SlideShare ist ein Scribd-Unternehmen logo
1 von 14
    The Problems with Web Filters.
 
Types of filters.
Black list filters
These block access to "bad" sites which have been blacklisted. 
White list filters
These are the most restrictive, allowing access only to sites on a 
list.
Keyword/ content list blockers.
These check sites for specific keywords and content, and block 
access if present.
Very often, due to the nature of this filter, sites with acceptable 
content are blocked.
None are perfect.
Black list filters - Can't possibly block all "bad" sites
   4.2 million, or 12%, of all websites are pornographic*
   Thousands of new websites come up every day.
White list filters are so restrictive that the Internet is crippled.
Keyword/ content list blockers very often block sites that have 
no pornographic or unacceptable material.
    Example - Yahoo Images blocked.
*   Source:  Internet Pornography Statistics, retrieved March 21, 2009, at
http://www.internet-filter-review.toptenreviews.com/internet-pornography-statistics.html
What detriment do filters cause to high school
students/teachers?
Filters in high schools prevent student learning in different ways:
 
• Filtering blocks students from accessing websites to gather data or research for 
school work when the site may be perfectly acceptable but the filter has blocked it
 
• Teachers may know of a great website to share with students or use as they are 
teaching a lesson but it is blocked. This interrupts the lesson or the teacher has to 
research another site to use.
 
• If the teacher needs to request a block be removed, this is not always done in a timely 
manner. Often it can take up to three days.
What detriment do filters cause to high school
students/teachers?
How can and how do teachers at this level protect and monitor students if there is not a
filter or even if there is one (they can't all be 100% perfect to achieve the goal!):
 
•     Teach students responsibility with consequences for misuse 
 
• Use the internet in a learning environment and teach how to enhance learning, not 
just "look stuff up"
 
• Communicate and let students know often what the policy is for internet use and be 
sure parents are aware as well. What students do at home is not always appropriate 
for the classroom!
The Emphasis is on
Science and Technology
• Our role as educators is to create a love of learning among our students 
and to prepare them to enter the workforce to be productive, contributing 
members of society.
 
• Having filters gives schools a false sense of control.  Tech savvy students will 
find a way around the filters.  
 
• We must educate our students on what is and is not  appropriate use of 
computers.  A gradual release of responsibility must be given to students if 
we expect them to be successful, independent learners. 
Education is Key!
 
• Implement clear guidelines on the expectations for appropriate 
computer usage at school.  Create a culture that encourages and 
understands the power of the computer as a learning tool when 
used appropriately. 
 
• Have clearly stated consequences for first and repeat offenders, 
similar to other rules and school policies.
 
• Have the guidelines and consequences included on the Acceptable 
Use Policy, which is signed by students and parents.
 
 Filtering in Elementary Schools?
Two schools of thought in support of the anti-filtering debate
I.  Elementary schools should not be filtered. 
 
• EdUCATE young students - teach students at a young age how to behave responsibly online 
o Teach how to use the Internet to find the information they need and how to avoid useless/harmful sites
o Build confidence and trust in children by using computers for online activities jointly with them
 
• Children should avoid bulletin boards and their chat rooms, where they are introduced to strangers 
o Teach them to never give out personal information
 
• Students using the Internet should be supervised and monitored the same way they are when viewing television
o Set and adhere to rules for access to the Internet
 
• Teacher-parent communication to ensure student safe Internet education and practice is occurring at both home and school
II. Teachers at elementary schools should not have the
same restrictions that students do.
• Teachable moments
• Teachers surveyed do the majority of their planning/downloading of educational materials at home due to the
stringent filtering process at their school
o Currently, when teachers want to access something that is blocked, they contact the Network Administrator
o The Net Admin then evaluates the site to ensure that it doesn’t violate any of the district’s Acceptable Use
Policy
o If it doesn’t violate the policy, the Net Admin would unblock the site
o This process could take up to 48 hours
o Teachable moment is long gone
Should your public library filter
the internet?
Children's Internet Protection Act
• CIPA, as it is commonly known, compels libraries that
recieve federal assistance for internet access to filter
computers with access to the internet to prevent access to
obscene or pornographic images and prevent minors from
accessing material that could be "harmful" to them.
• In U.S. v. American Library Ass'n, 539 U.S. 194 (2003), the
Supreme Court upheld CIPA, ruling that the First
Amendment does not preclude Congress from attaching
"strings" to benefits provided through federal funding.
• One key: libraries are obligated to allow access to a specific
website or to turn off the filter at the request of an adult
patron.
Why Care If Your Public Library Filters?
Filtering software is incapable of blocking only images that are
pornagraphic or obscene (the specific focus of CIPA) because
"the current definition of obscenity doesn't work on the
Internet."
Companies that sell filtering software do not disclose the types
of things or the specific sites they block -- categories are
described in 1 or 2 sentences so there's no way to know if
constitutionally protected material is being blocked. In other
words, you probably won't know that you can't access sites that
meet your search criteria.
Internet Filtering Software Tests: Barracuda, CyberPatrol,
Filtergage, & WebSense, San Jose Public Library, April 2, 2008
Why Care If Your Public Library Filters?
• Consider how the software company's definitions might
affect content blocked in the "Tasteless" category, for
example.
• Current software is particularly ineffective when applied to
images -- the filters tested either overblocked or
underblocked significantly.
Internet Filtering Software Tests: Barracuda, CyberPatrol,
Filtergage, & WebSense, San Jose Public Library, April 2, 2008
Why Not Try Alternatives?
• Locate internet terminals in public areas, especially near
the checkout desk, and away from the children's area.
• Install privacy screens to shelter screen images from casual
passersby.
• Australian Communications and Media Authority study
concluded that educating children about online safety is as
effective as filters in blocking access to inappropriate
content and more effective at preventing fraud, illegal
contact and cyber-bullying.
o News.com.au, February 26, 2008

Weitere ähnliche Inhalte

Was ist angesagt?

Fear of Filtering: The Reality of Internet Content Management (Soreide DOC)
Fear of Filtering: The Reality of Internet Content Management (Soreide DOC)Fear of Filtering: The Reality of Internet Content Management (Soreide DOC)
Fear of Filtering: The Reality of Internet Content Management (Soreide DOC)Nebraska Library Commission
 
IS 201 Employers Using Facebook
IS 201 Employers Using FacebookIS 201 Employers Using Facebook
IS 201 Employers Using FacebookJeffrey Marsh Jr.
 
Mobile resource problems: Authentication and usability
Mobile resource problems: Authentication and usabilityMobile resource problems: Authentication and usability
Mobile resource problems: Authentication and usabilityjiscebooksproject
 
Gathered information second news story (yikyak)
Gathered information second news story (yikyak)Gathered information second news story (yikyak)
Gathered information second news story (yikyak)shaunaeleacy
 
Filtering for in and of on education
Filtering for in and of on educationFiltering for in and of on education
Filtering for in and of on educationCraig Cunningham
 
Acceptable use policy CHFHS
Acceptable use policy CHFHSAcceptable use policy CHFHS
Acceptable use policy CHFHSMisterHobbs
 
2017 legal update for Williams supervisors
2017 legal update for Williams supervisors2017 legal update for Williams supervisors
2017 legal update for Williams supervisorseph-hr
 
Its all in the design the importance of making courses legally accessible
Its all in the design the importance of making courses legally accessibleIts all in the design the importance of making courses legally accessible
Its all in the design the importance of making courses legally accessibleRaymond Rose
 
Speaks vo lumes_2015
Speaks vo lumes_2015Speaks vo lumes_2015
Speaks vo lumes_2015Raymond Rose
 
Cyber reputation
Cyber reputationCyber reputation
Cyber reputationJoann Noel
 
Social Implications and Ethics
Social Implications and EthicsSocial Implications and Ethics
Social Implications and Ethicskelseybee316
 
Social Software for Empowerment
Social Software for EmpowermentSocial Software for Empowerment
Social Software for EmpowermenteKindling.org
 
Webquest college
Webquest collegeWebquest college
Webquest collegebllewelyn
 
Who Are They
Who Are TheyWho Are They
Who Are Theyajlerner
 
Web Spam Detection Using Machine Learning
Web Spam Detection Using Machine LearningWeb Spam Detection Using Machine Learning
Web Spam Detection Using Machine Learningbutest
 
Children & Youths Online
Children & Youths OnlineChildren & Youths Online
Children & Youths Onlineveilma
 

Was ist angesagt? (18)

Fear of Filtering: The Reality of Internet Content Management (Soreide DOC)
Fear of Filtering: The Reality of Internet Content Management (Soreide DOC)Fear of Filtering: The Reality of Internet Content Management (Soreide DOC)
Fear of Filtering: The Reality of Internet Content Management (Soreide DOC)
 
IS 201 Employers Using Facebook
IS 201 Employers Using FacebookIS 201 Employers Using Facebook
IS 201 Employers Using Facebook
 
Mobile resource problems: Authentication and usability
Mobile resource problems: Authentication and usabilityMobile resource problems: Authentication and usability
Mobile resource problems: Authentication and usability
 
Current Issue Paper
Current Issue PaperCurrent Issue Paper
Current Issue Paper
 
Gathered information second news story (yikyak)
Gathered information second news story (yikyak)Gathered information second news story (yikyak)
Gathered information second news story (yikyak)
 
Filtering for in and of on education
Filtering for in and of on educationFiltering for in and of on education
Filtering for in and of on education
 
The Facebook Face-off
The Facebook Face-offThe Facebook Face-off
The Facebook Face-off
 
Acceptable use policy CHFHS
Acceptable use policy CHFHSAcceptable use policy CHFHS
Acceptable use policy CHFHS
 
2017 legal update for Williams supervisors
2017 legal update for Williams supervisors2017 legal update for Williams supervisors
2017 legal update for Williams supervisors
 
Its all in the design the importance of making courses legally accessible
Its all in the design the importance of making courses legally accessibleIts all in the design the importance of making courses legally accessible
Its all in the design the importance of making courses legally accessible
 
Speaks vo lumes_2015
Speaks vo lumes_2015Speaks vo lumes_2015
Speaks vo lumes_2015
 
Cyber reputation
Cyber reputationCyber reputation
Cyber reputation
 
Social Implications and Ethics
Social Implications and EthicsSocial Implications and Ethics
Social Implications and Ethics
 
Social Software for Empowerment
Social Software for EmpowermentSocial Software for Empowerment
Social Software for Empowerment
 
Webquest college
Webquest collegeWebquest college
Webquest college
 
Who Are They
Who Are TheyWho Are They
Who Are They
 
Web Spam Detection Using Machine Learning
Web Spam Detection Using Machine LearningWeb Spam Detection Using Machine Learning
Web Spam Detection Using Machine Learning
 
Children & Youths Online
Children & Youths OnlineChildren & Youths Online
Children & Youths Online
 

Andere mochten auch (18)

网络时代信息获取之道与器
网络时代信息获取之道与器网络时代信息获取之道与器
网络时代信息获取之道与器
 
Implementering Af Iwb
Implementering Af IwbImplementering Af Iwb
Implementering Af Iwb
 
Encuadre ingles iii
Encuadre ingles iiiEncuadre ingles iii
Encuadre ingles iii
 
4 & 5
4 & 54 & 5
4 & 5
 
Market Outlook
Market OutlookMarket Outlook
Market Outlook
 
Tm mgt - part3
Tm mgt - part3Tm mgt - part3
Tm mgt - part3
 
tm mgmt - part 4
tm mgmt - part 4tm mgmt - part 4
tm mgmt - part 4
 
Brug Web 2.0 i undervisningen
Brug Web 2.0 i undervisningenBrug Web 2.0 i undervisningen
Brug Web 2.0 i undervisningen
 
Intranet UsserøD Anders Fehrmann
Intranet UsserøD Anders FehrmannIntranet UsserøD Anders Fehrmann
Intranet UsserøD Anders Fehrmann
 
Innov 2 & 3
Innov 2 & 3Innov 2 & 3
Innov 2 & 3
 
7. laugh
7. laugh7. laugh
7. laugh
 
Part 5
Part 5Part 5
Part 5
 
Part 3
Part 3Part 3
Part 3
 
Blowininthe Wind+
Blowininthe Wind+Blowininthe Wind+
Blowininthe Wind+
 
Plan
PlanPlan
Plan
 
Part 2
Part 2Part 2
Part 2
 
Part 7
Part 7Part 7
Part 7
 
Violence and The Fate of Our Children
Violence and The Fate of Our ChildrenViolence and The Fate of Our Children
Violence and The Fate of Our Children
 

Ähnlich wie Web Filters And Other Evil Doers

Web Filters And Other Evil Doers
Web Filters And Other Evil DoersWeb Filters And Other Evil Doers
Web Filters And Other Evil Doerscathtech
 
Web Filters And Other Evil Doers
Web Filters And Other Evil DoersWeb Filters And Other Evil Doers
Web Filters And Other Evil DoersJazayer
 
A Substitute for Conscience?
A Substitute for Conscience?A Substitute for Conscience?
A Substitute for Conscience?CASL
 
Understanding CIPA to Fight the Filter
Understanding CIPA to Fight the FilterUnderstanding CIPA to Fight the Filter
Understanding CIPA to Fight the FilterMark Moran
 
Trying Not to Filter: Internet Filtering Technologies in Libraries
Trying Not to Filter: Internet Filtering Technologies in LibrariesTrying Not to Filter: Internet Filtering Technologies in Libraries
Trying Not to Filter: Internet Filtering Technologies in LibrariesSarah Houghton
 
Netsentron Content Filter
Netsentron Content FilterNetsentron Content Filter
Netsentron Content FilterTom Kobelt
 
Content filtering in schools
Content filtering in schoolsContent filtering in schools
Content filtering in schoolsswurth2
 
Protect Our Kids From The Internet
Protect Our Kids From The InternetProtect Our Kids From The Internet
Protect Our Kids From The InternetTom Kobelt
 
Library Censorship
Library CensorshipLibrary Censorship
Library CensorshipScott Lee
 
Research proposal
Research proposalResearch proposal
Research proposalSaba Afaq
 
Presentation1
Presentation1Presentation1
Presentation1mormonite
 
Al Live: Filtering: The Man in the Middle
Al Live: Filtering: The Man in the MiddleAl Live: Filtering: The Man in the Middle
Al Live: Filtering: The Man in the MiddleALATechSource
 
Tagging - Can User Generated Content Improve Our Services?
Tagging - Can User Generated Content Improve Our Services?Tagging - Can User Generated Content Improve Our Services?
Tagging - Can User Generated Content Improve Our Services?guestff5a190a
 
Realising Potential Of Web 2 0
Realising Potential Of Web 2 0Realising Potential Of Web 2 0
Realising Potential Of Web 2 0lisbk
 
Usability for Government: improving service delivery
Usability for Government: improving service deliveryUsability for Government: improving service delivery
Usability for Government: improving service deliveryRuth Ellison
 
The public library catalogue as a social space: A case study of social discov...
The public library catalogue as a social space: A case study of social discov...The public library catalogue as a social space: A case study of social discov...
The public library catalogue as a social space: A case study of social discov...Louise Spiteri
 
Privacy On Track (Revised 1.27.11) Saira Nayak Aba Consumer Meeting
Privacy On Track (Revised 1.27.11)   Saira Nayak   Aba Consumer MeetingPrivacy On Track (Revised 1.27.11)   Saira Nayak   Aba Consumer Meeting
Privacy On Track (Revised 1.27.11) Saira Nayak Aba Consumer MeetingNayakStrategies
 
Proxy For employee monitoring
Proxy  For employee monitoringProxy  For employee monitoring
Proxy For employee monitoringProxies Rent
 

Ähnlich wie Web Filters And Other Evil Doers (20)

Web Filters And Other Evil Doers
Web Filters And Other Evil DoersWeb Filters And Other Evil Doers
Web Filters And Other Evil Doers
 
Web Filters And Other Evil Doers
Web Filters And Other Evil DoersWeb Filters And Other Evil Doers
Web Filters And Other Evil Doers
 
A Substitute for Conscience?
A Substitute for Conscience?A Substitute for Conscience?
A Substitute for Conscience?
 
Understanding CIPA to Fight the Filter
Understanding CIPA to Fight the FilterUnderstanding CIPA to Fight the Filter
Understanding CIPA to Fight the Filter
 
Trying Not to Filter: Internet Filtering Technologies in Libraries
Trying Not to Filter: Internet Filtering Technologies in LibrariesTrying Not to Filter: Internet Filtering Technologies in Libraries
Trying Not to Filter: Internet Filtering Technologies in Libraries
 
Netsentron Content Filter
Netsentron Content FilterNetsentron Content Filter
Netsentron Content Filter
 
Content filtering in schools
Content filtering in schoolsContent filtering in schools
Content filtering in schools
 
The digital closet 2014 - slideshare - aug 20
The digital closet   2014 - slideshare - aug 20The digital closet   2014 - slideshare - aug 20
The digital closet 2014 - slideshare - aug 20
 
Protect Our Kids From The Internet
Protect Our Kids From The InternetProtect Our Kids From The Internet
Protect Our Kids From The Internet
 
Library Censorship
Library CensorshipLibrary Censorship
Library Censorship
 
Research proposal
Research proposalResearch proposal
Research proposal
 
Presentation1
Presentation1Presentation1
Presentation1
 
Al Live: Filtering: The Man in the Middle
Al Live: Filtering: The Man in the MiddleAl Live: Filtering: The Man in the Middle
Al Live: Filtering: The Man in the Middle
 
Tagging - Can User Generated Content Improve Our Services?
Tagging - Can User Generated Content Improve Our Services?Tagging - Can User Generated Content Improve Our Services?
Tagging - Can User Generated Content Improve Our Services?
 
Realising Potential Of Web 2 0
Realising Potential Of Web 2 0Realising Potential Of Web 2 0
Realising Potential Of Web 2 0
 
Usability for Government: improving service delivery
Usability for Government: improving service deliveryUsability for Government: improving service delivery
Usability for Government: improving service delivery
 
Accessing internet resources best practices
Accessing internet resources  best practicesAccessing internet resources  best practices
Accessing internet resources best practices
 
The public library catalogue as a social space: A case study of social discov...
The public library catalogue as a social space: A case study of social discov...The public library catalogue as a social space: A case study of social discov...
The public library catalogue as a social space: A case study of social discov...
 
Privacy On Track (Revised 1.27.11) Saira Nayak Aba Consumer Meeting
Privacy On Track (Revised 1.27.11)   Saira Nayak   Aba Consumer MeetingPrivacy On Track (Revised 1.27.11)   Saira Nayak   Aba Consumer Meeting
Privacy On Track (Revised 1.27.11) Saira Nayak Aba Consumer Meeting
 
Proxy For employee monitoring
Proxy  For employee monitoringProxy  For employee monitoring
Proxy For employee monitoring
 

Kürzlich hochgeladen

DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piececharlottematthew16
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024The Digital Insurer
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Wonjun Hwang
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
The Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfThe Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfSeasiaInfotech2
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 

Kürzlich hochgeladen (20)

DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piece
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
The Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfThe Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdf
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 

Web Filters And Other Evil Doers

  • 4. What detriment do filters cause to high school students/teachers? Filters in high schools prevent student learning in different ways:   • Filtering blocks students from accessing websites to gather data or research for  school work when the site may be perfectly acceptable but the filter has blocked it   • Teachers may know of a great website to share with students or use as they are  teaching a lesson but it is blocked. This interrupts the lesson or the teacher has to  research another site to use.   • If the teacher needs to request a block be removed, this is not always done in a timely  manner. Often it can take up to three days.
  • 5. What detriment do filters cause to high school students/teachers? How can and how do teachers at this level protect and monitor students if there is not a filter or even if there is one (they can't all be 100% perfect to achieve the goal!):   •     Teach students responsibility with consequences for misuse    • Use the internet in a learning environment and teach how to enhance learning, not  just "look stuff up"   • Communicate and let students know often what the policy is for internet use and be  sure parents are aware as well. What students do at home is not always appropriate  for the classroom!
  • 6. The Emphasis is on Science and Technology • Our role as educators is to create a love of learning among our students  and to prepare them to enter the workforce to be productive, contributing  members of society.   • Having filters gives schools a false sense of control.  Tech savvy students will  find a way around the filters.     • We must educate our students on what is and is not  appropriate use of  computers.  A gradual release of responsibility must be given to students if  we expect them to be successful, independent learners. 
  • 7. Education is Key!   • Implement clear guidelines on the expectations for appropriate  computer usage at school.  Create a culture that encourages and  understands the power of the computer as a learning tool when  used appropriately.    • Have clearly stated consequences for first and repeat offenders,  similar to other rules and school policies.   • Have the guidelines and consequences included on the Acceptable  Use Policy, which is signed by students and parents.  
  • 8.  Filtering in Elementary Schools? Two schools of thought in support of the anti-filtering debate I.  Elementary schools should not be filtered.    • EdUCATE young students - teach students at a young age how to behave responsibly online  o Teach how to use the Internet to find the information they need and how to avoid useless/harmful sites o Build confidence and trust in children by using computers for online activities jointly with them   • Children should avoid bulletin boards and their chat rooms, where they are introduced to strangers  o Teach them to never give out personal information   • Students using the Internet should be supervised and monitored the same way they are when viewing television o Set and adhere to rules for access to the Internet   • Teacher-parent communication to ensure student safe Internet education and practice is occurring at both home and school
  • 9. II. Teachers at elementary schools should not have the same restrictions that students do. • Teachable moments • Teachers surveyed do the majority of their planning/downloading of educational materials at home due to the stringent filtering process at their school o Currently, when teachers want to access something that is blocked, they contact the Network Administrator o The Net Admin then evaluates the site to ensure that it doesn’t violate any of the district’s Acceptable Use Policy o If it doesn’t violate the policy, the Net Admin would unblock the site o This process could take up to 48 hours o Teachable moment is long gone
  • 10. Should your public library filter the internet?
  • 11. Children's Internet Protection Act • CIPA, as it is commonly known, compels libraries that recieve federal assistance for internet access to filter computers with access to the internet to prevent access to obscene or pornographic images and prevent minors from accessing material that could be "harmful" to them. • In U.S. v. American Library Ass'n, 539 U.S. 194 (2003), the Supreme Court upheld CIPA, ruling that the First Amendment does not preclude Congress from attaching "strings" to benefits provided through federal funding. • One key: libraries are obligated to allow access to a specific website or to turn off the filter at the request of an adult patron.
  • 12. Why Care If Your Public Library Filters? Filtering software is incapable of blocking only images that are pornagraphic or obscene (the specific focus of CIPA) because "the current definition of obscenity doesn't work on the Internet." Companies that sell filtering software do not disclose the types of things or the specific sites they block -- categories are described in 1 or 2 sentences so there's no way to know if constitutionally protected material is being blocked. In other words, you probably won't know that you can't access sites that meet your search criteria. Internet Filtering Software Tests: Barracuda, CyberPatrol, Filtergage, & WebSense, San Jose Public Library, April 2, 2008
  • 13. Why Care If Your Public Library Filters? • Consider how the software company's definitions might affect content blocked in the "Tasteless" category, for example. • Current software is particularly ineffective when applied to images -- the filters tested either overblocked or underblocked significantly. Internet Filtering Software Tests: Barracuda, CyberPatrol, Filtergage, & WebSense, San Jose Public Library, April 2, 2008
  • 14. Why Not Try Alternatives? • Locate internet terminals in public areas, especially near the checkout desk, and away from the children's area. • Install privacy screens to shelter screen images from casual passersby. • Australian Communications and Media Authority study concluded that educating children about online safety is as effective as filters in blocking access to inappropriate content and more effective at preventing fraud, illegal contact and cyber-bullying. o News.com.au, February 26, 2008