#DeathToFreedomOfSpeech
DOI:
https://doi.org/10.12797/RM.02.2018.04.09Keywords:
privacy, bioethics, neuroethicsAbstract
In this analysis the author sets out to examine the concept of freedom of speech on the internet, drawing upon the development of the World Wide Web, the Big-Data-Trade-Off-Dilemma and the nothing-to-hide argument fallacy. A key finding is the observation of a multitude of emerging challenges in the field of ethics, privacy, law and security. Furthermore the most recent exertion of influence on the freedom of speech, that is to say astroturfing should adduce as an instance to demonstrate the possibilities of manipulating public opinion. Further on, the analysis of governmental military enhancement programmes and the example of a recent entertainment programme production shall serve as a visualisation that the research on unprecedented signal resolution and datatransfer bandwidth between the brain and electronics might be far more close to reality than one might be expecting. The results suggest that the freedom of speech is preceded by the freedom of thinking. Its manipulation on a bigger scale (e.g. national elections) could serve as a new way of psychological warfare and therefore the freedom of thinking, or the right to a free mind should remain unviolated.
References
Anderson, C. (2012). The impact of social media on lodging performance. Cornell Hospitality Report, 12(15), 6-11.
Bridging the Bio-Electronic Divide. (2016). Retrieved February 13, 2018, from https://www.darpa.mil/news-events/2015-01-19
DeNardis, L. (2014). The Global War for Internet Governance. New Haven and London: Yale University Press.
Fareri, D. S., Niznikiewicz, M. A., Lee, V. K., & Delgado M. R. (2012). Social network modulation of reward-related signals. The Journal of Neuroscience: the Official Journal of the Society for Neuroscience, 32(26), 9045-9052. https://doi.org/10.1523/JNEUROSCI.0610-12.2012 .
Gallagher, K. (2014). Astroturfing: 21st Century False Advertising. Retrieved October 14, 2018, from http://www.anniesearle.com/web-services/Documents/ResearchNotes/ASAResearchNote_2014-12_Gallagher_Astroturfing.pdf
Kang, R., Brown, S., & Kiesler, S. (2013). Why do people seek anonymity on the internet?: informing policy and design. In W. Mackay, S. Brewster, & S. Bødker (Eds.), CHI ‘13 Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (pp. 2657-2666). New York: ACM.
Krishnamurthy, B., & Wills C. E. (2009). On the leakage of personally identifiable information via online social networks. In A. Sala, A. Goel, & K. Gummadi (Eds.), Proceedings of the 2nd ACM workshop on online social networks (pp. 7-12). New York: ACM.
Lin, P., Mehlman, M., & Abney, K. (2013, January). Enhanced Warfighters: Risks, Ethics, and Policy. Retrieved October 14, 2018, from http://ethics.calpoly.edu/greenwall_report.pdf
Michener, J. (1999). System insecurity in the Internet age. IEEE Software, 16(4), 62-69. https://www.doi.org/10.1109/52.776951.
Obar, J. A., & Oeldorf-Hirsch, A. (2018, June). The Biggest Lie on the Internet: Ignoring the Privacy Policies and Terms of Service Policies of Social Networking Services. Retrieved October 14, 2018, from https://papers.ssrn.com/sol3/papers.cfm?abstract_id=2757465
Ong, E. Y. L., Ang, R. P., Ho, J. C. M., Lim, J. C. Y., Goh, D. H., & Lee, C. S. (2011). Narcissism, extraversion and adolescents’ self-presentation on Facebook. Personality and Individual Differences, 50(2), 180-185. https://doi.org/10.1016/j.paid.2010.09.022.
Palmer, D. E. (2005). Pop-ups, Cookies, and Spam: Toward a Deeper Analysis of the Ethical Significance of Internet Marketing Practices. Journal of Business Ethics, 58(1-3), 271-280. https://doi.org/10.1007/s10551-005-1421-8.
Phelps, E., Lempert, K. M., & Sokol-Hessner, P. (2014). Emotion and Decision Making: Multiple Modulatory Neural Circuits. Annual Review of Neuroscience. 37, 264-287. https://www.doi.org/10.1146/annurev-neuro-071013-014119.
Rainie, L., Kiesler, S., Kang, R., & Madden, M. (2013). Anonymity, Privacy, and Security Online.
Retrieved October 14, 2018, from http://www.pewinternet.org/2013/09/05/anonymityprivacy-and-security-online/
Regulating the internet giants: The world’s most valuable resource is no longer oil, but data. (2017, May 6). The Economist. Retrieved from https://www.economist.com/news/leaders/21721656-data-economy-demands-new-approach-antitrust-rules-worlds-mostvaluable-resource?fsrc=scn/tw/te/rfd/pe
Ruiter, J., & Warnier, M. (2011). Privacy Regulations for Cloud Computing: Compliance and Implementation in Theory and Practice. In S. Gutwirth, Y. Poullet, P. de Hert, & R. Leenes (eds.), Computers, Privacy and Data Protection: an Element of Choice (pp. 361-376). Dordrecht: Springer Netherlands.
Snowden, E., Chomsky, N., & Greenwald, G. (2016, March 25). Snowden, Chomsky, and Greenwald discuss privacy, at 35:21 [Recorded panel discussion]. Tucson: University of Arizona College of Behavioral Sciences. Retrieved February 13, 2018, from https://vimeo.com/160952562
Wadhwa, V. (2014, April 15). Laws and Ethics Can’t Keep Pace with Technology. MIT Technology Review. Retrieved from https://www.technologyreview.com/s/526401/laws-and-ethics-cant-keep-pace-with-technology/
Downloads
Published
How to Cite
Issue
Section
License
This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.