We think you have liked this presentation. If you wish to download it, please recommend it to your friends in any social system. Share buttons are a little bit lower. Thank you!
Presentation is loading. Please wait.
Published byBrionna Priddle
Modified about 1 year ago
© 2009 Charles D. Knutson Online Pornography: Protecting Our Children and Our Families Dr. Charles D. Knutson Brigham Young University
© 2009 Charles D. Knutson The scope of the problem Around 200 million websites Around 63 billion publicly indexable web pages, 550 billion documents Some studies suggest as many as 60% of all websites are pornographic in nature Ignores pornographic or inappropriate content on non-pornographic sites YouTube, Hulu, other streaming media sites 2
© 2009 Charles D. Knutson President Hinckley, 2004 I recently read that pornography has become a $57 billion industry worldwide. Twelve billion of this is derived in the United States by evil and "conspiring men" (see D&C 89:4) who seek riches at the expense of the gullible. It is reported that it produces more revenue in the United States than the "combined revenues of all professional football, baseball and basketball franchises or the combined revenues of ABC, CBS, and NBC." 3
© 2009 Charles D. Knutson President Hinckley, 2004 The National Coalition for the Protection of Children and Families states that "approximately 40 million people in the United States are sexually involved with the Internet. "One in five children ages 10–17 [has] received a sexual solicitation over the Internet. "Three million of the visitors to adult websites in September 2000 were age 17 or younger. "Sex is the number 1 topic searched on the Internet." 4
© 2009 Charles D. Knutson Some statistics 90% of 8-16 year-olds have viewed online pornography Most while doing homework The average age of exposure to pornography now is nine years old Changes in the brain during childhood and teen years compound pornography's effect Protection of younger kids is especially critical 5
© 2009 Charles D. Knutson Some statistics 34% of porn site hits are from girls Girls begin to develop appetite from: Teen magazines Soap Operas/TV Romance novels The hook of pornography can be just as quick for girls as for guys 6
© 2009 Charles D. Knutson A huge statistic! Only 23% of households have any rules at all about what children can do online! 7
© 2009 Charles D. Knutson Fundamental questions Should we even try to protect them from content? They're going to be exposed sooner or later... How much can the Internet really affect our children's lives? Is it really that bad? 8
© 2009 Charles D. Knutson Fundamental questions What can we do to help make the Internet a safer place for our children? I don't even know where to start What should we do when we discover we have a problem? I'm not sure I'm ready to deal with that 9
© 2009 Charles D. Knutson Other challenging questions Pres. Hinckley said to avoid it like a plague… So why don't people just stay away from it? It's incredibly addictive It's increasingly ubiquitous How do you avoid a plague that's in your pocket? It's not necessarily a place to avoid… 10
© 2009 Charles D. Knutson Four A's of Internet porn 1. Accessible No need to travel to a particular part of town, or enter a particular store Just a click away 2. Affordable Lots of teaser material for free So how do they make money? Once you're hooked, you break out your credit card for quantity, quality, or coarseness 11
© 2009 Charles D. Knutson Four A's of Internet porn 3. Anonymous Access is largely private and anonymous Addiction can more easily be kept secret 4. Aggressive Material is increasingly aggressive and predatorial The material will come looking for you even if you're not looking for it 12
© 2009 Charles D. Knutson Factors for control Internal control – Agency The ultimate and only true protection But remember that addiction inhibits agency… External controls – Technology Still need to protect ourselves from a technological perspective We'll cover technology first… 13
© 2009 Charles D. Knutson Most common activities Web browsing Google searching, aimless surfing Image searching and surfing Social networking Facebook, MySpace, other sites Online chatting Accessing media Music files, watching streaming video Peer-to-peer applications 14
© 2009 Charles D. Knutson Peer-to-peer applications 90% of content shared in peer-to-peer applications is illegal or pornographic Some applications load spyware and/or other malware on your computer Kazaa, Grokster, Gnutella, Emule, Edonkey, BearShare, LimeWire Dr. K sez: Not recommended!! 15
© 2009 Charles D. Knutson Web browsers Kids often download browsers Not the one you think they're using Internet Explorer53% Firefox31% Safari 3% Chrome 3% Opera 1% 16
© 2009 Charles D. Knutson Online searching Google – Most popular search engine Preferences SafeSearch filtering – Three levels Helps to mitigate accidental exposure With SafeSearch off, high likelihood of turning up inappropriate content on almost any search phrase Limitations Anyone can change the settings Still not foolproof 17
© 2009 Charles D. Knutson Online searching Beware of image and video search Much more difficult to filter images than text When searching for text, search engines provide preliminary information to help you see what's on the page if you click through to it 18
© 2009 Charles D. Knutson Online searching When searching for images, search engine presents thumbnail images If inappropriate material turns up in the search… It's immediately visible, even though somewhat small It's already ingested Which may trigger additional interest or desire to seek out addictive material 19
© 2009 Charles D. Knutson Example – Text search 20
© 2009 Charles D. Knutson Example – Image search 21
© 2009 Charles D. Knutson Software protection Filtering Access control Reporting Will talk about each of these in turn 22
© 2009 Charles D. Knutson Filtering principles A very hard problem! Missed content False positives Images much harder than text Subjective values at play 23
© 2009 Charles D. Knutson Filtering principles Black list Known bad sites are always blocked White list Only known good sites are allowed Dynamic content scan Examine contents on the fly Most software packages use all three approaches 24
© 2009 Charles D. Knutson Filtering solutions Internet service providers (ISPs) Filtering before content gets to your house Browser software Loaded directly on computer Intercepts data going to the browser Various price models Configurable for particular concerns 25
© 2009 Charles D. Knutson Controlling access User accounts on computer e.g., Kids account with constantly changing password No special software required Separate accounts for each child Potential management nightmare for parents 26
© 2009 Charles D. Knutson Controlling access Software controls for time and date If you're online when the time hits, will it shut down the pipe? Most applications control web browsing, but not other Internet traffic Rhapsody, Chess Live, iTunes, Chat, other specialized applications 27
© 2009 Charles D. Knutson Reporting software All good software packages have some sort of reporting capability Times, dates, sites visited, time spent On target computer Somewhat inconvenient Remote, online access notifications when problems 28
© 2009 Charles D. Knutson Detection How do you know when inappropriate material has been accessed? Manual You have to know where to look Software-assisted Tools to help you with forensics 29
© 2009 Charles D. Knutson Browser history Easy to read list of recent websites Every browser has this capability Every browser does this differently Some allow selective deletion All allow user to clear the history Be concerned with empty history Someone has cleared the history... Why? 30
© 2009 Charles D. Knutson Cache Folder containing all files associated with web browsing Many files for each page Every browser has a cache Every browser does it differently Clearing history generally does not clear the cache 31
© 2009 Charles D. Knutson Cookies Small files with information pertaining to particular websites Stores user name, password, other relevant information That's how Amazon recognizes you when you show up Generally located in the cache Gives more clues about surfing 32
© 2009 Charles D. Knutson Dangers of manual recon Danger of doing this alone While verifying where the browser has been on the Web, possible to accidentally ingest the same material Unlike discovering drug paraphernalia Parents can become addicted too! 33
© 2009 Charles D. Knutson Forensic tools Software is smart enough to know where to look Some tools will detect deleted files Some will obscure images to protect the person scanning the machine Generally sold to law enforcement markets Some tools available for home market 34
© 2009 Charles D. Knutson Other detection tools Some tools allow you to look at a computer after the fact Other tools have to be installed before inappropriate access occurs Logs all web access (and some other applications like chat) Grabs periodic screen capture Used when strong suspicion of inappropriate access, but no evidence turns up 35
© 2009 Charles D. Knutson Other detection tools Keyloggers capture all keystrokes entered on the machine Often capture other information as well Provides all text typed, including user names and passwords 36
© 2009 Charles D. Knutson Parental involvement Safest possible way is to always surf with your children May be impractical in a big family Preemptive strike Don't wait for an incident to teach Periodic Family Home Evening lessons Family Councils Be very frank and direct 37
© 2009 Charles D. Knutson Parental involvement Ask your children to show you what they do on the Internet Be aware Time spent on the computer Spiritual impact on your child Doesn't have to be "inappropriate" to have a severe negative effect Does the screen change suddenly when you appear in the room? 38
© 2009 Charles D. Knutson Individual agency Obvious ultimate issue Children grow up, become adults, move out of the house While young, they still have access outside your home They must have an internal commitment to avoid evil Cannot be mandated into them 39
© 2009 Charles D. Knutson When you find something Don't overreact If you're expecting it, easier to be calm Relationship is a must Honesty, open lines of communication 40
© 2009 Charles D. Knutson When you find something Talk to them about the Spirit How did you feel spiritually when you looked at that website? Did the Spirit withdraw or come closer? Why? 41
© 2009 Charles D. Knutson Support and encouragement Talk to them about true doctrine of sexuality There's a reason that this material is attractive Help them understand that this is a war, and they were attacked 42
© 2009 Charles D. Knutson Empowered parents This is an issue that is within our rights as parents We have permission to protect our children Do not abdicate your responsibility in this area! 43
© 2009 Charles D. Knutson The myth of maturity Inappropriate material is inappropriate for all ages Not a "maturity" or "adult" issue! No safe age for pornography No safe station in life Marriage is not a cure or a prevention Neither is Church service 44
© 2009 Charles D. Knutson Take a stand Don't be passive in your citizenship a website whose advertisements are inappropriate Kindly but firmly speak up wherever and whenever you see a site contributing to the over-sexualization of our society Silence is consent! 45
© 2009 Charles D. Knutson Questions? Internet Safety Podcast Internet Safety Wiki wiki.internetsafetypodcast.com Dr. Charles Knutson 46
Parenting the Online Child. Your Child Is on the Internet The Internet is a wonderful research tool. Reliance on the Internet in schools has grown rapidly.
Homeland Insecurity Inspect Your Gadgets Protecting Our Children In A Technologic World Your home is your castle. Has the mote been bridged?
+ Internet Safety – Overview and Discussion. + The Internet is a Great Tool The Internet is a great tool and can make your life easier and more fun: It.
A Publication of Bridgemark Solutions Six Keys to Generating More Sales Leads AND WINNING MORE MARKET RESEARCH PROJECTS.
Welcome to: Surfing Online Safely Brought to you by the MNPS Community Career Center.
INTRODUCTION To Internet Concepts & Using Internet in Our Life.
Cyber Safety: Keeping Your Kids Safe in a High Technology World Crime Prevention Bureau Thousand Oaks Police Department Sgt. Eric Hatlee
Computer Vulnerabilities 1. 1.Overview 2. 2.Threats to Computer Systems 3. 3.How Hackers Work 4. 4.Using the Internet Securely 5. 5.How We Make It Easy.
1.About ModemsAbout Modems 2.All About BroadbandAll About Broadband 3.Making ConnectionsMaking Connections 4.VirusesViruses 5.Data BackupData Backup 6.File.
Protecting Your Familys Soul and Safety Online Ernest Staats Technology Director MS Information Assurance, CISSP, MCSE, CNA, CWNA, CCNA, Security+, I-Net+,
EXPLORING SAFE WAYS TO USE TECHNOLOGY A How To for Families to Address Cyberbullying NHCS Bullying Protocol Review Team Student Services Linda.
SECURITY AWARENESS. The Importance of Security Awareness Training Security Awareness Training provides the knowledge to protect information systems and.
Reveal Course on Communication - Advanced This project has been funded with support from the European Commission. This publication reflects the views only.
You and Your Business on the Internet Ray Mills Raymond Mills & Associates.
Practice Ethical and Legal Use of Technology Copyright © Cannady ACOS. All rights reserved.
Digital Fluency Diagnostic for Staff The purpose of this diagnostic tool is to support individual staff efforts to improve their digital fluency. It can.
Inappropriate Use of IT Resources and How to Monitor Kevin Savoy, CPA, CISA, CISSP Director of Information Technology Audits Brian Daniels, CISA, GCFA.
Information Systems Using Information (Higher and Intermediate 2)
PARENTS/COMMUNITIES I NTERNET S AFETY P RESENTATION :
E-Safety Evening Tuesday 17 th November 2009 © Cambridgeshire County Council.
Section II and Final Papers 1. Fix problems with Section I and resubmit it with Section II as part of the final paper. 2. Make sure that you put a major.
The Parents and Carers Guide to the Internet Throughout this presentation we may refer to factsheets, parental control settings or video clips. Please.
Hot Topics in Technology Kent State University Committee Members: Jackie Kus Kristen Chorba Jenny Craig.
Facebook ABCs Effective Facebook Marketing.
Chapter 12 Technology. INTRODUCTION This chapter considers technology in general, with some limited emphasis on software. The life cycle and software.
Using Social Media to Generate Media Coverage and Improve Brand Sentiment Presented By Adeyemi Adeniyi ( B.sc, MCP, MCTS )
Beenleigh Scout Group Communication Plan. Overview What is a Communications Plan? Communications Text Message Communications Newsletter Communications.
INTERNET SAFETY 9 TH GRADE HEALTH. THE FACTS 70% of internet users are men and 30% are women Every 10 seconds there is a cyber crime committed 80% of.
Mount Auburn Hospital Information Security Awareness Training How to protect electronic information at work and at home.
Digital Footprints The objective of this lesson is to teach students how to create a positive digital footprint while interacting with social media. This.
© 2016 SlidePlayer.com Inc. All rights reserved.