Ethics in Information Technology (2nd Edition) PDF

Summary

This document is a chapter from a textbook on ethics in information technology, focusing on freedom of expression. It explores various issues related to freedom of expression in the digital age, including online anonymity, defamation, hate speech, and controlling access to internet information.

Full Transcript

Ethics in Information Technology, Second Edition Chapter 5 Freedom of Expression Objectives In what ways does the Internet present new challenges in the area of freedom of expression? What key free-speech issues relate to the use of inform...

Ethics in Information Technology, Second Edition Chapter 5 Freedom of Expression Objectives In what ways does the Internet present new challenges in the area of freedom of expression? What key free-speech issues relate to the use of information technology? Ethics in Information Technology, Second Edition 2 Freedom of Expression Right to freedom of expression – Important right for free people everywhere Definition of free speech includes – Nonverbal, visual, and symbolic forms of expression – Right to speak anonymously Ethics in Information Technology, Second Edition 3 Freedom of Expression (continued) Not Part of Freedom of Expression – Obscene speech – Defamation – Incitement of panic – Incitement to crime – “Fighting words” – Sedition Ethics in Information Technology, Second Edition 4 Obscene Speech Speech is considered obscene when – Average person finds the work appeals to the prurient interest – Work depicts or describes a conduct in an offensive way – Lacks serious literary, artistic, political, or scientific value Ethics in Information Technology, Second Edition 5 Defamation Publication of a statement of alleged fact that is – False – Harms another person Harm is often of a financial nature Slander – Oral defamatory statement Libel – Written defamatory statement Ethics in Information Technology, Second Edition 6 Freedom of Expression: Key Issues Controlling access to information on the Internet Anonymity Defamation Hate speech Pornography Ethics in Information Technology, Second Edition 7 Controlling Access to Information on the Internet Freedom of speech on the Internet is complicated by children’s access Communications Decency Act (CDA) – Aimed at protecting children from online pornography – Broad language and vague definition of indecency – Found unconstitutional in 1997 Ethics in Information Technology, Second Edition 8 Controlling Access to Information on the Internet (continued) Child Online Protection Act (COPA) – Applies to communication for commercial purposes – Imposes penalties for exposing minors to harmful material on the Web Internet filter – Software installed with a Web browser – Blocks access to certain Web sites that contain inappropriate or offensive material Ethics in Information Technology, Second Edition 9 Controlling Access to Information on the Internet (continued) URL filtering – Blocks URLs or domain names Keyword filtering – Blocks key words or phrases Dynamic content filtering – Web site’s content is evaluated immediately before being displayed – Uses Object analysis Image recognition Ethics in Information Technology, Second Edition 10 Controlling Access to Information on the Internet (continued) ICRA rating system – Questionnaire for Web authors – Generates a content label Uses Platform for Internet Content Selection (PICS) standard – Users can configure browsers to read the label to block content – Relies on Web authors to rate their site – Complement to other filtering techniques Ethics in Information Technology, Second Edition 11 Controlling Access to Information on the Internet (continued) ISP blocking – Blocking is performed on the ISP server – ClearSail/Family.NET prevents access to certain Web sites Ethics in Information Technology, Second Edition 12 Anonymity Principle of anonymous expression – People can state opinions without revealing their identity – In the wrong hands, it can be a tool to commit illegal or unethical activities Anonymous remailer service – Computer program that strips the originating address from the e-mail message – Forwards the message to the intended recipient – Ensures no header information Ethics in Information Technology, Second Edition 13 Anonymity (continued) John Doe lawsuit – Identity of the defendant is temporarily unknown – Common in Internet libel cases – Defendant communicates using a pseudonym or anonymously – ISPs subpoenaed to provide the identity – By filing a lawsuit, the company gains immediate subpoena power Ethics in Information Technology, Second Edition 14 Defamation and Hate Speech Actions that can be prosecuted include – Sending threatening private messages over the Internet to a person – Displaying public messages on a Web site describing intent to commit acts of hate-motivated violence – Libel directed at a particular person Ethics in Information Technology, Second Edition 15 Defamation and Hate Speech (continued) Some ISPs voluntarily agree to prohibit subscribers from sending hate messages – Does not violate freedom of expression – ISPs must monitor the use of their service – Take action when terms are violated Ethics in Information Technology, Second Edition 16 Manager’s Checklist for Handling Freedom of Expression in the Workplace Ethics in Information Technology, Second Edition 17 Summary First Amendment protects the right to – Freedom of religion – Freedom of expression Key issues: – Controlling access to Internet information – Anonymous communication – National Security Letter (NSL) – Spread of defamation and hate speech Ethics in Information Technology, Second Edition 18

Use Quizgecko on...
Browser
Browser