Determining the freedom of expression

Assignment Help Basic Computer Science
Reference no: EM131704923

Title: Freedom of Expression

The First Amendment protects the right to freedom of religion and freedom of expression from government interference. Numerous court decisions have broadened the definition of speech to include nonverbal, visual, and symbolic forms of expression. Sometimes the speech at issue is unpopular or highly offensive to the majority of people; however, the Bill of Rights provides protection for minority views. The Supreme Court has also ruled that the First Amendment protects the right to speak anonymously as part of the guarantee of free speech. Obscene speech, defamation, incitement of panic, incitement to crime, "fighting words," and sedition are not protected by the First Amendment and may be forbidden by the government.

The Internet enables a worldwide exchange of news, ideas, opinions, rumors, and information. Its broad accessibility, open-minded discussions, and anonymity make it an ideal communication medium. People must often make ethical decisions about how to use such remarkable freedom and power. Organizations and governments have attempted to establish policies and laws to help guide Internet use as well as protect their own interests. Businesses, in particular, have sought to converse corporate network capacity, avoid legal liability, and improve worker productivity by limiting the nonbusiness use of IT resources.

Controlling access to Internet information is one key issue. Although there are clear and convincing arguments to support freedom of speech on the Internet, the issue is complicated by the ease with which children can access the Internet. The conundrum is that it is difficult to restrict Internet access by children without also restricting access by adults. The U.S. government has passed several laws in an attempt to address that issue, and software manufacturers have invented special applications whose goal is to block access to objectionable material.

When anonymous employees reveal harmful information over the Internet, the potential for broad dissemination is enormous, and can require great effort to identify the people involved and stop them. Internet users who want to remain anonymous can send e-mail to an anonymous remailer service, but whether the communication is ethical is up to the person sending the e-mail.

A National Security Letter (NSL) requires organizations to turn over electronic records about the finances, telephone calls, e-mail, and other personal information of suspected terrorists or spies. Use of NSLs is highly controversial and is undergoing legal challenge.

The spread of defamation and hate speech is another important topic, especially for ISPs. In the United States, Internet speech that is merely annoying, critical, demeaning, or offensive enjoys protection under the First Amendment. Legal recourse is possible only when hate speech turns into clear threats and intimidation against specific citizens. From time to time, ISPs have voluntarily agreed to prohibit their subscribers from sending hate messages using their services. Because such prohibitions can be included in the service contracts between a private ISP and its subscribers and do not involve the federal government, they do not violate the subscribers' First Amendment rights. After an ISP implements such a prohibition, it must monitor the use of its service to ensure that the regulations are followed. When a violation occurs, the ISP must take action to prevent it from happening again.

Another issue involves the use of information technology to access, store, and distribute pornography. As long as companies can show that they were taking reasonable steps to prevent pornography, they have a valid defense if they are subject to a sexual harassment lawsuit. These steps include establishing a computer usage policy that prohibits access to pornographic sites, identifying those who violate the policy, and taking action against those users - no matter how embarrassing it is for the users or how harmful it might be for the company.

Question: Do you think exceptions should be made to the First Amendment to make it easier to prosecute people who send hate e-mails and use the Internet to recruit people to their cause? Why or why not?

Reference no: EM131704923

Questions Cloud

Elements of the cyber underground economy : Then, make the case for why one of those five plays the greatest role in maintaining the cyber underground economy.
Discuss quote instead of summarizing or paraphrasing : When should you quote instead of summarizing or paraphrasing. Do you need to cite the source of this researched information
Concept of value chain is important for quality management : Explain why the concept of the value chain is important for quality management.
Examine your beliefs when you started your program : Have your interests, passions, talents, and abilities changed over time? How has your understanding of vocation and of your place in the world changed?
Determining the freedom of expression : The First Amendment protects the right to freedom of religion and freedom of expression from government interference.
Determine the modified accrual basis of accounting : When collectible in the current period or soon enough thereafter to pay current-period bills 2. In budgetary accounting, what is the net effect of receiving.
Calculate the debt ratio and time interest earned : Calculate the debt ratio, time interest earned, earnings per share, and the financial leverage index under each alternative
Queuing theory the study of waiting line models : "Queuing theory, the study of waiting line models, helps operations managers better understand"
Limited computer background : As an IT professional, you will work with people with varying levels of IT knowledge. You will need to explain what information you need so you can help them.

Reviews

Write a Review

Basic Computer Science Questions & Answers

  What is the probability that no fragment arrives

What is the probability, roughly, that LAST FRAG expires? Assume this happens only when the last fragment is lost.

  Research is key when becoming an effective programmer

Research is key when becoming an effective programmer. Locate a useful resource on the web for programming in Python

  There are four conditions that are necessary

There are four conditions that are necessary for a deadlock to occur. Give an example to show that these conditions are not sufficient for a resource deadlock to occur. When are these conditions sufficient for a resource deadlock to occur? Explain..

  What happens when you assign

What happens when you assign 340,282,343,598.33 to a Single variable? Assuming that the variable in question is named sngNumber and you execute the statement MessageBox.Show

  Undirected graph representing a social network

You are given an undirected graph representing a social network. Nodes are users in the network, edges represent interactions between users (i.e., messages exchanged between them).

  Confidentiality and integrity for transaction to secure

Make a list of at least 10 confidentiality, integrity, and availability requirements which should be met for transaction to be secure.

  Explaining data-tlb hit and data-cache hit

Upon a load instruction, event "data-TLB hit" followed by "data-cache hit" is the most probable to occur among four possibilities of Cartesian product.

  Find the distance between the 757 and the tower

The 757 is 20,000 feet from the ground, and the angle of depression to the tower is 6°. Find the distance between the 757 and the tower.

  Terms of market dominance

Problem: Compare coke and pepsi in terms of their market dominance. Do thorough research as no plagiarism will be tolerated.

  Under gaap is this asset impaired

Under GAAP is this asset impaired? What value should Bethesda show this asset at? Under IFRS is this asset impaired? What value should Bethesda show this asset at?

  Discuss about the id theft protection

A company offers ID theft protection using leads obtained from client banks. Three employees work 40 hours a week on the leads, at a pay rate of $25 per hour.

  How cultural differences in colors and images are perceived

What are some examples of cultural differences in how colors and images are perceived? How would you change the colors and images on your website to appeal to a wider global audience.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd