Presentation is loading. Please wait.

Presentation is loading. Please wait.

Computers in Communication and Constitutional Issues Week 4.

Similar presentations


Presentation on theme: "Computers in Communication and Constitutional Issues Week 4."— Presentation transcript:

1 Computers in Communication and Constitutional Issues Week 4

2 History of Communications uOral - Speech in person uWritten - scribes, drawing, …. u To today’s printing and publishing uPhotography uRadio uFilm uTelevision

3 Written Communications uTablets to pen & paper uDrawings to graphics uNewspapers and Books to Books and Newspapers on line uMagazines to E-zines uTypewriter to Word Processors uPrinting Press uCopy machines to Scanners

4 Telecommunications uTwo - way Radio uMorse Code >Telegraph - giant electro magnet uFax uTelephone u Local and Main telephone exchanges u Mobile phone u Satellite

5 History Continued uRecording Mechanisms u Gramophone - stylus u Tape - magnetism u CD - digital using lasers uMicrowaves uFiber optics uISDN- voice, data, and image signal uWAN’s and LAN’s

6 Telecommunications uRadio u One way and Two way uTelevision u interactive TV u Closed-circuit TV

7 Telecommunications uRadio waves uMicrowave link uOptical fiber link uCable TV uElectric land cable

8 Communications uExpands to computers u Networks u Internet u Video conferencing

9 Communication Technologies uPrint Media - newspapers, magazines, pamphlets uBroadcast - television, radio uCommon Carriers - telephone, telegraph, postal system

10 How are computers used? uPrint Media u Word processing u Printing presses

11 How are Computers used? uBroadcast u Satellites

12 How are computers used? uCommon Carriers

13 Constitutional Issues uFirst Amendment - Congress shall make no law….abridging the freedom of speech, or the press…. uFourth Amendment- search and seizure uHow will these amendments affect and be affected by computer systems and telecommunications systems?

14 Print Medium uStrongest First Amendment protection uFewer government constraints

15 Broadcast uHighly regulated u licenses u standards of merit u banned advertisements u due to earlier monopoly on market and early radio broadcasters

16 Common Carriers uUniversal access uNo control on content uNo responsibility uVarious organizations are fighting control versus freedom issue

17 The Internet uSimilar to many types of communication uInternet lets us all be publishers. u All you need is a computer and network access uInternet is a many to many medium u versus one to one of telephone u One to many of radio

18 First Amendment uWritten for offensive and/or controversial speech and ideas uRestriction on the power of government, not individuals or private business

19 Offensive Speech in Cyberspace uShould it be censored? uChild pornography and libel are illegal anywhere uProliferates more easily on Internet uAnonymity of the Internet doesn’t help

20 Communications Decency Act of 1996 uInitiated to aide in censorship of Internet uAvoids conflict of first amendment by targeting communications with children uFines, Jail terms uRuled UNCONSTITUTIONAL by the Supreme Court in 1997

21 Libel uA person can be sued for damages for saying something in print that is false damaging reputations u “Absence of Malice” exclusion uResponsibility falls on the person making the statement u AND the “provider” uLibraries and bookstores are not responsible because of volume

22 Pornography and Censorship uDoes exist on Internet uBut nothing not found other places uMost is on “Pay-for-use” areas but many free areas u proof of age???

23 Guidelines for Illegal material on Internet uBased on court case Miller vs California uIt depicts sexual acts that are specifically prohibited by state law uDepicts these acts in offensive manner - using community standards uHas no serious literary, artistic, social, political, or scientific value

24 Problems with this uWhat is a community on the Internet? uWhat state does it affect? uWhat about distribution? uWho is responsible? uWho decides value?

25 BBS - Bulletin Board Systems uCalifornia Case - BBS operators ruled guilty of images downloaded in Tennessee. uNothing can be put on Net that is more racy than would be tolerated in the most conservative community in US

26 Liability of Service Providers uLegal sanctions against service providers are more effective than trying to catch “bad” people u Service Providers are visible uProviders will have to police their sites u Monitor every message and file

27 Effects of Policing by Providers uDegrades services uGross invasion of privacy uAlmost impossible due to large volume uEnforce strictest standards uDestroys “many to many”

28 Internet Monitoring uAccess to children u Fines for access allowed by those under 18 that is obscene or indecent u Anonymity makes it easier to prey u Easier for Law Officers to be youngsters uHow do you censor for children and not adults

29 Methods u“Locks” to keep children out uDistribute tips on how to control info uSome will report illegal activity to FBI uExpels “bad” subscribers uAutomatic screening of “words” uBlock access to inappropriate sites by software products uVoluntary rating systems

30 Is Net Censorship Effective? uThe Net is global u Cannot control sites out of U.S. uWith more censorship in U.S. u More services will go elsewhere

31 Bomb Making Information uIs it there? uIs it valid? uWho sees it? uWHO really uses it?

32 Sexist, Racist, and Harassing Speech on-line uDiscrimination and harassment is widespread uSpeech on Computer systems in being treated differently uCampus Speech codes uPolitical correctness of messages

33 Different Rules for Internet uShould there be full freedom of speech? uAre more people likely to build bombs? uIs “junk” more likely than in library? uIf child knows how to surf - can he avoid stops? uWhat is the parent’s Responsibility? uSUPREME COURT RULING

34 Anonymity and Pseudonymity uFederalists Papers - 1787 - u a set of 85 letters arguing for adoption of new Constitution u To limit power of Government u Used pseudonym uEasy - remailers, encryption

35 Remailer uPseudonym for the sender uA record is maintained linking the sender to the pseudonym uA fully anonymous remailer removes and destroys the sender’s return address - can’t get replies

36 Good and Bad Uses uAnonymity provides protection u retaliation u embarrassment uVictims of violence or rape can talk freely uSupports whistle blowers uANY BAD??

37 Issues uShould anonymity be discouraged? uShould it be prohibited by policy? uBanned because of potential for illegal use?

38 First Amendment and Cryptography uGovernment controls export u restricts publication u software is speech and should not be on Net u Issue of national security u Supreme Court again

39 Hacker Magazines uThey are not “press” - do they have freedom of the press? uWill electronic publishers receive the same protections as print publishers? uHow does this affect flow of info?

40 Fourth Amendment uSearch and seizure of computers u Businesses could fail u contains sensitive info of others uCould you “Plead the Fifth” - and not divulge your encryption key?


Download ppt "Computers in Communication and Constitutional Issues Week 4."

Similar presentations


Ads by Google