Skip to main content Accessibility help
×
Hostname: page-component-77c89778f8-m42fx Total loading time: 0 Render date: 2024-07-22T13:22:36.858Z Has data issue: false hasContentIssue false

7 - Responsibility of Internet Service Providers and Web-Hosting Services, Part II: Applications

Published online by Cambridge University Press:  05 July 2015

Raphael Cohen-Almagor
Affiliation:
University of Hull
Get access

Summary

The mind of the superior man is conversant with righteousness; the mind of the mean man is conversant with gain.

–Confucius

Suppose you are managing a large American Internet service provider (ISP). One day, FBI agents knock on your door and tell you that your company has been hosting a jihadi site that urged attacks against American targets. How would you feel? What would you say?

This chapter examines the implications of social responsibility for business providers and host companies that entertain problematic speech. The main question is whether ISPs and Web-hosting services (WHSs) should be proactive: that is, should they merely cooperate on receipt of information from various sources, or should they also, to promote trust among their subscribers, scrutinize their sphere for problematic, antisocial, and potentially harmful material? Many ISPs and WHSs are reluctant to do so for a very practical reason: the costs involved in employing professional staff for the task. Cynically, they might argue that morality is one thing, but here we are talking about money.

I argue that ISPs and WHSs should adopt a proactive stance in combating antisocial and violent content. They cannot be neutral toward such a phenomenon. Absolute content net neutrality constitutes clear-eyed akrasia and shedding of moral and social responsibility. The prime troubling examples that have significant presence on the Internet are crime, terrorism, child pornography, cyberbullying, and hate speech.

CRIME

One of the gravest challenges we are facing today is cybercrime – crime that is facilitated by computers or computer networks. Criminal uses of Internet communications include cybertheft, online fraud, online money laundering, cyberextortion, cyberstalking, and cybertrespass. Cybercriminals send spam, host and distribute malware, sell fake and harmful software, install backdoor Trojans (programs that perform like a real program that a user may wish to run but also perform unauthorized actions behind the scene), set up malicious websites, and design schemes to steal valuable information and money.

Type
Chapter
Information
Confronting the Internet's Dark Side
Moral and Social Responsibility on the Free Highway
, pp. 177 - 229
Publisher: Cambridge University Press
Print publication year: 2015

Access options

Get access to the full version of this content by using one of the access options below. (Log in options will check for institutional or personal access. Content may require purchase if you do not have access.)

Save book to Kindle

To save this book to your Kindle, first ensure coreplatform@cambridge.org is added to your Approved Personal Document E-mail List under your Personal Document Settings on the Manage Your Content and Devices page of your Amazon account. Then enter the ‘name’ part of your Kindle email address below. Find out more about saving to your Kindle.

Note you can select to save to either the @free.kindle.com or @kindle.com variations. ‘@free.kindle.com’ emails are free but can only be saved to your device when it is connected to wi-fi. ‘@kindle.com’ emails can be delivered even when you are not connected to wi-fi, but note that service fees apply.

Find out more about the Kindle Personal Document Service.

Available formats
×

Save book to Dropbox

To save content items to your account, please confirm that you agree to abide by our usage policies. If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account. Find out more about saving content to Dropbox.

Available formats
×

Save book to Google Drive

To save content items to your account, please confirm that you agree to abide by our usage policies. If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account. Find out more about saving content to Google Drive.

Available formats
×