Censorship on the Internet

Slides:



Advertisements
Similar presentations
MADISON COUNTY SCHOOLS ACCEPTABLE USE AND INTERNET SAFETY POLICY.
Advertisements

Northside I.S.D. Acceptable Use Policy
Slides prepared by Cyndi Chie and Sarah Frye A Gift of Fire Third edition Sara Baase Chapter 3: Freedom of Speech.
Freedom of Speech Chapter 37.
Ethics in Information Technology, Fourth Edition
Free speech in the United States Technology and the public network of information A fine line between aggression and expression Strengthening the first.
Cyber and Internet Safety El Rodeo School September 11, 2013.
Ethics in Information Technology, Second Edition
Phoenix Union High School District Governing Board Policy In-Service Technology Usage Electronic Information System (EIS) 2014/2015 School Year.
Benefits:. Federal Children’s Internet Protection Act states that requires establishments, including schools and public libraries, that receive federal.
Background Information Definition:. Background Information Controversy Ex)
Access to Electronic Media Acceptable Use Policy August 8, 2011 Meece Middle School.
1 Freedom of Expression Prepared By Joseph Leung.
Pornography and the Internet Amanda Gillespie Donna Jones EDCI 564.
Group Community: A World Without Borders Kimberly Carter David Dobin Tim Hammond Chris Rushing.
A Gift of Fire, 2edChapter 5: Freedom of Speech in Cyberspace1 PowerPoint ® Slides to Accompany A Gift of Fire : Social, Legal, and Ethical Issues for.
Workplace Monitoring Store & review messages (keyword search): 46.5% Store & review computer files (keyword search): 36.1% Monitor Internet connections:
Freedom of Speech in Cyberspace 1. The U.S. Constitution - The 1 st Amendment: The 1 st Amendment Congress shall make no law respecting an establishment.
Internet Security PA Turnpike Commission. Internet Security Practices, rule #1: Be distrustful when using the Internet!
Chapter 5 Freedom of Expression
Grade 5 Student Assistants
Shawanda Sturdivant The Internet What would we do without the Internet? It gives us the world at our fingertips. Almost anything that we want and need.
BY: ASHLEY ESTEP, ALYSIA GEORGE, AND ASHLEY MOFFETT Internet Safety.
Internet Censorship In order of appearance: Dmitriy Bespalov Ilya Braude Brian McBurney Yaroslav Volkov.
Ethics in Information Technology
Chapter 17.3 Regulating the Internet. Internet Speech ► Free speech is a key democratic right. The Internet promotes free speech by giving all users a.
Freedom of Speech in Cyberspace
Chapter 3: Freedom of Speech.
1 Internet Safety By: Nicole Sutton, Kenny Messinger, and Emily Whitman.
Chapter 17 Objectives: 6.04, 6.05, 10.05, Using the Internet Web sites: pages on the World Wide Web that contain text, images, audio, and video.
How Can We Help Our Students to Use the Internet in a Safer Way?
Ashley Counce. What is Cyber Bullying?  Cyberbullying is the use of technology to harass, threaten, embarrass, or target another person. By definition,
CS 4001Mary Jean Harrold1 Class 24 ŸFreedom of speech in cyberspace ŸAssign ŸAssignment 8—due today ŸTerm paper—due 11/20.
Internet SafetyInternet Safety Danita RussellDanita Russell Intro.
Ch3 Freedom of Speech The US Constitution.
Ethics in Information Technology, Second Edition 1 Computer & Society Week 6 Marwan Al-Namari.
Ethics in Information Technology, Second Edition Chapter 5 Freedom of Expression.
Computer Ethics. 2 Networking * The Internet is a network of networks that uses two protocols, known as TCP/IP, to control the exchange of data. * The.
LEEDS HIGH SCHOOL Internet Use Policies. Leeds High School Library Media Center “It is the goal of the LMC to help people of all ages make the most of.
Chapter 18 Obscenity & Pornography. Pornography Protected by First Amendment Unless child pornography-not protected PgP BUSA331 Chapter 182.
Chapter 9: The Internet and World Wide Web Two contrasting views: Media Critic Marshall McCLuhan: the Internet would help create a “global village” of.
BEING CYBERSMART! ABOUT ONLINE SAFETY AND SECURITY AT SCHOOLS Redelivery Part 1: The AUP.
Cybersex, Porn, and Filtering Information Technology and Social Life April 18, 2005.
Electronic Marketing: Integrating Electronic Resources into the Marketing Process, 2e 11/5/2015  2004 Joel Reedy and Shauna Schullo Electronic Marketing.
Freedom of Speech First Amendment Expression, Speech and Symbolic Speech.
1 Freedom of Speech In Cyberspace Changing Communications Paradigms Changing Communications Paradigms Offensive Speech and Censorship in Cyberspace AnonymitySpam.
Web Browser-Parental Control Armenda Fourte’ July 27, 2007.
CptS 401 Adam Carter. Quiz Question 7 Obscene speech is protected by the First Amendment. A. True B. False 2.
October 21, 2008 Jennifer Q.; Loriane M., Michelle E., Charles H. Internet Safety.
Issues and Problems Concerning the Internet Copyright ◦ Users pass off as others work and post it as their own work without giving credit to the source.
Rights Of Library Users By Keao White Rationale for this Workshop The purpose of this workshop is to give an in depth presentation covering the rights.
ICS 424: Freedom of expression Aj. Thoranin Intarajak.
Slides prepared by Cyndi Chie and Sarah Frye A Gift of Fire Third edition Sara Baase Chapter 3: Freedom of Speech.
Freedom of Speech Computers in the World.
The internet is an amazing resource. We can connect, communicate and be creative in a number of different ways, on a range of devices. However, the internet.
Lecture2 Networking. Overview and spam World Wide Web Censorship Freedom of expression Children and inappropriate content Breaking trust on the.
Laws and Rules That Govern Internet Safety Ashley Martin.
School Accounts Presented by: Mrs. Mazzola.
Internet and Pornography Sponsored by Intellectual Freedom Committee Michigan Library Association October 11, 2006 Rachel Bishop, Larry Neal, Cliff Haka,
Computer-Based Technology in the Classroom EDX 1201X National University October 20,2012.
A Parent’s Guide to Child Safety on the Internet.
Internet Safety. Online Concerns: Contact Content Conduct.
A Gift of Fire, 2edChapter 5: Freedom of Speech in Cyberspace1 Anonymity Common Sense and the Internet Early publications by some of our Founding Fathers.
Freedom of Expression.
A Gift of Fire Third edition Sara Baase
Constitutional Issues
Freedom of Speech in Cyberspace
The Issues with Technology in education
A Gift of Fire Third edition Sara Baase
A Gift of Fire Third edition Sara Baase
Presentation transcript:

Censorship on the Internet From Filters to Freedom of Speech Ying Shi

Wendy Herumin Contents Exploring the Internet Concerns on Cyberspace Censorship on the Internet Schools, Free Speech, and the Web

Exploring the Internet Changes: 20 years ago, only few people had access to computer In 2002, more than 605 million prople worldwide were using the Internet. Researchers and scientists were the first to go online, and needed certain amount of training. New services help more members of the general public to use the Internet.

Exploring the Internet (cont.) The World Wide Web links users to millions of different sites at the click of a mouse.

Exploring the Internet (cont.) Regulations on differen media Broadcast vs. Print Media Radio and TV are more closely regulated by government Over-the-air broadcasts reach the public more easily for printed materials, people must be literate and make effort to find them broadcasting industry must work to protect children from inappropriate language and images

Exploring the Internet (cont.) In 1996, the court in philadelphia ruled that the Internet was more like the print media than the broadcast media. The courts have given books, magazines, newspapers, and other print media more freedom from regulation than other form of mass communications Therefore, the Internet enjoys this high level of freedom First Amendment attorney Robet S. Peck wrote: The U.S Supreme Court has concluded that cyberspace receives the highest level of protection that the First Amendment affords. As a result, the same considerations that apply to printed words and images apply as well as the electronic word and the digital images.

Concerns on Cyberspace Concerns for young Internet users Inappropriate content Harmful strangers Invasion of Privacy

Concerns on Cyberspace (cont.) Inappropiate content Pornography Bomb-making instructions Hate Speech Violence toward animals and humans Information about illegal drugs, gambling The sites promote religious cults, witchcraft

Concerns in Cyberspace (cont.) Pornography Difficult to make definition According to NRC, pornography means sexually explicit "materials that is used to create sexual arousal or desire." People use the term to mean both indecency and obscenity it is a subjective term Easy to find Internet search unsolicited e-mail, spam use deceptive links to lead people to porn sites mousetrapping

Conflicts in Cyberspace (cont.) Online Bomb-Making instructions

Concerns on Cyberspace (cont.) Hate Speech exalts one group of people by denigrating another on the basis of race or religion the Council of Europe regard hate speech as a serious offense and outlaw it on the Internet In America, free speech traditions protect offensive speech "Even where the United States government finds the views expressed to be misguided and repugnant-and surely those are appropriate words to describe racism-our Constitution commands that we neither prohibit nor regulate speech merely because we disapprove of the ideas expressed." ---Department of Justice

Concerns on Cyberspace (cont.) Harmful Strangers According to a report from NRC, potentially harmful strangers pose the greatest threat to children online Meeting a sexual predator through a chat room or e-mail is far more dangerous than viewing inappropriate images A study found that one in five young peope aged 10-17 received an unwanted sexual solicitation on the Internet Some of them had been encouraged by people they met on the Internet to run away from home.

Concerns on Cyberspace (cont.) Cyberpredators Use the Internet to disguise themselves and their intentions. Young users may put themselves in danger if they give away too much information or plan to meet people they do not know. The Sexual Predator Punishment Act (1998) The act made it illegal to contact minors online for sexual purposes or to transmit obscenity to them

Concerns on Cyberspace (cont.) Invasion of privacy Children are giving away personal informations about themselves as surfing the Web Young people leave their names and e-mail address in public place like chat rooms In 1998, Federal Trade Commission surveyed 212 comercial children's sites, 188 of the sites were building files of personal informations. Less than 48 sites told visitors to ask for their parents' permission before giving out informations.

Censorship on the Internet How to censorship on the Internet Law enforcement CDA COPA CIPA Technology tools Filters

Censorship on the Internet (cont.) CDA the Communications Decency Act (1996) made it a crime to send inappropriate material over the Internet to a person under 18 the act apply to all forms of Internet communication including e-mail, chat rooms, newsgroups, and WWW a person could be fined, sent to jail, or both while violating force Web site operators make effort to keep minors from finding inappropriate material establish a credit card vertification scheme to screen out minors

Censorship on the Internet (cont.) COPA The Child Online Protection Act (1998) " the son of the CDA" Differed from CDA in 3 improtant ways apply only to material on WWW, not to other services only commercial pornographers were targeted use a more precise legal definition to describe objectionable materials regulate content that is "harmful to minors"

Censorship on the Internet (cont.) CIPA the Children's Internet Protection Act (2000) Require schools and libraries to put technology protection measures on their computer networks. Libraries and schools could lose federal funds unless they kept minors from finding harmful material on the Internet. Adults in public libraries could not use library computers to find inappropriate material.

Censorship on the Internet (cont.) Technology Tools Filters: use one or more technologies to restrict forbidden contents Use lists of Internet address to steer where you go online. "white" lists vs. "black" lists Use keyword blocking. eg. "sex", "satan" label recognition. assign a rating, similar to movies', but not widely used

Censorship on the Internet (cont.) Filters Over-block filters can block legal and useful informations why it happens? Rapidlly changing information on the internet Entire Web site is blocked because of a single page Different opinion may account for some over-blocking Under-block filters cannot block all objectionable material on the Internet Consumer Reports tested leading software filters in 2001, filters allowed 20% of the objectionable sites through in their entirety.

Schools, Free Speech, and the Web Most schools now have Internet access in the U.S. Students can use the Internet to master skills, perform research, and connect with others

Schools, Free Speech, and the Web (cont.) How schools protect students online Accoriding to a survey in 2002, 78% of school relied on teachers to supervise online activities, 90% had installed filtering software on school computer Filters regulate online user in several ways: limit the amont of time block controversial materials keep students from visiting chat rooms or newsgroups avoid giving out sensitive information such as address

Schools, Free Speech, and the Web (cont.) Off-campus Web sites raise questions Students create Web pages at home disturb school administrators criticize teachers, school policies, and classmates contain threatening words Case: a Pennsylvania eighth grader treatened to kill his math teacher in 1998

Schools, Free Speech, and the Web (cont.) A victory for students for free speech

Schools, Free Speech, and the Web (cont.) An Ongoing debate Schools and students continue to debate freedom of speech offline and in cyberspace Filters are controversial in school as in libraries School clamp down on activities when they threaten the stability of the school environment Students challenge rules they believe to be unfair Still discovering how to best use the internet

A Final Note The free speech debate affects young people Filters on school and library computers limit not only pronographic content but much useful and legal information, too. Children can be targets for cyberpredators and marketers. It is necessary to find a solution to protect minor online. Education, public policy, and technology tools all have a role to play. Responsible thinking and acting is a important first step to help young on the Internet

The end Any question?