SlideShare a Scribd company logo
Parental controls: An overview

         Larry Magid
           Co-Director
        ConnectSafely.org




         Safer Internet Day
         Moscow, February 2012
Filtering technologies


                            Device
     None                               DNS Level




                                        ISP Mandatory
                         Router
ISP Optional
What parental controls can do
• Block undesirable content such as sites containing
  sexual images or advocate violence or use of drugs or
  alcohol
• Block websites that parents or authorities are
  concerned about such as social networking
  (Facebook, Google+, Twitter)
• Limit how a child uses a device by total amount of
  time per day, time of day or day of week
• Block or limit features on device such as
  texting, games, web access or any specific program or
  app
• Monitor & report on use of device or service
Technical Issues around filtering
• Overblocking
• Underblocking
• Levels of control
   • Granularity gives greater control but more
     confusing
• Parental white listing tools
• Parental black listing tools
• Filtering vs. monitoring
   • Issues of “too much information”
   • Children’s privacy (trust factor)
   • Stealth vs. open
What filters can’t do very well
• Prevent bullying and peer harassment
• Prevent posting inappropriate content
   – reputation damage
• Prevent inappropriate or unwanted contact*
• Tech self-control and critical thinking*

*Monitoring technologies can be used for these purposes
Monitoring
• Can run on device or on network
• Should it report report all activity or just
  suspicious activity?
• Should it report on private conversations or
  just public postings or what people are
  saying about child?
  • Safetyweb vs. Spectorsoft
• Can run in stealth mode or require child to
  know it’s running
Social Issues around parental controls
•   Openness of what is being filtered and by what
    criteria
•   Part of a conversation or stealth mode?
•   How and when do you wean children away from
    filtering?
•   Values that go into filtering are not necessarily
    universally accepted
•   Free speech issues
    • Especially with social networking
•   Privacy and trust
•   Failure to teach critical thinking
Illegal content
•   We need to separate the question of “child
    pornography” from Internet safety.
    • Child pornography (child abuse images) is a legal
        issue.
    • Internet safety is a social issue
•   Most NGOs and government officials in the U.S. are
    very careful not to mix child abuse images with other
    concerns such as adult pornography, drug abuse,
    extremism and intellectual property protection
•   There is some concern that controlling any content
    could lead to banning more content, including
    political speech

More Related Content

What's hot

Online safety 2011
Online safety 2011Online safety 2011
Online safety 2011
Tea Teić
 
Social Media for Families
Social Media for FamiliesSocial Media for Families
Social Media for Families
Nicastro Consultants
 
Online Safety Tips for Parents
Online Safety Tips for ParentsOnline Safety Tips for Parents
Online Safety Tips for Parents
Kristi Richburg
 
Securityguide
SecurityguideSecurityguide
Securityguide
Oleg Kostyukevich
 
Online Safety 3.0 - Presentation for Parents and Teachers
Online Safety 3.0 - Presentation for Parents and TeachersOnline Safety 3.0 - Presentation for Parents and Teachers
Online Safety 3.0 - Presentation for Parents and Teachers
Larry Magid
 
Social Media Security
Social Media SecuritySocial Media Security
Social Media Security
Del Belcher
 
[PPT] Webinar on Cyber Safety Training for Young Students
[PPT] Webinar on Cyber Safety Training for Young Students[PPT] Webinar on Cyber Safety Training for Young Students
[PPT] Webinar on Cyber Safety Training for Young Students
Shubham Gupta
 
Social Networking and Internet Safety
Social Networking and Internet SafetySocial Networking and Internet Safety
Social Networking and Internet Safety
NMSU - Family Resource Management
 
Cybersafety overview
Cybersafety overviewCybersafety overview
Cybersafety overview
John Woodring
 
Online Safety for Parents
Online Safety for ParentsOnline Safety for Parents
Online Safety for Parents
Rodolfo Salazar
 
Cyber citizenship
Cyber citizenshipCyber citizenship
Cyber citizenshipkaeschliman
 
Parents guide to technology
Parents guide to technologyParents guide to technology
Parents guide to technology
Brad McAllister
 
Social Media Basics: Security Loopholes with Twitter & Other Social Media
Social Media Basics: Security Loopholes with Twitter & Other Social MediaSocial Media Basics: Security Loopholes with Twitter & Other Social Media
Social Media Basics: Security Loopholes with Twitter & Other Social Media
Tyler Shields
 
Internet Safety for Parents
Internet Safety for ParentsInternet Safety for Parents
Internet Safety for Parents
Scott Burnett
 
Cybersafeelementary
CybersafeelementaryCybersafeelementary
CybersafeelementaryRick Ohren
 
parent_teacher_tutorial
parent_teacher_tutorialparent_teacher_tutorial
parent_teacher_tutorialtutorialsruby
 
Social media risk
Social media riskSocial media risk
Social media risk
Mosoco Ltd
 
Online Security for Kids
Online Security for KidsOnline Security for Kids
Online Security for Kids
Patrick Laverty
 
How to Like Social Media Network Security
How to Like Social Media Network SecurityHow to Like Social Media Network Security
How to Like Social Media Network Security
Brian Honan
 
Chad olivard internet safety powerpoint presentation itc 525
Chad olivard internet safety powerpoint presentation itc 525Chad olivard internet safety powerpoint presentation itc 525
Chad olivard internet safety powerpoint presentation itc 525chadolivard
 

What's hot (20)

Online safety 2011
Online safety 2011Online safety 2011
Online safety 2011
 
Social Media for Families
Social Media for FamiliesSocial Media for Families
Social Media for Families
 
Online Safety Tips for Parents
Online Safety Tips for ParentsOnline Safety Tips for Parents
Online Safety Tips for Parents
 
Securityguide
SecurityguideSecurityguide
Securityguide
 
Online Safety 3.0 - Presentation for Parents and Teachers
Online Safety 3.0 - Presentation for Parents and TeachersOnline Safety 3.0 - Presentation for Parents and Teachers
Online Safety 3.0 - Presentation for Parents and Teachers
 
Social Media Security
Social Media SecuritySocial Media Security
Social Media Security
 
[PPT] Webinar on Cyber Safety Training for Young Students
[PPT] Webinar on Cyber Safety Training for Young Students[PPT] Webinar on Cyber Safety Training for Young Students
[PPT] Webinar on Cyber Safety Training for Young Students
 
Social Networking and Internet Safety
Social Networking and Internet SafetySocial Networking and Internet Safety
Social Networking and Internet Safety
 
Cybersafety overview
Cybersafety overviewCybersafety overview
Cybersafety overview
 
Online Safety for Parents
Online Safety for ParentsOnline Safety for Parents
Online Safety for Parents
 
Cyber citizenship
Cyber citizenshipCyber citizenship
Cyber citizenship
 
Parents guide to technology
Parents guide to technologyParents guide to technology
Parents guide to technology
 
Social Media Basics: Security Loopholes with Twitter & Other Social Media
Social Media Basics: Security Loopholes with Twitter & Other Social MediaSocial Media Basics: Security Loopholes with Twitter & Other Social Media
Social Media Basics: Security Loopholes with Twitter & Other Social Media
 
Internet Safety for Parents
Internet Safety for ParentsInternet Safety for Parents
Internet Safety for Parents
 
Cybersafeelementary
CybersafeelementaryCybersafeelementary
Cybersafeelementary
 
parent_teacher_tutorial
parent_teacher_tutorialparent_teacher_tutorial
parent_teacher_tutorial
 
Social media risk
Social media riskSocial media risk
Social media risk
 
Online Security for Kids
Online Security for KidsOnline Security for Kids
Online Security for Kids
 
How to Like Social Media Network Security
How to Like Social Media Network SecurityHow to Like Social Media Network Security
How to Like Social Media Network Security
 
Chad olivard internet safety powerpoint presentation itc 525
Chad olivard internet safety powerpoint presentation itc 525Chad olivard internet safety powerpoint presentation itc 525
Chad olivard internet safety powerpoint presentation itc 525
 

Similar to Filters and monitoring: Panacea or band-aid

Cyber Security.pptx
Cyber Security.pptxCyber Security.pptx
Cyber Security.pptx
saththiyans1
 
Ethics in Cyber Space
Ethics in Cyber SpaceEthics in Cyber Space
Ethics in Cyber Space
Muhammad Rawaha Saleem
 
Internet Safety for Parents
Internet Safety for ParentsInternet Safety for Parents
Internet Safety for Parents
Lori Lee Mickelson
 
Pp e safe online p2 n
Pp e safe online p2 nPp e safe online p2 n
Pp e safe online p2 n
FatimaAmin26
 
Keep Your Family Safe Online - Michael Kaiser
Keep Your Family Safe Online - Michael KaiserKeep Your Family Safe Online - Michael Kaiser
Keep Your Family Safe Online - Michael Kaiser
IT-oLogy
 
Pp e safe online p2
Pp e safe online p2Pp e safe online p2
Pp e safe online p2
FatimaAmin26
 
Internet Safety Presentation for Parents
Internet Safety Presentation for ParentsInternet Safety Presentation for Parents
Internet Safety Presentation for Parents
Marian Merritt
 
E safety-parent-workshop
E safety-parent-workshop E safety-parent-workshop
E safety-parent-workshop
wwihead
 
Digital citizenship pp
Digital citizenship ppDigital citizenship pp
Digital citizenship pp
Katie Ward
 
A Parent's Guide to Keeping Kids Safe Online
A Parent's Guide to Keeping Kids Safe OnlineA Parent's Guide to Keeping Kids Safe Online
A Parent's Guide to Keeping Kids Safe Online
Corinne Weisgerber
 
Guideline about responsible use of social networks
Guideline about responsible use of social networksGuideline about responsible use of social networks
Guideline about responsible use of social networks
profesorjulioperez
 
Cybersecurity for King County Public Educators
Cybersecurity for King County Public EducatorsCybersecurity for King County Public Educators
Cybersecurity for King County Public Educators
Sarah K Miller
 
Common Sense Media Presentation to Woodward North Parent Community
Common Sense Media Presentation to Woodward North Parent CommunityCommon Sense Media Presentation to Woodward North Parent Community
Common Sense Media Presentation to Woodward North Parent Community
ellen.adolph
 
Introduction to Cyber Security
Introduction to Cyber SecurityIntroduction to Cyber Security
Introduction to Cyber Security
Quick Heal Technologies Ltd.
 
privacy and security
privacy and securityprivacy and security
privacy and security
ronit_jadhav
 
Girls Talk August 2016
Girls Talk August 2016Girls Talk August 2016
Girls Talk August 2016
Kathryn White
 
Cyber Safe Parenting
Cyber Safe ParentingCyber Safe Parenting
Cyber Safe Parenting
Rohit Srivastwa
 
Privacy and Social Networks
Privacy and Social NetworksPrivacy and Social Networks
Privacy and Social Networks
Ouriel Ohayon
 

Similar to Filters and monitoring: Panacea or band-aid (20)

Privacy and safety
Privacy and safetyPrivacy and safety
Privacy and safety
 
Cyber Security.pptx
Cyber Security.pptxCyber Security.pptx
Cyber Security.pptx
 
Ethics in Cyber Space
Ethics in Cyber SpaceEthics in Cyber Space
Ethics in Cyber Space
 
Internet Safety for Parents
Internet Safety for ParentsInternet Safety for Parents
Internet Safety for Parents
 
Internet Safety for Parents
Internet Safety for ParentsInternet Safety for Parents
Internet Safety for Parents
 
Pp e safe online p2 n
Pp e safe online p2 nPp e safe online p2 n
Pp e safe online p2 n
 
Keep Your Family Safe Online - Michael Kaiser
Keep Your Family Safe Online - Michael KaiserKeep Your Family Safe Online - Michael Kaiser
Keep Your Family Safe Online - Michael Kaiser
 
Pp e safe online p2
Pp e safe online p2Pp e safe online p2
Pp e safe online p2
 
Internet Safety Presentation for Parents
Internet Safety Presentation for ParentsInternet Safety Presentation for Parents
Internet Safety Presentation for Parents
 
E safety-parent-workshop
E safety-parent-workshop E safety-parent-workshop
E safety-parent-workshop
 
Digital citizenship pp
Digital citizenship ppDigital citizenship pp
Digital citizenship pp
 
A Parent's Guide to Keeping Kids Safe Online
A Parent's Guide to Keeping Kids Safe OnlineA Parent's Guide to Keeping Kids Safe Online
A Parent's Guide to Keeping Kids Safe Online
 
Guideline about responsible use of social networks
Guideline about responsible use of social networksGuideline about responsible use of social networks
Guideline about responsible use of social networks
 
Cybersecurity for King County Public Educators
Cybersecurity for King County Public EducatorsCybersecurity for King County Public Educators
Cybersecurity for King County Public Educators
 
Common Sense Media Presentation to Woodward North Parent Community
Common Sense Media Presentation to Woodward North Parent CommunityCommon Sense Media Presentation to Woodward North Parent Community
Common Sense Media Presentation to Woodward North Parent Community
 
Introduction to Cyber Security
Introduction to Cyber SecurityIntroduction to Cyber Security
Introduction to Cyber Security
 
privacy and security
privacy and securityprivacy and security
privacy and security
 
Girls Talk August 2016
Girls Talk August 2016Girls Talk August 2016
Girls Talk August 2016
 
Cyber Safe Parenting
Cyber Safe ParentingCyber Safe Parenting
Cyber Safe Parenting
 
Privacy and Social Networks
Privacy and Social NetworksPrivacy and Social Networks
Privacy and Social Networks
 

More from ConnectSafely

How to Protect Yourself From Heartbleed Security Flaw
How to Protect Yourself From Heartbleed Security FlawHow to Protect Yourself From Heartbleed Security Flaw
How to Protect Yourself From Heartbleed Security Flaw
ConnectSafely
 
A Brief Guide to Facebook Privacy
A Brief Guide to Facebook PrivacyA Brief Guide to Facebook Privacy
A Brief Guide to Facebook Privacy
ConnectSafely
 
How to Create (use use) Strong & Unique Passwords
How to Create (use use) Strong & Unique PasswordsHow to Create (use use) Strong & Unique Passwords
How to Create (use use) Strong & Unique Passwords
ConnectSafely
 
Online Safety 3.0: From Fear to Empowerment
Online Safety 3.0: From Fear to EmpowermentOnline Safety 3.0: From Fear to Empowerment
Online Safety 3.0: From Fear to Empowerment
ConnectSafely
 
Internet Safety: Some Context
Internet Safety: Some ContextInternet Safety: Some Context
Internet Safety: Some Context
ConnectSafely
 
Digital literacy, digital citizenship
Digital literacy, digital citizenshipDigital literacy, digital citizenship
Digital literacy, digital citizenship
ConnectSafely
 
Digital reputations
Digital reputationsDigital reputations
Digital reputations
ConnectSafely
 
Making the case for digital citizenship
Making the case for digital citizenshipMaking the case for digital citizenship
Making the case for digital citizenship
ConnectSafely
 
Digital citizenship, briefly
Digital citizenship, brieflyDigital citizenship, briefly
Digital citizenship, briefly
ConnectSafely
 
Putting online risks into perspective
Putting online risks into perspectivePutting online risks into perspective
Putting online risks into perspective
ConnectSafely
 
ConnectSafely Slide Show for Ministry of Communications and Information Techn...
ConnectSafely Slide Show for Ministry of Communications and Information Techn...ConnectSafely Slide Show for Ministry of Communications and Information Techn...
ConnectSafely Slide Show for Ministry of Communications and Information Techn...ConnectSafely
 

More from ConnectSafely (11)

How to Protect Yourself From Heartbleed Security Flaw
How to Protect Yourself From Heartbleed Security FlawHow to Protect Yourself From Heartbleed Security Flaw
How to Protect Yourself From Heartbleed Security Flaw
 
A Brief Guide to Facebook Privacy
A Brief Guide to Facebook PrivacyA Brief Guide to Facebook Privacy
A Brief Guide to Facebook Privacy
 
How to Create (use use) Strong & Unique Passwords
How to Create (use use) Strong & Unique PasswordsHow to Create (use use) Strong & Unique Passwords
How to Create (use use) Strong & Unique Passwords
 
Online Safety 3.0: From Fear to Empowerment
Online Safety 3.0: From Fear to EmpowermentOnline Safety 3.0: From Fear to Empowerment
Online Safety 3.0: From Fear to Empowerment
 
Internet Safety: Some Context
Internet Safety: Some ContextInternet Safety: Some Context
Internet Safety: Some Context
 
Digital literacy, digital citizenship
Digital literacy, digital citizenshipDigital literacy, digital citizenship
Digital literacy, digital citizenship
 
Digital reputations
Digital reputationsDigital reputations
Digital reputations
 
Making the case for digital citizenship
Making the case for digital citizenshipMaking the case for digital citizenship
Making the case for digital citizenship
 
Digital citizenship, briefly
Digital citizenship, brieflyDigital citizenship, briefly
Digital citizenship, briefly
 
Putting online risks into perspective
Putting online risks into perspectivePutting online risks into perspective
Putting online risks into perspective
 
ConnectSafely Slide Show for Ministry of Communications and Information Techn...
ConnectSafely Slide Show for Ministry of Communications and Information Techn...ConnectSafely Slide Show for Ministry of Communications and Information Techn...
ConnectSafely Slide Show for Ministry of Communications and Information Techn...
 

Recently uploaded

Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
Elena Simperl
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
Paul Groth
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
Safe Software
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
Product School
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Jeffrey Haguewood
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
Product School
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Product School
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
Sri Ambati
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Thierry Lestable
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
Dorra BARTAGUIZ
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 

Recently uploaded (20)

Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 

Filters and monitoring: Panacea or band-aid

  • 1. Parental controls: An overview Larry Magid Co-Director ConnectSafely.org Safer Internet Day Moscow, February 2012
  • 2. Filtering technologies Device None DNS Level ISP Mandatory Router ISP Optional
  • 3. What parental controls can do • Block undesirable content such as sites containing sexual images or advocate violence or use of drugs or alcohol • Block websites that parents or authorities are concerned about such as social networking (Facebook, Google+, Twitter) • Limit how a child uses a device by total amount of time per day, time of day or day of week • Block or limit features on device such as texting, games, web access or any specific program or app • Monitor & report on use of device or service
  • 4. Technical Issues around filtering • Overblocking • Underblocking • Levels of control • Granularity gives greater control but more confusing • Parental white listing tools • Parental black listing tools • Filtering vs. monitoring • Issues of “too much information” • Children’s privacy (trust factor) • Stealth vs. open
  • 5. What filters can’t do very well • Prevent bullying and peer harassment • Prevent posting inappropriate content – reputation damage • Prevent inappropriate or unwanted contact* • Tech self-control and critical thinking* *Monitoring technologies can be used for these purposes
  • 6. Monitoring • Can run on device or on network • Should it report report all activity or just suspicious activity? • Should it report on private conversations or just public postings or what people are saying about child? • Safetyweb vs. Spectorsoft • Can run in stealth mode or require child to know it’s running
  • 7. Social Issues around parental controls • Openness of what is being filtered and by what criteria • Part of a conversation or stealth mode? • How and when do you wean children away from filtering? • Values that go into filtering are not necessarily universally accepted • Free speech issues • Especially with social networking • Privacy and trust • Failure to teach critical thinking
  • 8. Illegal content • We need to separate the question of “child pornography” from Internet safety. • Child pornography (child abuse images) is a legal issue. • Internet safety is a social issue • Most NGOs and government officials in the U.S. are very careful not to mix child abuse images with other concerns such as adult pornography, drug abuse, extremism and intellectual property protection • There is some concern that controlling any content could lead to banning more content, including political speech

Editor's Notes

  1. None:Effective for some children, especially teensDevice level:Works best for younger children. Teens can often get around it and may not need it. Doesn’t work on “other” devicesRouter level in home or schoolAn excellent way to regulate content throughout home or school. Can have adult “accounts.” Doesn’t work away from home (mobile)DNS LevelSimilar to router control only coming from DNS serverISP optional blocking (allows parents to request blocking by ISP)ISP mandatoryRaises serious free speech issues, Can be defeated via proxy servers and tunneling. One-size fits all approach for everyone, regardless of age