scholarly journals Internet filters in Canadian libraries

Author(s):  
Kate Schulz

Internet filters can be understood as any method that “[blocks] content [from] coming into and going out to the Internet” (PC Magazine, n.d., para. 1). Instantaneously, the word ‘blocks’ causes advocates of intellectual freedom to stand at attention. The American Library Association’s (ALA) Library Bill of Rights states: “a person’s right to use a library should not be denied or abridged because of origin, age, background, or views” (as cited in Houghton-Jan, 2010, p. 40). More specific to the topic at hand: “the use of Internet filters to block constitutionally protected speech … compromises First Amendment freedoms and the core values of librarianship” (ALA, n.d., para. 1). This paper will investigate and discuss the function of and methodology behind internet filters, with specific attention to their application in Canada. Following a general overview, a discussion follows of what library professionals in public and school libraries should do to uphold and protect intellectual freedom.

1994 ◽  
Vol 8 (1) ◽  
pp. 116-118
Author(s):  
Marjorie Rosenthal

The issue of intellectual freedom and its maintenance under the onslaught of those whose personal priorities and agendas dictate the censorship of library materials, is not one that is confined to any one type of institution. Challenges to textbooks and library books have increased alarmingly in the last few years in public and private, religious as well as secular, schools and libraries in our society to the point where librarians must question the possibility of controversy in titles on the Holocaust, along with the more traditional confrontations over sex and witchcraft. What is the psychology behind this insidious trend? What can one do when one's library materials are challenged either by members of the community or by administrators? Who can one call upon for help? Most important, how can this problem be avoided altogether, or defused when it does occur? This paper contains the answers to all of these questions. In addition, it suggests how to actually begin writing a policy for materials selection which contains the mechanisms for dealing with attacks on our First Amendment freedoms.


2017 ◽  
Author(s):  
Susan Nevelow Mart

[first paragraph] "In questions of power, then, let no more be heard of confidence in man, but bind him down from mischief by the chains of the Constitution."The forms of legal process authorized by the USA PATRIOT Act, as they apply to library patron information, implicate both First Amendment and Fourth Amendment values. Seizing evidence of what a person is thinking about by looking at what he or she is reading or perusing on the Internet is inimical to both of these tenets of the Bill of Rights. Librarians have been among the strongest critics of the USA PATRIOT Act's incursions into this realm of intellectual freedom. And the government has heaped scorn on librarians for their opposition. But librarians do not oppose law enforcement's legitimate efforts to fight terrorism through the use of legal process in libraries; what librarians oppose is government fishing expeditions directed at the content of what people read or access in the library. There is a balance that can easily be maintained between law enforcement's access to library records and the protection of library patrons' civil liberties. The USA PATRIOT Act upsets that balance.


2005 ◽  
Vol 25 ◽  
pp. 345-371
Author(s):  
Beau Breslin

This article addresses the central constitutional questions surrounding the debate over regulating speech that includes educational designs for bomb making. The aim of the article is to provide an additional, and in many ways, alternative justification for broad constitutional protection based on the core principles of free speech itself, and on the Court’s historical treatment of differing subject matter. I argue that in addition to the more traditional First Amendment rules of over breadth and vagueness, it is also important to consider the judiciary’s evaluation of the content of speech itself when drawing conclusions about the constitutionality of legislation suppressing designs for the construction of violent material. Unlike unprotected speech, expression that includes designs for constructing explosives warrants constitutional protection because it belongs most closely to a category of speech-namely, scientific speech-that has traditionally been afforded protection.


2018 ◽  
pp. 547
Author(s):  
Tim Wu

The First Amendment was brought to life in a period, the twentieth century, when the political speech environment was markedly different than today’s. With respect to any given issue, speech was scarce and limited to a few newspapers, pamphlets or magazines. The law was embedded, therefore, with the presumption that the greatest threat to free speech was direct punishment of speakers by government. Today, in the internet and social media age, it is no longer speech that is scarce—rather, it is the attention of listeners. And those who seek to control speech use new methods that rely on the weaponization of speech itself, such as the deployment of “troll armies,” the fabrication of news, or “flooding” tactics. This Essay identifies the core assumptions that proceeded from the founding era of First Amendment jurisprudence, argues that many of those assumptions no longer hold, and details the new techniques of speech control that are used by governmental and nongovernmental actors to censor and degrade speech. It concludes by arguing that protection of free speech may now depend on law enforcement recognizing its role in the protection of the American speech environment.


2019 ◽  
Vol 2 (55) ◽  
pp. 592
Author(s):  
Paulo Gustavo Gonet BRANCO ◽  
Pedro Henrique de Moura Gonet BRANCO

ABSTRACTThe article addresses the peculiarities and complexities of the cyberspace regulation, acknowledging, but not endorsing, the utopic ideal of the cyberspace as a no-law virtual territory. It explores the variety of means of regulating people interconnections around the Globe through the Internet. It points up the need of due heteronomous protection of interests and claims linked to the core proposes of the Internet itself, such as those deriving from the freedom of expression and concerns with the right to privacy. The article takes as standing point Lawrence Lessig’s pathetic dot theory about the four forces that design the use of Internet potentialities. It then focuses on the Brazilian current basic cyberspace normative framework and refers it to Lessig’s theory, mentioning challenges yet to be met. It intends to share the Brazilian experience with the large English speaking auditory, pointing out how Brazilian legal framework relates to mainstream academic approach to Internet regulatory issues. KEYWORDS: Cyberspace Regulation; Internet; Pathetic Dot. RESUMOO artigo examina as peculiaridades e complexidades da regulação do cyberspace, aludindo ao ideal utópico desse espaço como um território virtual plenamente autônomo, mas não endossando essa postura. Explora a variedade dos meios de regulação das interconexões que a Internet propicia em todo o mundo. Assinala a necessidade de que interesses intimamente vinculados aos propósitos mesmos da Internet, como a liberdade de expressão e inquietações com direito a privacidade, sejam devidamente regulados de modo heterônomo. O artigo parte da teoria pathetic dot de Lawrence Lessig sobre as quatro forças que conformam o uso das potencialidades da Internet. Em seguida enfoca a estrutura normativa básica brasileira, referindo-a à teoria de Lessig e mencionando desafios ainda a serem enfrentados. O artigo intenta compartilhar a experiência brasileira com o mais largo auditório do público que se comunica em inglês, apontando como a estrutura normativa brasileira se relaciona com as mais modernas e importantes contribuições acadêmicas sobre regulação da Internet. PALAVRAS-CHAVE: Regulação do Cyberspace; Internet; pathetic dot.


Author(s):  
Aleksey V. Kutuzov

The article substantiates the need to use Internet monitoring as a priority source of information in countering extremism. Various approaches to understanding the defi nition of the category of «operational search», «law enforcement» monitoring of the Internet are analysed, the theoretical development of the implementation of this category in the science of operational search is investigated. The goals and subjects of law enforcement monitoring are identifi ed. The main attention is paid to the legal basis for the use of Internet monitoring in the detection and investigation of extremist crimes. In the course of the study hermeneutic, formal-logical, logical-legal and comparative-legal methods were employed, which were used both individually and collectively in the analysis of legal norms, achievements of science and practice, and development of proposals to refi ne the conduct of operational-search measures on the Internet when solving extremist crimes. The author’s defi nition of «operational-search monitoring» of the Internet is provided. Proposals have been made to improve the activities of police units when conducting monitoring of the Internet in the context of the search for relevant information to the disclosure and investigation of crimes of that category.


Author(s):  
Patrícia Rossini ◽  
Jennifer Stromer-Galley

Political conversation is at the heart of democratic societies, and it is an important precursor of political engagement. As society has become intertwined with the communication infrastructure of the Internet, we need to understand its uses and the implications of those uses for democracy. This chapter provides an overview of the core topics of scholarly concern around online citizen deliberation, focusing on three key areas of research: the standards of quality of communication and the normative stance on citizen deliberation online; the impact and importance of digital platforms in structuring political talk; and the differences between formal and informal political talk spaces. After providing a critical review of these three major areas of research, we outline directions for future research on online citizen deliberation.


Author(s):  
Deborah Hicks

Leadership is a topic of growing interest to librarians. Its importance is highlighted in its addition to the American Library Association’s Core Competences of Librarianship. Using discourse analysis and insider interviews, this paper explores the discourse of leadership surrounding the development of the Core Competences and its impact on LIS education.Le leadership est un sujet d’intérêt croissant pour les bibliothécaires comme l’en témoigne son ajout aux compétences de bases en bibliothéconomie de l’American Library Association. Cette communication explore à l’aide d’une analyse du discours et d’entrevues internes comment s’articule la notion de leadership dans le développement des compétences de base et son impact sur dans les programmes d’enseignement dans le domaine. 


2020 ◽  
Vol 4 (1) ◽  
pp. 58-74
Author(s):  
Hannah Edlund

AbstractDrawing on and expanding previous graduate course research, this paper investigated and analyzed public libraries’ policies regarding patron use of legal, visual Internet pornography on public computers. Pornographic imagery that falls within legal boundaries is protected by the First Amendment. Incidents of, and library responses to, pornography viewing are not a new issue and have caused turmoil across the field of library and information science. In an attempt to understand the problem, the research question asks: how do public libraries respond to patrons viewing legal Internet pornography, while upholding First Amendment rights as well as the Children’s Internet Protection Act (CIPA) and other legal requirements? Libraries tread a fine line to protect First Amendment rights, respect community laws, and uphold CIPA. Research indicated that responding to Internet pornography use in public libraries is heavily dependent on individual, community and library values. Policies are more likely to prohibit patrons from accessing Internet pornography, and most libraries have at least some Internet filtering software restricting what content may be accessed on public use computers. However, evidence also suggests that regardless of policy or filters, library staff will at some point encounter a patron accessing Internet pornography.


2020 ◽  
Vol 4 (1) ◽  
pp. 1-10
Author(s):  
Emily J. M. Knox

AbstractOver the past few years, tensions between two core values in U.S. librarianship, intellectual freedom and social justice, have roiled the profession. This conflict was most recently seen in the insertion and subsequent removal of “hate groups” to the list of entities that cannot be denied access to library meeting rooms in the American Library Association’s Meeting Rooms Interpretation of the Library Bill of Rights. This paper is intended to provide context for this conflict. It begins by situating its arguments within ethical philosophy, specifically the study of values or axiology. It then provides an overview of the theoretical foundations of the values of liberalism. Next, the paper discusses the values of truth and freedom from harm in librarianship. Finally, it suggests that a fuller understanding of the library’s place within the public sphere is a possible model for mitigating the tensions currently found in American librarianship. The paper is intended to provide a theoretical foundation for further research.


Sign in / Sign up

Export Citation Format

Share Document