+ All Categories
Home > Documents > 1 Copyright © 2010 M. E. Kabay. All rights reserved. Censorship & Content Filtering in Public...

1 Copyright © 2010 M. E. Kabay. All rights reserved. Censorship & Content Filtering in Public...

Date post: 25-Dec-2015
Category:
Upload: tracy-whitehead
View: 213 times
Download: 1 times
Share this document with a friend
50
Copyright © 2010 M. E. Kabay. All rights reserved. Censorship & Content Filtering in Public Institutions Supplement to CSH5 Chapter 72 Legal and Policy Issues of Censorship and Content Filtering Lee Tien, Seth Finkelstein, and Steven Lovaas
Transcript
Page 1: 1 Copyright © 2010 M. E. Kabay. All rights reserved. Censorship & Content Filtering in Public Institutions Supplement to CSH5 Chapter 72 Legal and Policy.

1 Copyright © 2010 M. E. Kabay. All rights reserved.

Censorship & Content Filtering

in Public Institutions

Supplement to CSH5 Chapter 72Legal and Policy Issues of

Censorship and Content FilteringLee Tien, Seth Finkelstein, and

Steven Lovaas

Page 2: 1 Copyright © 2010 M. E. Kabay. All rights reserved. Censorship & Content Filtering in Public Institutions Supplement to CSH5 Chapter 72 Legal and Policy.

2 Copyright © 2010 M. E. Kabay. All rights reserved.

Objectives

This set of notes supplements CSH5 Chapter 72However, the materials do not correspond to the

structure of the chapterMuch of the lecture is devoted to exploring the

functional requirements and difficulties of schools and public libraries as examples of institutions influenced by First Amendment considerations.Corporations have a much easier range of

choices when controlling Internet access (see Chapter 48, E-mail and Internet Use Policies, in the CSH5)

Page 3: 1 Copyright © 2010 M. E. Kabay. All rights reserved. Censorship & Content Filtering in Public Institutions Supplement to CSH5 Chapter 72 Legal and Policy.

3 Copyright © 2010 M. E. Kabay. All rights reserved.

Topics

Case Study: Schools and Public Libraries

CorporationsFiltering TechnologyManagement Alternatives

Page 4: 1 Copyright © 2010 M. E. Kabay. All rights reserved. Censorship & Content Filtering in Public Institutions Supplement to CSH5 Chapter 72 Legal and Policy.

4 Copyright © 2010 M. E. Kabay. All rights reserved.

Case Study: Schools and Public Libraries

Problems on the InternetResponsibilities to StakeholdersLegal ContextPolitical context: conflicting pressures

Page 5: 1 Copyright © 2010 M. E. Kabay. All rights reserved. Censorship & Content Filtering in Public Institutions Supplement to CSH5 Chapter 72 Legal and Policy.

5 Copyright © 2010 M. E. Kabay. All rights reserved.

Problems on the Internet

PedophilesHate groupsPornographyPlagiarismStolen music & videoWarezVirusesCriminal hackersGamesSocial Networking

Page 6: 1 Copyright © 2010 M. E. Kabay. All rights reserved. Censorship & Content Filtering in Public Institutions Supplement to CSH5 Chapter 72 Legal and Policy.

6 Copyright © 2010 M. E. Kabay. All rights reserved.

Pedophiles

Misrepresentation as youngstersChat roomsE-mailVideo filmsBus/Airline tickets -- meetings

Page 7: 1 Copyright © 2010 M. E. Kabay. All rights reserved. Censorship & Content Filtering in Public Institutions Supplement to CSH5 Chapter 72 Legal and Policy.

7 Copyright © 2010 M. E. Kabay. All rights reserved.

Hate Groups

Growing movements across worldAnti-everything

RacistAnti-Catholic, anti-Jewish, anti-. . . .Homophobic

Recruiting young people through WebHate-rockPropaganda

Page 8: 1 Copyright © 2010 M. E. Kabay. All rights reserved. Censorship & Content Filtering in Public Institutions Supplement to CSH5 Chapter 72 Legal and Policy.

8 Copyright © 2010 M. E. Kabay. All rights reserved.

Pornography

Widespread – massive amount of contentMisleading URLs

Trademark violations, variant domainshttp://www.whitehouse.com (no longer

active)Misspellings

http://www.micosoft.com (no longer active)

Junk e-mail invitationse.g., new CompuServe accounts in 1990s

received invitation for Russian porn from St Petersburg within 60 seconds

Page 9: 1 Copyright © 2010 M. E. Kabay. All rights reserved. Censorship & Content Filtering in Public Institutions Supplement to CSH5 Chapter 72 Legal and Policy.

9 Copyright © 2010 M. E. Kabay. All rights reserved.

Plagiarism

Buy / trade copies of essays, term paperswide range of subjects, styleschoose your preferred grade (A+, B-. . .)

Write-to-orderGraduate studentsImpecunious adjunct faculty

Anti-plagiarism sites available for teachersCheck student paper against database of

stolen papers; e.g., http://www.doccop.com http://turnitin.com

Page 10: 1 Copyright © 2010 M. E. Kabay. All rights reserved. Censorship & Content Filtering in Public Institutions Supplement to CSH5 Chapter 72 Legal and Policy.

10 Copyright © 2010 M. E. Kabay. All rights reserved.

Stolen Music & Video

Widespread problemTrading copies of musicMost without permission – copyright

violationsLawsuits against companies & individuals

MPAA, RIAAProblems

Bandwidth saturation – many colleges trapping protocols by packet type

Legal liability

Page 11: 1 Copyright © 2010 M. E. Kabay. All rights reserved. Censorship & Content Filtering in Public Institutions Supplement to CSH5 Chapter 72 Legal and Policy.

11 Copyright © 2010 M. E. Kabay. All rights reserved.

WarezStolen software

Violation of copyright lawOften virus-infectedMany Trojan Horse programs

SitesWarez exchangesIndividual exchangesElectronic auction servicesCompletely fake download sites – no

software, only theft of PIISevere penalties for school systems

Los Angeles: $5M fines

Page 12: 1 Copyright © 2010 M. E. Kabay. All rights reserved. Censorship & Content Filtering in Public Institutions Supplement to CSH5 Chapter 72 Legal and Policy.

12 Copyright © 2010 M. E. Kabay. All rights reserved.

Malware

Self-replicating codeProgram infectorsBoot-sector virusesInternet-enabled worms

Non-replicating code: Trojan Horse programsSources

AccidentDeliberate infectionVirus-exchange sites

DamagingAvailability, integrity, confidentiality,

control, authenticity, utility

Page 13: 1 Copyright © 2010 M. E. Kabay. All rights reserved. Censorship & Content Filtering in Public Institutions Supplement to CSH5 Chapter 72 Legal and Policy.

13 Copyright © 2010 M. E. Kabay. All rights reserved.

Criminal Hackers

PropagandaUSENET groupsWeb sitesPrinted magazinesRegular meetings (2600)

Appeals to kidsGroup affiliationRebellionPowerVideo-game syndrome

Page 14: 1 Copyright © 2010 M. E. Kabay. All rights reserved. Censorship & Content Filtering in Public Institutions Supplement to CSH5 Chapter 72 Legal and Policy.

14 Copyright © 2010 M. E. Kabay. All rights reserved.

(Hacker sites)

Page 15: 1 Copyright © 2010 M. E. Kabay. All rights reserved. Censorship & Content Filtering in Public Institutions Supplement to CSH5 Chapter 72 Legal and Policy.

15 Copyright © 2010 M. E. Kabay. All rights reserved.

(Hacker sites)

Page 16: 1 Copyright © 2010 M. E. Kabay. All rights reserved. Censorship & Content Filtering in Public Institutions Supplement to CSH5 Chapter 72 Legal and Policy.

16 Copyright © 2010 M. E. Kabay. All rights reserved.

Games

Cooperative multiplayer gamesQuakeDoomGambling

More a nuisance than a dangerHigh bandwidth utilization

Page 17: 1 Copyright © 2010 M. E. Kabay. All rights reserved. Censorship & Content Filtering in Public Institutions Supplement to CSH5 Chapter 72 Legal and Policy.

17 Copyright © 2010 M. E. Kabay. All rights reserved.

Social Networking

Explosive growth since 1990s55.6M US users online at least once/monthhttp://mashable.com/2009/07/28/social-net

working-users-us/

181 major social networking sites:http://en.wikipedia.org/wiki/List_of_social_

networking_websites

11 major online dating sites:http://en.wikipedia.org/wiki/List_of_online_

dating_websites

Page 18: 1 Copyright © 2010 M. E. Kabay. All rights reserved. Censorship & Content Filtering in Public Institutions Supplement to CSH5 Chapter 72 Legal and Policy.

18 Copyright © 2010 M. E. Kabay. All rights reserved.

Responsibilities to Stakeholders

SchoolsProvide access to informationProtect children against abuseRespect wishes of parentsComply with educational standards

LibrariesProvide access to informationComply with legal requirements against

illegal materialsAvoid violating 1st Amendment

Page 19: 1 Copyright © 2010 M. E. Kabay. All rights reserved. Censorship & Content Filtering in Public Institutions Supplement to CSH5 Chapter 72 Legal and Policy.

19 Copyright © 2010 M. E. Kabay. All rights reserved.

Corporations

Private industry can regulate use of corporate assets

Key issue is policy awarenessPolicy must be clear and unambiguousAll employees must know and understand

the policies on appropriate usePolicies compliance must be monitored

and enforced consistentlyFailure to protect employees against

exposure to offensive materials may be grounds for tort: hostile work environment

Page 20: 1 Copyright © 2010 M. E. Kabay. All rights reserved. Censorship & Content Filtering in Public Institutions Supplement to CSH5 Chapter 72 Legal and Policy.

20 Copyright © 2010 M. E. Kabay. All rights reserved.

Costs of Inappropriate Use

of Internet AccessMassive costsSome cases where 20-40% of user time spent

misusing Internet accessGross waste of resources and wagesDemoralizes hard-working staffDecreases respect for lax management Increases petty violations of other policies

and rules (e.g., theft of supplies)

Page 21: 1 Copyright © 2010 M. E. Kabay. All rights reserved. Censorship & Content Filtering in Public Institutions Supplement to CSH5 Chapter 72 Legal and Policy.

21 Copyright © 2010 M. E. Kabay. All rights reserved.

Technology

MonitoringTools for reviewing what users are doing

on the NetFiltering

Tools for limiting what users are doing on the Net

Page 22: 1 Copyright © 2010 M. E. Kabay. All rights reserved. Censorship & Content Filtering in Public Institutions Supplement to CSH5 Chapter 72 Legal and Policy.

22 Copyright © 2010 M. E. Kabay. All rights reserved.

Monitoring

Page 23: 1 Copyright © 2010 M. E. Kabay. All rights reserved. Censorship & Content Filtering in Public Institutions Supplement to CSH5 Chapter 72 Legal and Policy.

23 Copyright © 2010 M. E. Kabay. All rights reserved.

Monitoring

Page 24: 1 Copyright © 2010 M. E. Kabay. All rights reserved. Censorship & Content Filtering in Public Institutions Supplement to CSH5 Chapter 72 Legal and Policy.

24 Copyright © 2010 M. E. Kabay. All rights reserved.

Monitoring

Page 25: 1 Copyright © 2010 M. E. Kabay. All rights reserved. Censorship & Content Filtering in Public Institutions Supplement to CSH5 Chapter 72 Legal and Policy.

25 Copyright © 2010 M. E. Kabay. All rights reserved.

Monitoring

Page 26: 1 Copyright © 2010 M. E. Kabay. All rights reserved. Censorship & Content Filtering in Public Institutions Supplement to CSH5 Chapter 72 Legal and Policy.

26 Copyright © 2010 M. E. Kabay. All rights reserved.

Monitoring

Page 27: 1 Copyright © 2010 M. E. Kabay. All rights reserved. Censorship & Content Filtering in Public Institutions Supplement to CSH5 Chapter 72 Legal and Policy.

27 Copyright © 2010 M. E. Kabay. All rights reserved.

MonitoringAudit trails

disk filesbrowser URL trailbrowser disk cacheanti-virus productsanti-game softwareanti-MP3-music software

Real-time alertsWeb pagesuspect e-mail content

Human inspectionremote-access softwaresupervising by walking around

Page 28: 1 Copyright © 2010 M. E. Kabay. All rights reserved. Censorship & Content Filtering in Public Institutions Supplement to CSH5 Chapter 72 Legal and Policy.

28 Copyright © 2010 M. E. Kabay. All rights reserved.

Filtering

Anti-virus productsFirewallsSelf-rating & filtering proposalsCensorware

Page 29: 1 Copyright © 2010 M. E. Kabay. All rights reserved. Censorship & Content Filtering in Public Institutions Supplement to CSH5 Chapter 72 Legal and Policy.

29 Copyright © 2010 M. E. Kabay. All rights reserved.

Firewalls

CorporateCan block access to specific types of

trafficE.g., P2P file/music/video sharingOften integrates antivirus capabilities

Workstation firewallsZone-AlarmBlackIceNortonMcAfee

Page 30: 1 Copyright © 2010 M. E. Kabay. All rights reserved. Censorship & Content Filtering in Public Institutions Supplement to CSH5 Chapter 72 Legal and Policy.

30 Copyright © 2010 M. E. Kabay. All rights reserved.

Self-rating & Filtering Proposals

ICRA – Internet Content Rating AssociationRSACi systemalready works with common browsers

PICS – Platform for Internet Content SelectionFundamental question:

Why would objectionable sites rate themselves at all?

Page 31: 1 Copyright © 2010 M. E. Kabay. All rights reserved. Censorship & Content Filtering in Public Institutions Supplement to CSH5 Chapter 72 Legal and Policy.

31 Copyright © 2010 M. E. Kabay. All rights reserved.

RSACi Standards

Page 32: 1 Copyright © 2010 M. E. Kabay. All rights reserved. Censorship & Content Filtering in Public Institutions Supplement to CSH5 Chapter 72 Legal and Policy.

32 Copyright © 2010 M. E. Kabay. All rights reserved.

Censorware

TypesSite-specific exclusion

lists of forbidden sites – updated oftenContent recognition

lists of forbidden termsnudity-recognition algorithms

Problemsvery high false-positive rates (rejecting

sites unrelated to targets)political bias (rejecting educational sites

whose philosophy the makers reject)

Page 33: 1 Copyright © 2010 M. E. Kabay. All rights reserved. Censorship & Content Filtering in Public Institutions Supplement to CSH5 Chapter 72 Legal and Policy.

33 Copyright © 2010 M. E. Kabay. All rights reserved.

Legal Context: Disclaimer

I am not a lawyer and this is not legal advice.

For legal advice, consult an attorney with expertise in the area of law of concern to you who is licensed to practice law in your jurisdiction.

Page 34: 1 Copyright © 2010 M. E. Kabay. All rights reserved. Censorship & Content Filtering in Public Institutions Supplement to CSH5 Chapter 72 Legal and Policy.

34 Copyright © 2010 M. E. Kabay. All rights reserved.

Legal Context: First Amendment Law (USA ONLY)Complex area – much subtle reasoningUltra-simple summary:

Who cannot censor speech?governments acting against others as

sovereign to control unprotected speechgovernments acting against protected

speechWho can censor speech?

governments controlling their own speech or that of their agents

within limits, anyone else dealing with private speech on their own property

Page 35: 1 Copyright © 2010 M. E. Kabay. All rights reserved. Censorship & Content Filtering in Public Institutions Supplement to CSH5 Chapter 72 Legal and Policy.

35 Copyright © 2010 M. E. Kabay. All rights reserved.

Legal Context (2)

How do we decide if restrictions are constitutional or unconstitutional?

Determine capacity in which government is acting

Determine degree of protection of specific speech

Page 36: 1 Copyright © 2010 M. E. Kabay. All rights reserved. Censorship & Content Filtering in Public Institutions Supplement to CSH5 Chapter 72 Legal and Policy.

36 Copyright © 2010 M. E. Kabay. All rights reserved.

Determine Capacity

Sovereign – least power to regulate speechEmployer – can regulate speechProprietor – can regulateK-12 educator – broad but not unlimited powerUniversity educator – less discretion to controlSpeaker – complete power to control speechSubsidizer – complete power

Page 37: 1 Copyright © 2010 M. E. Kabay. All rights reserved. Censorship & Content Filtering in Public Institutions Supplement to CSH5 Chapter 72 Legal and Policy.

37 Copyright © 2010 M. E. Kabay. All rights reserved.

Determine Protection

Constitutionally valueless speechDeliberate or reckless falsehoodsObscenity (difficult issue)Child pornographyIncitement to lawless conductThreatsFighting words --- look this upCriminal solicitation or conspiracy

Intermediate protectionCommercial advertising that is not false or

misleadingSexually explicit but not obscene speech

Page 38: 1 Copyright © 2010 M. E. Kabay. All rights reserved. Censorship & Content Filtering in Public Institutions Supplement to CSH5 Chapter 72 Legal and Policy.

38 Copyright © 2010 M. E. Kabay. All rights reserved.

ObscenityAverage personCommunity standardsPatently offensivePrurient interestsLacking in serious valueNot protected by 1st Amendment

IndecencyPrimarily regulated for childrenProtected by 1st Amendment

Obscenity & IndecencyLiteraryArtisticPoliticalScientific

Child porn – felonyMakingTransmittingStoring

Page 39: 1 Copyright © 2010 M. E. Kabay. All rights reserved. Censorship & Content Filtering in Public Institutions Supplement to CSH5 Chapter 72 Legal and Policy.

39 Copyright © 2010 M. E. Kabay. All rights reserved.

Determine Protection (cont’d)

Fully-protected: all other speechpolitical, social, religious, philosophical,

scientificart, literature, music, poetryjokes, gossip, entertainment, casual chat

Page 40: 1 Copyright © 2010 M. E. Kabay. All rights reserved. Censorship & Content Filtering in Public Institutions Supplement to CSH5 Chapter 72 Legal and Policy.

40 Copyright © 2010 M. E. Kabay. All rights reserved.

Political Context: Conflicting Pressures

For filteringconcerned parentsright-wingreligious fundamentalists

Against filteringconcerned parentslibertarianscivil liberties advocatesprivacy activists

Page 41: 1 Copyright © 2010 M. E. Kabay. All rights reserved. Censorship & Content Filtering in Public Institutions Supplement to CSH5 Chapter 72 Legal and Policy.

41 Copyright © 2010 M. E. Kabay. All rights reserved.

Pro-Filtering

Page 42: 1 Copyright © 2010 M. E. Kabay. All rights reserved. Censorship & Content Filtering in Public Institutions Supplement to CSH5 Chapter 72 Legal and Policy.

42 Copyright © 2010 M. E. Kabay. All rights reserved.

Anti-Filtering

Page 43: 1 Copyright © 2010 M. E. Kabay. All rights reserved. Censorship & Content Filtering in Public Institutions Supplement to CSH5 Chapter 72 Legal and Policy.

43 Copyright © 2010 M. E. Kabay. All rights reserved.

Recommendations: Schools & LibrariesDefine standards of acceptable use for children,

students, teachers and staffimportant issue is the discussionsafeguard children against harmrespect other people

Page 44: 1 Copyright © 2010 M. E. Kabay. All rights reserved. Censorship & Content Filtering in Public Institutions Supplement to CSH5 Chapter 72 Legal and Policy.

44 Copyright © 2010 M. E. Kabay. All rights reserved.

Recommendations (2)

School/Library Internet oversight group include all concerned

studentsparentsteachersstaff

explicitly discuss each issueprotecting children against bad peopleprotecting others against childrenintellectual property rightstraining in critical thinking

Page 45: 1 Copyright © 2010 M. E. Kabay. All rights reserved. Censorship & Content Filtering in Public Institutions Supplement to CSH5 Chapter 72 Legal and Policy.

45 Copyright © 2010 M. E. Kabay. All rights reserved.

Recommendations (3)

Provide educational resources for all concernedacceptable-use guidelineslimited expectation of privacypamphletsURLs

Page 46: 1 Copyright © 2010 M. E. Kabay. All rights reserved. Censorship & Content Filtering in Public Institutions Supplement to CSH5 Chapter 72 Legal and Policy.

46 Copyright © 2010 M. E. Kabay. All rights reserved.

Recommendations (4)

At home, in libraries and schoolsUse supervision-by-walking-around

Install monitoring software, not blocking software

Discuss infractions with all concerned – parents, students, staff, teachers

Page 47: 1 Copyright © 2010 M. E. Kabay. All rights reserved. Censorship & Content Filtering in Public Institutions Supplement to CSH5 Chapter 72 Legal and Policy.

47 Copyright © 2010 M. E. Kabay. All rights reserved.

Review Questions (1)1. In what sense do schools and public libraries

tread a fine line between unfettered access to everything and strict controls on Internet access? Why do school and library administrators face a dilemma over Internet content?

2. Explain why it is generally seen as an easier management challenge to control Internet access in corporations than it is in schools and libraries.

Page 48: 1 Copyright © 2010 M. E. Kabay. All rights reserved. Censorship & Content Filtering in Public Institutions Supplement to CSH5 Chapter 72 Legal and Policy.

48 Copyright © 2010 M. E. Kabay. All rights reserved.

Review Questions (2)3. What are the consequences for users of false

positives in filtering software? For example, censorware has on occasion blocked computer source code because one line ended in NU and the next line began with DE. Other products blocked all e-mail or Web site that included the string “sex” anywhere at all in any word regardless of context. An astronomy site was blocked by censorware because of the use of phrases such as “visible to the naked eye” and “naked singularity.” Discuss the possible effects and costs of such blockages in (a) schools; (b) libraries; (c) businesses.

Page 49: 1 Copyright © 2010 M. E. Kabay. All rights reserved. Censorship & Content Filtering in Public Institutions Supplement to CSH5 Chapter 72 Legal and Policy.

49 Copyright © 2010 M. E. Kabay. All rights reserved.

Review Questions (3)4. Contrast the two main technologies for

controlling Internet access: monitoring and filtering. Which technology do you think poses greater management challenges for customer/user relations (a) in schools? (b) in libraries? Explain your answers.

5. Why do government-funded universities and libraries have more difficulty applying filtering software on their public terminals than privately-funded universities and libraries?

6. Do some research on the Web to determine the arguments presented (a) in favor of strong content filtering; (b) in favor of weak content filtering.

Page 50: 1 Copyright © 2010 M. E. Kabay. All rights reserved. Censorship & Content Filtering in Public Institutions Supplement to CSH5 Chapter 72 Legal and Policy.

50 Copyright © 2010 M. E. Kabay. All rights reserved.

DISCUSSION


Recommended