• Skip to main content

ITSecurity.org

Technology Security Controls

  • Main
  • Products
  • Services
    • Compliance-Services
      • ISO27001 Compliance
      • ISO22301 Compliance
      • ISO27002 Compliance
      • Data-Protection
      • GDPR
      • PCI-DSS Services
    • Identity and Access Management Services
      • IAM Design
      • IAM Policies & Standards
    • Incident Management Services
      • Emergency Incident Response
      • Forensic Support
      • Incident Response
    • Information Security Services
      • Information Security Consultancies
      • Information Security Governance Services
      • Information Security Policies & Standards
    • IT Risk Management Services
      • Risk Management Framework
      • Auditing
    • IT Security Consulting Services
      • IT Security Governance Services
      • IT Security Policies and Standards
    • Additional Security Services
      • Managed Security Services
      • Mobile Security
      • Network Security Services
    • Physical Security Services
      • Physical Security Reviews
    • Policies and Standards Services
    • Programme and Project Services
    • Risk Management Services
      • Risk Management – Framework
      • Risk Management Acceptance & Waivers
    • Security Awareness Services
      • Security Awareness – Phishing Responses
      • Phishing Responses
      • Security Awareness Training – Rebranded Security Training
      • Security Awareness Training – Generic
    • Security Design Services
      • All Security Design and Architectural Services
      • Cloud Security Review
      • Security Appliance Design and Configuration
    • Security Metrics Services
    • Technical Security Assessment Services
      • Penetration Testing – Our Penetration Test Services
      • Database Security – Databases and Repositories
      • Application Security Code Testing
      • Application Security Services
    • Third-Party and Supplier Assurance Services
      • Third and Supplier Party Assurance Methodology
      • Third and Supplier Party Assurance Review
      • Joint Venture Due Diligence
  • Security Digest
  • FAQ
  • Contact Us

Why can’t Internet companies stop awful content?

November 27, 2019 by admin

Don't abandon the Internet yet!

Enlarge / Don’t abandon the Internet yet! (credit: Aurich Lawson / Getty)

Eric Goldman is a professor at Santa Clara University School of Law
and co-director of the High-Tech Law Institute. Jess Miers is an Internet Law & Policy Foundry fellow and a second year Tech Edge J.D. student at Santa Clara University School of Law. The opinions expressed here do not necessarily represent those of Ars Technica.

For the first two decades of the commercial Internet, we celebrated the Internet as one of society’s greatest inventions. After all, the Internet has led to truly remarkable outcomes: it has helped overthrow repressive political regimes, made economic markets more efficient, created safe spaces for otherwise marginalized communities to find their voices, and led to the most exquisite cat videos ever seen.

But in the last few years, public perceptions of the Internet have plummeted. We’ve lost trust in the Internet giants, who seem to have too much power and make missteps daily. We also are constantly reminded of all of the awful and antisocial ways that people interact with each other over the Internet. We are addicted to the Internet—but we don’t really love it any more.

Read 23 remaining paragraphs | Comments

Filed Under: IT Security, Opinion, Policy, Section 230

Contact Us

If there's any way we can help, please let us know
Call: +44 01606 642307