This document discusses various laws and regulations pertaining to social media. It begins by noting that individuals can be held liable under the laws of the country they post in. It then discusses protections for internet service providers from liability, as well as increasing legal cases involving Facebook, Twitter, and freedom of speech. Examples are provided of cases involving social media posts. The document also discusses international differences in social media laws and regulations, as well as guidelines around prosecuting cases involving social media in the UK and US laws around internet indecency.
Presentation for the Seminar on Contemporary Issues of Communication and Culture, Escola de Sociologia e Políticas Públicas, Lisbon University Institute, Lisbon, Portugal, 29 April 2021.
The document discusses hate speech directed towards women online. It notes that while there is much information about sexism against women offline, there is limited scholarly research on online hate speech against women. The author conducted research on this topic as a minority who has faced negative online comments. Several theories are presented that may provide insight into why some spread hate speech online, such as implicit personality theory and ambivalent sexism theory. The document concludes by suggesting increased public education is needed to address this problem and reduce the negative effects of online hate speech against women.
This document summarizes key points from Chapter 5 of the book "A Gift of Fire" regarding freedom of speech in cyberspace. It discusses how different communication technologies are regulated, challenges to defining offensive speech online, and laws around censorship. It also covers issues like anonymity, spam, and ensuring a diversity of content on the internet.
Freedom of expression on the internet enables widespread sharing of information but also enables illegal and unethical activities if used improperly. Key issues around freedom of expression online include controlling access to information, especially for children; anonymity which allows anonymous speech but is also used for illegal acts; defamation which restricts untrue statements that harm others; and pornography which some view as protected speech while others see it as harmful if accessible to children. Responsible use of new communication technologies requires consideration of these complex issues around ethics, law, and society.
Freedom of Expression our Internet Rights and Principle by Shreedeep Rayamajh...Shreedeep Rayamajhi
Freedom of Expression our Internet Rights and Principle is a presentation on interpretation, practice and understand ability. Asia is a growing economy the interpretation and practice is very much independent and unique as per country and location.
Here in this presentation we have tried to highlight some of the basic concept of FoE, Internet rights and principle
This presentation was presented in Sri Lankan IGF2016
The document discusses the history and key aspects of internet decency legislation in the United States from 1996-2004. It covers laws like the Communications Decency Act of 1996, Child Online Protection Act of 1998, and Children's Internet Protection Act of 2000. These attempted to restrict minors' access to indecent or obscene material online but faced legal challenges over free speech concerns. The Supreme Court struck down parts of the CDA and COPA, while upholding filtering requirements under CIPA for schools/libraries receiving federal funds.
China’s Internet Security _Dichotomy of National Security and Human Rights in...Emily Võ
This document discusses China's approach to internet security and the tension with human rights and relations with the United States. China tightly controls internet access and censors information deemed threatening to national security. This has led to censorship of political dissent and restrictions on human rights. Other Southeast Asian countries like Vietnam are adopting similar policies. While China views this as protecting national security, others see it as infringing on freedom of expression. The United States promotes internet freedom but has faced hypocrisy claims due to NSA surveillance practices. Overall, the document examines the dichotomy between national security and human rights in China's internet policies and their geopolitical implications.
Presentation for the Seminar on Contemporary Issues of Communication and Culture, Escola de Sociologia e Políticas Públicas, Lisbon University Institute, Lisbon, Portugal, 29 April 2021.
The document discusses hate speech directed towards women online. It notes that while there is much information about sexism against women offline, there is limited scholarly research on online hate speech against women. The author conducted research on this topic as a minority who has faced negative online comments. Several theories are presented that may provide insight into why some spread hate speech online, such as implicit personality theory and ambivalent sexism theory. The document concludes by suggesting increased public education is needed to address this problem and reduce the negative effects of online hate speech against women.
This document summarizes key points from Chapter 5 of the book "A Gift of Fire" regarding freedom of speech in cyberspace. It discusses how different communication technologies are regulated, challenges to defining offensive speech online, and laws around censorship. It also covers issues like anonymity, spam, and ensuring a diversity of content on the internet.
Freedom of expression on the internet enables widespread sharing of information but also enables illegal and unethical activities if used improperly. Key issues around freedom of expression online include controlling access to information, especially for children; anonymity which allows anonymous speech but is also used for illegal acts; defamation which restricts untrue statements that harm others; and pornography which some view as protected speech while others see it as harmful if accessible to children. Responsible use of new communication technologies requires consideration of these complex issues around ethics, law, and society.
Freedom of Expression our Internet Rights and Principle by Shreedeep Rayamajh...Shreedeep Rayamajhi
Freedom of Expression our Internet Rights and Principle is a presentation on interpretation, practice and understand ability. Asia is a growing economy the interpretation and practice is very much independent and unique as per country and location.
Here in this presentation we have tried to highlight some of the basic concept of FoE, Internet rights and principle
This presentation was presented in Sri Lankan IGF2016
The document discusses the history and key aspects of internet decency legislation in the United States from 1996-2004. It covers laws like the Communications Decency Act of 1996, Child Online Protection Act of 1998, and Children's Internet Protection Act of 2000. These attempted to restrict minors' access to indecent or obscene material online but faced legal challenges over free speech concerns. The Supreme Court struck down parts of the CDA and COPA, while upholding filtering requirements under CIPA for schools/libraries receiving federal funds.
China’s Internet Security _Dichotomy of National Security and Human Rights in...Emily Võ
This document discusses China's approach to internet security and the tension with human rights and relations with the United States. China tightly controls internet access and censors information deemed threatening to national security. This has led to censorship of political dissent and restrictions on human rights. Other Southeast Asian countries like Vietnam are adopting similar policies. While China views this as protecting national security, others see it as infringing on freedom of expression. The United States promotes internet freedom but has faced hypocrisy claims due to NSA surveillance practices. Overall, the document examines the dichotomy between national security and human rights in China's internet policies and their geopolitical implications.
051309 Federal Interest And Social Security Metanomics TranscriptRemedy Communications
Metanomics is a weekly Web-based show on the serious uses of virtual worlds. This transcript is from a past show.
For this and other videos, visit us at http://metanomics.net.
Week 2 Lecture Notes covered personal connections and blogging from assigned readings. It discussed the development of digital media from early internet use by scientists for communication and how personal desires drove growth. New technologies like radio, telegraph and refrigerator found unexpected major uses. The internet was initially text-only and used by scientists; personal use grew it. Early communication tools included talk and chat rooms. Gaming and the World Wide Web developed the internet further. New media users have expanded from developers and students to most Americans and other countries by 2014, though global use still varies demographically. Blogs can provide firsthand reports, overlooked stories, and filter other news according to interests, intersecting with journalism. Bloggers differ from journalists in fact
The document discusses privacy and social networks. It notes that major social networks like Facebook and Google have billions of users but are owned by US companies and regulated lightly in the US compared to Europe. It questions whether personal data gathered by social networks is being used and shared appropriately, and discusses concerns about the balance between privacy and other rights online. It also examines issues like network effects, competition in the social media space, and the decline of past networks like MySpace.
The document discusses the concept of the "Fifth Estate", which refers to a collectivity of individuals who use the internet and social media to hold powerful actors and institutions accountable. It provides examples like a 9-year-old girl in Scotland who blogged about school lunches, garnering over 10 million views and fostering debate. The Fifth Estate empowers citizens by allowing them to access information, connect with others, and have a voice in a way that challenges traditional power structures like government, business, and the press.
The document discusses several topics related to freedom and control in virtual worlds. It argues that technology defines what people can and cannot do in virtual spaces. It also discusses how new online communities are forming and changing concepts of privacy and social networks. The document expresses concerns that civil rights need to be redefined for the online world and that fears about security and control could undermine principles of democracy and freedom of expression.
This document discusses the issue of regulating free speech in the age of social media. It argues that while the First Amendment protects free speech, more regulation may be needed to prevent hate speech, threats, and bullying online. It notes that unregulated speech on social media allows monitoring by governments and can have serious real-world consequences if used to attack or incite violence against others. While democracy relies on free speech, some restrictions may be reasonable to uphold social norms and prevent harm, especially as technology enables speech to reach wider audiences than ever before.
The document discusses the history and importance of information literacy. It describes how Paul Zurkowski first proposed universal information literacy training in 1974 to help people learn to search new databases and mainframe computers. It then discusses how a lack of information literacy skills can undermine democracy by allowing misinformation to spread and powerful groups to control information. Finally, it argues that information literacy can create a "New Era of Enlightenment" by empowering citizens to navigate information and make informed decisions about their lives and countries. Zurkowski proposes the Information Action Coalition to extend information literacy training globally.
This document discusses the history and legal framework of freedom of speech in the United States. It outlines key Supreme Court cases that have established precedents, including Schenck v. United States which introduced the "clear and present danger" test, and Marsh v. Alabama which established that the First Amendment can apply to private property serving as a public forum. The document then examines questions around whether social media sites can legally censor speech and whether Section 230 or the Constitution need updating to address the role of modern internet platforms.
The document discusses the international efforts to combat online child exploitation through task forces and investigations. It describes the Innocent Images International Task Force formed in 2004 with members from over 20 countries. It also discusses several international investigations that have led to arrests in multiple countries and the rescue of abused children. Finally, it outlines some of the key federal laws and initiatives in the United States to address online child pornography and protect children.
Can Artificial Intelligence Predict The Spread Of Online Hate Speech?Bernard Marr
Online hate speech is a big issue, and many are worried that it leads to radicalization and actions in the real world. Here, we look at how artificial intelligence (AI) can now be used to detect hate speech and predict its impact.
The document discusses the rise of the Internet and the emergence of a "Fifth Estate" enabled by greater access to information and ability to network. It defines the Fifth Estate as a critical mass of individuals sourcing information, networking, and holding organizations accountable in new ways. Various strategies of the Fifth Estate are described, such as searching for information, sourcing new information, distributing leaks, forming collaborative networks, collective action, and collective intelligence. Challenges to the Fifth Estate from governments, businesses and other groups are also discussed.
Chapter 11 - Legal Issues in Public Relationsjbraun128
This document discusses several key legal issues in public relations, including intellectual property, freedom of speech, defamation, and privacy. It outlines how the First Amendment protects free speech but also has limits, such as with libel and slander. Common types of intellectual property like copyrights, trademarks, and patents are explained as well as related concepts like plagiarism, fair use, and creative commons. Federal agencies that regulate aspects of public relations practice are also identified.
Social media, surveillance and censorshiplilianedwards
Talk delivered at European University Florence, March 2012. Did the Aran spring really prove that social media enables the flowering of democracy or are social media in fact easy venues for blanket state surveillance? Can they be arenas for free speech when platforms likeTwitter are refining their censorship policies to avoid legal risk?
Internet censorship involves controlling or suppressing access to information online and raises similar legal issues to offline censorship. A video teaching anti-Semitism and anti-Americanism was published on YouTube by a known terrorist organization, leading Google to remove terrorist videos from the platform. YouTube users can now flag videos containing pornography, violence, illegal acts, or offensive racial/ethnic content. Strict censorship in North Korea has limited websites to only around 30, demonstrating how censorship could prevent online exploitation but also raising debates around its importance.
Let's see which countries have the strictest Internet censorship rules, and then find out how to unblock a geo-located resource.
Resource - https://vpnclientapp.com/blog/internet-censorship/
Data Journalism: chapter from Online Journalism Handbook first editionPaul Bradshaw
This chapter is from the first edition of the Online Journalism Handbook. The work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.
This document discusses the opportunities and challenges facing social media. While social media enables greater social connections and empowerment, it also faces threats from changing business models, technical issues, problematic user behavior, and increasing regulation. The author argues that over-regulation risks undermining the democratic potential of social media. Researchers should study social media impacts, inform debates, and help develop more appropriate regulatory models to address issues while preserving social media's vitality.
This document provides an overview of a lesson on access to information. The lesson objectives are to understand access to information as a human rights issue, how it supports democratic governance and poverty reduction efforts. It will also discuss UNDP's approach, which focuses on enhancing both the supply of and demand for information, and specific programming areas. The topics within the lesson will cover trends, concepts and issues relating to access to information and how it can strengthen development processes.
051309 Federal Interest And Social Security Metanomics TranscriptRemedy Communications
Metanomics is a weekly Web-based show on the serious uses of virtual worlds. This transcript is from a past show.
For this and other videos, visit us at http://metanomics.net.
Week 2 Lecture Notes covered personal connections and blogging from assigned readings. It discussed the development of digital media from early internet use by scientists for communication and how personal desires drove growth. New technologies like radio, telegraph and refrigerator found unexpected major uses. The internet was initially text-only and used by scientists; personal use grew it. Early communication tools included talk and chat rooms. Gaming and the World Wide Web developed the internet further. New media users have expanded from developers and students to most Americans and other countries by 2014, though global use still varies demographically. Blogs can provide firsthand reports, overlooked stories, and filter other news according to interests, intersecting with journalism. Bloggers differ from journalists in fact
The document discusses privacy and social networks. It notes that major social networks like Facebook and Google have billions of users but are owned by US companies and regulated lightly in the US compared to Europe. It questions whether personal data gathered by social networks is being used and shared appropriately, and discusses concerns about the balance between privacy and other rights online. It also examines issues like network effects, competition in the social media space, and the decline of past networks like MySpace.
The document discusses the concept of the "Fifth Estate", which refers to a collectivity of individuals who use the internet and social media to hold powerful actors and institutions accountable. It provides examples like a 9-year-old girl in Scotland who blogged about school lunches, garnering over 10 million views and fostering debate. The Fifth Estate empowers citizens by allowing them to access information, connect with others, and have a voice in a way that challenges traditional power structures like government, business, and the press.
The document discusses several topics related to freedom and control in virtual worlds. It argues that technology defines what people can and cannot do in virtual spaces. It also discusses how new online communities are forming and changing concepts of privacy and social networks. The document expresses concerns that civil rights need to be redefined for the online world and that fears about security and control could undermine principles of democracy and freedom of expression.
This document discusses the issue of regulating free speech in the age of social media. It argues that while the First Amendment protects free speech, more regulation may be needed to prevent hate speech, threats, and bullying online. It notes that unregulated speech on social media allows monitoring by governments and can have serious real-world consequences if used to attack or incite violence against others. While democracy relies on free speech, some restrictions may be reasonable to uphold social norms and prevent harm, especially as technology enables speech to reach wider audiences than ever before.
The document discusses the history and importance of information literacy. It describes how Paul Zurkowski first proposed universal information literacy training in 1974 to help people learn to search new databases and mainframe computers. It then discusses how a lack of information literacy skills can undermine democracy by allowing misinformation to spread and powerful groups to control information. Finally, it argues that information literacy can create a "New Era of Enlightenment" by empowering citizens to navigate information and make informed decisions about their lives and countries. Zurkowski proposes the Information Action Coalition to extend information literacy training globally.
This document discusses the history and legal framework of freedom of speech in the United States. It outlines key Supreme Court cases that have established precedents, including Schenck v. United States which introduced the "clear and present danger" test, and Marsh v. Alabama which established that the First Amendment can apply to private property serving as a public forum. The document then examines questions around whether social media sites can legally censor speech and whether Section 230 or the Constitution need updating to address the role of modern internet platforms.
The document discusses the international efforts to combat online child exploitation through task forces and investigations. It describes the Innocent Images International Task Force formed in 2004 with members from over 20 countries. It also discusses several international investigations that have led to arrests in multiple countries and the rescue of abused children. Finally, it outlines some of the key federal laws and initiatives in the United States to address online child pornography and protect children.
Can Artificial Intelligence Predict The Spread Of Online Hate Speech?Bernard Marr
Online hate speech is a big issue, and many are worried that it leads to radicalization and actions in the real world. Here, we look at how artificial intelligence (AI) can now be used to detect hate speech and predict its impact.
The document discusses the rise of the Internet and the emergence of a "Fifth Estate" enabled by greater access to information and ability to network. It defines the Fifth Estate as a critical mass of individuals sourcing information, networking, and holding organizations accountable in new ways. Various strategies of the Fifth Estate are described, such as searching for information, sourcing new information, distributing leaks, forming collaborative networks, collective action, and collective intelligence. Challenges to the Fifth Estate from governments, businesses and other groups are also discussed.
Chapter 11 - Legal Issues in Public Relationsjbraun128
This document discusses several key legal issues in public relations, including intellectual property, freedom of speech, defamation, and privacy. It outlines how the First Amendment protects free speech but also has limits, such as with libel and slander. Common types of intellectual property like copyrights, trademarks, and patents are explained as well as related concepts like plagiarism, fair use, and creative commons. Federal agencies that regulate aspects of public relations practice are also identified.
Social media, surveillance and censorshiplilianedwards
Talk delivered at European University Florence, March 2012. Did the Aran spring really prove that social media enables the flowering of democracy or are social media in fact easy venues for blanket state surveillance? Can they be arenas for free speech when platforms likeTwitter are refining their censorship policies to avoid legal risk?
Internet censorship involves controlling or suppressing access to information online and raises similar legal issues to offline censorship. A video teaching anti-Semitism and anti-Americanism was published on YouTube by a known terrorist organization, leading Google to remove terrorist videos from the platform. YouTube users can now flag videos containing pornography, violence, illegal acts, or offensive racial/ethnic content. Strict censorship in North Korea has limited websites to only around 30, demonstrating how censorship could prevent online exploitation but also raising debates around its importance.
Let's see which countries have the strictest Internet censorship rules, and then find out how to unblock a geo-located resource.
Resource - https://vpnclientapp.com/blog/internet-censorship/
Data Journalism: chapter from Online Journalism Handbook first editionPaul Bradshaw
This chapter is from the first edition of the Online Journalism Handbook. The work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.
This document discusses the opportunities and challenges facing social media. While social media enables greater social connections and empowerment, it also faces threats from changing business models, technical issues, problematic user behavior, and increasing regulation. The author argues that over-regulation risks undermining the democratic potential of social media. Researchers should study social media impacts, inform debates, and help develop more appropriate regulatory models to address issues while preserving social media's vitality.
This document provides an overview of a lesson on access to information. The lesson objectives are to understand access to information as a human rights issue, how it supports democratic governance and poverty reduction efforts. It will also discuss UNDP's approach, which focuses on enhancing both the supply of and demand for information, and specific programming areas. The topics within the lesson will cover trends, concepts and issues relating to access to information and how it can strengthen development processes.
Charting a Way Forward Online Content Regulationrun_frictionless
This paper explores possible regulatory structures for content governance outside the United States and identifies questions that require further discussion. It builds off recent developments on this topic, including legislation proposed or passed into law by governments, as well as scholarship that explains the various content governance approaches that have been adopted in the past and may be taken in the future.2 Its overall goal is to help frame a path forward—taking into consideration the views not only of policymakers and private companies, but also civil society and the people who use Facebook’s platform and services.
https://runfrictionless.com/b2b-white-paper-service/
This document discusses the rise of the internet and social media as dominant communication platforms. Some key points:
- The internet has caused a democratization of information by enabling widespread, cheap publishing and distribution of content. It has transformed the traditional top-down mass media model.
- Social networks like Facebook and YouTube did not exist 10 years ago but now have over a billion users each. Nearly 40% of the world's population is now online.
- The internet and mobile devices have enabled citizen journalism and user-generated content to a degree never seen before. Billions of photos, videos, tweets and emails are shared daily on various platforms.
- As internet access continues to grow globally, especially via
This document summarizes a study on college students' media literacy and news consumption habits. It finds that students primarily get their news from social media and their peers, and have low levels of trust in traditional media. Students believe important news will "find them" through their online networks rather than actively seeking it out. The document also discusses the spread of disinformation online and challenges in combating fake news, as falsehoods spread faster and further than the truth. It concludes that media literacy education is needed to help students identify reliable sources and evaluate information critically.
Chapter 2 CMC, Diffusion and Social TheoriesAlecRamos1
The document discusses computer-mediated communication (CMC) and its role in developing online identities and communities from the 1980s onward. It also covers the history of the internet and growth of social media, from early bulletin boards and email to modern social networking sites. Rogers' diffusion of innovations model is presented as a way to understand how new communication technologies spread through populations over time. Uses and gratification theory explores how people use media like CMC and social media to fulfill social and psychological needs.
Chapter 2 cmc, diffusion and social theoriesJennifer Abreu
The document discusses computer-mediated communication (CMC) and its role in developing online identities and communities from the 1980s onward. It also covers the history of the internet and growth of social media, from early bulletin boards and email to modern social networking sites. Rogers' diffusion of innovations model is presented to explain how new technologies like CMC and social media spread widely over time. Uses and gratification theory suggests people use CMC and social media to fulfill social and information needs.
Chapter 2 cmc, diffusion and social theoriesjanowicp
Computer-mediated communication (CMC) examines online identities and interactions in developing online communities. CMC began with message boards and email in the 1980s-1990s and grew with the World Wide Web. By 2003, CMC was categorized as interpersonal communication including everything from email to web pages. Social media communication occurs within a cultural context and allows the extension of social networks and relationships online through personal profiles and interactions. Diffusion of new communication technologies follows an S-curve over time as more people adopt and integrate the technologies into daily life according to Rogers' adoption model. Social media provides entertainment and escape but also opportunities to connect with others and share information globally.
Chapter 2 cmc, diffusion and social theoriesjanowicp
Computer-mediated communication (CMC) examines online identities and interactions in developing online communities. CMC began with message boards and email in the 1980s-1990s and grew with the World Wide Web. By 2003, CMC was categorized as interpersonal communication including everything from email to web pages. Social media communication occurs in a cultural context and allows sharing to extend social networks globally through personal profiles and viewing others' profiles. Diffusion of new communication technologies follows an S-curve over time as more people adopt innovations starting with early adopters through late adopters. Social media provides entertainment and escape but also allows meaningful online relationships and communities to form through shared experiences online.
Chapter 2 cmc, diffusion and social theoriesjanowicp
Computer-mediated communication (CMC) examines online identities and interactions in developing online communities. CMC began with message boards and email in the 1980s-1990s and grew with the World Wide Web. By 2003, CMC was categorized as interpersonal communication including everything from email to web pages. Social media communication occurs within a cultural context and allows the extension of social networks and relationships online through profiles and interactions. Diffusion of new communication technologies follows an S-curve over time as more people adopt innovations according to Rogers' model of innovators, early adopters, early majority, late majority, and laggards. Social media provides entertainment and information sharing to meet social and psychological needs.
The document provides instructions for ordering essay writing help from HelpWriting.net. It outlines a 5-step process: 1) Create an account with an email and password. 2) Complete an order form with instructions, sources, and deadline. 3) Review bids from writers and choose one. 4) Review the completed paper and authorize payment. 5) Request revisions until satisfied, with a full refund option for plagiarism.
State-sponsored trolling refers to governments using targeted online harassment campaigns to silence critics. The authors studied this phenomenon in multiple countries over 18 months. They define key terms and propose a framework to attribute trolling attacks to states based on the level of state involvement. Case studies from 7 countries show how governments execute, direct, incite, or leverage trolling. The paper concludes with policy recommendations, including for technology companies to curb abuse and respect human rights.
Web 20 (Social Media) Policies in Higher EducationAnne Arendt
This paper summarizes the social media and Web 2.0 field in regard to policies from the perspective of a Web resource director. The paper is 50 pages and was created specifically for the Best Practices in Policy Management Conference sponsored by the UVU Policy Office on November 6, 2009.
View the 'official' report at http://works.bepress.com/anne_arendt/7/
Information disorder: Toward an interdisciplinary framework for research and ...friendscb
A comprehensive examination of information disorder including filter bubbles, echo chambers and information pollution published by the Council of Europe.
Based on article Unintended Consequences by Vinton G. Cerf. The presentation after setting the current context talks about challenges faced due to big-data, how tech-giants handle them. Then it talks about the role of Governments and needs for International Regulation. It finally ends with a discussion on freedom of speech.
This presentation is presented by Sahithi Adimulam, Chandana Kotta, Indu Sushmitha, Pavitra K C and Shashank Motepalli as part of ICT Policy and Regulation course under Prof.Sridhar.
This document discusses the relationship between media and politics. It explores how politicians, journalists, and citizens shape news coverage and how media has changed politics. Media now plays a central role in politics by influencing politicians and political campaigns. Politicians also try to influence media coverage. The relationship is complex, with both sides relying on each other while also exerting power over one another. Foundations provide over $1.8 billion in funding to support various media-related activities in the U.S. Accountability and independence of media is important to balance the rights of individuals, communities, and press freedom.
Karen Kasold: Media Globalization And Inequalitymerlyna
The document discusses several topics related to media globalization and inequality, including how mass media can damage public discourse, the rise of perception management techniques, debates around new international information orders, threats to a global public sphere, and issues of market-driven media and ensuring access to communication for all. It examines the power of elites over media institutions and outlines principles in the People's Communication Charter to transform global communications and protect rights.
A human rights approach to the mobile networkDr Lendy Spires
This document discusses a human rights approach to the mobile internet. It argues that internet policy should aim to maximize the empowering potential of mobile phones while also promoting universal access to high-speed internet via both mobile phones and computers. The mobile internet can advance human rights by enabling citizen journalism, crowdsourcing, and sharing information ubiquitously. However, challenges like cost, usability, unequal access to content, and network architecture must be addressed. An ideal policy balances rights while empowering all people to access and share information via any device.
Social media refers to online technologies and practices that allow people to share opinions, information, and build relationships. It involves a combination of technology, telecommunications, and social interaction. Social media is different from traditional forms of communication like newspapers and television in that it is cheap, accessible, and enables almost anyone to publish content. Some key trends in social media include the loss of centralized control over communication, fewer gatekeepers, fragmented conversations across many platforms, pull-based communication where people access information directly, and less predictable forms of journalism with more opinion. Social media is growing rapidly in India with over 92 million accounts and 50 million on Twitter alone.
➒➌➎➏➑➐➋➑➐➐ Satta Matka Dpboss Matka GuessingKALYAN MATKA | MATKA RESULT | KALYAN MATKA TIPS | SATTA MATKA | MATKA.COM | MATKA PANA JODI TODAY | BATTA SATKA | MATKA PATTI JODI NUMBER | MATKA RESULTS | MATKA CHART | MATKA JODI | SATTA COM | FULL RATE GAME | MATKA GAME | MATKA WAPKA | ALL MATKA RESULT LIVE ONLINE | MATKA RESULT | KALYAN MATKA RESULT | DPBOSS MATKA 143 | MAIN MATKA
SATTA MATKA | DPBOSS | KALYAN MAIN BAZAR | FAST MATKA RESULT KALYAN MATKA | MATKA RESULT | KALYAN MATKA TIPS | SATTA MATKA | MATKA COM | MATKA PANA JODI TODAY | BATTA SATKA | MATKA PATTI JODI NUMBER | MATKA RESULTS | MATKA CHART | MATKA JODI | SATTA COM | FULL RATE GAME | MATKA GAME | MATKA WAPKA | ALL MATKA RESULT LIVE ONLINE | MATKA RESULT | KALYAN MATKA RESULT | DPBOSS MATKA 143 | MAIN MATKA
MATKA NUMBER FIX MATKANUMBER FIX SATTAMATKA FIXMATKANUMBER SATTA MATKA ALL SATTA MATKA FREE GAME KALYAN MATKA TIPS KAPIL MATKA GAME SATTA MATKA KALYAN GAME DAILY FREE 4 ANK ALL MARKET PUBLIC SEVA WEBSITE FIX FIX MATKA NUMBER INDIA.S NO1 WEBSITE TTA FIX FIX FIX MATKA GURU INDIA MATKA KALYAN CHART MATKA GUESSING KALYAN FIX OPEN FINAL 3 ANK SATTAMATKA143 GUESSING SATTA BATTA MATKA FIX NUMBER TODAY WAPKA FIX AAPKA FIX FIX FIX FIX SATTA GURU NUMBER SATTA MATKA MATKA143 SATTA SATTA SATTA MATKA SATTAMATKA1438 FIX MATKA MATKA BOSS SATTA LIVE 3MATKA 143 FIX FIX FIX KALYAN JODI MATKA KALYAN FIX FIX WAP MATKA BOSS440 SATTA MATKA FIX FIX MATKA NUMBER SATTA MATKA FIXMATKANUMBER FIX MATKA MATKA RESULT FIX MATKA NUMBER FREE DAILY FIX MATKA NUMBER FIX FIX MATKA JODI SATTA MATKA FIX ANK MATKA ANK FIX KALYAN MUMBAI MATKA NUMBER FIXMATKANUMBER SATTA NUMBER FAST MATKA RESULT SATTA BATTA INDIAN SATTA SATTA RESULT MADHUR SATTA PRABHAT SATTA FIX FIX FIX SATTA NUMBER SATTAKING143 GUESSING SATTA CHART KALYAN PENAL CHART MATKA420 SATTA GUESSING NUMBER KALYAN NIGHT CHART SATTA FIX FIX FIX SATTA NUMBER FIX FIX FIX OPEN FIX FIX WAPKA MATKA DPBOSS FIX FIX 3ANK MATKA KALYAN CHART MATKA GUESSING TARA MATKA FIX FIXMATKANUMBER FINAL ANK MATKABOSS DUBAI SATTA MATKA GOLDEN MATKA FIX FIX MATKA NUMBER FIX MATKANUMBER FIX FIX FIX MATKA NUMBER FIX MATKANUMBER FIX SATTAMATKA FIXMATKANUMBER SATTA MATKA ALL SATTA MATKA FREE GAME KALYAN MATKA TIPS KAPIL MATKA GAME SATTA MATKA KALYAN GAME DAILY FREE 4 ANK ALL MARKET PUBLIC SEVA SATTA FIX FIX FIX MATKA GURU INDIA MATKA KALYAN CHART MATKA GUESSING KALYAN FIX OPEN FINAL 3 ANK SATTAMATKA143 GUESSING SATTA BATTA MATKA FIX NUMBER TODAY WAPKA FIX AAPKA FIX FIX FIX FIX SATTA GURU NUMBER SATTA MATKA MATKA143 SATTA SATTA SATTA MATKA SATTAMATKA1438 FIX MATKA MATKA BOSS SATTA LIVE 3MATKA 143 FIX FIX FIX KALYAN JODI MATKA KALYAN FIX FIX WAP MATKA BOSS440 SATTA MATKA FIX FIX MATKA NUMBER SATTA MATKA FIXMATKANUMBER FIX MATKA MATKA RESULT FIX MATKA NUMBER FREE DAILY FIX MATKA NUMBER FIX FIX MATKA JODI SATTA MATKA FIX ANK MATKA ANK FIX KALYAN MUMBAI MATKA NUMBER FIXMATKANUMBER SATTA NUMBER FAST MATKA RESULT SATTA BATTA INDIAN SATTA SATTA RESULT MADHUR SATTA PRABHAT SATTA FIX FIX FIX SATTA NUMBER SATTAKING143 GUESSING SATTA CHART KALYAN PENAL CHART MATKA420 SATTA GUESSING NUMBER KALYAN NIGHT CHART SATTA FIX FIX FIX SATTA NUMBER FIX FIX FIX OPEN FIX FIX WAPKA MATKA DPBOSS FIX FIX 3ANK MATKA KALYAN CHART MATKA GUESSING TARA MATKA FIX FIXMATKANUMBER FINAL ANK MATKABOSS DUBAI SATTA MATKA GOLDEN MATKA WAPKA.FIX FIX FIX
➒➌➎➏➑➐➋➑➐➐KALYAN MATKA | MATKA RESULT | KALYAN MATKA TIPS | SATTA MATKA | MATKA.COM | MATKA PANA JODI TODAY | BATTA SATKA | MATKA PATTI JODI NUMBER | MATKA RESULTS | MATKA CHART | MATKA JODI | SATTA COM | FULL RATE GAME | MATKA GAME | MATKA WAPKA | ALL MATKA RESULT LIVE ONLINE | MATKA RESULT | KALYAN MATKA RESULT | DPBOSS MATKA 143 | MAIN MATKA
Tanjore Painting: Rich Heritage and Intricate Craftsmanship | Cottage9Cottage9 Enterprises
Explore the exquisite art of Tanjore Painting, known for its vibrant colors, gold foil work, and traditional themes. Discover its cultural significance today!
KALYAN MATKA | MATKA RESULT | KALYAN MATKA TIPS | SATTA MATKA | MATKA.COM | MATKA PANA JODI TODAY | BATTA SATKA | MATKA PATTI JODI NUMBER | MATKA RESULTS | MATKA CHART | MATKA JODI | SATTA COM | FULL RATE GAME | MATKA GAME | MATKA WAPKA | ALL MATKA RESULT LIVE ONLINE | MATKA RESULT | KALYAN MATKA RESULT | DPBOSS MATKA 143 | MAIN MATKA
➒➌➎➏➑➐➋➑➐➐ Matka Guessing Satta Matka Kalyan panel Chart Indian Matka Satta Matta Matka Dpboss KALYAN MATKA | MATKA RESULT | KALYAN MATKA TIPS | SATTA MATKA | MATKA.COM | MATKA PANA JODI TODAY | BATTA SATKA | MATKA PATTI JODI NUMBER | MATKA RESULTS | MATKA CHART | MATKA JODI | SATTA COM | FULL RATE GAME | MATKA GAME | MATKA WAPKA | ALL MATKA RESULT LIVE ONLINE | MATKA RESULT | KALYAN MATKA RESULT | DPBOSS MATKA 143 | MAIN MATKA
➒➌➎➏➑➐➋➑➐➐ Satta Matka Dpboss Matka Guessing Indian Matka
KALYAN MATKA | MATKA RESULT | KALYAN MATKA TIPS | SATTA MATKA | MATKA.COM | MATKA PANA JODI TODAY | BATTA SATKA | MATKA PATTI JODI NUMBER | MATKA RESULTS | MATKA CHART | MATKA JODI | SATTA COM | FULL RATE GAME | MATKA GAME | MATKA WAPKA | ALL MATKA RESULT LIVE ONLINE | MATKA RESULT | KALYAN MATKA RESULT | DPBOSS MATKA 143 | MAIN MATKA
❼❷⓿❺❻❷❽❷❼❽ Dpboss Matka ! Fix Satta Matka ! Matka Result ! Matka Guessing ! Final Matka ! Matka Result ! Dpboss Matka ! Matka Guessing ! Satta Matta Matka 143 ! Kalyan Matka ! Satta Matka Fast Result ! Kalyan Matka Guessing ! Dpboss Matka Guessing ! Satta 143 ! Kalyan Chart ! Kalyan final ! Satta guessing ! Matka tips ! Matka 143 ! India Matka ! Matka 420 ! matka Mumbai ! Satta chart ! Indian Satta ! Satta King ! Satta 143 ! Satta batta ! Satta मटका ! Satta chart ! Matka 143 ! Matka Satta ! India Matka ! Indian Satta Matka ! Final ank
❼❷⓿❺❻❷❽❷❼❽ Dpboss Matka ! Fix Satta Matka ! Matka Result ! Matka Guessing ! ...
Team rocket presentation
1. Chapter 9: Law and Regulation
By: Paige Bollman, AJ Hung-Barnes, Susan
Morales, and Julia Ramirez-Vaughan
2. “What a lot of people don’t
realize is that when they decide
to start a blog or post
comments … they are
potentially making themselves
open to being liable to the laws
of that country.”
- Anthony Fargo (2012)
Lipschultz, J. H. (2015). Social media communication: concepts, practices, data, law and ethics. New York: Routledge Taylor & Francis Group.
3. Christopher Peter Tarquini (Facebook)
Lipschultz, J. H. (2015). Social media communication: concepts, practices, data, law and ethics. New York: Routledge Taylor & Francis Group.
4. Internet Service Providers (ISPs)
● Have protection from
liability for libel.
Example: AOL cannot be
sued for potential libelous
content distributed by an
individual using the network.
Lipschultz, J. H. (2015). Social media communication: concepts, practices, data, law and ethics. New York: Routledge Taylor & Francis Group.
5. Facebook,
Twitter and the
Law
Lipschultz, J. H. (2015). Social media communication: concepts, practices, data, law and ethics. New York: Routledge Taylor & Francis Group.
● From zero to hundreds of
social media cases per
year
● Eroding freedom of
speech?
7. Tatro v. University of Minnesota (2012)
Outcome
In the beginning:
● Barred from lab during investigation
● Allowed to return to take final examinations
● Tatro testified at a hearing that she did not understand Facebook fell under a rule that prohibited
blogging
Punishments:
● A grade of “F” in the course
● Must complete an ethics course
● Write a letter to faculty
● Complete a psychiatric evaluation
● Probation for remainder of undergraduate work
(Rejection of First Amendment argument)
Lipschultz, J. H. (2015). Social media communication: concepts, practices, data, law and ethics. New York: Routledge Taylor & Francis Group.
8. Facebook Terms & Conditions
Lipschultz, J. H. (2015). Social media communication: concepts, practices, data, law and ethics. New York: Routledge Taylor & Francis Group.
● When you sign up, you agree to Terms of Service (TOS)
contract
● 3 Categories (Rights and Responsibilities, Data Use,
Community Standards)
● 2013 Revision on Facebook (current may 2014) for data
policy
9. Facebook Terms & Conditions
Lipschultz, J. H. (2015). Social media communication: concepts, practices, data, law and ethics. New York: Routledge Taylor & Francis Group.
● “You own all of the content and information you post on Facebook, and you
control how it is shared through your privacy and application settings...”
● Deleted content, “may persist in backup copies for a reasonable period of time
(but will not be available to others…”
● Facebook TOS contact states, “will not bully, intimidate, or harass any user …
will not post content that: is hate speech, threatening, or pornographic; incites
violence; or contains nudity …”
● Convicted sex offenders are not allowed to use Facebook under the rules.
11. Emerging Twitter Law
Lipschultz, J. H. (2015). Social media communication: concepts, practices, data, law and ethics. New York: Routledge Taylor & Francis Group.
● Tweets create a legal record of communication and
behavior
● 4 potential lawsuit areas (company secrets, invasion of
privacy/defamation, trademark violations and wrongful
employee termination claims)
12. Emerging Twitter Law
Example: 2009 Horizon Group Management sued tenant
Amanda Bonnen for $50,000 after tweeting:
“You should just come anyway. Who said sleeping in a
moldy apartment was bad for you? Horizon realty thinks
it’s okay.”
Bonnen only had 20 Twitter followers … case was
dismissed because Tweet was too vague.
Lipschultz, J. H. (2015). Social media communication: concepts, practices, data, law and ethics. New York: Routledge Taylor & Francis Group.
13. International Social Media
● Nearly half of Internet users, 44.8%, are located in Asia.
● The fastest growing regions for Internet users are Africa and Europe.
● Countries with filtered Internet use, such as China, expand using their own social
networking site. Example: Weibo, a Twitter-like social media app.
● In 2009, China was in the lead for most Internet users but with freedom as a concern,
the government pressured computer companies to pre-instal filtering softwares to limit
Internet usage.
● From Asia to the Middle East, open social media communication challenges traditional
legal restrictions.
14. International Cyber Crime
● Broad issues of global cyber crime fall under the relatively new area of “Internet
governance”, which address a variety of activities.
● The United Nations established the Internet Governance Forum (IGF).
● The IGF addresses global Internet governance issues, such as marketing of counterfeit
medicines or online pharmacies marketing nationally regulated drugs.
● Social media and the communication it allows makes the Internet subject to free speech
debates, especially in the Eastern world.
15. Prior Restraint and Terrorism
● In 1931, the Supreme Court established an American prior restraint doctrine identifying where
legal lines can be drawn in terms of: threats to national security, times where publication
might insight violent overthrow of government, and publishing fighting words or obscenities.
● Prior restraint law places a burden on government to limit a speaker before online publication,
but it does not protect them from punishment through civil lawsuit or the criminal justice
system.
“The internet has enabled terrorist organizations to research and coordinate attacks; to expand the
reach of their propaganda to a global audience; to communicate with international supporters; and
to foster public awareness and sympathy for their causes.” -Professor Gabriel Weinmann.
16. Crown Prosecution Service (CPS)
Opposed to the United States, the UK has clear guidelines set by the CPS for prosecution of social
media communication; the goal is to find balance between protecting individuals and allowing for
balanced freedom of speech. Criteria for CPS includes:
● Communications which may constitute credible threats of violence to the person or damage of
property.
● Communications which specifically target an individual or individuals and may constitute
harassment or stalking.
● Communications which may amount to a breach of a court order.
● Communications which do not fall into any of these categories above but which may be
considered: grossly offensive, indecent, obscene, or false.
17. Continued CPS Guidelines on Prosecuting Cases
Involving Social Media (pg. 169)
● U.S AND U.K may issue a restraining order against online
stalkers
● U.K restricts grossly offensive indecent obscene or false
communication
British refer to Article 10 on European Convention on Human
Rights:
● All have right to freedom of expression.
● Clear evidence of an intention to cause distress or anxiety.
● Age is also considered because children and young people
18. U.S Internet Indecency (pg. 170)
● The Telecommunication Act of 1996/Communications Decency
Act (CDA):
○ Set the stage for several attempts to regulate the Internet
○ It made it illegal to knowingly send or make available to
minors any indecent or obscene material.
● U.S Supreme Court, found part of CDA’S indecency provisions
unconstitutional
● Reno vs. ACLU (1997): Congress acknowledged concern for
children
19. U.S Internet Indecency (pg. 170)
● Website operators act as publishers
○ May make their material available to all
Internet users
○ The Court wanted narrowly tailored
restrictions on Internet speech as well as
application of traditional obscenity law
● Courts use Miller v. California (1973) to define
obscenity across all media including social media
● Miller Test
○ 1. Prurient Interest/Lewd Interest.
○ 2. Patently Offensive.
○ 3. Value of Work.
20. U.S Internet Indecency (pg. 170)
● Justice John Paul Stevens understood that prurient appeal is a problem
○ For social media, it can be difficult to identify “the work” in the context of “a
whole”, as mobile social platforms like Snapchat are brief and temporary
○ The value test is a matter of generational and cultural definition
○ Pornography spammers continue to be a problem, and Facebook is among those
social media sites filing lawsuits to stop it (Crook, 2013).
21. Regulated Media Technologies (pg. 171)
● U.S global media “imperialism” through traditional channels (Innis, 1972, p. 169) are also is being
weakened in the 21st century by social media
● U.S government maintains a regulatory interest in information accuracy and consumer
perception of claims.
22. BOX. 9.4 Thought Leader Misty Montano
Digital Content Manager for 9 NEWS in Denver, Colorodo. Emmy award-winning journalist.
● The relationship between the journalist and the news consumer has had the greatest impact from social
media.
● Journalists learned how to let their social communities actively engage with the writing process. This can
be dangerous because information can be misinterpreted
● Social media requires journalists to have a transparent relationship with news consumers
● integrated social media marketing plan to move them to the end product: TV, online, and mobile news.
23. BOX. 9.4 Thought Leader Misty Montano
Digital Content Manager for 9 NEWS in Denver, Colorodo. Emmy award-winning journalist.
● In Montano’s opinion, a large majority of social media users, as well as journalists, do not
understand how the social networks actually work.
● Journalists are told social media can be the reason a person chooses their story over another, but
the begin to find out that just using them doesn’t mean the audience follows.
● Journalists with social media can become a trusted source of information; however, finding an
ethical balance is a mystery. When could they voice opinions or commentary?
● Journalists and news organizations have new opportunities through the continued development of
digital and mobile products that make it easier for the news consumer to access and engage with
the story.
24. BOX. 9.4 Thought Leader Misty Montano
Digital Content Manager for 9 NEWS in Denver, Colorodo. Emmy award-winning journalist.
● Digital and mobile apps need to focus on social sharing and user generated
content.
● Social sharing is vital in keeping and creating loyal news consumers.
● Viewer/reader generated content not only helps build out a story, but can be
a motivator for someone to choose one news report over another.
● People want information that will impact their lives in some way.
● Partnerships with experts help provide expertise
25. BOX. 9.4 Thought Leader Misty Montano
Digital Content Manager for 9 NEWS in Denver, Colorodo. Emmy award-winning journalist.
● Weaving one’s personal life with his work and public life on social
media is truly an art form. Anything posted on social media can
have an impact on one’s employment.
● Disclaimers in “bio” sections provide no protection
● Law protects an individual’s right to free speech and protects an
individual from giving network passwords to employers
26. BOX. 9.4 Thought Leader Misty Montano
Digital Content Manager for 9 NEWS in Denver, Colorodo. Emmy award-winning journalist.
● However, nothing is truly private on social media and the
right to have a job in not protected by law. One’s use of
social media becomes one’s personal brand.
● Employers have the right to protect their company profile
and brand
.
● Employers have the right to search the digital footprint of its
employees.
● Employers usually don’t seek out employee activity online.
Instead employers find out what has been said or done
because of other’s sharing their reaction to it.
27. BOX. 9.4 Thought Leader Misty Montano
Digital Content Manager for 9 NEWS in Denver, Colorodo. Emmy award-winning journalist.
● When public reaction snowballs into a mob mentality, an employer has the right to determine if
what is happening is damaging to the company and to take actions against that employee
● Misty Montano: Don’t BE the news.
● Think first and be smart in all you do
● Behave on social media the way you would behave in front of the important people in your life
● If you wouldn’t say or do it in front of these people, then don’t do it on social media.
28. FTC Regulation
● FTC (Federal Trade Commission) regulates
advertising in the U.S. from a legal standpoint.
● Goal is consumer protection → preventing fraud in
the marketplace
● Defined deception in advertising as giving a
consumer a false impression → disclosure needs to
be written clear
● Since the “digital age” the FTC’s job has gotten more
crucial involving; computer security, online safety of
children, identity theft
29. FTC Regulation Cont’d
● There have been investigations involving the supreme court and FTC
● Commercial speech, defined by Supreme Court Justice John Paul Stevens as “expression
related solely to the economic interests of the speaker and its audience”
● Disclosures need to be located in places where they will be seen
● 2004, FTC investigated Amazon.com’s online Toy Store because of concerns over
protection of child privacy.
30. FTC and Social Media
● FTC revised their guidelines to accommodated social networking sites and social media marketing
→ FTC says financial arrangements between bloggers and advertisers may not be apparent to readers.
● EX” FTC filed a complaint against Facebook for deceptive or unfair privacy practices
○ They made a set of rules to make sure that Facebook follows their privacy settings and does not
mislead people
Copyright, File Sharing and Fair Use
● Copyright protects material upon its creation → the creator has rights to reproduce and distribute
● There is a long history of copyright issues (music or video bootleggers) which caused the Digital
Millennium Copyright Act of 1998 which addressed loopholes in streaming media.
31. Social Media Privacy Issues
● Sites such as Facebook are often a threat when it comes to privacy rights
● Employees at work - Limited privacy
● Companies are required to warn users about the data and user locations the
website or app collects
● Documents released in 2013 by NSA contractor raised concerns about
government surveillance of communication networks
Amanda Beth Tatro was studying mortuary science … said these were “satirical comments.” School said it was against their rules.
By AJ
Mission Statement:
““To prevent business practices that are anticompetitive or deceptive or unfair to consumers; to enhance informed consumer choice and public understanding of the competitive process; and to accomplish this without unduly burdening legitimate business activity”.