SlideShare a Scribd company logo
1 of 6
Censorship andregulationof the Internet
What’s the difference?
Often we get censorship and regulation confused…
Regulation:
This is an official rule, law or order which states whether something may or may not
be done and if so, how something must be done. This rule must be established by a
governing force of law and is closely controlled and monitored. Media must pass
regulation boundaries set by governments before it is published.
Censorship:
This is where media is published and is assessed afterwards. This can come in the form
of the suppression of broadcast material including plays, films, books, newspapers,
letters etc. Often censorship is put in place if there are any complaints regarding
published media.
UK Internetcensorship andregulation
Ethics, the sheer size of the internet and the fact that it is a globally distributed
network makes regulating it extremely difficult, however means are put in place to try
to control what is published on the world wide web. The government has put laws in
place to try to regulate the internet’s content, these laws include:
English Defamation Law
This law writes that any published statements which directly accuse individuals of
defaming claims can be taken to court. A defamatory statement is presumed to be
false, unless the defendant can prove its truth.
Copyright Law of the UK
This law monitors the ownership of media products and the accessibility of these
products regarding tangible property rights. In summary, personal work is legally
owned by the producer and can only be distributed by others with their official
permission.
Additionally, the internet is regulated against incitement to terrorism and child
pornography. In 2014, Teresa May proposed the introduction of Extremism Disruption
Orders which would allow judges to ban those who promote extremist messages from
social media and broadcasting.
Prosof internetcensorship?
• Society Should Set Limits – the total freedom of speech on the internet would only
resort to cyber bullying and racist commentary.
• Parents Can Not Always Be There To Monitor Children – internet censorship would
give parents the peace of mind to leave their children alone whilst on the internet.
• Censorship Would Control Illegal Activities - if the promotion of illegal activities
were not so readily available then cases of these happenings would decline, less
would be influenced.
• Helps Strengthen National Security – laws against hacking and imposing hefty
punishments towards violators means that the safety of secret intelligence can be
protected.
• Lessens Identity Theft – internet censorship in the form of anti-phishing software
allows the user to be warned when they are about to enter an unsafe and
potentially dangerous website which may steal personal details.
consof internetcensorship?
• Removes Freedom Of Expression – although total freedom of expression may be
offensive and emotionally harmful, it is better off within the public eye. If personal
opinion is forced underground, the effects of it may become more damaging. If
people are not given the opportunity to learn the truth, they resort to ignorance.
• Corruption Of The Truth – if the government has the ability to regulate and censor
the media, including the internet, how are we expected to believe anything we
see? Someone in power is unlikely to agree to the publication of that which
highlights their illegal activities.
• Expense – the size of the internet and the fact that it is ever-changing means that
a form of extensive regulation and censorship would be extremely expensive.
• Harmful To Businesses – many businesses rely on the internet to advertise to their
target audience. Banning websites to accessed by those of legal age would harm
the sales and profit of such companies.
• Self Autonomy – Individuals have he right to control their own digestion of the
internet.
InternetRegulation
Some argue that the internet shouldn’t be regulated because the people who
regulate it are doing so to increase their own profit and to promote social ideals.
Is the regulation of the internet a way of societal control? Who owns the internet
and how can it be regulated fairly?
All of our internet activity passes through the hands of private corporations who
decide what we can say and see on the internet. For example, in China, the
government actively instructs internet providers and their content hosts to police
their services. Self discipline awards have been awarded to companies which have
most successfully regulated their services to develop a ‘harmonious’ environment.
Large companies tend to regulate their distribution content to benefit their own
profit and reputation rather than on account of ethics and the production of an
equal view of the world. When apple released the App Store in 2008, they
admitted that they would not sell apps which contained ‘unforeseen’ content.
This vague claim meant that Apple are free to regulate their own media as they
see fit, including the distribution of any controversial opinion which may tarnish
their image as a company.

More Related Content

What's hot

Social Media for Marketing and Branding
Social Media for Marketing and BrandingSocial Media for Marketing and Branding
Social Media for Marketing and BrandingHammad Siddiqui
 
The Dark Web
The Dark WebThe Dark Web
The Dark WebJan Siy
 
Internet Addiction Powerpoint
Internet Addiction PowerpointInternet Addiction Powerpoint
Internet Addiction PowerpointDaria Levin
 
The Art of Human Hacking : Social Engineering
The Art of Human Hacking : Social Engineering The Art of Human Hacking : Social Engineering
The Art of Human Hacking : Social Engineering OWASP Foundation
 
Journey To The Dark Web
Journey To The Dark WebJourney To The Dark Web
Journey To The Dark WebMiteshWani
 
“Privacy Today” Slide Presentation
“Privacy Today” Slide Presentation “Privacy Today” Slide Presentation
“Privacy Today” Slide Presentation tomasztopa
 
Right to privacy on internet and Data Protection
Right to privacy on internet and Data ProtectionRight to privacy on internet and Data Protection
Right to privacy on internet and Data Protectionatuljaybhaye
 
Social Media Monitoring: Presentation on Social Media Monitoring: Why and How
Social Media Monitoring: Presentation on Social Media Monitoring: Why and HowSocial Media Monitoring: Presentation on Social Media Monitoring: Why and How
Social Media Monitoring: Presentation on Social Media Monitoring: Why and HowAhmed Bouzid
 
Unit 2 Regulation of Cyberspace
Unit 2 Regulation of CyberspaceUnit 2 Regulation of Cyberspace
Unit 2 Regulation of CyberspaceTushar Rajput
 
National Cyber Security Policy-2013
National Cyber Security Policy-2013National Cyber Security Policy-2013
National Cyber Security Policy-2013Vidushi Singh
 
Cybercrime
CybercrimeCybercrime
CybercrimeKomal003
 
Child Online Protection in Nigeria: The need for a Multistakeholder Approach
Child Online Protection in Nigeria: The need for a Multistakeholder ApproachChild Online Protection in Nigeria: The need for a Multistakeholder Approach
Child Online Protection in Nigeria: The need for a Multistakeholder ApproachNzeih Chukwuemeka
 
Internet Safety Slideshare
Internet Safety SlideshareInternet Safety Slideshare
Internet Safety SlideshareLawrence Fine
 

What's hot (20)

Social Media for Marketing and Branding
Social Media for Marketing and BrandingSocial Media for Marketing and Branding
Social Media for Marketing and Branding
 
The Dark Web
The Dark WebThe Dark Web
The Dark Web
 
PPT dark web
PPT dark webPPT dark web
PPT dark web
 
Overview of Information Security & Privacy
Overview of Information Security & PrivacyOverview of Information Security & Privacy
Overview of Information Security & Privacy
 
Internet Addiction Powerpoint
Internet Addiction PowerpointInternet Addiction Powerpoint
Internet Addiction Powerpoint
 
The Art of Human Hacking : Social Engineering
The Art of Human Hacking : Social Engineering The Art of Human Hacking : Social Engineering
The Art of Human Hacking : Social Engineering
 
Journey To The Dark Web
Journey To The Dark WebJourney To The Dark Web
Journey To The Dark Web
 
“Privacy Today” Slide Presentation
“Privacy Today” Slide Presentation “Privacy Today” Slide Presentation
“Privacy Today” Slide Presentation
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Right to privacy on internet and Data Protection
Right to privacy on internet and Data ProtectionRight to privacy on internet and Data Protection
Right to privacy on internet and Data Protection
 
Social Media Monitoring: Presentation on Social Media Monitoring: Why and How
Social Media Monitoring: Presentation on Social Media Monitoring: Why and HowSocial Media Monitoring: Presentation on Social Media Monitoring: Why and How
Social Media Monitoring: Presentation on Social Media Monitoring: Why and How
 
Unit 2 Regulation of Cyberspace
Unit 2 Regulation of CyberspaceUnit 2 Regulation of Cyberspace
Unit 2 Regulation of Cyberspace
 
National Cyber Security Policy-2013
National Cyber Security Policy-2013National Cyber Security Policy-2013
National Cyber Security Policy-2013
 
Digital Identity
Digital Identity Digital Identity
Digital Identity
 
Internet security
Internet securityInternet security
Internet security
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Child Online Protection in Nigeria: The need for a Multistakeholder Approach
Child Online Protection in Nigeria: The need for a Multistakeholder ApproachChild Online Protection in Nigeria: The need for a Multistakeholder Approach
Child Online Protection in Nigeria: The need for a Multistakeholder Approach
 
Internet Safety Slideshare
Internet Safety SlideshareInternet Safety Slideshare
Internet Safety Slideshare
 
Privacy in simple
Privacy in simplePrivacy in simple
Privacy in simple
 
Internet Censorship
Internet CensorshipInternet Censorship
Internet Censorship
 

Viewers also liked

'Uncanned' Screenplay
'Uncanned' Screenplay'Uncanned' Screenplay
'Uncanned' ScreenplayEllieWeedon
 
Short Film Target Audience
Short Film Target AudienceShort Film Target Audience
Short Film Target AudienceEllieWeedon
 
Representation in 'After Hours':Theory Revision
Representation in 'After Hours':Theory RevisionRepresentation in 'After Hours':Theory Revision
Representation in 'After Hours':Theory RevisionEllieWeedon
 
Leveson Inquiry Overview
Leveson Inquiry OverviewLeveson Inquiry Overview
Leveson Inquiry OverviewEllieWeedon
 
After Hours - Target Audience
After Hours - Target AudienceAfter Hours - Target Audience
After Hours - Target AudienceEllieWeedon
 
'After Hours' - Screenplay
'After Hours' - Screenplay'After Hours' - Screenplay
'After Hours' - ScreenplayEllieWeedon
 
Media Regulation Case Studies - Royal Family
Media Regulation Case Studies -  Royal FamilyMedia Regulation Case Studies -  Royal Family
Media Regulation Case Studies - Royal FamilyEllieWeedon
 
Contemporary Media Regulation
Contemporary Media RegulationContemporary Media Regulation
Contemporary Media RegulationEllieWeedon
 
18:02:16 Photo-Shoot
18:02:16 Photo-Shoot18:02:16 Photo-Shoot
18:02:16 Photo-ShootEllieWeedon
 
Research Methods
Research MethodsResearch Methods
Research MethodsEllieWeedon
 
Claude Levi Strauss
Claude Levi StraussClaude Levi Strauss
Claude Levi StraussEllieWeedon
 
Representation and Ideology in Film
Representation and Ideology in FilmRepresentation and Ideology in Film
Representation and Ideology in FilmEllieWeedon
 
Narrative Theory in After Hours
Narrative Theory in After HoursNarrative Theory in After Hours
Narrative Theory in After HoursEllieWeedon
 
Short film planning notes
Short film planning notesShort film planning notes
Short film planning noteslizziewithani
 
Making the film poster (1)
Making the film poster (1)Making the film poster (1)
Making the film poster (1)ShahEman
 
Music choice
Music choiceMusic choice
Music choiceShahEman
 

Viewers also liked (20)

'Uncanned' Screenplay
'Uncanned' Screenplay'Uncanned' Screenplay
'Uncanned' Screenplay
 
Short Film Target Audience
Short Film Target AudienceShort Film Target Audience
Short Film Target Audience
 
Representation in 'After Hours':Theory Revision
Representation in 'After Hours':Theory RevisionRepresentation in 'After Hours':Theory Revision
Representation in 'After Hours':Theory Revision
 
Leveson Inquiry Overview
Leveson Inquiry OverviewLeveson Inquiry Overview
Leveson Inquiry Overview
 
After Hours - Target Audience
After Hours - Target AudienceAfter Hours - Target Audience
After Hours - Target Audience
 
'After Hours' - Screenplay
'After Hours' - Screenplay'After Hours' - Screenplay
'After Hours' - Screenplay
 
Media Regulation Case Studies - Royal Family
Media Regulation Case Studies -  Royal FamilyMedia Regulation Case Studies -  Royal Family
Media Regulation Case Studies - Royal Family
 
Contemporary Media Regulation
Contemporary Media RegulationContemporary Media Regulation
Contemporary Media Regulation
 
18:02:16 Photo-Shoot
18:02:16 Photo-Shoot18:02:16 Photo-Shoot
18:02:16 Photo-Shoot
 
Research Methods
Research MethodsResearch Methods
Research Methods
 
Claude Levi Strauss
Claude Levi StraussClaude Levi Strauss
Claude Levi Strauss
 
Magazine Genres
Magazine GenresMagazine Genres
Magazine Genres
 
Representation and Ideology in Film
Representation and Ideology in FilmRepresentation and Ideology in Film
Representation and Ideology in Film
 
Narrative Theory in After Hours
Narrative Theory in After HoursNarrative Theory in After Hours
Narrative Theory in After Hours
 
Narrative in film:
Narrative in film:Narrative in film:
Narrative in film:
 
Ghost-Stories Visit
Ghost-Stories VisitGhost-Stories Visit
Ghost-Stories Visit
 
Ghost town images
Ghost town imagesGhost town images
Ghost town images
 
Short film planning notes
Short film planning notesShort film planning notes
Short film planning notes
 
Making the film poster (1)
Making the film poster (1)Making the film poster (1)
Making the film poster (1)
 
Music choice
Music choiceMusic choice
Music choice
 

Similar to Censorship and Regulation of the Internet

ethicsincyberspace2-130423152958-phpapp02.pdf
ethicsincyberspace2-130423152958-phpapp02.pdfethicsincyberspace2-130423152958-phpapp02.pdf
ethicsincyberspace2-130423152958-phpapp02.pdfSheejamolMathew
 
Ethics in cyber space
Ethics in cyber spaceEthics in cyber space
Ethics in cyber spacenitss007
 
An Overview of the Battle for the Control of the Internet
An Overview of the Battle for the Control of the InternetAn Overview of the Battle for the Control of the Internet
An Overview of the Battle for the Control of the InternetDibussi Tande
 
Presentation slides
Presentation slidesPresentation slides
Presentation slidesandrewdyoung
 
Charting a Way Forward Online Content Regulation
Charting a Way Forward Online Content RegulationCharting a Way Forward Online Content Regulation
Charting a Way Forward Online Content Regulationrun_frictionless
 
2ndnov_txicybersec& SAFETY.pptx
2ndnov_txicybersec& SAFETY.pptx2ndnov_txicybersec& SAFETY.pptx
2ndnov_txicybersec& SAFETY.pptxSSPTRGCELL
 
Legal And Ethical Aspects.pptx
Legal And Ethical Aspects.pptxLegal And Ethical Aspects.pptx
Legal And Ethical Aspects.pptxfatimagull32
 
Internet Governance, Surveillance, And Social Controls
Internet Governance, Surveillance, And Social ControlsInternet Governance, Surveillance, And Social Controls
Internet Governance, Surveillance, And Social ControlsGener Luis Morada
 
Cst group project#2, intro++
Cst group project#2, intro++Cst group project#2, intro++
Cst group project#2, intro++Roxanne St Ives
 
Legislation Exercise
Legislation ExerciseLegislation Exercise
Legislation ExerciseHadil Hammad
 
7881096.pptetststdydsttshsthsstshhstetej
7881096.pptetststdydsttshsthsstshhstetej7881096.pptetststdydsttshsthsstshhstetej
7881096.pptetststdydsttshsthsstshhstetejNishaTariq1
 
7881096.pptsssysgssssttstststststssstttw
7881096.pptsssysgssssttstststststssstttw7881096.pptsssysgssssttstststststssstttw
7881096.pptsssysgssssttstststststssstttwNishaTariq1
 
Social Media & Legal Risk
Social Media & Legal Risk Social Media & Legal Risk
Social Media & Legal Risk Endcode_org
 
C1729690_PersuasiveAnalysis Research Paper (Argument).docx
C1729690_PersuasiveAnalysis Research Paper (Argument).docxC1729690_PersuasiveAnalysis Research Paper (Argument).docx
C1729690_PersuasiveAnalysis Research Paper (Argument).docxAndrewClark295760
 
Eskwela module 3_responsible use of ict
Eskwela module 3_responsible use of ictEskwela module 3_responsible use of ict
Eskwela module 3_responsible use of ictAnwar Jesus Esperida
 
Synthesis Essay Writing Guide Essay Writing, E
Synthesis Essay Writing Guide Essay Writing, ESynthesis Essay Writing Guide Essay Writing, E
Synthesis Essay Writing Guide Essay Writing, ENicole Cochran
 

Similar to Censorship and Regulation of the Internet (20)

ethicsincyberspace2-130423152958-phpapp02.pdf
ethicsincyberspace2-130423152958-phpapp02.pdfethicsincyberspace2-130423152958-phpapp02.pdf
ethicsincyberspace2-130423152958-phpapp02.pdf
 
Ethics in cyber space
Ethics in cyber spaceEthics in cyber space
Ethics in cyber space
 
An Overview of the Battle for the Control of the Internet
An Overview of the Battle for the Control of the InternetAn Overview of the Battle for the Control of the Internet
An Overview of the Battle for the Control of the Internet
 
Presentation slides
Presentation slidesPresentation slides
Presentation slides
 
Charting a Way Forward Online Content Regulation
Charting a Way Forward Online Content RegulationCharting a Way Forward Online Content Regulation
Charting a Way Forward Online Content Regulation
 
2ndnov_txicybersec& SAFETY.pptx
2ndnov_txicybersec& SAFETY.pptx2ndnov_txicybersec& SAFETY.pptx
2ndnov_txicybersec& SAFETY.pptx
 
Legal And Ethical Aspects.pptx
Legal And Ethical Aspects.pptxLegal And Ethical Aspects.pptx
Legal And Ethical Aspects.pptx
 
Social Media and The Law
Social Media and The LawSocial Media and The Law
Social Media and The Law
 
Internet Governance, Surveillance, And Social Controls
Internet Governance, Surveillance, And Social ControlsInternet Governance, Surveillance, And Social Controls
Internet Governance, Surveillance, And Social Controls
 
Cst group project#2, intro++
Cst group project#2, intro++Cst group project#2, intro++
Cst group project#2, intro++
 
E commerce
E commerce E commerce
E commerce
 
Legislation Exercise
Legislation ExerciseLegislation Exercise
Legislation Exercise
 
Legislation Exercise
Legislation ExerciseLegislation Exercise
Legislation Exercise
 
7881096.pptetststdydsttshsthsstshhstetej
7881096.pptetststdydsttshsthsstshhstetej7881096.pptetststdydsttshsthsstshhstetej
7881096.pptetststdydsttshsthsstshhstetej
 
7881096.pptsssysgssssttstststststssstttw
7881096.pptsssysgssssttstststststssstttw7881096.pptsssysgssssttstststststssstttw
7881096.pptsssysgssssttstststststssstttw
 
Krishna kumar singh
Krishna kumar singhKrishna kumar singh
Krishna kumar singh
 
Social Media & Legal Risk
Social Media & Legal Risk Social Media & Legal Risk
Social Media & Legal Risk
 
C1729690_PersuasiveAnalysis Research Paper (Argument).docx
C1729690_PersuasiveAnalysis Research Paper (Argument).docxC1729690_PersuasiveAnalysis Research Paper (Argument).docx
C1729690_PersuasiveAnalysis Research Paper (Argument).docx
 
Eskwela module 3_responsible use of ict
Eskwela module 3_responsible use of ictEskwela module 3_responsible use of ict
Eskwela module 3_responsible use of ict
 
Synthesis Essay Writing Guide Essay Writing, E
Synthesis Essay Writing Guide Essay Writing, ESynthesis Essay Writing Guide Essay Writing, E
Synthesis Essay Writing Guide Essay Writing, E
 

Recently uploaded

Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application ) Sakshi Ghasle
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104misteraugie
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactPECB
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Celine George
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeThiyagu K
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docxPoojaSen20
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfchloefrazer622
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfciinovamais
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppCeline George
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdfQucHHunhnh
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionSafetyChain Software
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfJayanti Pande
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 

Recently uploaded (20)

Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application )
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docx
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdf
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website App
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory Inspection
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 

Censorship and Regulation of the Internet

  • 2. What’s the difference? Often we get censorship and regulation confused… Regulation: This is an official rule, law or order which states whether something may or may not be done and if so, how something must be done. This rule must be established by a governing force of law and is closely controlled and monitored. Media must pass regulation boundaries set by governments before it is published. Censorship: This is where media is published and is assessed afterwards. This can come in the form of the suppression of broadcast material including plays, films, books, newspapers, letters etc. Often censorship is put in place if there are any complaints regarding published media.
  • 3. UK Internetcensorship andregulation Ethics, the sheer size of the internet and the fact that it is a globally distributed network makes regulating it extremely difficult, however means are put in place to try to control what is published on the world wide web. The government has put laws in place to try to regulate the internet’s content, these laws include: English Defamation Law This law writes that any published statements which directly accuse individuals of defaming claims can be taken to court. A defamatory statement is presumed to be false, unless the defendant can prove its truth. Copyright Law of the UK This law monitors the ownership of media products and the accessibility of these products regarding tangible property rights. In summary, personal work is legally owned by the producer and can only be distributed by others with their official permission. Additionally, the internet is regulated against incitement to terrorism and child pornography. In 2014, Teresa May proposed the introduction of Extremism Disruption Orders which would allow judges to ban those who promote extremist messages from social media and broadcasting.
  • 4. Prosof internetcensorship? • Society Should Set Limits – the total freedom of speech on the internet would only resort to cyber bullying and racist commentary. • Parents Can Not Always Be There To Monitor Children – internet censorship would give parents the peace of mind to leave their children alone whilst on the internet. • Censorship Would Control Illegal Activities - if the promotion of illegal activities were not so readily available then cases of these happenings would decline, less would be influenced. • Helps Strengthen National Security – laws against hacking and imposing hefty punishments towards violators means that the safety of secret intelligence can be protected. • Lessens Identity Theft – internet censorship in the form of anti-phishing software allows the user to be warned when they are about to enter an unsafe and potentially dangerous website which may steal personal details.
  • 5. consof internetcensorship? • Removes Freedom Of Expression – although total freedom of expression may be offensive and emotionally harmful, it is better off within the public eye. If personal opinion is forced underground, the effects of it may become more damaging. If people are not given the opportunity to learn the truth, they resort to ignorance. • Corruption Of The Truth – if the government has the ability to regulate and censor the media, including the internet, how are we expected to believe anything we see? Someone in power is unlikely to agree to the publication of that which highlights their illegal activities. • Expense – the size of the internet and the fact that it is ever-changing means that a form of extensive regulation and censorship would be extremely expensive. • Harmful To Businesses – many businesses rely on the internet to advertise to their target audience. Banning websites to accessed by those of legal age would harm the sales and profit of such companies. • Self Autonomy – Individuals have he right to control their own digestion of the internet.
  • 6. InternetRegulation Some argue that the internet shouldn’t be regulated because the people who regulate it are doing so to increase their own profit and to promote social ideals. Is the regulation of the internet a way of societal control? Who owns the internet and how can it be regulated fairly? All of our internet activity passes through the hands of private corporations who decide what we can say and see on the internet. For example, in China, the government actively instructs internet providers and their content hosts to police their services. Self discipline awards have been awarded to companies which have most successfully regulated their services to develop a ‘harmonious’ environment. Large companies tend to regulate their distribution content to benefit their own profit and reputation rather than on account of ethics and the production of an equal view of the world. When apple released the App Store in 2008, they admitted that they would not sell apps which contained ‘unforeseen’ content. This vague claim meant that Apple are free to regulate their own media as they see fit, including the distribution of any controversial opinion which may tarnish their image as a company.