تعداد نشریات | 161 |
تعداد شمارهها | 6,532 |
تعداد مقالات | 70,501 |
تعداد مشاهده مقاله | 124,101,242 |
تعداد دریافت فایل اصل مقاله | 97,207,981 |
نظام حقوقی حاکم بر فیلترینگ اینترنت در ایالات متحده آمریکا | ||
فصلنامه مطالعات حقوق عمومی دانشگاه تهران | ||
مقاله 20، دوره 50، شماره 4، دی 1399، صفحه 1663-1681 اصل مقاله (652.71 K) | ||
نوع مقاله: علمی-پژوهشی | ||
شناسه دیجیتال (DOI): 10.22059/jplsq.2018.252537.1675 | ||
نویسندگان | ||
سعید رستمعلی زاده* 1؛ حامد حاجی ملا میرزایی2 | ||
1کارشناسی ارشد رشتة حقوق تجارت بینالملل، دانشگاه شهید بهشتی، تهران، ایران | ||
2دانشیار، دانشکده مدیریت دانشگاه تهران، تهران، ایران | ||
چکیده | ||
فیلترینگ اینترنت در آمریکا در واقع حذف یا مسدود کردن دسترسی به اطلاعات منتشرشده یا قابل مشاهده از طریق اینترنت داخل خاک این کشور است. حمایت شدید از آزادی بیان و عقیده در مقابل فیلترینگ، ریشه در اصلاحیة اول قانون اساسی این کشور دارد. این حمایتها به محیط اینترنت نیز گسترش یافته و در نتیجه کشور قوانین کمتری را برای محدود کردن دسترسی افراد به محتوای موجود در اینترنت وضع کرده است. با وجود این اینترنت در ایالات متحده بهشدت قواعدگذاری شده و از طریق مکانیسمهای مختلفی اداره میشود. بعد از دو دهه بحث و بررسی در مورد قانونگذاری محتوای اینترنتی، کشور هنوز از دستیابی به اتفاق نظر حقوقی در مورد محدودیتهای آزادی بیان و کنترل فعالیتهای غیرقانونی در فضای اینترنتی به دور است. با وجود این مهمترین موارد حمایتشده مربوط به پورنوگرافی کودکان، قماربازی و حمایت از مالکیتهای فکری و امنیت فضای مجازی است. | ||
کلیدواژهها | ||
اینترنت؛ ایالات متحدة آمریکا؛ پورنوگرافی کودکان؛ فیلترینگ؛ قوانین و مقررات | ||
مراجع | ||
انگلیسی A) Books 1. Deibert, Ronald; Palfrey, John; Rohozinski, Rafal & Zittrain, Jonathan (2008), Access Denied: The Practice and Policy of Global Internet Filtering, Published by MIT Press 2. G. Staples, William (2007), Encyclopedia of Privacy: Vol. 1, A-M, Published by Greenwood Press, First Pub. 3. L. Postmus, Judy (2013), Sexual Violence and Abuse: An Encyclopedia of Prevention, Impacts, and Recovery, Published by ABC-CLIO. 4. Kumar Das, Jatindra (2015), Law of Copyright, published by PHI Learning Private Limited. 5. L. Rustad, Michael (2014), Global Internet Law, Pub. by LEG Inc. d/b/a West Academic.
B) Articles 6. Brown, Ian (2008), “Internet Censorship: Be Careful What You Ask for”, University of Oxford, Oxford Internet Institute, Working Paper series. 7. Fox, Susannah & Rainey, Lee, (2014), The Web at 25 in the U.S.: The overall verdict: The internet has been a plus for society and an especially good thing for individual users, Pew Research Center’s Internet and American life Project 8. J. Garber, Danielle (2002), “COPPA: Protecting Children 's Personal Information on the Internet”, Journal of Law and Policy, Vol. 10, Issue 1. 9. J. Larose, Cynthia & M. Siripurapu, Julia, (2013), “Guide to Compliance with the Amended Children’s Online Privacy Protection Act (COPPA) Rule”, The National Law Review. 10. M. Evans, Tonya (2013), “Safe Harbor for the Innocent Infringer in the Digital Age, University of New Hampshire Scholars' Repository”, Willamette Law Review, Vol. 50, Issue 1. 11. M. Overaa, Jennifer (2014), “Website Blocked: Filtering Technology in Schools and School Libraries”, SLIS Student Research Journal, Vol. 4, Issue 2. 12. P. Rainey, Brandon (2009), “Unlawful Internet Gambling Enforcement Act of 2006: Legislative Problems and Solutions”, Journal of Legislation, Vol. 35, Issue 2. 13. PEN America (2015), “Global Chilling: The Impact of Mass Surveillance on International Writers”, PEN American Center. 14. Rodden, Kelly (2003), “The Children 's Internet Protection Act in Public Schools: The Government Stepping on Parents' Toes?”, Fordham Law Review, Vol. 71, Issue 5.
C) Websites 15. Ball, James & Schneier, Bruce & Greenwald, Glenn, (2013), NSA and GCHQ Target Tor Network that Protects Anonymity of Web Users, the Guardian, Available at: http://www.theguardian.com/world/2013/oct/04/nsa-gchq-attack-tor-network-encryption, Last Visited: 2018-01-27 16. Bisto, Cobstance & Fourie, Ina & Bothma, Theo, (2012), Trends in Transition from Classical Censorship to Internet Censorship: Selected Country Overviews, Available at: http://www.ifla.org/files/assets/faife/publications/spotlights/1%20Bitso_Fourie_BothmaTrendsInTransiton.pdf, Last visited: 2018-01-27 17. Communications Decency Act, (1996), Enacted by the U.S. Congress on February 1, 1996, Available at: http://groups.csail.mit.edu/mac/classes/ 6.805/articles/cda/cda-final.html, Last Visited: 2018-01-27 18. Cope, Sophia, (2016), House Advances Email Privacy Act, Setting the Stage for Vital Privacy Reform, Electronic Frontier Foundation (EFF), Available at: https://www.eff.org/deeplinks/2016/04/house-advances-email-privacy-act-setting-stage-vital-privacy-reform, Last Visited: 2018-01-14 19. M. Cole, Agatha, (2012), ICE Domain Name Seizures Threaten Due Process and First Amendment Rights, American Civil Liberties Union, Available at: https://www.aclu.org/blog/ice-domain-name-seizures-threaten-due-process-and-first-amendment-rights, Last Visited: 2018-01-27 20. Electronic Frontier Foundation, (2013), Computer Fraud and Abuse Act Reform, Available at: https://www.eff.org/issues/cfaa, Last Visited: 2018-01-27 21. Federal Communications Commission, (2014), Warning: Jammer Use by the Public and Local Law Enforcement Is Illegal, Available at: https://www.fcc.gov/document/warning-jammer-use-public-and-local-law-enforcement-illegal, Last visited: 2018-01-03 22. Freedom House, (2014), Freedom on the Net 2014: United States, Available at: https://freedomhouse.org/sites/default/files/resources/United%20States.pdf, Last Visited: 2018-01-27 23. Freedom House, (2015), Freedom on the Net 2015: United States, Available at: https://freedomhouse.org/sites/default/files/resources/FOTN%202015_United%20States_0.pdf, Last Visited: 2018-01-27 24. Freedom House, (2016), Freedom on the Net 2016: United States, Available at: https://freedomhouse.org/sites/default/files/FOTN%202016%20United%20States.pdf, Last Visited: 2018-01-27 25. Freedom House, (2017), Freedom on the Net 2017: United States, Available at: https://freedomhouse.org/sites/default/files/FOTN%202017_United%20States.pdf, Last Visited: 2018-01-27 26. Griffin, Jonathan, (2013), Legislation Regarding Internet Gambling or Lotteries, National Conference of State Legislatures, Available at: http://www.ncsl.org/research/financial-services-and commerce/2013onlinegaminglegislation.aspx, Last Visited: 2018-01-27 27. Greenwald, Glenn, (2013), NSA Collecting Phone Records of Millions of Verizon Customers Daily, The Guardian, Available at: http://www.guardian.co.uk/world/2013/jun/06/nsa-phone-records-verizon-court-order, Last Visited: 2018-01-27 28. Lendman, Stephen, (2009), Internet Threatened by Censorship, Secret Surveillance, and Cybersecurity Laws, Global Research, Available at: https://www.globalresearch.ca/internet-threatened-by-censorship-secret-surveillance-and-cybersecurity-laws/13706, Last Visited: 2018-01-18 29. Liptak. Adam, (2007), Verizon Blocks Messages of Abortion Rights Group, New York Times, Available at: http://www.nytimes.com/2007 /09/27/us/27verizon.html, Last Visited:2018-01-25 30. Lausson, Julien, (2012), Loppsi : le décret sur le blocage des sites sans juge est abandonné, Numerama, Available at : www.numerama.com/magazine/23260-loppsi-le-decret-sur-le-blocage-des-sites-sans-juge-est-abandonne.html, Dernière Visite: 2018-01-27 31. National Conference of State Legislatives (NCSL), (2018), "Children and the Internet: Laws Relating to Filtering, Blocking and Usage Policies in Schools and Libraries", National Conference of State Legislatures, Available at: http://www.ncsl.org/research/telecommunications-and-information-technology/state-internet-filtering-laws.aspx, Last Visited: 2018-11-24 32. OECD Broadband Statistics, (2013), OECD Fixed (Wired) Broadband Subscriptions per 100 Inhabitants, by Technology, and “OECD Terrestrial Mobile Wireless Broadband Subscriptions per 100 Inhabitants, (2013), by Technology, Available at: http://www.oecd.org/internet/ieconomy/1d-OECD-WiredWirelessBB-2013-06-(updatedSept2014).xls, Last Visited: 2018-01-27 33. Open Net Initiative, (2010), "ONI Regional Overview: North America", Available at: https://opennet.net/research/regions/namerica, Last visited: 2018-01-27 34. Reitman, Rainey, (2015), The New USA Freedom Act: A Step in the Right Direction, but More Must Be Done, Electronic Frontier Foundation (EFF), Available at: https://www.eff.org/deeplinks/2015/04/new-usa-freedom-act-step-right-direction-more-must-be-done, Last Visited: 2018-01-14 35. Reporters sans Frontières, (2012), Internet Enemies Report 2012, Available at: https://rsf.org/sites/default/files/rapport-internet2012_ang.pdf, Last Visited: 2018-01-27 36. Sutton, Maira, (2014), Copyright Law as a Tool for State Censorship of the Internet, Electronic Frontier Foundation (EFF), Available at: https://www.eff.org/deeplinks/2014/12/copyright-law-tool-state-internet-censorship, Last Visited: 2018-01-23 37. The White House Office of the Press Secretary, (2011), Administration Releases Strategy to Protect Online Consumers and Support Innovation and Fact Sheet on National Strategy for Trusted Identities in Cyberspace, Available at: https://obamawhitehouse.archives.gov/the-press-office/2011/04/15/administration-releases-strategy-protect-online-consumers-and-support-in, Last Visited: 2018-01-03 38. USA Patriot Act, Available at: http://www.gpo.gov/fdsys/pkg/PLAW-107publ56/pdf/PLAW-107publ56.pdf, Last Visited: 2018-01-27 | ||
آمار تعداد مشاهده مقاله: 2,979 تعداد دریافت فایل اصل مقاله: 1,032 |