⭐ 欢迎来到虫虫下载站! | 📦 资源下载 📁 资源专辑 ℹ️ 关于我们
⭐ 虫虫下载站

📄 how the traditional media clasifications fail to protect in t.txt

📁 1000 HOWTOs for various needs [WINDOWS]
💻 TXT
📖 第 1 页 / 共 3 页
字号:
wasting vast amounts of time and effort combing through computerfiles, or being subject to potential lawsuits and damage awards basedon the unknown illegal acts any one of hundreds or thousands ofcallers might choose to commit on their systems."51No such imposition should be allowed. Thus in some respects it islogical to consider these systems a distributor free from most legalliability.52 But the varying manners in which people communicate onelectronic systems makes this single, albeit protective, labelinaccurate. Real-time chats are immediate with no opportunity toprescreen, although if someone is rude or abusive, they may findthemselves cut out. Such as the case when a male America Online userentered the chat room "Women for Women."53 He wandered in blathering,"So, any lesbian Nazi hookers from hell here?" The moderator quicklybooted him out, and the user later received a warning message in hismailbox. The user -- already on notice -- later made the mistake ofusing the word "piss" in another chat areas and lost his account onAmerica Online.Because the user "spoke" in real time offering observers no chance tofilter out his offensive comments, the electronic chat system was muchlike a broadcaster without a delay device. No prior censorship was inplace except that problem users would find themselves unable toparticipate as long as they behaved inappropriately among a diversepopulation.This lack of ability to filter the speech of others is at the heart ofthe needed definition for electronic mass communications systems. Onlycommon carriers do not have previous knowledge of the communicationcarried through their systems. They also are obligated to carry it. Asthe history of sysop intervention and moderation on shared networkshas indicated, however, the desire to maintain high-qualitydiscussions is a common desire.54 Low signal to noise ratios areexpensive. Users and sysops are paying to transmit messages across thecountry and want to eliminate as much chaff as they possibly can. Thecornerstone of eliminating garbage is steering conversations toappropriate areas (no religion talk in the soap opera conference) andcoming down hard on users who routinely abuse other users. This mayseem like an effort to censor views analogous to a broadcaster using adelay device to silence its political opposition as warned against inAdams v. Frontier Broadcasting. But administrators for these networkswill quickly remind people that the First Amendment simply doesn'tapply: The network makes the rules and grants users limited freedom ofspeech.55Though that has not been enough for some socialist members of societywho insist that computer networks are much like a company town orshopping mall in that the more they open themselves to the public, theless control over speech they have.56 The public forum doctrine,unfortunately, is not equal from state to state. More state courtshave favored defendants who restricted speech than states that foundfor the speaker.57What this means for national and global computer networks is aconfusing array of laws that vary from state to state. Lance Rose, alawyer who has written much on the subject of computing-related law,has suggested that laws related to the electronic frontier benationalized to alleviate the uncertain nature of laws from state tostate.58 That is a central goal to protecting operators fromunnecessary liability. Users will see their rights to speak in whatthey believe to be a public forum enhanced if the proper steps afterthat are taken. As Rose stated: "It's time to realize that provincialstate laws only hinder proper development of interstate electronicsystems."59One direction that could be taken in the public discourse area ofcomputer-mediated communication is the notion of the public forum. Nomethod of communication ever developed by mankind so easily puts thepower of speech into individual hands. None ever has opened itself upto the thoughts expressed by the millions of users who operate on thecommercial information services, the 60,000 bulletin board systems andInternet-connected systems.This certainly supports the expansion of "freedom of speech" tocomputer networks to the point that respectable users can do or saywhat they want. The technology provides everyone a chance to havetheir say. Sysops tend to dislike this analogy, insisting that theirboards are their private property much like their private living roomto which they can invite anyone they want or from which they canremove anyone they dislike.60 No infringement on their rights as theowner is intended; computer bulletin boards are still safe becausethey fit so many roles.Different types of systems have different needs. To help them meetthat is the "time, place and manner" provision already assigned totraditional public forums.61 It should be expected that in areas opento minors, decent language will be used and certain types of discourseare agreed upon as inappropriate. In those systems sensitive to cost,rules barring extraneous ASCII (overquoting, cute quote boxes andbloated signatures)62 are permissible as are those discouragingoff-topic meandering and flaming.In none of these should operators be expected to prescreen discourse.They do have the right and obligation, however, to remove damagingmaterials on private, non-shared message bases once brought to theirattention.63 The cost is insignificant as the means to delete suchmaterial is available at the tap of a key. Expecting the same behavioron shared systems is impractical and counterproductive. In this casemoderators have an obligation to ensure that disruptive elements arenot allowed to continue inserting damaging material into the network.Again, there is little need of this when the area at question has nosponsor, such as with the "alt" groups on USENET. The individual, notthe network's leadership or its connecting parts, is responsible formaterial placed in the public arena. The system operators in this caseact as pure distributors. Some have a choice over what areas they willsupport and which they will not, but not individual statements.64 Thisis like a library which might cancel a periodical subscription but notremove a single issue someone considers offensive.65If a bookstore chooses to carry pornographic material it should beallowed to do as long as state laws regarding distribution to minorsand obscenity are adhered to. The same should apply to computerbulletin boards; operators should not be afraid to maintain adultareas simply because law enforcement behaves like the Keystone Kops.One would hope that local authorities have learned something about therights of bulletin board operators and users over the last 10 yearswhen Tom Tcimpidis' BBS was seized in 1984 after a user posted astolen telephone credit card number on the board.66 Unfortunately,they have not. One local Knoxville board removed its adult areareportedly for fear of legal disputes,67 and the Secret Service waschastised for seizing the computer equipment of a publisher whichcontained works in progress and electronic mail.68 Sysop Mark Lehrerof Ohio is still fighting to recover the private E-mail from hissystem which authorities took along with his entire BBS in a failedsting operation directed at suspected child pornographydistribution.69As long as sysops see such reports and fear the security of theirboard, open exchange of ideas whether written or graphic can notfreely occur despite American courts' insistence they support theFirst Amendment as well as privacy. Once definitive classification isobtained, the freedom that spread across computer bulletin boards intheir birth will continue into the next century as networks grow andas new systems reach completion.70With that classification must come an understanding of whatresponsibilities a sysop has as a distributor or publisher.  Injuriousmaterials can include defamation, copyright infringement and computerviruses, all of which can affect users or third parties. A sysopoperator's role in preventing or limiting damage has yet to be finelydetailed, although the considerations of negligence and actual malicecan be extended to the operations of a computer bulletin board. Whichstandard of fault is best hasn't been decided.71 Operators may preferone, parents another and adult users yet their own again.Some steps have already been taken. The Electronic Frontier Foundationhas supported building a consensus on the limits of sysop liability.72A handful of law review articles have suggested that the current mediaclassifications are unfit to include BBS' in their realm and that anew class is needed.73 Unfortunately, most of this discussion hastaken place among computer watchers and interested law parties. ManyAmericans still lag behind in its understanding of what bulletinboards are and where they stand as evidenced by reports in the mediaon how BBS scandals continue to mystify basic concepts long acceptedby the public as expected.74It may seem shocking for users today to learn that more than ever theyare responsible for what they write and what they distribute. Theability to have your voice heard is unprecedented but so is thecapability to harm. The media lessons of copyright, privacy anddefamation still are being taught on the networks today. They willcontinue as more people log on to the networks at hand, spreadingtheir personage electronically.Education can answer many of the problems facing the electronic worldtoday. But no puzzles are solvable until computer information systemsand bulletin boards are granted the highest degree of First Amendmentrights and freedom from liability necessary to keep the waves ofpublic exchange coming throughout the future.[FOOTNOTES]1 Here is the text of Tribe's proposed amendment:"This Constitution's protections for the freedoms of speech, press,petition, and assembly, and its protections against unreasonablesearches and seizures and the deprivation of life, liberty, orproperty without due process of law, shall be construed as fullyapplicable without regard to the technological method or mediumthrough which information content is generated, stored, altered,transmitted, or controlled."2 "ILink Conference Information," (short list) July 1993 from the fileILCNF307.ZIP available on ILink-affiliated boards of which Data WorldBBS in Maryville, Tenn. (615-675-3282) is one.Besides conferences geared to debate, technical discussion, hobbies,professions and entertainment, networks often maintain administrativeareas for news announcements and handling of user-moderator disputes.The Mod & User area of ILink for example is set aside as the "hallway"where users and conference hosts can discuss instances where someonehas been moderated for rules violations. Its implementation is public.Other networks may handle moderations similarly, very differently,privately or not at all (as is the case with LuciferNet).3 A recurring problem in almost any conference devoted to computeroperating systems. The author has personally noted warnings and minordisputes in Windows and Macintosh-oriented conferences. Other usershave been moderated for similar instances in OS/2, according toexchanges in the ILink Mod & User conference.4 Common conferences for such debates: Politics, Opinion and even StarTrek.5 Because this incident began in the summer of 1992 and continued intothe autumn months, copies of the dispute long ago disappeared from thearchives available to most users, including the author. Descriptionsof the account are based upon his memory of the conference's flame warat the time.6 Ibid. Gary Phillips' description did nothing to help his argument.If anything it increased some users' distaste of homosexuals.7 Ibid. Matthew Ackerman was the participant who threatened the ILinknetwork with legal action. He was eventually reassured that 1) ILinkpolicies would be sufficient and 2) successfully suing everyoneinvolved would be a monumental task because the boards are distributedacross the United States and internationally.8 On the ILink network, the official moderation schedule is asfollows:-- Informal warning. Discuss in Mod & User.-- Formal warning. Discuss in Mod & User. Replying to moderation   messages in the conference in which one has broken a rule rather   than Mod & User is a common method of earning the next step:-- 30-day suspension. Applies to the conference only. This is   unappealable and thus no discussion is warranted.-- 6-month revocation. This is appealable. Upon a return from a 30-day   suspension, any violation of rules demands this access restriction.   Discuss in Mod & User.-- Network expulsion. In rare instances a user may have access to   ILink removed completely. See note 34 below.9 An E-mail acquaintance of the author is the culprit in this case. Heeventually stopped posting the articles after Russell King, anassistant managing editor at The New York Times who read theconference, informed him that he was in violation of copyright law andshould immediately cease posting Times articles verbatim or as lengthyexcerpts.10 This particular user posted several different messages in severaldifferent conferences on ILink.11 Take for example a posting in the ILink Politics conference of thearticle from The American Spectator on Magic Johnson's contraction ofHIV.12 Such reprinting without permission occurs on a regularly basis onsome Internet discussion groups. These are posted apparently fornonprofit information distribution in most cases.13 Pham, Dewey. Response to moderator's notice that he could not postan Associated Press wire service article, no matter how fascinatingand pertinent, about Robin Williams possibly showing up as a gueststar on Star Trek: The Next Generation.14 See note 9 above.15 Posting on USENET's alt.censorship newsgroup."The USENET is an informal, rather anarchic, group of systems thatexchange `news.' News is essentially similar to `bulletin boards' onother networks." Krol, Ed. The Whole Internet: User's Guide andCatalog, p. 363.16 Account of a month-long incident according to complaints andmoderation posts in the network's Mod & User conference. Some of theposts included verbatim quotations. Available on Data World BBS.17 As the seasons progressed, Sirtis' cleavage diminished. It

⌨️ 快捷键说明

复制代码 Ctrl + C
搜索代码 Ctrl + F
全屏模式 F11
切换主题 Ctrl + Shift + D
显示快捷键 ?
增大字号 Ctrl + =
减小字号 Ctrl + -