Download presentation
Presentation is loading. Please wait.
Published byMiles Parrish Modified over 9 years ago
1
1 Filtering Web Content for Staff and the Public Sarah Ormes UKOLN University of Bath Bath, BA2 7AY UKOLN is funded by Resource: The Council for Museums, Archives & Libraries, the Joint Information Systems Committee (JISC) of the Higher Education Funding Councils, as well as by project funding from the JISC and the European Union. UKOLN also receives support from the University of Bath where it is based. Email s.l.ormes@ukoln.ac.uk URL http://www.ukoln.ac.uk/
2
2 What is Filtering? Software used to control access to material on the Web Typically used to prevent access to pornography and other potentially offensive material Used in many organisations including public libraries and schools Used in some workplaces to prevent misuse of Internet facilities
3
3 How Does it Work? Four main methods used: Keyword blocking Site blocking Web rating systems Walled garden approach Combinations of the above
4
4 Keyword Blocking Uses a list of ‘objectionable terms’ Blocks any or part of pages/e-mails containing these words Can be inaccurate e.g. Essex, Dick Whittington, Penistone could be blocked Generally viewed as the least sophisticated method
5
5 Site Blocking (1) Software company maintains a list of ‘dubious Internet sites’ The software prevents access to any sites on this list ‘Denial lists’ regularly updated Some software provides control over what categories of information you block
6
6 Site Blocking (2) Who decides what goes on the ‘denial list’ and what criteria are they using? How well do that criteria match onto your needs? Can you keep track of the whole Internet? Filters can use both site blocking and word blocking.
7
7 Web Rating Systems (1) Web sites rated in terms of nudity, sex, violence and language RSACI Nudity Categories Level 4: Provocative Frontal Nudity Level 3: Frontal Nudity Level 2: Partial Nudity Level 1: Revealing Attire Level 0: None of the Above
8
8 Web Rating Systems (2) Ratings either done by web page author or by independent bureaux Browsers set to only accept pages with certain levels of ratings Very low take up so far Who decides the ratings?
9
9 Walled Garden Approach Only provide access to a set of approved links Analogous to book selection Time consuming and hard work Means users will only have access to a tiny percentage of Internet resources
10
10 How well do they work? The Internet Filter Assessment Project Over 35% of the time, the filters blocked some information needed to answer a question Eight percent of what filters accessed they determined was ‘objectionable’ The Internet Filter Assessment Project http://www.bluehighways.com/tifap/
11
11 Stories From the Web
12
12 Stories from the Web through a filter
13
13 Slipping through the Net
14
14 www.whitehouse.com
15
15 At the Moment… Filters do not work perfectly - they block valid resources and they don’t block some objectionable resource Filters do block a lot of objectionable material Filters are the only product available at the moment Is it a matter of what your acceptable level of failure is?
16
16 Pros Deselecting poor quality resources haven’t libraries always done this? Children and pornography making the library as safe an environment as possible Legal issues protecting the library from legal challenges Being seen to be doing something public knows the library is trying to provide a safe environment
17
17 Cons Freedom of access to information The library starts censoring Who decides what is filtered? How sophisticated are the selections? The library as the information ‘safety net’ The only access point to the Internet for some users Legal issues Can you provide a safe environment with filters?
18
18 Draw up an Acceptable Use Policy
19
19 Essential Policy Components (1) Why does the library provide Internet access (relate to other library policies)? What type of material can be accessed on the Internet? (warning) What responsibility does the library have for material accessed and how this material is used?
20
20 Who can use the library’s Internet workstations? What type of resources can/can’t users/staff access? How do you expect your users/staff to act? State whether the library users filters or not - explain why. Essential Policy Components (2)
21
21 What will happen if users break these rules? What will happen if staff break these rules? (accidentally or on purpose) What are the rules about children? Do they need parental permission? Essential Policy Components (3)
22
22 Publicise your policy!
23
23 Access, Security and Control Access What kind of access do you want to provide and why? Security Do filters answer your security problems? Control Is your library in control or is the filter?
24
24 Further Information An Introduction to Filtering - available at http://www.earl.org.uk/taskgroups/ policy/issue_papers/nocolumns.htm Schneider, K. (1997) A Practical Guide to Internet Filters. Neal Schuman: New York. Other links and this presentation at http://www.ukoln.ac.uk/public/ present/spin/
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.