Academic journal article T H E Journal (Technological Horizons In Education)

Editorial

Academic journal article T H E Journal (Technological Horizons In Education)

Editorial

Article excerpt

An analysis of threats can be overwhelming. Looking at the sources of threats from inside the institution versus outside the institution can assist in getting a grip on the problems, while also providing at least some sense of control. Sources of threats from inside the system theoretically have more opportunities to be affected, either with policies, tools or, more generally, by trying to affect the culture of the institution. Ribble and Bailey take a look at the notion of "digital citizenship" in their article "Monitoring Technology Misuse and Abuse" (Page 22). They provide a simple survey regarding common security problems, as well as advocate for an equal focus on effective and appropriate uses of technology.

The Politics of Security

Congress has been trying to protect children from online pornography for almost a decade. In February 1996, Congress enacted the Communications Decency Act (CDA) as a part of the Telecommunications Act of 1996. CDA was trying to protect minors from harmful material online by going after the Internet transmission of indecent materials to children. CDA was ruled an unconstitutional intrusion on the Internet by a unanimous ruling from the Supreme Court in 1997. In this ruling, the Internet was called a "unique and wholly new medium of worldwide human communication" that deserved First Amendment protection.

Congress tried again to provide security in October 1998 when it passed, and former President Clinton signed, COPA, which provides criminal penalties for any commercial distribution of material harmful to minors. …

Search by... Author
Show... All Results Primary Sources Peer-reviewed

Oops!

An unknown error has occurred. Please click the button below to reload the page. If the problem persists, please try again in a little while.