Download presentation
Presentation is loading. Please wait.
Published byMarshall Holland Modified over 8 years ago
1
Freedom of Speech Loeun Thach Annie Lin COSC 380
2
Roadmap Introduction to Freedom of Speech Censorship What should be censored? Censorship in Other Countries Case Study Conclusion
3
Freedom of Speech First Amendment Different technologies and freedom of speech Print Broadcast Common carriers
4
Censorship What is censorship? History of censorship prior to the Internet Modern censorship Forms of censorship Obscene materials Spam Sensitive Material
5
Obscene Material What is obscene material? What are the stakeholders? What are the risks? How do you control access? Is it the responsibility the parents’ or the government’s?
6
Sensitive Material Private vs. Public Spam Examples Bomb-making instructions Suicide Violence
7
Censorship in Other Countries North Korea No independent journalists All radios and TVs are locked on government-specified frequencies Burma Publications must be scrutinized by government and approved Turkmenistan In 2005, all libraries were closed except for one that houses the president’s books
8
Censorship in Other Countries(con’t) The pattern? Why the need for such a pattern? What can even be done about it?
9
Case Study: Cyberbullying What is Cyberbullying? Is it that serious? Prevalent means of today’s youth
10
Cyberbullying Case Suicide of Megan Meier United States v. Lori Drew Who are the stakeholders? Stakeholders and their rights Megan Meier “Josh Evans” The family of Megan Meier The family of Lori Drew and acquaintances MySpace The government
11
Cyberbullying Case(con’t) The hidden stakeholder… How could preexisting censorship laws affected the outcome? How could censorship laws affect First Amendment rights? Government’s reaction on different levels Local Federal
12
Cyberbullying Case(con’t) What are the solutions? Possible solutions: Legislation Education Parental guidance
13
Conclusion Censorship vs. freedom of speech is an ongoing battle Should the internet be regulated? If so, to what degree?
14
References A Gift of Fire: Social, Legal, and Ethical Issues in Computing. http://www.ibls.com/internet_law_news_portal_view.asp x?id=2095&s=latestnews http://www.ibls.com/internet_law_news_portal_view.asp x?id=2095&s=latestnews http://www.theage.com.au/news/web/americas-most- reviled-mother/2007/11/30/1196394672124.html http://www.theage.com.au/news/web/americas-most- reviled-mother/2007/11/30/1196394672124.html http://www.cato-at-liberty.org/federal-cyberbullying-law- worth-a-try/ http://www.cato-at-liberty.org/federal-cyberbullying-law- worth-a-try/
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.