Free Speech And Cyber Space Research Paper

Disabled people who are socially isolated have a means of contacting others like themselves. Kids struggling with their homework can receive help from their classmates or get instant feedback from others. There are also the more personal aspects of a person's life which are taken care of by Internet access. Of course, there are a myriad of issues with the internet which are not nearly so positive. People have organized crimes on the internet, have planned them out and sought out individuals to help them with their plans. White-collar criminals have used the internet to defraud people of their money. People illegally download everything from movies to music and video games so they do not have to pay for them by going to the store and buying them legally. Whenever someone goes online, they release information of a kind to the rest of the world. Those who have put their credit card or social security information online either for purchasing things or for applications has had their identities stolen.

Children are particularly at risk for victimization while online. Again, they have had identities stolen, but also many have become the victims of child predators, adults who stalk children online usually through social media of some kind and lure them into a physical meeting where they can be abducted, sexually victimized, and then many wind up dead....

...

Those who do not actually have meetings with these predators have been convinced to pose for sexual photographs and in various stages of undress. These people then share their exploits or photos and films with other like-minded people all via the anonymity granted them by their computers.
The internet provides positive things, but it grants the ability to victimize and be victimized by people who have little fear of there being ramifications for their actions. In the case of the production or creation of child pornography, the photos and materials are sent along the web and it becomes hard to trace their origins, so the perpetrators go on without fear of consequences.

For all the above reasons, the internet has been asked to self-regulate, to prevent children from being contacted by perpetrators, to stop thieves and fraudsters from making a living off of the suffering of others, and stopping otherwise law abiding people from criminal action simply because they do not fear consequences. In the case of illegal downloading, many people do it because they are of the opinion it is a victimless crime and that "everyone does it." This is a form of censorship because governments doing the regulation demand that the internet providers refrain from doing business with some people because of potential victimization. However, it is for the greater good.

Cite this Document:

"Free Speech And Cyber Space" (2013, July 19) Retrieved April 19, 2024, from
https://www.paperdue.com/essay/free-speech-and-cyber-space-97708

"Free Speech And Cyber Space" 19 July 2013. Web.19 April. 2024. <
https://www.paperdue.com/essay/free-speech-and-cyber-space-97708>

"Free Speech And Cyber Space", 19 July 2013, Accessed.19 April. 2024,
https://www.paperdue.com/essay/free-speech-and-cyber-space-97708

Related Documents

Free Speech Rights of College and University Faculty This is a paper that outlines Free Speech Rights issues at academic institutions and argues why it is important to preserve it. It has 16 sources. The freedom of speech is something that has to be preserved no matter what the medium of communication may be, and this is because members of society may be greatly disadvantaged if exceptions are made. As compared to the

"[T]here remains a distinction between autonomy, the ability to think for oneself, and self-expression, the communicating of one's thoughts to others. Both are important components of our interest in free speech" (Lichtenberg, 336). Still some believe that any infringement upon the media would diminish the amount of true information disseminated into society. Truth, though, is filled with ambiguity and is intangible -- the "truth" of the media story is based

Cyber Ethics, Morality, and Law Annotated Bibliography A lot security and privacy issues have attracted the attention of many individuals with the coming internet communication and cyber-wars. World leaders caution that the cyber threat to the country is a standout amongst the most national and economic challenges security challenges we confront. This has also raised numerous concerns regarding the legal parameters of cyber activities like the standards relevant to cyber war

Information Assurance
PAGES 10 WORDS 2565

Role of Time in Information Assurance The society at large is on the verge of a new era. This new era is the information age which is marked with a major paradigm shift in the area of information assurance. Information assurance has three main attributes: confidentiality, integrity, and availability. All the three tenants of information assurance must be well guarded and maintained in order to bring a marked improvement of both

1st Amendment Protections for Child Pornography: The 2002 Decision in the Case of Ashcroft v. Free Speech Coalition. Laws have been passed outlawing child pornography in its various formats. It is forbidden by law to use a minor younger than age eighteen for visual depictions of sexually explicit acts. Possessions of such photographs are forbidden, and in 1966 the Child Pornography Prevention Act (CPPA) forbade trafficking in visual productions of

Cyberstalking The rapid changes witnessed over the course of the last two decades has demonstrated how technology and, more specifically, the internet, have expanded the rule of law and the accompanying challenges that lie in enforcing the law. The purpose of this essay is to describe the greatest challenge facing law enforcement agencies in investigating exploitation, cyber stalking and obscenity. This challenge is the mere scope of problems that this platform