SlideShare a Scribd company logo
Ethics in Information
Technology, Second Edition
Chapter 5
Freedom of Expression
Ethics in Information Technology, Second Edition 2
Objectives
• What is the legal basis for the protection of freedom
of speech in the United States, and what types of
speech are not protected under the law?
• In what ways does the Internet present new
challenges in the area of freedom of expression?
• What key free-speech issues relate to the use of
information technology?
Ethics in Information Technology, Second Edition 3
Free Speech and Limits
• “I disapprove of what you say, but I will defend
to death your right to say it!” – biographer of
Francois Voltaire
• "The most stringent protection of free speech
would not protect a man falsely shouting fire in
a theater and causing a panic." -- Justice Oliver
Wendell Holmes, Jr., in 1919, United States
Supreme Court
Ethics in Information Technology, Second Edition 4
Freedom of expression &
First Amendment Rights
• Right to freedom of expression
– Important right for free people everywhere
– Guaranteed by the First Amendment in USA
• Definition of free speech includes
– Nonverbal, visual, and symbolic forms of expression
– Right to speak anonymously
Ethics in Information Technology, Second Edition 5
First Amendment Rights (continued)
• Not protected by the First Amendment
– Obscene speech
– Defamation
– Incitement of panic
– Incitement to crime
– “Fighting words”
– Sedition
Ethics in Information Technology, Second Edition 6
Obscene Speech
• Speech is considered obscene when
– Average person finds the work appeals to the
prurient interest
– Work depicts or describes sexual conduct in an
offensive way
– Lacks serious literary, artistic, political, or scientific
value
Ethics in Information Technology, Second Edition 7
Defamation
• Publication of a statement of alleged fact that is
– False
– Harms another person
• Harm is often of a financial nature
• Slander
– Oral defamatory statement
• Libel
– Written defamatory statement
Ethics in Information Technology, Second Edition 8
Offensive Speech and
Censorship in Cyberspace
• What is offensive speech?
– Political or religious speech.
– Pornography.
– Racial slurs.
– Nazi materials.
– Abortion information.
– Depictions of violence
– How to make Bombs
– Alcohol ads.
Ethics in Information Technology, Second Edition 9
Freedom of Expression: Key Issues
• Controlling access to information on the Internet
• Anonymity
• Defamation
• Hate speech
• Pornography
Ethics in Information Technology, Second Edition 10
Controlling Access to Information on
the Internet
• Material Inappropriate for Children
– Technology Changes the Context
• On the Web, children have access to the same
‘adult’ text, images, videos, etc. as adults.
• Online proprietors don’t know the customer is not
an adult.
– Protecting Children
• It is illegal to create, possess or distribute child
pornography, regardless of the medium.
Ethics in Information Technology, Second Edition 11
Controlling Access to Information on
the Internet
• Material Inappropriate for Children
– There is no doubt that there is material on the Web
that most people would consider inappropriate for
children.
– There is much on the Web that is extremely
offensive to adults.
– It is not surprising that some people see the Internet
as a scary place for children.
Ethics in Information Technology, Second Edition 12
Controlling Access to Information on
the Internet
• Censorship Laws
– Communications Decency Act (CDA, 1996)
• Publicity and public pressure lead Congress to pass
this act.
• Anyone who made available to anyone under 18 any
communication that is obscene or indecent would be
subject to a $100,000 fine and two years in prison.
• In 1997, the CDA was ruled unconstitutional because
it was too vague and too broad in protecting children
online and because less restrictive means are
available.
Ethics in Information Technology, Second Edition 13
Controlling Access to Information on
the Internet
• Censorship Laws (cont’d)
– Child Online Protection Act (COPA, 1998)
• Commercial Web sites that make available to
minors materials “harmful to minors”, as
judged by community standards would be
subject to a $50,000 fine and six months in
jail.
• In 2000 and 2003, COPA was ruled
unconstitutional by a federal court.
Ethics in Information Technology, Second Edition 14
Controlling Access to Information on
the Internet
• Censorship Laws (cont’d)
– Children’s Internet Protection Act (CIPA, 2000)
• Any school or library receiving federal Internet
funds must install filtering software on all Internet
terminals.
• Filters must block sites containing child
pornography, obscene material, and any material
deemed “harmful to minors.”
• A federal appeals court ruled a major part of CIPA
unconstitutional in 2002 but the Supreme Court
upheld the law in 2003.
Ethics in Information Technology, Second Edition 15
Controlling Access to Information on
the Internet
• Internet Access in Libraries and Schools
– Filtering Software
• Benefit: prevent access to inappropriate material on the
Internet by screening words or phrases, blocking sites
according to rating system, or disallowing access to
specific sites in a list.
• Problems: can be ineffective—kids get around the filters;
the words, phrases, rating systems, etc. are subjective;
“banned” keywords can be overly restrictive for adult
users and for legitimate use by minors.
Ethics in Information Technology, Second Edition 16
Controlling Access to Information on
the Internet
– Filtering Software
• URL filtering
– Blocks URLs or domain names
• Keyword filtering
– Blocks key words or phrases
• Dynamic content filtering
– Web site’s content is evaluated immediately before
being displayed
– Uses
» Object analysis
» Image recognition
Ethics in Information Technology, Second Edition 17
Controlling Access to Information on
the Internet (continued)
• Popular Internet filters
– ContentProtect
– CYBERsitter
– NetNanny
– CyberPatrol
– HateFilter
Ethics in Information Technology, Second Edition 18
Controlling Access to Information on
the Internet (continued)
• ICRA rating system
– Questionnaire for Web authors
– Generates a content label
• Uses Platform for Internet Content Selection (PICS)
standard
– Users can configure browsers to read the label to
block content
– Relies on Web authors to rate their site
– Complement to other filtering techniques
Ethics in Information Technology, Second Edition 19
Controlling Access to Information on
the Internet (continued)
• ISP blocking
– Blocking is performed on the ISP server
– ClearSail/Family.NET prevents access to certain
Web sites
Ethics in Information Technology, Second Edition 20
Legal Overview: Children’s Internet
Protection Act (CIPA)
• Federally financed schools and libraries must block
computer access to
– Obscene material
– Pornography
– Anything considered harmful to minors
• Schools and libraries subject to CIPA do not
receive Internet access discounts unless they
certify that Internet safety measures are in place
– Required to adopt a policy to monitor the online
activities of minors
Ethics in Information Technology, Second Edition 21
Legal Overview: Children’s Internet
Protection Act (CIPA) (continued)
• CIPA does not require the tracking of Internet use
by minors or adults
• Acceptable use policy agreement is an essential
element of a successful program in schools
– Signed by
• Students
• Parents
• Employees
• Difficulty implementing CIPA in libraries because
their services are open to people of all ages
– Including adults with First Amendment rights
Ethics in Information Technology, Second Edition 22
Anonymity
• Principle of anonymous expression
– People can state opinions without revealing their
identity
– In the wrong hands, it can be a tool to commit illegal
or unethical activities
Ethics in Information Technology, Second Edition 23
Anonymity
• Common Sense and the Internet
– Early publications by some of our Founding
Fathers were published under pseudonyms.
– Jonathon Swift published his humorous and biting
political satire Gulliver’s Travels anonymously.
– In the nineteenth century, when it was not
considered proper for women to write books,
women writers such as Mary Ann Evans published
under male pseudonym.
– Today, there are publications on the Net that are
posted anonymously.
Ethics in Information Technology, Second Edition 24
Anonymity
• Common Sense and the Internet
– Whistleblowers may choose to release information
via anonymous postings.
– To send anonymous e-mail, one sends the
message to a remailer service, where the return
address is stripped off and the message is resent
to the intended recipient.
– Several businesses, like Anonymizer.com and
Zero-Knowledge Systems, provide a variety of
sophisticated tools and services that enable us to
send e-mail and surf the Web anonymously.
Ethics in Information Technology, Second Edition 25
Defamation and Hate Speech
• Actions that can be prosecuted include
– Sending threatening private messages over the
Internet to a person
– Displaying public messages on a Web site
describing intent to commit acts of hate-motivated
violence
– Libel directed at a particular person
Ethics in Information Technology, Second Edition 26
Defamation and Hate Speech
(continued)
• Some ISPs voluntarily agree to prohibit subscribers
from sending hate messages
– Does not violate subscribers’ First Amendment rights
– ISPs must monitor the use of their service
– Take action when terms are violated
Ethics in Information Technology, Second Edition 27
Pornography
• The Internet has been a boon to the pornography
industry
– More than 60,000 Web sex sites are accessible
– The sites generate at least $1 billion a year in
revenue
• CAN-SPAM Act
– Deterrent in fighting the dissemination of
pornography
Ethics in Information Technology, Second Edition 28
Pornography (continued)
• Reasonable steps to stop access in the workplace
– Establishing a computer usage policy
• Prohibiting access to pornography sites
– Identifying those who violate the policy
– Taking action against those users
• Numerous federal laws address child pornography
– Federal offense
Ethics in Information Technology, Second Edition 29
Manager’s Checklist for Handling Freedom
of Expression in the Workplace
Ethics in Information Technology, Second Edition 30
Summary
• First Amendment protects the right to
– Freedom of religion
– Freedom of expression
• Key issues:
– Controlling access to Internet information
– Anonymous communication
– Spread of defamation and hate speech
– Access to pornography

More Related Content

PPT
ethcpp05-Unit 3.ppt
PDF
Chapter 5_dp-_pertemuan_7_8
PPT
Freedom of speech
PDF
Internet decency legislation
PDF
Wk_3_freedom_of_speech.pdf
PPTX
International internet governance
PPT
An Overview of the Battle for the Control of the Internet
PPTX
604847734-CYBER-ETHICS-pptjln;-slides.pptx
ethcpp05-Unit 3.ppt
Chapter 5_dp-_pertemuan_7_8
Freedom of speech
Internet decency legislation
Wk_3_freedom_of_speech.pdf
International internet governance
An Overview of the Battle for the Control of the Internet
604847734-CYBER-ETHICS-pptjln;-slides.pptx

Similar to 4568595.ppt (20)

PPT
PDF
Chapter 9_dp-pertemuan_14
PPT
Freedom of expression on the internet
PPT
Freedom of expression on the internet
PPTX
Introduction to ethics
PPTX
7.-ETHICAL-AND-SOCIAL-ISSUES-IN-INFORMATION-SYSTEMS.pptx
PPTX
60_484_7734-CYBER-ETHICS-ppt-slides.pptx
PPTX
Naughty or nice: Ethical concerns for technology
DOCX
Reviewer make it private because it's nee
PPTX
Kasita's presentation
PPTX
Presentation slides
PPTX
Cyber Literacy PowerPoints Presentations
PPTX
PPTX
Media law for community journalists and bloggers
PPTX
Ehsan Kabir Solicitor-Ethics Frameworks
PPTX
3 - Social Media and Enterprise
PPT
PPIT Lecture 5
PPTX
report_ThhhhhhhhhhhhhhhhhhhhhTL TTL.pptx
PPT
Chapter 9_dp-pertemuan_14
Freedom of expression on the internet
Freedom of expression on the internet
Introduction to ethics
7.-ETHICAL-AND-SOCIAL-ISSUES-IN-INFORMATION-SYSTEMS.pptx
60_484_7734-CYBER-ETHICS-ppt-slides.pptx
Naughty or nice: Ethical concerns for technology
Reviewer make it private because it's nee
Kasita's presentation
Presentation slides
Cyber Literacy PowerPoints Presentations
Media law for community journalists and bloggers
Ehsan Kabir Solicitor-Ethics Frameworks
3 - Social Media and Enterprise
PPIT Lecture 5
report_ThhhhhhhhhhhhhhhhhhhhhTL TTL.pptx
Ad

Recently uploaded (20)

PDF
Exploring VPS Hosting Trends for SMBs in 2025
PDF
Uptota Investor Deck - Where Africa Meets Blockchain
PPTX
newyork.pptxirantrafgshenepalchinachinane
PDF
Smart Home Technology for Health Monitoring (www.kiu.ac.ug)
PDF
SlidesGDGoCxRAIS about Google Dialogflow and NotebookLM.pdf
PPTX
Introduction to cybersecurity and digital nettiquette
PDF
The Evolution of Traditional to New Media .pdf
PPTX
E -tech empowerment technologies PowerPoint
PPT
415456121-Jiwratrwecdtwfdsfwgdwedvwe dbwsdjsadca-EVN.ppt
PPT
FIRE PREVENTION AND CONTROL PLAN- LUS.FM.MQ.OM.UTM.PLN.00014.ppt
DOC
Rose毕业证学历认证,利物浦约翰摩尔斯大学毕业证国外本科毕业证
PPTX
artificial intelligence overview of it and more
PPTX
Power Point - Lesson 3_2.pptx grad school presentation
PPTX
Internet Safety for Seniors presentation
PPTX
1402_iCSC_-_RESTful_Web_APIs_--_Josef_Hammer.pptx
PPT
isotopes_sddsadsaadasdasdasdasdsa1213.ppt
PPTX
artificialintelligenceai1-copy-210604123353.pptx
PPTX
IPCNA VIRTUAL CLASSES INTERMEDIATE 6 PROJECT.pptx
PPT
Ethics in Information System - Management Information System
PDF
mera desh ae watn.(a source of motivation and patriotism to the youth of the ...
Exploring VPS Hosting Trends for SMBs in 2025
Uptota Investor Deck - Where Africa Meets Blockchain
newyork.pptxirantrafgshenepalchinachinane
Smart Home Technology for Health Monitoring (www.kiu.ac.ug)
SlidesGDGoCxRAIS about Google Dialogflow and NotebookLM.pdf
Introduction to cybersecurity and digital nettiquette
The Evolution of Traditional to New Media .pdf
E -tech empowerment technologies PowerPoint
415456121-Jiwratrwecdtwfdsfwgdwedvwe dbwsdjsadca-EVN.ppt
FIRE PREVENTION AND CONTROL PLAN- LUS.FM.MQ.OM.UTM.PLN.00014.ppt
Rose毕业证学历认证,利物浦约翰摩尔斯大学毕业证国外本科毕业证
artificial intelligence overview of it and more
Power Point - Lesson 3_2.pptx grad school presentation
Internet Safety for Seniors presentation
1402_iCSC_-_RESTful_Web_APIs_--_Josef_Hammer.pptx
isotopes_sddsadsaadasdasdasdasdsa1213.ppt
artificialintelligenceai1-copy-210604123353.pptx
IPCNA VIRTUAL CLASSES INTERMEDIATE 6 PROJECT.pptx
Ethics in Information System - Management Information System
mera desh ae watn.(a source of motivation and patriotism to the youth of the ...
Ad

4568595.ppt

  • 1. Ethics in Information Technology, Second Edition Chapter 5 Freedom of Expression
  • 2. Ethics in Information Technology, Second Edition 2 Objectives • What is the legal basis for the protection of freedom of speech in the United States, and what types of speech are not protected under the law? • In what ways does the Internet present new challenges in the area of freedom of expression? • What key free-speech issues relate to the use of information technology?
  • 3. Ethics in Information Technology, Second Edition 3 Free Speech and Limits • “I disapprove of what you say, but I will defend to death your right to say it!” – biographer of Francois Voltaire • "The most stringent protection of free speech would not protect a man falsely shouting fire in a theater and causing a panic." -- Justice Oliver Wendell Holmes, Jr., in 1919, United States Supreme Court
  • 4. Ethics in Information Technology, Second Edition 4 Freedom of expression & First Amendment Rights • Right to freedom of expression – Important right for free people everywhere – Guaranteed by the First Amendment in USA • Definition of free speech includes – Nonverbal, visual, and symbolic forms of expression – Right to speak anonymously
  • 5. Ethics in Information Technology, Second Edition 5 First Amendment Rights (continued) • Not protected by the First Amendment – Obscene speech – Defamation – Incitement of panic – Incitement to crime – “Fighting words” – Sedition
  • 6. Ethics in Information Technology, Second Edition 6 Obscene Speech • Speech is considered obscene when – Average person finds the work appeals to the prurient interest – Work depicts or describes sexual conduct in an offensive way – Lacks serious literary, artistic, political, or scientific value
  • 7. Ethics in Information Technology, Second Edition 7 Defamation • Publication of a statement of alleged fact that is – False – Harms another person • Harm is often of a financial nature • Slander – Oral defamatory statement • Libel – Written defamatory statement
  • 8. Ethics in Information Technology, Second Edition 8 Offensive Speech and Censorship in Cyberspace • What is offensive speech? – Political or religious speech. – Pornography. – Racial slurs. – Nazi materials. – Abortion information. – Depictions of violence – How to make Bombs – Alcohol ads.
  • 9. Ethics in Information Technology, Second Edition 9 Freedom of Expression: Key Issues • Controlling access to information on the Internet • Anonymity • Defamation • Hate speech • Pornography
  • 10. Ethics in Information Technology, Second Edition 10 Controlling Access to Information on the Internet • Material Inappropriate for Children – Technology Changes the Context • On the Web, children have access to the same ‘adult’ text, images, videos, etc. as adults. • Online proprietors don’t know the customer is not an adult. – Protecting Children • It is illegal to create, possess or distribute child pornography, regardless of the medium.
  • 11. Ethics in Information Technology, Second Edition 11 Controlling Access to Information on the Internet • Material Inappropriate for Children – There is no doubt that there is material on the Web that most people would consider inappropriate for children. – There is much on the Web that is extremely offensive to adults. – It is not surprising that some people see the Internet as a scary place for children.
  • 12. Ethics in Information Technology, Second Edition 12 Controlling Access to Information on the Internet • Censorship Laws – Communications Decency Act (CDA, 1996) • Publicity and public pressure lead Congress to pass this act. • Anyone who made available to anyone under 18 any communication that is obscene or indecent would be subject to a $100,000 fine and two years in prison. • In 1997, the CDA was ruled unconstitutional because it was too vague and too broad in protecting children online and because less restrictive means are available.
  • 13. Ethics in Information Technology, Second Edition 13 Controlling Access to Information on the Internet • Censorship Laws (cont’d) – Child Online Protection Act (COPA, 1998) • Commercial Web sites that make available to minors materials “harmful to minors”, as judged by community standards would be subject to a $50,000 fine and six months in jail. • In 2000 and 2003, COPA was ruled unconstitutional by a federal court.
  • 14. Ethics in Information Technology, Second Edition 14 Controlling Access to Information on the Internet • Censorship Laws (cont’d) – Children’s Internet Protection Act (CIPA, 2000) • Any school or library receiving federal Internet funds must install filtering software on all Internet terminals. • Filters must block sites containing child pornography, obscene material, and any material deemed “harmful to minors.” • A federal appeals court ruled a major part of CIPA unconstitutional in 2002 but the Supreme Court upheld the law in 2003.
  • 15. Ethics in Information Technology, Second Edition 15 Controlling Access to Information on the Internet • Internet Access in Libraries and Schools – Filtering Software • Benefit: prevent access to inappropriate material on the Internet by screening words or phrases, blocking sites according to rating system, or disallowing access to specific sites in a list. • Problems: can be ineffective—kids get around the filters; the words, phrases, rating systems, etc. are subjective; “banned” keywords can be overly restrictive for adult users and for legitimate use by minors.
  • 16. Ethics in Information Technology, Second Edition 16 Controlling Access to Information on the Internet – Filtering Software • URL filtering – Blocks URLs or domain names • Keyword filtering – Blocks key words or phrases • Dynamic content filtering – Web site’s content is evaluated immediately before being displayed – Uses » Object analysis » Image recognition
  • 17. Ethics in Information Technology, Second Edition 17 Controlling Access to Information on the Internet (continued) • Popular Internet filters – ContentProtect – CYBERsitter – NetNanny – CyberPatrol – HateFilter
  • 18. Ethics in Information Technology, Second Edition 18 Controlling Access to Information on the Internet (continued) • ICRA rating system – Questionnaire for Web authors – Generates a content label • Uses Platform for Internet Content Selection (PICS) standard – Users can configure browsers to read the label to block content – Relies on Web authors to rate their site – Complement to other filtering techniques
  • 19. Ethics in Information Technology, Second Edition 19 Controlling Access to Information on the Internet (continued) • ISP blocking – Blocking is performed on the ISP server – ClearSail/Family.NET prevents access to certain Web sites
  • 20. Ethics in Information Technology, Second Edition 20 Legal Overview: Children’s Internet Protection Act (CIPA) • Federally financed schools and libraries must block computer access to – Obscene material – Pornography – Anything considered harmful to minors • Schools and libraries subject to CIPA do not receive Internet access discounts unless they certify that Internet safety measures are in place – Required to adopt a policy to monitor the online activities of minors
  • 21. Ethics in Information Technology, Second Edition 21 Legal Overview: Children’s Internet Protection Act (CIPA) (continued) • CIPA does not require the tracking of Internet use by minors or adults • Acceptable use policy agreement is an essential element of a successful program in schools – Signed by • Students • Parents • Employees • Difficulty implementing CIPA in libraries because their services are open to people of all ages – Including adults with First Amendment rights
  • 22. Ethics in Information Technology, Second Edition 22 Anonymity • Principle of anonymous expression – People can state opinions without revealing their identity – In the wrong hands, it can be a tool to commit illegal or unethical activities
  • 23. Ethics in Information Technology, Second Edition 23 Anonymity • Common Sense and the Internet – Early publications by some of our Founding Fathers were published under pseudonyms. – Jonathon Swift published his humorous and biting political satire Gulliver’s Travels anonymously. – In the nineteenth century, when it was not considered proper for women to write books, women writers such as Mary Ann Evans published under male pseudonym. – Today, there are publications on the Net that are posted anonymously.
  • 24. Ethics in Information Technology, Second Edition 24 Anonymity • Common Sense and the Internet – Whistleblowers may choose to release information via anonymous postings. – To send anonymous e-mail, one sends the message to a remailer service, where the return address is stripped off and the message is resent to the intended recipient. – Several businesses, like Anonymizer.com and Zero-Knowledge Systems, provide a variety of sophisticated tools and services that enable us to send e-mail and surf the Web anonymously.
  • 25. Ethics in Information Technology, Second Edition 25 Defamation and Hate Speech • Actions that can be prosecuted include – Sending threatening private messages over the Internet to a person – Displaying public messages on a Web site describing intent to commit acts of hate-motivated violence – Libel directed at a particular person
  • 26. Ethics in Information Technology, Second Edition 26 Defamation and Hate Speech (continued) • Some ISPs voluntarily agree to prohibit subscribers from sending hate messages – Does not violate subscribers’ First Amendment rights – ISPs must monitor the use of their service – Take action when terms are violated
  • 27. Ethics in Information Technology, Second Edition 27 Pornography • The Internet has been a boon to the pornography industry – More than 60,000 Web sex sites are accessible – The sites generate at least $1 billion a year in revenue • CAN-SPAM Act – Deterrent in fighting the dissemination of pornography
  • 28. Ethics in Information Technology, Second Edition 28 Pornography (continued) • Reasonable steps to stop access in the workplace – Establishing a computer usage policy • Prohibiting access to pornography sites – Identifying those who violate the policy – Taking action against those users • Numerous federal laws address child pornography – Federal offense
  • 29. Ethics in Information Technology, Second Edition 29 Manager’s Checklist for Handling Freedom of Expression in the Workplace
  • 30. Ethics in Information Technology, Second Edition 30 Summary • First Amendment protects the right to – Freedom of religion – Freedom of expression • Key issues: – Controlling access to Internet information – Anonymous communication – Spread of defamation and hate speech – Access to pornography