Presentation is loading. Please wait.

Presentation is loading. Please wait.

© 2009 Charles D. Knutson Online Pornography: Protecting Our Children and Our Families Dr. Charles D. Knutson Brigham Young University www.charlesknutson.net.

Similar presentations


Presentation on theme: "© 2009 Charles D. Knutson Online Pornography: Protecting Our Children and Our Families Dr. Charles D. Knutson Brigham Young University www.charlesknutson.net."— Presentation transcript:

1 © 2009 Charles D. Knutson Online Pornography: Protecting Our Children and Our Families Dr. Charles D. Knutson Brigham Young University www.charlesknutson.net

2 © 2009 Charles D. Knutson The scope of the problem  Around 200 million websites  Around 63 billion publicly indexable web pages, 550 billion documents  Some studies suggest as many as 60% of all websites are pornographic in nature  Ignores pornographic or inappropriate content on non-pornographic sites  YouTube, Hulu, other streaming media sites 2

3 © 2009 Charles D. Knutson President Hinckley, 2004 I recently read that pornography has become a $57 billion industry worldwide. Twelve billion of this is derived in the United States by evil and "conspiring men" (see D&C 89:4) who seek riches at the expense of the gullible. It is reported that it produces more revenue in the United States than the "combined revenues of all professional football, baseball and basketball franchises or the combined revenues of ABC, CBS, and NBC." 3

4 © 2009 Charles D. Knutson President Hinckley, 2004 The National Coalition for the Protection of Children and Families states that "approximately 40 million people in the United States are sexually involved with the Internet. "One in five children ages 10–17 [has] received a sexual solicitation over the Internet. "Three million of the visitors to adult websites in September 2000 were age 17 or younger. "Sex is the number 1 topic searched on the Internet." 4

5 © 2009 Charles D. Knutson Some statistics  90% of 8-16 year-olds have viewed online pornography  Most while doing homework  The average age of exposure to pornography now is nine years old  Changes in the brain during childhood and teen years compound pornography's effect  Protection of younger kids is especially critical 5

6 © 2009 Charles D. Knutson Some statistics  34% of porn site hits are from girls  Girls begin to develop appetite from:  Teen magazines  Soap Operas/TV  Romance novels  The hook of pornography can be just as quick for girls as for guys 6

7 © 2009 Charles D. Knutson A huge statistic! Only 23% of households have any rules at all about what children can do online! 7

8 © 2009 Charles D. Knutson Fundamental questions  Should we even try to protect them from content?  They're going to be exposed sooner or later...  How much can the Internet really affect our children's lives?  Is it really that bad? 8

9 © 2009 Charles D. Knutson Fundamental questions  What can we do to help make the Internet a safer place for our children?  I don't even know where to start  What should we do when we discover we have a problem?  I'm not sure I'm ready to deal with that 9

10 © 2009 Charles D. Knutson Other challenging questions  Pres. Hinckley said to avoid it like a plague… So why don't people just stay away from it?  It's incredibly addictive  It's increasingly ubiquitous  How do you avoid a plague that's in your pocket?  It's not necessarily a place to avoid… 10

11 © 2009 Charles D. Knutson Four A's of Internet porn 1. Accessible  No need to travel to a particular part of town, or enter a particular store  Just a click away 2. Affordable  Lots of teaser material for free  So how do they make money?  Once you're hooked, you break out your credit card for quantity, quality, or coarseness 11

12 © 2009 Charles D. Knutson Four A's of Internet porn 3. Anonymous  Access is largely private and anonymous  Addiction can more easily be kept secret 4. Aggressive  Material is increasingly aggressive and predatorial  The material will come looking for you even if you're not looking for it 12

13 © 2009 Charles D. Knutson Factors for control  Internal control – Agency  The ultimate and only true protection  But remember that addiction inhibits agency…  External controls – Technology  Still need to protect ourselves from a technological perspective  We'll cover technology first… 13

14 © 2009 Charles D. Knutson Most common activities  Web browsing  Google searching, aimless surfing  Image searching and surfing  Social networking  Facebook, MySpace, other sites  Online chatting  Accessing media  Music files, watching streaming video  Peer-to-peer applications 14

15 © 2009 Charles D. Knutson Peer-to-peer applications  90% of content shared in peer-to-peer applications is illegal or pornographic  Some applications load spyware and/or other malware on your computer  Kazaa, Grokster, Gnutella, Emule, Edonkey, BearShare, LimeWire  Dr. K sez: Not recommended!! 15

16 © 2009 Charles D. Knutson Web browsers  Kids often download browsers  Not the one you think they're using Internet Explorer53% Firefox31% Safari 3% Chrome 3% Opera 1% 16

17 © 2009 Charles D. Knutson Online searching  Google – Most popular search engine  Preferences  SafeSearch filtering – Three levels  Helps to mitigate accidental exposure  With SafeSearch off, high likelihood of turning up inappropriate content on almost any search phrase  Limitations  Anyone can change the settings  Still not foolproof 17

18 © 2009 Charles D. Knutson Online searching  Beware of image and video search  Much more difficult to filter images than text  When searching for text, search engines provide preliminary information to help you see what's on the page if you click through to it 18

19 © 2009 Charles D. Knutson Online searching  When searching for images, search engine presents thumbnail images  If inappropriate material turns up in the search…  It's immediately visible, even though somewhat small  It's already ingested  Which may trigger additional interest or desire to seek out addictive material 19

20 © 2009 Charles D. Knutson Example – Text search 20

21 © 2009 Charles D. Knutson Example – Image search 21

22 © 2009 Charles D. Knutson Software protection  Filtering  Access control  Reporting  Will talk about each of these in turn 22

23 © 2009 Charles D. Knutson Filtering principles  A very hard problem!  Missed content  False positives  Images much harder than text  Subjective values at play 23

24 © 2009 Charles D. Knutson Filtering principles  Black list  Known bad sites are always blocked  White list  Only known good sites are allowed  Dynamic content scan  Examine contents on the fly  Most software packages use all three approaches 24

25 © 2009 Charles D. Knutson Filtering solutions  Internet service providers (ISPs)  Filtering before content gets to your house  Browser software  Loaded directly on computer  Intercepts data going to the browser  Various price models  Configurable for particular concerns 25

26 © 2009 Charles D. Knutson Controlling access  User accounts on computer  e.g., Kids account with constantly changing password  No special software required  Separate accounts for each child  Potential management nightmare for parents 26

27 © 2009 Charles D. Knutson Controlling access  Software controls for time and date  If you're online when the time hits, will it shut down the pipe?  Most applications control web browsing, but not other Internet traffic  Rhapsody, Chess Live, iTunes, Chat, other specialized applications 27

28 © 2009 Charles D. Knutson Reporting software  All good software packages have some sort of reporting capability  Times, dates, sites visited, time spent  On target computer  Somewhat inconvenient  Remote, online access  Email notifications when problems 28

29 © 2009 Charles D. Knutson Detection  How do you know when inappropriate material has been accessed?  Manual  You have to know where to look  Software-assisted  Tools to help you with forensics 29

30 © 2009 Charles D. Knutson Browser history  Easy to read list of recent websites  Every browser has this capability  Every browser does this differently  Some allow selective deletion  All allow user to clear the history  Be concerned with empty history  Someone has cleared the history...  Why? 30

31 © 2009 Charles D. Knutson Cache  Folder containing all files associated with web browsing  Many files for each page  Every browser has a cache  Every browser does it differently  Clearing history generally does not clear the cache 31

32 © 2009 Charles D. Knutson Cookies  Small files with information pertaining to particular websites  Stores user name, password, other relevant information  That's how Amazon recognizes you when you show up  Generally located in the cache  Gives more clues about surfing 32

33 © 2009 Charles D. Knutson Dangers of manual recon  Danger of doing this alone  While verifying where the browser has been on the Web, possible to accidentally ingest the same material  Unlike discovering drug paraphernalia  Parents can become addicted too! 33

34 © 2009 Charles D. Knutson Forensic tools  Software is smart enough to know where to look  Some tools will detect deleted files  Some will obscure images to protect the person scanning the machine  Generally sold to law enforcement markets  Some tools available for home market 34

35 © 2009 Charles D. Knutson Other detection tools  Some tools allow you to look at a computer after the fact  Other tools have to be installed before inappropriate access occurs  Logs all web access (and some other applications like chat)  Grabs periodic screen capture  Used when strong suspicion of inappropriate access, but no evidence turns up 35

36 © 2009 Charles D. Knutson Other detection tools  Keyloggers capture all keystrokes entered on the machine  Often capture other information as well  Provides all text typed, including user names and passwords 36

37 © 2009 Charles D. Knutson Parental involvement  Safest possible way is to always surf with your children  May be impractical in a big family  Preemptive strike  Don't wait for an incident to teach  Periodic Family Home Evening lessons  Family Councils  Be very frank and direct 37

38 © 2009 Charles D. Knutson Parental involvement  Ask your children to show you what they do on the Internet  Be aware  Time spent on the computer  Spiritual impact on your child  Doesn't have to be "inappropriate" to have a severe negative effect  Does the screen change suddenly when you appear in the room? 38

39 © 2009 Charles D. Knutson Individual agency  Obvious ultimate issue  Children grow up, become adults, move out of the house  While young, they still have access outside your home  They must have an internal commitment to avoid evil  Cannot be mandated into them 39

40 © 2009 Charles D. Knutson When you find something  Don't overreact  If you're expecting it, easier to be calm  Relationship is a must  Honesty, open lines of communication 40

41 © 2009 Charles D. Knutson When you find something  Talk to them about the Spirit  How did you feel spiritually when you looked at that website?  Did the Spirit withdraw or come closer? Why? 41

42 © 2009 Charles D. Knutson Support and encouragement  Talk to them about true doctrine of sexuality  There's a reason that this material is attractive  Help them understand that this is a war, and they were attacked 42

43 © 2009 Charles D. Knutson Empowered parents  This is an issue that is within our rights as parents  We have permission to protect our children  Do not abdicate your responsibility in this area! 43

44 © 2009 Charles D. Knutson The myth of maturity  Inappropriate material is inappropriate for all ages  Not a "maturity" or "adult" issue!  No safe age for pornography  No safe station in life  Marriage is not a cure or a prevention  Neither is Church service 44

45 © 2009 Charles D. Knutson Take a stand  Don't be passive in your citizenship  Email a website whose advertisements are inappropriate  Kindly but firmly speak up wherever and whenever you see a site contributing to the over-sexualization of our society  Silence is consent! 45

46 © 2009 Charles D. Knutson Questions?  Internet Safety Podcast  www.internetsafetypodcast.com  Internet Safety Wiki  wiki.internetsafetypodcast.com Dr. Charles Knutson knutson@cs.byu.edu 46


Download ppt "© 2009 Charles D. Knutson Online Pornography: Protecting Our Children and Our Families Dr. Charles D. Knutson Brigham Young University www.charlesknutson.net."

Similar presentations


Ads by Google