August 2000Gio Wiederhold for COPA1 COPA notes Gio Wiederhold Computer Science Dept. and Medicine, Stanford University www-db.stanford.edu/people/gio.html.

Slides:



Advertisements
Similar presentations
Do the anti-circumvention provisions of the Digital Millennium Copyright (DMCA) Act further or harm public interests?
Advertisements

Website Content Filtering Featuring the Restricted to Adults (RTA) Label copyright 2008 rtalabel.org.
Hart District Acceptable Use Policy Acceptable Use Policy.
Sex Offender Registration and Community Notification Meeting The purpose of community notification is to provide information to protect you and your family,
Odessa national academy of telecommunications n. a. A.S. Popov Department of Automation and control of technological processes CONTENT IMAGES FILTERING.
Access to Electronic Media Acceptable Use Policy August 8, 2011 Meece Middle School.
Pornography and the Internet Amanda Gillespie Donna Jones EDCI 564.
IS112 – Chapter 1 Notes Computer Organization and Programming Professor Catherine Dwyer 2003.
1 Children and Families. 2 Children & Families Focus on the Internet Children’s Needs –Education –Entertainment Families’ Needs –Education –Protection.
IS112 – Chapter 1 Notes Computer Organization and Programming Professor Catherine Dwyer Fall 2004.
Freedom of Speech in Cyberspace 1. The U.S. Constitution - The 1 st Amendment: The 1 st Amendment Congress shall make no law respecting an establishment.
Everyday inclusive Web design: an activity perspective CS575 MADHAVI L NIDAMARTHY.
Dreamweaver 8 Concepts and Techniques Introduction Web Site Development and Macromedia Dreamweaver 8.
Copyright Challenges: a Brief Overview Presented by Dr. Marilyn Kaplan Faculty Senate, March 25, 2009.
Social Networking in Education Presented by Justin R. Clark.
Chapter 5 Application Software.
What Every Parent Needs to Know! Internet Safety Information for Parents Purpose: Provide practical information parents can use at home Present safety.
Introduction Social Implications & EthicsSocial Implications & Ethics Since the introduction of the Internet, many policies have been introduced as a way.
Brandon Hall CSC 540.  The US Government first attempted to filter the Internet in the early 90’s.  This was an attempt to protect minors against the.
Internet Censorship In order of appearance: Dmitriy Bespalov Ilya Braude Brian McBurney Yaroslav Volkov.
Chapter 17.3 Regulating the Internet. Internet Speech ► Free speech is a key democratic right. The Internet promotes free speech by giving all users a.
Internet Safety Guide for Teens Don’t give out personal information about yourself, your family situation, your school, your telephone number, or your.
Chapter 17 Objectives: 6.04, 6.05, 10.05, Using the Internet Web sites: pages on the World Wide Web that contain text, images, audio, and video.
Windows Internet Explorer 9 Chapter 1 Introduction to Internet Explorer.
Copyright © Allyn & Bacon 2008 POWER PRACTICE Chapter 8 Using the Web for Teaching and Learning START This multimedia product and its contents are protected.
Building a site on the World Wide Web requires more than simply learning the HTML language and starting out. You need to get a place to put your Web pages,
Copyright © Allyn & Bacon 2008 POWER PRACTICE Chapter 7 The Internet and the World Wide Web START This multimedia product and its contents are protected.
CS 4001Mary Jean Harrold1 Class 24 ŸFreedom of speech in cyberspace ŸAssign ŸAssignment 8—due today ŸTerm paper—due 11/20.
Employee Guidelines for Acceptable Use of Technology Resources.
Virtual Business CREATING A WEB PRESENCE Copyright © Texas Education Agency, All rights reserved.
WEB DESIGN SOLUTIONS. 2 Presentation by JAVANET SYSTEMS 1st Floor, ROFRA House, Suite 4, Kansanga, Gaba Road P.O Box 31586, Kampala, Uganda Tel: +256(0) ,
Accessing the Deep Web Bin He IBM Almaden Research Center in San Jose, CA Mitesh Patel Microsoft Corporation Zhen Zhang computer science at the University.
Privacy & Security Online Ivy, Kris & Neil Privacy Threat - Ivy Is Big Brother Watching You? - Kris Identity Theft - Kris Medical Privacy - Neil Children’s.
Chapter 17 E-Commerce and Digital Law
ITGS Case Study Theatre Booking System Ayushi Pradhan.
Computer Security 2 Keeping your computer safe. Computer Security 2 Computer Security 2 includes two lessons:  Lesson 3: Protecting yourself and your.
The Teacher Is In Charge There are dozens of free services, but Gaggle.Net is the only service designed specifically for classroom use. The biggest.
Why the Data Protection Act was brought in  The 1998 Data Protection Act was passed by Parliament to control the way information is handled and to give.
© Paradigm Publishing Inc. 5-1 Chapter 5 Application Software.
Customer Interface for wuw.com 1.Context. Customer Interface for wuw.com 2. Content Our web-site can be classified as an service-dominant website. 3.
Internet Filtering seyed Ehsan shariaty shiraz university of Technology.
McLean HIGHER COMPUTER NETWORKING Lesson 14 Firewalls & Filtering Comparison of Internet content filtering methods: firewalls, Internet filtering.
Educational Computing David Goldschmidt, Ph.D. Computer Science The College of Saint Rose CIS 204 Spring 2009.
CptS 401 Adam Carter. Quiz Question 7 Obscene speech is protected by the First Amendment. A. True B. False 2.
October 21, 2008 Jennifer Q.; Loriane M., Michelle E., Charles H. Internet Safety.
Evaluating & Maintaining a Site Domain 6. Conduct Technical Tests Dreamweaver provides many tools to assist in finalizing and testing your website for.
Examples for Open Access Scholar Electronic Repository by New Bulgarian University IP LibCMASS Sofia 2011 Contract № 2011-ERA-IP-7 Sofia, September,
 We assume the head librarians role  Recently updated the library computer systems  New resource for patrons – internet access  Teenager caught viewing.
Slides prepared by Cyndi Chie and Sarah Frye A Gift of Fire Third edition Sara Baase Chapter 3: Freedom of Speech.
Managing the Information Copyright © Texas Education Agency, All rights reserved.
Introducing the iboss Centralized filtering technology What is it? How will it work?
© 2010 Pearson Education, Inc., publishing as Prentice-Hall 1 INTERNET LAW AND E-COMMERCE © 2010 Pearson Education, Inc., publishing as Prentice-Hall CHAPTER.
Creating & Building the Web Site Week 8. Objectives Planning web site development Initiation of the project Analysis for web site development Designing.
Chapter 14 How Universal is access to Computers and the Web.
Lecture2 Networking. Overview and spam World Wide Web Censorship Freedom of expression Children and inappropriate content Breaking trust on the.
Laws and Rules That Govern Internet Safety Ashley Martin.
 In the 1960s, ARPANET (Advanced Research Projects Agency Network), the internet’s predecessor, was invented  ARPANET used two technologies that are.
Introduction. Internet Worldwide collection of computers and computer networks that link people to businesses, governmental agencies, educational institutions,
1 Web Technologies Website Publishing/Going Live! Copyright © Texas Education Agency, All rights reserved.
Windows Vista Configuration MCTS : Internet Explorer 7.0.
Computer Technology: Your Need to Know Chapter 1 Slide 1.
© 2015 CT State Library. All rights reserved. 2 Contacts Maria Bernier E-rate Coordinator CT State Library Scott Taylor.
Web Site Development and Macromedia Dreamweaver 8
A Tool for Implementing COPA+ (Child Online Protection Act)
Advanced Techniques for Automatic Web Filtering
Advanced Techniques for Automatic Web Filtering
A Gift of Fire Third edition Sara Baase
Freedom of Speech in Cyberspace
Student User Agreement and Policy 2022
A Gift of Fire Third edition Sara Baase
Presentation transcript:

August 2000Gio Wiederhold for COPA1 COPA notes Gio Wiederhold Computer Science Dept. and Medicine, Stanford University www-db.stanford.edu/people/gio.html Technology demo 3 August 2000, updated 6 August 2000 The purpose of the Child Online Protection Act is to prohibit online sites from knowingly making available to minors material that is "harmful to minors" (sexually explicit material meeting definitions set forth in the Act). Commercial providers of "harmful to minors" material may defend themselves against prosecution by restricting the access of minors to such material.

August 2000Gio Wiederhold for COPA2 Dealing with the system chain We have to consider the entire chain of flow from Producers to Consumers –The flow can be hindered at any link, but focused controls encourage workarounds The producers can be, and are likely to be anywhere; not only where US law applies –Many producers of pornography are financially motivated –There is also a significant remainder for whom it is a hobby The costs of setting up a pornographic website are small –Poverty and exhibitionism provides low-cost material –The cost is in marketing and collecting income The Internet’s capability to transmit images and video are increasing –Today, 2000, 1.4M homes have broadband access (ISDN, DSL, cable, T1, …) –By 2004 more than 20M homes will have it [Yankee group per Internet World, 1 August 2000] –Motivated by the entertainment industry, and unlikely to be stopped The consumers are not willing to pay for and install for restrictions –Libraries are reasonably concerned about limiting speech –Parents are not motivated to impose restrictions: trust, awkwardness, self-interest

August 2000Gio Wiederhold for COPA3 System issues If consumers, the final link, do not cooperate, the chain will not be broken –Illegal copying of copyrighted music –Non-payment of sales taxes –Drug use condoned by well-off urban and suburban households and –Watching Pornography - at one point ~50% of Internet use Some novel methods exist and could be applied at all 3 links –WIPE  can identify objectionable websites, and publish their IP addresses –Objectionable sites, identified by IP addresses, could be blocked by filters –WIPE can dynamically analyze web content and with high probability identify objectionable content, and be used to filter out such content –Parents and libraries can identify under-age consumers These technologies are not perfect, but their application is feasible –Installation of filters may be at ISPs, in browsers, at home, under parental control We will show next some images where our WIPE  technology failed showing failures provides understanding, also prevents embarrassment –In practice our purely image-analysis based technology would be 1. Applied to many images at a provider site, creating a very high confidence 2. Combined with other information, as text, recognition of museums, etc.

August 2000Gio Wiederhold for COPA4 WIPE Examples of benign images classified as objectionable Common composition of objectionable images Art from a museum collection Color mix too similar Much skin Color and composition too similar Using only image features ~ 7% over an image library

August 2000Gio Wiederhold for COPA5 WIPE, Failures to categorize offending pictures correctly (WIPE learns using images from offensive sites) Too dark (our blocking) Partially covered Little flesh Much surrounding material Using only image features ~ 3% over prurient web-sites

August 2000Gio Wiederhold for COPA6 Problem : NO single approach is perfect Rating & labeling websites depends on provider cooperation –Commercial providers may well comply –Amateurs, clubs, foreign sites would not comply Firewall and similar technologies, depend on IP addresses –IP addresses are large in number, change rapidly and cannot be controlled Checking for text is easily bypassed –the choices for indicative terms are wide, will create false constraints –suggestive terms can be hidden in images –however, commercial sites will want to be found Checking of image content [WIPE] also create false hits Websites using pirate processes can be recognized and included in bad-lists –disabling exit means, hijacking browser BACK buttons, excessive stickyness Combining multiple technologies can improve the performance It is easier to identify objectionable websites than to filter individual pages –Broadband speeds are difficult to match by processing technology

August 2000Gio Wiederhold for COPA7 Suggestion 1. Recognize both Greenfield (www. …. kid) areas, where kid-friendly parties can reside, perhaps monitored by a voluntary watchdog organization, and Redlight (www. ….xxx) areas where adult, explicit purveyors can reside. Most commercial adult sites might voluntarily enter that district, since they would be easy to find by their customers. Predatory sites, not in the.xxx domain, should be blacklisted. Note that these two areas will only occupy a few percent of the web content, since most commercial and most scientific sites will not want to label themselves green nor red. Not green is not red, and not red is not green! 2. Establish a consortium, supported by by the vendors of filtering tools and major portals, that would survey the non.xxx portion of the Internet, and locate, classify, and list objectionable, predator sites for all. It would share the redundant work of identifying objectionable sites, make the filtering more consistent, and provide a forum to allow appeals when sites have been misclassified. The filtering products would then still compete on the basis of ease-of-use, compatibility, methods of parental control, and price.

August 2000Gio Wiederhold for COPA8 Conclusion To deal with the problem of keeping objectionable material from our children, cooperation of all participants in www commerce is needed. No single solution will be adequate, but the a combination of technologies can do much to protect children from undesirable influences. Filtering tools must be improved, but until a market develops they will not be able to provide satisfactory services for parents. Filtering should be based on a combination of initial automatic text-analysis, image analysis, process analysis, and include human validation and review. We suggest establishment of a domain-based green/gray/red infrastructure, and a consortium to deal with the massive volume of material on the web. There is a cost to breaking the chain, and there must be willingness by parents and other participants to bear that cost, both financially and socially.

August 2000Gio Wiederhold for COPA9 Bio Gio Wiederhold is a Professor of Computer Science at Stanford University, with appointments in Medicine and Electrical Engineering. He has been active for many years in the application and development of knowledge-based techniques to database management, information systems, protection of information, and software construction and maintenance. His current research projects address resolving problems due to Heterogeneity of Information and Privacy Protection. Gio Wiederhold received a degree in aeronautical engineering in Holland in 1957 and started programming early computers at the NATO Air Defense Technical Center there. In 1958 he emigrated to the United States. After gaining 16 years of industrial experience, he returned to school and earned in 1976 a PhD in Medical Information Science from the University of California in San Francisco. He has been on the Stanford faculty since that time. From 1991 to 1994 he was on leave as a Program Manager for Knowledge-Based Systems at DARPA, initiating programs in Software Composition, Intelligent Integration of Information, and Digital Libraries. Professor Wiederhold has consulted for the US Department of Health and Human Services, various US defense agencies, and Silicon Valley innovators. He is, and has been, a member of many academic and governmental panels and boards, as well as editor of several professional publications. He is a fellow of the ACMI, the IEEE, and the ACM. He has published 4 books and more than 350 publications in computing and medicine. Professor Wiederhold's address is Department of Computer Science, Gates 4A, Stanford University, Stanford, CA His home page at provides details.