Figure 9-1: The Ontology of Cyberspace

advertisement
Regulating Cyberspace

Should cyberspace be regulated?

Can it be regulated?


Which aspects of the 'Net should be
regulated?
Who should be responsible for carrying out
the regulatory functions – the government,
private organizations, or Internet users
themselves?
Cyberspace Regulation



Two questions need to be answered:
(1) What exactly do we mean by
cyberspace?
(2) What exactly is meant by regulation
(and, in particular, "regulation" as it applies to
cyberspace)?
The Ontology of Cyberspace




Cyberspace, which for our purposes can be
equated with the Internet, can be defined as
the network of interconnected computers.
What exactly is cyberspace?
Is it a "place" – i.e., a virtual space that
consists of all the data and information that
resides in the connected servers and
databases that make up the Internet?
Or is cyberspace a "medium" of some sort?
Cyberspace as a Medium




Mike Goodwin (1995) believes that the Internet is a
new kind of medium.
It is a medium that is significantly different from
earlier media, such as the telephone or television.
The telephone as a "one-to-one medium," and
television as a "one-to-many medium.“
Goodman suggests that the Internet be characterized
as a "many-to-many medium" in which one does not
need to be wealthy to have access and in which one
does not need to win the approval of an editor or a
publisher to speak his or her mind.
Cyberspace as a public space





Camp and Chien (2000) note that there are four types of media:
publisher, broadcast, distributor, and common carrier.
An example of a publisher would be a newspaper or a
magazine; and examples of broadcast media include television
and radio.
Telephone companies and cable companies can be considered
instances of common carriers.
Camp and Chien argue that none of the four media models are
appropriate for understanding the 'Net. Instead, they believe
that a spatial model – one in which cyberspace is viewed a
"public space with certain digital characteristics" – is a more
plausible way to conceive of the Internet.
Camp and Chien also believe that operating from such a model
can influence our decisions about public policies on the Internet.
Figure 9-1: The Ontology
of Cyberspace
Cyberspace
Public Space (or Place)
(bookstore model)
Broadcast Medium
(common carrier model)
Two Different Senses of
"Internet Regulation“





To "regulate" typically means to monitor or control a certain
product, process, or set of behaviors according to certain
requirements, standards, or protocols.
At least two different senses of “regulation” have been used to
debate the question of cyberspace regulation.
Sometimes the focus is on regulating the content of cyberspace,
as in the case of whether on-line pornography and hate speech
should be censored on the 'Net.
And sometimes it focuses on processes – i.e., rules and policies
– should be implemented and enforced in commercial
transactions in cyberspace.
In physical space, both kinds of regulation also occur.
Regulatory Agencies in Physical
Space

Content-based examples:




FDA;
Local and State Boards of Health;
Liquor Control Board.
Process-based examples:



FTC;
FCC’
SEC.
Figure 9-2: Two Modes of
Cyberspace Regulation
Cyberspace
Regulating Content
Speech
Regulating Process
Commerce
Four Modes of Regulating
Cyberspace: The Lessig Model

Lessig (1999) describes four distinct but
interdependent constraints, which he
calls "modalities," for regulating
behavior:




Laws;
social norms;
market pressures;
Architecture.
Analogy: Regulating Smoking
Behavior in Physical Space





Using the Lessig Model, we can:
1. Pass Laws Against Smoking;
2. Apply Social Pressure (Norms);
3. Apply Market Pressure (e.g., in
Pricing Practices);
4. Use Architecture (e.g., no cigarettes
in vending machines).
Regulation by Code





In cyberspace, Lessig notes that code is law.
Lessig compares the architectures of NET 95
(Chicago) to NET 98 (Harvard).
Net 95 favors Anonymity.
Net 98 favors control.
Elkin-Koren (2000) worries that control is
exacerbated because information is being
privatized.
Privatizing Information Policy


Litman (1999) also argues that information policy in cyberspace
is becoming increasingly privatized.
In 1998, a series of events contributed a transformation of the
Internet into what Litman describes as a "giant American
shopping mall."




That year Congress passed three copyright-related acts that favored
commercial interests: the DMCA, SBCTEA, and the NET Act.
Also, the federal government transferred the process of registering domain
names from the National Science Foundation – an independent government
regulatory body – to ICANN, a private group that has been favorable to
commercial interests.
The Recording Industry of America sought to ban the manufacture of
portable MP3 players on grounds that such devices could be used to play
pirated music.
The recording industry also tried to pressure computer manufacturers to
embed code in their future computer systems that will make it impossible to
use personal computers to download MP3 files and to burn CDs.
Internet Domain Names and
“Cybersquatting”

The National Science Foundation (NSF)
formerly controlled the licensing of
domain names.



www.domainname.com/gov/org.
ICANN (Internet Corporation of
Assigned Names and Numbers) took
over the process from NSF.
ICANN has been more business friendly.
Anti-Cybersquatting Act



In 1999, the Anticyberquatting
Consumer Protection Act was passed.
This Act protected against “trademark
infringements” and “dilutions” for
trademark owners.
Controversial case arose: Amazon
Bookstore vs. Amazon.com.
HTML Metatags




Metatags are used in HTML Code for Web sites.
keyword metatags vs. description metatags.
Keyword metatags, such as <baseball> and <Barry
Bonds> enable Web page designers to identify
search terms that can be used by search engines.
Descriptive metatags enable the designer of a Web
page to describe the contents of his or her page. For
example, the description of a Web site for Barry
Bonds might read: "Barry Bonds...plays for the San
Francisco Giants...broke major league baseball's
home record in 2001..."

The description typically appears as one or more sentence
fragments, directly beneath the Web page's listing in an
Internet search result.
HTML Metatags (continued)



Controversial cases involving the use of metatags.
Hypothetical case in the text (involving Keith, a
student at Technical University, USA).
Actual case – Bihari v. Gross.




Bahari is a company in New York City that provides interior
design services;
Gross, a former associate of Bihari, registered "bihari.com"
and "bahiriinteriors.com" domain names;
Gross was forced to relinquish the domain names;
Gross then embedded the keyword metatag "Bihari
Interiors" in the HTML code for his Web site and included
derogatory remarks about Bihari on his Web site.
Hyperlinking on the Web





Controversial issues in Deep Linking.
Important question: Is a Web site analogous
to property?
Scenario in textnook – Maria’s Gallery
Actual Case – Ticket Master vs. Microsoft.
The controversy surrounding hyperlinking is
still not resolved in the courts – the Ticket
Master case was settled out of court.
Spam

Spam is e-mail that is (1) unsolicited, (2)
promotional, and (3) sent in bulk to multiple
users.



This three characteristics distinguish spam from
other forms of e-mail.
Because spam is unsolicited, it can also be
viewed as a form of communication that is
nonconsensual.
Not every nonconsensual e-mail that one
receives, however, should necessarily be
considered an instance of spam.
Spam (continued)




Spam "shifts costs" from the advertiser to several other parties,
including Internet Service Providers (ISPs) and the recipients of
their service (Spinello 1999).
The cost shifting even affects the individual users of the
Internet who are indirectly inconvenienced by spam.
Because others must bear the cost for its delivery, spam is not
cost free.
Spam consumes valuable computer resources because:
 When spam is sent through ISPs, the result in wasted
network bandwidth for the service providers;
 Spam puts an increased strain on the utilization of system
resources such as disk storage space.
Is Spam Unethical?

Spinello argues that spam is morally
objectionable because:



(a) It has harmful consequences;
(b) It violates the individual autonomy of
Internet users.
Spam consumes and strains valuable
computing resources and “degrades”
the fragile ecology of the Internet.
Spam (continued)


Many argue that explicit laws need to
be passed to control the threat of spam.
The e-Bay v. Bidder’s Edge case, which
is not really about spam per se,
illustrates some of the arguments used
against spam as a form of behavior that
consumes valuable system resources.
Free Speech vs. Censorship and
Content Control in Cyberspace



Should certain forms of speech on the
Internet should be censored?
Do all forms of speech deserve to be
protected under the constitutional guarantee
of free speech.
According to the First Amendment of the US
Constitution:


Congress shall make no law...abridging the
freedom of speech, or of the press...
The right to free speech is a conditional right.
Censorship

Catudal (1999) believes that an important
distinction can be drawn between two types
of censorship:



"censorship by suppression“;
"censorship by deterrence."
Both forms of censorship presuppose that
some "authorized person or group of
persons" has judged some text or "type of
text" to be objectionable on moral, political or
other grounds.
Censorship (continued)



Censorship by suppression affects the
prohibition of the objectionable "text" or
material from being published, displayed, or
circulated.
Banning certain kinds of books from being
published or prohibiting certain kinds of
movies to be made would be examples of
censorship by suppression.
In this scheme, pornography and other
objectionable forms of speech would not be
allowed to exist on the Internet.
Censorship (continued)




Censorship by deterrence is a less drastic means of
censoring.
It does not suppress or block out objectionable
material or forbid it from being published.
Rather, it depends on threats of arrest, prosecution,
conviction, and punishment against those who make
an objectionable "text" available and those who
acquire it.
Heavy fines and possible imprisonment can be used
to deter the publication and acquisition of this
objectionable content.
Pornography in Cyberspace






The concept of pornography is often debated in the legal sphere
in terms of notions such as obscenity and indecent speech.
In Miller v. California (1973), the court established a three-part
guideline for determining whether material is obscene under the
law, and thus not protected by the First Amendment.
According to this criteria, something is obscene if it:
1. depicts sexual (or excretory) acts whose depiction is
specifically prohibited by law.
2. depicts these acts in a patently offensive manner, appealing
to prurient interest as judged by a reasonable person using
community standards.
3. has no serious literary, artistic, social, political, or scientific
value.
Pornography (continued)





The Miller case has been problematic in
attempting to enforce pornography
laws.
The second criterion includes three
controversial notions:
1"prurient interest“;
2 "reasonable person“;
3 "community standards."
Censorship (Continued)

The term prurient is usually defined as having to do
with lust and with lewd behavior.





Has been challenged as being vague and arbitrary.
Also, many have challenged the question of who
exactly would count as a "reasonable person.“
Until recently, one might have assumed that the
notion of a "community standard" would be fairly
straightforward
But what exactly is a community in cyberspace?
Where more than one community is involved in a
dispute involving pornography, whose community
standards should apply?
Censorship/Pornography




The Amateur Auction BBS made sexually explicit images available to its
members.
Because the BBS was an electronic forum, its contents were available
not only to residents of California but to users in other states and
countries who had Internet access.
A person living in Memphis, Tennessee became a member of the BBS
and then downloaded on his computer in Tennessee sexually explicit
pictures.
Although including sexually explicit images on a BBS may not have
been illegal in California, viewing such images was illegal under
Tennessee State law. Criminal charges were brought against the
operators of the California-based BBS, who were prosecuted in
Tennessee.
Censorship/Pornography




The California couple was found guilty under
Tennessee law of distributing obscenity under the
local community standards that applied in Memphis
Tennessee.
This case raised issues that had to do with what was
meant by "community standards" on the Internet.
Can a community in cyberspace be defined simply in
terms of geography?
Or in the age of the Internet, should "community" be
defined in terms of some other criteria? For example,
can a cyber-community be better understood as an
"electronic gathering place" where individuals who
share common interests come together?
Internet Pornography Laws
and Protecting Children Online




Many people first became aware of the amount of pornographic
material available on the Internet through a controversial news
story, entitled CyberPorn, which appeared in Time magazine in
the summer of 1995.
Time reported that there were 900,000 sexually explicit
pornographic materials (pictures, film clips, etc.).
Many people, including most lawmakers, were outraged when
they learned about the amount of pornographic material that
was so easily accessible to Internet users, including minors.
It was later pointed out that the Internet study on which the
Time magazine story was based, which had been conducted by
a researcher at Carnegie Mellon University, was seriously
flawed.
Internet Pornography Laws
and Protecting Children Online


The Carnegie Mellon study accurately reported the
number of pornographic images and pornographic
Web sites that were available.
But it failed to put this information into proper
perspective.



For example, the study made no mention of the fact that the
percentage of pornographic sites relative to other sites on the Web
was very low.
However, the report caught the eye of many
influential politicians, who set out to draft legislation
in response to what they saw as the growth of the
"pornography industry" on the 'Net.
The result was the passage into law of
Communications Decency Act (CDA) in early 1996.
Pornography Laws
The CDA was considered controversial from the outset,
especially the section of the Act referred to as the Exon
Amendment that dealt exclusively with on-line pornography.

The constitutionality of CDA was soon challenged by the ACLU,
as well as by other organizations.

In the summer of 1996, CDA was struck down by a court in
Philadelphia on grounds that it was too broad and that it
violated the US Constitution.
A portion of the CDA, known as the Child Pornography Protection
Act (CPPA) of 1996, was determined to be constitutional.

So even though CDA itself was overturned, critics took some
refuge in the fact that the provision for child pornography
remained in tact.

Child Pornography Laws



CPPA significantly broadens the definition of child
pornography to include entire categories of images
that many would not judge to be "child
pornographic."
The CPPA's definition of child pornography includes
categories of images that some would judge not to
be pornographic at all.
Child pornography, according to CPPA, is defined as:

...any depiction, including a photograph, film, video, picture,
or computer or computer-generated image or picture,
whether made or produced by electronic, mechanical, or
other means, of sexually explicit conduct...
Pornography (Continued)






In June 1998, Congress passed The Child On-Line Pornography
Act (COPA).
Many of COPA's proponents believed that this Act would pass
constitutional muster.
In February 1999, the US Supreme Court ruled that COPA was
unconstitutional.
So the only remaining federal law specifically directed at on-line
pornography, which had managed to withstand constitutional
scrutiny, was the CPPA of 1996 (a section of the original CDA).
According to the CPPA, it was a crime to "knowingly send,
receive, distribute, reproduce, sell, or possess more than three
child pornographic images."
On April 16, 2002, the US Supreme Court, in a ruling of 6-3,
struck down a controversial section of CPPA as unconstitutional.
Table 9-1: Internet-specific
Child Pornography Laws
CDA (Communications
Decency Act)
Passed in January 1996 and
declared unconstitutional in July
1996. The lower court's decision
was upheld by the US Supreme
Court in 1997.
CPPA (Child Pornography
Protection Act)
Passed as part of the larger CDA,
but was not initially struck down
in 1997 with the CDA. It was
declared unconstitutional in April
2002.
COPA (Child On-line
Pornography Act)
Passed in June 1998 and was
declared unconstitutional by the
US Supreme Court in February
1999.
Two types of Controversial
Speech in Cyberspace



In addition to pornography, two additional kinds of speech that
have been controversial in cyberspace are:
 hate speech;
 forms of speech that can cause physical harm to individuals
and communities.
Hate speech on the Internet often targets members of certain
racial and ethnic groups.
 For example, white supremacist organizations such as the
Klu Klux Klan (KKK) can include on their Web pages
offensive remarks about African Americans and Jews.
Because of the Internet, international "hate groups," such as
"skin heads" in America, Europe, and Russia, can spread their
messages of hate in ways that were not previously possible.
Hate Speech



Whereas the US has tended to focus its attention on
controversial Internet speech issues that involve online pornography, European countries such as France
and Germany have been more concerned about online hate speech.
In 1997, Germany enacted the Information and
Communications Act, which was directed at censoring
neo-Nazi propaganda. However, the German statute
applies only to persons who reside in Germany.
Initially, the statute was intended to regulate the
speech transmitted by ISPs outside of Germany, as
well.
Hate Speech (continued)

Another controversial form of hate speech on
the Internet is one that has involved radical
elements of conservative organizations.


For example, right-wing militia groups, whose
ideology is often anti-federal-government, can
broadcast information on the Internet about how
to harm or even kill agents of the federal
government.
Consider the kind of anti-government rhetoric
that emanated from the militia movements in
the US in the early 1990s, which some
believe led to the Oklahoma City bombing.
Speech That Can Cause Harm
to Others




Some forms of hate speech on the Internet are such
that they might also result in physical harm being
caused to individuals.
Other forms of this speech are, by the nature of their
content, biased towards violence and physical harm
to others.
Two examples of how certain forms of speech on the
Internet can result in serious physical harm:
 information on how to construct bombs;
 information on how to abduct children for the
purpose of molesting them.
Should such information be censored in cyberspace?
Speech That Can Cause Harm
to Others (Continued)




Recall the Amy Boyer cyberstalking case.
Was the posting on Liam Youen's Web site,
describing his plans to murder Boyer, an
example of hate speech?
It resulted in physical harm to Boyer – viz.,
her murder.
Should the ISPs that enable users to
construct Web sites that contain this form of
speech be held legally liable?
Software Filtering Programs
as an Alternative to
Censorship on the Internet



Many believe that filtering also provides a
reasonable alternative to censoring speech on
the 'Net.
Others are less enthusiastic about the
promise of software filters as a panacea for
resolving the censorship-free speech debate
in cyberspace.
Software filters can be defined as programs
that screen Internet content and block access
to unacceptable Web sites.
Software Filtering Programs


Some filters have been criticized because they screen too much,
and others because they screen too little.
Filtering out objectionable material through the use of the
keyword "sex" could block out important literary and scientific
works.




For example, it could preclude one's being able to access certain works by
Shakespeare, as well as books on biology and health.
Filtering schemes that are too broad, on the other hand, might
not successfully block non-obvious pornographic Web sites, such
as the www.whitehouse.com site.
Software filtering programs such as NetNanny are available.
Many of these programs have been found to be inadequate.
Some Objections to Filtering



Not everyone has been impressed with the use of
software filters for self-regulatory purposes.
Larry Lessig (1999) believes that architectures like
PICS (Platform Independent Content) are a form of
"regulation by code."
He argues that PICS is a "universal censorship
system," which can be used to censor any kind of
material, not just pornography and hate speech.

For example, software filters can be used to block unpopular
political speech or dissenting points of view.
Objections to Software Filtering
(Continued)



Rosenberg (2001) motes that filters could
also be used by conservative school boards to
block out information about evolutionary
theory.
The American Civil Liberties Union (ACLU) has
also recently taken a similar position on the
use of filtering.
A 2001 ACLU report expressed it fear that
using censoring mechanisms such as filters
may "burn the global village to roast the pig."
Case Illustration: Mainstream
Loudon v. Board of Trustees



Adult members of the Loudon County public libraries
sued the Board of Trustees of the library for what
they alleged to be the impermissible blocking of
access to Internet sites.
The library pointed out that its use of filtering was
designed to block child pornography and obscene
material.
The plaintiffs complained that the filtering devices
also blocked access to non-pornographic sites such
as the Quaker Home Page, the American Association
of University Women, and others.
Mainstream Loudon Case
(continued)





The district court in Virginia ruled in favor of the
plaintiffs.
It determined that the installation of filtering
software on public access computers in libraries
violates the First Amendment.
But no clear direction was given as to how to resolve
the problem.
One solution would have been for libraries to provide
no Internet access at all.
This would not have been a satisfactory alternative
for obvious reasons.
Mainstream Loudon Case
(Continued)


Another solution would be for the library to
set aside one or more sections for children, in
which computer with filtering programs could
be provided.
Because children are protected under the
Child Pornography Protection Act (CPPA) of
1996, it was argued that it would be
permissible for libraries to include filtering
devices on computers intended for use by
children in restricted sections of the library.
Defamation in Cyberspace
and the Role of ISPs


Spinello (2000) defines defamation as
"communication that harms the reputation of
another and lowers that person's self esteem
in the eyes of the community."
Defamatory remarks can take two forms:


libel, which refers to written or printed
defamation;
slander, which refers to oral defamation. John
Mawhood and Daniel.
Defamation (Continued)

Tysver (2000) point out that it is not only through
words that defamation can occur.




For example, a person can be defamed through pictures,
images, gestures, and other methods of signifying meaning.
A picture of a person that has been scanned and
changed by merging another image can also suggest
something defamatory.
Anyone who passed on such an image could also be
held liable by the person filing defamation charges.
Our concern here is with defamation involving words.
Defamation (Continued)






Libelous speech on the Internet can be distinguished from
certain kinds of inflammatory speech.
Inflammatory remarks made in on-line forums are sometimes
referred to as "flames."
A person who is the victim of such a remark is described as
someone who has been "flamed."
But most "flames" do not meet the legal standards of
defamation.
On-line Flames, as in the case of genuine defamatory remarks,
are still problematic.
In response to behavior involving flaming, some on-line user
groups have developed their own rules of behavior or
"netiquette" (etiquette on the Internet).

For example, some Internet chat rooms have instituted rules to the effect
that any individual who "flames" another member of the group will be
banned from the chat room.
The Role of ISPs in Defamation





In the 1991 case of Cubby, Inc v. Compuserve, the court ruled that
Compuserve was not liable for disseminating an electronic newsletter
with libelous content.
The court determined that Compuserve had acted as a distributor, and
not as a publisher, since the service provider did not exercise editorial
control over the contents of its bulletin boards or other on-line
publications.
A different interpretation of the role of ISPs was rendered in the1995
case of Stratton Oakmont v. Prodigy Services Company.
There, a court found that Prodigy was legally liable since it had
advertised that it had "editorial control" over the computer bulletin
board system (BBS) it hosted.
The court noted that Prodigy had positioned itself as a proprietary,
family-oriented, electronic network that screened out objectionable
content, thereby making the network more suitable for children.
ISPs and Defamation (Continued)




ISPs argued that they provide the "conduits for communication
but not the content."
This view of ISPs was used in the Zeran v. AOL case in 1997,
where AOL was found not to be legally liable for content
disseminated in its electronic forums.
The Zeran case was the first to test the new provisions for ISPs
included in Section 230(c) of theCommunications Decency Act
(CDA), which we examined earlier in our discussion of on-line
pornography.
The 1996 law protects ISPs from lawsuits similar to the one filed
against Prodigy. According to the relevant section of the CDA:
"[n]o provider or user of an interactive computer service shall be
treated as the publisher or speaker of any information provided by
another information content provider."
Defamation and ISPs (Continued)




Spinello (2001) argues that simply because
an ISP presents an "occasion for defamation"
does not necessarily imply that ISP is
accountable.
Rather, for an ISP to be accountable, two
conditions are required:
(a) the ISP must also have had some
capability to do have done something about
the defamation;
(b) the ISP failed but failed to take action.
Defamation and ISPs (Continued)




For Spinello, ISPs are required to take three
steps or actions to avoid responsibility:
(1) prompt removal of the defamatory
remarks;
(2) the issuance of a retraction on behalf of
the victim;
(3) the initiation of a good faith effort to
track down the originator so that the
defamation does not reoccur.
Implications for the Amy Boyer
Case



Should Tripod and Geocities, the two ISPs that
enabled Liam Youens to set up his Web sites about
Boyer, be held morally accountable for the harm
caused to Boyer and to her family?
Should those two ISPs be held morally accountable,
even if they were not responsible (in the narrow
sense) for causing harm to Boyer and even if they
can be exonerated from charges of strict legal
liability?
It would be reasonable to hold these ISPs
accountable if it also could be shown that the ISPs
were capable of limiting the harm to persons that
result from their various on-line forums.
Download