SlideShare una empresa de Scribd logo
1 de 21
PowerPoint® Slides to Accompany

     A Gift of Fire: Social, Legal, and Ethical
              Issues for Computers and the Internet
                                    (2nd Edition)
                                   by   Sara Baase
                           San Diego State University


                      PowerPoint slides created by Sherry Clark
                            Copyright 2003 Prentice Hall




A Gift of Fire, 2ed           Chapter 5: Freedom of Speech in Cyberspace   1
A Gift of Fire

               Freedom of Speech In Cyberspace
     Changing Communications Paradigms

     Offensive Speech and Censorship in Cyberspace

     Anonymity

     Spam

     Ensuring Valuable and Diverse Content



A Gift of Fire, 2ed      Chapter 5: Freedom of Speech in Cyberspace   2
Changing Communications Paradigms

Regulatory Paradigms
     Communication technologies differ with respect to their
       degree of First Amendment protection and government
       regulation.
     Print Media:
            • Strongest First Amendment protection.
     Broadcast Media:
            • Less First Amendment protection than print media.
     Common Carrier:
            • Content not controlled and the carrier is not responsible for content.




 A Gift of Fire, 2ed            Chapter 5: Freedom of Speech in Cyberspace      3
Changing Communications Paradigms

Regulatory Paradigms (cont’d)
     Internet, BBSs, commercial online services, and the WWW:
            • Not exactly print media.
            • Not exactly broadcast media.
            • Not exactly common carrier.




Q: Who controls the distribution of news, information, and opinion at the
online service you use? at the Web sites you frequent?

 A Gift of Fire, 2ed           Chapter 5: Freedom of Speech in Cyberspace   4
Changing Communications Paradigms

The First Amendment
     Protects Citizens From Government
            • Prohibits restriction of speech, press, peaceful assembly, and religion.
     Subsequent Interpretations Address:
            •   Offensive and/or controversial speech and ideas,
            •   Spoken and written words,
            •   Pictures, art, and other forms of expression and opinion, and
            •   Commercial speech (e.g. advertising).




Q: Should all speech be constitutionally protected?

 A Gift of Fire, 2ed             Chapter 5: Freedom of Speech in Cyberspace     5
Offensive Speech and
                             Censorship in Cyberspace
Speech Might Include:
            •   Political or religious speech.
            •   Pornography.
            •   Sexual or racial slurs.
            •   Nazi materials.
            •   Libelous statements.
            •   Abortion information.
            •   Alcohol ads.




Q: Identify other forms of speech found in cyberspace that some consider
offensive.

 A Gift of Fire, 2ed               Chapter 5: Freedom of Speech in Cyberspace   6
Offensive Speech and
                             Censorship in Cyberspace
Miller v. California
     Material is considered obscene if all three parts are met:
            1. It depicts sexual (or excretory) acts whose depiction is specifically
               prohibited by state law, and
            2. It depicts these acts in a patently offensive manner, appealing to the
               prurient interest as judged by a reasonable person using community
               standards, and
            3. It has no serious literary, artistic, social, political, or scientific value.




 Q: Historically, how have local “community standards” affected censorship
 of speech in cyberspace?

 A Gift of Fire, 2ed               Chapter 5: Freedom of Speech in Cyberspace          7
Offensive Speech and
                             Censorship in Cyberspace
Material Inappropriate for Children
     Technology Changes the Context
            • On the Web, children have access to the same ‘adult’ text, images,
              videos, etc. as adults.
            • Online proprietors don’t know the customer is not an adult.
     Protecting Children
            Regardless of the medium:
                – It is illegal to create, possess or distribute child pornography.
                – It is illegal to lure children into sexual activity.



Q: How should children be protected from access in cyberspace to adult
material?
 A Gift of Fire, 2ed               Chapter 5: Freedom of Speech in Cyberspace         8
Offensive Speech and
                           Censorship in Cyberspace
Censorship Laws
     Communications Decency Act (CDA, 1996)
            • Publicity and public pressure lead Congress to pass this act.
            • Anyone who made available to anyone under 18 any communication
              that is obscene or indecent would be subject to a $100,000 fine and two
              years in prison.
            • In 1997, the CDA was ruled unconstitutional because it was too vague
              and too broad in protecting children online and because less restrictive
              means are available.




Q: Should content on the Internet have as much First Amendment protection as
printed material?
 A Gift of Fire, 2ed            Chapter 5: Freedom of Speech in Cyberspace     9
Offensive Speech and
                           Censorship in Cyberspace
Censorship Laws (cont’d)
     Child Online Protection Act (COPA, 1998)
            • Commercial Web sites that make available to minors materials
              “harmful to minors”, as judged by community standards would be
              subject to a $50,000 fine and six months in jail.
            • In 2000 and 2003, COPA was ruled unconstitutional by a federal court.




Q: How are children protected from “harmful” material outside of Cyberspace?

 A Gift of Fire, 2ed           Chapter 5: Freedom of Speech in Cyberspace    10
Offensive Speech and
                           Censorship in Cyberspace
Censorship Laws (cont’d)
     Children’s Internet Protection Act (CIPA)
            • Any school or library receiving federal Internet funds must install
              filtering software on all Internet terminals.
            • Filters must block sites containing child pornography, obscene material,
              and any material deemed “harmful to minors.”
            • A federal appeals court ruled a major part of CIPA unconstitutional in
              2002 but the Supreme Court upheld the law in 2003.




Q: How does CIPA affect adults accessing online material at a public library
that uses filtering software?
 A Gift of Fire, 2ed            Chapter 5: Freedom of Speech in Cyberspace    11
Offensive Speech and
                           Censorship in Cyberspace
Limiting Internet Access in Libraries and
  Schools
     Filtering Software
            • Benefit: prevent access to inappropriate material on the Internet by
              screening words or phrases, blocking sites according to rating system,
              or disallowing access to specific sites in a list.
            • Problems: can be ineffective—kids get around the filters; the words,
              phrases, rating systems, etc. are subjective; “banned” keywords can be
              overly restrictive for adult users and for legitimate use by minors.




Q: What has been your experience with filtering software?
 A Gift of Fire, 2ed            Chapter 5: Freedom of Speech in Cyberspace    12
Offensive Speech and
                           Censorship in Cyberspace
Challenging Old Regulatory Paradigms and
 Special Interests
     License required:
            • To practice law.
            • To publish traditional newsletters about commodities and futures
              investing (prior to 2000).
     No license required:
            • To create downloadable, self-help legal software.
            • To publish newsletters about, developing software for, and operating
              Web sites concerning commodities and futures investing (since 2000).



Q: Is online advertising of wine free speech or disregard for the regulatory
rights of state governments?
 A Gift of Fire, 2ed           Chapter 5: Freedom of Speech in Cyberspace    13
Offensive Speech and
                           Censorship in Cyberspace
Censorship On the Global Net
     Global Impact
            • Avoiding censorship: the global nature of the Net allows restrictions (or
              barriers) in one country to be circumvented by using networks in other,
              less restrictive countries.
            • Creating censorship: the global nature of the Net makes it easier for one
              nation to impose restrictive standards on others.




Q: Why are online gambling sites established offshore?

 A Gift of Fire, 2ed            Chapter 5: Freedom of Speech in Cyberspace     14
Anonymity

Common Sense and the Internet
            • Early publications by some of our Founding Fathers were published
              under pseudonyms.
            • Today, there are publications on the Net that are posted anonymously.




Q: What are the drawbacks of anonymous Web postings?

 A Gift of Fire, 2ed           Chapter 5: Freedom of Speech in Cyberspace   15
Anonymity

Is Anonymity Protected?
     Conflicts between political freedom of speech and campaign
       regulations:
            • Anonymity protects against retaliation and embarrassment.
            • Anonymity violates rules established by the Federal Elections
              Commission (FEC)




Q: Should anonymous political speech on the Web be regulated?

 A Gift of Fire, 2ed            Chapter 5: Freedom of Speech in Cyberspace    16
Anonymity

Anonymity vs. Community
     Supporters of anonymity:
            • Say it is necessary to protect privacy and free speech.
     Opponents of anonymity:
            • Believe it is anti-social and allows criminals to hide from law
              enforcement.




Q: How is the practice of anonymity online similar/dissimilar to strong
encryption?

 A Gift of Fire, 2ed            Chapter 5: Freedom of Speech in Cyberspace      17
Spam

What Is the Problem?
     Unsolicited, mass e-mail:
            • is cheap to senders but may impose costs on the recipient’s time and/or
              the recipient’s online account.
            • may contain objectionable content (political, commercial ads,
              solicitations for funds, pornography, etc.).
            • may contain a disguised return address.
            • may pass through filters.
            • invades privacy.
            • creates a financial and managerial burden on ISPs.



Q: How do you handle spam?
 A Gift of Fire, 2ed            Chapter 5: Freedom of Speech in Cyberspace    18
Spam

Cases and Free Speech Issues
     AOL v. Cyber Promotions
            • AOL and other service providers have successfully sued spammers
              because of the cost burden imposed.
     Disgruntled Intel Employee
            • Initially, a court ruled that non-commercial spam to Intel employees at
              their Intel e-mail accounts was a form of trespass.
            • The CA Supreme Court ruled that it was not.




Q: Is the forwarding of pre-written observations or opinions from human-
rights groups spam or expressions of free speech? (Or both?)

 A Gift of Fire, 2ed            Chapter 5: Freedom of Speech in Cyberspace    19
Spam

Solutions
            • Technology: filters that screen out spam.
            • Market Pressure: services that list spammers.
            • Business Policy: at the discretion of the recipient, all e-mail would be
              charged a microfee.
            • Law: create restrictions that are consistent with the First Amendment.
            • Vigilantism: punish spammers by hacking into their phone or computer
              systems.




Q: Which solution above, or others, do you support?

 A Gift of Fire, 2ed            Chapter 5: Freedom of Speech in Cyberspace    20
Ensuring Valuable and
                                       Diverse Content
Points to Consider:
            • Is there a balance between commercial and educational information on
              the Web?
            • Should diverse content on the Web be subsidized with taxes?
            • Should valuable content on the Web be regulated?
            • Do we need to ensure the existence of sites containing civic
              information?
            • Are more sites that promote the arts and culture needed?




Q: How do we ensure valuable and diverse content in traditional forms of
media?

 A Gift of Fire, 2ed           Chapter 5: Freedom of Speech in Cyberspace   21

Más contenido relacionado

La actualidad más candente

Activity 10 timeline history of internet
Activity 10 timeline history of internetActivity 10 timeline history of internet
Activity 10 timeline history of internet
MoneFatima
 
Internet decency legislation
Internet decency legislationInternet decency legislation
Internet decency legislation
Tgarmon34
 
Piracy and the music industry
Piracy and the music industryPiracy and the music industry
Piracy and the music industry
Lisa Adams
 
Mm ch 10 internet
Mm ch 10 internetMm ch 10 internet
Mm ch 10 internet
Jason Nix
 
Activity 14 timeline of the history of internet
Activity 14 timeline of the history of internetActivity 14 timeline of the history of internet
Activity 14 timeline of the history of internet
Jaze1105
 
Piracy in Musical Audio-Visual Production and Distribution: A Forensic Engine...
Piracy in Musical Audio-Visual Production and Distribution: A Forensic Engine...Piracy in Musical Audio-Visual Production and Distribution: A Forensic Engine...
Piracy in Musical Audio-Visual Production and Distribution: A Forensic Engine...
editor1knowledgecuddle
 
Timeline History of Internet
Timeline History of InternetTimeline History of Internet
Timeline History of Internet
gladyslising
 

La actualidad más candente (20)

2600 v18 n1 (spring 2001)
2600 v18 n1 (spring 2001)2600 v18 n1 (spring 2001)
2600 v18 n1 (spring 2001)
 
Piracy
PiracyPiracy
Piracy
 
Activity 10 timeline history of internet
Activity 10 timeline history of internetActivity 10 timeline history of internet
Activity 10 timeline history of internet
 
Internet decency legislation
Internet decency legislationInternet decency legislation
Internet decency legislation
 
Freedom of speech
Freedom of speechFreedom of speech
Freedom of speech
 
Piracypowerpoint
PiracypowerpointPiracypowerpoint
Piracypowerpoint
 
About Internet
About InternetAbout Internet
About Internet
 
Polinter08
Polinter08Polinter08
Polinter08
 
Impact of Government Intervention in Online Channels
Impact of Government Intervention in Online ChannelsImpact of Government Intervention in Online Channels
Impact of Government Intervention in Online Channels
 
Introduction to intellectual property oct 2011
Introduction to intellectual property oct 2011Introduction to intellectual property oct 2011
Introduction to intellectual property oct 2011
 
Piracy and the music industry
Piracy and the music industryPiracy and the music industry
Piracy and the music industry
 
Mm ch 10 internet
Mm ch 10 internetMm ch 10 internet
Mm ch 10 internet
 
Glyn Moody - from openness to abundance
Glyn Moody - from openness to abundanceGlyn Moody - from openness to abundance
Glyn Moody - from openness to abundance
 
Online Piracy Paper
Online Piracy PaperOnline Piracy Paper
Online Piracy Paper
 
Copyright issues in a library digital environment
Copyright issues in a library digital environmentCopyright issues in a library digital environment
Copyright issues in a library digital environment
 
Activity 14 timeline of the history of internet
Activity 14 timeline of the history of internetActivity 14 timeline of the history of internet
Activity 14 timeline of the history of internet
 
Piracy in Musical Audio-Visual Production and Distribution: A Forensic Engine...
Piracy in Musical Audio-Visual Production and Distribution: A Forensic Engine...Piracy in Musical Audio-Visual Production and Distribution: A Forensic Engine...
Piracy in Musical Audio-Visual Production and Distribution: A Forensic Engine...
 
Digital Culture Industry: Digital Documentary Analysis
Digital Culture Industry: Digital Documentary AnalysisDigital Culture Industry: Digital Documentary Analysis
Digital Culture Industry: Digital Documentary Analysis
 
copyright Infringement
copyright Infringementcopyright Infringement
copyright Infringement
 
Timeline History of Internet
Timeline History of InternetTimeline History of Internet
Timeline History of Internet
 

Similar a Freedom

International internet governance
International internet governanceInternational internet governance
International internet governance
Jillian York
 
Freedom of expression
Freedom of expressionFreedom of expression
Freedom of expression
Gerwin Ocsena
 
Presentation slides
Presentation slidesPresentation slides
Presentation slides
andrewdyoung
 

Similar a Freedom (20)

4568595.ppt
4568595.ppt4568595.ppt
4568595.ppt
 
International internet governance
International internet governanceInternational internet governance
International internet governance
 
Freedom of expression
Freedom of expressionFreedom of expression
Freedom of expression
 
Wk_3_freedom_of_speech.pdf
Wk_3_freedom_of_speech.pdfWk_3_freedom_of_speech.pdf
Wk_3_freedom_of_speech.pdf
 
Introduction to ethics
Introduction to ethicsIntroduction to ethics
Introduction to ethics
 
An Overview of the Battle for the Control of the Internet
An Overview of the Battle for the Control of the InternetAn Overview of the Battle for the Control of the Internet
An Overview of the Battle for the Control of the Internet
 
Chapter 5_dp-_pertemuan_7_8
 Chapter 5_dp-_pertemuan_7_8 Chapter 5_dp-_pertemuan_7_8
Chapter 5_dp-_pertemuan_7_8
 
Privacy reconsidered
Privacy reconsideredPrivacy reconsidered
Privacy reconsidered
 
Topics in Internet and Education
Topics in Internet and EducationTopics in Internet and Education
Topics in Internet and Education
 
MIL WEEK 8.pptx
MIL WEEK 8.pptxMIL WEEK 8.pptx
MIL WEEK 8.pptx
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Building Legal Institutions for Information Technology
Building Legal Institutions for Information TechnologyBuilding Legal Institutions for Information Technology
Building Legal Institutions for Information Technology
 
ACRL
ACRLACRL
ACRL
 
Software piracy
Software piracySoftware piracy
Software piracy
 
Presentation slides
Presentation slidesPresentation slides
Presentation slides
 
Encryption & interception of communication
Encryption & interception of communicationEncryption & interception of communication
Encryption & interception of communication
 
Encryption & interception of communication
Encryption & interception of communicationEncryption & interception of communication
Encryption & interception of communication
 
Internet censorship by ronak
Internet censorship by ronakInternet censorship by ronak
Internet censorship by ronak
 
Digital Repression and Techno-Authoritarianism
Digital Repression and Techno-AuthoritarianismDigital Repression and Techno-Authoritarianism
Digital Repression and Techno-Authoritarianism
 
Cyberspace Usages Challenges And Disputeresolution Ja
Cyberspace Usages Challenges And Disputeresolution  JaCyberspace Usages Challenges And Disputeresolution  Ja
Cyberspace Usages Challenges And Disputeresolution Ja
 

Freedom

  • 1. PowerPoint® Slides to Accompany A Gift of Fire: Social, Legal, and Ethical Issues for Computers and the Internet (2nd Edition) by Sara Baase San Diego State University PowerPoint slides created by Sherry Clark Copyright 2003 Prentice Hall A Gift of Fire, 2ed Chapter 5: Freedom of Speech in Cyberspace 1
  • 2. A Gift of Fire Freedom of Speech In Cyberspace Changing Communications Paradigms Offensive Speech and Censorship in Cyberspace Anonymity Spam Ensuring Valuable and Diverse Content A Gift of Fire, 2ed Chapter 5: Freedom of Speech in Cyberspace 2
  • 3. Changing Communications Paradigms Regulatory Paradigms Communication technologies differ with respect to their degree of First Amendment protection and government regulation. Print Media: • Strongest First Amendment protection. Broadcast Media: • Less First Amendment protection than print media. Common Carrier: • Content not controlled and the carrier is not responsible for content. A Gift of Fire, 2ed Chapter 5: Freedom of Speech in Cyberspace 3
  • 4. Changing Communications Paradigms Regulatory Paradigms (cont’d) Internet, BBSs, commercial online services, and the WWW: • Not exactly print media. • Not exactly broadcast media. • Not exactly common carrier. Q: Who controls the distribution of news, information, and opinion at the online service you use? at the Web sites you frequent? A Gift of Fire, 2ed Chapter 5: Freedom of Speech in Cyberspace 4
  • 5. Changing Communications Paradigms The First Amendment Protects Citizens From Government • Prohibits restriction of speech, press, peaceful assembly, and religion. Subsequent Interpretations Address: • Offensive and/or controversial speech and ideas, • Spoken and written words, • Pictures, art, and other forms of expression and opinion, and • Commercial speech (e.g. advertising). Q: Should all speech be constitutionally protected? A Gift of Fire, 2ed Chapter 5: Freedom of Speech in Cyberspace 5
  • 6. Offensive Speech and Censorship in Cyberspace Speech Might Include: • Political or religious speech. • Pornography. • Sexual or racial slurs. • Nazi materials. • Libelous statements. • Abortion information. • Alcohol ads. Q: Identify other forms of speech found in cyberspace that some consider offensive. A Gift of Fire, 2ed Chapter 5: Freedom of Speech in Cyberspace 6
  • 7. Offensive Speech and Censorship in Cyberspace Miller v. California Material is considered obscene if all three parts are met: 1. It depicts sexual (or excretory) acts whose depiction is specifically prohibited by state law, and 2. It depicts these acts in a patently offensive manner, appealing to the prurient interest as judged by a reasonable person using community standards, and 3. It has no serious literary, artistic, social, political, or scientific value. Q: Historically, how have local “community standards” affected censorship of speech in cyberspace? A Gift of Fire, 2ed Chapter 5: Freedom of Speech in Cyberspace 7
  • 8. Offensive Speech and Censorship in Cyberspace Material Inappropriate for Children Technology Changes the Context • On the Web, children have access to the same ‘adult’ text, images, videos, etc. as adults. • Online proprietors don’t know the customer is not an adult. Protecting Children Regardless of the medium: – It is illegal to create, possess or distribute child pornography. – It is illegal to lure children into sexual activity. Q: How should children be protected from access in cyberspace to adult material? A Gift of Fire, 2ed Chapter 5: Freedom of Speech in Cyberspace 8
  • 9. Offensive Speech and Censorship in Cyberspace Censorship Laws Communications Decency Act (CDA, 1996) • Publicity and public pressure lead Congress to pass this act. • Anyone who made available to anyone under 18 any communication that is obscene or indecent would be subject to a $100,000 fine and two years in prison. • In 1997, the CDA was ruled unconstitutional because it was too vague and too broad in protecting children online and because less restrictive means are available. Q: Should content on the Internet have as much First Amendment protection as printed material? A Gift of Fire, 2ed Chapter 5: Freedom of Speech in Cyberspace 9
  • 10. Offensive Speech and Censorship in Cyberspace Censorship Laws (cont’d) Child Online Protection Act (COPA, 1998) • Commercial Web sites that make available to minors materials “harmful to minors”, as judged by community standards would be subject to a $50,000 fine and six months in jail. • In 2000 and 2003, COPA was ruled unconstitutional by a federal court. Q: How are children protected from “harmful” material outside of Cyberspace? A Gift of Fire, 2ed Chapter 5: Freedom of Speech in Cyberspace 10
  • 11. Offensive Speech and Censorship in Cyberspace Censorship Laws (cont’d) Children’s Internet Protection Act (CIPA) • Any school or library receiving federal Internet funds must install filtering software on all Internet terminals. • Filters must block sites containing child pornography, obscene material, and any material deemed “harmful to minors.” • A federal appeals court ruled a major part of CIPA unconstitutional in 2002 but the Supreme Court upheld the law in 2003. Q: How does CIPA affect adults accessing online material at a public library that uses filtering software? A Gift of Fire, 2ed Chapter 5: Freedom of Speech in Cyberspace 11
  • 12. Offensive Speech and Censorship in Cyberspace Limiting Internet Access in Libraries and Schools Filtering Software • Benefit: prevent access to inappropriate material on the Internet by screening words or phrases, blocking sites according to rating system, or disallowing access to specific sites in a list. • Problems: can be ineffective—kids get around the filters; the words, phrases, rating systems, etc. are subjective; “banned” keywords can be overly restrictive for adult users and for legitimate use by minors. Q: What has been your experience with filtering software? A Gift of Fire, 2ed Chapter 5: Freedom of Speech in Cyberspace 12
  • 13. Offensive Speech and Censorship in Cyberspace Challenging Old Regulatory Paradigms and Special Interests License required: • To practice law. • To publish traditional newsletters about commodities and futures investing (prior to 2000). No license required: • To create downloadable, self-help legal software. • To publish newsletters about, developing software for, and operating Web sites concerning commodities and futures investing (since 2000). Q: Is online advertising of wine free speech or disregard for the regulatory rights of state governments? A Gift of Fire, 2ed Chapter 5: Freedom of Speech in Cyberspace 13
  • 14. Offensive Speech and Censorship in Cyberspace Censorship On the Global Net Global Impact • Avoiding censorship: the global nature of the Net allows restrictions (or barriers) in one country to be circumvented by using networks in other, less restrictive countries. • Creating censorship: the global nature of the Net makes it easier for one nation to impose restrictive standards on others. Q: Why are online gambling sites established offshore? A Gift of Fire, 2ed Chapter 5: Freedom of Speech in Cyberspace 14
  • 15. Anonymity Common Sense and the Internet • Early publications by some of our Founding Fathers were published under pseudonyms. • Today, there are publications on the Net that are posted anonymously. Q: What are the drawbacks of anonymous Web postings? A Gift of Fire, 2ed Chapter 5: Freedom of Speech in Cyberspace 15
  • 16. Anonymity Is Anonymity Protected? Conflicts between political freedom of speech and campaign regulations: • Anonymity protects against retaliation and embarrassment. • Anonymity violates rules established by the Federal Elections Commission (FEC) Q: Should anonymous political speech on the Web be regulated? A Gift of Fire, 2ed Chapter 5: Freedom of Speech in Cyberspace 16
  • 17. Anonymity Anonymity vs. Community Supporters of anonymity: • Say it is necessary to protect privacy and free speech. Opponents of anonymity: • Believe it is anti-social and allows criminals to hide from law enforcement. Q: How is the practice of anonymity online similar/dissimilar to strong encryption? A Gift of Fire, 2ed Chapter 5: Freedom of Speech in Cyberspace 17
  • 18. Spam What Is the Problem? Unsolicited, mass e-mail: • is cheap to senders but may impose costs on the recipient’s time and/or the recipient’s online account. • may contain objectionable content (political, commercial ads, solicitations for funds, pornography, etc.). • may contain a disguised return address. • may pass through filters. • invades privacy. • creates a financial and managerial burden on ISPs. Q: How do you handle spam? A Gift of Fire, 2ed Chapter 5: Freedom of Speech in Cyberspace 18
  • 19. Spam Cases and Free Speech Issues AOL v. Cyber Promotions • AOL and other service providers have successfully sued spammers because of the cost burden imposed. Disgruntled Intel Employee • Initially, a court ruled that non-commercial spam to Intel employees at their Intel e-mail accounts was a form of trespass. • The CA Supreme Court ruled that it was not. Q: Is the forwarding of pre-written observations or opinions from human- rights groups spam or expressions of free speech? (Or both?) A Gift of Fire, 2ed Chapter 5: Freedom of Speech in Cyberspace 19
  • 20. Spam Solutions • Technology: filters that screen out spam. • Market Pressure: services that list spammers. • Business Policy: at the discretion of the recipient, all e-mail would be charged a microfee. • Law: create restrictions that are consistent with the First Amendment. • Vigilantism: punish spammers by hacking into their phone or computer systems. Q: Which solution above, or others, do you support? A Gift of Fire, 2ed Chapter 5: Freedom of Speech in Cyberspace 20
  • 21. Ensuring Valuable and Diverse Content Points to Consider: • Is there a balance between commercial and educational information on the Web? • Should diverse content on the Web be subsidized with taxes? • Should valuable content on the Web be regulated? • Do we need to ensure the existence of sites containing civic information? • Are more sites that promote the arts and culture needed? Q: How do we ensure valuable and diverse content in traditional forms of media? A Gift of Fire, 2ed Chapter 5: Freedom of Speech in Cyberspace 21