Download presentation
Presentation is loading. Please wait.
Published byBrionna Priddle Modified over 9 years ago
1
© 2009 Charles D. Knutson Online Pornography: Protecting Our Children and Our Families Dr. Charles D. Knutson Brigham Young University www.charlesknutson.net
2
© 2009 Charles D. Knutson The scope of the problem Around 200 million websites Around 63 billion publicly indexable web pages, 550 billion documents Some studies suggest as many as 60% of all websites are pornographic in nature Ignores pornographic or inappropriate content on non-pornographic sites YouTube, Hulu, other streaming media sites 2
3
© 2009 Charles D. Knutson President Hinckley, 2004 I recently read that pornography has become a $57 billion industry worldwide. Twelve billion of this is derived in the United States by evil and "conspiring men" (see D&C 89:4) who seek riches at the expense of the gullible. It is reported that it produces more revenue in the United States than the "combined revenues of all professional football, baseball and basketball franchises or the combined revenues of ABC, CBS, and NBC." 3
4
© 2009 Charles D. Knutson President Hinckley, 2004 The National Coalition for the Protection of Children and Families states that "approximately 40 million people in the United States are sexually involved with the Internet. "One in five children ages 10–17 [has] received a sexual solicitation over the Internet. "Three million of the visitors to adult websites in September 2000 were age 17 or younger. "Sex is the number 1 topic searched on the Internet." 4
5
© 2009 Charles D. Knutson Some statistics 90% of 8-16 year-olds have viewed online pornography Most while doing homework The average age of exposure to pornography now is nine years old Changes in the brain during childhood and teen years compound pornography's effect Protection of younger kids is especially critical 5
6
© 2009 Charles D. Knutson Some statistics 34% of porn site hits are from girls Girls begin to develop appetite from: Teen magazines Soap Operas/TV Romance novels The hook of pornography can be just as quick for girls as for guys 6
7
© 2009 Charles D. Knutson A huge statistic! Only 23% of households have any rules at all about what children can do online! 7
8
© 2009 Charles D. Knutson Fundamental questions Should we even try to protect them from content? They're going to be exposed sooner or later... How much can the Internet really affect our children's lives? Is it really that bad? 8
9
© 2009 Charles D. Knutson Fundamental questions What can we do to help make the Internet a safer place for our children? I don't even know where to start What should we do when we discover we have a problem? I'm not sure I'm ready to deal with that 9
10
© 2009 Charles D. Knutson Other challenging questions Pres. Hinckley said to avoid it like a plague… So why don't people just stay away from it? It's incredibly addictive It's increasingly ubiquitous How do you avoid a plague that's in your pocket? It's not necessarily a place to avoid… 10
11
© 2009 Charles D. Knutson Four A's of Internet porn 1. Accessible No need to travel to a particular part of town, or enter a particular store Just a click away 2. Affordable Lots of teaser material for free So how do they make money? Once you're hooked, you break out your credit card for quantity, quality, or coarseness 11
12
© 2009 Charles D. Knutson Four A's of Internet porn 3. Anonymous Access is largely private and anonymous Addiction can more easily be kept secret 4. Aggressive Material is increasingly aggressive and predatorial The material will come looking for you even if you're not looking for it 12
13
© 2009 Charles D. Knutson Factors for control Internal control – Agency The ultimate and only true protection But remember that addiction inhibits agency… External controls – Technology Still need to protect ourselves from a technological perspective We'll cover technology first… 13
14
© 2009 Charles D. Knutson Most common activities Web browsing Google searching, aimless surfing Image searching and surfing Social networking Facebook, MySpace, other sites Online chatting Accessing media Music files, watching streaming video Peer-to-peer applications 14
15
© 2009 Charles D. Knutson Peer-to-peer applications 90% of content shared in peer-to-peer applications is illegal or pornographic Some applications load spyware and/or other malware on your computer Kazaa, Grokster, Gnutella, Emule, Edonkey, BearShare, LimeWire Dr. K sez: Not recommended!! 15
16
© 2009 Charles D. Knutson Web browsers Kids often download browsers Not the one you think they're using Internet Explorer53% Firefox31% Safari 3% Chrome 3% Opera 1% 16
17
© 2009 Charles D. Knutson Online searching Google – Most popular search engine Preferences SafeSearch filtering – Three levels Helps to mitigate accidental exposure With SafeSearch off, high likelihood of turning up inappropriate content on almost any search phrase Limitations Anyone can change the settings Still not foolproof 17
18
© 2009 Charles D. Knutson Online searching Beware of image and video search Much more difficult to filter images than text When searching for text, search engines provide preliminary information to help you see what's on the page if you click through to it 18
19
© 2009 Charles D. Knutson Online searching When searching for images, search engine presents thumbnail images If inappropriate material turns up in the search… It's immediately visible, even though somewhat small It's already ingested Which may trigger additional interest or desire to seek out addictive material 19
20
© 2009 Charles D. Knutson Example – Text search 20
21
© 2009 Charles D. Knutson Example – Image search 21
22
© 2009 Charles D. Knutson Software protection Filtering Access control Reporting Will talk about each of these in turn 22
23
© 2009 Charles D. Knutson Filtering principles A very hard problem! Missed content False positives Images much harder than text Subjective values at play 23
24
© 2009 Charles D. Knutson Filtering principles Black list Known bad sites are always blocked White list Only known good sites are allowed Dynamic content scan Examine contents on the fly Most software packages use all three approaches 24
25
© 2009 Charles D. Knutson Filtering solutions Internet service providers (ISPs) Filtering before content gets to your house Browser software Loaded directly on computer Intercepts data going to the browser Various price models Configurable for particular concerns 25
26
© 2009 Charles D. Knutson Controlling access User accounts on computer e.g., Kids account with constantly changing password No special software required Separate accounts for each child Potential management nightmare for parents 26
27
© 2009 Charles D. Knutson Controlling access Software controls for time and date If you're online when the time hits, will it shut down the pipe? Most applications control web browsing, but not other Internet traffic Rhapsody, Chess Live, iTunes, Chat, other specialized applications 27
28
© 2009 Charles D. Knutson Reporting software All good software packages have some sort of reporting capability Times, dates, sites visited, time spent On target computer Somewhat inconvenient Remote, online access Email notifications when problems 28
29
© 2009 Charles D. Knutson Detection How do you know when inappropriate material has been accessed? Manual You have to know where to look Software-assisted Tools to help you with forensics 29
30
© 2009 Charles D. Knutson Browser history Easy to read list of recent websites Every browser has this capability Every browser does this differently Some allow selective deletion All allow user to clear the history Be concerned with empty history Someone has cleared the history... Why? 30
31
© 2009 Charles D. Knutson Cache Folder containing all files associated with web browsing Many files for each page Every browser has a cache Every browser does it differently Clearing history generally does not clear the cache 31
32
© 2009 Charles D. Knutson Cookies Small files with information pertaining to particular websites Stores user name, password, other relevant information That's how Amazon recognizes you when you show up Generally located in the cache Gives more clues about surfing 32
33
© 2009 Charles D. Knutson Dangers of manual recon Danger of doing this alone While verifying where the browser has been on the Web, possible to accidentally ingest the same material Unlike discovering drug paraphernalia Parents can become addicted too! 33
34
© 2009 Charles D. Knutson Forensic tools Software is smart enough to know where to look Some tools will detect deleted files Some will obscure images to protect the person scanning the machine Generally sold to law enforcement markets Some tools available for home market 34
35
© 2009 Charles D. Knutson Other detection tools Some tools allow you to look at a computer after the fact Other tools have to be installed before inappropriate access occurs Logs all web access (and some other applications like chat) Grabs periodic screen capture Used when strong suspicion of inappropriate access, but no evidence turns up 35
36
© 2009 Charles D. Knutson Other detection tools Keyloggers capture all keystrokes entered on the machine Often capture other information as well Provides all text typed, including user names and passwords 36
37
© 2009 Charles D. Knutson Parental involvement Safest possible way is to always surf with your children May be impractical in a big family Preemptive strike Don't wait for an incident to teach Periodic Family Home Evening lessons Family Councils Be very frank and direct 37
38
© 2009 Charles D. Knutson Parental involvement Ask your children to show you what they do on the Internet Be aware Time spent on the computer Spiritual impact on your child Doesn't have to be "inappropriate" to have a severe negative effect Does the screen change suddenly when you appear in the room? 38
39
© 2009 Charles D. Knutson Individual agency Obvious ultimate issue Children grow up, become adults, move out of the house While young, they still have access outside your home They must have an internal commitment to avoid evil Cannot be mandated into them 39
40
© 2009 Charles D. Knutson When you find something Don't overreact If you're expecting it, easier to be calm Relationship is a must Honesty, open lines of communication 40
41
© 2009 Charles D. Knutson When you find something Talk to them about the Spirit How did you feel spiritually when you looked at that website? Did the Spirit withdraw or come closer? Why? 41
42
© 2009 Charles D. Knutson Support and encouragement Talk to them about true doctrine of sexuality There's a reason that this material is attractive Help them understand that this is a war, and they were attacked 42
43
© 2009 Charles D. Knutson Empowered parents This is an issue that is within our rights as parents We have permission to protect our children Do not abdicate your responsibility in this area! 43
44
© 2009 Charles D. Knutson The myth of maturity Inappropriate material is inappropriate for all ages Not a "maturity" or "adult" issue! No safe age for pornography No safe station in life Marriage is not a cure or a prevention Neither is Church service 44
45
© 2009 Charles D. Knutson Take a stand Don't be passive in your citizenship Email a website whose advertisements are inappropriate Kindly but firmly speak up wherever and whenever you see a site contributing to the over-sexualization of our society Silence is consent! 45
46
© 2009 Charles D. Knutson Questions? Internet Safety Podcast www.internetsafetypodcast.com Internet Safety Wiki wiki.internetsafetypodcast.com Dr. Charles Knutson knutson@cs.byu.edu 46
Similar presentations
© 2024 SlidePlayer.com Inc.
All rights reserved.