  The District system includes:  A network of computers that serves all the schools  Saved files on a server for student work.
Expression on the Net Is it possible to control what is seen and by whom on the network? Like a book? Newpapers? Phone call? Television? Where to regulate:
Jeopardy: Digital Citizenship Please use presentation mode!
Compsci 82, Fall Who Governs the Internet? l What does the IETF govern ?  and
© 2015 albert-learning.com Social Media Must Curb Hate Speech Social media must curb hate speech, says France.
IT in Business Issues in Information Technology Lecture – 13.
Computer Forensics Law & Privacy © Joe Cleetus Concurrent Engineering Research Center, Lane Dept of Computer Science and Engineering, WVU.
CyberEthics Morality and Law in Cyberspace Chapter 3: Free Speech and Content Control in Cyberspace By Jennifer, Linda, Paul, Paula, and Stephne.
Understanding the Threats of and Defenses Against Cyber Warfare.
What vulnerabilities do you face in cyberspace?  Cyberbullying  Cyberstalking  Racial hatred  Exposure to violent, disturbing and/or illegal material.
CYBER BULLYING CODY KLARMAN. TYPES OF CYBER BULLYING Sending mean messages or threats to a person's account or cell phone Spreading rumors online.
Information Warfare Playgrounds to Battlegrounds.
1 The Broader Picture Laws Governing Hacking and Other Computer Crimes Consumer Privacy Employee Workplace Monitoring Government Surveillance Cyberwar.
Ethics and Morality Theory Part 3 13 September 2006.
THE LEGAL ENVIRONMENT OF BUSINESS © 2006 Prentice Hall Ch. 6-1 A Critical Thinking Approach Fourth Edition Nancy K. Kubasek Bartley A. Brennan M. Neil.
1 Ethical Issues in Computer Science CSCI 328, Fall 2013 Session 7 Ethics in IT Societies.
Slides prepared by Cyndi Chie and Sarah Frye A Gift of Fire Third edition Sara Baase Chapter 3: Freedom of Speech.
Introduction To Cyberlaw Presented By: Allison R. Seidel.
Lesson 2: Workplace Digital Communication
The Place of Cyberlaw in the MSIS Curriculum Ramesh Subramanian Bruce White Quinnipiac University.
1 st ten amendments basic freedoms protect citizens from a overly-powerful central gov’t.
9.1 Audience Appreciation
“HUMAN RIGHTS AND DEMOCRACY IN ACTION” TEACHER TRAINING IN EDC/HRE: HOW TO DEVELOP STUDENTS’ ABILITY TO EVALUATE INFORMATION FROM MEDIA AND SOCIAL NETWORKS?
LAW for Business and Personal Use © 2012 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible.
Agents of Harm or Agents of Grace The Legal and Ethical Aspects of Identifying Harm and Assigning Responsibility in a Networked World By Thomas A. Lipinski,
Archit Cate Jessica. Introduction  Free Speech: what is it? What isn’t it?  Social responsibility: Does the government or any other forum have the ability.
Social Justice Post Survey Results May Social Justice & Technology Post-SurveyPlease answer all of the questions in the survey.: Please rate your.
NANDHA ENGINEERING COLLEGE ERODE-52. CYBER WAR-A NEW FACE OF TERRORISM Guided byGuided by E.Kanimozhi,M.EE.Kanimozhi,M.E AP/Dept of ITAP/Dept of IT PRESENTED.
Ethical dilemmas arising from information management strategies used by organisations Ethics & Information Systems.
Internet Safety: Providing an Education Plan for Your School
Digital Citizenship Grades 4-6
Learning Module 6 The Attraction Of Hate.
Training Aims Understand risks of organising events
Technological Determinism in ‘Code’
Legal and Ethical Issues in E-Commerce
Fix Microsoft Office Error Code Call
SEC 103 Enthusiastic Studysnaptutorial.com
The Broader Picture Laws Governing Hacking and Other Computer Crimes
Exploring Time, Place, and Manner
Consumer Protection Online
Communication Systems Continuous Signals and Systems Optical communications Inforamtion and communication systems security Software for communications.
CYBERTERRORISM.
Presentation transcript:

CYBERLAW 2002 CLASS 5 Introduction to the Problem of Regulating Cyberspace - How Should Internet Activity Be Regulated, and Who Should Regulate It? September 11, 2002

Sept 11:The Problem of Cyberterrorism

Cyberspace vs. “Real Space” Should (or must) regulation of conduct in cyberspace differ from regulation of conduct in “real space”? Why or why not?

Terrorist Activities on the Internet How are terrorism and the Internet related?

Terrorist Activities on the Internet How are terrorism and the Internet related? Internet: a forum for terrorist groups and individual terrorists to spread their messages of hate and violence and communicate with each other Attempts to attack Internet and computer networks (“cyberterrorism”)

Terrorist/Hate Sites The U.S. First Amendment – much of the speech on these sites is protected

The Problem of Regulating the Internet Why is cyberspace hard for governments to regulate (think of Lessig’s four stories) Who currently regulates telecommunications other than Internet communications? How? Who currently regulates the Internet? What is “convergence”? What effect should convergence have on the regulation of telecommunications generally?

How Should Cyberspace Be Regulated, If At All? Libertarian theories (Post) Opponents of libertarianism (Lessig) What does Lessig mean by the statement: “Code is law”?

Lessig vs. Post To what extent do Lessig and Post agree on the question of regulation of conduct in cyberspace? How do they disagree? Whose approach do you find more convincing – Lessig’s or Post’s? Why?

Cyberspace vs. “Real Space” Should (or must) regulation of conduct in cyberspace differ from regulation of conduct in “real space”? Why or why not?

Terrorist Activities on the Internet How are terrorism and the Internet related?

Terrorist Activities on the Internet How are terrorism and the Internet related? Internet: a forum for terrorist groups and individual terrorists to spread their messages of hate and violence and communicate with each other Attempts to attack Internet and computer networks (“cyberterrorism”)

Terrorist/Hate Sites The U.S. First Amendment – much of the speech on these sites is protected

Nicholas Negroponte: Being Digital (1995) Who is Nicholas Negroponte? What does “being digital” mean for Negroponte? Why are bits of information valuable? What differences exist in production/distribution of bits in contrast to atoms?

Negroponte: The Future “Bits are not edible; in that sense, they cannot stop hunger. Computers are not moral; they cannot resolve complex issues like the rights to life and to death. But being digital, nonetheless, does give much cause for optimism.” Do you agree or disagree? Why? Different views: see Cass Sunstein Republic.com; Neil Postman,Techopoly (1992)