现在可以抵制互联网上可能的言论自由。例如,中国正在试图以安全和社会稳定的名义限制政治表达。它要求互联网和电子邮件(电子邮件)的用户注册,以便它可能会监控他们的活动.9在英国,国家秘密和个人攻击是互联网上的限制。法律是严格的,政府非常有兴趣在关于这些问题的情况下规范互联网.10用于其他类型沟通的法律不一定适用于此媒体。通过互联网的所有组成部分,它变得容易转移,特殊政府可能会发现令人反感。但是,所有这些在互联网上沟通手段都构成了一个大而巨大的系统。对于监视每封电子邮件的检查员,每个新闻组中的每篇文章,每个网页,每一个IRC频道,每个Gopher网站和每个FTP站点都将靠近不可能。除了额外普通的金钱和时间外,审查互联网的企图违反了民主宪法和国际法律所含有的言语权利.11这将是违反第一次修正案。美利坚合众国的宪法宣布,“国会不得判处宗教建立的法律,或禁止自由行;或删节言论自由或新闻; or the right of the people peaceably to assemble, and to petition the Government for a redress of grievances” 12

因此,对互联网及其附属服务进行任何形式的审查都是违宪的。尽管是非法的,但在世界各地各种形式的政府下,对互联网接入和内容的限制正在增加。在法国,一个媒体普遍享有很大自由的国家,互联网最近一直是聚光灯下的焦点。一本关于前法国总统弗朗索瓦·密特朗健康史的禁书在万维网(WWW)上重新出版。显然,第三方对《大秘密》的电子复制并没有被法院禁止,法院裁定这本书的印刷版本非法侵犯了密特朗的隐私。为了加强对互联网的审查,自由社会发现它们变得更加压制,而封闭社会则找到新的方法来压制政治表达和反对意见副总统戈尔在布鲁塞尔一次有关互联网的国际会议上发表主题演讲时说:“[网络空间]是为了保护和扩大我们所有公民的表达自由……思想不应该在边界上被检查。另一位参加那次会议的人是美国公民自由联盟(American Civil Liberties Union)的安·布里森(Ann Breeson),该组织致力于保护包括言论自由在内的许多事物。她说:“我们在布鲁塞尔取得的重大胜利是我们向他们施加了足够的压力,以至于阿尔·戈尔在他的主题演讲中强调了互联网上言论自由的重要性。”15 . Many other organizations have反对法律并成功了。这个典范的例子是争夺各种团体对美国参议院最近的沟通十足法案(CDA)的战斗。1996年2月26日的公民互联网授权联盟在费城提出了一项历史诉讼,抵御美国司法部和委员会··珍妮特·雷诺,使得美国的第一次修正案。CDA不会妥协。仅仅是纯粹的原告,包括美国书商协会,读取基金会的自由,苹果,微软,美国在线,专业记者社会,商业互联网交换协会,有线和热带,以及成千上万的网友(互联网公民)显示了许多不同的人和团体在互联网上自由讲话的原因所感受到的奉献精神.16“像狗屎一样的话,他妈的,小便和山雀。毫无疑问,我们母亲(至少有些人)的话语毫无疑问,而且政府不应监管这一点。

但这不仅仅是肮脏的话。这也是关于艾滋病,同性恋和乳房的话。这是关于性成分,以及政治上有争议的主题,如吸毒成瘾,安乐死和种族主义。“最近在法国刚刚在法国,一个高等法院击中了一个促进互联网审查的法案。其他国家尝试类似的动作。互联网无法以其他媒体的方式监管,因为它与我们所拥有的其他任何东西都不一样。这是一种完全新的和独特的沟通形式,值得有机会证明自己。一个国家的法律不能在另一个国家举行管辖权,并在互联网上保持真实,因为它没有边界。虽然北美(主要是美国)拥有最多的服务器份额,但互联网仍然是全球网络。这意味着国内规定无法监督外国规则。对于美国青少年来下载(接收)来自英格兰的色情材料,这是容易的,因为它将从街上漫步。 One of the major problems is the lack of physical boundaries, making it difficult to determine where violations of the law should be prosecuted. There is no one place through which all information passes through. That was one of the key points that was stressed during the original days of the Internet, and then called ARPANET. It started out as a defense project that would allow communication in the event of an emergency such as nuclear attack. Without a central authority, information would pass around until it got where it was going.18 This was intended to be similar to the road system. It is not necessary to take any specific route but rather anyone goes. In the same way the information on the Internet starts out and eventually gets to its destination. The Internet is full of anonymity. Since text is the standard form of communication on the Internet it becomes difficult to determine the identity and/or age of a specific person. Nothing is known for certain about a person accessing content. There are no signatures or photo-ids on the Internet therefore it is difficult to certify that illegal activities (regarding minors accessing restricted data) are taking place. Take for example a conversation on IRC. Two people could people talking to one another, but all that they see is text. It would be extremely difficult, if not impossible, to ascertain the gender and/or age just from communication of this sort. Then if the conversationalist lies about any points mentioned above it would be extremely difficult t o know or prove otherwise. In this way governments could not restrict access to certain sites on the basis of ages. A thirteen-year-old boy in British Columbia could decide that he wanted to download pornography from an adult site in the U.S. The site may have warnings and age restrictions but they have no way of stopping him from receiving their material if he says he is 19 years of age when prompted.

读:
论文:加拿大法律合理的人

信息中的复杂性围绕互联网传递,这意味着如果已发布信息,则删除此材料变得几乎不可能。一个很好的例子是人们称为垃圾邮件的垃圾邮件。这些包括电子邮件广告产品,使用开放的净物品为火焰。火焰是加热的字母,许多时候没有成立。在消亡之前,这些似乎漂浮在年龄段,因为它们是火焰战争的完美材料。火焰战争是长期的,宣传和高热的讨论,包括火焰,通常时间,淡紫色,诽谤一个人的声誉和人格。大多数情况,除了参与者之外,这些都是完全毫无意义的争论。每天参加互联网的数百万人都可以访问几乎所有存在的数据。也很容易复制Internet上只有单击按钮的内容。复制数据的相对易于容易意味着第二信息将发布到互联网,它可以在其他地方归档。 There are in fact many sites on the Internet that are devoted to the archiving of information including: ftp.cdrom.com (which archives an extraordinary amount of software among others), www.archive.org (which is working towards archiving as much of the WWW as possible), and wuarchive.wustl.edu (which is dedicated towards archiving software, publications, and many other types of data). It becomes hard to censor material that might be duplicated or triplicate within a matter of minutes. An example could be the recent hacking of the U.S. Department of Justice’s Homepage and the hacking of the Central Intelligence Agency’s Homepage.

有人非法获得访问计算机上这些主页存储和修改他们。这是恶作剧;然而,这两家机构都已经关闭了他们的网页。2600 (www.2600.com),一本致力于黑客攻击的杂志,在他们的网站上重新刊登了被黑客攻击的司法部和中央情报局的主页。该杂志要么直接从被黑客攻击的网站复制数据,要么被黑客攻击的网站被提交给该杂志。我不知道哪一个是正确的,但它确实表明了数据可以很容易地被复制和传播,也表明了防止被认为不合适的材料出现在不应该出现的地方的困难。互联网是一个过于复杂的网络,很难有效地进行审查。这是一个全新的、独特的通信环境。现行法律不适用于这种媒介。由于没有明确的界限,人们对违法行为发生在哪里感到困惑。 The Internet is made up of nameless interaction and anonymous communication. The intricacy of the Internet makes it near impossible to delete data that has been publicized. No one country should be allowed to, or could, regulates or censors the Internet.
参考文献

读:
论文:我们在我们的教育系统中需要更实际的知识

1 http://fileroom.aaup.uic.edu/fileroom/documents/cases/102socrats.html 2 declan mccullagh,“自由瘟疫”互联网地下,http://www.eff.org/~declan/global/reports/ plague.073196.txt(1996年7月31日)。3张麦克拉格,“自由瘟疫”互联网地下,http://www.eff.org/~declan/global/reports/plague.073196.txt(1996年7月31日)。4 Shari,Steele,“在第一次修正案中取出了一个字节。网络空间中的言论如何?“人权,http://www.eff.org/pub/censiation/human_rights_960420.article(1996年春季)。5布莱恩布拉德福德和马克克鲁霍尔兹,“电信和十字:大哥走向数字,”今天的商业,春季1996:12-16。6布鲁斯,英镑,“互联网的历史悠久”幻想和科幻小说的杂志,http://www.isoc.org:70/00/internet/history/short.history.of.internet(4月17日1996年)。7 Bruce,Sterling,“互联网历史短暂的历史”幻想和科幻小说的杂志,http://www.isoc.org:70/00/internet/history/short.history.of.internet(4月17日1996年)。 8 Shari, Steele, “Taking a Byte Out of the First Amendment. How Free Is Speech in Cyberspace?” Human Rights, http://www.eff.org/pub/Censorship/human_rights_960420.article (Spring 1996). 9 Bill Gates, “Searching for middle ground in online censorship,” Microsoft Corporation, http://www.microsoft.com/corpinfo/bill-g/column/1996essay/censorship.htm (27 Mar. 1996). 10 Bill Gates, “Searching for middle ground in online censorship,” Microsoft Corporation, http://www.microsoft.com/corpinfo/bill-g/column/1996essay/censorship.htm (27 Mar. 1996). 11 “Silencing the Net–The Threat to Freedom of Expression Online.” Human Rights Watch May 1996, Vol. 8, No. 2 (G). 12 Thomas Jefferson, “Bill Of Rights,” The Constitution of the United States, http://Constitution.by.net/uSA/BillOfRights.html (21 Apr. 1996). 13 “Silencing the Net–The Threat to Freedom of Expression Online.” Human Rights Watch May 1996, Vol. 8, No. 2 (G). 14 Declan McCullagh, “PLAGUE OF FREEDOM” Internet Underground, http://www.eff.org/~declan/global/reports/plague.073196.txt (31 July 1996). 15 Declan McCullagh, “PLAGUE OF FREEDOM” Internet Underground, http://www.eff.org/~declan/global/reports/plague.073196.txt (31 July 1996). 16 Steve Silberman, “Defending the First Amendment,” Hotwired.com, http://www.hotwired.com/special/lawsuit. 17 Heather Irwin, “Geeks Take to the Streets,” Hotwired.com, http://www.hotwired.com/special/indecent/rally.html 18 Bruce, Sterling, “Short History of the Internet,” The Magazine of Fantasy and Science Fiction, http://www.isoc.org:70/00/internet/history/short.history.of.internet (17 Apr. 1996). Bibliography Bradford, Bryan and Mark Krumholz. “Telecommunications and Decency: Big Brother goes Digital.” Business Today Spring 1996 : 12-16. Gates, Bill. “Searching for middle ground in online censorship.” Microsoft Corporation. http://www.microsoft.com/corpinfo/bill-g/column/1996essay/censorship.htm (27 Mar. 1996). Irwin, Heather. “Geeks Take to the Streets.” Hotwired.com. http://www.hotwired.com/special/indecent/rally.html Jefferson, Thomas. “Bill Of Rights.” The Constitution of the United States. http://Constitution.by.net/uSA/BillOfRights.html (21 Apr. 1996). McCullagh, Declan. “PLAGUE OF FREEDOM” Internet Underground. http://www.eff.org/~declan/global/reports/plague.073196.txt (31 July 1996). Silberman, Steve. “Defending the First Amendment.” Hotwired.com. http://www.hotwired.com/special/lawsuit. “Silencing the Net–The Threat to Freedom of Expression Online.” Human Rights Watch May 1996, Vol. 8, No. 2 (G). Steele, Shari. “Taking a Byte Out of the First Amendment. How Free Is Speech in Cyberspace?” Human Rights. http://www.eff.org/pub/Censorship/human_rights_960420.article (Spring 1996). Sterling, Bruce. “Short History of the Internet.” The Magazine of Fantasy and Science Fiction. http://www.isoc.org:70/00/internet/history/short.history.of.internet (17 Apr. 1996).

引用这篇文章为:William Anderson (Schoolworkhelper编辑团队),“Essay: Censorship and The Internet,”学校努力, 2019,//www.chadjarvis.com/essay-censorship-and-the-internet/

帮助我们修复他的微笑与你的旧散文,这需要几秒钟!

- 我们正在寻找你aced的上一篇文章,实验室和作业!

-我们会审查并发布在我们的网站上。
-AD收入用于支持发展中国家的儿童。
- 通过操作微笑和微笑火车,帮助支付腭裂修复手术。

来宾
0.评论
内联反馈
查看所有评论