SlideShare une entreprise Scribd logo
1  sur  24
A Gift of Fire, 2ed Chapter 5: Freedom of Speech in Cyberspace 1
Social, Legal, and Ethical Issues for Computers
and the Internet
Freedom of Speech In Cyberspace
A Gift of Fire, 2ed Chapter 5: Freedom of Speech in Cyberspace 2
A Gift of Fire
Freedom of Speech In Cyberspace
Changing Communications Paradigms
Offensive Speech and Censorship in Cyberspace
Anonymity
Spam
Ensuring Valuable and Diverse Content
A Gift of Fire, 2ed Chapter 5: Freedom of Speech in Cyberspace 3
Changing Communications Paradigms
Regulatory Paradigms
Communication technologies differ with respect to their
degree of First Amendment protection and government
regulation.
Print Media:
• Strongest First Amendment protection (books have been banned, but
the trend has been toward fewer government restraints).
Broadcast Media:
• Less First Amendment protection than print media (TV and Radio
stations are licensed by the gov’t…not print outlets).
Common Carrier (telephone, telegraph, postal system):
• Content not controlled and the carrier is not responsible for content.
A Gift of Fire, 2ed Chapter 5: Freedom of Speech in Cyberspace 4
Changing Communications Paradigms
Regulatory Paradigms (cont’d)
Internet, BBSs, commercial online services, and the WWW:
• Not exactly print media.
• Not exactly broadcast media.
• Not exactly common carrier.
Q: Who controls the distribution of news, information, and opinion at the
online service you use? at the Web sites you frequent?
A Gift of Fire, 2ed Chapter 5: Freedom of Speech in Cyberspace 5
Changing Communications Paradigms
The First Amendment
Protects Citizens From Government
• Prohibits restriction of speech, press, peaceful assembly, and religion.
Subsequent Interpretations Address:
• Offensive and/or controversial speech and ideas,
• Spoken and written words,
• Pictures, art, and other forms of expression and opinion, and
• Commercial speech (e.g. advertising).
Q: Should all speech be constitutionally protected?
A Gift of Fire, 2ed Chapter 5: Freedom of Speech in Cyberspace 6
Offensive Speech and
Censorship in Cyberspace
Speech Might Include:
• Political or religious speech.
• Pornography (Multibillion-dollar online business).
• Sexual or racial slurs.
• Nazi materials.
• Libelous statements.
• Abortion information.
• Alcohol ads.
Q: Identify other forms of speech found in cyberspace that some consider
offensive.
A Gift of Fire, 2ed Chapter 5: Freedom of Speech in Cyberspace 7
Offensive Speech and
Censorship in Cyberspace
Miller v. California
Material is considered obscene if all three parts are met:
1. It depicts sexual (or excretory) acts whose depiction is specifically
prohibited by state law, and
2. It depicts these acts in a patently offensive manner, appealing to the
prurient interest as judged by a reasonable person using community
standards, and
3. It has no serious literary, artistic, social, political, or scientific value.
Q: Historically, how have local “community standards” affected censorship
of speech in cyberspace? (see next page)
A Gift of Fire, 2ed Chapter 5: Freedom of Speech in Cyberspace 8
Straining Old Legal Standards
No physical locations on the internet.
Page 198…
A Gift of Fire, 2ed Chapter 5: Freedom of Speech in Cyberspace 9
Offensive Speech and
Censorship in Cyberspace
Material Inappropriate for Children
Technology Changes the Context
• On the Web, children have access to the same ‘adult’ text, images,
videos, etc. as adults (no “tickettaker” to check age).
• Online proprietors don’t know the customer is not an adult.
Protecting Children
Regardless of the medium:
– It is illegal to create, possess or distribute child pornography. (Because
creation of it is child abuse...)
– It is illegal to lure children into sexual activity.
Q: How should children be protected from access in cyberspace to adult
material? (next page)
A Gift of Fire, 2ed Chapter 5: Freedom of Speech in Cyberspace 10
Protect Children
Software filtering:
Bess
Cyber Patrol, Surf-Watch
A Gift of Fire, 2ed Chapter 5: Freedom of Speech in Cyberspace 11
Offensive Speech and
Censorship in Cyberspace
Censorship Laws
Communications Decency Act (CDA, 1996)
• Publicity and public pressure lead Congress to pass this act.
• Anyone who made available to anyone under 18 any communication
that is obscene or indecent would be subject to a $100,000 fine and two
years in prison.
• American Civil Liberties Union (and other free speech advocates)
found this law to be a “profound threat to freedom of expression.
• In 1997, the CDA was ruled unconstitutional because it was too vague
and too broad in protecting children online and because less restrictive
means are available.
Q: Should content on the Internet have as much First Amendment protection as
printed material?
A Gift of Fire, 2ed Chapter 5: Freedom of Speech in Cyberspace 12
Offensive Speech and
Censorship in Cyberspace
Censorship Laws (cont’d)
Child Online Protection Act (COPA, 1998)
• Commercial Web sites that make available to minors materials
“harmful to minors”, as judged by community standards would be
subject to a $50,000 fine and six months in jail.
• In 2000 and 2003, COPA was ruled unconstitutional by a federal court.
Q: How are children protected from “harmful” material outside of Cyberspace?
A Gift of Fire, 2ed Chapter 5: Freedom of Speech in Cyberspace 13
Offensive Speech and
Censorship in Cyberspace
Censorship Laws (cont’d)
Children’s Internet Protection Act (CIPA)
• Any school or library receiving federal Internet funds must install
filtering software on all Internet terminals.
• Filters must block sites containing child pornography, obscene material,
and any material deemed “harmful to minors.”
• A federal appeals court ruled a major part of CIPA unconstitutional in
2002 but the Supreme Court upheld the law in 2003.
Q: How does CIPA affect adults accessing online material at a public library
that uses filtering software? See page 206…
A Gift of Fire, 2ed Chapter 5: Freedom of Speech in Cyberspace 14
Offensive Speech and
Censorship in Cyberspace
Limiting Internet Access in Libraries and
Schools
Filtering Software
• Benefit: prevent access to inappropriate material on the Internet by
screening words or phrases, blocking sites according to rating system,
or disallowing access to specific sites in a list.
• Problems: can be ineffective—kids get around the filters; the words,
phrases, rating systems, etc. are subjective; “banned” keywords can be
overly restrictive for adult users and for legitimate use by minors.
• See page 205 for a list of filtered sites…
Q: What has been your experience with filtering software?
A Gift of Fire, 2ed Chapter 5: Freedom of Speech in Cyberspace 15
Offensive Speech and
Censorship in Cyberspace
Challenging Old Regulatory Paradigms and
Special Interests
License required:
• To practice law.
• To publish traditional newsletters about commodities and futures
investing (prior to 2000).
No license required:
• To create downloadable, self-help legal software.
• To publish newsletters about, developing software for, and operating
Web sites concerning commodities and futures investing (since 2000).
Q: Is online advertising of wine free speech or disregard for the regulatory
rights of state governments?
A Gift of Fire, 2ed Chapter 5: Freedom of Speech in Cyberspace 16
Offensive Speech and
Censorship in Cyberspace
Censorship On the Global Net
Global Impact
• Avoiding censorship: the global nature of the Net allows restrictions (or
barriers) in one country to be circumvented by using networks in other,
less restrictive countries.
• Creating censorship: the global nature of the Net makes it easier for one
nation to impose restrictive standards on others. Cases page 210.
Q: Why are online gambling sites established offshore?
A Gift of Fire, 2ed Chapter 5: Freedom of Speech in Cyberspace 17
Anonymity
Common Sense and the Internet
• Early publications by some of our Founding Fathers were published
under pseudonyms.
• Today, there are publications on the Net that are posted anonymously.
• Anonymizer.com Surf the web/send e-mail anonymously
Q: What are the drawbacks of anonymous Web postings?
(See next slide)
A Gift of Fire, 2ed Chapter 5: Freedom of Speech in Cyberspace 18
Against Anonymity
• Potential to shield criminal/anti-social
activity
– Fraud, harassment, and extortion
– Distribution of child pornography
– Libel or threatening others with impunity
– Infringe copyrights by posting software
– Plan terrorist attacks
• Poor “netiquette”
A Gift of Fire, 2ed Chapter 5: Freedom of Speech in Cyberspace 19
Anonymity
Is Anonymity Protected?
Conflicts between political freedom of speech and campaign
regulations:
• Anonymity protects against retaliation and embarrassment.
• Anonymity violates rules established by the Federal Elections
Commission (FEC) Case page 215.
Q: Should anonymous political speech on the Web be regulated?
A Gift of Fire, 2ed Chapter 5: Freedom of Speech in Cyberspace 20
Anonymity
Anonymity vs. Community
Supporters of anonymity:
• Say it is necessary to protect privacy and free speech.
Opponents of anonymity:
• Believe it is anti-social and allows criminals to hide from law
enforcement.
Q: How is the practice of anonymity online similar/dissimilar to strong
encryption? VERY similar…challenging to law enforcement.
A Gift of Fire, 2ed Chapter 5: Freedom of Speech in Cyberspace 21
Spam
What Is the Problem?
Unsolicited, mass e-mail:
• is cheap to senders but may impose costs on the recipient’s time and/or
the recipient’s online account.
• may contain objectionable content (political, commercial ads,
solicitations for funds, pornography, etc.).
• may contain a disguised return address.
• may pass through filters.
• invades privacy.
• creates a financial and managerial burden on ISPs.
Q: How do you handle spam?
A Gift of Fire, 2ed Chapter 5: Freedom of Speech in Cyberspace 22
Spam
Cases and Free Speech Issues
AOL v. Cyber Promotions
• AOL and other service providers have successfully sued spammers
because of the cost burden imposed. Page 219.
Disgruntled Intel Employee
• Initially, a court ruled that non-commercial spam to Intel employees at
their Intel e-mail accounts was a form of trespass.
• The CA Supreme Court ruled that it was not.
A Gift of Fire, 2ed Chapter 5: Freedom of Speech in Cyberspace 23
Spam
Solutions
• Technology: filters that screen out spam.
• Market Pressure: services that list spammers.
• Business Policy: at the discretion of the recipient, all e-mail would be
charged a microfee.
• Law: create restrictions that are consistent with the First Amendment.
• Vigilantism: punish spammers by hacking into their phone or computer
systems.
Q: Which solution above, or others, do you support?
A Gift of Fire, 2ed Chapter 5: Freedom of Speech in Cyberspace 24
Ensuring Valuable and
Diverse Content
Points to Consider:
• Is there a balance between commercial and educational information on
the Web?
• Should diverse content on the Web be subsidized with taxes?
• Should valuable content on the Web be regulated?
• Do we need to ensure the existence of sites containing civic
information?
• Are more sites that promote the arts and culture needed?
Q: How do we ensure valuable and diverse content in traditional forms of
media?

Contenu connexe

Tendances

Tendances (20)

Cyberspace
CyberspaceCyberspace
Cyberspace
 
Introduction to Cyber law (IT Act 2000)
Introduction to Cyber law (IT Act 2000)Introduction to Cyber law (IT Act 2000)
Introduction to Cyber law (IT Act 2000)
 
Cyber security and prevention in Bangladesh
Cyber security and prevention in BangladeshCyber security and prevention in Bangladesh
Cyber security and prevention in Bangladesh
 
Freedom of expression
Freedom of expressionFreedom of expression
Freedom of expression
 
Information Technology Act 2000
Information Technology Act 2000Information Technology Act 2000
Information Technology Act 2000
 
Cyber law
Cyber lawCyber law
Cyber law
 
Electronic evidence digital evidence in india
Electronic evidence  digital evidence in indiaElectronic evidence  digital evidence in india
Electronic evidence digital evidence in india
 
Jurisdiction in cyberspace
Jurisdiction in cyberspaceJurisdiction in cyberspace
Jurisdiction in cyberspace
 
Cyber security and cyber laws
Cyber security and cyber lawsCyber security and cyber laws
Cyber security and cyber laws
 
Information Technology Act
Information Technology ActInformation Technology Act
Information Technology Act
 
Cyber law
Cyber lawCyber law
Cyber law
 
It Amendments Act
It Amendments ActIt Amendments Act
It Amendments Act
 
IT act 2008
IT act 2008IT act 2008
IT act 2008
 
Cyber Law And Ethics
Cyber Law And EthicsCyber Law And Ethics
Cyber Law And Ethics
 
Cyber Space
Cyber SpaceCyber Space
Cyber Space
 
Chap 4 (1)
Chap 4 (1)Chap 4 (1)
Chap 4 (1)
 
Information Technology Amendment Act 2008
Information Technology Amendment Act 2008Information Technology Amendment Act 2008
Information Technology Amendment Act 2008
 
Cyber crime lecture one definition and nature
Cyber crime lecture one definition and natureCyber crime lecture one definition and nature
Cyber crime lecture one definition and nature
 
it act 2000
it act 2000it act 2000
it act 2000
 
Professional Ethics of IT
Professional Ethics of ITProfessional Ethics of IT
Professional Ethics of IT
 

En vedette

Freedom of expression
Freedom of expressionFreedom of expression
Freedom of expressionKawtar Laaras
 
Freedom of Speech & Expression
Freedom of Speech & ExpressionFreedom of Speech & Expression
Freedom of Speech & Expressiongcundiff
 
Freedom of Expression is a Human Right
Freedom of Expression is a Human RightFreedom of Expression is a Human Right
Freedom of Expression is a Human RightStresemann Stiftung
 
3 censorship privacy
3 censorship privacy3 censorship privacy
3 censorship privacytolshinoda
 
Freedom of the press is not the same as freedom of expression
Freedom of the press is not the same as freedom of expressionFreedom of the press is not the same as freedom of expression
Freedom of the press is not the same as freedom of expressionMartin Hirst
 
Freedom of expression.
Freedom of expression.Freedom of expression.
Freedom of expression.noeliaiiiiii
 
Article 10 freedom of speech
Article 10   freedom of speechArticle 10   freedom of speech
Article 10 freedom of speechHafizul Mukhlis
 
Censorship Powerpoint
Censorship PowerpointCensorship Powerpoint
Censorship Powerpointmmentis117
 
Right to freedom
Right to freedomRight to freedom
Right to freedomladdubabbu
 
Freedom of speech
Freedom of speechFreedom of speech
Freedom of speechahtezaz123
 

En vedette (17)

Freedom of expression
Freedom of expressionFreedom of expression
Freedom of expression
 
Freedom of speech
Freedom of speechFreedom of speech
Freedom of speech
 
Freedom of speech
Freedom of speechFreedom of speech
Freedom of speech
 
Freedom of Speech & Expression
Freedom of Speech & ExpressionFreedom of Speech & Expression
Freedom of Speech & Expression
 
Freedom of Expression is a Human Right
Freedom of Expression is a Human RightFreedom of Expression is a Human Right
Freedom of Expression is a Human Right
 
3 censorship privacy
3 censorship privacy3 censorship privacy
3 censorship privacy
 
Chapter 6
Chapter 6Chapter 6
Chapter 6
 
Direitos Humanos
Direitos HumanosDireitos Humanos
Direitos Humanos
 
freedom of speech
freedom of speechfreedom of speech
freedom of speech
 
Right to freedom
Right to freedomRight to freedom
Right to freedom
 
Freedom of the press is not the same as freedom of expression
Freedom of the press is not the same as freedom of expressionFreedom of the press is not the same as freedom of expression
Freedom of the press is not the same as freedom of expression
 
Freedom of Expression, Media and Journalism under the European Human Rights S...
Freedom of Expression, Media and Journalism under the European Human Rights S...Freedom of Expression, Media and Journalism under the European Human Rights S...
Freedom of Expression, Media and Journalism under the European Human Rights S...
 
Freedom of expression.
Freedom of expression.Freedom of expression.
Freedom of expression.
 
Article 10 freedom of speech
Article 10   freedom of speechArticle 10   freedom of speech
Article 10 freedom of speech
 
Censorship Powerpoint
Censorship PowerpointCensorship Powerpoint
Censorship Powerpoint
 
Right to freedom
Right to freedomRight to freedom
Right to freedom
 
Freedom of speech
Freedom of speechFreedom of speech
Freedom of speech
 

Similaire à Freedom of speech

International internet governance
International internet governanceInternational internet governance
International internet governanceJillian York
 
Internet decency legislation
Internet decency legislationInternet decency legislation
Internet decency legislationTgarmon34
 
Wk_3_freedom_of_speech.pdf
Wk_3_freedom_of_speech.pdfWk_3_freedom_of_speech.pdf
Wk_3_freedom_of_speech.pdfBiproRoy3
 
Internet decency legislation
Internet decency legislationInternet decency legislation
Internet decency legislationTgarmon34
 
ethcpp05-Unit 3.ppt
ethcpp05-Unit 3.pptethcpp05-Unit 3.ppt
ethcpp05-Unit 3.pptAnil Yadav
 
Digital Repression and Techno-Authoritarianism
Digital Repression and Techno-AuthoritarianismDigital Repression and Techno-Authoritarianism
Digital Repression and Techno-AuthoritarianismCharles Mok
 
Privacy reconsidered
Privacy reconsideredPrivacy reconsidered
Privacy reconsideredBrian Rowe
 
An Overview of the Battle for the Control of the Internet
An Overview of the Battle for the Control of the InternetAn Overview of the Battle for the Control of the Internet
An Overview of the Battle for the Control of the InternetDibussi Tande
 
Building Legal Institutions for Information Technology
Building Legal Institutions for Information TechnologyBuilding Legal Institutions for Information Technology
Building Legal Institutions for Information TechnologyRitesh Nayak
 
5.4 whose laws rule the web
5.4 whose laws rule the web 5.4 whose laws rule the web
5.4 whose laws rule the web Hasan Dang
 
Unraveling intermediary liability
Unraveling intermediary liabilityUnraveling intermediary liability
Unraveling intermediary liabilityEmily Laidlaw
 
Freedom or Control in Virtual Worlds
Freedom or Control in Virtual WorldsFreedom or Control in Virtual Worlds
Freedom or Control in Virtual WorldsJyrki Kasvi
 
Software piracy
Software piracySoftware piracy
Software piracyTi-Sun
 
Unit-3 Cyber Crime PPT.pptx
Unit-3 Cyber Crime PPT.pptxUnit-3 Cyber Crime PPT.pptx
Unit-3 Cyber Crime PPT.pptxParasSehgal12
 
Encryption & interception of communication
Encryption & interception of communicationEncryption & interception of communication
Encryption & interception of communicationUc Man
 
Encryption & interception of communication
Encryption & interception of communicationEncryption & interception of communication
Encryption & interception of communicationUc Man
 
Cyberspace Usages Challenges And Disputeresolution Ja
Cyberspace Usages Challenges And Disputeresolution  JaCyberspace Usages Challenges And Disputeresolution  Ja
Cyberspace Usages Challenges And Disputeresolution Jautkarshjani
 

Similaire à Freedom of speech (20)

Freedom
FreedomFreedom
Freedom
 
4568595.ppt
4568595.ppt4568595.ppt
4568595.ppt
 
International internet governance
International internet governanceInternational internet governance
International internet governance
 
Internet decency legislation
Internet decency legislationInternet decency legislation
Internet decency legislation
 
Wk_3_freedom_of_speech.pdf
Wk_3_freedom_of_speech.pdfWk_3_freedom_of_speech.pdf
Wk_3_freedom_of_speech.pdf
 
Internet decency legislation
Internet decency legislationInternet decency legislation
Internet decency legislation
 
ethcpp05-Unit 3.ppt
ethcpp05-Unit 3.pptethcpp05-Unit 3.ppt
ethcpp05-Unit 3.ppt
 
Digital Repression and Techno-Authoritarianism
Digital Repression and Techno-AuthoritarianismDigital Repression and Techno-Authoritarianism
Digital Repression and Techno-Authoritarianism
 
Privacy reconsidered
Privacy reconsideredPrivacy reconsidered
Privacy reconsidered
 
Chapter 5_dp-_pertemuan_7_8
 Chapter 5_dp-_pertemuan_7_8 Chapter 5_dp-_pertemuan_7_8
Chapter 5_dp-_pertemuan_7_8
 
An Overview of the Battle for the Control of the Internet
An Overview of the Battle for the Control of the InternetAn Overview of the Battle for the Control of the Internet
An Overview of the Battle for the Control of the Internet
 
Building Legal Institutions for Information Technology
Building Legal Institutions for Information TechnologyBuilding Legal Institutions for Information Technology
Building Legal Institutions for Information Technology
 
5.4 whose laws rule the web
5.4 whose laws rule the web 5.4 whose laws rule the web
5.4 whose laws rule the web
 
Unraveling intermediary liability
Unraveling intermediary liabilityUnraveling intermediary liability
Unraveling intermediary liability
 
Freedom or Control in Virtual Worlds
Freedom or Control in Virtual WorldsFreedom or Control in Virtual Worlds
Freedom or Control in Virtual Worlds
 
Software piracy
Software piracySoftware piracy
Software piracy
 
Unit-3 Cyber Crime PPT.pptx
Unit-3 Cyber Crime PPT.pptxUnit-3 Cyber Crime PPT.pptx
Unit-3 Cyber Crime PPT.pptx
 
Encryption & interception of communication
Encryption & interception of communicationEncryption & interception of communication
Encryption & interception of communication
 
Encryption & interception of communication
Encryption & interception of communicationEncryption & interception of communication
Encryption & interception of communication
 
Cyberspace Usages Challenges And Disputeresolution Ja
Cyberspace Usages Challenges And Disputeresolution  JaCyberspace Usages Challenges And Disputeresolution  Ja
Cyberspace Usages Challenges And Disputeresolution Ja
 

Plus de Uc Man

Dhcp in linux
Dhcp in linuxDhcp in linux
Dhcp in linuxUc Man
 
Unit 3 maintain yourself in professional practice
Unit 3    maintain yourself in professional practiceUnit 3    maintain yourself in professional practice
Unit 3 maintain yourself in professional practiceUc Man
 
Unit 3 maintain yourself in professional practice
Unit 3    maintain yourself in professional practiceUnit 3    maintain yourself in professional practice
Unit 3 maintain yourself in professional practiceUc Man
 
Course outline pp_2
Course outline pp_2Course outline pp_2
Course outline pp_2Uc Man
 
Unit 3 maintain yourself in professional practice
Unit 3    maintain yourself in professional practiceUnit 3    maintain yourself in professional practice
Unit 3 maintain yourself in professional practiceUc Man
 
Course outline pp_2
Course outline pp_2Course outline pp_2
Course outline pp_2Uc Man
 
System and network administration network services
System and network administration network servicesSystem and network administration network services
System and network administration network servicesUc Man
 
Unit 3 maintain yourself in professional practice
Unit 3    maintain yourself in professional practiceUnit 3    maintain yourself in professional practice
Unit 3 maintain yourself in professional practiceUc Man
 
Professionalism
ProfessionalismProfessionalism
ProfessionalismUc Man
 
Pro in the_workplace2
Pro in the_workplace2Pro in the_workplace2
Pro in the_workplace2Uc Man
 
Professional ethics in_computing
Professional ethics in_computingProfessional ethics in_computing
Professional ethics in_computingUc Man
 
Effective time-management
Effective time-managementEffective time-management
Effective time-managementUc Man
 
Digital divide
Digital divideDigital divide
Digital divideUc Man
 
Course outline pp
Course outline ppCourse outline pp
Course outline ppUc Man
 
Computer crime
Computer crimeComputer crime
Computer crimeUc Man
 
Maintain yourself in professional practice
Maintain yourself in professional practiceMaintain yourself in professional practice
Maintain yourself in professional practiceUc Man
 
Time management
Time managementTime management
Time managementUc Man
 
Time management,planning and prioritization
Time management,planning and prioritizationTime management,planning and prioritization
Time management,planning and prioritizationUc Man
 
Student attendancereportofit 105(a)
Student attendancereportofit 105(a)Student attendancereportofit 105(a)
Student attendancereportofit 105(a)Uc Man
 
Privacy and personal information
Privacy and personal informationPrivacy and personal information
Privacy and personal informationUc Man
 

Plus de Uc Man (20)

Dhcp in linux
Dhcp in linuxDhcp in linux
Dhcp in linux
 
Unit 3 maintain yourself in professional practice
Unit 3    maintain yourself in professional practiceUnit 3    maintain yourself in professional practice
Unit 3 maintain yourself in professional practice
 
Unit 3 maintain yourself in professional practice
Unit 3    maintain yourself in professional practiceUnit 3    maintain yourself in professional practice
Unit 3 maintain yourself in professional practice
 
Course outline pp_2
Course outline pp_2Course outline pp_2
Course outline pp_2
 
Unit 3 maintain yourself in professional practice
Unit 3    maintain yourself in professional practiceUnit 3    maintain yourself in professional practice
Unit 3 maintain yourself in professional practice
 
Course outline pp_2
Course outline pp_2Course outline pp_2
Course outline pp_2
 
System and network administration network services
System and network administration network servicesSystem and network administration network services
System and network administration network services
 
Unit 3 maintain yourself in professional practice
Unit 3    maintain yourself in professional practiceUnit 3    maintain yourself in professional practice
Unit 3 maintain yourself in professional practice
 
Professionalism
ProfessionalismProfessionalism
Professionalism
 
Pro in the_workplace2
Pro in the_workplace2Pro in the_workplace2
Pro in the_workplace2
 
Professional ethics in_computing
Professional ethics in_computingProfessional ethics in_computing
Professional ethics in_computing
 
Effective time-management
Effective time-managementEffective time-management
Effective time-management
 
Digital divide
Digital divideDigital divide
Digital divide
 
Course outline pp
Course outline ppCourse outline pp
Course outline pp
 
Computer crime
Computer crimeComputer crime
Computer crime
 
Maintain yourself in professional practice
Maintain yourself in professional practiceMaintain yourself in professional practice
Maintain yourself in professional practice
 
Time management
Time managementTime management
Time management
 
Time management,planning and prioritization
Time management,planning and prioritizationTime management,planning and prioritization
Time management,planning and prioritization
 
Student attendancereportofit 105(a)
Student attendancereportofit 105(a)Student attendancereportofit 105(a)
Student attendancereportofit 105(a)
 
Privacy and personal information
Privacy and personal informationPrivacy and personal information
Privacy and personal information
 

Dernier

Market Sizes Sample Report - 2024 Edition
Market Sizes Sample Report - 2024 EditionMarket Sizes Sample Report - 2024 Edition
Market Sizes Sample Report - 2024 EditionMintel Group
 
8447779800, Low rate Call girls in Rohini Delhi NCR
8447779800, Low rate Call girls in Rohini Delhi NCR8447779800, Low rate Call girls in Rohini Delhi NCR
8447779800, Low rate Call girls in Rohini Delhi NCRashishs7044
 
Islamabad Escorts | Call 03070433345 | Escort Service in Islamabad
Islamabad Escorts | Call 03070433345 | Escort Service in IslamabadIslamabad Escorts | Call 03070433345 | Escort Service in Islamabad
Islamabad Escorts | Call 03070433345 | Escort Service in IslamabadAyesha Khan
 
NewBase 19 April 2024 Energy News issue - 1717 by Khaled Al Awadi.pdf
NewBase  19 April  2024  Energy News issue - 1717 by Khaled Al Awadi.pdfNewBase  19 April  2024  Energy News issue - 1717 by Khaled Al Awadi.pdf
NewBase 19 April 2024 Energy News issue - 1717 by Khaled Al Awadi.pdfKhaled Al Awadi
 
Call Us 📲8800102216📞 Call Girls In DLF City Gurgaon
Call Us 📲8800102216📞 Call Girls In DLF City GurgaonCall Us 📲8800102216📞 Call Girls In DLF City Gurgaon
Call Us 📲8800102216📞 Call Girls In DLF City Gurgaoncallgirls2057
 
Traction part 2 - EOS Model JAX Bridges.
Traction part 2 - EOS Model JAX Bridges.Traction part 2 - EOS Model JAX Bridges.
Traction part 2 - EOS Model JAX Bridges.Anamaria Contreras
 
India Consumer 2024 Redacted Sample Report
India Consumer 2024 Redacted Sample ReportIndia Consumer 2024 Redacted Sample Report
India Consumer 2024 Redacted Sample ReportMintel Group
 
Pitch Deck Teardown: Geodesic.Life's $500k Pre-seed deck
Pitch Deck Teardown: Geodesic.Life's $500k Pre-seed deckPitch Deck Teardown: Geodesic.Life's $500k Pre-seed deck
Pitch Deck Teardown: Geodesic.Life's $500k Pre-seed deckHajeJanKamps
 
Ms Motilal Padampat Sugar Mills vs. State of Uttar Pradesh & Ors. - A Milesto...
Ms Motilal Padampat Sugar Mills vs. State of Uttar Pradesh & Ors. - A Milesto...Ms Motilal Padampat Sugar Mills vs. State of Uttar Pradesh & Ors. - A Milesto...
Ms Motilal Padampat Sugar Mills vs. State of Uttar Pradesh & Ors. - A Milesto...ShrutiBose4
 
Call Girls in DELHI Cantt, ( Call Me )-8377877756-Female Escort- In Delhi / Ncr
Call Girls in DELHI Cantt, ( Call Me )-8377877756-Female Escort- In Delhi / NcrCall Girls in DELHI Cantt, ( Call Me )-8377877756-Female Escort- In Delhi / Ncr
Call Girls in DELHI Cantt, ( Call Me )-8377877756-Female Escort- In Delhi / Ncrdollysharma2066
 
Call US-88OO1O2216 Call Girls In Mahipalpur Female Escort Service
Call US-88OO1O2216 Call Girls In Mahipalpur Female Escort ServiceCall US-88OO1O2216 Call Girls In Mahipalpur Female Escort Service
Call US-88OO1O2216 Call Girls In Mahipalpur Female Escort Servicecallgirls2057
 
Future Of Sample Report 2024 | Redacted Version
Future Of Sample Report 2024 | Redacted VersionFuture Of Sample Report 2024 | Redacted Version
Future Of Sample Report 2024 | Redacted VersionMintel Group
 
Innovation Conference 5th March 2024.pdf
Innovation Conference 5th March 2024.pdfInnovation Conference 5th March 2024.pdf
Innovation Conference 5th March 2024.pdfrichard876048
 
Kenya Coconut Production Presentation by Dr. Lalith Perera
Kenya Coconut Production Presentation by Dr. Lalith PereraKenya Coconut Production Presentation by Dr. Lalith Perera
Kenya Coconut Production Presentation by Dr. Lalith Pereraictsugar
 
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCRashishs7044
 
International Business Environments and Operations 16th Global Edition test b...
International Business Environments and Operations 16th Global Edition test b...International Business Environments and Operations 16th Global Edition test b...
International Business Environments and Operations 16th Global Edition test b...ssuserf63bd7
 
Flow Your Strategy at Flight Levels Day 2024
Flow Your Strategy at Flight Levels Day 2024Flow Your Strategy at Flight Levels Day 2024
Flow Your Strategy at Flight Levels Day 2024Kirill Klimov
 

Dernier (20)

Market Sizes Sample Report - 2024 Edition
Market Sizes Sample Report - 2024 EditionMarket Sizes Sample Report - 2024 Edition
Market Sizes Sample Report - 2024 Edition
 
8447779800, Low rate Call girls in Rohini Delhi NCR
8447779800, Low rate Call girls in Rohini Delhi NCR8447779800, Low rate Call girls in Rohini Delhi NCR
8447779800, Low rate Call girls in Rohini Delhi NCR
 
Islamabad Escorts | Call 03070433345 | Escort Service in Islamabad
Islamabad Escorts | Call 03070433345 | Escort Service in IslamabadIslamabad Escorts | Call 03070433345 | Escort Service in Islamabad
Islamabad Escorts | Call 03070433345 | Escort Service in Islamabad
 
NewBase 19 April 2024 Energy News issue - 1717 by Khaled Al Awadi.pdf
NewBase  19 April  2024  Energy News issue - 1717 by Khaled Al Awadi.pdfNewBase  19 April  2024  Energy News issue - 1717 by Khaled Al Awadi.pdf
NewBase 19 April 2024 Energy News issue - 1717 by Khaled Al Awadi.pdf
 
Call Us 📲8800102216📞 Call Girls In DLF City Gurgaon
Call Us 📲8800102216📞 Call Girls In DLF City GurgaonCall Us 📲8800102216📞 Call Girls In DLF City Gurgaon
Call Us 📲8800102216📞 Call Girls In DLF City Gurgaon
 
Traction part 2 - EOS Model JAX Bridges.
Traction part 2 - EOS Model JAX Bridges.Traction part 2 - EOS Model JAX Bridges.
Traction part 2 - EOS Model JAX Bridges.
 
India Consumer 2024 Redacted Sample Report
India Consumer 2024 Redacted Sample ReportIndia Consumer 2024 Redacted Sample Report
India Consumer 2024 Redacted Sample Report
 
No-1 Call Girls In Goa 93193 VIP 73153 Escort service In North Goa Panaji, Ca...
No-1 Call Girls In Goa 93193 VIP 73153 Escort service In North Goa Panaji, Ca...No-1 Call Girls In Goa 93193 VIP 73153 Escort service In North Goa Panaji, Ca...
No-1 Call Girls In Goa 93193 VIP 73153 Escort service In North Goa Panaji, Ca...
 
Pitch Deck Teardown: Geodesic.Life's $500k Pre-seed deck
Pitch Deck Teardown: Geodesic.Life's $500k Pre-seed deckPitch Deck Teardown: Geodesic.Life's $500k Pre-seed deck
Pitch Deck Teardown: Geodesic.Life's $500k Pre-seed deck
 
Ms Motilal Padampat Sugar Mills vs. State of Uttar Pradesh & Ors. - A Milesto...
Ms Motilal Padampat Sugar Mills vs. State of Uttar Pradesh & Ors. - A Milesto...Ms Motilal Padampat Sugar Mills vs. State of Uttar Pradesh & Ors. - A Milesto...
Ms Motilal Padampat Sugar Mills vs. State of Uttar Pradesh & Ors. - A Milesto...
 
Call Girls in DELHI Cantt, ( Call Me )-8377877756-Female Escort- In Delhi / Ncr
Call Girls in DELHI Cantt, ( Call Me )-8377877756-Female Escort- In Delhi / NcrCall Girls in DELHI Cantt, ( Call Me )-8377877756-Female Escort- In Delhi / Ncr
Call Girls in DELHI Cantt, ( Call Me )-8377877756-Female Escort- In Delhi / Ncr
 
Call US-88OO1O2216 Call Girls In Mahipalpur Female Escort Service
Call US-88OO1O2216 Call Girls In Mahipalpur Female Escort ServiceCall US-88OO1O2216 Call Girls In Mahipalpur Female Escort Service
Call US-88OO1O2216 Call Girls In Mahipalpur Female Escort Service
 
Future Of Sample Report 2024 | Redacted Version
Future Of Sample Report 2024 | Redacted VersionFuture Of Sample Report 2024 | Redacted Version
Future Of Sample Report 2024 | Redacted Version
 
Innovation Conference 5th March 2024.pdf
Innovation Conference 5th March 2024.pdfInnovation Conference 5th March 2024.pdf
Innovation Conference 5th March 2024.pdf
 
Enjoy ➥8448380779▻ Call Girls In Sector 18 Noida Escorts Delhi NCR
Enjoy ➥8448380779▻ Call Girls In Sector 18 Noida Escorts Delhi NCREnjoy ➥8448380779▻ Call Girls In Sector 18 Noida Escorts Delhi NCR
Enjoy ➥8448380779▻ Call Girls In Sector 18 Noida Escorts Delhi NCR
 
Kenya Coconut Production Presentation by Dr. Lalith Perera
Kenya Coconut Production Presentation by Dr. Lalith PereraKenya Coconut Production Presentation by Dr. Lalith Perera
Kenya Coconut Production Presentation by Dr. Lalith Perera
 
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR
 
International Business Environments and Operations 16th Global Edition test b...
International Business Environments and Operations 16th Global Edition test b...International Business Environments and Operations 16th Global Edition test b...
International Business Environments and Operations 16th Global Edition test b...
 
Call Us ➥9319373153▻Call Girls In North Goa
Call Us ➥9319373153▻Call Girls In North GoaCall Us ➥9319373153▻Call Girls In North Goa
Call Us ➥9319373153▻Call Girls In North Goa
 
Flow Your Strategy at Flight Levels Day 2024
Flow Your Strategy at Flight Levels Day 2024Flow Your Strategy at Flight Levels Day 2024
Flow Your Strategy at Flight Levels Day 2024
 

Freedom of speech

  • 1. A Gift of Fire, 2ed Chapter 5: Freedom of Speech in Cyberspace 1 Social, Legal, and Ethical Issues for Computers and the Internet Freedom of Speech In Cyberspace
  • 2. A Gift of Fire, 2ed Chapter 5: Freedom of Speech in Cyberspace 2 A Gift of Fire Freedom of Speech In Cyberspace Changing Communications Paradigms Offensive Speech and Censorship in Cyberspace Anonymity Spam Ensuring Valuable and Diverse Content
  • 3. A Gift of Fire, 2ed Chapter 5: Freedom of Speech in Cyberspace 3 Changing Communications Paradigms Regulatory Paradigms Communication technologies differ with respect to their degree of First Amendment protection and government regulation. Print Media: • Strongest First Amendment protection (books have been banned, but the trend has been toward fewer government restraints). Broadcast Media: • Less First Amendment protection than print media (TV and Radio stations are licensed by the gov’t…not print outlets). Common Carrier (telephone, telegraph, postal system): • Content not controlled and the carrier is not responsible for content.
  • 4. A Gift of Fire, 2ed Chapter 5: Freedom of Speech in Cyberspace 4 Changing Communications Paradigms Regulatory Paradigms (cont’d) Internet, BBSs, commercial online services, and the WWW: • Not exactly print media. • Not exactly broadcast media. • Not exactly common carrier. Q: Who controls the distribution of news, information, and opinion at the online service you use? at the Web sites you frequent?
  • 5. A Gift of Fire, 2ed Chapter 5: Freedom of Speech in Cyberspace 5 Changing Communications Paradigms The First Amendment Protects Citizens From Government • Prohibits restriction of speech, press, peaceful assembly, and religion. Subsequent Interpretations Address: • Offensive and/or controversial speech and ideas, • Spoken and written words, • Pictures, art, and other forms of expression and opinion, and • Commercial speech (e.g. advertising). Q: Should all speech be constitutionally protected?
  • 6. A Gift of Fire, 2ed Chapter 5: Freedom of Speech in Cyberspace 6 Offensive Speech and Censorship in Cyberspace Speech Might Include: • Political or religious speech. • Pornography (Multibillion-dollar online business). • Sexual or racial slurs. • Nazi materials. • Libelous statements. • Abortion information. • Alcohol ads. Q: Identify other forms of speech found in cyberspace that some consider offensive.
  • 7. A Gift of Fire, 2ed Chapter 5: Freedom of Speech in Cyberspace 7 Offensive Speech and Censorship in Cyberspace Miller v. California Material is considered obscene if all three parts are met: 1. It depicts sexual (or excretory) acts whose depiction is specifically prohibited by state law, and 2. It depicts these acts in a patently offensive manner, appealing to the prurient interest as judged by a reasonable person using community standards, and 3. It has no serious literary, artistic, social, political, or scientific value. Q: Historically, how have local “community standards” affected censorship of speech in cyberspace? (see next page)
  • 8. A Gift of Fire, 2ed Chapter 5: Freedom of Speech in Cyberspace 8 Straining Old Legal Standards No physical locations on the internet. Page 198…
  • 9. A Gift of Fire, 2ed Chapter 5: Freedom of Speech in Cyberspace 9 Offensive Speech and Censorship in Cyberspace Material Inappropriate for Children Technology Changes the Context • On the Web, children have access to the same ‘adult’ text, images, videos, etc. as adults (no “tickettaker” to check age). • Online proprietors don’t know the customer is not an adult. Protecting Children Regardless of the medium: – It is illegal to create, possess or distribute child pornography. (Because creation of it is child abuse...) – It is illegal to lure children into sexual activity. Q: How should children be protected from access in cyberspace to adult material? (next page)
  • 10. A Gift of Fire, 2ed Chapter 5: Freedom of Speech in Cyberspace 10 Protect Children Software filtering: Bess Cyber Patrol, Surf-Watch
  • 11. A Gift of Fire, 2ed Chapter 5: Freedom of Speech in Cyberspace 11 Offensive Speech and Censorship in Cyberspace Censorship Laws Communications Decency Act (CDA, 1996) • Publicity and public pressure lead Congress to pass this act. • Anyone who made available to anyone under 18 any communication that is obscene or indecent would be subject to a $100,000 fine and two years in prison. • American Civil Liberties Union (and other free speech advocates) found this law to be a “profound threat to freedom of expression. • In 1997, the CDA was ruled unconstitutional because it was too vague and too broad in protecting children online and because less restrictive means are available. Q: Should content on the Internet have as much First Amendment protection as printed material?
  • 12. A Gift of Fire, 2ed Chapter 5: Freedom of Speech in Cyberspace 12 Offensive Speech and Censorship in Cyberspace Censorship Laws (cont’d) Child Online Protection Act (COPA, 1998) • Commercial Web sites that make available to minors materials “harmful to minors”, as judged by community standards would be subject to a $50,000 fine and six months in jail. • In 2000 and 2003, COPA was ruled unconstitutional by a federal court. Q: How are children protected from “harmful” material outside of Cyberspace?
  • 13. A Gift of Fire, 2ed Chapter 5: Freedom of Speech in Cyberspace 13 Offensive Speech and Censorship in Cyberspace Censorship Laws (cont’d) Children’s Internet Protection Act (CIPA) • Any school or library receiving federal Internet funds must install filtering software on all Internet terminals. • Filters must block sites containing child pornography, obscene material, and any material deemed “harmful to minors.” • A federal appeals court ruled a major part of CIPA unconstitutional in 2002 but the Supreme Court upheld the law in 2003. Q: How does CIPA affect adults accessing online material at a public library that uses filtering software? See page 206…
  • 14. A Gift of Fire, 2ed Chapter 5: Freedom of Speech in Cyberspace 14 Offensive Speech and Censorship in Cyberspace Limiting Internet Access in Libraries and Schools Filtering Software • Benefit: prevent access to inappropriate material on the Internet by screening words or phrases, blocking sites according to rating system, or disallowing access to specific sites in a list. • Problems: can be ineffective—kids get around the filters; the words, phrases, rating systems, etc. are subjective; “banned” keywords can be overly restrictive for adult users and for legitimate use by minors. • See page 205 for a list of filtered sites… Q: What has been your experience with filtering software?
  • 15. A Gift of Fire, 2ed Chapter 5: Freedom of Speech in Cyberspace 15 Offensive Speech and Censorship in Cyberspace Challenging Old Regulatory Paradigms and Special Interests License required: • To practice law. • To publish traditional newsletters about commodities and futures investing (prior to 2000). No license required: • To create downloadable, self-help legal software. • To publish newsletters about, developing software for, and operating Web sites concerning commodities and futures investing (since 2000). Q: Is online advertising of wine free speech or disregard for the regulatory rights of state governments?
  • 16. A Gift of Fire, 2ed Chapter 5: Freedom of Speech in Cyberspace 16 Offensive Speech and Censorship in Cyberspace Censorship On the Global Net Global Impact • Avoiding censorship: the global nature of the Net allows restrictions (or barriers) in one country to be circumvented by using networks in other, less restrictive countries. • Creating censorship: the global nature of the Net makes it easier for one nation to impose restrictive standards on others. Cases page 210. Q: Why are online gambling sites established offshore?
  • 17. A Gift of Fire, 2ed Chapter 5: Freedom of Speech in Cyberspace 17 Anonymity Common Sense and the Internet • Early publications by some of our Founding Fathers were published under pseudonyms. • Today, there are publications on the Net that are posted anonymously. • Anonymizer.com Surf the web/send e-mail anonymously Q: What are the drawbacks of anonymous Web postings? (See next slide)
  • 18. A Gift of Fire, 2ed Chapter 5: Freedom of Speech in Cyberspace 18 Against Anonymity • Potential to shield criminal/anti-social activity – Fraud, harassment, and extortion – Distribution of child pornography – Libel or threatening others with impunity – Infringe copyrights by posting software – Plan terrorist attacks • Poor “netiquette”
  • 19. A Gift of Fire, 2ed Chapter 5: Freedom of Speech in Cyberspace 19 Anonymity Is Anonymity Protected? Conflicts between political freedom of speech and campaign regulations: • Anonymity protects against retaliation and embarrassment. • Anonymity violates rules established by the Federal Elections Commission (FEC) Case page 215. Q: Should anonymous political speech on the Web be regulated?
  • 20. A Gift of Fire, 2ed Chapter 5: Freedom of Speech in Cyberspace 20 Anonymity Anonymity vs. Community Supporters of anonymity: • Say it is necessary to protect privacy and free speech. Opponents of anonymity: • Believe it is anti-social and allows criminals to hide from law enforcement. Q: How is the practice of anonymity online similar/dissimilar to strong encryption? VERY similar…challenging to law enforcement.
  • 21. A Gift of Fire, 2ed Chapter 5: Freedom of Speech in Cyberspace 21 Spam What Is the Problem? Unsolicited, mass e-mail: • is cheap to senders but may impose costs on the recipient’s time and/or the recipient’s online account. • may contain objectionable content (political, commercial ads, solicitations for funds, pornography, etc.). • may contain a disguised return address. • may pass through filters. • invades privacy. • creates a financial and managerial burden on ISPs. Q: How do you handle spam?
  • 22. A Gift of Fire, 2ed Chapter 5: Freedom of Speech in Cyberspace 22 Spam Cases and Free Speech Issues AOL v. Cyber Promotions • AOL and other service providers have successfully sued spammers because of the cost burden imposed. Page 219. Disgruntled Intel Employee • Initially, a court ruled that non-commercial spam to Intel employees at their Intel e-mail accounts was a form of trespass. • The CA Supreme Court ruled that it was not.
  • 23. A Gift of Fire, 2ed Chapter 5: Freedom of Speech in Cyberspace 23 Spam Solutions • Technology: filters that screen out spam. • Market Pressure: services that list spammers. • Business Policy: at the discretion of the recipient, all e-mail would be charged a microfee. • Law: create restrictions that are consistent with the First Amendment. • Vigilantism: punish spammers by hacking into their phone or computer systems. Q: Which solution above, or others, do you support?
  • 24. A Gift of Fire, 2ed Chapter 5: Freedom of Speech in Cyberspace 24 Ensuring Valuable and Diverse Content Points to Consider: • Is there a balance between commercial and educational information on the Web? • Should diverse content on the Web be subsidized with taxes? • Should valuable content on the Web be regulated? • Do we need to ensure the existence of sites containing civic information? • Are more sites that promote the arts and culture needed? Q: How do we ensure valuable and diverse content in traditional forms of media?