网络骚扰和言论自由

James M. Weinstein
{"title":"网络骚扰和言论自由","authors":"James M. Weinstein","doi":"10.1093/OSO/9780190883591.003.0004","DOIUrl":null,"url":null,"abstract":"For most people the internet has been a dream come true, allowing instantaneous access to a vast array of information, opinion, and entertainment and facilitating communication with friends and family throughout the world. For others, however, the internet has wrought a nightmare, allowing often anonymous enemies a platform for vicious attacks on the character of their victims and a means for revealing to the world embarrassing private information about them. To combat these attacks, victims and law enforcement officials in the United States have employed both analogue remedies such as harassment and stalking laws as well as cyber-specific provisions. Since the attacks involve speech, however, all these remedies must comport with the First Amendment. The typical response of courts and commentators to the First Amendment issues raised in these cases is to ask whether the perpetrator’s speech falls within one of the limited and narrow traditional exceptions to First Amendment coverage, such as true threats, defamation, obscenity, or fighting words. This approach is understandable in light of unfortunate dicta in several United States Supreme Court decisions—that all content-based restrictions of speech other than speech falling within one of these exceptions are subject to “strict scrutiny,” a rigorous test that few speech restrictions can pass. This chapter argues that this approach to dealing with cyber harassment is misguided. This methodology often results in shoehorning the speech at issue into exceptions into which the speech does not fit, or worse yet, in a finding that the speech is protected by the First Amendment simply because it does not fall within a recognized exception.","PeriodicalId":359550,"journal":{"name":"Free Speech in the Digital Age","volume":"34 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2019-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"Cyber Harassment and Free Speech\",\"authors\":\"James M. Weinstein\",\"doi\":\"10.1093/OSO/9780190883591.003.0004\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"For most people the internet has been a dream come true, allowing instantaneous access to a vast array of information, opinion, and entertainment and facilitating communication with friends and family throughout the world. For others, however, the internet has wrought a nightmare, allowing often anonymous enemies a platform for vicious attacks on the character of their victims and a means for revealing to the world embarrassing private information about them. To combat these attacks, victims and law enforcement officials in the United States have employed both analogue remedies such as harassment and stalking laws as well as cyber-specific provisions. Since the attacks involve speech, however, all these remedies must comport with the First Amendment. The typical response of courts and commentators to the First Amendment issues raised in these cases is to ask whether the perpetrator’s speech falls within one of the limited and narrow traditional exceptions to First Amendment coverage, such as true threats, defamation, obscenity, or fighting words. This approach is understandable in light of unfortunate dicta in several United States Supreme Court decisions—that all content-based restrictions of speech other than speech falling within one of these exceptions are subject to “strict scrutiny,” a rigorous test that few speech restrictions can pass. This chapter argues that this approach to dealing with cyber harassment is misguided. This methodology often results in shoehorning the speech at issue into exceptions into which the speech does not fit, or worse yet, in a finding that the speech is protected by the First Amendment simply because it does not fall within a recognized exception.\",\"PeriodicalId\":359550,\"journal\":{\"name\":\"Free Speech in the Digital Age\",\"volume\":\"34 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2019-04-25\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Free Speech in the Digital Age\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1093/OSO/9780190883591.003.0004\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Free Speech in the Digital Age","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1093/OSO/9780190883591.003.0004","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1

摘要

对于大多数人来说,互联网已经成为梦想成真,允许即时访问大量的信息、意见和娱乐,并促进与世界各地的朋友和家人的交流。然而,对另一些人来说,互联网带来了一场噩梦,往往是匿名的敌人提供了一个平台,对受害者的性格进行恶毒攻击,并向世界披露他们令人尴尬的私人信息。为了打击这些攻击,美国的受害者和执法官员采用了类似的补救措施,如骚扰和跟踪法以及网络特定条款。然而,由于攻击涉及言论,所有这些补救措施都必须符合第一修正案。法院和评论员对这些案件中提出的第一修正案问题的典型反应是,询问肇事者的言论是否属于第一修正案所涵盖的有限和狭隘的传统例外,例如真正的威胁、诽谤、淫秽或打架的话。这种做法是可以理解的,因为在几个美国最高法院的判决中,不幸的是,所有基于内容的言论限制,除了属于这些例外之一的言论,都要受到“严格审查”,这是一种严格的测试,很少有言论限制能通过。本章认为,这种处理网络骚扰的方法是错误的。这种方法通常会导致将争议言论硬塞进不适合的例外情况中,或者更糟的是,导致该言论仅仅因为不属于公认的例外情况而受到第一修正案的保护。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
Cyber Harassment and Free Speech
For most people the internet has been a dream come true, allowing instantaneous access to a vast array of information, opinion, and entertainment and facilitating communication with friends and family throughout the world. For others, however, the internet has wrought a nightmare, allowing often anonymous enemies a platform for vicious attacks on the character of their victims and a means for revealing to the world embarrassing private information about them. To combat these attacks, victims and law enforcement officials in the United States have employed both analogue remedies such as harassment and stalking laws as well as cyber-specific provisions. Since the attacks involve speech, however, all these remedies must comport with the First Amendment. The typical response of courts and commentators to the First Amendment issues raised in these cases is to ask whether the perpetrator’s speech falls within one of the limited and narrow traditional exceptions to First Amendment coverage, such as true threats, defamation, obscenity, or fighting words. This approach is understandable in light of unfortunate dicta in several United States Supreme Court decisions—that all content-based restrictions of speech other than speech falling within one of these exceptions are subject to “strict scrutiny,” a rigorous test that few speech restrictions can pass. This chapter argues that this approach to dealing with cyber harassment is misguided. This methodology often results in shoehorning the speech at issue into exceptions into which the speech does not fit, or worse yet, in a finding that the speech is protected by the First Amendment simply because it does not fall within a recognized exception.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信