Title-freedom of expression

Assignment Help Basic Computer Science
Reference no: EM131702245

Title: Freedom of Expression

The First Amendment protects the right to freedom of religion and freedom of expression from government interference. Numerous court decisions have broadened the definition of speech to include nonverbal, visual, and symbolic forms of expression. Sometimes the speech at issue is unpopular or highly offensive to the majority of people; however, the Bill of Rights provides protection for minority views. The Supreme Court has also ruled that the First Amendment protects the right to speak anonymously as part of the guarantee of free speech. Obscene speech, defamation, incitement of panic, incitement to crime, "fighting words," and sedition are not protected by the First Amendment and may be forbidden by the government.

The Internet enables a worldwide exchange of news, ideas, opinions, rumors, and information. Its broad accessibility, open-minded discussions, and anonymity make it an ideal communication medium. People must often make ethical decisions about how to use such remarkable freedom and power. Organizations and governments have attempted to establish policies and laws to help guide Internet use as well as protect their own interests. Businesses, in particular, have sought to converse corporate network capacity, avoid legal liability, and improve worker productivity by limiting the nonbusiness use of IT resources.

Controlling access to Internet information is one key issue. Although there are clear and convincing arguments to support freedom of speech on the Internet, the issue is complicated by the ease with which children can access the Internet. The conundrum is that it is difficult to restrict Internet access by children without also restricting access by adults. The U.S. government has passed several laws in an attempt to address that issue, and software manufacturers have invented special applications whose goal is to block access to objectionable material.

When anonymous employees reveal harmful information over the Internet, the potential for broad dissemination is enormous, and can require great effort to identify the people involved and stop them. Internet users who want to remain anonymous can send e-mail to an anonymous remailer service, but whether the communication is ethical is up to the person sending the e-mail.

A National Security Letter (NSL) requires organizations to turn over electronic records about the finances, telephone calls, e-mail, and other personal information of suspected terrorists or spies. Use of NSLs is highly controversial and is undergoing legal challenge.

The spread of defamation and hate speech is another important topic, especially for ISPs. In the United States, Internet speech that is merely annoying, critical, demeaning, or offensive enjoys protection under the First Amendment. Legal recourse is possible only when hate speech turns into clear threats and intimidation against specific citizens. From time to time, ISPs have voluntarily agreed to prohibit their subscribers from sending hate messages using their services. Because such prohibitions can be included in the service contracts between a private ISP and its subscribers and do not involve the federal government, they do not violate the subscribers' First Amendment rights. After an ISP implements such a prohibition, it must monitor the use of its service to ensure that the regulations are followed. When a violation occurs, the ISP must take action to prevent it from happening again.

Another issue involves the use of information technology to access, store, and distribute pornography. As long as companies can show that they were taking reasonable steps to prevent pornography, they have a valid defense if they are subject to a sexual harassment lawsuit. These steps include establishing a computer usage policy that prohibits access to pornographic sites, identifying those who violate the policy, and taking action against those users - no matter how embarrassing it is for the users or how harmful it might be for the company.

Question: Do you think exceptions should be made to the First Amendment to make it easier to prosecute people who send hate e-mails and use the Internet to recruit people to their cause? Why or why not?

Reference no: EM131702245

Questions Cloud

Promotional and sales activities for the new station : A popular disc jockey signed a three-year contract with a radio station under which she agreed that if she quit her job at the station.
Massive parallel processing systems : The next generation computers will permit you to speak commands to massive parallel processing systems?
Complementarity opposites attract offers best explanation : Complementarity Opposites attract offers the best explanation for relational attraction and formation
Elements of the cyber underground economy : Then, make the case for why one of those five plays the greatest role in maintaining the cyber underground economy.
Title-freedom of expression : The First Amendment protects the right to freedom of religion and freedom of expression from government interference.
What responsibility do communicators have listen carefully : What responsibility do communicators have to listen as carefully and thoughtfully as possible to other speakers. Are there ever cases where the poor listening
Writa a paper on interlocking ecological and social stresses : Writa a paper about Interlocking ecological and social stresses in the world's cities are raising concerns about sustainability, resilience and justice.
Explore issues of diversity and immigration : challenging broad topic you will explore - Globalization: Our Ever- Shrinking World - research question around the topic described above
Compare and contrast various leadership styles : The success of organizations is often attributed to leadership within the organization. Compare and contrast various leadership styles.

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Communicates with the kdc twice

In Needham-Schroeder, user Alice wishing to speak with Bob has to communicate with the KDC only once, but in Kerberos user Alice communicates with the KDC twice

  Program should ask about the amount of the bill

Write a script that calculates the tip in a restaurant according to the amount of the bill?- The program should ask about the amount of the bill in dollars- if the bill is less than $10 then the tip is $1.80- if it is between $10 and $60 the tip i..

  Terms of depictions of graphic interpersonal violence

Video games are a very big business these days, and ever more "realistic" (at least in terms of depictions of graphic interpersonal violence)-and also more accessible to more and more children of any age.

  What do you recommend to management

You estimate that at least six weeks are needed to find and fix the problems. In addition, even more time is required to find and fix 15 additional, less severe bugs just uncovered by the QA team. What do you recommend to management?

  Design an application of three type of arrays

Design an application that includes three arrays of type int.Allow the user to enter values into the first two.Write a method to store the product of the two arrays in the third array. Produce a display that shows the contents of all three arrays ..

  How the group of four items crawls up to the top of queue

Start with the initial configuration of the Queue Workshop applet. Alternately remove and insert items. (This way, you can reuse the deleted key value for the new item without typing it.) Notice how the group of four items crawls up to the top of ..

  Problem regarding the main drainage channel

When a drainage system (i.e. u-channels with catchpits) is connected to a main drainage channel, a segment of short pipe is used. What is the reason of such arrangement?

  Determine the equation of the hyperbola

Place the two ranger stations on the x-axis with the midpoint between the two stations at the origin. The transverse axis is horizontal.

  Designing a solution for a java programming problem

In your opinion, what are the three biggest challenges in planning and designing a solution for a Java programming problem? What can you do to overcome these challenges? How would you apply these techniques to the programs in this class?

  Selecting computer components

Assume that you work as an IT technician for a computer graphics company. Computer graphics rendering is highly dependent on the type of processor, memory, and graphics the system will use. You have been given the task to select the new components..

  What is the range of segment sizes

If stop-and-wait protocol is used, what is the range of segment sizes that can provide more than 70% utilization at the sender side?

  At what time(s) can a class diagram change

Write a definition of a field named tutor that can hold a reference to an object of type Instructor.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd