Question

In: Computer Science

A couple in California opened a computer bulletin board system (BBS) called Amateur Action that made...

A couple in California opened a computer bulletin board system (BBS) called Amateur Action that made sexually explicit images available to members. Most legal observers agreed the BBS operators would not have been guilty of a crime in California. A postal inspector in Memphis, Tennessee, working with a U.S. attorney there, became a member of the BBS and downloaded sexually explicit images in Memphis. The couple, who lived and worked in California, were prosecuted in Tennessee and found guilty of distributing obscenity under local community standards.

Briefly research this case and in your group discuss the following:

1. What is at the heart of this issue?

2. Did the BBS operators send obscene files to Tennessee?

3. How was BBSs accessed and what system was used?

4. Should the seller be prosecuted under Memphis community standards?

5. How can Social Informatics solve or help address this issue?

Solutions

Expert Solution

1.Thomas, U.S. legitimate case that was one of the primary indictments including the appropriation of "profane" material in the internet. The case was eminent in light of the fact that it expanded the ideas of "network" and "network guidelines" past the physical area and into the on the web and virtual space.

2.Yes, a postal monitor in Tennessee acquired a secret word from the respondents, and by dialing up the announcement board, made it sent supposedly indecent material to his PC in Tennessee. The litigants additionally sent supposedly foul tapes to the assessor in Tennessee.

3.A release board framework or BBS could likewise be a PC worker running programming that permits clients to associate with the framework utilizing a terminal program. Once signed in, the client can perform capacities like transferring and downloading programming and information, understanding news and notices, and trading messages with different clients through open message loads up and some of the time by means of direct visiting.

They kept up the framework with PCs and modems used to work their administration.

4.Thomases' case is twenty years old, and it reflects both an obsolete comprehension of "network" and consequently the proceeded with want of certain examiners and a great part of the best possible to bring up back the clock in regards to explicitly unequivocal materials. It appears to be evident that by abusing both the ambiguities of current foulness law and subsequently the media's want any wrongdoing stories identified with sexual materials, these social preservationists trust both to "cool" the spread of sexual materials on web and to work out an expansive, public extension for arraignments of that material.

5.One key thought of social informatics research is that the "social setting" of information innovation advancement and use assumes a tremendous part in affecting the ways during which individuals use data and advances, and consequently impacts their ramifications for work, associations, and other social connections.


Related Solutions

Peruse: The Disciplinary Action section the California State Board of Registered (BRN) Report on page 28...
Peruse: The Disciplinary Action section the California State Board of Registered (BRN) Report on page 28 available @ http://www.rn.ca.gov/pdfs/forms/brnfall2017.pdf (Links to an external site.)Links to an external site. and visit California Code of Regulations, Title 16, Division 14, Article 4: Grounds for Discipline Disciplinary Proceedings and Rehabilitation (Links to an external site.)Links to an external site. http://www.rn.ca.gov/practice/npa.shtml (Links to an external site.)Links to an external site.. Write about how you plan on using this information to inform your nursing practice?
Question 41 ​ When computer networks are connected to each other, the system is called a(n)...
Question 41 ​ When computer networks are connected to each other, the system is called a(n) ____. a. ​browser b. ​webnet c. ​internet d. ​web client 1 points Question 42 ​ When the website you are visiting places a cookie on your computer, it is called a(n) _____ cookie a. ​third-party b. ​first-party c. ​encrypted d. ​valid 1 points Question 43 ​ When you do not want information about the websites you visited stored on the hard drive of the...
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT