:::

詳目顯示

回上一頁
題名:網路世界中言論內容管制的趨勢與可能未來--以美國實務以及相關討論為中心
書刊名:科技法律評析
作者:程法彰 引用關係
作者(外文):Cheng, Fa-chang
出版日期:2011
卷期:4
頁次:頁175-194
主題關鍵詞:網路言論內容管制過濾軟體身分認證網路平臺業者InternetContent controlFiltering softwareIdentity authenticationInternet service provider
原始連結:連回原系統網址new window
相關次數:
  • 被引用次數被引用次數:期刊(1) 博士論文(0) 專書(0) 專書論文(0)
  • 排除自我引用排除自我引用:0
  • 共同引用共同引用:58
  • 點閱點閱:0
本文所要探討的是在網路虛擬世界的技術特性架構之下,對於實體世界中所要維持的言論內容管制基本架構是否應有不同的思維與對應。本文提出三層法規範管制言論內容的想法,首先,對於網路應加強設計使用者身分認證的機制(例如使用自然人憑證)作為第一層的基礎規範,確保網路使用者身分的真實性。其次對於不受言論自由內容保護的言論內容(如有關誹謗、猥褻甚或是傳統上犯罪行為言論等)應依現實面的需求,課與網路平臺業者管制的責任。本文建議在現階段至少法律應規範如同著作權法中通知並移除以(notice and take down)的機制設計作為網路言論內容管制的第二層法律規範制度設計,尤其應要求管理人在網站上提供適當的聯繫資訊避免法律因無法實踐而形同具文。最後對於雖然受言論自由內容保護但是在經過充分的研究分析後政策上認為有必要加以規範的情況時,除了以前述第一層次的網路使用者身分認證機制作為資訊接觸者的身分篩選機制外,對於網路內容過濾軟體的技術,在軟體技術尚未完全成熟以及被使用者廣泛接受前,應避免強制要求作為合於言論自由範疇的言論內容管制之前提要件,不致使得要求內容過濾軟體成為保護言論自由內容的較小限制的想法,反而造成網路言論自由內容的保護實際上高過於對於一般實體世界中對於言論自由內容保護的結果。
This Article is trying to probe the possibility whether there should be different regulatory philosophy and corresponding response to content control under the fictitious technological character within Internet compared to content control in the physical world. In the Article, it will bring up the theory of three-layer legal regulatory structure to content control within Internet. The first layer of legal regulatory structure is to enforce the design of identity authentication (for example, the Mechanism of Citizen Digital Certificate) as the fundamental infrastructure to ensure the authentication of users’ identity in Internet. Secondly, so far as to the content outside the scope of protection of freedom of speech (for example, the speech of libel, slander, obscenity or even the speech related to committing criminal offences etc.), the owner of platform (the Internet Service Provider) should be responsible for the content posted to some extent based upon the reality. It is suggested the principle of “notice and takedown” applies equally to copyright infringement situation and unprotected content control situation in Internet at the current stage as the second layer of legal mechanism to regulate content in cyberspace. Also to be noticed is that the Internet Service Provider should be required to provide adequate contact information in order to fully achieve the goal and not become unenforceable. And last, when, through thoroughly policy research and analysis, it is said that the speech protected by the concept of freedom of speech needs to be regulated, beside the first layer of identity authentication mechanism used as tracing contact information, the technology of filtering software should be avoided to be regarded as the less restrictive means to content within Internet unless the technology has reached its mature stage and prevalently accepted in the society. It is an unacceptable result that the freedom of speech protection in cyberspace exceeds the counterpart in real world.
期刊論文
1.Cheung, Anne S. Y.(2006)。The business of governance: China's legislation on content regulation in cyberspace。New York University Journal of International Law and Politics,38,1-37。  new window
2.Geist, Michael A.(2001)。Is There a There There? Toward Greater Certainty for Internet Jurisdiction。Berkeley Technology Law Journal,16(3),1345-1406。  new window
3.Lemley, Mark A.、Lessig, Lawrence(2001)。The End of End-to-End: Preserving the Architecture of the Internet in the Broadband Era。UCLA Law Review,48,925-972。  new window
4.Zittrain, Jonathan(2003)。Internet Points of Control。Boston College Law Review,44(2),653-688。  new window
5.Tsesis, Alexander(2001)。Hate in Cyberspace: Regulating Hate Speech on the Internet。San Diego L. Rev.,38,817-874。  new window
6.Bambauer, Derek E.(2009)。Cybersieves。Duke Law Journal,59(3),377-446。  new window
7.Tsesis, Alexander(2002)。Prohibiting Incitement on the Internet。Va. J. L. & Tech.,7,5-46。  new window
8.Valverde, Frank(2000)。The International Internet Rating System: Global Protection for Children, Business and Industry。N. Y. L. Sch. J. Int'l & Comp. L.,20,559-585。  new window
9.Werbach, Kevin(2008)。The Centripetal Network: How the Internet Holds Itself Together, and the Forces Tearing It Apart。U. C. Davis L. Rev.,42,343-412。  new window
10.Rappaport, Kim L.(1998)。In the Wake of Reno v. ACLU: The Continued Struggle in Western Constitutional Democracies with Internet Censorship and Freedom of Speech Online。Am. U. Int'l L. Rev.,13,765-814。  new window
11.Bradner, Scott(2006)。The End of End-to-End Security?。IEEE Security & Privacy,4(2),76-79。  new window
12.Chen, Shiping(2006)。On the Anonymity and Traceability of Peer-to-Peer VoIP Calls。IEEE Network,20(5),32-37。  new window
圖書
1.Benjamin, Stuart Minor(2006)。Telecommunications Law and Policy。Durham, NC:Carolina Academic Press。  new window
2.Emanuel, Steven L.(1998)。Constitutional Law。N. Y.:Emanuel Publishing Corp.。  new window
圖書論文
1.林子儀(1997)。言論自由的限制與雙軌理論。現代國家與憲法--李鴻禧教授六秩華誕祝賀論文集。new window  延伸查詢new window
2.馮震宇(1999)。對我國網路犯罪與預防措施之研究與建議。網路法基本問題研究。  延伸查詢new window
 
 
 
 
第一頁 上一頁 下一頁 最後一頁 top
:::
無相關著作
 
無相關點閱
 
QR Code
QRCODE