SlideShare ist ein Scribd-Unternehmen logo
1 von 8
Parental controls: An overview

         Larry Magid
           Co-Director
        ConnectSafely.org




         Safer Internet Day
         Moscow, February 2012
Filtering technologies


                            Device
     None                               DNS Level




                                        ISP Mandatory
                         Router
ISP Optional
What parental controls can do
• Block undesirable content such as sites containing
  sexual images or advocate violence or use of drugs or
  alcohol
• Block websites that parents or authorities are
  concerned about such as social networking
  (Facebook, Google+, Twitter)
• Limit how a child uses a device by total amount of
  time per day, time of day or day of week
• Block or limit features on device such as
  texting, games, web access or any specific program or
  app
• Monitor & report on use of device or service
Technical Issues around filtering
• Overblocking
• Underblocking
• Levels of control
   • Granularity gives greater control but more
     confusing
• Parental white listing tools
• Parental black listing tools
• Filtering vs. monitoring
   • Issues of “too much information”
   • Children’s privacy (trust factor)
   • Stealth vs. open
What filters can’t do very well
• Prevent bullying and peer harassment
• Prevent posting inappropriate content
   – reputation damage
• Prevent inappropriate or unwanted contact*
• Tech self-control and critical thinking*

*Monitoring technologies can be used for these purposes
Monitoring
• Can run on device or on network
• Should it report report all activity or just
  suspicious activity?
• Should it report on private conversations or
  just public postings or what people are
  saying about child?
  • Safetyweb vs. Spectorsoft
• Can run in stealth mode or require child to
  know it’s running
Social Issues around parental controls
•   Openness of what is being filtered and by what
    criteria
•   Part of a conversation or stealth mode?
•   How and when do you wean children away from
    filtering?
•   Values that go into filtering are not necessarily
    universally accepted
•   Free speech issues
    • Especially with social networking
•   Privacy and trust
•   Failure to teach critical thinking
Illegal content
•   We need to separate the question of “child
    pornography” from Internet safety.
    • Child pornography (child abuse images) is a legal
        issue.
    • Internet safety is a social issue
•   Most NGOs and government officials in the U.S. are
    very careful not to mix child abuse images with other
    concerns such as adult pornography, drug abuse,
    extremism and intellectual property protection
•   There is some concern that controlling any content
    could lead to banning more content, including
    political speech

Weitere ähnliche Inhalte

Was ist angesagt?

Online safety 2011
Online safety 2011Online safety 2011
Online safety 2011Tea Teić
 
Online Safety Tips for Parents
Online Safety Tips for ParentsOnline Safety Tips for Parents
Online Safety Tips for ParentsKristi Richburg
 
Online Safety 3.0 - Presentation for Parents and Teachers
Online Safety 3.0 - Presentation for Parents and TeachersOnline Safety 3.0 - Presentation for Parents and Teachers
Online Safety 3.0 - Presentation for Parents and TeachersLarry Magid
 
Social Media Security
Social Media SecuritySocial Media Security
Social Media SecurityDel Belcher
 
[PPT] Webinar on Cyber Safety Training for Young Students
[PPT] Webinar on Cyber Safety Training for Young Students[PPT] Webinar on Cyber Safety Training for Young Students
[PPT] Webinar on Cyber Safety Training for Young StudentsShubham Gupta
 
Cybersafety overview
Cybersafety overviewCybersafety overview
Cybersafety overviewJohn Woodring
 
Online Safety for Parents
Online Safety for ParentsOnline Safety for Parents
Online Safety for ParentsRodolfo Salazar
 
Cyber citizenship
Cyber citizenshipCyber citizenship
Cyber citizenshipkaeschliman
 
Parents guide to technology
Parents guide to technologyParents guide to technology
Parents guide to technologyBrad McAllister
 
Social Media Basics: Security Loopholes with Twitter & Other Social Media
Social Media Basics: Security Loopholes with Twitter & Other Social MediaSocial Media Basics: Security Loopholes with Twitter & Other Social Media
Social Media Basics: Security Loopholes with Twitter & Other Social MediaTyler Shields
 
Internet Safety for Parents
Internet Safety for ParentsInternet Safety for Parents
Internet Safety for ParentsScott Burnett
 
Cybersafeelementary
CybersafeelementaryCybersafeelementary
CybersafeelementaryRick Ohren
 
parent_teacher_tutorial
parent_teacher_tutorialparent_teacher_tutorial
parent_teacher_tutorialtutorialsruby
 
Social media risk
Social media riskSocial media risk
Social media riskMosoco Ltd
 
Online Security for Kids
Online Security for KidsOnline Security for Kids
Online Security for KidsPatrick Laverty
 
How to Like Social Media Network Security
How to Like Social Media Network SecurityHow to Like Social Media Network Security
How to Like Social Media Network SecurityBrian Honan
 
Chad olivard internet safety powerpoint presentation itc 525
Chad olivard internet safety powerpoint presentation itc 525Chad olivard internet safety powerpoint presentation itc 525
Chad olivard internet safety powerpoint presentation itc 525chadolivard
 

Was ist angesagt? (20)

Online safety 2011
Online safety 2011Online safety 2011
Online safety 2011
 
Social Media for Families
Social Media for FamiliesSocial Media for Families
Social Media for Families
 
Online Safety Tips for Parents
Online Safety Tips for ParentsOnline Safety Tips for Parents
Online Safety Tips for Parents
 
Securityguide
SecurityguideSecurityguide
Securityguide
 
Online Safety 3.0 - Presentation for Parents and Teachers
Online Safety 3.0 - Presentation for Parents and TeachersOnline Safety 3.0 - Presentation for Parents and Teachers
Online Safety 3.0 - Presentation for Parents and Teachers
 
Social Media Security
Social Media SecuritySocial Media Security
Social Media Security
 
[PPT] Webinar on Cyber Safety Training for Young Students
[PPT] Webinar on Cyber Safety Training for Young Students[PPT] Webinar on Cyber Safety Training for Young Students
[PPT] Webinar on Cyber Safety Training for Young Students
 
Social Networking and Internet Safety
Social Networking and Internet SafetySocial Networking and Internet Safety
Social Networking and Internet Safety
 
Cybersafety overview
Cybersafety overviewCybersafety overview
Cybersafety overview
 
Online Safety for Parents
Online Safety for ParentsOnline Safety for Parents
Online Safety for Parents
 
Cyber citizenship
Cyber citizenshipCyber citizenship
Cyber citizenship
 
Parents guide to technology
Parents guide to technologyParents guide to technology
Parents guide to technology
 
Social Media Basics: Security Loopholes with Twitter & Other Social Media
Social Media Basics: Security Loopholes with Twitter & Other Social MediaSocial Media Basics: Security Loopholes with Twitter & Other Social Media
Social Media Basics: Security Loopholes with Twitter & Other Social Media
 
Internet Safety for Parents
Internet Safety for ParentsInternet Safety for Parents
Internet Safety for Parents
 
Cybersafeelementary
CybersafeelementaryCybersafeelementary
Cybersafeelementary
 
parent_teacher_tutorial
parent_teacher_tutorialparent_teacher_tutorial
parent_teacher_tutorial
 
Social media risk
Social media riskSocial media risk
Social media risk
 
Online Security for Kids
Online Security for KidsOnline Security for Kids
Online Security for Kids
 
How to Like Social Media Network Security
How to Like Social Media Network SecurityHow to Like Social Media Network Security
How to Like Social Media Network Security
 
Chad olivard internet safety powerpoint presentation itc 525
Chad olivard internet safety powerpoint presentation itc 525Chad olivard internet safety powerpoint presentation itc 525
Chad olivard internet safety powerpoint presentation itc 525
 

Ähnlich wie Filters and monitoring: Panacea or band-aid

Cyber Security.pptx
Cyber Security.pptxCyber Security.pptx
Cyber Security.pptxsaththiyans1
 
Pp e safe online p2 n
Pp e safe online p2 nPp e safe online p2 n
Pp e safe online p2 nFatimaAmin26
 
Keep Your Family Safe Online - Michael Kaiser
Keep Your Family Safe Online - Michael KaiserKeep Your Family Safe Online - Michael Kaiser
Keep Your Family Safe Online - Michael KaiserIT-oLogy
 
Pp e safe online p2
Pp e safe online p2Pp e safe online p2
Pp e safe online p2FatimaAmin26
 
Internet Safety Presentation for Parents
Internet Safety Presentation for ParentsInternet Safety Presentation for Parents
Internet Safety Presentation for ParentsMarian Merritt
 
E safety-parent-workshop
E safety-parent-workshop E safety-parent-workshop
E safety-parent-workshop wwihead
 
Digital citizenship pp
Digital citizenship ppDigital citizenship pp
Digital citizenship ppKatie Ward
 
A Parent's Guide to Keeping Kids Safe Online
A Parent's Guide to Keeping Kids Safe OnlineA Parent's Guide to Keeping Kids Safe Online
A Parent's Guide to Keeping Kids Safe OnlineCorinne Weisgerber
 
Guideline about responsible use of social networks
Guideline about responsible use of social networksGuideline about responsible use of social networks
Guideline about responsible use of social networksprofesorjulioperez
 
Cybersecurity for King County Public Educators
Cybersecurity for King County Public EducatorsCybersecurity for King County Public Educators
Cybersecurity for King County Public EducatorsSarah K Miller
 
Common Sense Media Presentation to Woodward North Parent Community
Common Sense Media Presentation to Woodward North Parent CommunityCommon Sense Media Presentation to Woodward North Parent Community
Common Sense Media Presentation to Woodward North Parent Communityellen.adolph
 
privacy and security
privacy and securityprivacy and security
privacy and securityronit_jadhav
 
Girls Talk August 2016
Girls Talk August 2016Girls Talk August 2016
Girls Talk August 2016Kathryn White
 
Privacy and Social Networks
Privacy and Social NetworksPrivacy and Social Networks
Privacy and Social NetworksOuriel Ohayon
 

Ähnlich wie Filters and monitoring: Panacea or band-aid (20)

Privacy and safety
Privacy and safetyPrivacy and safety
Privacy and safety
 
Cyber Security.pptx
Cyber Security.pptxCyber Security.pptx
Cyber Security.pptx
 
Ethics in Cyber Space
Ethics in Cyber SpaceEthics in Cyber Space
Ethics in Cyber Space
 
Internet Safety for Parents
Internet Safety for ParentsInternet Safety for Parents
Internet Safety for Parents
 
Internet Safety for Parents
Internet Safety for ParentsInternet Safety for Parents
Internet Safety for Parents
 
Pp e safe online p2 n
Pp e safe online p2 nPp e safe online p2 n
Pp e safe online p2 n
 
Keep Your Family Safe Online - Michael Kaiser
Keep Your Family Safe Online - Michael KaiserKeep Your Family Safe Online - Michael Kaiser
Keep Your Family Safe Online - Michael Kaiser
 
Pp e safe online p2
Pp e safe online p2Pp e safe online p2
Pp e safe online p2
 
Internet Safety Presentation for Parents
Internet Safety Presentation for ParentsInternet Safety Presentation for Parents
Internet Safety Presentation for Parents
 
E safety-parent-workshop
E safety-parent-workshop E safety-parent-workshop
E safety-parent-workshop
 
Digital citizenship pp
Digital citizenship ppDigital citizenship pp
Digital citizenship pp
 
A Parent's Guide to Keeping Kids Safe Online
A Parent's Guide to Keeping Kids Safe OnlineA Parent's Guide to Keeping Kids Safe Online
A Parent's Guide to Keeping Kids Safe Online
 
Guideline about responsible use of social networks
Guideline about responsible use of social networksGuideline about responsible use of social networks
Guideline about responsible use of social networks
 
Cybersecurity for King County Public Educators
Cybersecurity for King County Public EducatorsCybersecurity for King County Public Educators
Cybersecurity for King County Public Educators
 
Common Sense Media Presentation to Woodward North Parent Community
Common Sense Media Presentation to Woodward North Parent CommunityCommon Sense Media Presentation to Woodward North Parent Community
Common Sense Media Presentation to Woodward North Parent Community
 
Introduction to Cyber Security
Introduction to Cyber SecurityIntroduction to Cyber Security
Introduction to Cyber Security
 
privacy and security
privacy and securityprivacy and security
privacy and security
 
Girls Talk August 2016
Girls Talk August 2016Girls Talk August 2016
Girls Talk August 2016
 
Cyber Safe Parenting
Cyber Safe ParentingCyber Safe Parenting
Cyber Safe Parenting
 
Privacy and Social Networks
Privacy and Social NetworksPrivacy and Social Networks
Privacy and Social Networks
 

Mehr von ConnectSafely

How to Protect Yourself From Heartbleed Security Flaw
How to Protect Yourself From Heartbleed Security FlawHow to Protect Yourself From Heartbleed Security Flaw
How to Protect Yourself From Heartbleed Security FlawConnectSafely
 
A Brief Guide to Facebook Privacy
A Brief Guide to Facebook PrivacyA Brief Guide to Facebook Privacy
A Brief Guide to Facebook PrivacyConnectSafely
 
How to Create (use use) Strong & Unique Passwords
How to Create (use use) Strong & Unique PasswordsHow to Create (use use) Strong & Unique Passwords
How to Create (use use) Strong & Unique PasswordsConnectSafely
 
Online Safety 3.0: From Fear to Empowerment
Online Safety 3.0: From Fear to EmpowermentOnline Safety 3.0: From Fear to Empowerment
Online Safety 3.0: From Fear to EmpowermentConnectSafely
 
Internet Safety: Some Context
Internet Safety: Some ContextInternet Safety: Some Context
Internet Safety: Some ContextConnectSafely
 
Digital literacy, digital citizenship
Digital literacy, digital citizenshipDigital literacy, digital citizenship
Digital literacy, digital citizenshipConnectSafely
 
Making the case for digital citizenship
Making the case for digital citizenshipMaking the case for digital citizenship
Making the case for digital citizenshipConnectSafely
 
Digital citizenship, briefly
Digital citizenship, brieflyDigital citizenship, briefly
Digital citizenship, brieflyConnectSafely
 
Putting online risks into perspective
Putting online risks into perspectivePutting online risks into perspective
Putting online risks into perspectiveConnectSafely
 
ConnectSafely Slide Show for Ministry of Communications and Information Techn...
ConnectSafely Slide Show for Ministry of Communications and Information Techn...ConnectSafely Slide Show for Ministry of Communications and Information Techn...
ConnectSafely Slide Show for Ministry of Communications and Information Techn...ConnectSafely
 

Mehr von ConnectSafely (11)

How to Protect Yourself From Heartbleed Security Flaw
How to Protect Yourself From Heartbleed Security FlawHow to Protect Yourself From Heartbleed Security Flaw
How to Protect Yourself From Heartbleed Security Flaw
 
A Brief Guide to Facebook Privacy
A Brief Guide to Facebook PrivacyA Brief Guide to Facebook Privacy
A Brief Guide to Facebook Privacy
 
How to Create (use use) Strong & Unique Passwords
How to Create (use use) Strong & Unique PasswordsHow to Create (use use) Strong & Unique Passwords
How to Create (use use) Strong & Unique Passwords
 
Online Safety 3.0: From Fear to Empowerment
Online Safety 3.0: From Fear to EmpowermentOnline Safety 3.0: From Fear to Empowerment
Online Safety 3.0: From Fear to Empowerment
 
Internet Safety: Some Context
Internet Safety: Some ContextInternet Safety: Some Context
Internet Safety: Some Context
 
Digital literacy, digital citizenship
Digital literacy, digital citizenshipDigital literacy, digital citizenship
Digital literacy, digital citizenship
 
Digital reputations
Digital reputationsDigital reputations
Digital reputations
 
Making the case for digital citizenship
Making the case for digital citizenshipMaking the case for digital citizenship
Making the case for digital citizenship
 
Digital citizenship, briefly
Digital citizenship, brieflyDigital citizenship, briefly
Digital citizenship, briefly
 
Putting online risks into perspective
Putting online risks into perspectivePutting online risks into perspective
Putting online risks into perspective
 
ConnectSafely Slide Show for Ministry of Communications and Information Techn...
ConnectSafely Slide Show for Ministry of Communications and Information Techn...ConnectSafely Slide Show for Ministry of Communications and Information Techn...
ConnectSafely Slide Show for Ministry of Communications and Information Techn...
 

Kürzlich hochgeladen

Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DayH2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DaySri Ambati
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clashcharlottematthew16
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 

Kürzlich hochgeladen (20)

Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DayH2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 

Filters and monitoring: Panacea or band-aid

  • 1. Parental controls: An overview Larry Magid Co-Director ConnectSafely.org Safer Internet Day Moscow, February 2012
  • 2. Filtering technologies Device None DNS Level ISP Mandatory Router ISP Optional
  • 3. What parental controls can do • Block undesirable content such as sites containing sexual images or advocate violence or use of drugs or alcohol • Block websites that parents or authorities are concerned about such as social networking (Facebook, Google+, Twitter) • Limit how a child uses a device by total amount of time per day, time of day or day of week • Block or limit features on device such as texting, games, web access or any specific program or app • Monitor & report on use of device or service
  • 4. Technical Issues around filtering • Overblocking • Underblocking • Levels of control • Granularity gives greater control but more confusing • Parental white listing tools • Parental black listing tools • Filtering vs. monitoring • Issues of “too much information” • Children’s privacy (trust factor) • Stealth vs. open
  • 5. What filters can’t do very well • Prevent bullying and peer harassment • Prevent posting inappropriate content – reputation damage • Prevent inappropriate or unwanted contact* • Tech self-control and critical thinking* *Monitoring technologies can be used for these purposes
  • 6. Monitoring • Can run on device or on network • Should it report report all activity or just suspicious activity? • Should it report on private conversations or just public postings or what people are saying about child? • Safetyweb vs. Spectorsoft • Can run in stealth mode or require child to know it’s running
  • 7. Social Issues around parental controls • Openness of what is being filtered and by what criteria • Part of a conversation or stealth mode? • How and when do you wean children away from filtering? • Values that go into filtering are not necessarily universally accepted • Free speech issues • Especially with social networking • Privacy and trust • Failure to teach critical thinking
  • 8. Illegal content • We need to separate the question of “child pornography” from Internet safety. • Child pornography (child abuse images) is a legal issue. • Internet safety is a social issue • Most NGOs and government officials in the U.S. are very careful not to mix child abuse images with other concerns such as adult pornography, drug abuse, extremism and intellectual property protection • There is some concern that controlling any content could lead to banning more content, including political speech

Hinweis der Redaktion

  1. None:Effective for some children, especially teensDevice level:Works best for younger children. Teens can often get around it and may not need it. Doesn’t work on “other” devicesRouter level in home or schoolAn excellent way to regulate content throughout home or school. Can have adult “accounts.” Doesn’t work away from home (mobile)DNS LevelSimilar to router control only coming from DNS serverISP optional blocking (allows parents to request blocking by ISP)ISP mandatoryRaises serious free speech issues, Can be defeated via proxy servers and tunneling. One-size fits all approach for everyone, regardless of age