SlideShare uma empresa Scribd logo
1 de 8
Parental controls: An overview

         Larry Magid
           Co-Director
        ConnectSafely.org




         Safer Internet Day
         Moscow, February 2012
Filtering technologies


                            Device
     None                               DNS Level




                                        ISP Mandatory
                         Router
ISP Optional
What parental controls can do
• Block undesirable content such as sites containing
  sexual images or advocate violence or use of drugs or
  alcohol
• Block websites that parents or authorities are
  concerned about such as social networking
  (Facebook, Google+, Twitter)
• Limit how a child uses a device by total amount of
  time per day, time of day or day of week
• Block or limit features on device such as
  texting, games, web access or any specific program or
  app
• Monitor & report on use of device or service
Technical Issues around filtering
• Overblocking
• Underblocking
• Levels of control
   • Granularity gives greater control but more
     confusing
• Parental white listing tools
• Parental black listing tools
• Filtering vs. monitoring
   • Issues of “too much information”
   • Children’s privacy (trust factor)
   • Stealth vs. open
What filters can’t do very well
• Prevent bullying and peer harassment
• Prevent posting inappropriate content
   – reputation damage
• Prevent inappropriate or unwanted contact*
• Tech self-control and critical thinking*

*Monitoring technologies can be used for these purposes
Monitoring
• Can run on device or on network
• Should it report report all activity or just
  suspicious activity?
• Should it report on private conversations or
  just public postings or what people are
  saying about child?
  • Safetyweb vs. Spectorsoft
• Can run in stealth mode or require child to
  know it’s running
Social Issues around parental controls
•   Openness of what is being filtered and by what
    criteria
•   Part of a conversation or stealth mode?
•   How and when do you wean children away from
    filtering?
•   Values that go into filtering are not necessarily
    universally accepted
•   Free speech issues
    • Especially with social networking
•   Privacy and trust
•   Failure to teach critical thinking
Illegal content
•   We need to separate the question of “child
    pornography” from Internet safety.
    • Child pornography (child abuse images) is a legal
        issue.
    • Internet safety is a social issue
•   Most NGOs and government officials in the U.S. are
    very careful not to mix child abuse images with other
    concerns such as adult pornography, drug abuse,
    extremism and intellectual property protection
•   There is some concern that controlling any content
    could lead to banning more content, including
    political speech

Mais conteúdo relacionado

Mais procurados

Online safety 2011
Online safety 2011Online safety 2011
Online safety 2011Tea Teić
 
Online Safety Tips for Parents
Online Safety Tips for ParentsOnline Safety Tips for Parents
Online Safety Tips for ParentsKristi Richburg
 
Online Safety 3.0 - Presentation for Parents and Teachers
Online Safety 3.0 - Presentation for Parents and TeachersOnline Safety 3.0 - Presentation for Parents and Teachers
Online Safety 3.0 - Presentation for Parents and TeachersLarry Magid
 
Social Media Security
Social Media SecuritySocial Media Security
Social Media SecurityDel Belcher
 
[PPT] Webinar on Cyber Safety Training for Young Students
[PPT] Webinar on Cyber Safety Training for Young Students[PPT] Webinar on Cyber Safety Training for Young Students
[PPT] Webinar on Cyber Safety Training for Young StudentsShubham Gupta
 
Cybersafety overview
Cybersafety overviewCybersafety overview
Cybersafety overviewJohn Woodring
 
Online Safety for Parents
Online Safety for ParentsOnline Safety for Parents
Online Safety for ParentsRodolfo Salazar
 
Cyber citizenship
Cyber citizenshipCyber citizenship
Cyber citizenshipkaeschliman
 
Parents guide to technology
Parents guide to technologyParents guide to technology
Parents guide to technologyBrad McAllister
 
Social Media Basics: Security Loopholes with Twitter & Other Social Media
Social Media Basics: Security Loopholes with Twitter & Other Social MediaSocial Media Basics: Security Loopholes with Twitter & Other Social Media
Social Media Basics: Security Loopholes with Twitter & Other Social MediaTyler Shields
 
Internet Safety for Parents
Internet Safety for ParentsInternet Safety for Parents
Internet Safety for ParentsScott Burnett
 
Cybersafeelementary
CybersafeelementaryCybersafeelementary
CybersafeelementaryRick Ohren
 
parent_teacher_tutorial
parent_teacher_tutorialparent_teacher_tutorial
parent_teacher_tutorialtutorialsruby
 
Social media risk
Social media riskSocial media risk
Social media riskMosoco Ltd
 
Online Security for Kids
Online Security for KidsOnline Security for Kids
Online Security for KidsPatrick Laverty
 
How to Like Social Media Network Security
How to Like Social Media Network SecurityHow to Like Social Media Network Security
How to Like Social Media Network SecurityBrian Honan
 
Chad olivard internet safety powerpoint presentation itc 525
Chad olivard internet safety powerpoint presentation itc 525Chad olivard internet safety powerpoint presentation itc 525
Chad olivard internet safety powerpoint presentation itc 525chadolivard
 

Mais procurados (20)

Online safety 2011
Online safety 2011Online safety 2011
Online safety 2011
 
Social Media for Families
Social Media for FamiliesSocial Media for Families
Social Media for Families
 
Online Safety Tips for Parents
Online Safety Tips for ParentsOnline Safety Tips for Parents
Online Safety Tips for Parents
 
Securityguide
SecurityguideSecurityguide
Securityguide
 
Online Safety 3.0 - Presentation for Parents and Teachers
Online Safety 3.0 - Presentation for Parents and TeachersOnline Safety 3.0 - Presentation for Parents and Teachers
Online Safety 3.0 - Presentation for Parents and Teachers
 
Social Media Security
Social Media SecuritySocial Media Security
Social Media Security
 
[PPT] Webinar on Cyber Safety Training for Young Students
[PPT] Webinar on Cyber Safety Training for Young Students[PPT] Webinar on Cyber Safety Training for Young Students
[PPT] Webinar on Cyber Safety Training for Young Students
 
Social Networking and Internet Safety
Social Networking and Internet SafetySocial Networking and Internet Safety
Social Networking and Internet Safety
 
Cybersafety overview
Cybersafety overviewCybersafety overview
Cybersafety overview
 
Online Safety for Parents
Online Safety for ParentsOnline Safety for Parents
Online Safety for Parents
 
Cyber citizenship
Cyber citizenshipCyber citizenship
Cyber citizenship
 
Parents guide to technology
Parents guide to technologyParents guide to technology
Parents guide to technology
 
Social Media Basics: Security Loopholes with Twitter & Other Social Media
Social Media Basics: Security Loopholes with Twitter & Other Social MediaSocial Media Basics: Security Loopholes with Twitter & Other Social Media
Social Media Basics: Security Loopholes with Twitter & Other Social Media
 
Internet Safety for Parents
Internet Safety for ParentsInternet Safety for Parents
Internet Safety for Parents
 
Cybersafeelementary
CybersafeelementaryCybersafeelementary
Cybersafeelementary
 
parent_teacher_tutorial
parent_teacher_tutorialparent_teacher_tutorial
parent_teacher_tutorial
 
Social media risk
Social media riskSocial media risk
Social media risk
 
Online Security for Kids
Online Security for KidsOnline Security for Kids
Online Security for Kids
 
How to Like Social Media Network Security
How to Like Social Media Network SecurityHow to Like Social Media Network Security
How to Like Social Media Network Security
 
Chad olivard internet safety powerpoint presentation itc 525
Chad olivard internet safety powerpoint presentation itc 525Chad olivard internet safety powerpoint presentation itc 525
Chad olivard internet safety powerpoint presentation itc 525
 

Semelhante a Filters and monitoring: Panacea or band-aid

Cyber Security.pptx
Cyber Security.pptxCyber Security.pptx
Cyber Security.pptxsaththiyans1
 
Pp e safe online p2 n
Pp e safe online p2 nPp e safe online p2 n
Pp e safe online p2 nFatimaAmin26
 
Keep Your Family Safe Online - Michael Kaiser
Keep Your Family Safe Online - Michael KaiserKeep Your Family Safe Online - Michael Kaiser
Keep Your Family Safe Online - Michael KaiserIT-oLogy
 
Pp e safe online p2
Pp e safe online p2Pp e safe online p2
Pp e safe online p2FatimaAmin26
 
Internet Safety Presentation for Parents
Internet Safety Presentation for ParentsInternet Safety Presentation for Parents
Internet Safety Presentation for ParentsMarian Merritt
 
E safety-parent-workshop
E safety-parent-workshop E safety-parent-workshop
E safety-parent-workshop wwihead
 
Digital citizenship pp
Digital citizenship ppDigital citizenship pp
Digital citizenship ppKatie Ward
 
A Parent's Guide to Keeping Kids Safe Online
A Parent's Guide to Keeping Kids Safe OnlineA Parent's Guide to Keeping Kids Safe Online
A Parent's Guide to Keeping Kids Safe OnlineCorinne Weisgerber
 
Guideline about responsible use of social networks
Guideline about responsible use of social networksGuideline about responsible use of social networks
Guideline about responsible use of social networksprofesorjulioperez
 
Cybersecurity for King County Public Educators
Cybersecurity for King County Public EducatorsCybersecurity for King County Public Educators
Cybersecurity for King County Public EducatorsSarah K Miller
 
Common Sense Media Presentation to Woodward North Parent Community
Common Sense Media Presentation to Woodward North Parent CommunityCommon Sense Media Presentation to Woodward North Parent Community
Common Sense Media Presentation to Woodward North Parent Communityellen.adolph
 
privacy and security
privacy and securityprivacy and security
privacy and securityronit_jadhav
 
Girls Talk August 2016
Girls Talk August 2016Girls Talk August 2016
Girls Talk August 2016Kathryn White
 
Privacy and Social Networks
Privacy and Social NetworksPrivacy and Social Networks
Privacy and Social NetworksOuriel Ohayon
 

Semelhante a Filters and monitoring: Panacea or band-aid (20)

Privacy and safety
Privacy and safetyPrivacy and safety
Privacy and safety
 
Cyber Security.pptx
Cyber Security.pptxCyber Security.pptx
Cyber Security.pptx
 
Ethics in Cyber Space
Ethics in Cyber SpaceEthics in Cyber Space
Ethics in Cyber Space
 
Internet Safety for Parents
Internet Safety for ParentsInternet Safety for Parents
Internet Safety for Parents
 
Internet Safety for Parents
Internet Safety for ParentsInternet Safety for Parents
Internet Safety for Parents
 
Pp e safe online p2 n
Pp e safe online p2 nPp e safe online p2 n
Pp e safe online p2 n
 
Keep Your Family Safe Online - Michael Kaiser
Keep Your Family Safe Online - Michael KaiserKeep Your Family Safe Online - Michael Kaiser
Keep Your Family Safe Online - Michael Kaiser
 
Pp e safe online p2
Pp e safe online p2Pp e safe online p2
Pp e safe online p2
 
Internet Safety Presentation for Parents
Internet Safety Presentation for ParentsInternet Safety Presentation for Parents
Internet Safety Presentation for Parents
 
E safety-parent-workshop
E safety-parent-workshop E safety-parent-workshop
E safety-parent-workshop
 
Digital citizenship pp
Digital citizenship ppDigital citizenship pp
Digital citizenship pp
 
A Parent's Guide to Keeping Kids Safe Online
A Parent's Guide to Keeping Kids Safe OnlineA Parent's Guide to Keeping Kids Safe Online
A Parent's Guide to Keeping Kids Safe Online
 
Guideline about responsible use of social networks
Guideline about responsible use of social networksGuideline about responsible use of social networks
Guideline about responsible use of social networks
 
Cybersecurity for King County Public Educators
Cybersecurity for King County Public EducatorsCybersecurity for King County Public Educators
Cybersecurity for King County Public Educators
 
Common Sense Media Presentation to Woodward North Parent Community
Common Sense Media Presentation to Woodward North Parent CommunityCommon Sense Media Presentation to Woodward North Parent Community
Common Sense Media Presentation to Woodward North Parent Community
 
Introduction to Cyber Security
Introduction to Cyber SecurityIntroduction to Cyber Security
Introduction to Cyber Security
 
privacy and security
privacy and securityprivacy and security
privacy and security
 
Girls Talk August 2016
Girls Talk August 2016Girls Talk August 2016
Girls Talk August 2016
 
Cyber Safe Parenting
Cyber Safe ParentingCyber Safe Parenting
Cyber Safe Parenting
 
Privacy and Social Networks
Privacy and Social NetworksPrivacy and Social Networks
Privacy and Social Networks
 

Mais de ConnectSafely

How to Protect Yourself From Heartbleed Security Flaw
How to Protect Yourself From Heartbleed Security FlawHow to Protect Yourself From Heartbleed Security Flaw
How to Protect Yourself From Heartbleed Security FlawConnectSafely
 
A Brief Guide to Facebook Privacy
A Brief Guide to Facebook PrivacyA Brief Guide to Facebook Privacy
A Brief Guide to Facebook PrivacyConnectSafely
 
How to Create (use use) Strong & Unique Passwords
How to Create (use use) Strong & Unique PasswordsHow to Create (use use) Strong & Unique Passwords
How to Create (use use) Strong & Unique PasswordsConnectSafely
 
Online Safety 3.0: From Fear to Empowerment
Online Safety 3.0: From Fear to EmpowermentOnline Safety 3.0: From Fear to Empowerment
Online Safety 3.0: From Fear to EmpowermentConnectSafely
 
Internet Safety: Some Context
Internet Safety: Some ContextInternet Safety: Some Context
Internet Safety: Some ContextConnectSafely
 
Digital literacy, digital citizenship
Digital literacy, digital citizenshipDigital literacy, digital citizenship
Digital literacy, digital citizenshipConnectSafely
 
Making the case for digital citizenship
Making the case for digital citizenshipMaking the case for digital citizenship
Making the case for digital citizenshipConnectSafely
 
Digital citizenship, briefly
Digital citizenship, brieflyDigital citizenship, briefly
Digital citizenship, brieflyConnectSafely
 
Putting online risks into perspective
Putting online risks into perspectivePutting online risks into perspective
Putting online risks into perspectiveConnectSafely
 
ConnectSafely Slide Show for Ministry of Communications and Information Techn...
ConnectSafely Slide Show for Ministry of Communications and Information Techn...ConnectSafely Slide Show for Ministry of Communications and Information Techn...
ConnectSafely Slide Show for Ministry of Communications and Information Techn...ConnectSafely
 

Mais de ConnectSafely (11)

How to Protect Yourself From Heartbleed Security Flaw
How to Protect Yourself From Heartbleed Security FlawHow to Protect Yourself From Heartbleed Security Flaw
How to Protect Yourself From Heartbleed Security Flaw
 
A Brief Guide to Facebook Privacy
A Brief Guide to Facebook PrivacyA Brief Guide to Facebook Privacy
A Brief Guide to Facebook Privacy
 
How to Create (use use) Strong & Unique Passwords
How to Create (use use) Strong & Unique PasswordsHow to Create (use use) Strong & Unique Passwords
How to Create (use use) Strong & Unique Passwords
 
Online Safety 3.0: From Fear to Empowerment
Online Safety 3.0: From Fear to EmpowermentOnline Safety 3.0: From Fear to Empowerment
Online Safety 3.0: From Fear to Empowerment
 
Internet Safety: Some Context
Internet Safety: Some ContextInternet Safety: Some Context
Internet Safety: Some Context
 
Digital literacy, digital citizenship
Digital literacy, digital citizenshipDigital literacy, digital citizenship
Digital literacy, digital citizenship
 
Digital reputations
Digital reputationsDigital reputations
Digital reputations
 
Making the case for digital citizenship
Making the case for digital citizenshipMaking the case for digital citizenship
Making the case for digital citizenship
 
Digital citizenship, briefly
Digital citizenship, brieflyDigital citizenship, briefly
Digital citizenship, briefly
 
Putting online risks into perspective
Putting online risks into perspectivePutting online risks into perspective
Putting online risks into perspective
 
ConnectSafely Slide Show for Ministry of Communications and Information Techn...
ConnectSafely Slide Show for Ministry of Communications and Information Techn...ConnectSafely Slide Show for Ministry of Communications and Information Techn...
ConnectSafely Slide Show for Ministry of Communications and Information Techn...
 

Último

Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 

Último (20)

Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 

Filters and monitoring: Panacea or band-aid

  • 1. Parental controls: An overview Larry Magid Co-Director ConnectSafely.org Safer Internet Day Moscow, February 2012
  • 2. Filtering technologies Device None DNS Level ISP Mandatory Router ISP Optional
  • 3. What parental controls can do • Block undesirable content such as sites containing sexual images or advocate violence or use of drugs or alcohol • Block websites that parents or authorities are concerned about such as social networking (Facebook, Google+, Twitter) • Limit how a child uses a device by total amount of time per day, time of day or day of week • Block or limit features on device such as texting, games, web access or any specific program or app • Monitor & report on use of device or service
  • 4. Technical Issues around filtering • Overblocking • Underblocking • Levels of control • Granularity gives greater control but more confusing • Parental white listing tools • Parental black listing tools • Filtering vs. monitoring • Issues of “too much information” • Children’s privacy (trust factor) • Stealth vs. open
  • 5. What filters can’t do very well • Prevent bullying and peer harassment • Prevent posting inappropriate content – reputation damage • Prevent inappropriate or unwanted contact* • Tech self-control and critical thinking* *Monitoring technologies can be used for these purposes
  • 6. Monitoring • Can run on device or on network • Should it report report all activity or just suspicious activity? • Should it report on private conversations or just public postings or what people are saying about child? • Safetyweb vs. Spectorsoft • Can run in stealth mode or require child to know it’s running
  • 7. Social Issues around parental controls • Openness of what is being filtered and by what criteria • Part of a conversation or stealth mode? • How and when do you wean children away from filtering? • Values that go into filtering are not necessarily universally accepted • Free speech issues • Especially with social networking • Privacy and trust • Failure to teach critical thinking
  • 8. Illegal content • We need to separate the question of “child pornography” from Internet safety. • Child pornography (child abuse images) is a legal issue. • Internet safety is a social issue • Most NGOs and government officials in the U.S. are very careful not to mix child abuse images with other concerns such as adult pornography, drug abuse, extremism and intellectual property protection • There is some concern that controlling any content could lead to banning more content, including political speech

Notas do Editor

  1. None:Effective for some children, especially teensDevice level:Works best for younger children. Teens can often get around it and may not need it. Doesn’t work on “other” devicesRouter level in home or schoolAn excellent way to regulate content throughout home or school. Can have adult “accounts.” Doesn’t work away from home (mobile)DNS LevelSimilar to router control only coming from DNS serverISP optional blocking (allows parents to request blocking by ISP)ISP mandatoryRaises serious free speech issues, Can be defeated via proxy servers and tunneling. One-size fits all approach for everyone, regardless of age