Expression on the Net Is it possible to control what is seen and by whom on the network? Like a book? Newpapers? Phone call? Television? Where to regulate:

Slides:



Advertisements
Similar presentations
Freedom of Expression Prepared By Najib sani & Muhammad Tajuddeen M.
Advertisements

Cyber Bullying Everything you need to know. How is it different from normal bullying? By using technology like mobiles or the internet, this type of bullying.
Slides prepared by Cyndi Chie and Sarah Frye A Gift of Fire Third edition Sara Baase Chapter 3: Freedom of Speech.
Obscenity Obscenity Defamation Defamation Hate Speech Hate Speech Boundaries of Free Speech.
Freedom of Speech Chapter 37.
Ethics in Information Technology, Fourth Edition
Free speech in the United States Technology and the public network of information A fine line between aggression and expression Strengthening the first.
Cyber Bullying i-SAFE survey of 150,000 high school students 57% said hurtful or angry things to another person, had someone say hurtful or angry.
Freedom of Speech. Purpose for Freedom of Speech: To guarantee to each person a right of Free expression, in the Spoken and the Written word, and by all.
Ethics in Information Technology, Second Edition
1 Freedom of Expression Prepared By Joseph Leung.
CptS 401, Spring /10/2011 Chapter : Freedom of Speech I See Dilbert cartoons about freedom of speech:
8 - Free Speech Harvard CSCI E-2a November 17, 2008 Harvard CSCI E-2a November 17, 2008.
Group Community: A World Without Borders Kimberly Carter David Dobin Tim Hammond Chris Rushing.
Regulating speech How the Net changes attitudes and assumptions, and creates new societal tensions 1 and unintended consequences March 10, 2011Harvard.
A Gift of Fire, 2edChapter 5: Freedom of Speech in Cyberspace1 PowerPoint ® Slides to Accompany A Gift of Fire : Social, Legal, and Ethical Issues for.
Forced Internet Filtering Thomas Mahoney. Internet Filtering ► Techniques  Technical blocking  Search result removal  Take-Down  Self-Censorship ►
CENSORSHIP Jack Homer Frederick Abreu James Carroll Minsoo Kim.
Freedom of Speech in Cyberspace 1. The U.S. Constitution - The 1 st Amendment: The 1 st Amendment Congress shall make no law respecting an establishment.
Slides prepared by Cyndi Chie and Sarah Frye (and Liam Keliher) A Gift of Fire Third edition Sara Baase Chapter 3: Freedom of Speech.
Internet Censorship Controversy Internet censorship, When does it go to far?
Chapter 5 Freedom of Expression
Internet Filtering : Should libraries filter internet content? Paul M. Schoenhard ’00 CS 99, 00W 7 March 2000.
Brandon Hall CSC 540.  The US Government first attempted to filter the Internet in the early 90’s.  This was an attempt to protect minors against the.
BY: ASHLEY ESTEP, ALYSIA GEORGE, AND ASHLEY MOFFETT Internet Safety.
Ethics in Information Technology
Freedom of Speech in Cyberspace
Censorship Thomas Morrissy and Sam Joiner. Individual rights as determined by the government o Adults should be able to read see and hear what they.
A Gift of Fire Third edition Sara Baase
Anti- bullying week Year 4.
Freedom of Speech. acts/funddocs/billeng.htm Amendment I “Congress shall make no law respecting an establishment.
CS 4001Mary Jean Harrold1 Class 24 ŸFreedom of speech in cyberspace ŸAssign ŸAssignment 8—due today ŸTerm paper—due 11/20.
Chantz Martin.  Put computer in a common place in the house  Use Internet filters and blocks  Talk to children about the dangers of the Internet.
Ch3 Freedom of Speech The US Constitution.
Ethics in Information Technology, Second Edition 1 Computer & Society Week 6 Marwan Al-Namari.
ITIS 1210 Introduction to Web-Based Information Systems Chapter 52 Parental Controls on the Internet.
Ethics in Information Technology, Second Edition Chapter 5 Freedom of Expression.
Lesson 4: Taking Perspectives on Cyberbullying THE CYBER BULLYING VIRUS
The Internet, Freedom of Speech, and the CDA Mike Holmes CS 99 February 29, 2000.
Chapter 3: 1st Amendment.
Chapter 18 Obscenity & Pornography. Pornography Protected by First Amendment Unless child pornography-not protected PgP BUSA331 Chapter 182.
Technology can help us: Communicate with others Gather information Share ideas Be entertained Technology has improved our quality of life!
Freedom of Speech First Amendment Expression, Speech and Symbolic Speech.
1 Freedom of Speech In Cyberspace Changing Communications Paradigms Changing Communications Paradigms Offensive Speech and Censorship in Cyberspace AnonymitySpam.
CptS 401 Adam Carter. Quiz Question 7 Obscene speech is protected by the First Amendment. A. True B. False 2.
October 21, 2008 Jennifer Q.; Loriane M., Michelle E., Charles H. Internet Safety.
How is Democracy Socially Constructed? Is it Through Conflict We Find Social Reality? Presented by: Chelsea Jonson Spring
ICS 424: Freedom of expression Aj. Thoranin Intarajak.
Slides prepared by Cyndi Chie and Sarah Frye A Gift of Fire Third edition Sara Baase Chapter 3: Freedom of Speech.
Freedom of Speech Computers in the World.
Unless otherwise noted, the content of this course material is licensed under a Creative Commons Attribution 3.0 License.
Activity 2 Sharing Images – The Law. Sexting
1 Ethical Issues in Computer Science CSCI 328, Fall 2013 Session 30 Security, Knowledge and Freedom of Expression.
Slides prepared by Cyndi Chie and Sarah Frye A Gift of Fire Third edition Sara Baase Chapter 3: Freedom of Speech.
1 st ten amendments basic freedoms protect citizens from a overly-powerful central gov’t.
By: Katie Rosengrant, Jacquelyn Brode, & Jamie Wheeler.
Anna Buchanan & Alix Gilmore. 6:43.
A Gift of Fire, 2edChapter 5: Freedom of Speech in Cyberspace1 Anonymity Common Sense and the Internet Early publications by some of our Founding Fathers.
Freedom of Expression.
Bill of Rights- First Amendment Notes
In order of appearance:
Freedom of Speech … refers to the ability of a person to publicly speak or publish any thought without legal constraints or repercussions. In this section:
Expression on the Net Is it possible to control what is seen and by whom on the network? Like a book? Newpapers? Phone call? Television? Where to regulate:
Expression on the Net Is it possible to control what is seen and by whom on the network? Like a book? Newpapers? Phone call? Television? Where to regulate:
Expression on the Net Is it possible to control what is seen and by whom on the network? Like a book? Newpapers? Phone call? Television? Where to regulate:
A Gift of Fire Third edition Sara Baase
Freedom of Speech in Cyberspace
Chapter 6.1 Regulating the Internet
A Gift of Fire Third edition Sara Baase
A Gift of Fire Third edition Sara Baase
Presentation transcript:

Expression on the Net Is it possible to control what is seen and by whom on the network? Like a book? Newpapers? Phone call? Television? Where to regulate: source->ISP->cloud->ISP->desitination Publisher or Distributor? Product manufacturer or trucker? If content is managed/filtered then acting as a publisher (see Oakmont v. Prodigy). Resulted in ISP’s not trying to filter content. Miller test - Community standard with the “average person” test – but where is the community? Bits can go everywhere. (Dirmeyer of Tenn. v. Thomas of CA and the “Nastiest Place on Earth”) In this instance bits were like books ITEC 102

Communications Decency Act CDA passed in 1996 in response to cyberporn access Crime to use “any interactive computer service to display in a manner available to a person under 18 years of age …” Display provisions ruled unconstitutional Legally put the control at the point of exit from the cloud Result was a “Good Samaritan” clause added to CDA allowing ISP filtering attempts Zeran case – poor taste T-shirts and no recourse due to anonymous postings. In this case ISP was a knowing distributor ITEC 102

Who is being harmed? Child Online Protection Act (COPA) 1998 passed but never took effect due to likely unconstitutional – restricted access to under 17 Cannot reliably tell if communication link is with human, computer, minor, etc. COPA’s reach ended at U.S. boarders – how to deal with bits from abroad? Speech illegal when incites “imminent lawless action” – rarely met by printed words. Internet bullying problems have resulted in many state anti-bullying laws and proposed federal laws. Hard to specifically define “annoying” – used in 2006 Violence against Women Act – on books gov. but does not pursue current Deleting online predators act (DOPA) and its variations stuck in congress Technological changes happen faster than legal changes ITEC 102