Technical, Business, and Legal Dimensions of Protecting Children from Pornography on the Internet: Proceedings of a Workshop

Front Cover

In response to a mandate from Congress in conjunction with the Protection of Children from Sexual Predators Act of 1998, the Computer Science and Telecommunications Board (CSTB) and the Board on Children, Youth, and Families of the National Research Council (NRC) and the Institute of Medicine established the Committee to Study Tools and Strategies for Protecting Kids from Pornography and Their Applicability to Other Inappropriate Internet Content.

To collect input and to disseminate useful information to the nation on this question, the committee held two public workshops. On December 13, 2000, in Washington, D.C., the committee convened a workshop to focus on nontechnical strategies that could be effective in a broad range of settings (e.g., home, school, libraries) in which young people might be online. This workshop brought together researchers, educators, policy makers, and other key stakeholders to consider and discuss these approaches and to identify some of the benefits and limitations of various nontechnical strategies. The December workshop is summarized in Nontechnical Strategies to Reduce Children's Exposure to Inappropriate Material on the Internet: Summary of a Workshop. The second workshop was held on March 7, 2001, in Redwood City, California. This second workshop focused on some of the technical, business, and legal factors that affect how one might choose to protect kids from pornography on the Internet. The present report provides, in the form of edited transcripts, the presentations at that workshop.

 

What people are saying - Write a review

We haven't found any reviews in the usual places.

Contents

1 Basic Concepts in Information Retrieval
1
2 Text Categorization and Analysis
5
3 Categorization of Images
11
4 The Technology of Search Engines
16
A Major Filtering Product
23
6 Advanced Techniques for Automatic Web Filtering
33
7 A Critique of Filtering
36
8 Authentication Technologies
48
11 Digital Rights Management Technology
65
12 A Trusted Third Party in Digital Rights Management
76
13 Problems with a Dotxxx Domain
85
The Education Market
90
KidFriendly Internet Businesses
96
16 Business Models Based on Advertising
104
17 Constitutional Law and the Law of Cyberspace
110
Biographies of Presenters
124

9 Infrastructure for Age Verification
53
10 Automated Policy Preference Negotiation
62

Other editions - View all

Common terms and phrases

Bibliographic information