Friday, October 7, 2011

Chapter 3: Freedom of Speech

Name Victoria Terhaar Class time: 12 pm
KEEP THIS TO 1-3 – PAGES LONG (EXCLUDING REFERENCE PAGE)

Author: Sara Baase
Date of Publication: 2008
Book: A Gift of Fire
Sections read: 3.1-3.3.4

1. (Knowledge)Tell three interesting elements of this chapter:
a. While reading about protection of First Amendment rights, I thought the “chilling effect” was interesting because it is and was often used in actual court cases to dismiss cases. This is, “when a government action or law causes people to avoid legal speech and publication out of fear of prosecution.” (pg 148)
b. I was surprised by all of the acts passed by Congress to protect minors from inappropriate information on the internet that were later deemed unconstitutional such as the Communications Decency Act. (pg 151-153)
c. I was drawn to the material about special interest policies because of the situation in New York State banning advertising out-of-state wines directly to consumers in the state. I’m relieved this policy was deemed unconstitutional because some of the best wine comes from California. (pg 167)

2. (Comprehension) Summarize what is being discussed within this chapter?

Within chapter 3, Baase talks about the protection of freedom of speech under the First Amendment for users of the internet and how it has changed with the internet people dealt with years ago to the new developments arising with technology today. One example she uses to explain the changing principles is pornography, and another is spam email. Baase uses different acts and laws that have been passed throughout the years to help her readers understand the rights of free speech that are protected. Examples include the Child Online Protection Act (pg 154) and the CAN-SPAM Act (pg 165).


3. (Application)Name a specific example or NEW solution for this type of problem/similar situation in society or that you have experienced – BE SPECIFIC AND EXPLAIN?

While searching through the internet while I was younger I remember typing on Google’s search engine looking for Dick’s Sporting Goods and inappropriate websites and images coming up after the search. This is an example of a child doing an innocent search and being exposed to material that is offensive to minors. Because of the name of the store having the same body part as a man, I don’t believe that could have been avoided. However, Baase’s information about filters may make a parent believe that if they do use a filter for their children’s computer, they could avoid them viewing inappropriate material advertised on the internet by blocking a certain list of websites or choosing a category of websites to filter. (pg 155)


4. (Analysis)Address ANY that apply. How can you compare one of the situations in this chapter to something that does not relate to computers, technology, or the Internet? Be sure to reference the chapter and your solution. What ideas NEW can you add to the issue that is being presented within the reading? Try to connect what you have by reading this article and how it applies to the stages in Bloom's taxonomy in 2 full sentences.
A child seeing pornographic material has been a problem since it first appeared. Video rental shops, gas stations, convenient stores, book stores, all have magazines or videos of erotic material and not all of them have restricted areas for people over the age of 18. This is a problem in people’s material life just as it is in their internet lives, are parents trying to protect their children from obscene material. The Children’s Internet Protection Act deemed constitutional is a technological way to protect children in schools and libraries from accessing sites with obscene material. (pg 158) A solution in stores would be to not have the “harmful” material in stores where children are allowed. Even if the section is blocked off by a curtain, a child could still linger in there. Baase restates the information she has researched First Amendment and free speech on the internet and uses quotes from the actual materials (knowledge). She then goes on to apply the levels of free speech and their effectiveness to different actions on the internet, such as spam mail and pornography (application).

5. (Synthesis) Address all that apply. Do you agree with what is being said within the article (Why/Why not? Back up with FACTS)? What new conclusions can you draw about this (or other topics) after reading this material?

I do agree with what is being said within this chapter because I do believe every person, no matter their means of communication, has the right to freedom of speech. Every specific issue has certain restrictions that need to be addressed, but overall people created the internet as a means of communication and shouldn’t be punished for using it. Determining the right restrictions, as seen through this chapter with the Child Pornography Prevention Act, the Communications Decency Act, the Child Online Protection Act, and other stated throughout the chapter, take trial and error to provide fair regulations for all. (pg 152-158) With these trials I feel people are slowly getting to terms that can be accepted by most to control what is being put or distributed on the internet without restricting their freedom.

6. (Evaluation) Address all that apply. Judge whether or not this topic is relevant in today’s society? Evaluate why you are viewing the topic in this manner based on your experiences. What ethical evaluations (see Chap1-1.4 for exp of Ethics) or decisions were made/can be assumed from this chapter? What new ideas will you make after reading this chapter?

This topic is clearly relevant in today’s society seeing as people will always have a right to defend their First Amendment Rights. The ethical evaluations that can be assumed from this chapter are those that deal with sensitive material people should consider censoring or not making available to everyone because it could pose a potential risk for a person, help them make a difficult negative decision, such as commit suicide, or help a terrorist make a bomb. (168-169) The Washington Post published an article explaining how al Qaeda activists use the internet to communicate about special operations and planned bombings. This is an example of internet websites that have an ethical responsibility to keep their country safe.



References

http://www.washingtonpost.com/wp-dyn/content/article/2005/08/05/AR2005080501138.html

No comments:

Post a Comment