SlideShare a Scribd company logo
1 of 24
A Gift of Fire, 2ed Chapter 5: Freedom of Speech in Cyberspace 1
Social, Legal, and Ethical Issues for Computers
and the Internet
Freedom of Speech In Cyberspace
A Gift of Fire, 2ed Chapter 5: Freedom of Speech in Cyberspace 2
A Gift of Fire
Freedom of Speech In Cyberspace
Changing Communications Paradigms
Offensive Speech and Censorship in Cyberspace
Anonymity
Spam
Ensuring Valuable and Diverse Content
A Gift of Fire, 2ed Chapter 5: Freedom of Speech in Cyberspace 3
Changing Communications Paradigms
Regulatory Paradigms
Communication technologies differ with respect to their
degree of First Amendment protection and government
regulation.
Print Media:
• Strongest First Amendment protection (books have been banned, but
the trend has been toward fewer government restraints).
Broadcast Media:
• Less First Amendment protection than print media (TV and Radio
stations are licensed by the gov’t…not print outlets).
Common Carrier (telephone, telegraph, postal system):
• Content not controlled and the carrier is not responsible for content.
A Gift of Fire, 2ed Chapter 5: Freedom of Speech in Cyberspace 4
Changing Communications Paradigms
Regulatory Paradigms (cont’d)
Internet, BBSs, commercial online services, and the WWW:
• Not exactly print media.
• Not exactly broadcast media.
• Not exactly common carrier.
Q: Who controls the distribution of news, information, and opinion at the
online service you use? at the Web sites you frequent?
A Gift of Fire, 2ed Chapter 5: Freedom of Speech in Cyberspace 5
Changing Communications Paradigms
The First Amendment
Protects Citizens From Government
• Prohibits restriction of speech, press, peaceful assembly, and religion.
Subsequent Interpretations Address:
• Offensive and/or controversial speech and ideas,
• Spoken and written words,
• Pictures, art, and other forms of expression and opinion, and
• Commercial speech (e.g. advertising).
Q: Should all speech be constitutionally protected?
A Gift of Fire, 2ed Chapter 5: Freedom of Speech in Cyberspace 6
Offensive Speech and
Censorship in Cyberspace
Speech Might Include:
• Political or religious speech.
• Pornography (Multibillion-dollar online business).
• Sexual or racial slurs.
• Nazi materials.
• Libelous statements.
• Abortion information.
• Alcohol ads.
Q: Identify other forms of speech found in cyberspace that some consider
offensive.
A Gift of Fire, 2ed Chapter 5: Freedom of Speech in Cyberspace 7
Offensive Speech and
Censorship in Cyberspace
Miller v. California
Material is considered obscene if all three parts are met:
1. It depicts sexual (or excretory) acts whose depiction is specifically
prohibited by state law, and
2. It depicts these acts in a patently offensive manner, appealing to the
prurient interest as judged by a reasonable person using community
standards, and
3. It has no serious literary, artistic, social, political, or scientific value.
Q: Historically, how have local “community standards” affected censorship
of speech in cyberspace? (see next page)
A Gift of Fire, 2ed Chapter 5: Freedom of Speech in Cyberspace 8
Straining Old Legal Standards
No physical locations on the internet.
Page 198…
A Gift of Fire, 2ed Chapter 5: Freedom of Speech in Cyberspace 9
Offensive Speech and
Censorship in Cyberspace
Material Inappropriate for Children
Technology Changes the Context
• On the Web, children have access to the same ‘adult’ text, images,
videos, etc. as adults (no “tickettaker” to check age).
• Online proprietors don’t know the customer is not an adult.
Protecting Children
Regardless of the medium:
– It is illegal to create, possess or distribute child pornography. (Because
creation of it is child abuse...)
– It is illegal to lure children into sexual activity.
Q: How should children be protected from access in cyberspace to adult
material? (next page)
A Gift of Fire, 2ed Chapter 5: Freedom of Speech in Cyberspace 10
Protect Children
Software filtering:
Bess
Cyber Patrol, Surf-Watch
A Gift of Fire, 2ed Chapter 5: Freedom of Speech in Cyberspace 11
Offensive Speech and
Censorship in Cyberspace
Censorship Laws
Communications Decency Act (CDA, 1996)
• Publicity and public pressure lead Congress to pass this act.
• Anyone who made available to anyone under 18 any communication
that is obscene or indecent would be subject to a $100,000 fine and two
years in prison.
• American Civil Liberties Union (and other free speech advocates)
found this law to be a “profound threat to freedom of expression.
• In 1997, the CDA was ruled unconstitutional because it was too vague
and too broad in protecting children online and because less restrictive
means are available.
Q: Should content on the Internet have as much First Amendment protection as
printed material?
A Gift of Fire, 2ed Chapter 5: Freedom of Speech in Cyberspace 12
Offensive Speech and
Censorship in Cyberspace
Censorship Laws (cont’d)
Child Online Protection Act (COPA, 1998)
• Commercial Web sites that make available to minors materials
“harmful to minors”, as judged by community standards would be
subject to a $50,000 fine and six months in jail.
• In 2000 and 2003, COPA was ruled unconstitutional by a federal court.
Q: How are children protected from “harmful” material outside of Cyberspace?
A Gift of Fire, 2ed Chapter 5: Freedom of Speech in Cyberspace 13
Offensive Speech and
Censorship in Cyberspace
Censorship Laws (cont’d)
Children’s Internet Protection Act (CIPA)
• Any school or library receiving federal Internet funds must install
filtering software on all Internet terminals.
• Filters must block sites containing child pornography, obscene material,
and any material deemed “harmful to minors.”
• A federal appeals court ruled a major part of CIPA unconstitutional in
2002 but the Supreme Court upheld the law in 2003.
Q: How does CIPA affect adults accessing online material at a public library
that uses filtering software? See page 206…
A Gift of Fire, 2ed Chapter 5: Freedom of Speech in Cyberspace 14
Offensive Speech and
Censorship in Cyberspace
Limiting Internet Access in Libraries and
Schools
Filtering Software
• Benefit: prevent access to inappropriate material on the Internet by
screening words or phrases, blocking sites according to rating system,
or disallowing access to specific sites in a list.
• Problems: can be ineffective—kids get around the filters; the words,
phrases, rating systems, etc. are subjective; “banned” keywords can be
overly restrictive for adult users and for legitimate use by minors.
• See page 205 for a list of filtered sites…
Q: What has been your experience with filtering software?
A Gift of Fire, 2ed Chapter 5: Freedom of Speech in Cyberspace 15
Offensive Speech and
Censorship in Cyberspace
Challenging Old Regulatory Paradigms and
Special Interests
License required:
• To practice law.
• To publish traditional newsletters about commodities and futures
investing (prior to 2000).
No license required:
• To create downloadable, self-help legal software.
• To publish newsletters about, developing software for, and operating
Web sites concerning commodities and futures investing (since 2000).
Q: Is online advertising of wine free speech or disregard for the regulatory
rights of state governments?
A Gift of Fire, 2ed Chapter 5: Freedom of Speech in Cyberspace 16
Offensive Speech and
Censorship in Cyberspace
Censorship On the Global Net
Global Impact
• Avoiding censorship: the global nature of the Net allows restrictions (or
barriers) in one country to be circumvented by using networks in other,
less restrictive countries.
• Creating censorship: the global nature of the Net makes it easier for one
nation to impose restrictive standards on others. Cases page 210.
Q: Why are online gambling sites established offshore?
A Gift of Fire, 2ed Chapter 5: Freedom of Speech in Cyberspace 17
Anonymity
Common Sense and the Internet
• Early publications by some of our Founding Fathers were published
under pseudonyms.
• Today, there are publications on the Net that are posted anonymously.
• Anonymizer.com Surf the web/send e-mail anonymously
Q: What are the drawbacks of anonymous Web postings?
(See next slide)
A Gift of Fire, 2ed Chapter 5: Freedom of Speech in Cyberspace 18
Against Anonymity
• Potential to shield criminal/anti-social
activity
– Fraud, harassment, and extortion
– Distribution of child pornography
– Libel or threatening others with impunity
– Infringe copyrights by posting software
– Plan terrorist attacks
• Poor “netiquette”
A Gift of Fire, 2ed Chapter 5: Freedom of Speech in Cyberspace 19
Anonymity
Is Anonymity Protected?
Conflicts between political freedom of speech and campaign
regulations:
• Anonymity protects against retaliation and embarrassment.
• Anonymity violates rules established by the Federal Elections
Commission (FEC) Case page 215.
Q: Should anonymous political speech on the Web be regulated?
A Gift of Fire, 2ed Chapter 5: Freedom of Speech in Cyberspace 20
Anonymity
Anonymity vs. Community
Supporters of anonymity:
• Say it is necessary to protect privacy and free speech.
Opponents of anonymity:
• Believe it is anti-social and allows criminals to hide from law
enforcement.
Q: How is the practice of anonymity online similar/dissimilar to strong
encryption? VERY similar…challenging to law enforcement.
A Gift of Fire, 2ed Chapter 5: Freedom of Speech in Cyberspace 21
Spam
What Is the Problem?
Unsolicited, mass e-mail:
• is cheap to senders but may impose costs on the recipient’s time and/or
the recipient’s online account.
• may contain objectionable content (political, commercial ads,
solicitations for funds, pornography, etc.).
• may contain a disguised return address.
• may pass through filters.
• invades privacy.
• creates a financial and managerial burden on ISPs.
Q: How do you handle spam?
A Gift of Fire, 2ed Chapter 5: Freedom of Speech in Cyberspace 22
Spam
Cases and Free Speech Issues
AOL v. Cyber Promotions
• AOL and other service providers have successfully sued spammers
because of the cost burden imposed. Page 219.
Disgruntled Intel Employee
• Initially, a court ruled that non-commercial spam to Intel employees at
their Intel e-mail accounts was a form of trespass.
• The CA Supreme Court ruled that it was not.
A Gift of Fire, 2ed Chapter 5: Freedom of Speech in Cyberspace 23
Spam
Solutions
• Technology: filters that screen out spam.
• Market Pressure: services that list spammers.
• Business Policy: at the discretion of the recipient, all e-mail would be
charged a microfee.
• Law: create restrictions that are consistent with the First Amendment.
• Vigilantism: punish spammers by hacking into their phone or computer
systems.
Q: Which solution above, or others, do you support?
A Gift of Fire, 2ed Chapter 5: Freedom of Speech in Cyberspace 24
Ensuring Valuable and
Diverse Content
Points to Consider:
• Is there a balance between commercial and educational information on
the Web?
• Should diverse content on the Web be subsidized with taxes?
• Should valuable content on the Web be regulated?
• Do we need to ensure the existence of sites containing civic
information?
• Are more sites that promote the arts and culture needed?
Q: How do we ensure valuable and diverse content in traditional forms of
media?

More Related Content

What's hot

Cyber crimes in the digital age
Cyber crimes in the digital ageCyber crimes in the digital age
Cyber crimes in the digital ageatuljaybhaye
 
Cyber defamation
Cyber defamationCyber defamation
Cyber defamationTuhin Batra
 
History and future cybercrime
History and future cybercrimeHistory and future cybercrime
History and future cybercrimeOnline
 
Introduction to Cyber Crimes
Introduction to Cyber CrimesIntroduction to Cyber Crimes
Introduction to Cyber Crimesatuljaybhaye
 
Cyber law In India: its need & importance
Cyber law In India: its need & importanceCyber law In India: its need & importance
Cyber law In India: its need & importanceAditya Shukla
 
Cyber Law With case studies
Cyber Law With case studies Cyber Law With case studies
Cyber Law With case studies Bhagya Bgk
 
Cyber crime against property
Cyber crime against propertyCyber crime against property
Cyber crime against propertyvarunbamba
 
ETHICS01 - Introduction to Computer Ethics
ETHICS01 - Introduction to Computer EthicsETHICS01 - Introduction to Computer Ethics
ETHICS01 - Introduction to Computer EthicsMichael Heron
 
Computer misuse and criminal law
Computer misuse and criminal lawComputer misuse and criminal law
Computer misuse and criminal lawZaheer Irshad
 
IT Act 2000 Penalties, Offences with case studies
IT Act 2000 Penalties, Offences with case studies IT Act 2000 Penalties, Offences with case studies
IT Act 2000 Penalties, Offences with case studies Network Intelligence India
 
Right to privacy on internet and Data Protection
Right to privacy on internet and Data ProtectionRight to privacy on internet and Data Protection
Right to privacy on internet and Data Protectionatuljaybhaye
 
Cyber crime and its types
Cyber crime and its  typesCyber crime and its  types
Cyber crime and its typesDINESH KAMBLE
 
Chapter 1 powerpoint
Chapter 1 powerpointChapter 1 powerpoint
Chapter 1 powerpointstanbridge
 

What's hot (20)

Cyber crimes in the digital age
Cyber crimes in the digital ageCyber crimes in the digital age
Cyber crimes in the digital age
 
Cyber defamation
Cyber defamationCyber defamation
Cyber defamation
 
History and future cybercrime
History and future cybercrimeHistory and future cybercrime
History and future cybercrime
 
Introduction to Cyber Crimes
Introduction to Cyber CrimesIntroduction to Cyber Crimes
Introduction to Cyber Crimes
 
Cyber crimes presentation
Cyber crimes presentationCyber crimes presentation
Cyber crimes presentation
 
Cyber law In India: its need & importance
Cyber law In India: its need & importanceCyber law In India: its need & importance
Cyber law In India: its need & importance
 
Cyber Law And Ethics
Cyber Law And EthicsCyber Law And Ethics
Cyber Law And Ethics
 
Introduction to Cyber Law
Introduction to Cyber LawIntroduction to Cyber Law
Introduction to Cyber Law
 
Cyber Law With case studies
Cyber Law With case studies Cyber Law With case studies
Cyber Law With case studies
 
Cyber crime against property
Cyber crime against propertyCyber crime against property
Cyber crime against property
 
Computer forensics ppt
Computer forensics pptComputer forensics ppt
Computer forensics ppt
 
Cyber law2
Cyber law2Cyber law2
Cyber law2
 
ETHICS01 - Introduction to Computer Ethics
ETHICS01 - Introduction to Computer EthicsETHICS01 - Introduction to Computer Ethics
ETHICS01 - Introduction to Computer Ethics
 
Computer misuse and criminal law
Computer misuse and criminal lawComputer misuse and criminal law
Computer misuse and criminal law
 
IT Act 2000 Penalties, Offences with case studies
IT Act 2000 Penalties, Offences with case studies IT Act 2000 Penalties, Offences with case studies
IT Act 2000 Penalties, Offences with case studies
 
Right to privacy on internet and Data Protection
Right to privacy on internet and Data ProtectionRight to privacy on internet and Data Protection
Right to privacy on internet and Data Protection
 
Cyber crime and its types
Cyber crime and its  typesCyber crime and its  types
Cyber crime and its types
 
Chapter 1 powerpoint
Chapter 1 powerpointChapter 1 powerpoint
Chapter 1 powerpoint
 
Deep and Dark Web
Deep and Dark WebDeep and Dark Web
Deep and Dark Web
 
Ethical Issues and Relevant Laws on Computing
Ethical Issues and Relevant Laws on ComputingEthical Issues and Relevant Laws on Computing
Ethical Issues and Relevant Laws on Computing
 

Viewers also liked

Freedom of expression
Freedom of expressionFreedom of expression
Freedom of expressionKawtar Laaras
 
Freedom of Speech & Expression
Freedom of Speech & ExpressionFreedom of Speech & Expression
Freedom of Speech & Expressiongcundiff
 
Freedom of Expression is a Human Right
Freedom of Expression is a Human RightFreedom of Expression is a Human Right
Freedom of Expression is a Human RightStresemann Stiftung
 
3 censorship privacy
3 censorship privacy3 censorship privacy
3 censorship privacytolshinoda
 
Freedom of the press is not the same as freedom of expression
Freedom of the press is not the same as freedom of expressionFreedom of the press is not the same as freedom of expression
Freedom of the press is not the same as freedom of expressionMartin Hirst
 
Freedom of expression.
Freedom of expression.Freedom of expression.
Freedom of expression.noeliaiiiiii
 
Article 10 freedom of speech
Article 10   freedom of speechArticle 10   freedom of speech
Article 10 freedom of speechHafizul Mukhlis
 
Censorship Powerpoint
Censorship PowerpointCensorship Powerpoint
Censorship Powerpointmmentis117
 
Right to freedom
Right to freedomRight to freedom
Right to freedomladdubabbu
 
Freedom of speech
Freedom of speechFreedom of speech
Freedom of speechahtezaz123
 

Viewers also liked (17)

Freedom of expression
Freedom of expressionFreedom of expression
Freedom of expression
 
Freedom of speech
Freedom of speechFreedom of speech
Freedom of speech
 
Freedom of speech
Freedom of speechFreedom of speech
Freedom of speech
 
Freedom of Speech & Expression
Freedom of Speech & ExpressionFreedom of Speech & Expression
Freedom of Speech & Expression
 
Freedom of Expression is a Human Right
Freedom of Expression is a Human RightFreedom of Expression is a Human Right
Freedom of Expression is a Human Right
 
3 censorship privacy
3 censorship privacy3 censorship privacy
3 censorship privacy
 
Chapter 6
Chapter 6Chapter 6
Chapter 6
 
Direitos Humanos
Direitos HumanosDireitos Humanos
Direitos Humanos
 
freedom of speech
freedom of speechfreedom of speech
freedom of speech
 
Right to freedom
Right to freedomRight to freedom
Right to freedom
 
Freedom of the press is not the same as freedom of expression
Freedom of the press is not the same as freedom of expressionFreedom of the press is not the same as freedom of expression
Freedom of the press is not the same as freedom of expression
 
Freedom of Expression, Media and Journalism under the European Human Rights S...
Freedom of Expression, Media and Journalism under the European Human Rights S...Freedom of Expression, Media and Journalism under the European Human Rights S...
Freedom of Expression, Media and Journalism under the European Human Rights S...
 
Freedom of expression.
Freedom of expression.Freedom of expression.
Freedom of expression.
 
Article 10 freedom of speech
Article 10   freedom of speechArticle 10   freedom of speech
Article 10 freedom of speech
 
Censorship Powerpoint
Censorship PowerpointCensorship Powerpoint
Censorship Powerpoint
 
Right to freedom
Right to freedomRight to freedom
Right to freedom
 
Freedom of speech
Freedom of speechFreedom of speech
Freedom of speech
 

Similar to Freedom of speech

International internet governance
International internet governanceInternational internet governance
International internet governanceJillian York
 
Internet decency legislation
Internet decency legislationInternet decency legislation
Internet decency legislationTgarmon34
 
Wk_3_freedom_of_speech.pdf
Wk_3_freedom_of_speech.pdfWk_3_freedom_of_speech.pdf
Wk_3_freedom_of_speech.pdfBiproRoy3
 
Internet decency legislation
Internet decency legislationInternet decency legislation
Internet decency legislationTgarmon34
 
ethcpp05-Unit 3.ppt
ethcpp05-Unit 3.pptethcpp05-Unit 3.ppt
ethcpp05-Unit 3.pptAnil Yadav
 
Digital Repression and Techno-Authoritarianism
Digital Repression and Techno-AuthoritarianismDigital Repression and Techno-Authoritarianism
Digital Repression and Techno-AuthoritarianismCharles Mok
 
Privacy reconsidered
Privacy reconsideredPrivacy reconsidered
Privacy reconsideredBrian Rowe
 
An Overview of the Battle for the Control of the Internet
An Overview of the Battle for the Control of the InternetAn Overview of the Battle for the Control of the Internet
An Overview of the Battle for the Control of the InternetDibussi Tande
 
Building Legal Institutions for Information Technology
Building Legal Institutions for Information TechnologyBuilding Legal Institutions for Information Technology
Building Legal Institutions for Information TechnologyRitesh Nayak
 
5.4 whose laws rule the web
5.4 whose laws rule the web 5.4 whose laws rule the web
5.4 whose laws rule the web Hasan Dang
 
Unraveling intermediary liability
Unraveling intermediary liabilityUnraveling intermediary liability
Unraveling intermediary liabilityEmily Laidlaw
 
Freedom or Control in Virtual Worlds
Freedom or Control in Virtual WorldsFreedom or Control in Virtual Worlds
Freedom or Control in Virtual WorldsJyrki Kasvi
 
Software piracy
Software piracySoftware piracy
Software piracyTi-Sun
 
Unit-3 Cyber Crime PPT.pptx
Unit-3 Cyber Crime PPT.pptxUnit-3 Cyber Crime PPT.pptx
Unit-3 Cyber Crime PPT.pptxParasSehgal12
 
Encryption & interception of communication
Encryption & interception of communicationEncryption & interception of communication
Encryption & interception of communicationUc Man
 
Encryption & interception of communication
Encryption & interception of communicationEncryption & interception of communication
Encryption & interception of communicationUc Man
 
Cyberspace Usages Challenges And Disputeresolution Ja
Cyberspace Usages Challenges And Disputeresolution  JaCyberspace Usages Challenges And Disputeresolution  Ja
Cyberspace Usages Challenges And Disputeresolution Jautkarshjani
 

Similar to Freedom of speech (20)

Freedom
FreedomFreedom
Freedom
 
4568595.ppt
4568595.ppt4568595.ppt
4568595.ppt
 
International internet governance
International internet governanceInternational internet governance
International internet governance
 
Internet decency legislation
Internet decency legislationInternet decency legislation
Internet decency legislation
 
Wk_3_freedom_of_speech.pdf
Wk_3_freedom_of_speech.pdfWk_3_freedom_of_speech.pdf
Wk_3_freedom_of_speech.pdf
 
Internet decency legislation
Internet decency legislationInternet decency legislation
Internet decency legislation
 
ethcpp05-Unit 3.ppt
ethcpp05-Unit 3.pptethcpp05-Unit 3.ppt
ethcpp05-Unit 3.ppt
 
Digital Repression and Techno-Authoritarianism
Digital Repression and Techno-AuthoritarianismDigital Repression and Techno-Authoritarianism
Digital Repression and Techno-Authoritarianism
 
Privacy reconsidered
Privacy reconsideredPrivacy reconsidered
Privacy reconsidered
 
Chapter 5_dp-_pertemuan_7_8
 Chapter 5_dp-_pertemuan_7_8 Chapter 5_dp-_pertemuan_7_8
Chapter 5_dp-_pertemuan_7_8
 
An Overview of the Battle for the Control of the Internet
An Overview of the Battle for the Control of the InternetAn Overview of the Battle for the Control of the Internet
An Overview of the Battle for the Control of the Internet
 
Building Legal Institutions for Information Technology
Building Legal Institutions for Information TechnologyBuilding Legal Institutions for Information Technology
Building Legal Institutions for Information Technology
 
5.4 whose laws rule the web
5.4 whose laws rule the web 5.4 whose laws rule the web
5.4 whose laws rule the web
 
Unraveling intermediary liability
Unraveling intermediary liabilityUnraveling intermediary liability
Unraveling intermediary liability
 
Freedom or Control in Virtual Worlds
Freedom or Control in Virtual WorldsFreedom or Control in Virtual Worlds
Freedom or Control in Virtual Worlds
 
Software piracy
Software piracySoftware piracy
Software piracy
 
Unit-3 Cyber Crime PPT.pptx
Unit-3 Cyber Crime PPT.pptxUnit-3 Cyber Crime PPT.pptx
Unit-3 Cyber Crime PPT.pptx
 
Encryption & interception of communication
Encryption & interception of communicationEncryption & interception of communication
Encryption & interception of communication
 
Encryption & interception of communication
Encryption & interception of communicationEncryption & interception of communication
Encryption & interception of communication
 
Cyberspace Usages Challenges And Disputeresolution Ja
Cyberspace Usages Challenges And Disputeresolution  JaCyberspace Usages Challenges And Disputeresolution  Ja
Cyberspace Usages Challenges And Disputeresolution Ja
 

More from Uc Man

Dhcp in linux
Dhcp in linuxDhcp in linux
Dhcp in linuxUc Man
 
Unit 3 maintain yourself in professional practice
Unit 3    maintain yourself in professional practiceUnit 3    maintain yourself in professional practice
Unit 3 maintain yourself in professional practiceUc Man
 
Unit 3 maintain yourself in professional practice
Unit 3    maintain yourself in professional practiceUnit 3    maintain yourself in professional practice
Unit 3 maintain yourself in professional practiceUc Man
 
Course outline pp_2
Course outline pp_2Course outline pp_2
Course outline pp_2Uc Man
 
Unit 3 maintain yourself in professional practice
Unit 3    maintain yourself in professional practiceUnit 3    maintain yourself in professional practice
Unit 3 maintain yourself in professional practiceUc Man
 
Course outline pp_2
Course outline pp_2Course outline pp_2
Course outline pp_2Uc Man
 
System and network administration network services
System and network administration network servicesSystem and network administration network services
System and network administration network servicesUc Man
 
Unit 3 maintain yourself in professional practice
Unit 3    maintain yourself in professional practiceUnit 3    maintain yourself in professional practice
Unit 3 maintain yourself in professional practiceUc Man
 
Professionalism
ProfessionalismProfessionalism
ProfessionalismUc Man
 
Pro in the_workplace2
Pro in the_workplace2Pro in the_workplace2
Pro in the_workplace2Uc Man
 
Professional ethics in_computing
Professional ethics in_computingProfessional ethics in_computing
Professional ethics in_computingUc Man
 
Effective time-management
Effective time-managementEffective time-management
Effective time-managementUc Man
 
Digital divide
Digital divideDigital divide
Digital divideUc Man
 
Course outline pp
Course outline ppCourse outline pp
Course outline ppUc Man
 
Computer crime
Computer crimeComputer crime
Computer crimeUc Man
 
Maintain yourself in professional practice
Maintain yourself in professional practiceMaintain yourself in professional practice
Maintain yourself in professional practiceUc Man
 
Time management
Time managementTime management
Time managementUc Man
 
Time management,planning and prioritization
Time management,planning and prioritizationTime management,planning and prioritization
Time management,planning and prioritizationUc Man
 
Student attendancereportofit 105(a)
Student attendancereportofit 105(a)Student attendancereportofit 105(a)
Student attendancereportofit 105(a)Uc Man
 
Privacy and personal information
Privacy and personal informationPrivacy and personal information
Privacy and personal informationUc Man
 

More from Uc Man (20)

Dhcp in linux
Dhcp in linuxDhcp in linux
Dhcp in linux
 
Unit 3 maintain yourself in professional practice
Unit 3    maintain yourself in professional practiceUnit 3    maintain yourself in professional practice
Unit 3 maintain yourself in professional practice
 
Unit 3 maintain yourself in professional practice
Unit 3    maintain yourself in professional practiceUnit 3    maintain yourself in professional practice
Unit 3 maintain yourself in professional practice
 
Course outline pp_2
Course outline pp_2Course outline pp_2
Course outline pp_2
 
Unit 3 maintain yourself in professional practice
Unit 3    maintain yourself in professional practiceUnit 3    maintain yourself in professional practice
Unit 3 maintain yourself in professional practice
 
Course outline pp_2
Course outline pp_2Course outline pp_2
Course outline pp_2
 
System and network administration network services
System and network administration network servicesSystem and network administration network services
System and network administration network services
 
Unit 3 maintain yourself in professional practice
Unit 3    maintain yourself in professional practiceUnit 3    maintain yourself in professional practice
Unit 3 maintain yourself in professional practice
 
Professionalism
ProfessionalismProfessionalism
Professionalism
 
Pro in the_workplace2
Pro in the_workplace2Pro in the_workplace2
Pro in the_workplace2
 
Professional ethics in_computing
Professional ethics in_computingProfessional ethics in_computing
Professional ethics in_computing
 
Effective time-management
Effective time-managementEffective time-management
Effective time-management
 
Digital divide
Digital divideDigital divide
Digital divide
 
Course outline pp
Course outline ppCourse outline pp
Course outline pp
 
Computer crime
Computer crimeComputer crime
Computer crime
 
Maintain yourself in professional practice
Maintain yourself in professional practiceMaintain yourself in professional practice
Maintain yourself in professional practice
 
Time management
Time managementTime management
Time management
 
Time management,planning and prioritization
Time management,planning and prioritizationTime management,planning and prioritization
Time management,planning and prioritization
 
Student attendancereportofit 105(a)
Student attendancereportofit 105(a)Student attendancereportofit 105(a)
Student attendancereportofit 105(a)
 
Privacy and personal information
Privacy and personal informationPrivacy and personal information
Privacy and personal information
 

Recently uploaded

The Coffee Bean & Tea Leaf(CBTL), Business strategy case study
The Coffee Bean & Tea Leaf(CBTL), Business strategy case studyThe Coffee Bean & Tea Leaf(CBTL), Business strategy case study
The Coffee Bean & Tea Leaf(CBTL), Business strategy case studyEthan lee
 
Call Girls in Gomti Nagar - 7388211116 - With room Service
Call Girls in Gomti Nagar - 7388211116  - With room ServiceCall Girls in Gomti Nagar - 7388211116  - With room Service
Call Girls in Gomti Nagar - 7388211116 - With room Servicediscovermytutordmt
 
Keppel Ltd. 1Q 2024 Business Update Presentation Slides
Keppel Ltd. 1Q 2024 Business Update  Presentation SlidesKeppel Ltd. 1Q 2024 Business Update  Presentation Slides
Keppel Ltd. 1Q 2024 Business Update Presentation SlidesKeppelCorporation
 
Insurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usageInsurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usageMatteo Carbone
 
Call Girls In Panjim North Goa 9971646499 Genuine Service
Call Girls In Panjim North Goa 9971646499 Genuine ServiceCall Girls In Panjim North Goa 9971646499 Genuine Service
Call Girls In Panjim North Goa 9971646499 Genuine Serviceritikaroy0888
 
VIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service Jamshedpur
VIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service JamshedpurVIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service Jamshedpur
VIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service JamshedpurSuhani Kapoor
 
Cash Payment 9602870969 Escort Service in Udaipur Call Girls
Cash Payment 9602870969 Escort Service in Udaipur Call GirlsCash Payment 9602870969 Escort Service in Udaipur Call Girls
Cash Payment 9602870969 Escort Service in Udaipur Call GirlsApsara Of India
 
Value Proposition canvas- Customer needs and pains
Value Proposition canvas- Customer needs and painsValue Proposition canvas- Customer needs and pains
Value Proposition canvas- Customer needs and painsP&CO
 
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...Lviv Startup Club
 
7.pdf This presentation captures many uses and the significance of the number...
7.pdf This presentation captures many uses and the significance of the number...7.pdf This presentation captures many uses and the significance of the number...
7.pdf This presentation captures many uses and the significance of the number...Paul Menig
 
9599632723 Top Call Girls in Delhi at your Door Step Available 24x7 Delhi
9599632723 Top Call Girls in Delhi at your Door Step Available 24x7 Delhi9599632723 Top Call Girls in Delhi at your Door Step Available 24x7 Delhi
9599632723 Top Call Girls in Delhi at your Door Step Available 24x7 DelhiCall Girls in Delhi
 
KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...
KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...
KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...Any kyc Account
 
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...Dipal Arora
 
Best Basmati Rice Manufacturers in India
Best Basmati Rice Manufacturers in IndiaBest Basmati Rice Manufacturers in India
Best Basmati Rice Manufacturers in IndiaShree Krishna Exports
 
0183760ssssssssssssssssssssssssssss00101011 (27).pdf
0183760ssssssssssssssssssssssssssss00101011 (27).pdf0183760ssssssssssssssssssssssssssss00101011 (27).pdf
0183760ssssssssssssssssssssssssssss00101011 (27).pdfRenandantas16
 
VIP Kolkata Call Girl Howrah 👉 8250192130 Available With Room
VIP Kolkata Call Girl Howrah 👉 8250192130  Available With RoomVIP Kolkata Call Girl Howrah 👉 8250192130  Available With Room
VIP Kolkata Call Girl Howrah 👉 8250192130 Available With Roomdivyansh0kumar0
 
Boost the utilization of your HCL environment by reevaluating use cases and f...
Boost the utilization of your HCL environment by reevaluating use cases and f...Boost the utilization of your HCL environment by reevaluating use cases and f...
Boost the utilization of your HCL environment by reevaluating use cases and f...Roland Driesen
 
M.C Lodges -- Guest House in Jhang.
M.C Lodges --  Guest House in Jhang.M.C Lodges --  Guest House in Jhang.
M.C Lodges -- Guest House in Jhang.Aaiza Hassan
 

Recently uploaded (20)

The Coffee Bean & Tea Leaf(CBTL), Business strategy case study
The Coffee Bean & Tea Leaf(CBTL), Business strategy case studyThe Coffee Bean & Tea Leaf(CBTL), Business strategy case study
The Coffee Bean & Tea Leaf(CBTL), Business strategy case study
 
Call Girls in Gomti Nagar - 7388211116 - With room Service
Call Girls in Gomti Nagar - 7388211116  - With room ServiceCall Girls in Gomti Nagar - 7388211116  - With room Service
Call Girls in Gomti Nagar - 7388211116 - With room Service
 
Keppel Ltd. 1Q 2024 Business Update Presentation Slides
Keppel Ltd. 1Q 2024 Business Update  Presentation SlidesKeppel Ltd. 1Q 2024 Business Update  Presentation Slides
Keppel Ltd. 1Q 2024 Business Update Presentation Slides
 
Insurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usageInsurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usage
 
Call Girls In Panjim North Goa 9971646499 Genuine Service
Call Girls In Panjim North Goa 9971646499 Genuine ServiceCall Girls In Panjim North Goa 9971646499 Genuine Service
Call Girls In Panjim North Goa 9971646499 Genuine Service
 
VIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service Jamshedpur
VIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service JamshedpurVIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service Jamshedpur
VIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service Jamshedpur
 
Cash Payment 9602870969 Escort Service in Udaipur Call Girls
Cash Payment 9602870969 Escort Service in Udaipur Call GirlsCash Payment 9602870969 Escort Service in Udaipur Call Girls
Cash Payment 9602870969 Escort Service in Udaipur Call Girls
 
Value Proposition canvas- Customer needs and pains
Value Proposition canvas- Customer needs and painsValue Proposition canvas- Customer needs and pains
Value Proposition canvas- Customer needs and pains
 
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...
 
7.pdf This presentation captures many uses and the significance of the number...
7.pdf This presentation captures many uses and the significance of the number...7.pdf This presentation captures many uses and the significance of the number...
7.pdf This presentation captures many uses and the significance of the number...
 
Nepali Escort Girl Kakori \ 9548273370 Indian Call Girls Service Lucknow ₹,9517
Nepali Escort Girl Kakori \ 9548273370 Indian Call Girls Service Lucknow ₹,9517Nepali Escort Girl Kakori \ 9548273370 Indian Call Girls Service Lucknow ₹,9517
Nepali Escort Girl Kakori \ 9548273370 Indian Call Girls Service Lucknow ₹,9517
 
9599632723 Top Call Girls in Delhi at your Door Step Available 24x7 Delhi
9599632723 Top Call Girls in Delhi at your Door Step Available 24x7 Delhi9599632723 Top Call Girls in Delhi at your Door Step Available 24x7 Delhi
9599632723 Top Call Girls in Delhi at your Door Step Available 24x7 Delhi
 
KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...
KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...
KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...
 
VVVIP Call Girls In Greater Kailash ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...
VVVIP Call Girls In Greater Kailash ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...VVVIP Call Girls In Greater Kailash ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...
VVVIP Call Girls In Greater Kailash ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...
 
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
 
Best Basmati Rice Manufacturers in India
Best Basmati Rice Manufacturers in IndiaBest Basmati Rice Manufacturers in India
Best Basmati Rice Manufacturers in India
 
0183760ssssssssssssssssssssssssssss00101011 (27).pdf
0183760ssssssssssssssssssssssssssss00101011 (27).pdf0183760ssssssssssssssssssssssssssss00101011 (27).pdf
0183760ssssssssssssssssssssssssssss00101011 (27).pdf
 
VIP Kolkata Call Girl Howrah 👉 8250192130 Available With Room
VIP Kolkata Call Girl Howrah 👉 8250192130  Available With RoomVIP Kolkata Call Girl Howrah 👉 8250192130  Available With Room
VIP Kolkata Call Girl Howrah 👉 8250192130 Available With Room
 
Boost the utilization of your HCL environment by reevaluating use cases and f...
Boost the utilization of your HCL environment by reevaluating use cases and f...Boost the utilization of your HCL environment by reevaluating use cases and f...
Boost the utilization of your HCL environment by reevaluating use cases and f...
 
M.C Lodges -- Guest House in Jhang.
M.C Lodges --  Guest House in Jhang.M.C Lodges --  Guest House in Jhang.
M.C Lodges -- Guest House in Jhang.
 

Freedom of speech

  • 1. A Gift of Fire, 2ed Chapter 5: Freedom of Speech in Cyberspace 1 Social, Legal, and Ethical Issues for Computers and the Internet Freedom of Speech In Cyberspace
  • 2. A Gift of Fire, 2ed Chapter 5: Freedom of Speech in Cyberspace 2 A Gift of Fire Freedom of Speech In Cyberspace Changing Communications Paradigms Offensive Speech and Censorship in Cyberspace Anonymity Spam Ensuring Valuable and Diverse Content
  • 3. A Gift of Fire, 2ed Chapter 5: Freedom of Speech in Cyberspace 3 Changing Communications Paradigms Regulatory Paradigms Communication technologies differ with respect to their degree of First Amendment protection and government regulation. Print Media: • Strongest First Amendment protection (books have been banned, but the trend has been toward fewer government restraints). Broadcast Media: • Less First Amendment protection than print media (TV and Radio stations are licensed by the gov’t…not print outlets). Common Carrier (telephone, telegraph, postal system): • Content not controlled and the carrier is not responsible for content.
  • 4. A Gift of Fire, 2ed Chapter 5: Freedom of Speech in Cyberspace 4 Changing Communications Paradigms Regulatory Paradigms (cont’d) Internet, BBSs, commercial online services, and the WWW: • Not exactly print media. • Not exactly broadcast media. • Not exactly common carrier. Q: Who controls the distribution of news, information, and opinion at the online service you use? at the Web sites you frequent?
  • 5. A Gift of Fire, 2ed Chapter 5: Freedom of Speech in Cyberspace 5 Changing Communications Paradigms The First Amendment Protects Citizens From Government • Prohibits restriction of speech, press, peaceful assembly, and religion. Subsequent Interpretations Address: • Offensive and/or controversial speech and ideas, • Spoken and written words, • Pictures, art, and other forms of expression and opinion, and • Commercial speech (e.g. advertising). Q: Should all speech be constitutionally protected?
  • 6. A Gift of Fire, 2ed Chapter 5: Freedom of Speech in Cyberspace 6 Offensive Speech and Censorship in Cyberspace Speech Might Include: • Political or religious speech. • Pornography (Multibillion-dollar online business). • Sexual or racial slurs. • Nazi materials. • Libelous statements. • Abortion information. • Alcohol ads. Q: Identify other forms of speech found in cyberspace that some consider offensive.
  • 7. A Gift of Fire, 2ed Chapter 5: Freedom of Speech in Cyberspace 7 Offensive Speech and Censorship in Cyberspace Miller v. California Material is considered obscene if all three parts are met: 1. It depicts sexual (or excretory) acts whose depiction is specifically prohibited by state law, and 2. It depicts these acts in a patently offensive manner, appealing to the prurient interest as judged by a reasonable person using community standards, and 3. It has no serious literary, artistic, social, political, or scientific value. Q: Historically, how have local “community standards” affected censorship of speech in cyberspace? (see next page)
  • 8. A Gift of Fire, 2ed Chapter 5: Freedom of Speech in Cyberspace 8 Straining Old Legal Standards No physical locations on the internet. Page 198…
  • 9. A Gift of Fire, 2ed Chapter 5: Freedom of Speech in Cyberspace 9 Offensive Speech and Censorship in Cyberspace Material Inappropriate for Children Technology Changes the Context • On the Web, children have access to the same ‘adult’ text, images, videos, etc. as adults (no “tickettaker” to check age). • Online proprietors don’t know the customer is not an adult. Protecting Children Regardless of the medium: – It is illegal to create, possess or distribute child pornography. (Because creation of it is child abuse...) – It is illegal to lure children into sexual activity. Q: How should children be protected from access in cyberspace to adult material? (next page)
  • 10. A Gift of Fire, 2ed Chapter 5: Freedom of Speech in Cyberspace 10 Protect Children Software filtering: Bess Cyber Patrol, Surf-Watch
  • 11. A Gift of Fire, 2ed Chapter 5: Freedom of Speech in Cyberspace 11 Offensive Speech and Censorship in Cyberspace Censorship Laws Communications Decency Act (CDA, 1996) • Publicity and public pressure lead Congress to pass this act. • Anyone who made available to anyone under 18 any communication that is obscene or indecent would be subject to a $100,000 fine and two years in prison. • American Civil Liberties Union (and other free speech advocates) found this law to be a “profound threat to freedom of expression. • In 1997, the CDA was ruled unconstitutional because it was too vague and too broad in protecting children online and because less restrictive means are available. Q: Should content on the Internet have as much First Amendment protection as printed material?
  • 12. A Gift of Fire, 2ed Chapter 5: Freedom of Speech in Cyberspace 12 Offensive Speech and Censorship in Cyberspace Censorship Laws (cont’d) Child Online Protection Act (COPA, 1998) • Commercial Web sites that make available to minors materials “harmful to minors”, as judged by community standards would be subject to a $50,000 fine and six months in jail. • In 2000 and 2003, COPA was ruled unconstitutional by a federal court. Q: How are children protected from “harmful” material outside of Cyberspace?
  • 13. A Gift of Fire, 2ed Chapter 5: Freedom of Speech in Cyberspace 13 Offensive Speech and Censorship in Cyberspace Censorship Laws (cont’d) Children’s Internet Protection Act (CIPA) • Any school or library receiving federal Internet funds must install filtering software on all Internet terminals. • Filters must block sites containing child pornography, obscene material, and any material deemed “harmful to minors.” • A federal appeals court ruled a major part of CIPA unconstitutional in 2002 but the Supreme Court upheld the law in 2003. Q: How does CIPA affect adults accessing online material at a public library that uses filtering software? See page 206…
  • 14. A Gift of Fire, 2ed Chapter 5: Freedom of Speech in Cyberspace 14 Offensive Speech and Censorship in Cyberspace Limiting Internet Access in Libraries and Schools Filtering Software • Benefit: prevent access to inappropriate material on the Internet by screening words or phrases, blocking sites according to rating system, or disallowing access to specific sites in a list. • Problems: can be ineffective—kids get around the filters; the words, phrases, rating systems, etc. are subjective; “banned” keywords can be overly restrictive for adult users and for legitimate use by minors. • See page 205 for a list of filtered sites… Q: What has been your experience with filtering software?
  • 15. A Gift of Fire, 2ed Chapter 5: Freedom of Speech in Cyberspace 15 Offensive Speech and Censorship in Cyberspace Challenging Old Regulatory Paradigms and Special Interests License required: • To practice law. • To publish traditional newsletters about commodities and futures investing (prior to 2000). No license required: • To create downloadable, self-help legal software. • To publish newsletters about, developing software for, and operating Web sites concerning commodities and futures investing (since 2000). Q: Is online advertising of wine free speech or disregard for the regulatory rights of state governments?
  • 16. A Gift of Fire, 2ed Chapter 5: Freedom of Speech in Cyberspace 16 Offensive Speech and Censorship in Cyberspace Censorship On the Global Net Global Impact • Avoiding censorship: the global nature of the Net allows restrictions (or barriers) in one country to be circumvented by using networks in other, less restrictive countries. • Creating censorship: the global nature of the Net makes it easier for one nation to impose restrictive standards on others. Cases page 210. Q: Why are online gambling sites established offshore?
  • 17. A Gift of Fire, 2ed Chapter 5: Freedom of Speech in Cyberspace 17 Anonymity Common Sense and the Internet • Early publications by some of our Founding Fathers were published under pseudonyms. • Today, there are publications on the Net that are posted anonymously. • Anonymizer.com Surf the web/send e-mail anonymously Q: What are the drawbacks of anonymous Web postings? (See next slide)
  • 18. A Gift of Fire, 2ed Chapter 5: Freedom of Speech in Cyberspace 18 Against Anonymity • Potential to shield criminal/anti-social activity – Fraud, harassment, and extortion – Distribution of child pornography – Libel or threatening others with impunity – Infringe copyrights by posting software – Plan terrorist attacks • Poor “netiquette”
  • 19. A Gift of Fire, 2ed Chapter 5: Freedom of Speech in Cyberspace 19 Anonymity Is Anonymity Protected? Conflicts between political freedom of speech and campaign regulations: • Anonymity protects against retaliation and embarrassment. • Anonymity violates rules established by the Federal Elections Commission (FEC) Case page 215. Q: Should anonymous political speech on the Web be regulated?
  • 20. A Gift of Fire, 2ed Chapter 5: Freedom of Speech in Cyberspace 20 Anonymity Anonymity vs. Community Supporters of anonymity: • Say it is necessary to protect privacy and free speech. Opponents of anonymity: • Believe it is anti-social and allows criminals to hide from law enforcement. Q: How is the practice of anonymity online similar/dissimilar to strong encryption? VERY similar…challenging to law enforcement.
  • 21. A Gift of Fire, 2ed Chapter 5: Freedom of Speech in Cyberspace 21 Spam What Is the Problem? Unsolicited, mass e-mail: • is cheap to senders but may impose costs on the recipient’s time and/or the recipient’s online account. • may contain objectionable content (political, commercial ads, solicitations for funds, pornography, etc.). • may contain a disguised return address. • may pass through filters. • invades privacy. • creates a financial and managerial burden on ISPs. Q: How do you handle spam?
  • 22. A Gift of Fire, 2ed Chapter 5: Freedom of Speech in Cyberspace 22 Spam Cases and Free Speech Issues AOL v. Cyber Promotions • AOL and other service providers have successfully sued spammers because of the cost burden imposed. Page 219. Disgruntled Intel Employee • Initially, a court ruled that non-commercial spam to Intel employees at their Intel e-mail accounts was a form of trespass. • The CA Supreme Court ruled that it was not.
  • 23. A Gift of Fire, 2ed Chapter 5: Freedom of Speech in Cyberspace 23 Spam Solutions • Technology: filters that screen out spam. • Market Pressure: services that list spammers. • Business Policy: at the discretion of the recipient, all e-mail would be charged a microfee. • Law: create restrictions that are consistent with the First Amendment. • Vigilantism: punish spammers by hacking into their phone or computer systems. Q: Which solution above, or others, do you support?
  • 24. A Gift of Fire, 2ed Chapter 5: Freedom of Speech in Cyberspace 24 Ensuring Valuable and Diverse Content Points to Consider: • Is there a balance between commercial and educational information on the Web? • Should diverse content on the Web be subsidized with taxes? • Should valuable content on the Web be regulated? • Do we need to ensure the existence of sites containing civic information? • Are more sites that promote the arts and culture needed? Q: How do we ensure valuable and diverse content in traditional forms of media?