{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,5]],"date-time":"2026-01-05T22:01:24Z","timestamp":1767650484531,"version":"3.38.0"},"reference-count":21,"publisher":"SAGE Publications","issue":"1","license":[{"start":{"date-parts":[[1997,2,1]],"date-time":"1997-02-01T00:00:00Z","timestamp":854755200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/journals.sagepub.com\/page\/policies\/text-and-data-mining-license"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Journal of Information Science"],"published-print":{"date-parts":[[1997,2]]},"abstract":"<jats:p> On 1 February 1996, a US Government statute called the Communications Decency Act (CDA) was passed by Congress, with the intent of controlling Internet pornography and making the Net safe for children by banning \u2018indecent\u2019 content. A widely criticised Time magazine cover story on \u2018cyberporn\u2019, based on a paper published by the Georgetown Law Journal, had some influence on the preceding political debate, and presents an interesting case study of academic and commercial publishing and journalism. On 11 June 1996, a three-judge court, hearing cases by the American Civil Liberties Union and the American Library Association, decided that the CDA was unconstitutional under First Amendment protection of free speech. Non-legislative solutions to the problems of indecency and censorship are offered by software for filtering Internet content. A Platform for Internet Content Selection (PICS) standard has been developed by the World Wide Web Consortium to include content ratings labels in documents, for identification by browsing and filtering software. <\/jats:p>","DOI":"10.1177\/016555159702300107","type":"journal-article","created":{"date-parts":[[2004,12,18]],"date-time":"2004-12-18T01:36:35Z","timestamp":1103333795000},"page":"81-90","source":"Crossref","is-referenced-by-count":1,"title":["Cyberporn and communication decency"],"prefix":"10.1177","volume":"23","author":[{"given":"George","family":"McMurdo","sequence":"first","affiliation":[{"name":"Queen Margaret College, Edinburgh, Scotland, UK,                         ,"}]}],"member":"179","published-online":{"date-parts":[[1997,2,1]]},"reference":[{"volume-title":"Folk Devils and Moral Panics","year":"1972","author":"S. Cohen","key":"atypb1"},{"key":"atypb2","unstructured":"[2] J. Riddell, Pornography on the Internet - a New Moral Panic? (BA                 (Hons) Communication Studies dissertation), (Queen Margaret College, Edinburgh,                 1996). Available at: http:\/\/www.qmced.ac.uk\/cis\/diss\/cs92ridd\/"},{"issue":"2","key":"atypb3","first-page":"3","volume":"5","author":"R. Taylor","year":"1996","journal-title":"Personal Computer Magazine"},{"issue":"1","key":"atypb4","first-page":"86","volume":"7","author":"M. Godwin","year":"1996","journal-title":"Internet World"},{"issue":"4","key":"atypb5","first-page":"96","volume":"6","author":"M. Godwin","year":"1995","journal-title":"Internet World"},{"issue":"21","key":"atypb6","volume":"144","author":"P. Elmer-DeWitt","year":"1994","journal-title":"Time"},{"issue":"3","key":"atypb7","first-page":"78","volume":"6","author":"M. Godwin","year":"1995","journal-title":"Internet World"},{"issue":"26","key":"atypb8","first-page":"52","volume":"147","author":"J. Quittner","year":"1996","journal-title":"Time (International)"},{"issue":"5","key":"atypb9","first-page":"1849","volume":"83","author":"M. Rimm","year":"1995","journal-title":"Georgetown Law Journal"},{"issue":"10","key":"atypb10","first-page":"102","volume":"6","author":"M. Godwin","year":"1995","journal-title":"Internet World"},{"issue":"1","key":"atypb11","first-page":"34","volume":"146","author":"P. Elmer-DeWitt","year":"1995","journal-title":"Time (International)"},{"key":"atypb12","doi-asserted-by":"publisher","DOI":"10.1177\/016555159502100504"},{"volume-title":"A Detailed Critique of the Time Article: \u2018On a Screen Near You: Cyberporn\u2019","year":"1995","author":"D. L. Hoffman","key":"atypb13"},{"volume-title":"The Pornographer\u2019s Handbook: How to Exploit Women, Dupe Men, and Make Lots of Money","year":"1995","author":"M. Rimm","key":"atypb14"},{"issue":"4","key":"atypb15","first-page":"41","volume":"146","author":"P. Elmer-DeWitt","year":"1995","journal-title":"Time (International)"},{"issue":"10","key":"atypb16","first-page":"108","volume":"7","author":"M. Godwin","year":"1996","journal-title":"Internet World"},{"volume-title":"Child Safety on the Information Highway","year":"1994","author":"National Center for Missing and Exploited Children (NCMEC)","key":"atypb17"},{"issue":"9","key":"atypb18","first-page":"49","volume":"7","author":"G. Venditto","year":"1996","journal-title":"Internet World"},{"key":"atypb19","doi-asserted-by":"publisher","DOI":"10.1038\/scientificamerican0996-38"},{"issue":"12","key":"atypb20","first-page":"60","volume":"148","author":"J. Quittner","year":"1996","journal-title":"Time (International)"},{"key":"atypb21","doi-asserted-by":"publisher","DOI":"10.1177\/016555159502100407"}],"container-title":["Journal of Information Science"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/journals.sagepub.com\/doi\/pdf\/10.1177\/016555159702300107","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/journals.sagepub.com\/doi\/pdf\/10.1177\/016555159702300107","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,3,1]],"date-time":"2025-03-01T13:45:09Z","timestamp":1740836709000},"score":1,"resource":{"primary":{"URL":"https:\/\/journals.sagepub.com\/doi\/10.1177\/016555159702300107"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1997,2]]},"references-count":21,"journal-issue":{"issue":"1","published-print":{"date-parts":[[1997,2]]}},"alternative-id":["10.1177\/016555159702300107"],"URL":"https:\/\/doi.org\/10.1177\/016555159702300107","relation":{},"ISSN":["0165-5515","1741-6485"],"issn-type":[{"type":"print","value":"0165-5515"},{"type":"electronic","value":"1741-6485"}],"subject":[],"published":{"date-parts":[[1997,2]]}}}