1 Filtering - Is This The Answer? Sarah Ormes UKOLN University of Bath Bath, BA2 7AY UKOLN is funded by the Library and Information Commission, the Joint.

Slides:



Advertisements
Similar presentations
1 An Introduction to Filtering: Issues and Possible Solutions Sarah Ormes UKOLN University of Bath Bath, BA2 7AY UKOLN is funded by the Library and Innovation.
Advertisements

Stories from the Web Sarah Ormes, UKOLN UKOLN is funded by Resource: The Council for Museums, Archives & Libraries.
1 REVEALed: the truth behind the National Database of Resources in Accessible Formats Ann Chapman Margaret Sheridan UKOLN Reveal Project Manager University.
Midlothian Council Library Service Public Access Internet and Content Filtering.
Unit 4- Assignment 3 P5, P6, M2 BTEC Business Level 3.
Internet Safety in Henry County Schools By the division’s Internet Safety Task Force.
1 Possible Ways Forward Sarah Ormes UKOLN University of Bath Bath, BA2 7AY
Riverside Community School District
ASP.NET 2.0 Chapter 6 Securing the ASP.NET Application.
The Role of the Public Library in the Digital Age Sarah Ormes UKOLN University of Bath Bath, BA2 7AY UKOLN is funded by the Library and Information Commission,
Jared Cinque Section 6.  Internet tracking is the process of following internet activity backwards from recipient to user through a special type of software.
Filtering, CIPA, Internet Safety, and Your Sanity Art Wolinsky Andy Carvin
Internet Filtering : Should libraries filter internet content? Paul M. Schoenhard ’00 CS 99, 00W 7 March 2000.
Internet Censorship In order of appearance: Dmitriy Bespalov Ilya Braude Brian McBurney Yaroslav Volkov.
Internet safety By Lydia Snowden.
Internet Safety Guide for Teens Don’t give out personal information about yourself, your family situation, your school, your telephone number, or your.
Digital Literacy Tour Google/iKeepSafe/YouTube Presenter Introduction Davina Pruitt-Mentle, Ph.D. Ed Tech Policy, Research and Outreach.
Building a site on the World Wide Web requires more than simply learning the HTML language and starting out. You need to get a place to put your Web pages,
Reliability & Desirability of Data
1 If I Could Start All Over Again: Lessons To be Learnt From The HE Community Brian Kelly UK Web Focus UKOLN University of Bath Bath, BA2 7AY UKOLN is.
Computer Importance in Children Hundreds of schools in America are still not capable of supplying computer access to students. Was ZapMe a solution?
The Savvy Cyber Teacher ® Using the Internet Effectively in the K-12 Classroom Copyright  2001 Stevens Institute of Technology, CIESE, All Rights Reserved.
The Internet for Beginners Section Four of Four From the Richard Sugden Library Spencer, MA Jillian M. Parsons.
®® Microsoft Windows 7 Windows Tutorial 5 Protecting Your Computer.
Technologies For Hybrid Libraries: Implementation Issues Brian Kelly UK Web Focus UKOLN University of Bath Bath, BA2 7AY UKOLN is funded by the Library.
Project Management Methodology Project Closing. Project closing stage Must be performed for all projects, successfully completed or shut off by management.
1 Quality Center 10.0 NOTE: Uninstall the current version of QC before downloading QC All QC 10.0 documents can be located on the BI Shared Services.
Event Management & ITIL V3
1 The strange case of Harry Potter and the invisible Marijuana Sarah Ormes UKOLN University of Bath Bath, BA2 7AY UKOLN is funded by the Library and Information.
SharePoint document libraries I: Introduction to sharing files Sharjah Higher Colleges of Technology presents:
Tim Reid Malvern Parish C.E Primary School Internet Safety.
Computer Security 2 Keeping your computer safe. Computer Security 2 Computer Security 2 includes two lessons:  Lesson 3: Protecting yourself and your.
1 The Technical Standards and Your Bid Sarah Ormes UKOLN University of Bath Bath, BA2 7AY UKOLN is funded by Resource: The Council for Museums, Archives.
How to Install Malwarebytes Anti- Malware Software Khushbu Shah ENG 393 May 4 th, 2010.
Digital Citizenship Lesson 3. Does it Matter who has your Data What kinds of information about yourself do you share online? What else do you do online.
Web is public space. So, when we are connected to it we have to follow some rules. What is illegal Offline is illegal Online!!! Internet gives us opportunities.
The Savvy Cyber Teacher ® Using the Internet Effectively in the K-12 Classroom 1Copyright © 2001 Stevens Institute of Technology, CIESE, All Rights Reserved.
INTERNET PRESENTATION. WHAT IS THE INTERNET? The worlds largest computer network. A collection of local, regional and national computer networks linked.
Internet Presentation. What is the Internet? The worlds largest computer network. A collection of local, regional and national computer networks linked.
Online Safety How to keep our students safe on the Internet.
Using the Right Method to Collect Information IW233 Amanda Murphy.
Web Browser-Parental Control Armenda Fourte’ July 27, 2007.
Internet Filtering seyed Ehsan shariaty shiraz university of Technology.
McLean HIGHER COMPUTER NETWORKING Lesson 14 Firewalls & Filtering Comparison of Internet content filtering methods: firewalls, Internet filtering.
Educational Computing David Goldschmidt, Ph.D. Computer Science The College of Saint Rose CIS 204 Spring 2009.
Can We Keep Our Kids Safe on the Internet? By Kim Hollingsworth - ETEC 562.
Suggestions for Parents Take the time to see what your kids are doing online and what their interests are. Let them teach you about the Internet. Surf.
30-Oct-2000 Introduction to the Internet §14: :30 Session 1 §15: :00 Session 2 §Vivien Hall, Birkbeck CCS §Please sign register and collect.
Disseminating News Within Your Organisation Brian Kelly UKOLN University of Bath Bath, BA2 7AY UKOLN is supported by: URL
Privacy Issues on The Internet. Login if you want everyone to see your private life * * * * *
Development of Electronic Services in Public Libraries: Issues and Possibilities Sally Criddle UKOLN University of Bath Bath, BA2 7AY UKOLN is funded by.
ICS 424: Freedom of expression Aj. Thoranin Intarajak.
1 Filtering Web Content for Staff and the Public Sarah Ormes UKOLN University of Bath Bath, BA2 7AY UKOLN is funded by Resource: The Council for Museums,
Slides prepared by Cyndi Chie and Sarah Frye A Gift of Fire Third edition Sara Baase Chapter 3: Freedom of Speech.
Connecting Brevard’s Families to Essential Information and Services March 6, 2010.
1 Metadata – Has The Time Arrived? Brian Kelly UK Web Focus UKOLN University of Bath Bath, BA2 7AY UKOLN is funded by the Library and Information Commission,
University Website Office August 2002 University Web Guidelines ● Objectives ● Outline ● Development Process.
Unit 2 Assignment 1. Spyware Spyware is a software that gathers information about a person or site and uses it without you knowing. It can send your information.
Laws and Rules That Govern Internet Safety Ashley Martin.
Security Issues and Ethics in Education Chapter 8 Brooke Blanscet, Morgan Chatman, Lynsey Turner, Bryan Howerton.
Safe Internet Usage in the Classroom Lynne Schalman The Original Teaching Company
Internet Filtering Outline Defining internet filtering Arguments for filtering Arguments against filtering Is it an issue in South Africa?
By: Brett Belin. Used to be only tackled by highly trained professionals As the internet grew, more and more people became familiar with securing a network.
Acceptable Use Policy (Draft)
Children’s Internet Protection Act (CIPA)
ITE 130 Web Searching.
Egypt’s Internet Safety Project
Unit 3 Information Systems
A Gift of Fire Third edition Sara Baase
A Gift of Fire Third edition Sara Baase
Presentation transcript:

1 Filtering - Is This The Answer? Sarah Ormes UKOLN University of Bath Bath, BA2 7AY UKOLN is funded by the Library and Information Commission, the Joint Information Systems Committee (JISC) of the Higher Education Funding Councils, as well as by project funding from the JISC and the European Union. UKOLN also receives support from the University of Bath where it is based. URL

2 Today we will cover … What are filters, how do they work, how well do they work? Pros and Cons of Using a Filter Things to think about if you do Things to think about if you don’t Acceptable Use Policies

3 What’s the Question? All libraries providing access to the Internet need to address the following issues: Some users will deliberately access and view pornography Children could gain access to ‘offensive sites’ The library could by default provide access to illegal material

4 What is Filtering? Software which is used to control access to material on the Internet Typically used to prevent access to pornography and other potentially offensive material Used in many organisations including public libraries and schools

5 How Does it Work? Four main methods used: Keyword blocking Site blocking Web rating systems Walled Garden approach Combinations of the above

6 Keyword Blocking Uses a list of ‘objectional terms’ Blocks any or part of pages/ s containing these words Can be inaccurate e.g. Essex, Dick Whittington, Penistone could be blocked Generally viewed as the least sophisticated method

7 Site Blocking (1) Software company maintains a list of ‘dubious Internet sites’ The software prevents access to any sites on this list ‘Denial lists’ regularly updated Some software provides control over what categories of information you block

8 Site Blocking (2) Who decides what goes on the ‘denial list’ and what criteria are they using? Can you keep track of the whole Internet? Filters can use both site blocking and word blocking.

9 Web Rating Systems (1) Web sites rated in terms of nudity, sex, violence and language RSACI Nudity Categories Level 4: Provocative Frontal Nudity Level 3: Frontal Nudity Level 2: Partial Nudity Level 1: Revealing Attire Level 0: None of the Above

10 Web Rating Systems (2) Ratings either done by web page author or by independent bureau Browsers set to only accept pages with certain levels of ratings Very low take up so far Who decides the ratings?

11 Walled Garden Approach Only provide access to a set of approved links Analogous to book selection Time consuming and hard work Means users will only have access to a tiny percentage of Internet resources

12 How well do they work? The Internet Filter Assessment Project Over 35% of the time, the filters blocked some information needed to answer a question Eight percent of what filters accessed they determined was ‘objectionable’ The Internet Filter Assessment Project

13 Stories From the Web

14 Stories from the Web through a filter

15 Searching for ‘SXXXXhorpe’

16 Slipping through the Net (1)

17 Slipping through the Net (2)

18

19 At the Moment… Filters do not work perfectly - they block valid resources and they don’t block some objectionable resource Filters do block a lot of objectionable material Filters are the only product available at the moment Is it a matter of what your acceptable level of failure is?

20 Pros Deselecting poor quality resources haven’t libraries always done this? Children and pornography making the library as safe an environment as possible Legal issues protecting the library from legal challenges Being seen to be doing something public knows the library is trying to provide a safe environment

21 Cons Freedom of access to information The library starts censoring Who decides what is filtered? How sophisticated are the selections? The library as the information ‘safety net’ The only access point to the Internet for some users Legal issues Can you provide a safe environment with filters?

22 Providing an appropriate Internet environment A filter is not THE solution It is one step of managing access It is not an easy option Incorporate filtering into an implementable policy Choosing a Filter Presentation

23 The Perfect Filter! Blocking can be en/disabled Access to list of blocked words and sites Add/remove words and sites from lists Blocking based on PICS Blocking by time, location, status of user Methods of alerting users these products are in use Understandable ‘blocked’ message.

24 Managing Access without a Filter Offer training classes for parents and children Privacy screens? Can children surf alone? Do they need their parent’s permission? Provide useful collections of links Publicise your rules

25 Draw up an Acceptable Use Policy

26 Essential Policy Components (1) Why does the library provide Internet access (relate to other library policies)? What type of material can be accessed on the Internet? (warning) What responsibility does the library have for material accessed and how this material is used?

27 Who will be able to use the library’s Internet workstations? What type of resources can/can’t users access? How do you expect your users to act? Essential Policy Components (2)

28 What will happen if they break these rules? What are the rules about children? Do they need parental permission? Essential Policy Components (3)

29 Filtering Does the library filter? Why did it decide to filter? How was the filtering tool chosen? What does it do? Essential Policy Components (4)

30 Access, Security and Control Access What kind of access do you want to provide and why? Security Do filters answer your security problems? Control Is your library in control?

31 Further Information An Introduction to Filtering - available at policy/issue_papers/nocolumns.htm Schneider, K. (1997) A Practical Guide to Internet Filters. Neal Schuman: New York. Other links and this presentation at present/london/