SlideShare a Scribd company logo
1 of 50
Write your reaction
to the presentation
Reflection:
Copyright © 2018, 2013, 2008 Pearson Education, Inc. All Rights Reserved
Chapter 3:
Freedom of Speech
Based on slides prepared by Cyndi Chie,
Sarah Frye and Sharon Gray.
Fifth edition updated by Timothy Henry
Copyright © 2018, 2013, 2008 Pearson Education, Inc. All Rights Reserved
 Communication Paradigms
 Controlling Speech
 Posting, Selling, and Leaking Sensitive Material
 Anonymity
 The Global Net: Censorship and Political
Freedom
 Net Neutrality Regulations or the Market?
Copyright © 2018, 2013, 2008 Pearson Education, Inc. All Rights Reserved
Regulating communications media
 First Amendment protection and government
regulation
 Print media (newspapers, magazines, books)
 Broadcast (television, radio)
 Common carries (telephones, postal system)
Copyright © 2018, 2013, 2008 Pearson Education, Inc. All Rights Reserved
Telecommunication Act of 1996
 Changed regulatory structure and removed
artificial legal divisions of service areas and
restrictions on services that telephone
companies can provide.
 No provider or user of interactive computer
services shall be treated as a publisher of any
information provided by another information-
content provider.
Copyright © 2018, 2013, 2008 Pearson Education, Inc. All Rights Reserved
Communications Decency Act of 1996
 First major Internet censorship law
 Main parts ruled unconstitutional
Copyright © 2018, 2013, 2008 Pearson Education, Inc. All Rights Reserved
Free-speech Principles
 Written for offensive and/or controversial
speech and ideas
 Covers spoken and written words, pictures, art,
and other forms of expression of ideas and
opinions
 Restriction on the power of government, not
individuals or private businesses
Copyright © 2018, 2013, 2008 Pearson Education, Inc. All Rights Reserved
Free-speech Principles
 Supreme Court principles and guidelines
 Advocating illegal acts is (usually) legal.
 Anonymous speech is protected.
 Some restrictions are allowed on advertising.
 Libel and direct, specific threats are not
protected.
 Inciting violence is illegal.
Copyright © 2018, 2013, 2008 Pearson Education, Inc. All Rights Reserved
Offensive speech: What is it? What is illegal?
 Answers depend on who you are.
 Most efforts to censor the Internet focus on
pornographic and other sexually explicit
material
Copyright © 2018, 2013, 2008 Pearson Education, Inc. All Rights Reserved
What was already illegal?
 Obscenity
 Depicts a sexual act against state law
 Depicts these acts in a patently offensive
manner that appeals to prurient interest as
judged by a reasonable person using
community standards
 Lacks literary, artistic, social, political or
scientific value
Copyright © 2018, 2013, 2008 Pearson Education, Inc. All Rights Reserved
Straining old legal standards
 The definition of “community”
 The definition of “distribution”
Copyright © 2018, 2013, 2008 Pearson Education, Inc. All Rights Reserved
Freedom of speech guidelines
 Distinguish speech from action. Advocating illegal
acts is (usually) legal.
 Laws must not chill expression of legal speech.
 Do not reduce adults to reading only what is fit for
children.
 Solve speech problems by least restrictive means.
Copyright © 2018, 2013, 2008 Pearson Education, Inc. All Rights Reserved
Internet Censorship Laws & Alternatives
 Communications Decency Act of 1996 (CDA)
 Attempted to avoid conflict with First Amendment by
focusing on children
 Made it a crime to make available to anyone under 18
any obscene or indecent communication
 Found to be unconstitutional
 The worst material threatening children was already
illegal
 It was too vague and broad
 It did not use the least restrictive means of
accomplishing the goal of protecting children
Copyright © 2018, 2013, 2008 Pearson Education, Inc. All Rights Reserved
Internet Censorship Laws & Alternatives
 Child Online Protection Act of 1998 (COPA)
 More limited than CDA
 Federal crime for commercial Web sites to make
available to minors material “harmful to minors” as
judged by community standards
 Found to be unconstitutional
 It was too broad
 It would restrict the entire country to the standards of
the most conservative community
 It would have a chilling effect
Copyright © 2018, 2013, 2008 Pearson Education, Inc. All Rights Reserved
Internet Censorship Laws & Alternatives
 Children's Internet Protection Act of 2000 (CIPA)
 Requires schools and libraries that participate in
certain federal programs to install filtering software
 Upheld in court
 Does not violate First Amendment since it does not
require the use of filters, impose jail or fines
 It sets a condition for receipt of certain federal funds
Copyright © 2018, 2013, 2008 Pearson Education, Inc. All Rights Reserved
Video Games
 A California law banned sale or rental of
violent video games to minors.
 In 2011, the Supreme Court of California
ruled it violated the First Amendment.
Copyright © 2018, 2013, 2008 Pearson Education, Inc. All Rights Reserved
Alternatives to censorship
 Filters
 Blocks sites with specific words, phrases or images
 Parental control for sex and violence
 Updated frequently but may still screen out too much
or too little
 Not possible to eliminate all errors
 What should be blocked?
Copyright © 2018, 2013, 2008 Pearson Education, Inc. All Rights Reserved
Alternatives to censorship
 Policies
 Commercial services, online communities, and social
networking sites develop policies to protect
members.
 Video game industry developed rating system that
provides an indication for parents about the amount
of sex, profanity, and violence in a game.
Copyright © 2018, 2013, 2008 Pearson Education, Inc. All Rights Reserved
Discussion Question
 Why is ‘least restrictive means’ important?
 Do you consider the Internet an appropriate
tool for young children? Why or why not?
Copyright © 2018, 2013, 2008 Pearson Education, Inc. All Rights Reserved
Child Pornography
 Includes pictures or videos of actual minors
(children under 18) engaged in sexually explicit
conduct.
 Production is illegal primarily because of abuse
of the actual children, not because of the impact
of the content on a viewer.
Copyright © 2018, 2013, 2008 Pearson Education, Inc. All Rights Reserved
Child Pornography
 Congress extended the law against child
pornography to include “virtual” child
pornography.
 The Supreme Court ruled the law violated the
First Amendment.
 The Court accepted a later law providing harsh
penalties for certain categories of computer-
generated and cartoon-type images.
Copyright © 2018, 2013, 2008 Pearson Education, Inc. All Rights Reserved
Sexting
 Sending sexually suggestive or explicit text or
photos, usually by cellphone or social media
 Can meet the definition of child pornography if
subject is under 18
Copyright © 2018, 2013, 2008 Pearson Education, Inc. All Rights Reserved
Spam
 What’s the problem?
 Loosely described as unsolicited bulk email
 Mostly commercial advertisement
 Angers people because of content and the way it’s sent
 Free speech issues
 Spam imposes a cost on recipients
 Spam filters do not violate free speech (free speech
does not require anyone to listen)
Copyright © 2018, 2013, 2008 Pearson Education, Inc. All Rights Reserved
Spam
 Anti-spam Laws
 Controlling the Assault of Non-Solicited Pornography
and Marketing Act (CAN-SPAM Act)
 Targets commercial spam
 Criticized for not banning all spam, legitimized
commercial spam
Copyright © 2018, 2013, 2008 Pearson Education, Inc. All Rights Reserved
“Free speech is enhanced by civility.”
-Tim O’Reilly
Copyright © 2018, 2013, 2008 Pearson Education, Inc. All Rights Reserved
 Policies of large companies
 A Web site with risks
Copyright © 2018, 2013, 2008 Pearson Education, Inc. All Rights Reserved
 Leaks
 Type of material
 Value to society
 Risks to society and individuals
Copyright © 2018, 2013, 2008 Pearson Education, Inc. All Rights Reserved
 Leaks
 Examples
 WikiLeaks
 Climategate
Copyright © 2018, 2013, 2008 Pearson Education, Inc. All Rights Reserved
 Leaks
 Potentially dangerous leaks
 Releasing a huge mass of documents
Copyright © 2018, 2013, 2008 Pearson Education, Inc. All Rights Reserved
Discussion Question
 Does the value of informing the public of
controversial and sensitive information outweigh
the dangers and risks?
Copyright © 2018, 2013, 2008 Pearson Education, Inc. All Rights Reserved
 Leaks
 Responsibilities of operators of Web sites for leaks
Copyright © 2018, 2013, 2008 Pearson Education, Inc. All Rights Reserved
 Common Sense and Federalist Papers
Copyright © 2018, 2013, 2008 Pearson Education, Inc. All Rights Reserved
 Positive uses of anonymity
 Protect political speech
 Protect against retaliation and
embarrassment
 Anonymizing services
 used by individuals, businesses, law
enforcement agencies, and government
intelligence services
Copyright © 2018, 2013, 2008 Pearson Education, Inc. All Rights Reserved
 Negative uses of anonymity
 protects criminal and antisocial activities
 aids fraud, harassment, extortion, distribution
of child pornography, theft, and copyright
infringement
 masks illegal surveillance by government
agencies
Copyright © 2018, 2013, 2008 Pearson Education, Inc. All Rights Reserved
 Is anonymity protected?
 Many legal issues about anonymity are similar to
those discussed in Chapter 2.
Copyright © 2018, 2013, 2008 Pearson Education, Inc. All Rights Reserved
Discussion Questions
 Where (if anywhere) is anonymity
appropriate on the Internet?
 What are some kinds of Web sites that should
prohibit anonymity?
 Where (if anywhere) should laws prohibit
anonymity on the Internet?
Copyright © 2018, 2013, 2008 Pearson Education, Inc. All Rights Reserved
Tools for communication, tools for oppression
 Authoritarian governments have impeded flow of
information and opinion throughout history.
 The vibrant communication of the Internet threatens
governments in countries that lack political and cultural
freedom.
Copyright © 2018, 2013, 2008 Pearson Education, Inc. All Rights Reserved
Tools for communication, tools for oppression
 Attempts to limit the flow of information on the Internet
similar to earlier attempts to place limits on other
communications media
 Some countries own the Internet backbone within their
countries and block specific sites and content at the
border
 Some countries ban all or certain types of access to the
Internet
Copyright © 2018, 2013, 2008 Pearson Education, Inc. All Rights Reserved
Tools for communication, tools for oppression
 Avoiding censorship: the global nature of the Net allows
restrictions (or barriers) in one country to be
circumvented by using networks in other, less restrictive
countries.
 Creating censorship: the global nature of the Net makes it
easier for one nation to impose restrictive standards on
others.
Copyright © 2018, 2013, 2008 Pearson Education, Inc. All Rights Reserved
“The office of communications is ordered to find ways to
ensure that the use of the Internet becomes impossible.
The Ministry for the Promotion of Virtue and Prevention of
Vice is obliged to monitor the order and punish violators.”
- Excerpt from Taliban edict banning Internet use in Afghanistan (2001)
Copyright © 2018, 2013, 2008 Pearson Education, Inc. All Rights Reserved
Discussion Question
 Will the Internet and related communication
technologies be tools for increasing political
freedom, or will they give more power to
governments to spy on, control, and restrict
their people?
Copyright © 2018, 2013, 2008 Pearson Education, Inc. All Rights Reserved
Aiding foreign censors and repressive regimes
 Yahoo and French censorship
 Yahoo, eBay and others make decisions to
comply with foreign laws for business reasons
 Skype and Chinese control
 Chinese government requires modified
version of Skype
Copyright © 2018, 2013, 2008 Pearson Education, Inc. All Rights Reserved
Aiding foreign censors and repressive regimes
 Companies who do business in countries that
control Internet access must comply with the
local laws
 Google argued that some access is better than
no access
Copyright © 2018, 2013, 2008 Pearson Education, Inc. All Rights Reserved
Discussion Questions
 When U.S. or other non-Chinese companies set up
branches in China and comply with restrictive laws,
should we view them as providing more access to
information in China than would otherwise exist,
albeit not as much as is technically possible?
 Should we view them as partners in the Chinese
government’s ethically unacceptable restriction on
debate and access to information by its citizens?
 Should we view them as appropriately respecting the
culture and laws of the host country?
Copyright © 2018, 2013, 2008 Pearson Education, Inc. All Rights Reserved
Discussion Questions
 What impact does the global net have on free
speech?
 Does censorship in other countries have an
impact on free speech in the U.S.?
 How does free speech in ‘free countries’ impact
more restrictive countries?
Copyright © 2018, 2013, 2008 Pearson Education, Inc. All Rights Reserved
Selling surveillance tools
 Repressive governments intercept citizens’
communications and filter Internet content.
 Companies in Western democracies sell them
the sophisticated tools to do so.
Copyright © 2018, 2013, 2008 Pearson Education, Inc. All Rights Reserved
Shutting down communications in free countries
 Public safety
 In the U.S., the Supreme Court would probably
declare unconstitutional a law that authorized a
government agency to order a private
communications service to shut down.
Copyright © 2018, 2013, 2008 Pearson Education, Inc. All Rights Reserved
 Net Neutrality
 Refers to a variety of proposals for restrictions
on how telephone and cable companies
interact with their broadband customers and
set fees for services.
Copyright © 2018, 2013, 2008 Pearson Education, Inc. All Rights Reserved
 Net Neutrality
 Argue for equal treatment of all customers
 Market
 Flexibility and market incentives will benefit
customers
Copyright © 2018, 2013, 2008 Pearson Education, Inc. All Rights Reserved
Discussion Questions
 Should companies be permitted to exclude or
give special treatment to content transmitted
based on the content itself or on the company
that provides it?
 Should companies be permitted to provide
different levels of speed at different prices?
Copyright © 2018, 2013, 2008 Pearson Education, Inc. All Rights Reserved

More Related Content

Similar to Baase_Henry_GoF5e_Ch3.pptx Gift of Fire

C8-Ethical, Social, & Political Issues in Ecommerce.PPT
C8-Ethical, Social, & Political Issues in Ecommerce.PPTC8-Ethical, Social, & Political Issues in Ecommerce.PPT
C8-Ethical, Social, & Political Issues in Ecommerce.PPTSyazwaniYa
 
Hrc law, business protection series 2019, employees and social media
Hrc law, business protection series 2019, employees and social mediaHrc law, business protection series 2019, employees and social media
Hrc law, business protection series 2019, employees and social mediaHRC Law LLP
 
StartPad Countdown 6 - ACLU 2.0: Demand Your dotRights
StartPad Countdown 6 - ACLU 2.0: Demand Your dotRightsStartPad Countdown 6 - ACLU 2.0: Demand Your dotRights
StartPad Countdown 6 - ACLU 2.0: Demand Your dotRightsStart Pad
 
Chp10 public policy
Chp10 public policyChp10 public policy
Chp10 public policyEngr Razaque
 
2ndnov_txicybersec& SAFETY.pptx
2ndnov_txicybersec& SAFETY.pptx2ndnov_txicybersec& SAFETY.pptx
2ndnov_txicybersec& SAFETY.pptxSSPTRGCELL
 
Your Best Practice Guide to Social Media and the Law
Your Best Practice Guide to Social Media and the LawYour Best Practice Guide to Social Media and the Law
Your Best Practice Guide to Social Media and the LawNexus Publishing
 
6-Ch04-Ethics regarding IS _15Ed.pptx
6-Ch04-Ethics regarding IS _15Ed.pptx6-Ch04-Ethics regarding IS _15Ed.pptx
6-Ch04-Ethics regarding IS _15Ed.pptxAliHamza541704
 
Smart City Lecture 2 - Privacy in the Smart City
Smart City Lecture 2 - Privacy in the Smart CitySmart City Lecture 2 - Privacy in the Smart City
Smart City Lecture 2 - Privacy in the Smart CityPeter Waher
 
Laudon traver ec10-im_ch08
Laudon traver ec10-im_ch08Laudon traver ec10-im_ch08
Laudon traver ec10-im_ch08BookStoreLib
 
Laudon traver ec10-im_ch08
Laudon traver ec10-im_ch08Laudon traver ec10-im_ch08
Laudon traver ec10-im_ch08BookStoreLib
 
Baase_Henry_GoF5e_Ch4.pptx Gift of Fire Cp,[
Baase_Henry_GoF5e_Ch4.pptx Gift of Fire Cp,[Baase_Henry_GoF5e_Ch4.pptx Gift of Fire Cp,[
Baase_Henry_GoF5e_Ch4.pptx Gift of Fire Cp,[dordunureubenmawukok
 
Managing Legal Risks In Affiliate Marketing
Managing Legal Risks In Affiliate MarketingManaging Legal Risks In Affiliate Marketing
Managing Legal Risks In Affiliate MarketingAffiliate Summit
 
Article 1 currently, smartphone, web, and social networking techno
Article 1 currently, smartphone, web, and social networking technoArticle 1 currently, smartphone, web, and social networking techno
Article 1 currently, smartphone, web, and social networking technohoney690131
 

Similar to Baase_Henry_GoF5e_Ch3.pptx Gift of Fire (20)

Cyber law
Cyber lawCyber law
Cyber law
 
EC358-CH8.ppt
EC358-CH8.pptEC358-CH8.ppt
EC358-CH8.ppt
 
C8-Ethical, Social, & Political Issues in Ecommerce.PPT
C8-Ethical, Social, & Political Issues in Ecommerce.PPTC8-Ethical, Social, & Political Issues in Ecommerce.PPT
C8-Ethical, Social, & Political Issues in Ecommerce.PPT
 
Hrc law, business protection series 2019, employees and social media
Hrc law, business protection series 2019, employees and social mediaHrc law, business protection series 2019, employees and social media
Hrc law, business protection series 2019, employees and social media
 
StartPad Countdown 6 - ACLU 2.0: Demand Your dotRights
StartPad Countdown 6 - ACLU 2.0: Demand Your dotRightsStartPad Countdown 6 - ACLU 2.0: Demand Your dotRights
StartPad Countdown 6 - ACLU 2.0: Demand Your dotRights
 
Tag August2011
Tag August2011Tag August2011
Tag August2011
 
Chp10 public policy
Chp10 public policyChp10 public policy
Chp10 public policy
 
2ndnov_txicybersec& SAFETY.pptx
2ndnov_txicybersec& SAFETY.pptx2ndnov_txicybersec& SAFETY.pptx
2ndnov_txicybersec& SAFETY.pptx
 
Your Best Practice Guide to Social Media and the Law
Your Best Practice Guide to Social Media and the LawYour Best Practice Guide to Social Media and the Law
Your Best Practice Guide to Social Media and the Law
 
6-Ch04-Ethics regarding IS _15Ed.pptx
6-Ch04-Ethics regarding IS _15Ed.pptx6-Ch04-Ethics regarding IS _15Ed.pptx
6-Ch04-Ethics regarding IS _15Ed.pptx
 
Ppt by
Ppt by Ppt by
Ppt by
 
Smart City Lecture 2 - Privacy in the Smart City
Smart City Lecture 2 - Privacy in the Smart CitySmart City Lecture 2 - Privacy in the Smart City
Smart City Lecture 2 - Privacy in the Smart City
 
Laudon traver ec10-im_ch08
Laudon traver ec10-im_ch08Laudon traver ec10-im_ch08
Laudon traver ec10-im_ch08
 
Laudon traver ec10-im_ch08
Laudon traver ec10-im_ch08Laudon traver ec10-im_ch08
Laudon traver ec10-im_ch08
 
Baase_Henry_GoF5e_Ch4.pptx Gift of Fire Cp,[
Baase_Henry_GoF5e_Ch4.pptx Gift of Fire Cp,[Baase_Henry_GoF5e_Ch4.pptx Gift of Fire Cp,[
Baase_Henry_GoF5e_Ch4.pptx Gift of Fire Cp,[
 
Five Layers of School Safety
Five Layers of School SafetyFive Layers of School Safety
Five Layers of School Safety
 
Dennis and Defleur Ch. 13
Dennis and Defleur Ch. 13Dennis and Defleur Ch. 13
Dennis and Defleur Ch. 13
 
Managing Legal Risks In Affiliate Marketing
Managing Legal Risks In Affiliate MarketingManaging Legal Risks In Affiliate Marketing
Managing Legal Risks In Affiliate Marketing
 
Article 1 currently, smartphone, web, and social networking techno
Article 1 currently, smartphone, web, and social networking technoArticle 1 currently, smartphone, web, and social networking techno
Article 1 currently, smartphone, web, and social networking techno
 
Review questions
Review questionsReview questions
Review questions
 

Recently uploaded

TEST BANK For Principles of Anatomy and Physiology, 16th Edition by Gerard J....
TEST BANK For Principles of Anatomy and Physiology, 16th Edition by Gerard J....TEST BANK For Principles of Anatomy and Physiology, 16th Edition by Gerard J....
TEST BANK For Principles of Anatomy and Physiology, 16th Edition by Gerard J....rightmanforbloodline
 
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)Samir Dash
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
Less Is More: Utilizing Ballerina to Architect a Cloud Data Platform
Less Is More: Utilizing Ballerina to Architect a Cloud Data PlatformLess Is More: Utilizing Ballerina to Architect a Cloud Data Platform
Less Is More: Utilizing Ballerina to Architect a Cloud Data PlatformWSO2
 
How to Check CNIC Information Online with Pakdata cf
How to Check CNIC Information Online with Pakdata cfHow to Check CNIC Information Online with Pakdata cf
How to Check CNIC Information Online with Pakdata cfdanishmna97
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MIND CTI
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Zilliz
 
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...TrustArc
 
Modernizing Legacy Systems Using Ballerina
Modernizing Legacy Systems Using BallerinaModernizing Legacy Systems Using Ballerina
Modernizing Legacy Systems Using BallerinaWSO2
 
Stronger Together: Developing an Organizational Strategy for Accessible Desig...
Stronger Together: Developing an Organizational Strategy for Accessible Desig...Stronger Together: Developing an Organizational Strategy for Accessible Desig...
Stronger Together: Developing an Organizational Strategy for Accessible Desig...caitlingebhard1
 
Simplifying Mobile A11y Presentation.pptx
Simplifying Mobile A11y Presentation.pptxSimplifying Mobile A11y Presentation.pptx
Simplifying Mobile A11y Presentation.pptxMarkSteadman7
 
JohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptxJohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptxJohnPollard37
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistandanishmna97
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Jeffrey Haguewood
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxRemote DBA Services
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Victor Rentea
 
Quantum Leap in Next-Generation Computing
Quantum Leap in Next-Generation ComputingQuantum Leap in Next-Generation Computing
Quantum Leap in Next-Generation ComputingWSO2
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDropbox
 
Introduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDMIntroduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDMKumar Satyam
 
Navigating Identity and Access Management in the Modern Enterprise
Navigating Identity and Access Management in the Modern EnterpriseNavigating Identity and Access Management in the Modern Enterprise
Navigating Identity and Access Management in the Modern EnterpriseWSO2
 

Recently uploaded (20)

TEST BANK For Principles of Anatomy and Physiology, 16th Edition by Gerard J....
TEST BANK For Principles of Anatomy and Physiology, 16th Edition by Gerard J....TEST BANK For Principles of Anatomy and Physiology, 16th Edition by Gerard J....
TEST BANK For Principles of Anatomy and Physiology, 16th Edition by Gerard J....
 
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Less Is More: Utilizing Ballerina to Architect a Cloud Data Platform
Less Is More: Utilizing Ballerina to Architect a Cloud Data PlatformLess Is More: Utilizing Ballerina to Architect a Cloud Data Platform
Less Is More: Utilizing Ballerina to Architect a Cloud Data Platform
 
How to Check CNIC Information Online with Pakdata cf
How to Check CNIC Information Online with Pakdata cfHow to Check CNIC Information Online with Pakdata cf
How to Check CNIC Information Online with Pakdata cf
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)
 
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
 
Modernizing Legacy Systems Using Ballerina
Modernizing Legacy Systems Using BallerinaModernizing Legacy Systems Using Ballerina
Modernizing Legacy Systems Using Ballerina
 
Stronger Together: Developing an Organizational Strategy for Accessible Desig...
Stronger Together: Developing an Organizational Strategy for Accessible Desig...Stronger Together: Developing an Organizational Strategy for Accessible Desig...
Stronger Together: Developing an Organizational Strategy for Accessible Desig...
 
Simplifying Mobile A11y Presentation.pptx
Simplifying Mobile A11y Presentation.pptxSimplifying Mobile A11y Presentation.pptx
Simplifying Mobile A11y Presentation.pptx
 
JohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptxJohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptx
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptx
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
Quantum Leap in Next-Generation Computing
Quantum Leap in Next-Generation ComputingQuantum Leap in Next-Generation Computing
Quantum Leap in Next-Generation Computing
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
Introduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDMIntroduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDM
 
Navigating Identity and Access Management in the Modern Enterprise
Navigating Identity and Access Management in the Modern EnterpriseNavigating Identity and Access Management in the Modern Enterprise
Navigating Identity and Access Management in the Modern Enterprise
 

Baase_Henry_GoF5e_Ch3.pptx Gift of Fire

  • 1. Write your reaction to the presentation Reflection: Copyright © 2018, 2013, 2008 Pearson Education, Inc. All Rights Reserved
  • 2. Chapter 3: Freedom of Speech Based on slides prepared by Cyndi Chie, Sarah Frye and Sharon Gray. Fifth edition updated by Timothy Henry Copyright © 2018, 2013, 2008 Pearson Education, Inc. All Rights Reserved
  • 3.  Communication Paradigms  Controlling Speech  Posting, Selling, and Leaking Sensitive Material  Anonymity  The Global Net: Censorship and Political Freedom  Net Neutrality Regulations or the Market? Copyright © 2018, 2013, 2008 Pearson Education, Inc. All Rights Reserved
  • 4. Regulating communications media  First Amendment protection and government regulation  Print media (newspapers, magazines, books)  Broadcast (television, radio)  Common carries (telephones, postal system) Copyright © 2018, 2013, 2008 Pearson Education, Inc. All Rights Reserved
  • 5. Telecommunication Act of 1996  Changed regulatory structure and removed artificial legal divisions of service areas and restrictions on services that telephone companies can provide.  No provider or user of interactive computer services shall be treated as a publisher of any information provided by another information- content provider. Copyright © 2018, 2013, 2008 Pearson Education, Inc. All Rights Reserved
  • 6. Communications Decency Act of 1996  First major Internet censorship law  Main parts ruled unconstitutional Copyright © 2018, 2013, 2008 Pearson Education, Inc. All Rights Reserved
  • 7. Free-speech Principles  Written for offensive and/or controversial speech and ideas  Covers spoken and written words, pictures, art, and other forms of expression of ideas and opinions  Restriction on the power of government, not individuals or private businesses Copyright © 2018, 2013, 2008 Pearson Education, Inc. All Rights Reserved
  • 8. Free-speech Principles  Supreme Court principles and guidelines  Advocating illegal acts is (usually) legal.  Anonymous speech is protected.  Some restrictions are allowed on advertising.  Libel and direct, specific threats are not protected.  Inciting violence is illegal. Copyright © 2018, 2013, 2008 Pearson Education, Inc. All Rights Reserved
  • 9. Offensive speech: What is it? What is illegal?  Answers depend on who you are.  Most efforts to censor the Internet focus on pornographic and other sexually explicit material Copyright © 2018, 2013, 2008 Pearson Education, Inc. All Rights Reserved
  • 10. What was already illegal?  Obscenity  Depicts a sexual act against state law  Depicts these acts in a patently offensive manner that appeals to prurient interest as judged by a reasonable person using community standards  Lacks literary, artistic, social, political or scientific value Copyright © 2018, 2013, 2008 Pearson Education, Inc. All Rights Reserved
  • 11. Straining old legal standards  The definition of “community”  The definition of “distribution” Copyright © 2018, 2013, 2008 Pearson Education, Inc. All Rights Reserved
  • 12. Freedom of speech guidelines  Distinguish speech from action. Advocating illegal acts is (usually) legal.  Laws must not chill expression of legal speech.  Do not reduce adults to reading only what is fit for children.  Solve speech problems by least restrictive means. Copyright © 2018, 2013, 2008 Pearson Education, Inc. All Rights Reserved
  • 13. Internet Censorship Laws & Alternatives  Communications Decency Act of 1996 (CDA)  Attempted to avoid conflict with First Amendment by focusing on children  Made it a crime to make available to anyone under 18 any obscene or indecent communication  Found to be unconstitutional  The worst material threatening children was already illegal  It was too vague and broad  It did not use the least restrictive means of accomplishing the goal of protecting children Copyright © 2018, 2013, 2008 Pearson Education, Inc. All Rights Reserved
  • 14. Internet Censorship Laws & Alternatives  Child Online Protection Act of 1998 (COPA)  More limited than CDA  Federal crime for commercial Web sites to make available to minors material “harmful to minors” as judged by community standards  Found to be unconstitutional  It was too broad  It would restrict the entire country to the standards of the most conservative community  It would have a chilling effect Copyright © 2018, 2013, 2008 Pearson Education, Inc. All Rights Reserved
  • 15. Internet Censorship Laws & Alternatives  Children's Internet Protection Act of 2000 (CIPA)  Requires schools and libraries that participate in certain federal programs to install filtering software  Upheld in court  Does not violate First Amendment since it does not require the use of filters, impose jail or fines  It sets a condition for receipt of certain federal funds Copyright © 2018, 2013, 2008 Pearson Education, Inc. All Rights Reserved
  • 16. Video Games  A California law banned sale or rental of violent video games to minors.  In 2011, the Supreme Court of California ruled it violated the First Amendment. Copyright © 2018, 2013, 2008 Pearson Education, Inc. All Rights Reserved
  • 17. Alternatives to censorship  Filters  Blocks sites with specific words, phrases or images  Parental control for sex and violence  Updated frequently but may still screen out too much or too little  Not possible to eliminate all errors  What should be blocked? Copyright © 2018, 2013, 2008 Pearson Education, Inc. All Rights Reserved
  • 18. Alternatives to censorship  Policies  Commercial services, online communities, and social networking sites develop policies to protect members.  Video game industry developed rating system that provides an indication for parents about the amount of sex, profanity, and violence in a game. Copyright © 2018, 2013, 2008 Pearson Education, Inc. All Rights Reserved
  • 19. Discussion Question  Why is ‘least restrictive means’ important?  Do you consider the Internet an appropriate tool for young children? Why or why not? Copyright © 2018, 2013, 2008 Pearson Education, Inc. All Rights Reserved
  • 20. Child Pornography  Includes pictures or videos of actual minors (children under 18) engaged in sexually explicit conduct.  Production is illegal primarily because of abuse of the actual children, not because of the impact of the content on a viewer. Copyright © 2018, 2013, 2008 Pearson Education, Inc. All Rights Reserved
  • 21. Child Pornography  Congress extended the law against child pornography to include “virtual” child pornography.  The Supreme Court ruled the law violated the First Amendment.  The Court accepted a later law providing harsh penalties for certain categories of computer- generated and cartoon-type images. Copyright © 2018, 2013, 2008 Pearson Education, Inc. All Rights Reserved
  • 22. Sexting  Sending sexually suggestive or explicit text or photos, usually by cellphone or social media  Can meet the definition of child pornography if subject is under 18 Copyright © 2018, 2013, 2008 Pearson Education, Inc. All Rights Reserved
  • 23. Spam  What’s the problem?  Loosely described as unsolicited bulk email  Mostly commercial advertisement  Angers people because of content and the way it’s sent  Free speech issues  Spam imposes a cost on recipients  Spam filters do not violate free speech (free speech does not require anyone to listen) Copyright © 2018, 2013, 2008 Pearson Education, Inc. All Rights Reserved
  • 24. Spam  Anti-spam Laws  Controlling the Assault of Non-Solicited Pornography and Marketing Act (CAN-SPAM Act)  Targets commercial spam  Criticized for not banning all spam, legitimized commercial spam Copyright © 2018, 2013, 2008 Pearson Education, Inc. All Rights Reserved
  • 25. “Free speech is enhanced by civility.” -Tim O’Reilly Copyright © 2018, 2013, 2008 Pearson Education, Inc. All Rights Reserved
  • 26.  Policies of large companies  A Web site with risks Copyright © 2018, 2013, 2008 Pearson Education, Inc. All Rights Reserved
  • 27.  Leaks  Type of material  Value to society  Risks to society and individuals Copyright © 2018, 2013, 2008 Pearson Education, Inc. All Rights Reserved
  • 28.  Leaks  Examples  WikiLeaks  Climategate Copyright © 2018, 2013, 2008 Pearson Education, Inc. All Rights Reserved
  • 29.  Leaks  Potentially dangerous leaks  Releasing a huge mass of documents Copyright © 2018, 2013, 2008 Pearson Education, Inc. All Rights Reserved
  • 30. Discussion Question  Does the value of informing the public of controversial and sensitive information outweigh the dangers and risks? Copyright © 2018, 2013, 2008 Pearson Education, Inc. All Rights Reserved
  • 31.  Leaks  Responsibilities of operators of Web sites for leaks Copyright © 2018, 2013, 2008 Pearson Education, Inc. All Rights Reserved
  • 32.  Common Sense and Federalist Papers Copyright © 2018, 2013, 2008 Pearson Education, Inc. All Rights Reserved
  • 33.  Positive uses of anonymity  Protect political speech  Protect against retaliation and embarrassment  Anonymizing services  used by individuals, businesses, law enforcement agencies, and government intelligence services Copyright © 2018, 2013, 2008 Pearson Education, Inc. All Rights Reserved
  • 34.  Negative uses of anonymity  protects criminal and antisocial activities  aids fraud, harassment, extortion, distribution of child pornography, theft, and copyright infringement  masks illegal surveillance by government agencies Copyright © 2018, 2013, 2008 Pearson Education, Inc. All Rights Reserved
  • 35.  Is anonymity protected?  Many legal issues about anonymity are similar to those discussed in Chapter 2. Copyright © 2018, 2013, 2008 Pearson Education, Inc. All Rights Reserved
  • 36. Discussion Questions  Where (if anywhere) is anonymity appropriate on the Internet?  What are some kinds of Web sites that should prohibit anonymity?  Where (if anywhere) should laws prohibit anonymity on the Internet? Copyright © 2018, 2013, 2008 Pearson Education, Inc. All Rights Reserved
  • 37. Tools for communication, tools for oppression  Authoritarian governments have impeded flow of information and opinion throughout history.  The vibrant communication of the Internet threatens governments in countries that lack political and cultural freedom. Copyright © 2018, 2013, 2008 Pearson Education, Inc. All Rights Reserved
  • 38. Tools for communication, tools for oppression  Attempts to limit the flow of information on the Internet similar to earlier attempts to place limits on other communications media  Some countries own the Internet backbone within their countries and block specific sites and content at the border  Some countries ban all or certain types of access to the Internet Copyright © 2018, 2013, 2008 Pearson Education, Inc. All Rights Reserved
  • 39. Tools for communication, tools for oppression  Avoiding censorship: the global nature of the Net allows restrictions (or barriers) in one country to be circumvented by using networks in other, less restrictive countries.  Creating censorship: the global nature of the Net makes it easier for one nation to impose restrictive standards on others. Copyright © 2018, 2013, 2008 Pearson Education, Inc. All Rights Reserved
  • 40. “The office of communications is ordered to find ways to ensure that the use of the Internet becomes impossible. The Ministry for the Promotion of Virtue and Prevention of Vice is obliged to monitor the order and punish violators.” - Excerpt from Taliban edict banning Internet use in Afghanistan (2001) Copyright © 2018, 2013, 2008 Pearson Education, Inc. All Rights Reserved
  • 41. Discussion Question  Will the Internet and related communication technologies be tools for increasing political freedom, or will they give more power to governments to spy on, control, and restrict their people? Copyright © 2018, 2013, 2008 Pearson Education, Inc. All Rights Reserved
  • 42. Aiding foreign censors and repressive regimes  Yahoo and French censorship  Yahoo, eBay and others make decisions to comply with foreign laws for business reasons  Skype and Chinese control  Chinese government requires modified version of Skype Copyright © 2018, 2013, 2008 Pearson Education, Inc. All Rights Reserved
  • 43. Aiding foreign censors and repressive regimes  Companies who do business in countries that control Internet access must comply with the local laws  Google argued that some access is better than no access Copyright © 2018, 2013, 2008 Pearson Education, Inc. All Rights Reserved
  • 44. Discussion Questions  When U.S. or other non-Chinese companies set up branches in China and comply with restrictive laws, should we view them as providing more access to information in China than would otherwise exist, albeit not as much as is technically possible?  Should we view them as partners in the Chinese government’s ethically unacceptable restriction on debate and access to information by its citizens?  Should we view them as appropriately respecting the culture and laws of the host country? Copyright © 2018, 2013, 2008 Pearson Education, Inc. All Rights Reserved
  • 45. Discussion Questions  What impact does the global net have on free speech?  Does censorship in other countries have an impact on free speech in the U.S.?  How does free speech in ‘free countries’ impact more restrictive countries? Copyright © 2018, 2013, 2008 Pearson Education, Inc. All Rights Reserved
  • 46. Selling surveillance tools  Repressive governments intercept citizens’ communications and filter Internet content.  Companies in Western democracies sell them the sophisticated tools to do so. Copyright © 2018, 2013, 2008 Pearson Education, Inc. All Rights Reserved
  • 47. Shutting down communications in free countries  Public safety  In the U.S., the Supreme Court would probably declare unconstitutional a law that authorized a government agency to order a private communications service to shut down. Copyright © 2018, 2013, 2008 Pearson Education, Inc. All Rights Reserved
  • 48.  Net Neutrality  Refers to a variety of proposals for restrictions on how telephone and cable companies interact with their broadband customers and set fees for services. Copyright © 2018, 2013, 2008 Pearson Education, Inc. All Rights Reserved
  • 49.  Net Neutrality  Argue for equal treatment of all customers  Market  Flexibility and market incentives will benefit customers Copyright © 2018, 2013, 2008 Pearson Education, Inc. All Rights Reserved
  • 50. Discussion Questions  Should companies be permitted to exclude or give special treatment to content transmitted based on the content itself or on the company that provides it?  Should companies be permitted to provide different levels of speed at different prices? Copyright © 2018, 2013, 2008 Pearson Education, Inc. All Rights Reserved