Download as pdf or txt
Download as pdf or txt
You are on page 1of 5

Unit 2 Lesson 7

Name(s): - Period: 7 - Date: 10/5/20

Project Guide - Internet Dilemmas


Background
You are the Chief Technology Advisor for a candidate running for elected office. Your candidate is relying on you to help
inform her about important technological dilemmas and come up with good policy ideas to address them. For this
project you’ll investigate a social dilemma related to the Internet and prepare a report summarizing your findings
and making a policy recommendation for your candidate.

Step 1 - Pick Your Dilemma

Net Neutrality Internet Censorship The Digital Divide

Background: Internet users love Background: While the Internet is Background: While technology is
services like streaming movies, used to share many useful services increasingly integrated into daily life,
video chatting, or online gaming. All and information, there are growing there are still many who lack access
of this content needs to travel over concerns about the way that the to the Internet or digital technology.
the Internet, however, and the Internet can be used to spread In rural areas there are challenges
companies that build and maintain damaging information ranging building networks to connect
networks are complaining about the from national secrets to calls for geographically sparse populations,
increased demands being placed on violence. Censoring this but even in cities some groups or
their networks. Your candidate is information may provide some areas have relatively less access to
hearing more and more about a people with increased security, but the Internet or knowledge of how to
debate called “net neutrality” and potentially risks free speech and use it. Your candidate is worried that
would like a more informed opinion the safety of social and political while technology is bringing social
as part of her platform. activists. Your candidate would like and economic benefits to many,
to have a policy that balances these there are others being left behind.
two concerns in a way that makes
sense for our digital age.
Make a policy increasing safety from
damaging info while allowing social
and political activists to have free
speech and safety.

Core Question: When and how Core Question: When and how Core Question: When and how
should internet service providers be should the government be allowed to should resources be invested to
allowed to treat some kinds of censor or block internet traffic, if at close gaps between those who do
internet traffic different from others? all? and don’t use the Internet?

Impacted Groups Impacted Groups Impacted Groups


● Internet Service Providers (ISP) ● Everyday internet user ● Those lacking internet access
● Internet Content Provider ● Intelligence Agencies ● Internet Service Providers (ISP)
● Everyday internet Users ● Political activists ● Schools and libraries

Sources Sources Sources


● "How the end of net neutrality ● "Free Speech Or Hate Speech: ● "Eliminating the Digital Divide"
could change the internet" When Does Online Hate Speech (video): link
(video): link Become A Real Threat?" (audio ● "Internet/Broadband Fact Sheet"
● "'Net Neutrality' is ending. Here's article): link (article): link
how your internet could change" ● "Internet Censorship Explained" ● Wikipedia - the Digital Divide:
(article): link (video): link link
● "Wikipedia - Net Neutrality": link ● Wikipedia - Internet
Censorship:link

This study source was downloaded by 100000851756026 from CourseHero.com on 09-04-2022 21:55:08 GMT -05:00

https://www.coursehero.com/file/88395259/Project-Guide-Internet-Dilemmas-Unit-2-Lesson-7pdf/
Unit 2 Lesson 7

Step 2 - Review the One-Pager and Rubric


Review the one pager template and rubric to make sure you understand what you’ll be responsible for creating for this
project and how it’ll be evaluated.

Step 3 - Review the Concept Bank


This concept bank includes the key terms and concepts covered in this unit. Quickly review them before reading your
articles so that you’ll be ready to identify them in your articles. You can also refer to these as you complete your
one-pager.

Protocols / Layers Networks Packets and World Wide Web Internet Principles
Physical internet, IP, Fiber optic cable, Routing Web pages, Redundancy, fault
TCP, UDP, HTTP, copper wire, wifi, Packet metadata, IP browsers, servers, tolerance, scalability,
DNS router, path, direct addresses, dynamic domain, world wide open protocols
connection, routing, web
bandwidth

Step 4 - Review Your Sources


Review the three sources provided or additional ones you find online. For each source take notes on instances when
your impacted groups are mentioned or technical details are explained.
Source Notes on Impacted Groups Notes on Technical Details

● "Free Speech ● can be threatened through social ● Hate speech is generally protected
Or Hate media like twitter and instagram. under constitution
Speech: ● Hateful antisemtiic rants ● The problem is the hate not the
When Does ● People threatening and hating online platform
Online Hate often put the people physically in ● Controversy of who is labeled as a
Speech danger as well (ex. explosive devices hate group
Become A or shootings). ● Private social media companies like
● Impacted groups are often facebook and twitter can do whatever
Real Threat?"
misinformed by the over emotional they want.
(audio article):
people commenting
link

● Who is talking to whom and what are ● Censors take steps to stop info from
● "Internet they talking about? being spread that shouldn’t be
Censorship ● Uses get info from publishers ● Application layer blocking: keywords
Explained" ● Anonymity makes users untraceable are detected the communication will
(video): link ● This process works to protect users be disrupted
before bad information spreads ● DNS Sinkholing: Sensors can block
● The more users on internet, the users connection at many points
harder it is to sensor more and more saying “domain does not exist” or
info “unsafe content”

● Major Web-services reserve broad ● Content is not removed but access to


● Wikipedia - rights for themselves to remove or it is blocked
Internet pre-screen content with vague ● Multiple methods including IP address
Censorship:lin reasoning blocking, DNS filtering, URL filtering,
k ● Publishers and Authors of material are network disconnection
subject to a variety of consequences ● Controversial speakers are removed
● Some subjects most societies agree from social media platforms also
should be censored ex: sites with hate known as Deplatforming
speech or gambling

This study source was downloaded by 100000851756026 from CourseHero.com on 09-04-2022 21:55:08 GMT -05:00
Computer Science Principles 2
https://www.coursehero.com/file/88395259/Project-Guide-Internet-Dilemmas-Unit-2-Lesson-7pdf/
Unit 2 Lesson 7

● Google was removed from China due ● Most of what is censored around the
“Censoring the to extreme amounts of censorship world is to block propaganda against
Internet ”Link ● Everyone around the world is the state
connected through the internet so the ● GDPR (General Data Protection
laws of one country will affect the Regulation): sets guidelines for
internet in another collection and processing of personal
● Censorship is also specific to information
individual households ● Kid versions of websites to pre-censor
● ACLU (American Civil Liberties Union) content ex: youtube kids
advocate prevention of censorship ● VPNs are used to extend privacy and
accessibility

Name(s)_______________________________________________ Period ______ Date ___________________

Internet Dilemma Policy One Pager


To complete this one pager fill in each of the sections below. All text in italics is included to explain how to fill
in the one pager and can be deleted before you submit.

Core Question
When and how should the government be allowed to censor or block internet traffic, if at all?

Impacted Groups
Fill in the table below with your Impacted Groups. You may optionally add new groups or split one of the ones assigned
into smaller subgroups if it will help better explain who’s involved in the dilemma.

Impacted Group and Description Interests, Benefits, and Harms

Group 1: Everyday Internet users / anyone who goes ● Interests: To access search engines, connect
on their phone or computer, most of the population with others, browse social media, shop ect.
● Benefit: Secure rights for freedom of speech
and expression, censoring inappropriate or
sensitive content
● Harmed: Not always able to access content,
social media accounts can be banned or taken
down

Group 2: Intelligence agencies / Government based ● Gather military or political info for national
groups ex: FBI and CIA security purposes
● Benefit: Protect country from domestic and
international threats without panic from the
public
● Harmed: Must respect freedom of speech and
expression with still protecting the country

Group 3: Political Activists / Social Media accounts ● Educate people of specific causes, solve global
created with the intent to reform the government and and national political issues and gain
change political policies supporters
This study source was downloaded by 100000851756026 from CourseHero.com on 09-04-2022 21:55:08 GMT -05:00
Computer Science Principles 3
https://www.coursehero.com/file/88395259/Project-Guide-Internet-Dilemmas-Unit-2-Lesson-7pdf/
Unit 2 Lesson 7

● Benefit: Spread important information to many


people, making social media a platform for
more education
● Harmed: Posts can be controversial and may
be taken down or cause accounts to receive
threats physically and on the social media
platform

Technical Background
Explain the technical background necessary to understand the problem. Include:

● Background on layers / protocols / principles of the Internet necessary to understand the dilemma
○ Search engines need to have application layer blocking,
○ DNS sinkholes can be used to prevent access to inappropriate content,
● Use the concept bank on the first page to help brainstorm ideas to include. A strong description will reference
several of these concepts
○ Deplatformizing can be used to censor certain individuals who infringe on the safety of the state with
their posts like hate speech or national threats
○ Direct Connection: keeps social and political activists safe through preventing intercepted connection
● Make sure your descriptions are approachable for your candidate(political activist), who does not have as
strong of a background in the way the Internet works ✓

Recommended Policy Solution


Give a recommendation for what policy or solution your candidate should advocate for. Your solution could be a law
that should be passed or repealed, a government policy, or a technological solution your candidate should
promote.

Recommended Policy: Social Media sites must pre-screen posts for keywords and phrases that are
inappropriate or threaten national security, if posts do not pass the screen they must be edited and sent
back to be screened again before publication. In addition if there are accounts that posts are rejected more
than 15 times in 1 week they will be sent to the authorities for further investigation for possible illegal
activity.

The types of posts that will be rejected are ones with words or phrases that encourage or justify terrorism,
along with posts that have to do with enouraging or justifying illegal activities.

Pros / Who Benefits Cons / Who is Harmed?


This policy will help to limit obscure posts on social Some people may object to this policy because it will
media but will still allow people to express themselves take longer to post to social media. Some people may
and respect freedom of speech. also believe this is similar to asking for permission to
post even though people can still most almost anything
In addition this will create more jobs and help to they want.
stimulate the economy, as well as an increase in national
security.

This study source was downloaded by 100000851756026 from CourseHero.com on 09-04-2022 21:55:08 GMT -05:00
Computer Science Principles 4
https://www.coursehero.com/file/88395259/Project-Guide-Internet-Dilemmas-Unit-2-Lesson-7pdf/
Unit 2 Lesson 7

Extensive Convincing Limited Evidence No Evidence


Category
Evidence Evidence

Completed research Research guide All three provided Only one or two No evidence that
guide demonstrates use indicates sources are sources were sources were used
of multiple sources referencing three or referenced referenced
more sources.
provided are
referenced

Interests, benefits, and Interests, benefits, Interests, benefits, Interests, benefits, No description of
harms of all impacted and harms for all and harms of most and harms are impacts on different
groups are clearly groups, including groups are provided either limited, groups
explained possibly additional and accurate. inaccurate, or
groups beyond the incomplete.
required three, are
provided.

Technical details reflect Extensive technical Many technical Few technical No technical details
an accurate and detailed details are provided details are provided details provided. provided
understanding of the demonstrating that accurately Some may be
internet broad reflect how the inaccurate.
understanding of internet works
how the internet
works

Technical details are All technical details Most of the Many of the No technical details
clear and described for a are clear and easily technical details technical details provided
non-technical audience read by a provided can be provided are
non-technical understood by a confusing to a
audience non-technical non-technical
audience audience

A clear policy Policy Policy Policy No policy


recommendation is recommendation is recommendation is recommendation recommendation
provided that is justifiable and clear clear but some provided but is provided
justifiable based on other based on aspects may not disconnected from
information in both build upon other information in
information in the
other sections of information one-pager
one-pager one-pager elsewhere in the
one-pager

Reasonable benefits and Benefits and harms Benefits and harms Benefits and harms No benefits and
harms of the policy to all impacted to most impacted are limited or not harms are provided
choice on different groups are clearly groups are clearly tied to specific
impacted groups are explained explained groups
provided

This study source was downloaded by 100000851756026 from CourseHero.com on 09-04-2022 21:55:08 GMT -05:00
Computer Science Principles 5
https://www.coursehero.com/file/88395259/Project-Guide-Internet-Dilemmas-Unit-2-Lesson-7pdf/
Powered by TCPDF (www.tcpdf.org)

You might also like