1 filtering - is this the answer? sarah ormes ukoln university of bath bath, ba2 7ay ukoln is funded...

Post on 24-Dec-2015

217 Views

Category:

Documents

1 Downloads

Preview:

Click to see full reader

TRANSCRIPT

1

Filtering - Is This The Answer?

Sarah Ormes

UKOLN

University of Bath

Bath, BA2 7AY

UKOLN is funded by the Library and Information Commission, the Joint Information Systems Committee (JISC) of the Higher Education Funding Councils, as well as by project funding from the JISC and the European Union. UKOLN also receives support from the University of Bath where it is based.

Emails.l.ormes@ukoln.ac.ukURLhttp://www.ukoln.ac.uk/

2

Today we will cover …What are filters, how do they work,

how well do they work?

Pros and Cons of Using a Filter

Things to think about if you do

Things to think about if you don’t

Acceptable Use Policies

3

What’s the Question?

All libraries providing access to the Internet need to address the following issues:

• Some users will deliberately access and view pornography

• Children could gain access to ‘offensive sites’

• The library could by default provide access to illegal material

4

What is Filtering?

• Software which is used to control access to material on the Internet

• Typically used to prevent access to pornography and other potentially offensive material

• Used in many organisations including public libraries and schools

5

How Does it Work?

• Four main methods used:• Keyword blocking• Site blocking• Web rating systems• Walled Garden approach

• Combinations of the above

6

Keyword Blocking

• Uses a list of ‘objectional terms’• Blocks any or part of pages/e-mails containing these words

• Can be inaccurate e.g. Essex, Dick Whittington, Penistone could be blocked

• Generally viewed as the least sophisticated method

7

Site Blocking (1)

• Software company maintains a list of ‘dubious Internet sites’

• The software prevents access to any sites on this list

• ‘Denial lists’ regularly updated• Some software provides control over what categories of information you block

8

Site Blocking (2)

• Who decides what goes on the ‘denial list’ and what criteria are they using?

• Can you keep track of the whole Internet?• Filters can use both site blocking and word blocking.

9

Web Rating Systems (1)

Web sites rated in terms of nudity, sex, violence and language

RSACI Nudity Categories

Level 4: Provocative Frontal NudityLevel 3: Frontal NudityLevel 2: Partial NudityLevel 1: Revealing AttireLevel 0: None of the Above

10

Web Rating Systems (2)

• Ratings either done by web page author or by independent bureau

• Browsers set to only accept pages with certain levels of ratings

• Very low take up so far• Who decides the ratings?

11

Walled Garden Approach

• Only provide access to a set of approved links

• Analogous to book selection• Time consuming and hard work• Means users will only have access to a tiny percentage of Internet resources

12

How well do they work?

The Internet Filter Assessment Project

•Over 35% of the time, the filters blocked some information needed to answer a question

•Eight percent of what filters accessed they determined was ‘objectionable’

The Internet Filter Assessment Projecthttp://www.bluehighways.com/tifap/

13

Stories From the Web

14

Stories from the Web through a filter

15

Searching for ‘SXXXXhorpe’

16

Slipping through the Net (1)

17

Slipping through the Net (2)

18

www.whitehouse.com

19

At the Moment…

• Filters do not work perfectly - they block valid resources and they don’t block some objectionable resource

• Filters do block a lot of objectionable material

• Filters are the only product available at the moment

• Is it a matter of what your acceptable level of failure is?

20

Pros • Deselecting poor quality resources

• haven’t libraries always done this? • Children and pornography

• making the library as safe an environment as possible

• Legal issues• protecting the library from legal challenges

• Being seen to be doing something• public knows the library is trying to provide a

safe environment

21

Cons• Freedom of access to information

• The library starts censoring

• Who decides what is filtered?• How sophisticated are the selections?

• The library as the information ‘safety net’• The only access point to the Internet for

some users

• Legal issues• Can you provide a safe environment with

filters?

22

Providing an appropriate Internet environment

• A filter is not THE solution

• It is one step of managing access

• It is not an easy option

• Incorporate filtering into an

implementable policy

Choosing a Filter Presentation http://www.ukoln.ac.uk/public/present/nag/

23

The Perfect Filter!

• Blocking can be en/disabled• Access to list of blocked words and sites

• Add/remove words and sites from lists

• Blocking based on PICS

• Blocking by time, location, status of user

• Methods of alerting users these products are in use

• Understandable ‘blocked’ message.

24

Managing Access without a Filter

• Offer training classes for parents and children

• Privacy screens?• Can children surf alone? Do they need their parent’s permission?

• Provide useful collections of links• Publicise your rules

25

Draw up an Acceptable Use Policy

26

Essential PolicyComponents (1)

• Why does the library provide Internet access (relate to other library policies)?

• What type of material can be accessed on the Internet? (warning)

• What responsibility does the library have for material accessed and how this material is used?

27

• Who will be able to use the library’s Internet workstations?

• What type of resources can/can’t users access?

• How do you expect your users to act?

Essential PolicyComponents (2)

28

• What will happen if they break these rules?

• What are the rules about children?• Do they need parental permission?

Essential PolicyComponents (3)

29

• Filtering• Does the library filter?• Why did it decide to filter?• How was the filtering tool chosen?• What does it do?

Essential PolicyComponents (4)

30

Access, Security and Control• Access

• What kind of access do you want to provide and why?

• Security• Do filters answer your security

problems?• Control

• Is your library in control?

31

Further Information

• An Introduction to Filtering - available at •http://www.earl.org.uk/taskgroups/policy/issue_papers/nocolumns.htm

• Schneider, K. (1997) A Practical Guide to Internet Filters. Neal Schuman: New York.

• Other links and this presentation at http://www.ukoln.ac.uk/public/present/london/

top related