AFTER COMPLETING THIS CHAPTER, YOU WILL BE ABLE TO:
Summarize what is being done to help the technological underclass gain access to the Internet.
Understand how the Internet threatens your right to privacy, and know what you can do about that.
Take steps to avoid being stalked on the Internet.
Exercise the appropriate security measures to protect the privacy of your information on the Internet.
Understand why protectionists seek to censor certain kinds of material on the Internet.
Realize how much Internet traffic is pornographic or obscene, and consider who should have access to such material.
Reflect on the impact of the evil side of technology that is being used to spread electronic hate on the Internet.
Understand the concept of copyright and fair use in cyberspace, and realize how important it is to exercise your right of fair use of electronic resources.
Define the purpose of a patent and list examples of how some technology companies have abused the patent system.
Define peer-to-peer (P2P) file sharing and understand the ethical and legal issues involved in P2P sharing of music and video via the Internet.
INTERNET LITERACY RESOURCES:

 Equity, Cost, and Universal Access
 

Universal Access has certain costs and timelines associated with it. Based on the links below, what evidence do you see that we are already approaching this goal? What actions do you think should be taken regarding the Digital Divide?


Universal Service Fund

A Nation Online: How Americans Are Expanding Their Use Of The Internet (2002)

Falling Through the Net, Toward Digital Inclusion (2000)

Pew Internet and American Life Project
NetDay


The Petition

New Networks Press Release

New Networks Institute




Privacy
 

Many people believe that the Internet is threatening privacy. Which of the groups and safeguards below do you think hold out a promise of protecting individual privacy?


Internet Fraud Complaint Center
Internet Fraud Complaint Center

CPSR
Computer Professionals for Social Responsibility
 
About.com's Carnivore site
Center for Democracy and Technology
PGP PGPfone
Cookie Central logo

How Internet Cookies Work
from HowStuffWorks.com

Washington Post: Bugs that Go Through Computer Screens

Web Bug FAQ


SpywareGuide

BulletProofSoft

Lavasoft Ad-aware


All About Phishing

Anti-Phishing Working Group


TrustE

Trust in the Wired Americas
A report from Cheskin Research


COPA Commission



Coverage of Internet Privacy

W3C Platform for Privacy Preferences
Copyright © W3C® 1994-2002 (MIT, NRIA, Keio). All Rights Reserved.



EFF logoNational ID Card Action Alert

EPIC


^Top


Sleuthing
 

After you visit this site, what surprises did you have in the types of data that are readily accessible to searchers?



Discreet Data Research


Stalking
 

Cyberstalking is another fear of many potential Internet users. Do these sites hold out hope of avoiding this or do they make you even more wary?


cyberangels.org

CyberAngels

1999 Report on Cyberstalking from the US Department of Justice

Yahoo's Index of Cyberstalking Information



Security
 

Which of these means of increasing security have you already tried? Do you think the cost is worth the value you place on security?


Encryption

How Firewalls Work

Why You Need a Firewall

     

Internet Firewalls

Home PC Firewall Guide

Server Side


Microsoft Internet Security and Acceleration Server
Client Side
Get NetWise: Tools for Families
CyberSitter

Children's Internet Protection Act (Full Text)

National Regional Information Center Summary: Children's Internet Protection Act

American Library Association’s CIPA Web Site

CERT Home page

CERT Home Computer Security Guide

CERT Home Network Security Guide

Security of the Internet


Nationalism and Isolationism
 

Is it really possible to remain isolated in a world that is so thoroughly connected via the Internet?








Censorship
 

There is an ongoing debate as to how and whether to censor content on the Internet. Did the information here help you develop an informed decision on how to handle this issue?


CDT Logo An Overview of the Communications Decency Act (CDA)
^Top

Pornography and Obscenity

 

The Internet Content Rating Association's system, which replaced the RASCi system, is a voluntary means of decreasing pornography and obscenity on the Net. What do you think of their approach?

ICRA


Prejudice and Hatred
 

These sites chronicle the work of several groups to decrease the prejudice and hatred that some spread using the Internet. Which of their efforts seems likely to help this problem?


Anti-Defamation League

Hate Filter Civil Rights.org

Chat Room Decency in MOOs, MUDs, IRCs, and MUSHes
 





After looking over the SafeKids site, do you think these rules and guidelines will help children remain safer online?

SafeKids.com


NetSmartz


Copyright & Fair Use
 

With so much content on the Web, the problems of fair use and copyright are constantly before us. Do you think the new rules and approaches, such as the Digital Millenium Copyright Act, will help protect intellectual property? What effect will peer-to-peer file sharing have on future production of music or books?




US Copyright Office
A Visit to Copyright Bay
CCUMC Fair Use Guidelines for Educational Multimedia Fair Use Guidelines for
Educational Multimedia




WIPO Treaty World Intellectual Property Organization (WIPO) Treaty

TEACH Act Primer

TEACH Act: Bill Summary & Status from Thomas.loc.gov


Patents
 

What rights should corporations have to profit from the inventions and discoveries they finance? What should belong to the public at large?



Blackberry


Peer-to-Peer File Sharing
 
What is your stand on peer-to-peer file sharing? How far should the broadcasters and entertainment industry be able to go to block sharing?

Yahoo! Directory of
Peer-to-Peer File Sharing Communities and Networks

Napster

GNUtella


EFF "Intellectual Property - Peer-to-Peer (P2P) File Sharing" Archive

CDT: The Broadcast Flag: an Introduction

CDT: The Broadcast Flag Primer

EFF: The Broadcast Flag and "Plug & Play": The FCC's Lockdown of Digital Television


Case Study -- Privacy Statements
 

These links will help you complete the case study for this chapter.


Internet.com

Lehigh University

       

CNN

U.S. News

OECD Privacy Statement Generator

Virginia Tech Privacy Statement Generator

W3C's recommended privacy statement generators


-

^Top

Home/\

>

Previous Chapter

Summary of this Chapter

Table of Contents

Next Chapter


Book Cover This page is part of the Internet Literacy Web site.
FIND OUT MORE
about Internet Literacy, the new book by Fred T. Hofstetter
published by Irwin/McGraw-Hill

Copyright © 2005 by the University of Delaware. All rights reserved.
Site design and development by Pat Sine.
Please send all comments to Pat Sine: sine@udel.edu