Descriptor
Computer Software | 4 |
Freedom of Speech | 4 |
Internet | 3 |
Government Role | 2 |
Access to Information | 1 |
Algorithms | 1 |
Censorship | 1 |
Civil Liberties | 1 |
Coding | 1 |
Computer Networks | 1 |
Constitutional Law | 1 |
More ▼ |
Publication Type
Journal Articles | 4 |
Reports - Descriptive | 4 |
Opinion Papers | 1 |
Education Level
Audience
Location
Texas | 1 |
Laws, Policies, & Programs
First Amendment | 1 |
Assessments and Surveys
What Works Clearinghouse Rating

McMurdo, George – Journal of Information Science, 1997
Discusses the control of pornography on the Internet. Highlights include the Communications Decency Act (CDA); "Time" magazine's article on cyberporn and critiques of it; the unconstitutionality of the CDA under First Amendment protection of free speech; and non-legislative software solutions, including PICS (Platform for Internet…
Descriptors: Computer Software, Constitutional Law, Criticism, Federal Legislation
Newcombe, Pat – American Libraries, 1999
Considers issues involving deregulation and freedom of speech on the Internet versus government regulation and licensing. Discusses a case in Texas that challenged a software program offering legal advice; and a federal regulatory agency's attempt to regulate the opinions and content of newsletters, Web site publishers, and related software. (LRW)
Descriptors: Computer Software, Court Litigation, Electronic Publishing, Freedom of Information
Baule, Steve; Thompson, Rod – Book Report, 1998
Discussion of free speech on the Internet focuses on three basic options open to schools trying to resolve the dilemma of protecting children while preserving intellectual freedom: commercial censorware, blocking, and filtering. Concludes that adult supervision is still the most effective means of regulating access to the Internet. (LRW)
Descriptors: Access to Information, Censorship, Computer Software, Elementary Secondary Education

Diamond, Ted – Internet Research, 1994
The federal Escrowed Encryption Standard (EES) has been opposed by civil liberties advocates and the computer industry. The author argues that the standard does not threaten privacy as long as its use remains voluntary, alternative forms of encryption are allowed, and the power of government to intercept transmission is kept in check. (20…
Descriptors: Algorithms, Civil Liberties, Coding, Computer Networks