Electronic Speech

Seth Finkelstein, Consulting Programmer, SethF.com

Introduction

Social Signal Processing

Commons Models

Moderator Models

Distributed Models

Power Laws

Inequality and Public Policy

Speech-Restricting Architectures

Private Blacklists

Government Blacklists

Government Classification Bureaus Applied to the Internet

Third-Party Sites

Speech-Restriction Theories: Control Rights Versus Toxic Material

Unintended Consequences

Search Engine

E-mail Embarrassment

Spam

Conclusion

Glossary

Cross References

References

INTRODUCTION

The Internet is fundamentally a mechanism for communication. By lowering the costs of copying and distributing information, it created a revolution in electronic speech. That in turn led to a host of issues stemming from the new methods of reaching an audience. Suddenly, old equilibriums and economics between speaker and listener were disrupted. One famous aphorism stated, “The Net interprets censorship as damage, and routes around it.” This was then rebutted by the question, “What if censorship is in the router?”

The conflict between social and technological constraints is a key part of the evolution of electronic speech. It is conceivable that speakers and listeners could route around censorship laws by using various electronic networks. However, a router, a device that connects different networks (facilitating speech), may contain within it technological censorship programs that do not permit certain types of speech to either be made or received. ...

Get Handbook of Information Security: Information Warfare, Social, Legal, and International Issues and Security Foundations, Volume 2 now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.