Matches in SemOpenAlex for { <https://semopenalex.org/work/W2477818533> ?p ?o ?g. }
Showing items 1 to 74 of
74
with 100 items per page.
- W2477818533 endingPage "229" @default.
- W2477818533 startingPage "177" @default.
- W2477818533 abstract "The mind of the superior man is conversant with righteousness; the mind of the mean man is conversant with gain. –Confucius Suppose you are managing a large American Internet service provider (ISP). One day, FBI agents knock on your door and tell you that your company has been hosting a jihadi site that urged attacks against American targets. How would you feel? What would you say? This chapter examines the implications of social responsibility for business providers and host companies that entertain problematic speech. The main question is whether ISPs and Web-hosting services (WHSs) should be proactive: that is, should they merely cooperate on receipt of information from various sources, or should they also, to promote trust among their subscribers, scrutinize their sphere for problematic, antisocial, and potentially harmful material? Many ISPs and WHSs are reluctant to do so for a very practical reason: the costs involved in employing professional staff for the task. Cynically, they might argue that morality is one thing, but here we are talking about money. I argue that ISPs and WHSs should adopt a proactive stance in combating antisocial and violent content. They cannot be neutral toward such a phenomenon. Absolute content net neutrality constitutes clear-eyed akrasia and shedding of moral and social responsibility. The prime troubling examples that have significant presence on the Internet are crime, terrorism, child pornography, cyberbullying, and hate speech. CRIME One of the gravest challenges we are facing today is cybercrime – crime that is facilitated by computers or computer networks. Criminal uses of Internet communications include cybertheft, online fraud, online money laundering, cyberextortion, cyberstalking, and cybertrespass. Cybercriminals send spam, host and distribute malware, sell fake and harmful software, install backdoor Trojans (programs that perform like a real program that a user may wish to run but also perform unauthorized actions behind the scene), set up malicious websites, and design schemes to steal valuable information and money." @default.
- W2477818533 created "2016-08-23" @default.
- W2477818533 creator A5043960032 @default.
- W2477818533 date "2015-07-05" @default.
- W2477818533 modified "2023-10-17" @default.
- W2477818533 title "Responsibility of Internet Service Providers and Web-Hosting Services, Part II: Applications" @default.
- W2477818533 doi "https://doi.org/10.1017/cbo9781316226391.008" @default.
- W2477818533 hasPublicationYear "2015" @default.
- W2477818533 type Work @default.
- W2477818533 sameAs 2477818533 @default.
- W2477818533 citedByCount "0" @default.
- W2477818533 crossrefType "book-chapter" @default.
- W2477818533 hasAuthorship W2477818533A5043960032 @default.
- W2477818533 hasConcept C108827166 @default.
- W2477818533 hasConcept C110875604 @default.
- W2477818533 hasConcept C116537 @default.
- W2477818533 hasConcept C136764020 @default.
- W2477818533 hasConcept C144133560 @default.
- W2477818533 hasConcept C162853370 @default.
- W2477818533 hasConcept C17744445 @default.
- W2477818533 hasConcept C178005623 @default.
- W2477818533 hasConcept C199539241 @default.
- W2477818533 hasConcept C2777154746 @default.
- W2477818533 hasConcept C2780224610 @default.
- W2477818533 hasConcept C2780378061 @default.
- W2477818533 hasConcept C38652104 @default.
- W2477818533 hasConcept C39549134 @default.
- W2477818533 hasConcept C41008148 @default.
- W2477818533 hasConcept C539553027 @default.
- W2477818533 hasConceptScore W2477818533C108827166 @default.
- W2477818533 hasConceptScore W2477818533C110875604 @default.
- W2477818533 hasConceptScore W2477818533C116537 @default.
- W2477818533 hasConceptScore W2477818533C136764020 @default.
- W2477818533 hasConceptScore W2477818533C144133560 @default.
- W2477818533 hasConceptScore W2477818533C162853370 @default.
- W2477818533 hasConceptScore W2477818533C17744445 @default.
- W2477818533 hasConceptScore W2477818533C178005623 @default.
- W2477818533 hasConceptScore W2477818533C199539241 @default.
- W2477818533 hasConceptScore W2477818533C2777154746 @default.
- W2477818533 hasConceptScore W2477818533C2780224610 @default.
- W2477818533 hasConceptScore W2477818533C2780378061 @default.
- W2477818533 hasConceptScore W2477818533C38652104 @default.
- W2477818533 hasConceptScore W2477818533C39549134 @default.
- W2477818533 hasConceptScore W2477818533C41008148 @default.
- W2477818533 hasConceptScore W2477818533C539553027 @default.
- W2477818533 hasLocation W24778185331 @default.
- W2477818533 hasOpenAccess W2477818533 @default.
- W2477818533 hasPrimaryLocation W24778185331 @default.
- W2477818533 hasRelatedWork W1138135931 @default.
- W2477818533 hasRelatedWork W130789376 @default.
- W2477818533 hasRelatedWork W1513157409 @default.
- W2477818533 hasRelatedWork W1527762547 @default.
- W2477818533 hasRelatedWork W1551265420 @default.
- W2477818533 hasRelatedWork W1655371584 @default.
- W2477818533 hasRelatedWork W203326795 @default.
- W2477818533 hasRelatedWork W215175542 @default.
- W2477818533 hasRelatedWork W2184706024 @default.
- W2477818533 hasRelatedWork W2187612109 @default.
- W2477818533 hasRelatedWork W2322099142 @default.
- W2477818533 hasRelatedWork W2343457710 @default.
- W2477818533 hasRelatedWork W2595864349 @default.
- W2477818533 hasRelatedWork W2982948103 @default.
- W2477818533 hasRelatedWork W3131886864 @default.
- W2477818533 hasRelatedWork W3170932308 @default.
- W2477818533 hasRelatedWork W3180079079 @default.
- W2477818533 hasRelatedWork W833628528 @default.
- W2477818533 hasRelatedWork W2295783868 @default.
- W2477818533 hasRelatedWork W2403452094 @default.
- W2477818533 isParatext "false" @default.
- W2477818533 isRetracted "false" @default.
- W2477818533 magId "2477818533" @default.
- W2477818533 workType "book-chapter" @default.