Technical, Business, and Legal Dimensions of Protecting Children from Pornography on the Internet:: Proceedings of a Workshop

Front Cover

In response to a mandate from Congress in conjunction with the Protection of Children from Sexual Predators Act of 1998, the Computer Science and Telecommunications Board (CSTB) and the Board on Children, Youth, and Families of the National Research Council (NRC) and the Institute of Medicine established the Committee to Study Tools and Strategies for Protecting Kids from Pornography and Their Applicability to Other Inappropriate Internet Content.

To collect input and to disseminate useful information to the nation on this question, the committee held two public workshops. On December 13, 2000, in Washington, D.C., the committee convened a workshop to focus on nontechnical strategies that could be effective in a broad range of settings (e.g., home, school, libraries) in which young people might be online. This workshop brought together researchers, educators, policy makers, and other key stakeholders to consider and discuss these approaches and to identify some of the benefits and limitations of various nontechnical strategies. The December workshop is summarized in Nontechnical Strategies to Reduce Children's Exposure to Inappropriate Material on the Internet: Summary of a Workshop. The second workshop was held on March 7, 2001, in Redwood City, California. This second workshop focused on some of the technical, business, and legal factors that affect how one might choose to protect kids from pornography on the Internet. The present report provides, in the form of edited transcripts, the presentations at that workshop.

  

What people are saying - Write a review

We haven't found any reviews in the usual places.

Contents

Basic Concepts in Information Retrieval
1
12 PROBLEMS
2
Text Categorization and Analysis
5
22 ADVANCED TEXT TECHNOLOGY
7
Categorization of Images
11
32 SCREENING OF PORNOGRAPHIC IMAGES
12
33 THE FUTURE
14
The Technology of Search Engines
16
62 THE WIPE SYSTEM
34
A Critique of Filtering
36
72 DEFICIENCIES IN FILTERING PROGRAMS
37
73 EXPERIMENTS BY PEACEFIREORG
38
74 CIRCUMVENTION OF BLOCKING SOFTWARE
45
Authentication Technologies
48
82 CHALLENGES AND SOLUTIONS
50
Infrastructure for Age Verification
53

42 BOOLEAN SEARCH LOGIC
17
43 THE VECTOR SPACE MODEL
18
44 SEARCHING THE WORLD WIDE WEB
19
Cyber Patrol A Major Filtering Product
23
52 WHY FILTER?
24
53 SUPERSCOUT AND CYBER PATROL
25
54 THE REVIEW PROCESS
29
55 THE FUTURE
31
Advanced Techniques for Automatic Web Filtering
33
92 SOLUTIONS
56
93 THE EXTENT OF THE PROBLEM
59
Automated Policy Preference Negotiation
62
Digital Rights Management Technology
65
112 DESIGNING A SOLUTION TO FIT THE CONSTRAINTS
67
113 PROTECTING CHILDREN
73
114 SUMMARY
75
Copyright

Common terms and phrases

Bibliographic information