1 Internet – The Good, the Bad, and the Ugly Module 4 Section 3.

Slides:



Advertisements
Similar presentations
1.8 Malpractice and Crime In this section you must be able to: Explain the consequences of malpractice and crime on information systems. Describe the possible.
Advertisements

IGE105 – Communication Technology in a Changing World Dr. Ken Cosh Week 10.
CYBERSAFETY Acting Sergeant Kate Brown Christchurch Police Youth Education.
Unit 11 Communication & Collaboration.  Identify different communication methods  Identify advantages of electronic communication  Identify common.
Computers in Communication and Constitutional Issues Week 4.
Anonymity and SPAM The Good, the Bad and the Ugly!
Internet and Laws University of Palestine University of Palestine Eng. Wisam Zaqoot Eng. Wisam Zaqoot Feb 2010 Feb 2010 ITSS 4201 Internet Insurance and.
1 Freedom of Expression Prepared By Joseph Leung.
CYBERSAFE – PARENTING ONLINE. CYBERBULLYING DEFINITION: intended, deliberate, repeated, virtual hostile behaviour with the usage of ICT FORMS: Denigration.
A Gift of Fire, 2edChapter 5: Freedom of Speech in Cyberspace1 PowerPoint ® Slides to Accompany A Gift of Fire : Social, Legal, and Ethical Issues for.
Workplace Monitoring Store & review messages (keyword search): 46.5% Store & review computer files (keyword search): 36.1% Monitor Internet connections:
Behind the Machine “The Good, The Bad, and the Ugly” Copyright © 2008 by Helene G. Kershner.
Freedom of Speech in Cyberspace 1. The U.S. Constitution - The 1 st Amendment: The 1 st Amendment Congress shall make no law respecting an establishment.
A Freshman Seminar Workshop Developed by Computer and Telecommunication Services A Freshman Seminar Workshop Developed by Computer and Telecommunication.
Youth and the Internet Info for Parents. Internet: Strengths and Weaknesses Internet is the free exchange of ideas Little to no regulation on information.
Chapter 5 Freedom of Expression
Internet Safety By: Caitlyn Stevenson. Information about Internet Safety  The internet is a huge deal, any child that can press a few letters on a keyboard.
Cyber Crime & Security Raghunath M D BSNL Mobile Services,
Freedom of Speech in Cyberspace
By: Mahendranath Busgopaul Halley Movement & Internet Child Safety Foundation.
CS 4001Mary Jean Harrold1 Class 24 ŸFreedom of speech in cyberspace ŸAssign ŸAssignment 8—due today ŸTerm paper—due 11/20.
Electronic Safety Keeping yourself safe on the internet and cell phone Intended for Grades 4-5.
“It is like, totally anonymous, so no one worries about getting in trouble. Lots of kids would never do this stuff in the ‘real world.’” —13 year old boy.
Chantz Martin.  Put computer in a common place in the house  Use Internet filters and blocks  Talk to children about the dangers of the Internet.
Ch3 Freedom of Speech The US Constitution.
Ethics in Information Technology, Second Edition Chapter 5 Freedom of Expression.
CSE/ISE 312 Freedom of Speech (Part 2) “Anonymity is a shield from the tyranny of the majority” - US Supreme Court.
Computer and Internet privacy (2) University of Palestine University of Palestine Eng. Wisam Zaqoot Eng. Wisam Zaqoot Feb 2011 Feb 2011 ITSS 4201 Internet.
Dear Senator Jim Webb, or DC: FAX: Form: ttp://warner.senate.gov/public/index.cfm?FuseAction=Contact.ContactFormttp://warner.senate.gov/public/index.cfm?FuseAction=Contact.ContactForm.
1 Freedom of Speech In Cyberspace Changing Communications Paradigms Changing Communications Paradigms Offensive Speech and Censorship in Cyberspace AnonymitySpam.
Educational Computing David Goldschmidt, Ph.D. Computer Science The College of Saint Rose CIS 204 Spring 2009.
Issues and Problems Concerning the Internet Copyright ◦ Users pass off as others work and post it as their own work without giving credit to the source.
CyberEthics Morality and Law in Cyberspace Chapter 3: Free Speech and Content Control in Cyberspace By Jennifer, Linda, Paul, Paula, and Stephne.
ARE YOUR POLICIES GETTING IN THE WAY OF YOUR PROGRESS? Scott McLeod, J.D., Ph.D.
ICS 424: Freedom of expression Aj. Thoranin Intarajak.
 We assume the head librarians role  Recently updated the library computer systems  New resource for patrons – internet access  Teenager caught viewing.
Slides prepared by Cyndi Chie and Sarah Frye A Gift of Fire Third edition Sara Baase Chapter 3: Freedom of Speech.
Internet Censorship Flora Wan Computer Science 99 Winter 2000.
Online Privacy By Steve C. (H2) Ms. Valley’s Library Media Class.
Internet Safety Wendy Varner. Internet Safety –The goal is to educate students on how to avoid dangerous, inappropriate, or unlawful online behavior.
ARE YOUR POLICIES GETTING IN THE WAY OF YOUR PROGRESS? Scott McLeod, J.D., Ph.D.
Socializing Online b Can help kids connect with friends and family b But you might share too much information b Or you might hurt someone’s feelings b.
Dear Senator John Warner, or DC: FAX: Form: ttp://warner.senate.gov/public/index.cfm?FuseAction=Contact.ContactFormttp://warner.senate.gov/public/index.cfm?FuseAction=Contact.ContactForm.
Chapter 14 How Universal is access to Computers and the Web.
Slides prepared by Cyndi Chie and Sarah Frye A Gift of Fire Third edition Sara Baase Chapter 3: Freedom of Speech.
Laws and Rules That Govern Internet Safety Ashley Martin.
School Accounts Presented by: Mrs. Mazzola.
Keeping Kids Safe on the Internet Jennifer VanDoren & Sarah Boughner Wilkes – Emerging Technology October 2009.
Internet Safety Sam Farnsworth Utah PTA Technology Specialist
E-Safety Parent Talk Helping to keep your children safe online.
They Need You - to encourage them to make good choices. - to teach them about how to stay safe. - to help them to recognise scams. - to encourage good.
Identity Theft: Protect Yourself Ronald J. Leach.
COM Chapter Thirteen: Regulation of Cable, Internet, Telephone, and Other Electronic Media COM 451 Communication and Law.
Dear Senator ___________________________, Subject: Please Immediately Enact the following Law to Protect Children! CLEANFEED began 2004.
A Gift of Fire, 2edChapter 5: Freedom of Speech in Cyberspace1 Anonymity Common Sense and the Internet Early publications by some of our Founding Fathers.
Privacy and the Law.
A Freshman Seminar Workshop
Freedom of Expression.
Unit 11 Communication & Collaboration
Social, Legal, and Ethical Issues for Computing Technology
Computers in Communication and Constitutional Issues
In order of appearance:
A Gift of Fire Third edition Sara Baase
Internet Acceptable Use Policy:
Constitutional Issues
– Communication Technology in a Changing World
Freedom of Speech in Cyberspace
Behind the Machine “The Good, The Bad, and the Ugly”
A Gift of Fire Third edition Sara Baase
Presentation transcript:

1 Internet – The Good, the Bad, and the Ugly Module 4 Section 3

2 The Bad and the Ugly Existence of lots of “bad” stuff! Bomb making information –Is it there? –Is it valid? –Who sees it? –WHO really uses it?

3 Pornography Does exist on Internet But nothing not found other places Most contained in “Pay-for-use” areas –Requiring proof of age

4 Hackers Magizines They are not “press” - do they have freedom of the press? Will electronic publishers receive the same protections as print publishers? How does this affect flow of info?

5 Sexist, Racist, and Harassing Speech on-line Discrimination and harassment is widespread Speech on computer systems in being treated differently Campus speech codes Political correctness of messages

6 Anonymity The good AND the bad: –Allows criminals to hide –Allows Law Officers to hide –Provides protection for retaliation and embarrassment for individuals

7 Issues Concerning Anonymity Should anonymity be discouraged? Should it be prohibited by policy? Banned because of potential for illegal use?

8 Methods of Censorship “Locks” to keep children out Distribute tips on how to control info Some will report illegal activity to FBI Expels “bad” subscribers Automatic screening of “words” Block access to inappropriate sites by software products Voluntary rating systems

9 Is the Good Effective? The Net is global –Cannot control sites out of U.S. With more censorship in U.S. –More services will go elsewhere

10 Different Rules for Internet Should there be full freedom of speech? Are more people likely to build bombs? Is “junk” more likely than in library? If child knows how to surf – can he avoid stops? What is the parent’s Responsibility?

11 Pseudonymity Dates back to the Federalists Papers –1787 – Set of 85 letters arguing for adoption of a new Constitution –To limit power of Government –Used pseudonym Today – r ers, encryption

12 R er Pseudonym for the sender A record is maintained linking the sender to the pseudonym A fully anonymous r er removes and destroys the sender’s return address – can’t get replies