Virtual Freedom

Total Page:16

File Type:pdf, Size:1020Kb

Virtual Freedom VIRTUAL FREEDOM VIRTUAL FREEDOM Net Neutrality and Free Speech in the Internet Age Dawn C. Nunziato STA NF ORD LAW BOOKS An Imprint of Stanford University Press Stanford, California Stanford University Press Stanford, California ©2009 by the Board of Trustees of the Leland Stanford Junior University All rights reserved. No part of this book may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopying and recording, or in any informa- tion storage or retrieval system without the prior written permission of Stanford University Press. Printed in the United States of America on acid-free, archival-quality paper Library of Congress Cataloging-in-Publication Data Nunziato, Dawn C. Virtual freedom : net neutrality and free speech in the Internet age / Dawn C. Nunziato. p. cm. Includes bibliographical references and index. isbn 978-0-8047-5574-0 (cloth : alk. paper)—isbn 978-0-8047-6385-1 (pbk. : alk. paper) 1. Freedom of speech—United States. 2. Internet—Censorship—United States. 3. Internet—Law and legislation—United States. I. Title. KF4772.N86 2009 342.7308'53—dc22 2009012532 Designed by Bruce Lundquist Typeset by Classic Typography in 10/14 Minion To my wonderful children, Allie and Zach— may you always be free to express yourselves to my husband, Jon, my favorite author—for leading the way and to my parents, Frances and Joseph—for always believing in me “[W]e could be witnessing the beginning of the end of the Internet as we know it.” — Michael J. Copps, FCC commissioner, “The Beginning of the End of the Internet?” New America Foundation, Washington, D.C., October 9, 2003 “The potential for abuse of this private power over a central avenue of communication cannot be overlooked. ." —Turner Broadcasting System, Inc. v. F.C.C., 512 U.S. 622, 657 (1994) “When we balance the constitutional rights of owners of property against those of the people to enjoy [First Amendment freedoms], . we remain mindful of the fact that the latter occupy a preferred position.” —Marsh v. Alabama, 326 U.S. 501, 509 (1946) Contents Acknowledgments xi Introduction xiii 1 Speech and Censorship on the Internet 1 2 The First Amendment’s Free Speech Guarantee 24 3 Embracing the Affirmative First Amendment 41 4 A Place to Speak Your Mind 70 5 When Private Becomes Public 88 6 Speech Conduits and Carriers 115 7 Protecting Free Speech in the Internet Age 134 Conclusion 152 Notes 159 Index 191 Acknowledgments WAS FORTUNATE TO HAVE THE SUPPORT OF MANY COLLEAGUES Iand family members in writing this book. I am grateful to my dean, Fred Lawrence, for his encouragement and generous financial support, as well as for his careful reading of and thoughtful comments on many drafts; to Professor Jerome Barron for his inspiration, advice, and guidance; to the participants of The George Washington University Law School Works in Progress Series, Vanderbilt Law School’s The Internet Meets the First Amend- ment Conference, University of North Carolina Law School’s Cyberspeech Symposium, and American University Washington College of Law’s Distin- guished Faculty Colloquium, especially Tony Varona; to Jonathan Lowy for his expert advice, constant encouragement, and editorial assistance; to Todd Peterson, for his patience and his insightful comments on many drafts, es- pecially on Chapters 5 and 7; to Ellen Goodman, for her careful reading and expert commentary and critique; to Padmaja Balakrishnan, for tireless and outstanding secretarial support; to Brian Day, Megan Matthews, Michelle Rosenthal, Aaron Johnson, Bryan Mechell, Jeremy McGinley, and Jordan Segal for excellent research assistance; to Leonard Klein and Matthew Braun for superb library research assistance; and to Frances and Joseph Nunziato, for their advice on many versions of the book cover. Finally, I am indebted to the supportive and diligent editors at Stanford University Press, especially Kate Wahl and Joa Suorez, and to David Horne of Classic Typography, for expert editorial assistance. xi Introduction HE INTERNET PROVIDES THE GREATEST FORUM FOR COMMUNICATION Tand expression that the world has ever seen. At the same time, however, it ultimately is subject to the control of a handful of dominant, pri- vate entities that are unregulated under the First Amendment in their duty to facilitate communication and expression. That paradox lies at the center of this book. More than at any time in our history, a small number of private entities enjoy unfettered control over what speech to facilitate—and what speech to restrict or disfavor—within our most important medium for expression. Al- though the Internet is generally seen as a forum for free expression, in real- ity speech on the Internet is subject to censorship and discrimination at a variety of chokepoints. Internet speech conduits—such as broadband service providers—are now responsible for facilitating a vast amount of expression. Unlike telephone companies or the postal service—which have long been le- gally required not to discriminate against the content they are charged with carrying—these Internet speech conduits are not similarly regulated. While many individuals may be content to entrust to the market their ability to com- municate, recent developments suggest that such trust is misplaced and may very well lead to the “end of the Internet as we know it.” U.S.-based Internet speech conduits have recently invested extensive re- sources into developing methods to censor expression at the behest of speech- restrictive regimes such as China.1 With such methods in hand, Internet xiii xiv Introduction speech conduits are increasingly poised to restrict speech by United States’ Internet users, in order to advance their commercial, political, or other inter- ests. In a recent incident, Comcast—one of the nation’s dominant broadband providers—secretly restricted its subscribers from using legal file-sharing applications and prevented its email subscribers from receiving communica- tions from two public interest groups critical of President George W. Bush. Comcast blocked emails from AfterDowningStreet, an organization that sought to lobby Congress to impeach the president for his conduct in bringing about the war with Iraq, and from the antiwar organization MeetWithCindy, established by antiwar activist Cindy Sheehan. Similarly, DSL provider AT&T censored the anti-Bush lyrics of Pearl Jam lead singer Eddie Vedder during a live cablecast of a concert. Google for its part has restricted speech that is critical of its role in censoring speech in overseas markets, as well as a host of other political expression. Speech on political and protest issues is tradi- tionally accorded the highest degree of protection within our constitutional scheme, but because such speech restrictions as these occur at the hands of “private” conduits, they are not considered First Amendment violations under the prevailing understanding of the free speech guarantee. Nor are broadband providers regulated as “common carriers,” as a result of a recent policy shift by the FCC. How is it that we find ourselves at this juncture in free speech jurispru- dence? And what, if anything, should be done about it? Over the past two decades, the U.S. government divested itself of ownership and control of the Internet’s infrastructure and ceded ownership and control to a handful of pri- vate entities. At the time it did so, those private speech conduits were still regulated as common carriers and legally required to facilitate, and not to dis- criminate against, speech. Providers of narrowband and DSL Internet access were considered telecommunications providers subject to common carriage duties and were prohibited from discriminating against content. Since 2002, however, the FCC has embarked on a path of gradually removing such obliga- tions from Internet speech conduits. And in its decision in Brand X in 2005, the United States Supreme Court approved of this course of action. Our free speech rights on the Internet are quietly slipping away. Since 2005, individuals concerned about the future of the Internet have sought to remedy these (and related) problems of unfettered control by those few powers who serve as gatekeepers for the Internet’s content. They have proposed “net neutrality” legislation and have sought to convince the FCC to Introduction xv impose meaningful constraints on such power. Although proposed net neu- trality regulation is aimed at limiting conduits’ power in a variety of ways, my focus is on constraining their power to discriminate against Internet speech on the basis of its content, which is essential to protecting individuals’ free speech rights within our liberal democracy. A few decades ago, the fact that conduits for speech were privately owned would not necessarily have insulated them from First Amendment obliga- tions. In a number of early decisions, the Supreme Court adopted an affir- mative conception of the free speech guarantee and imposed obligations on public and powerful private conduits of speech to facilitate individuals’ right to speak without discrimination. In recent years, however, the Court has unwisely trended toward a negative conception of the First Amendment, in which individuals’ free speech rights apply only against government censor- ship, and private speech conduits are left unrestricted in their ability to regu- late expression. This book is intended to serve as a wakeup call and a call to action for those who are concerned about our free speech rights as U.S. citizens in this unprecedented forum for expression. Courts and policymakers—and mem- bers of the public—should embrace an affirmative conception of the First Amendment for the Internet age. The prevailing negative conception of the First Amendment fails to recognize and protect the important role that the state should serve in regulating these dominant private conduits of expression in order to facilitate the conditions necessary for democratic self-government. Simply put, entrusting all speech decisions to a market dominated by a few powerful speech regulators disserves democracy and the freedom of speech that democracy requires.
Recommended publications
  • Flashback As a Rhetorical Online Battleground
    http://www.diva-portal.org This is the published version of a paper published in Social Media + Society. Citation for the original published paper (version of record): Blomberg, H., Stier, J. (2019) Flashback as a rhetorical online battleground: Debating the (dis)guise of the Nordic Resistance Movement Social Media + Society https://doi.org/10.1177/2056305118823336 Access to the published version may require subscription. N.B. When citing this work, cite the original published paper. Permanent link to this version: http://urn.kb.se/resolve?urn=urn:nbn:se:du-29134 SMSXXX10.1177/2056305118823336Social Media <span class="symbol" cstyle="Mathematical">+</span> SocietyBlomberg and Stier 823336research-article20192019 Article Social Media + Society January-March 2019: 1 –10 Flashback as a Rhetorical Online © The Author(s) 2019 Article reuse guidelines: sagepub.com/journals-permissions Battleground: Debating the (Dis)guise DOI:https://doi.org/10.1177/2056305118823336 10.1177/2056305118823336 of the Nordic Resistance Movement journals.sagepub.com/home/sms Helena Blomberg1 and Jonas Stier2 Abstract The right-wing Swedish Nordic Resistance Movement (NRM) is increasingly active on social media. Using discursive psychology, this text explores the rhetorical organization of text and rhetorical resources used on the Swedish online forum Flashback. The aim is to reveal and problematize truth claims about NRM made by antagonists and protagonists. Questions are (1) how and what do NRM antagonists and protagonists convey in Flashback posts about NRM, and its ideology and members? (2) how do NRM antagonists and protagonists make truth claims about NRM in Flashback posts? The empirical material consisting of 1546 Flashback posts analyzed to identify typical discussions on “NMR’s true nature”; accomplished social actions stemming from the posts.
    [Show full text]
  • Monitoring of Online Offenders by Researchers
    SGOC STUDYING GROUP ON ORGANISED CRIME https://sgocnet.org Sifting through the Net: Monitoring of Online Offenders by Researchers Research note Sifting through the Net: Monitoring of Online Offenders by Researchers David Décary-Hétu and Judith Aldridge* Abstract: Criminologists have traditionally used official records, interviews, surveys, and observation to gather data on offenders. Over the past two decades, more and more illegal activities have been conducted on or facilitated by the Internet. This shift towards the virtual is important for criminologists as traces of offenders’ activities can be accessed and monitored, given the right tools and techniques. This paper will discuss three techniques that can be used by criminologists looking to gather data on offenders who operate online: 1) mirroring, which takes a static image of an online resource like websites or forums; 2) monitoring, which involves an on- going observation of static and dynamic resources like websites and forums but also online marketplaces and chat rooms and; 3) leaks, which involve downloading of data placed online by offenders or left by them unwittingly. This paper will focus on how these tools can be developed by social scientists, drawing in part on our experience developing a tool to monitor online drug “cryptomarkets” like Silk Road and its successors. Special attention will be given to the challenges that researchers may face when developing their own custom tool, as well as the ethical considerations that arise from the automatic collection of data online. Keywords: Cybercrime – Internet research methods – Crawler – Cryptomarkets avid e cary- e tu is Assistant Professor at the School of Criminology, University of Montreal, and Researcher at the International Centre of Comparative Criminology (ICCC).
    [Show full text]
  • 3.3.5.Haulath.Pdf
    CONTENTS SL. PAGE NO. ARTICLE NO 1 DATA PRE-PROCESSING FOR EFFECTIVE INTRUSION DETECTION RIYAD AM 5 2. AN ENHANCED AUTHENTICATION SYSTEM USING MULTIMODAL BIOMETRICS MOHAMED BASHEER. K.P DR.T. ABDUL RAZAK 9 6. GRADIENT FEATURE EXTRACTION USING FOR MALAYALAM PALM LEAF DOCUMENT IMAGEGEENA K.P 19 7. INTERNET ADDICTION JESNA K 23 8. VANETS AND ITS APPLICATION: PRESENT AND FUTURE.JISHA K 26 9. DISTRIBUTED OPERATING SYSTEM AND AMOEBAKHAIRUNNISA K 30 5. INDIVIDUAL SOCIAL MEDIA USAGE POLICY: ORGANIZATION INFORMATION SECURITY THROUGH DATA MINING REJEESH.E1, MOHAMED JAMSHAD K2, ANUPAMA M3 34 3. APPLICATION OF DATA MINING TECHNIQUES ON NETWORK SECURITY O.JAMSHEELA 38 4. SECURITY PRIVACY AND TRUST IN SOCIAL MEDIAMS HAULATH K 43 10. SECURITY AND PRIVACY ISSUES AND SOLUTIONS FOR WIRELESS SYSTEM NETWORKS (WSN) AND RFID RESHMA M SHABEER THIRUVAKALATHIL 45 11. ARTIFICIAL INTELLIGENCE IN CYBER DEFENSESHAMEE AKTHAR. K. ASKARALI. K.T 51 SECURITY PRIVACY AND TRUST IN SOCIAL MEDIA Haulath K, Assistant professor, Department of Computer Science, EMEA College, Kondotty. [email protected] Abstract— Channels social interactions using 2. Social Blogs extremely accessible and scalable publishing A blog (a truncation of the expression weblog) is a methods over the internet. Connecting individuals, discussion or informational site published on communities, organization. Exchange of idea Sharing the World Wide Web consisting of discrete entries message and collaboration through security privacy (“posts”) typically displayed in reverse chronological and trust. order (the most recent post appears first). Until 2009, Classification of Social Media blogs were usually the work of a single individual, occasionally of a small group, and often covered a 1.
    [Show full text]
  • Protecting Activists from Abusive Litigation: Slapps in the Global
    PROTECTING ACTIVISTS FROM ABUSIVE LITIGATION SLAPPS IN THE GLOBAL SOUTH AND HOW TO RESPOND SLAPPS IN THE GLOBAL SOUTH Features and Policy Responses Author: Nikhil Dutta, Global Programs Legal Advisor, ICNL, [email protected]. Our thanks go to the following colleagues and partners for valuable discussions and input on this report: Abby Henderson; Charlie Holt; Christen Dobson; Ginna Anderson; Golda Benjamin; Lady Nancy Zuluaga Jaramillo; Zamira Djabarova; the Cambodian Center for Human Rights; iProbono; and SEEDS for Legal Initiatives. Published in July 2020 by the International Center for Not-for-Profit Law (ICNL) TABLE OF CONTENTS I. INTRODUCTION 1 II. SLAPPS IN THE GLOBAL NORTH 2 III. SLAPPS IN THE GLOBAL SOUTH 4 A. Instances of Reported SLAPPs in the South 4 i. Thailand 5 ii. India 7 iii. Philippines 10 iv. South Africa 12 v. Other Instances of Reported SLAPPS in the South 13 B. Features of Reported SLAPPs in the South 15 IV. POLICY RESPONSES TO SLAPPS IN THE GLOBAL NORTH 19 A. Enacting Protections for Public Participation 19 B. Creating Expedited Dismissal Procedures for SLAPPs 20 C. Endowing Courts with Supplemental Authorities to Manage SLAPPs 23 D. Permitting Recovery of Costs by SLAPP Targets 24 E. Authorizing Government Intervention in SLAPPs 25 F. Establishing Public Funds to Support SLAPP Defense 25 G. Imposing Compensatory and Punitive Damages on SLAPP Filers 25 H. Levying Penalties on SLAPP Filers 26 I. Reforming SLAPP Causes of Action 27 V. POLICY RESPONSES TO SLAPPS IN THE GLOBAL SOUTH 27 A. Thailand 28 B. Philippines 30 C. Indonesia 33 VI. DEVISING FUTURE RESPONSES TO SLAPPS IN THE GLOBAL SOUTH 33 REFERENCES 37 I.
    [Show full text]
  • Free Speech Savior Or Shield for Scoundrels: an Empirical Study of Intermediary Immunity Under Section 230 of the Communications Decency Act
    Loyola of Los Angeles Law Review Volume 43 Number 2 Article 1 1-1-2010 Free Speech Savior or Shield for Scoundrels: An Empirical Study of Intermediary Immunity under Section 230 of the Communications Decency Act David S. Ardia Follow this and additional works at: https://digitalcommons.lmu.edu/llr Part of the Law Commons Recommended Citation David S. Ardia, Free Speech Savior or Shield for Scoundrels: An Empirical Study of Intermediary Immunity under Section 230 of the Communications Decency Act, 43 Loy. L.A. L. Rev. 373 (2010). Available at: https://digitalcommons.lmu.edu/llr/vol43/iss2/1 This Article is brought to you for free and open access by the Law Reviews at Digital Commons @ Loyola Marymount University and Loyola Law School. It has been accepted for inclusion in Loyola of Los Angeles Law Review by an authorized administrator of Digital Commons@Loyola Marymount University and Loyola Law School. For more information, please contact [email protected]. FREE SPEECH SAVIOR OR SHIELD FOR SCOUNDRELS: AN EMPIRICAL STUDY OF INTERMEDIARY IMMUNITY UNDER SECTION 230 OF THE COMMUNICATIONS DECENCY ACT David S. Ardia * In the thirteen years since its enactment, section 230 of the Communications Decency Act has become one of the most important statutes impacting online speech, as well as one of the most intensely criticized. In deceptively simple language, its provisions sweep away the common law's distinction between publisher and distributor liability, granting operators of Web sites and other interactive computer services broad protectionfrom claims based on the speech of third parties. Section 230 is of critical importance because virtually all speech that occurs on the Internet is facilitated by private intermediaries that have a fragile commitment to the speech they facilitate.
    [Show full text]
  • Slapped: a Tool for Activists
    Published May 2014 SLAPPed: A Tool for Activists The right to speak your mind and fight for what you believe in without – or in spite of – reprisal, is one of our nation’s oldest and dearest principles. But for just as long, there have been powerful forces that prefer it when people simply stay silent. Whether the year is 2014 or 1814, these forces have always proved willing to use whatever tools they can muster to silence their critics. Often, they turn to the legal system, where their superior resources can help them make life very difficult for those who dare to challenge them. As these legal tactics have evolved, they have been a given a name. Today we call them Strategic Lawsuits Against Public Participation, or SLAPP suits. Their goal is not victory in the courtroom. It’s much simpler than that. Their goal is to send this very clear message: “Exercise your First Amendment rights at your own peril.” This message represents the polar opposite of everything the American Civil Liberties Union stands for. We have little concern for the ever-evolving partisan disagreements and economic realities that prompt these SLAPP suits. Our stake in this issue is much larger. Our court system should be a place where we are all treated equally in the eyes of the law. It should not be a place where the powerful use their abundance of resources to enact revenge on those who see the world through different eyes. What future is there for freedom of speech if we allow those who speak out to be bled dry and turned into an example of what happens when you stand up to speak your mind? 1 SLAPP suits pervert our legal system by turning it into a war of attrition, a place where who is right and who is wrong does not matter nearly as much as who has the most resources.
    [Show full text]
  • The Internet Is a Semicommons
    GRIMMELMANN_10_04_29_APPROVED_PAGINATED 4/29/2010 11:26 PM THE INTERNET IS A SEMICOMMONS James Grimmelmann* I. INTRODUCTION As my contribution to this Symposium on David Post’s In Search of Jefferson’s Moose1 and Jonathan Zittrain’s The Future of the Internet,2 I’d like to take up a question with which both books are obsessed: what makes the Internet work? Post’s answer is that the Internet is uniquely Jeffersonian; it embodies a civic ideal of bottom-up democracy3 and an intellectual ideal of generous curiosity.4 Zittrain’s answer is that the Internet is uniquely generative; it enables its users to experiment with new uses and then share their innovations with each other.5 Both books tell a story about how the combination of individual freedom and a cooperative ethos have driven the Internet’s astonishing growth. In that spirit, I’d like to suggest a third reason that the Internet works: it gets the property boundaries right. Specifically, I see the Internet as a particularly striking example of what property theorist Henry Smith has named a semicommons.6 It mixes private property in individual computers and network links with a commons in the communications that flow * Associate Professor, New York Law School. My thanks for their comments to Jack Balkin, Shyam Balganesh, Aislinn Black, Anne Chen, Matt Haughey, Amy Kapczynski, David Krinsky, Jonathon Penney, Chris Riley, Henry Smith, Jessamyn West, and Steven Wu. I presented earlier versions of this essay at the Commons Theory Workshop for Young Scholars (Max Planck Institute for the Study of Collective Goods), the 2007 IP Scholars conference, the 2007 Telecommunications Policy Research Conference, and the December 2009 Symposium at Fordham Law School on David Post’s and Jonathan Zittrain’s books.
    [Show full text]
  • THE SIGNIFICANCE of AVATARS for INTERNET FORUMS USERS Mikail PUŞKİN1
    Cilt: 4/Sayı: 6 Temmuz İMGELEM ISSN: 2602- 4446 2020 THE SIGNIFICANCE OF AVATARS FOR INTERNET FORUMS USERS Mikail PUŞKİN1 ABSTRACT The questions of virtual representation and online identity are growing in salience for academicians ever since the inception of the Internet. Although the main flow of public online interaction and research into it have shifted towards social networks such as Facebook, Twitter and Instagram, or audio-visual environments of digital games, online forums still occupy a sizable niche for thematic and more professional or hobby-oriented communication. Current paper is analyzing one of the main visual elements used to create identity of forum users, the avatars: small (usually static) images that users choose to represent their virtual selves with. The focus of this research is on the degree of attachment and the kinds of meanings that users attribute to their avatars in online forums’ asynchronous interactive environments. This research applies grounded theory approach and relies heavily on triangulation of data collection and coding. The implemented sampling strategies are typical case sampling on the forums selection level, criterion sampling on the respondents’ replies level and subsequent diversity case sampling as means of collected data reduction. Coding procedures are applied consecutively as follows: open coding, selective coding, theoretical coding, resulting in 29 sets of data produced from 75 pages of raw data. The main findings suggest that key factor determining users’ attitude towards their avatars is the forum thematic. As a result, although overall attitude patterns diversity is rather high, such patterns are consistent and stable within the specific microcosms of individual forums.
    [Show full text]
  • International Annual Report 2020 Defending Freedom of Expression and Information Around the World International Women’S Day Protest in Mexico City on 8 March 2020
    International Annual Report 2020 Defending Freedom of Expression and Information around the World International Women’s Day protest in Mexico City on 8 March 2020. Among other demands, protesters called for justice for the more than 10 women murdered daily in Mexico and the decriminalisation of abortion. (Photo: ARTICLE 19 Mexico & Central America) 2 ARTICLE 19 Contents Civic Space Digital 6 From the Executive Director: 37 Huge step forward for the right 43 Artificial intelligence: A Global Quinn McKew to protest worldwide South perspective 7 From the Chair of the Board: 39 Combating “hate speech” 43 Working with dating apps Paddy Coulter worldwide to protect the LGBTQI+ community 8 Viral lies: Misinformation 40 Holistic protection of journalists and COVID-19 and civil society in Kenya, 45 Lawsuit against facial Malawi, and Myanmar recognition in São Paulo 9 A global response to a subway global crisis 41 Research uniting civil society in the Middle East and North 46 Assessing the human rights 12 “It’s all about prioritising Africa impacts of Internet registries wellbeing”: Supporting our staff through the pandemic 13 Reporting on the pandemic 14 Global Expression Report 2019/2020: Most people now live in a freedom of expression crisis 16 Researching rights 18 Law and policy 22 International advocacy 28 Freedom of expression: A tool to achieve women’s equality 32 Campaign updates 34 Building capacity, enhancing safety: Training and workshops International Women’s Day protest in Hundreds of people protest on 8 February Supporter of Net Neutrality Lance Brown Mexico City on 8 March 2020. Among other 2020 in Sao Paulo, Brazil, in repudiation of Eyes protests the Federal Communications demands, protesters called for justice for gender violence and in memory of those Commission’s decision to repeal the the more than 10 women murdered daily who died because they were women.
    [Show full text]
  • Management Policies and Procedures
    MANAGEMENT POLICIES AND PROCEDURES Social Media Communications Number: 212 Approved by: Donna Dreska, City Manager Effective Date: 12-02-2010 Page 1 of 14 I. PURPOSE The purpose of this policy is to provide uniform guidelines by which information regarding City activities, issues, initiatives, and policies will be disseminated using social media tools; to provide guidance for employee use of social media; to outline the City’s policy for assessing and managing comments and replies posted on City of Reno social media assets; to provide guidance on the use of linked websites; and to describe the procedures for retaining records of social media posts. II. REVISION HISTORY 12-02-10 Adopted III. REFERENCES The procedures outlined in Section VIII, Paragraph B in policy number 104, “Workplace Monitoring,” apply to the activities described in this policy. Both the “Computer Usage” (303) and the “Electronic Data Transmission” policies (304) apply to the following, in their entirety. The definition of “Internet,” Item VI (E) in policy number 304, is construed to include all social networking tools as described below. Activities described below will also be held to the standards of policy 306 “Website Protocol,” as they apply to social media assets, which will be considered an extension of the City’s website for this purpose. Information released under this policy must conform to “Media Communications and Release of Public Information” policy number 201. All City communications, including those related to social media, should be developed within the guidelines in the current Strategic Communications Plan. The City’s current Crisis Communications Procedures and Emergency Communications Procedures supersede the procedures described herein, when appropriate.
    [Show full text]
  • A Study of Internet Based Community Interactions
    Virtual Online Communities: A Study of Internet Based Community Interactions A dissertation presented to the faculty of the Scripps College of Communication of Ohio University In partial fulfillment of the requirements for the degree Doctor of Philosophy Adrian M. Budiman August 2008 This dissertation titled Virtual Communities Online: A Study of Internet Based Community Interactions by ADRIAN M. BUDIMAN has been approved for the School of Media Arts and Studies and the Scripps College of Communication by Drew McDaniel Professor of Telecommunications Gregory J. Shepherd Dean, Scripps College of Communication ii Abstract BUDIMAN, ADRIAN M., Ph.D., August 2008, Mass Communication Virtual Online Communities: A Study of Internet Based Community Interactions (167 pp.) Director of Dissertation: Drew McDaniel The aim of this research was to better understand virtual online communities (VOCs), that is, communities that are formed and maintained through the Internet. This research was guided by four research questions: What do participants in VOCs actually seek? How does a participant critically evaluate information produced in VOCs? What differences do VOC members perceive between their online community experiences compared to their experiences in real-life face-to-face communities? In what ways might a VOC shape its members’ views toward political and social change? The methodology employed was participant observation of 20 informants within their online and offline realms plus in-depth interviews with each informant. Interviews and observations were conducted from 2005 – 2007. This research identified two different types of VOCs: dependent and self- contained VOCs. Dependent VOCs act as extensions to already existent face-to-face communities while self-sustained VOCs are communities where relationships between members are formed, developed, and nurtured purely through virtual encounters on the Internet based on shared interests.
    [Show full text]
  • Parenting and Digital Media : from the Early Web to Contemporary Digital
    Research Publication Collection Faculty of Arts & Design 2016 Peer Reviewed Journal Article Citation: Lupton, D., Pedersen, S., and Thomas, G. M. (2016) Parenting and Digital Media: From the Early Web to Contemporary Digital Society. Sociology Compass, 10: 730–743. doi: 10.1111/soc4.12398 Find this item Copyright: ©2016 Wiley-Blackwell Version: This is the peer reviewed version of this article which has been published in final form in Sociology Compass at https://doi.org/10.1111/soc4.12398. This article may be used for non-commercial purposes in accordance with Wiley Terms and Conditions for Self-Archiving. Changes resulting from the publishing process may not be reflected in this document. Parenting and Digital Media: From the Early Web to Contemporary Digital Society Deborah Lupton, News & Media Research Centre, Faculty of Arts & Design, University of Canberra, Australia Sarah Pedersen, Department of Communication, Marketing and Media, Aberdeen Business School, Robert Gordon University, UK Gareth M Thomas, School of Social Sciences, Cardiff University, UK This is a post-print (accepted author’s version) of an article published in Sociology Compass (2016), 10(8), 730—743. Abstract Parents have accessed websites, online discussion forums and blogs for advice, information and support since the early days of the World Wide Web. In this article, we review the literature in sociology and related social research addressing the ways in which digital media have been used for parenting-related purposes. We begin with the longer-established media of parenting websites, online discussion forums, blogs, email, mobile phones and message and video services and then move on to the newer technologies of social media and apps.
    [Show full text]