Sie sind auf Seite 1von 6

Running Head: Information Security Law & Ethics 1

Information Security Law & Ethics

Student’s Name:

Institution:

Instructor:

Date:
Information Security Law & Ethics 2

2. a)

Pornography in cyberspace is the one is the one which involves the use of internet storage

in order to create, display, distribute, import or publish pornography materials especially those

exposing children being engaged in sexual acts with adults. This is an industry which has grown

tremendously over the past. This is mainly contributed by the advancement of technology where

different websites and networks are used.

The continuous usage of sex tools especially in media advertisement has greatly

increased sexual activities among individuals which in one way or the other has created an

addition. The expose of sexual content within the internet has shown that the restriction bodies

and laws about the same are poorly implemented. The pornographic contents are widely exposed

to every individual by use of internet and this has spoiled the young generation as they engage in

doing the act without being restricted. For instance, due to accessibility of internet, a research

suggest that child pornography industry generate approximately $ 3 billion annually (Cacioppo,

Gori, Schimmenti, Baiocco, Laghi & Caretti, 2018).

b)

The Communication Decency Act is the one which was designed to protect children from

the acts of pornography in the internet. The act attempts to regulate the indecency of

pornography especially to children and also in cyberspace. Additionally, the act in section 230

says that the internet users are supposed to be interpreted as the publishers of the pornographic

materials. The most controversial portion of the act is that those relating to indecency on the

internet. It is clear that, internet pornography has been on rise and the fact that the indecency in

news media is present does not have any prove that the publishers and the broadcasters have
Information Security Law & Ethics 3

been engaging in such act bearing in mind that there are certain regulation bodies which relate

their operations. The controversial in this act can literally be explained in that there is no any

justification upon the usage of internet among the adults while at the same time protecting the

children.

c)

The act was struck down immediately after the debate which was raised to push for the

motion to be banned. In 12th June 1996, a panel of federal judges blocked the part of the CDA

arguing that it was violating the rights of people especially the adults that is freedom of speech.

In 26th June 1997, the Supreme Court of United State upheld the Philadelphia decision to ban the

motion which they also argued indecency provision was unconstitutional of the first amendment

right of free speech and in that it has no right to permit what the parent has to choice best for

their children.

d)

According to American society, freedom of speech has been one of the biggest issue

which every single American has been fighting for up to the present time. When a law has to be

passed, several issues has to be considered whether the parties involved in the law are satisfied or

the entire group is considered. There is no law which can be passed to favor a single group of

people living behind the general population. Additionally, the law does not involve any biasness

at whatever circumstance. Therefore, the law to be passed has to consider everyone for their

benefits. The scenario is the same as that of COPA and CPPA which was struck down since they

were unconstitutional.
Information Security Law & Ethics 4

e)

Yes, they should have been declared unconstitutional as they mainly focused on

particular group of people not focusing on the rights of the entire group.

a)

Sexting is that sending and receiving or else forwarding of pornographic messages to another

person. This act creates a certain scenario among the young of being engaged in pornographic

acts and therefore exploiting them (Zhang, 2010).

b)

No, according to my opinion, the teens should not engage in this issue of sexting as they are

young to understand the things which should be understood by the adults. The should also not be

supposed to be engaged into these felonies as the act will mislead them psychologically. Instead

they should hold a discussion on what they should engage in their youth time.

4.

a)

Censorship can be termed as the control of information which is in turn circulated among the

people. There is the ongoing debate about the media outlets being subjected to censorship has

been widely debated. According to American Library association, long debates has been there
Information Security Law & Ethics 5

whether to allow censorship in internet. Allowing censorship in internet is an act of violating the

right of people of freedom of speech. Freedom of speech is the right of allowing the citizens to

do what is right as per the constitution. There is a conflicting issue whereby when censorship is

applied to protect the rights of the youth, there will be violation of the right of people to the

freedom of speech (Jhaver, Chan & Bruckman, 2017).

b)

Free speech is right to share to the people with lenience what one feel should be at

general public domain without any restriction from the government agencies.

c)

There are two types of censorship and one is censorship by suppression and the other is the other

is the censorship by deterrence. Censorship of suppression is a suppression which specifically

depends upon the threats of arrest and conviction and it affect prohibition by preventing

materials from being revealed, published or circulated. On the other hand, the censorship of

deterrence does not prevent material from being published (Wang, Jufferman & Du, 2016).

d)

Yes, it is useful in understanding the two cases as they will help one understand different

scenario when one is found guilty.


Information Security Law & Ethics 6

References

Cacioppo, M., Gori, A., Schimmenti, A., Baiocco, R., Laghi, F., & Caretti, V. (2018).

Development of A New Screening Tool for Cyber Pornography: Psychometric Properties Of The

Cyber Pornography Addiction Test (CYPAT). Clinical Neuropsychiatry: Journal of Treatment

Evaluation.

file:///C:/Users/STEVE%20PC/Downloads/SSRN-id1633690.pdf

https://law.jrank.org/pages/11986/Cyber-Crime-Online-child-pornography.html

https://www.emeraldinsight.com/doi/abs/10.1108/10662249710171841?journalCode=intr

Jhaver, S., Chan, L., & Bruckman, A. (2017). The view from the other side: The border between

controversial speech and harassment on Kotaku in Action. arXiv preprint arXiv:1712.05851.

Wang, X., Juffermans, K., & Du, C. (2016). Harmony as language policy in China: An Internet

perspective. Language Policy, 15(3), 299-321.

Zhang, X. (2010). Charging children with child pornography–Using the legal system to handle

the problem of “sexting”. Computer Law & Security Review, 26(3), 251-259.

Das könnte Ihnen auch gefallen