Professional Documents
Culture Documents
Project Guide Internet Dilemmas Unit 2 Lesson 7 PDF
Project Guide Internet Dilemmas Unit 2 Lesson 7 PDF
Background: Internet users love Background: While the Internet is Background: While technology is
services like streaming movies, used to share many useful services increasingly integrated into daily life,
video chatting, or online gaming. All and information, there are growing there are still many who lack access
of this content needs to travel over concerns about the way that the to the Internet or digital technology.
the Internet, however, and the Internet can be used to spread In rural areas there are challenges
companies that build and maintain damaging information ranging building networks to connect
networks are complaining about the from national secrets to calls for geographically sparse populations,
increased demands being placed on violence. Censoring this but even in cities some groups or
their networks. Your candidate is information may provide some areas have relatively less access to
hearing more and more about a people with increased security, but the Internet or knowledge of how to
debate called “net neutrality” and potentially risks free speech and use it. Your candidate is worried that
would like a more informed opinion the safety of social and political while technology is bringing social
as part of her platform. activists. Your candidate would like and economic benefits to many,
to have a policy that balances these there are others being left behind.
two concerns in a way that makes
sense for our digital age.
Make a policy increasing safety from
damaging info while allowing social
and political activists to have free
speech and safety.
Core Question: When and how Core Question: When and how Core Question: When and how
should internet service providers be should the government be allowed to should resources be invested to
allowed to treat some kinds of censor or block internet traffic, if at close gaps between those who do
internet traffic different from others? all? and don’t use the Internet?
This study source was downloaded by 100000851756026 from CourseHero.com on 09-04-2022 21:55:08 GMT -05:00
https://www.coursehero.com/file/88395259/Project-Guide-Internet-Dilemmas-Unit-2-Lesson-7pdf/
Unit 2 Lesson 7
Protocols / Layers Networks Packets and World Wide Web Internet Principles
Physical internet, IP, Fiber optic cable, Routing Web pages, Redundancy, fault
TCP, UDP, HTTP, copper wire, wifi, Packet metadata, IP browsers, servers, tolerance, scalability,
DNS router, path, direct addresses, dynamic domain, world wide open protocols
connection, routing, web
bandwidth
● "Free Speech ● can be threatened through social ● Hate speech is generally protected
Or Hate media like twitter and instagram. under constitution
Speech: ● Hateful antisemtiic rants ● The problem is the hate not the
When Does ● People threatening and hating online platform
Online Hate often put the people physically in ● Controversy of who is labeled as a
Speech danger as well (ex. explosive devices hate group
Become A or shootings). ● Private social media companies like
● Impacted groups are often facebook and twitter can do whatever
Real Threat?"
misinformed by the over emotional they want.
(audio article):
people commenting
link
● Who is talking to whom and what are ● Censors take steps to stop info from
● "Internet they talking about? being spread that shouldn’t be
Censorship ● Uses get info from publishers ● Application layer blocking: keywords
Explained" ● Anonymity makes users untraceable are detected the communication will
(video): link ● This process works to protect users be disrupted
before bad information spreads ● DNS Sinkholing: Sensors can block
● The more users on internet, the users connection at many points
harder it is to sensor more and more saying “domain does not exist” or
info “unsafe content”
This study source was downloaded by 100000851756026 from CourseHero.com on 09-04-2022 21:55:08 GMT -05:00
Computer Science Principles 2
https://www.coursehero.com/file/88395259/Project-Guide-Internet-Dilemmas-Unit-2-Lesson-7pdf/
Unit 2 Lesson 7
● Google was removed from China due ● Most of what is censored around the
“Censoring the to extreme amounts of censorship world is to block propaganda against
Internet ”Link ● Everyone around the world is the state
connected through the internet so the ● GDPR (General Data Protection
laws of one country will affect the Regulation): sets guidelines for
internet in another collection and processing of personal
● Censorship is also specific to information
individual households ● Kid versions of websites to pre-censor
● ACLU (American Civil Liberties Union) content ex: youtube kids
advocate prevention of censorship ● VPNs are used to extend privacy and
accessibility
Core Question
When and how should the government be allowed to censor or block internet traffic, if at all?
Impacted Groups
Fill in the table below with your Impacted Groups. You may optionally add new groups or split one of the ones assigned
into smaller subgroups if it will help better explain who’s involved in the dilemma.
Group 1: Everyday Internet users / anyone who goes ● Interests: To access search engines, connect
on their phone or computer, most of the population with others, browse social media, shop ect.
● Benefit: Secure rights for freedom of speech
and expression, censoring inappropriate or
sensitive content
● Harmed: Not always able to access content,
social media accounts can be banned or taken
down
Group 2: Intelligence agencies / Government based ● Gather military or political info for national
groups ex: FBI and CIA security purposes
● Benefit: Protect country from domestic and
international threats without panic from the
public
● Harmed: Must respect freedom of speech and
expression with still protecting the country
Group 3: Political Activists / Social Media accounts ● Educate people of specific causes, solve global
created with the intent to reform the government and and national political issues and gain
change political policies supporters
This study source was downloaded by 100000851756026 from CourseHero.com on 09-04-2022 21:55:08 GMT -05:00
Computer Science Principles 3
https://www.coursehero.com/file/88395259/Project-Guide-Internet-Dilemmas-Unit-2-Lesson-7pdf/
Unit 2 Lesson 7
Technical Background
Explain the technical background necessary to understand the problem. Include:
● Background on layers / protocols / principles of the Internet necessary to understand the dilemma
○ Search engines need to have application layer blocking,
○ DNS sinkholes can be used to prevent access to inappropriate content,
● Use the concept bank on the first page to help brainstorm ideas to include. A strong description will reference
several of these concepts
○ Deplatformizing can be used to censor certain individuals who infringe on the safety of the state with
their posts like hate speech or national threats
○ Direct Connection: keeps social and political activists safe through preventing intercepted connection
● Make sure your descriptions are approachable for your candidate(political activist), who does not have as
strong of a background in the way the Internet works ✓
Recommended Policy: Social Media sites must pre-screen posts for keywords and phrases that are
inappropriate or threaten national security, if posts do not pass the screen they must be edited and sent
back to be screened again before publication. In addition if there are accounts that posts are rejected more
than 15 times in 1 week they will be sent to the authorities for further investigation for possible illegal
activity.
The types of posts that will be rejected are ones with words or phrases that encourage or justify terrorism,
along with posts that have to do with enouraging or justifying illegal activities.
This study source was downloaded by 100000851756026 from CourseHero.com on 09-04-2022 21:55:08 GMT -05:00
Computer Science Principles 4
https://www.coursehero.com/file/88395259/Project-Guide-Internet-Dilemmas-Unit-2-Lesson-7pdf/
Unit 2 Lesson 7
Completed research Research guide All three provided Only one or two No evidence that
guide demonstrates use indicates sources are sources were sources were used
of multiple sources referencing three or referenced referenced
more sources.
provided are
referenced
Interests, benefits, and Interests, benefits, Interests, benefits, Interests, benefits, No description of
harms of all impacted and harms for all and harms of most and harms are impacts on different
groups are clearly groups, including groups are provided either limited, groups
explained possibly additional and accurate. inaccurate, or
groups beyond the incomplete.
required three, are
provided.
Technical details reflect Extensive technical Many technical Few technical No technical details
an accurate and detailed details are provided details are provided details provided. provided
understanding of the demonstrating that accurately Some may be
internet broad reflect how the inaccurate.
understanding of internet works
how the internet
works
Technical details are All technical details Most of the Many of the No technical details
clear and described for a are clear and easily technical details technical details provided
non-technical audience read by a provided can be provided are
non-technical understood by a confusing to a
audience non-technical non-technical
audience audience
Reasonable benefits and Benefits and harms Benefits and harms Benefits and harms No benefits and
harms of the policy to all impacted to most impacted are limited or not harms are provided
choice on different groups are clearly groups are clearly tied to specific
impacted groups are explained explained groups
provided
This study source was downloaded by 100000851756026 from CourseHero.com on 09-04-2022 21:55:08 GMT -05:00
Computer Science Principles 5
https://www.coursehero.com/file/88395259/Project-Guide-Internet-Dilemmas-Unit-2-Lesson-7pdf/
Powered by TCPDF (www.tcpdf.org)