GEE PRELIMS PART 2 Flashcards
(42 cards)
Messages embedded in files transferred between computers
Uniquely identifies cyberspace mailbox
Format: user @ domain
Email address
the set of all mail servers and connectors within a company or organization.
Network Cloud
Unsolicited, bulk email
Spam
Senders and receivers do not derive equal benefit from emails.
Social contract theory evaluation
Innocent users are used as a means for an end (eliminating spams
Kantian evaluation
Blacklisting will affect innocent users, receivers, and marketing firms, this will reduce the benefits of internet utility as a whole.
Utilitarian evaluation
A website that allows the easy creation and editing of any number of interlinked web pages via a web browser using a simplified markup language.
Wiki
usually maintained by an individual with regular entries of commentary.
Blogs
DIRECT CENSORSHIP
Government monopolization
Prepublication review
Licensing and registration
The most common form of censorship
SELF-CENSORSHIP
Used for movies, TV shows, CDs, and video games
RATING SYSTEMS CENSORSHIP
CHALLENGES POSED BY THE INTERNET
Many-to-Many Communication
Dynamic Connections
Huge Number of Websites
Global Reach
Age Verification Issues
shutting down a website is difficult due to millions of contributors
Many-to-Many Communication
Millions of new PCs connect to the internet each year
Dynamic Connections
No feasible way to monitor all content
Huge Number of Websites
Extends beyond national borders and laws
Global Reach
Adult websites cannot reliably confirm a user’s age
Age Verification Issues
3 ETHICAL PERSPECTIVES ON CENSORSHIP
Kant on Censorship
Mill on Censorship
Mill’s Principle of Harm
Believed in “having the courage to use your own reason”
Kant on Censorship
No one is infallible; even unpopular opinions may contain a kernel of truth
Mill on Censorship
Government intervention is justified only to prevent harm to others
Mill’s Principle of Harm
Software prevents display of certain websites
Web Filtering
Introduced to enhance child safety online
Child Internet Protection Acts