David Bourget (Western Ontario)
David Chalmers (ANU, NYU)
Rafael De Clercq
Jack Alan Reynolds
Learn more about PhilPapers
Continental Philosophy Review 42 (1):81-100 (2009)
In U.S. v. American Library Association (2003), the Supreme Court upheld the Child Internet Protection Act (CIPA), which mandated that libraries receiving federal funding for public Internet access install content-filtering programs on computers which provide that access. These programs analyze incoming content, and block the receipt of objectionable material, in particular pornography. Thus, patrons at public libraries are protected from unintentionally (or intentionally) accessing objectionable material, and, in the case of minors, from accessing potentially damaging material. At least, that is the official story. In this paper, I develop three points. (1) I argue that CIPA and ALA are better read as examples of the enforcement of a regime of normative sexuality. The question of minors accessing pornography is only relevant to the official story insofar as it provides a rhetorically persuasive example of deviance from that normative regime. CIPAs full target includes information about topics such as homosexuality and contraception. (2) Rather than (or in addition to) punishing deviances directly, CIPA attempts to constitute a “public” in which such deviancy can never occur in the first place. Hence, the designation of a “public” space serves to domesticate alternative sexualities and to sanitize that space of sexual difference. (3) This interaction at the border of the public and private spheres offers an opportunity to reflect on and underscore the ways that subject formation and subjectivity are mediated through technological artifacts like the Internet.
|Keywords||Child Internet Protection Act Library filtering Internet Sexuality Hetero-normativity Privacy Public sphere|
|Categories||categorize this paper)|
Setup an account with your affiliations in order to access resources via your University's proxy server
Configure custom proxy (use this if your affiliation does not provide a proxy)
|Through your library|
References found in this work BETA
J. Butler (2004). Undoing Gender. Routledge.
William E. Connolly (2005). The Evangelical-Capitalist Resonance Machine. Political Theory 33 (6):869 - 886.
Gordon Hull (2005). Capital Sive Natura. International Studies in Philosophy 37 (2):15-35.
Gordon Hull (2003). Thoughts on the Fetishization of Cyberspeech and the Turn From "Public" to "Private" Law. Constellations 10 (1):113-134.
Citations of this work BETA
Gordon Hull, Heather Richter Lipford & Celine Latulipe (2011). Contextual Gaps: Privacy Issues on Facebook. [REVIEW] Ethics and Information Technology 13 (4):289-302.
Similar books and articles
Heather A. Kitchin (2003). The Tri-Council Policy Statement and Research in Cyberspace: Research Ethics, the Internet, and Revising a 'Living Document'. [REVIEW] Journal of Academic Ethics 1 (4):397-418.
Minnie Earl Sears (ed.) (1932). Standard Catalog for Public Libraries: Philosophy, Religion and General Works Section: An Annotated List of 1000 Titles, with a Full Analytical Index. H.W. Wilson.
Jacques N. Catudal (1999). Censorship, the Internet, and the Child Pornography Law of 1996: A Critique. [REVIEW] Ethics and Information Technology 1 (2):105-115.
Hugh LaFollette (1994). Mandatory Drug Testing. In S. Luper & C. Brown (eds.), Drugs, Morality, and the Law. Garland.
Anna Wyatt (2006). Do Librarians Have an Ethical Duty to Monitor Patrons' Internet Usage in the Public Library? Journal of Information Ethics 15 (1):70-79.
Chong Ju Choi, Sae Won Kim & Shui Yu (2009). Global Ethics of Collective Internet Governance: Intrinsic Motivation and Open Source Software. [REVIEW] Journal of Business Ethics 90 (4):523 - 531.
Patrick M. Garry, A New First Amendment Model for Evaluating Content-Based Regulation of Internet Pornography: Revising the Strict Scrutiny Model to Better Reflect the Realities of the Modern Media Age.
M. J. Wolf, K. W. Miller & F. S. Grodzinsky (2009). On the Meaning of Free Software. Ethics and Information Technology 11 (4):279-286.
R. S. Rosenberg (2001). Controlling Access to the Internet: The Role of Filtering. [REVIEW] Ethics and Information Technology 3 (1):35-54.
Added to index2009-01-28
Total downloads5 ( #227,243 of 1,101,604 )
Recent downloads (6 months)1 ( #292,059 of 1,101,604 )
How can I increase my downloads?