Cybersex, Porn, and Filtering Information Technology and Social Life April 18, 2005.

Slides:



Advertisements
Similar presentations
The Child Pornography Prevention Act of 1996 (CPPA) The Free Speech Coalition Tramitação processual 1) United States District Court 2) Ninth Circuit 3)
Advertisements

Internet Filtering Requirements: CIPA and PA 212.
Slides prepared by Cyndi Chie and Sarah Frye A Gift of Fire Third edition Sara Baase Chapter 3: Freedom of Speech.
Obscenity Obscenity Defamation Defamation Hate Speech Hate Speech Boundaries of Free Speech.
(c) 2004 West Legal Studies in Business A Division of Thomson Learning 1 First Amendment: Freedom of Expression Are obscenity laws a violation of free.
Ethics in Information Technology, Fourth Edition
Free speech in the United States Technology and the public network of information A fine line between aggression and expression Strengthening the first.
CIPA Update. FOR SCHOOLS – By July 1, 2012, amend your existing Internet safety policy (if you have not already done so) to provide for the education.
© 2007 by West Legal Studies in Business / A Division of Thomson Learning CHAPTER 4 Constitutional Authority to Regulate Business.
Ethics in Information Technology, Second Edition
Access to Electronic Media Acceptable Use Policy August 8, 2011 Meece Middle School.
1 Freedom of Expression Prepared By Joseph Leung.
Pornography and the Internet Amanda Gillespie Donna Jones EDCI 564.
CptS 401, Spring /10/2011 Chapter : Freedom of Speech I See Dilbert cartoons about freedom of speech:
Internet Legal Issues (Management 447) Professor Charles H. Smith Obscenity (Chapter 10) Spring 2006.
Regulating speech How the Net changes attitudes and assumptions, and creates new societal tensions 1 and unintended consequences March 10, 2011Harvard.
A Gift of Fire, 2edChapter 5: Freedom of Speech in Cyberspace1 PowerPoint ® Slides to Accompany A Gift of Fire : Social, Legal, and Ethical Issues for.
1 Children and Families. 2 Children & Families Focus on the Internet Children’s Needs –Education –Entertainment Families’ Needs –Education –Protection.
Workplace Monitoring Store & review messages (keyword search): 46.5% Store & review computer files (keyword search): 36.1% Monitor Internet connections:
CENSORSHIP Jack Homer Frederick Abreu James Carroll Minsoo Kim.
Freedom of Speech in Cyberspace 1. The U.S. Constitution - The 1 st Amendment: The 1 st Amendment Congress shall make no law respecting an establishment.
Chapter 5 Freedom of Expression
Sexting Images What is it? The sending of sexually explicit photos, images, text messages, or s by using a cell phone or other mobile device.
Bethel School District v. Fraser (478 U.S. 675, 1986) Anthony Miller Summer 2011 Oakland University EL 620.
Internet Filtering : Should libraries filter internet content? Paul M. Schoenhard ’00 CS 99, 00W 7 March 2000.
Brandon Hall CSC 540.  The US Government first attempted to filter the Internet in the early 90’s.  This was an attempt to protect minors against the.
BY: ASHLEY ESTEP, ALYSIA GEORGE, AND ASHLEY MOFFETT Internet Safety.
SPEECH & CONTENT REGULATION IN CYBERSPACE: Ashcroft v. ACLU Ashcroft v. Free Speech Coalition American Library Association, Inc. v. US BY ERIC IAN SHANK.
Ethics in Information Technology
Freedom of Speech in Cyberspace
LAW for Business and Personal Use © 2012 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible.
Terri Bassett and Susan Stilwell CT Can Censorship be Reconciled with the Bill of Rights? The Children’s Internet Protection Act: Legal and.
Bootcamp 2009 Porn, Predators, and the Pressure to Police Jennifer Stisa Granick, Civil Liberties Director.
CS 4001Mary Jean Harrold1 Class 24 ŸFreedom of speech in cyberspace ŸAssign ŸAssignment 8—due today ŸTerm paper—due 11/20.
Ch3 Freedom of Speech The US Constitution.
Ethics in Information Technology, Second Edition 1 Computer & Society Week 6 Marwan Al-Namari.
ITIS 1210 Introduction to Web-Based Information Systems Chapter 52 Parental Controls on the Internet.
Complying with CIPA: What Libraries Need to Know Bob Bocher Technology Consultant Wisconsin Department of Public Instruction State Division for Libraries,
Ethics in Information Technology, Second Edition Chapter 5 Freedom of Expression.
What Political Party Are YOU?. Answer Choice SA – Strongly Agree A – Agree D – Disagree SD – Strongly Disagree.
Chapter 18 Obscenity & Pornography. Pornography Protected by First Amendment Unless child pornography-not protected PgP BUSA331 Chapter 182.
Freedom of Speech. 1 st Amendment The essential, core purpose of the 1 st Amendment is self-governance. It enables people to obtain information from.
1 Freedom of Speech In Cyberspace Changing Communications Paradigms Changing Communications Paradigms Offensive Speech and Censorship in Cyberspace AnonymitySpam.
CptS 401 Adam Carter. Quiz Question 7 Obscene speech is protected by the First Amendment. A. True B. False 2.
October 21, 2008 Jennifer Q.; Loriane M., Michelle E., Charles H. Internet Safety.
Issues and Problems Concerning the Internet Copyright ◦ Users pass off as others work and post it as their own work without giving credit to the source.
Rights Of Library Users By Keao White Rationale for this Workshop The purpose of this workshop is to give an in depth presentation covering the rights.
How is Democracy Socially Constructed? Is it Through Conflict We Find Social Reality? Presented by: Chelsea Jonson Spring
Understanding CIPA Renee Hobbs LSC 530 Texts and Tools for Children and Youth.
ICS 424: Freedom of expression Aj. Thoranin Intarajak.
 We assume the head librarians role  Recently updated the library computer systems  New resource for patrons – internet access  Teenager caught viewing.
Slides prepared by Cyndi Chie and Sarah Frye A Gift of Fire Third edition Sara Baase Chapter 3: Freedom of Speech.
Freedom of Speech Computers in the World.
Unless otherwise noted, the content of this course material is licensed under a Creative Commons Attribution 3.0 License.
Constitutional Rights Chp. 2 Civil Rights – Bill of Rights and other amendments to the Constitution have become a shield for the personal, natural rights.
School Accounts Presented by: Mrs. Mazzola.
Internet and Pornography Sponsored by Intellectual Freedom Committee Michigan Library Association October 11, 2006 Rachel Bishop, Larry Neal, Cliff Haka,
By: Katie Rosengrant, Jacquelyn Brode, & Jamie Wheeler.
1 st Amendment /Speech What are some limits on speech? What are some types/examples of speech that can be punished/made illegal?
Haley Jurbala Derek Hegna Ashley Hitchcock Andrew Howard COURT CASES- GROUP 2.
To Filter By Law, But How Much? Sally Hawkes Arkansas State Library.
Freedom of Expression.
Virtual Child Pornography and Freedom of Expression
Boundaries of Free Expression III (Obscenity II and Violence/Cruelty)
A Gift of Fire Third edition Sara Baase
Freedom of Speech in Cyberspace
Chapter 6.1 Regulating the Internet
The First Amendment and the Internet
A Gift of Fire Third edition Sara Baase
Presentation transcript:

Cybersex, Porn, and Filtering Information Technology and Social Life April 18, 2005

Information Technology and Social Life Cybersex Pornographers usually first to exploit new technologies Types of Users 1.Recreational users are those who access online sexual material more out of curiosity or for entertainment purposes and are not typically seen as having any problems associated with their online sexual behavior. 2.At-risk users are those who, if it were not for the availability of the Internet, may never have developed a problem with online sexuality. 3.Sexual compulsive users are those who use the Internet as a forum for their sexual activities because of their propensity for pathological sexual expression.

Information Technology and Social Life Cybersex Types of Relationships 1.Virtual online relationships involve people who never actually meet. They usually engage in sexually explicit text exchanges (i.e., cybersex), and may swap gender roles. Although they may have real-life partners they do not feel they are being unfaithful. The relationship is usually short-lived. 2.Developmental online relationships involve people meeting online but who eventually want the relationship to move from online to offline after becoming emotionally intimate with each other. The shared emotional intimacy and commitment often leads to cybersex and/or a strong desire to communicate constantly with each other on the Internet. The relationship is often long lasting. 3.Maintaining online relationships involve people first meeting offline but then maintaining their relationship online for the majority of the time. This is usually because they are geographically distant. The relationship may or may not be long lasting depending upon the level of emotional intimacy and commitment. With regards to addiction, it is only the first type outlined here that may be addicted to the Internet. The latter two types are more likely to be addicted to the person rather than the activity-particularly as their Internet usage stops almost completely when they meet up offline with their online partner (Griffiths, 2000a).

Information Technology and Social Life Legal Issues The Child Pornography Prevention Act (CPPA) criminalized the creation of what is called “virtual child pornography,” or “morphed” child pornography. Under CPPA images that appear to depict children but do not, including images of youthful-looking adults or images that are computer-generated would be illegal. The Free Speech Coalition filed a lawsuit to overturn these provisions of the CPPA on the grounds that the restrictions violated the First Amendment. The U.S. Supreme Court agreed with the Free Speech Coalition, and in a decision handed down on April 16, 2002, found these parts of the CPPA unconstitutional on two grounds: –First, the law, as written, is overbroad, prohibiting otherwise legal, non-obscene images depicting teenagers engaging in sexual activity, such as filmed depictions of Romeo and Juliet or Lolita. –Second, the prohibition on child pornography is based on the link between the creation of the image and the sexual abuse of the children shown in the image. If an image is created by use of computer technology or by photographing adults pretending to be children, there is no basis in the law to ban the image. The Child Pornography Prevention Act affected only those who create films and images. It did not affect libraries. The Freedom to Read Foundation, however, joined an amicus curae (friend of the court) brief in support of certain First Amendment arguments.

Information Technology and Social Life Legal Issues The Child Online Protection Act (COPA) replaced the Communications Decency Act. (The Communications Decency Act was held unconstitutional in a 9–0 decision by the Supreme Court in 1997.) COPA prohibits the transmission of any material over the Internet deemed “harmful to minors,” if the communication was made for a commercial purpose. The ACLU challenged COPA on behalf of a group of plaintiffs who provided commercial content for the Internet or who received such content. The trial court found the law unconstitutional on First Amendment grounds. The Third Circuit Court of Appeals agreed that the law was unconstitutional, but said it was unconstitutional because of its reliance on “contemporary community standards.” This made the law overbroad. The U.S. Supreme Court reversed the Third Circuit’s decision on May 13, 2002, on very narrow grounds. The Supreme Court did not decide on the constitutionality of COPA, finding only that COPA’s reliance on “community standards” does not by itself make the law unconstitutional. As a result, the Supreme Court returned the matter to the Third Circuit Court of Appeals for a fuller consideration of the First Amendment issues. Because COPA addresses only material sent over the Internet for commercial purposes, it does not directly affect libraries. FTRF joined an amicus curae brief in support of the parties’ First Amendment argument.

Information Technology and Social Life Legal Issues The Children’s Internet Protection Act (CIPA) requires libraries and schools to install filters on their Internet computers to retain federal funding and discounts for computers and computer access. Because this law directly affected libraries and their ability to make legal information freely available to their patrons, the American Library Association and the Freedom to Read Foundation filed a lawsuit to overturn CIPA, but the Supreme Court on June 23, 2003, in a 6–3 decision, upheld the constitutionality of the Children’s Internet Protection Act (CIPA). “Opponents of filtering software contend that filters block and discourage legitimate Internet use, like research on such topics as sexually transmitted diseases”. I.e some filters blocked access to the 30th Super Bowl because, like all Super Bowls, it was designated with Roman numerals: Super Bowl XXX.