citizenship in a digital age access, participation and rights ted talk

17
CITIZENSHIP IN A DIGITAL AGE ACCESS, PARTICIPATION AND RIGHTS TED TALK

Upload: kevin-jackson

Post on 02-Jan-2016

216 views

Category:

Documents


1 download

TRANSCRIPT

“FEDERAL AND MANY STATE LAWS…”

Political participation encompasses the many activities used by citizens to influence the selection of political leaders or the policies they pursue.

Political participation derives from the freedom to speak out, assemble and associate; the ability to take part in the conduct of public affairs; and the opportunity to register as a candidate, to campaign, to be elected and to hold office at all levels of government. Political participation extends beyond parties, however. Individuals can also become involved in certain aspects of the electoral process through independent action—particularly at the local level—and by joining civil society organizations. Professional networks, trade unions, non-governmental organizations, and the media can all provide avenues for political participation.

Political Participation

PUBLIC SPACES

Job Interviews

Other kids’ parents

Even text messages get shared

College recruiting

Social Media Can Cost you in Recruiting

Asset and Liability to Recruiting

Colleges use for student recruitment

Villanova forces athletes to be “friends”

THERE ARE POSITIVE AND NEGATIVE FEATURES OF SOCIAL MEDIA

ALL EMPLOYERS AND COLLEGES NOW OPERATE FROM THE ASSUMPTION THAT PEOPLE ALL HAVE SOCIAL MEDIA

NEED TO RECOGNIZE THESE ARE “PUBLIC SPACES” AND ACT ACCORDINGLY

SOCIAL MEDIA IS HERE TO STAY

MORE OR LESS?

Do the increased opportunities for social and political participation in the

digital age outweigh the personal rights we forfeit when we engage?

“DATA IS JUST AS LIKELY TO BE AS BIG A PIECE OF THE BUSINESS EQUATION AS ADVERTISING. FACEBOOK, LINKEDIN, MYSPACE AND TWITTER ALREADY POSSESS BILLIONS OF PIECES OF USEFUL DATA THAT CAN INFER SO MUCH ABOUT WHAT’S HAPPENING – AND WHAT’S GOING TO HAPPEN – IN CONSUMER SOCIETY.” ~ FORBESTHE DATA THAT SOCIAL NETWORKS HAVE ACCUMULATED IS POTENTIALLY VERY VALUABLE. BY AGGREGATING THIS RELATIONSHIP DATA AND MAKING IT ANONYMOUS, COMMUNITIES CAN FIND THIRD-PARTIES WILLING TO PAY FOR IT.IT WILL BE IMPORTANT THAT THE SOLD INFORMATION DOESN’T INVADE ANYONE’S PRIVACY, BUT THAT’S AN ENTIRELY DIFFERENT ISSUE. SO LONG AS THE DATA CONTAINS OUR WANTS, NEEDS, LIKES, DISLIKES, AND INTERESTS, ITS VALUE CANNOT YET BE MEASURED. THE SKY IS THE LIMIT!

FOLLOW THE MONEY

PRIVACY- PROTECTING THE PNEUMBRASMany teens ages 12-17 report that they generally draw on their own wits, observations and knowledge to manage their privacy online and on social media. Focus group interviews with teens show that for their day-to-day privacy management, many teens figure out sharing and settings on their own, either by walking through their choices in the app or platform when they sign up, or through their own searching and use of their preferred platform.

At the same time, a nationally representative survey of teen internet users shows that, at some point, 70% of them have sought outside advice about how to manage some aspect of their privacy online. When they do seek outside help, teens most often turn to friends, parents or other close family members:

42% have talked to friends or peers

41% have talked to a parent

37% have asked a sibling or cousin

“Where Teens Seek Online Privacy Advice” (Pew Research Internet Project)

I.P. V. STATE OF ARKANSAS (CT. APP. AR, DIVISION 3 2012) 2012 ARK. APP. 273A FACEBOOK POST THREATENING TO BRING WEAPONS TO SCHOOL WAS SUFFICIENT TO CONVICT DEFENDANT ON CHARGES OF HARASSING COMMUNICATION, DISORDERLY CONDUCT.KEY POINTS: DISORDERLY CONDUCT AND HARASSMENT CHARGES CAN BE LEVIED BASED ON A SIMPLE FACEBOOK POST.

US V. MUSGROVE (E.D.WI 2011) 2011 US DIST LEXIS 108932A CRAIGSLIST POSTING WAS A TRUE THREAT COMMUNICATED USING INTERSTATE MEANS/IN INTERSTATE COMMERCE.KEY POINTS: THE TRUE THREAT DOCTRINE CAN BE REGULATED BY THE FEDERAL GOVERNMENT IF IT USES AN INTERSTATE MEDIUM.  ALMOST ALL MAJOR INTERNET SITES WILL FALL INTO THAT CATEGORY.- SEE MORE AT: HTTP://WWW.WASSOM.COM/GUEST-POST-SOCIAL-MEDIA-AND-CRIMINAL-LAW-HARASSMENT-AND-TRUE-THREATS.HTML#STHASH.LBDPX8FW.DPUF

SOCIAL MEDIA CASE LAW

“STAY SAFE” OR “PROTECT YOUR RIGHTS?

What rights do we forfeit when we engage in social media?

What do we gain by using social media?

How can we make our social media habits “smarter”?

In what ways does our online lives complement/contradict/supplement our real lives?

How can we harness social media to stay informed with society and politics?

SOCIAL MEDIA CASE LAW- (SCHOOL PRECEDENT)

I.P. v. State of Arkansas (Ct. App. AR, Division 3 2012) 2012 Ark. App. 273

A Facebook post threatening to bring weapons to school was sufficient to convict defendant on charges of harassing communication, disorderly conduct.

KEY POINTS: disorderly conduct and harassment charges can be levied based on a simple Facebook post.

US v. Musgrove (E.D.WI 2011) 2011 US Dist LEXIS 108932

A craigslist posting was a true threat communicated using interstate means/in interstate commerce.

KEY POINTS: the true threat doctrine can be regulated by the federal government if it uses an interstate medium.  Almost all major internet sites will fall into that category.

- See more at: http://www.wassom.com/guest-post-social-media-and-criminal-law-harassment-and-true-threats.html#sthash.lbDPX8Fw.dpuf