Methods of Internet Regulation. Areas of Concern National Security –Bomb-making, drugs, terrorism Protection of Minors –Violence, pornography Protection.

Slides:



Advertisements
Similar presentations
Copyright 2003 McGraw-Hill Australia Pty Ltd PPTs t/a Internet Marketing Intelligence by Edward Forrest 12-1 Internet Marketing Intelligence Chapter 12.
Advertisements

Rockingham County Public Schools Technology Acceptable Use Policy
Soft Law in China’s regulation of the Internet Professor of law Research Center for Cyber-law Beijing University of Posts & Telecommunications Deliang.
ICS 417: The ethics of ICT 4.2 The Ethics of Information and Communication Technologies (ICT) in Business by Simon Rogerson IMIS Journal May 1998.
Standards of Ethical Conduct for Government Employees BCT Student Handout (Extract of BCT SC1 TSP NO. 1) To be ethical means to be honorable; to practice.
Computers and Law - Srishti Mehra – Team 2. What is Computer Law? Cross over of a number of legal areas affecting: Design and use of computers and software.
MIS PERSONAL, LEGAL, ETHICAL, AND ORGANIZATIONAL ISSUES OF INFORMATION SYSTEMS CHAPTER 4 Hossein BIDGOLI Phishing that bites Paying for Privacy Pirates.
Introduction to Computer Ethics
1 McGraw-Hill/Irwin Copyright © 2004, The McGraw-Hill Companies, Inc. All rights reserved. Ethical Challenges Ethics Principles of right and wrong that.
1 Legal and Ethical Considerations Matakuliah: G0462 English for Broadcasting Tahun: 2005/2006 Legal Restraints Ethical Concerns.
Freedom of Speech in Cyberspace 1. The U.S. Constitution - The 1 st Amendment: The 1 st Amendment Congress shall make no law respecting an establishment.
Jana Dixon Dawson Educational Cooperative
E-Commerce: Regulatory, Ethical, and Social Environments
FREEDOM OF EXPRESSION Salanieta Tamanikaiwaimaro (Sala T) - FIJI Controversy Conflict Who determines the balance??? Ethics.
MIS PERSONAL, LEGAL, ETHICAL, AND ORGANIZATIONAL ISSUES OF INFORMATION SYSTEMS CHAPTER 4 LO1 Describe information technologies that could be used in computer.
Intellectual Freedom ABLE: Administering Better Libraries—Educate Module 5.
The Social Context of Computing Foundation Computing Never underestimate the power of human stupidity.
Cisco Confidential © 2011 Cisco and/or its affiliates. All rights reserved. 1 Cloud Computing and Intermediary Liability Issues Global Policy and Government.
Chapter 17.3 Regulating the Internet. Internet Speech ► Free speech is a key democratic right. The Internet promotes free speech by giving all users a.
Luxembourg 12 September Public consultation 12 September 2003 Horst Forster Director, INFSO/E European Commission Safer Internet plus
How Can We Help Our Students to Use the Internet in a Safer Way?
ISNE101 Dr. Ken Cosh. Review  Dependability  Reliability  How do we improve it?  Security  Threats & Countering the Threats.
Freedom of Expression. 2 Overview n Definition n Restrictions n Enforcement n Intellectual Property.
CS 4001Mary Jean Harrold1 Class 24 ŸFreedom of speech in cyberspace ŸAssign ŸAssignment 8—due today ŸTerm paper—due 11/20.
Ch3 Freedom of Speech The US Constitution.
CENSORSHIP A presentation by: Adria Steuer Mridula Nadamuni Andrew Minton Jule Carr & Alex McHugh.
UDMIS.info Ethics and IS. UDMIS.info The Ethics of IS Ethics and Privacy Ethical Issues Law & Order.
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
1 Book Cover Here PART D THE INFLUENCE AND IMPACT OF TECHNOLOGY Criminal Investigation: A Method for Reconstructing the Past, 7 th Edition Copyright ©
Computer Ethics A Necessity for the new era. Why is Computer Ethics Important? The creation and existence of new questions that older laws cannot answer.
Technology Lab Rules, Procedures, Acceptable Use Policy Review Kindergarten-Second Grade This PowerPoint is meant to be used as a quick review! Students.
Computer Security 2 Keeping your computer safe. Computer Security 2 Computer Security 2 includes two lessons:  Lesson 3: Protecting yourself and your.
Monitoring Employees on Networks: Unethical or Good Business?
Ethics, Computing, and the Internet
Ideology & the Scope of Government
1 Ethical Issues in Computer Science CSCI 328, Fall 2013 Session 15 Privacy as a Value.
COPYRIGHT © 2011 South-Western/Cengage Learning. 1 Click your mouse anywhere on the screen to advance the text in each slide. After the starburst appears,
SURVEILLANCE The Fears of the Digital Age. Privacy –Identity –Anonymity Logging –Tracking Hacking Censorship State Security/Anti Terror Online The Discussion.
Freedom of Speech First Amendment Expression, Speech and Symbolic Speech.
October 21, 2008 Jennifer Q.; Loriane M., Michelle E., Charles H. Internet Safety.
Computer Ethics Chapter 14 – Computers: Understanding Technology.
CyberEthics Morality and Law in Cyberspace Chapter 3: Free Speech and Content Control in Cyberspace By Jennifer, Linda, Paul, Paula, and Stephne.
Copyright © 2004 Pearson Education, Inc. Slide 9-1 Chapter 9 Ethical, Social, and Political Issues in E-commerce.
ARE YOUR POLICIES GETTING IN THE WAY OF YOUR PROGRESS? Scott McLeod, J.D., Ph.D.
Freedom of Speech Computers in the World.
ARE YOUR POLICIES GETTING IN THE WAY OF YOUR PROGRESS? Scott McLeod, J.D., Ph.D.
Internet Research Law and Ethics. Consider the Law Legal and ethical issues help us broaden considerably our study of Internet research. Even relatively.
Its Legal, Ethical & Global Environment 6 th Ed. Its Legal, Ethical & Global Environment 6 th Ed. B U S I N E S S MARIANNE M. JENNINGS Copyright ©2003.
Intellectual Property. Confidential Information Duty not to disclose confidential information about a business that would cause harm to the business or.
1 Internet – The Good, the Bad, and the Ugly Module 4 Section 3.
Ministry of Education & Religious Affairs, Culture & Civilisation Greek School Network nternet-safety.sch.gr.
The 1 st Amendment U.S. Government Ms. Kemp. 1 st Amendment Rights Press Press Religion Religion Petition Petition Assembly Assembly Speech Speech.
LIBS100 March 23, 2005 First Amendment Library Bill of Rights.
Copyright  2004 McGraw-Hill Australia Pty Ltd PPTs t/a Consumer Behaviour 4e by Neal, Quester, Hawkins 18–1 Chapter 18Consumers and Society Role of consumerism.
Internet Safety. Online Concerns: Contact Content Conduct.
1 Belfast, Horst Forster European Commission Belfast,
Using the computer appropriately
Ogletree, Deakins, Nash, Smoak & Stewart PC
Presented by Ika Novita Dewi, MCS
Pornography, Defamation and Discrimination
Internet Research Law and Ethics.
Dos of Technology Use Follow the directions of the adult in charge.
E-Commerce: Regulatory, Ethical, and Social Environments
The First amendment Speech Press Religion Petition Assembly.
Chapter 13 Security and Ethical Challenges.
Internet Acceptable Use Policy:
Constitutional Issues
Freedom of Speech in Cyberspace
Presentation transcript:

Methods of Internet Regulation

Areas of Concern National Security –Bomb-making, drugs, terrorism Protection of Minors –Violence, pornography Protection of Human Dignity –Racism, discrimination Economic Security –Fraud

Areas of Concern continued Information Security –Hacking, cracking Protection of Privacy –Electronic harassment Protection of Reputation –Libel, comparative advertising Intellectual Property –copyright

Censorship New technologies challenge existing patterns of control Who can claim to be the censor of an international medium Censorship does not promote the principle of regulated pluralism

Negative Regulation Existing laws don’t always seem to work very well Threat to free speech

Self-Regulation End-users take charge Interest group set up a hotline or webpage ISP having codes of conduct Set up supervisory bodies These approaches have met with mixed success in other venues –press

Filtering Systems Installing a “private gateway” to data on one’s own computer Recreational Software Advisory Council –RSAC –Integrated into Microsoft Explorer Rating system organizations are usually NOT independent

Filtering Systems continued Depends on “ratings” or labels –But who does the rating? Filters are too easy to hack Filters are notoriously inaccurate Adults are held hostage to standards set for children

Forward Looking Threat of censorship may undermine trust people have in the state Acts of censorship reveal the inappropriateness of the “public good” argument as a touchstone for the legitimacy of control Need to distribute power rather than concentrate it is small areas

More Forward Looking Policies should not curtail the use of the Internet for public debate Need to distinguish between material that people seek out versus material they are exposed to involuntarily Use the Internet to focus on pornographers rather then to ban pornography Nations need to cooperate