Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
39 Cards in this Set
- Front
- Back
Socratic Method
|
Began with Socrates 2,500 years ago. Ask increasingly difficult questions. Than ask follow-up questions to expose inconsistencies and weaknesses in students answer Continual questioning lead to basic truth |
|
Three temparments
|
The Basic drives: Food, sex, and other comforts An assertive nature: Defending, competing, and surviving Reason |
|
The right course of action lies between the two extremes
|
use your experience and reason
|
|
Thomas Hobbes
|
English scholar who influenced British and American ethical and political thought in the 17th century
|
|
The Social Contract
|
prehistoric humankind lived in a world of "continual fear and danger of violent death" Believed in prosperity, peace and long life Humankind formed alliances out of self-interest |
|
Act Utilitarians
|
Judges the consequences of the actions
|
|
Rule Ultilarians
|
Judge an action by what the consequences would be if the action became the rule that people lived by
|
|
Foes of Utilitarianism
|
Criticize it is difficult to predict the consequences of our actions
|
|
Categorical Imperative
|
Act as if the maxim of your action were to become through your will a universal law of nature
|
|
Duty-based ethics
|
Real test of morality is whether people do the right thing even if it is against their own self-interest. ex. Journalist go to jail rather than reveal their sources |
|
The Potter Box
|
Definition , Values, Principles, Loyalties
|
|
Embedding
|
the press is allowed to accompany the military in a war zone, and press pooling used
|
|
Flynt v Rumsfiedl
|
All future instances of embedding is subject to the discretion of the military
|
|
Secret dockets
|
court records regarding the existence of a case are kept concealed by removing them from the public docket
|
|
State secrets privlege
|
Wherein access to some trails and proceedings during wartime can disappear completely
|
|
FOIA
|
allows access to records kept by federal government, yet the government employs nine exemptions that could potentially jeopardize national security
|
|
CIPA
|
details procedures for the courts to consider when the government argues that classified info can't be publicly disclosed during a criminal prosecution.
|
|
Punishment for publishing national security information
|
there remains the slight possibility that government could punish the press for exposing information that could expose national security secrets
|
|
Self-censorship by the news media
|
occurs when members of the news media silence themselves in fear of government retaliation. It may also occur because some members of the press decide not to offend viewers or readers.
|
|
Tinker v. Des Moines independent Community School District
|
Students protesting Vietnam war with peace signed armbands Outcome: May regulate speech that may disrupt of interfere with classwork |
|
Hazelwood School District v. Kuhlmeier
|
The principle removed two pages out of school's newspaper which featured an article on teen pregnancy and the impact of parents' divorce Outcome: “Schools may regulate speech that is school sponsored and/or that is part of the school curriculum, so long as the censorship is reasonably related to legitimate pedagogical concerns.” |
|
Bethel School District v. Fraser
|
- Student makes sexually suggestive speech in front of 600 students Outcome: Schools may regulate sexually offenstive speech that is lewd, vulgar or indecent |
|
Kincaid v. Gibson and Hosty v. Carter
|
addresses censorship and prior restraint on college campuses.
|
|
ACLU of Florida v. Miami
|
addresses book banning in public school libraries.
|
|
Problems for college students
|
Student Journalist aren't able to get access to reports on faculty performance, meetings and hearings. Thefts of all issues by those that disagree reductions or ceased funding restricting paid advertising |
|
Time, Place and Manner Restriction
|
Government can base attempts of prior censorship of content based on the time, the place or the manner of communication.
|
|
Intermediate Scrutiny
|
set of rules court has developed to regulate restrictions. Rules must be content neutral, can't impose complete ban of communication, must be justified by a substantial state interest, must be narrowly tailored and can't restrain more expression than is required to future interest. |
|
Traditional Public Forum
|
public places that have a long tradition of being devoted to assembly and speeches (I.E in-front of city hall).
|
|
Designated Public Forum
|
places created by the government to be used for expressive activities (I.E a city owned community meeting hall).
|
|
Public Property That is Not a Public Forum
|
the government has greater power to regulate and restrict speech at these areas (I.E military bases).
|
|
Private Property
|
owners are free to regulate who uses their property for expressive activity.
|
|
Hate Speech
|
words written or spoken that attack individuals or groups because of their race, ethnic background, religion, gender or sexual orientation
|
|
Fighting Words Doctrine
|
“ Those which their very utterance inflict injury or tend to incite an immediate breach of the peace.”
|
|
Chaplinsky v. Gooding
|
established that while fighting words are prohibited only when face-to-face insults will lead to a violent response on the part of the victim
|
|
Unprotected Harassment
|
Harassment must include something beyond the mere expression of views, words, symbols or thoughts that some person finds offensive.
|
|
Protected Expression
|
The government can't prohibit invective or epithets that simply injure someone's feelings or are merely rude or discourteous
|
|
Election Campaigns
|
campaign spending is closely tied to freedom of speech and is protected under the First Amendment.
|
|
Net Neutrality
|
An effort to allow internet access to operate as democratically as possible
|
|
Internet Freedom Preservation Act
|
designed to ensure that broadband service providers do not discriminate against internet content, applications or services by offering preferential treatment.
|