SlideShare a Scribd company logo
    The Problems with Web Filters.
 
Types of filters.
Black list filters
These block access to "bad" sites which have been blacklisted. 
White list filters
These are the most restrictive, allowing access only to sites on a 
list.
Keyword/ content list blockers.
These check sites for specific keywords and content, and block 
access if present.
Very often, due to the nature of this filter, sites with acceptable 
content are blocked.
None are perfect.
Black list filters - Can't possibly block all "bad" sites
   4.2 million, or 12%, of all websites are pornographic*
   Thousands of new websites come up every day.
White list filters are so restrictive that the Internet is crippled.
Keyword/ content list blockers very often block sites that have 
no pornographic or unacceptable material.
    Example - Yahoo Images blocked.
*   Source:  Internet Pornography Statistics, retrieved March 21, 2009, at
http://www.internet-filter-review.toptenreviews.com/internet-pornography-statistics.html
What detriment do filters cause to high school
students/teachers?
Filters in high schools prevent student learning in different ways:
 
• Filtering blocks students from accessing websites to gather data or research for 
school work when the site may be perfectly acceptable but the filter has blocked it
 
• Teachers may know of a great website to share with students or use as they are 
teaching a lesson but it is blocked. This interrupts the lesson or the teacher has to 
research another site to use.
 
• If the teacher needs to request a block be removed, this is not always done in a timely 
manner. Often it can take up to three days.
What detriment do filters cause to high school
students/teachers?
How can and how do teachers at this level protect and monitor students if there is not a
filter or even if there is one (they can't all be 100% perfect to achieve the goal!):
 
•     Teach students responsibility with consequences for misuse 
 
• Use the internet in a learning environment and teach how to enhance learning, not 
just "look stuff up"
 
• Communicate and let students know often what the policy is for internet use and be 
sure parents are aware as well. What students do at home is not always appropriate 
for the classroom!
The Emphasis is on
Science and Technology
• Our role as educators is to create a love of learning among our students 
and to prepare them to enter the workforce to be productive, contributing 
members of society.
 
• Having filters gives schools a false sense of control.  Tech savvy students will 
find a way around the filters.  
 
• We must educate our students on what is and is not  appropriate use of 
computers.  A gradual release of responsibility must be given to students if 
we expect them to be successful, independent learners. 
Education is Key!
 
• Implement clear guidelines on the expectations for appropriate 
computer usage at school.  Create a culture that encourages and 
understands the power of the computer as a learning tool when 
used appropriately. 
 
• Have clearly stated consequences for first and repeat offenders, 
similar to other rules and school policies.
 
• Have the guidelines and consequences included on the Acceptable 
Use Policy, which is signed by students and parents.
 
 Filtering in Elementary Schools?
Two schools of thought in support of the anti-filtering debate
I.  Elementary schools should not be filtered. 
 
• EdUCATE young students - teach students at a young age how to behave responsibly online 
o Teach how to use the Internet to find the information they need and how to avoid useless/harmful sites
o Build confidence and trust in children by using computers for online activities jointly with them
 
• Children should avoid bulletin boards and their chat rooms, where they are introduced to strangers 
o Teach them to never give out personal information
 
• Students using the Internet should be supervised and monitored the same way they are when viewing television
o Set and adhere to rules for access to the Internet
 
• Teacher-parent communication to ensure student safe Internet education and practice is occurring at both home and school
II. Teachers at elementary schools should not have the
same restrictions that students do.
• Teachable moments
• Teachers surveyed do the majority of their planning/downloading of educational materials at home due to the
stringent filtering process at their school
o Currently, when teachers want to access something that is blocked, they contact the Network Administrator
o The Net Admin then evaluates the site to ensure that it doesn’t violate any of the district’s Acceptable Use
Policy
o If it doesn’t violate the policy, the Net Admin would unblock the site
o This process could take up to 48 hours
o Teachable moment is long gone
Should your public library filter
the internet?
Children's Internet Protection Act
• CIPA, as it is commonly known, compels libraries that
recieve federal assistance for internet access to filter
computers with access to the internet to prevent access to
obscene or pornographic images and prevent minors from
accessing material that could be "harmful" to them.
• In U.S. v. American Library Ass'n, 539 U.S. 194 (2003), the
Supreme Court upheld CIPA, ruling that the First
Amendment does not preclude Congress from attaching
"strings" to benefits provided through federal funding.
• One key: libraries are obligated to allow access to a specific
website or to turn off the filter at the request of an adult
patron.
Why Care If Your Public Library Filters?
Filtering software is incapable of blocking only images that are
pornagraphic or obscene (the specific focus of CIPA) because
"the current definition of obscenity doesn't work on the
Internet."
Companies that sell filtering software do not disclose the types
of things or the specific sites they block -- categories are
described in 1 or 2 sentences so there's no way to know if
constitutionally protected material is being blocked. In other
words, you probably won't know that you can't access sites that
meet your search criteria.
Internet Filtering Software Tests: Barracuda, CyberPatrol,
Filtergage, & WebSense, San Jose Public Library, April 2, 2008
Why Care If Your Public Library Filters?
• Consider how the software company's definitions might
affect content blocked in the "Tasteless" category, for
example.
• Current software is particularly ineffective when applied to
images -- the filters tested either overblocked or
underblocked significantly.
Internet Filtering Software Tests: Barracuda, CyberPatrol,
Filtergage, & WebSense, San Jose Public Library, April 2, 2008
Why Not Try Alternatives?
• Locate internet terminals in public areas, especially near
the checkout desk, and away from the children's area.
• Install privacy screens to shelter screen images from casual
passersby.
• Australian Communications and Media Authority study
concluded that educating children about online safety is as
effective as filters in blocking access to inappropriate
content and more effective at preventing fraud, illegal
contact and cyber-bullying.
o News.com.au, February 26, 2008

More Related Content

What's hot

Fear of Filtering: The Reality of Internet Content Management (Soreide DOC)
Fear of Filtering: The Reality of Internet Content Management (Soreide DOC)Fear of Filtering: The Reality of Internet Content Management (Soreide DOC)
Fear of Filtering: The Reality of Internet Content Management (Soreide DOC)
Nebraska Library Commission
 
IS 201 Employers Using Facebook
IS 201 Employers Using FacebookIS 201 Employers Using Facebook
IS 201 Employers Using Facebook
Jeffrey Marsh Jr.
 
Mobile resource problems: Authentication and usability
Mobile resource problems: Authentication and usabilityMobile resource problems: Authentication and usability
Mobile resource problems: Authentication and usability
jiscebooksproject
 
Current Issue Paper
Current Issue PaperCurrent Issue Paper
Current Issue Paper
chellebelle84
 
Gathered information second news story (yikyak)
Gathered information second news story (yikyak)Gathered information second news story (yikyak)
Gathered information second news story (yikyak)
shaunaeleacy
 
Filtering for in and of on education
Filtering for in and of on educationFiltering for in and of on education
Filtering for in and of on education
Craig Cunningham
 
The Facebook Face-off
The Facebook Face-offThe Facebook Face-off
The Facebook Face-off
Alixandra Porembski, MBA
 
Acceptable use policy CHFHS
Acceptable use policy CHFHSAcceptable use policy CHFHS
Acceptable use policy CHFHS
MisterHobbs
 
2017 legal update for Williams supervisors
2017 legal update for Williams supervisors2017 legal update for Williams supervisors
2017 legal update for Williams supervisors
eph-hr
 
Its all in the design the importance of making courses legally accessible
Its all in the design the importance of making courses legally accessibleIts all in the design the importance of making courses legally accessible
Its all in the design the importance of making courses legally accessible
Raymond Rose
 
Speaks vo lumes_2015
Speaks vo lumes_2015Speaks vo lumes_2015
Speaks vo lumes_2015
Raymond Rose
 
Cyber reputation
Cyber reputationCyber reputation
Cyber reputation
Joann Noel
 
Social Implications and Ethics
Social Implications and EthicsSocial Implications and Ethics
Social Implications and Ethics
kelseybee316
 
Social Software for Empowerment
Social Software for EmpowermentSocial Software for Empowerment
Social Software for Empowerment
eKindling.org
 
Webquest college
Webquest collegeWebquest college
Webquest college
bllewelyn
 
Who Are They
Who Are TheyWho Are They
Who Are They
ajlerner
 
Web Spam Detection Using Machine Learning
Web Spam Detection Using Machine LearningWeb Spam Detection Using Machine Learning
Web Spam Detection Using Machine Learning
butest
 
Children & Youths Online
Children & Youths OnlineChildren & Youths Online
Children & Youths Online
veilma
 

What's hot (18)

Fear of Filtering: The Reality of Internet Content Management (Soreide DOC)
Fear of Filtering: The Reality of Internet Content Management (Soreide DOC)Fear of Filtering: The Reality of Internet Content Management (Soreide DOC)
Fear of Filtering: The Reality of Internet Content Management (Soreide DOC)
 
IS 201 Employers Using Facebook
IS 201 Employers Using FacebookIS 201 Employers Using Facebook
IS 201 Employers Using Facebook
 
Mobile resource problems: Authentication and usability
Mobile resource problems: Authentication and usabilityMobile resource problems: Authentication and usability
Mobile resource problems: Authentication and usability
 
Current Issue Paper
Current Issue PaperCurrent Issue Paper
Current Issue Paper
 
Gathered information second news story (yikyak)
Gathered information second news story (yikyak)Gathered information second news story (yikyak)
Gathered information second news story (yikyak)
 
Filtering for in and of on education
Filtering for in and of on educationFiltering for in and of on education
Filtering for in and of on education
 
The Facebook Face-off
The Facebook Face-offThe Facebook Face-off
The Facebook Face-off
 
Acceptable use policy CHFHS
Acceptable use policy CHFHSAcceptable use policy CHFHS
Acceptable use policy CHFHS
 
2017 legal update for Williams supervisors
2017 legal update for Williams supervisors2017 legal update for Williams supervisors
2017 legal update for Williams supervisors
 
Its all in the design the importance of making courses legally accessible
Its all in the design the importance of making courses legally accessibleIts all in the design the importance of making courses legally accessible
Its all in the design the importance of making courses legally accessible
 
Speaks vo lumes_2015
Speaks vo lumes_2015Speaks vo lumes_2015
Speaks vo lumes_2015
 
Cyber reputation
Cyber reputationCyber reputation
Cyber reputation
 
Social Implications and Ethics
Social Implications and EthicsSocial Implications and Ethics
Social Implications and Ethics
 
Social Software for Empowerment
Social Software for EmpowermentSocial Software for Empowerment
Social Software for Empowerment
 
Webquest college
Webquest collegeWebquest college
Webquest college
 
Who Are They
Who Are TheyWho Are They
Who Are They
 
Web Spam Detection Using Machine Learning
Web Spam Detection Using Machine LearningWeb Spam Detection Using Machine Learning
Web Spam Detection Using Machine Learning
 
Children & Youths Online
Children & Youths OnlineChildren & Youths Online
Children & Youths Online
 

Viewers also liked

Web Filters And Other Evil Doers
Web Filters And Other Evil DoersWeb Filters And Other Evil Doers
Web Filters And Other Evil Doers
cathtech
 
Topimages2008 1234888862749642 3
Topimages2008 1234888862749642 3Topimages2008 1234888862749642 3
Topimages2008 1234888862749642 3
Juan Luis Jiménez
 
The Impact Of Social Media On Public Health Reseach And Practice
The Impact Of Social Media On Public Health Reseach And PracticeThe Impact Of Social Media On Public Health Reseach And Practice
The Impact Of Social Media On Public Health Reseach And Practice
guest7996842
 
Espacios Con Producto Interno Resumen
Espacios Con  Producto  Interno  ResumenEspacios Con  Producto  Interno  Resumen
Espacios Con Producto Interno Resumen
Carlos Tinoco
 
Flyer ii evangile en partage(light)
Flyer ii evangile en partage(light)Flyer ii evangile en partage(light)
Flyer ii evangile en partage(light)cathobruxelles
 

Viewers also liked (6)

Web Filters And Other Evil Doers
Web Filters And Other Evil DoersWeb Filters And Other Evil Doers
Web Filters And Other Evil Doers
 
Topimages2008 1234888862749642 3
Topimages2008 1234888862749642 3Topimages2008 1234888862749642 3
Topimages2008 1234888862749642 3
 
Aula 01 keulen
Aula 01   keulenAula 01   keulen
Aula 01 keulen
 
The Impact Of Social Media On Public Health Reseach And Practice
The Impact Of Social Media On Public Health Reseach And PracticeThe Impact Of Social Media On Public Health Reseach And Practice
The Impact Of Social Media On Public Health Reseach And Practice
 
Espacios Con Producto Interno Resumen
Espacios Con  Producto  Interno  ResumenEspacios Con  Producto  Interno  Resumen
Espacios Con Producto Interno Resumen
 
Flyer ii evangile en partage(light)
Flyer ii evangile en partage(light)Flyer ii evangile en partage(light)
Flyer ii evangile en partage(light)
 

Similar to Web Filters And Other Evil Doers

Web Filters And Other Evil Doers
Web Filters And Other Evil DoersWeb Filters And Other Evil Doers
Web Filters And Other Evil Doers
Jazayer
 
A Substitute for Conscience?
A Substitute for Conscience?A Substitute for Conscience?
A Substitute for Conscience?
CASL
 
Understanding CIPA to Fight the Filter
Understanding CIPA to Fight the FilterUnderstanding CIPA to Fight the Filter
Understanding CIPA to Fight the Filter
Mark Moran
 
Trying Not to Filter: Internet Filtering Technologies in Libraries
Trying Not to Filter: Internet Filtering Technologies in LibrariesTrying Not to Filter: Internet Filtering Technologies in Libraries
Trying Not to Filter: Internet Filtering Technologies in Libraries
Sarah Houghton
 
Netsentron Content Filter
Netsentron Content FilterNetsentron Content Filter
Netsentron Content Filter
Tom Kobelt
 
Content filtering in schools
Content filtering in schoolsContent filtering in schools
Content filtering in schools
swurth2
 
The digital closet 2014 - slideshare - aug 20
The digital closet   2014 - slideshare - aug 20The digital closet   2014 - slideshare - aug 20
The digital closet 2014 - slideshare - aug 20
iSMSS, University of Alberta
 
Protect Our Kids From The Internet
Protect Our Kids From The InternetProtect Our Kids From The Internet
Protect Our Kids From The Internet
Tom Kobelt
 
Library Censorship
Library CensorshipLibrary Censorship
Library Censorship
Scott Lee
 
Research proposal
Research proposalResearch proposal
Research proposal
Saba Afaq
 
Presentation1
Presentation1Presentation1
Presentation1
mormonite
 
Al Live: Filtering: The Man in the Middle
Al Live: Filtering: The Man in the MiddleAl Live: Filtering: The Man in the Middle
Al Live: Filtering: The Man in the Middle
ALATechSource
 
Tagging - Can User Generated Content Improve Our Services?
Tagging - Can User Generated Content Improve Our Services?Tagging - Can User Generated Content Improve Our Services?
Tagging - Can User Generated Content Improve Our Services?
guestff5a190a
 
Realising Potential Of Web 2 0
Realising Potential Of Web 2 0Realising Potential Of Web 2 0
Realising Potential Of Web 2 0
lisbk
 
Usability for Government: improving service delivery
Usability for Government: improving service deliveryUsability for Government: improving service delivery
Usability for Government: improving service delivery
Ruth Ellison
 
Accessing internet resources best practices
Accessing internet resources  best practicesAccessing internet resources  best practices
Accessing internet resources best practices
Libsoul Technologies Pvt. Ltd.
 
The public library catalogue as a social space: A case study of social discov...
The public library catalogue as a social space: A case study of social discov...The public library catalogue as a social space: A case study of social discov...
The public library catalogue as a social space: A case study of social discov...
Louise Spiteri
 
Privacy On Track (Revised 1.27.11) Saira Nayak Aba Consumer Meeting
Privacy On Track (Revised 1.27.11)   Saira Nayak   Aba Consumer MeetingPrivacy On Track (Revised 1.27.11)   Saira Nayak   Aba Consumer Meeting
Privacy On Track (Revised 1.27.11) Saira Nayak Aba Consumer Meeting
NayakStrategies
 
Proxy For employee monitoring
Proxy  For employee monitoringProxy  For employee monitoring
Proxy For employee monitoring
Proxies Rent
 
Tagging: Can User-Generated Content Improve Our Services?
Tagging: Can User-Generated Content Improve Our Services?Tagging: Can User-Generated Content Improve Our Services?
Tagging: Can User-Generated Content Improve Our Services?
Katja Šnuderl
 

Similar to Web Filters And Other Evil Doers (20)

Web Filters And Other Evil Doers
Web Filters And Other Evil DoersWeb Filters And Other Evil Doers
Web Filters And Other Evil Doers
 
A Substitute for Conscience?
A Substitute for Conscience?A Substitute for Conscience?
A Substitute for Conscience?
 
Understanding CIPA to Fight the Filter
Understanding CIPA to Fight the FilterUnderstanding CIPA to Fight the Filter
Understanding CIPA to Fight the Filter
 
Trying Not to Filter: Internet Filtering Technologies in Libraries
Trying Not to Filter: Internet Filtering Technologies in LibrariesTrying Not to Filter: Internet Filtering Technologies in Libraries
Trying Not to Filter: Internet Filtering Technologies in Libraries
 
Netsentron Content Filter
Netsentron Content FilterNetsentron Content Filter
Netsentron Content Filter
 
Content filtering in schools
Content filtering in schoolsContent filtering in schools
Content filtering in schools
 
The digital closet 2014 - slideshare - aug 20
The digital closet   2014 - slideshare - aug 20The digital closet   2014 - slideshare - aug 20
The digital closet 2014 - slideshare - aug 20
 
Protect Our Kids From The Internet
Protect Our Kids From The InternetProtect Our Kids From The Internet
Protect Our Kids From The Internet
 
Library Censorship
Library CensorshipLibrary Censorship
Library Censorship
 
Research proposal
Research proposalResearch proposal
Research proposal
 
Presentation1
Presentation1Presentation1
Presentation1
 
Al Live: Filtering: The Man in the Middle
Al Live: Filtering: The Man in the MiddleAl Live: Filtering: The Man in the Middle
Al Live: Filtering: The Man in the Middle
 
Tagging - Can User Generated Content Improve Our Services?
Tagging - Can User Generated Content Improve Our Services?Tagging - Can User Generated Content Improve Our Services?
Tagging - Can User Generated Content Improve Our Services?
 
Realising Potential Of Web 2 0
Realising Potential Of Web 2 0Realising Potential Of Web 2 0
Realising Potential Of Web 2 0
 
Usability for Government: improving service delivery
Usability for Government: improving service deliveryUsability for Government: improving service delivery
Usability for Government: improving service delivery
 
Accessing internet resources best practices
Accessing internet resources  best practicesAccessing internet resources  best practices
Accessing internet resources best practices
 
The public library catalogue as a social space: A case study of social discov...
The public library catalogue as a social space: A case study of social discov...The public library catalogue as a social space: A case study of social discov...
The public library catalogue as a social space: A case study of social discov...
 
Privacy On Track (Revised 1.27.11) Saira Nayak Aba Consumer Meeting
Privacy On Track (Revised 1.27.11)   Saira Nayak   Aba Consumer MeetingPrivacy On Track (Revised 1.27.11)   Saira Nayak   Aba Consumer Meeting
Privacy On Track (Revised 1.27.11) Saira Nayak Aba Consumer Meeting
 
Proxy For employee monitoring
Proxy  For employee monitoringProxy  For employee monitoring
Proxy For employee monitoring
 
Tagging: Can User-Generated Content Improve Our Services?
Tagging: Can User-Generated Content Improve Our Services?Tagging: Can User-Generated Content Improve Our Services?
Tagging: Can User-Generated Content Improve Our Services?
 

Recently uploaded

June Patch Tuesday
June Patch TuesdayJune Patch Tuesday
June Patch Tuesday
Ivanti
 
Nordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptxNordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptx
MichaelKnudsen27
 
WeTestAthens: Postman's AI & Automation Techniques
WeTestAthens: Postman's AI & Automation TechniquesWeTestAthens: Postman's AI & Automation Techniques
WeTestAthens: Postman's AI & Automation Techniques
Postman
 
Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024
Jason Packer
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc
 
Generating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and MilvusGenerating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and Milvus
Zilliz
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
DianaGray10
 
Project Management Semester Long Project - Acuity
Project Management Semester Long Project - AcuityProject Management Semester Long Project - Acuity
Project Management Semester Long Project - Acuity
jpupo2018
 
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial IntelligenceAI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
IndexBug
 
OpenID AuthZEN Interop Read Out - Authorization
OpenID AuthZEN Interop Read Out - AuthorizationOpenID AuthZEN Interop Read Out - Authorization
OpenID AuthZEN Interop Read Out - Authorization
David Brossard
 
GraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracyGraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracy
Tomaz Bratanic
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 
GenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizationsGenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizations
kumardaparthi1024
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
Matthew Sinclair
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
shyamraj55
 
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
Edge AI and Vision Alliance
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
名前 です男
 
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdfHow to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
Chart Kalyan
 
Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
tolgahangng
 
Taking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdfTaking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdf
ssuserfac0301
 

Recently uploaded (20)

June Patch Tuesday
June Patch TuesdayJune Patch Tuesday
June Patch Tuesday
 
Nordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptxNordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptx
 
WeTestAthens: Postman's AI & Automation Techniques
WeTestAthens: Postman's AI & Automation TechniquesWeTestAthens: Postman's AI & Automation Techniques
WeTestAthens: Postman's AI & Automation Techniques
 
Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
 
Generating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and MilvusGenerating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and Milvus
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
 
Project Management Semester Long Project - Acuity
Project Management Semester Long Project - AcuityProject Management Semester Long Project - Acuity
Project Management Semester Long Project - Acuity
 
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial IntelligenceAI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
 
OpenID AuthZEN Interop Read Out - Authorization
OpenID AuthZEN Interop Read Out - AuthorizationOpenID AuthZEN Interop Read Out - Authorization
OpenID AuthZEN Interop Read Out - Authorization
 
GraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracyGraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracy
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 
GenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizationsGenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizations
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
 
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
 
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdfHow to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
 
Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
 
Taking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdfTaking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdf
 

Web Filters And Other Evil Doers

  • 4. What detriment do filters cause to high school students/teachers? Filters in high schools prevent student learning in different ways:   • Filtering blocks students from accessing websites to gather data or research for  school work when the site may be perfectly acceptable but the filter has blocked it   • Teachers may know of a great website to share with students or use as they are  teaching a lesson but it is blocked. This interrupts the lesson or the teacher has to  research another site to use.   • If the teacher needs to request a block be removed, this is not always done in a timely  manner. Often it can take up to three days.
  • 5. What detriment do filters cause to high school students/teachers? How can and how do teachers at this level protect and monitor students if there is not a filter or even if there is one (they can't all be 100% perfect to achieve the goal!):   •     Teach students responsibility with consequences for misuse    • Use the internet in a learning environment and teach how to enhance learning, not  just "look stuff up"   • Communicate and let students know often what the policy is for internet use and be  sure parents are aware as well. What students do at home is not always appropriate  for the classroom!
  • 6. The Emphasis is on Science and Technology • Our role as educators is to create a love of learning among our students  and to prepare them to enter the workforce to be productive, contributing  members of society.   • Having filters gives schools a false sense of control.  Tech savvy students will  find a way around the filters.     • We must educate our students on what is and is not  appropriate use of  computers.  A gradual release of responsibility must be given to students if  we expect them to be successful, independent learners. 
  • 7. Education is Key!   • Implement clear guidelines on the expectations for appropriate  computer usage at school.  Create a culture that encourages and  understands the power of the computer as a learning tool when  used appropriately.    • Have clearly stated consequences for first and repeat offenders,  similar to other rules and school policies.   • Have the guidelines and consequences included on the Acceptable  Use Policy, which is signed by students and parents.  
  • 8.  Filtering in Elementary Schools? Two schools of thought in support of the anti-filtering debate I.  Elementary schools should not be filtered.    • EdUCATE young students - teach students at a young age how to behave responsibly online  o Teach how to use the Internet to find the information they need and how to avoid useless/harmful sites o Build confidence and trust in children by using computers for online activities jointly with them   • Children should avoid bulletin boards and their chat rooms, where they are introduced to strangers  o Teach them to never give out personal information   • Students using the Internet should be supervised and monitored the same way they are when viewing television o Set and adhere to rules for access to the Internet   • Teacher-parent communication to ensure student safe Internet education and practice is occurring at both home and school
  • 9. II. Teachers at elementary schools should not have the same restrictions that students do. • Teachable moments • Teachers surveyed do the majority of their planning/downloading of educational materials at home due to the stringent filtering process at their school o Currently, when teachers want to access something that is blocked, they contact the Network Administrator o The Net Admin then evaluates the site to ensure that it doesn’t violate any of the district’s Acceptable Use Policy o If it doesn’t violate the policy, the Net Admin would unblock the site o This process could take up to 48 hours o Teachable moment is long gone
  • 10. Should your public library filter the internet?
  • 11. Children's Internet Protection Act • CIPA, as it is commonly known, compels libraries that recieve federal assistance for internet access to filter computers with access to the internet to prevent access to obscene or pornographic images and prevent minors from accessing material that could be "harmful" to them. • In U.S. v. American Library Ass'n, 539 U.S. 194 (2003), the Supreme Court upheld CIPA, ruling that the First Amendment does not preclude Congress from attaching "strings" to benefits provided through federal funding. • One key: libraries are obligated to allow access to a specific website or to turn off the filter at the request of an adult patron.
  • 12. Why Care If Your Public Library Filters? Filtering software is incapable of blocking only images that are pornagraphic or obscene (the specific focus of CIPA) because "the current definition of obscenity doesn't work on the Internet." Companies that sell filtering software do not disclose the types of things or the specific sites they block -- categories are described in 1 or 2 sentences so there's no way to know if constitutionally protected material is being blocked. In other words, you probably won't know that you can't access sites that meet your search criteria. Internet Filtering Software Tests: Barracuda, CyberPatrol, Filtergage, & WebSense, San Jose Public Library, April 2, 2008
  • 13. Why Care If Your Public Library Filters? • Consider how the software company's definitions might affect content blocked in the "Tasteless" category, for example. • Current software is particularly ineffective when applied to images -- the filters tested either overblocked or underblocked significantly. Internet Filtering Software Tests: Barracuda, CyberPatrol, Filtergage, & WebSense, San Jose Public Library, April 2, 2008
  • 14. Why Not Try Alternatives? • Locate internet terminals in public areas, especially near the checkout desk, and away from the children's area. • Install privacy screens to shelter screen images from casual passersby. • Australian Communications and Media Authority study concluded that educating children about online safety is as effective as filters in blocking access to inappropriate content and more effective at preventing fraud, illegal contact and cyber-bullying. o News.com.au, February 26, 2008