560 likes | 784 Views
Shining A Light on Filters. © 1998 Karen G. Schneider, MSLIS. What We Will Cover. What Filters Are & How They Work The Internet Filter Assessment Project The Role of Policy Other Access Management Options. Filters are tools that block Internet content. They can: . Proscribe content
E N D
Shining A Light on Filters © 1998 Karen G. Schneider, MSLIS
What We Will Cover • What Filters Are & How They Work • The Internet Filter Assessment Project • The Role of Policy • Other Access Management Options
Filters are tools that block Internet content. They can: • Proscribe content • Allocate resources • Focus staff/students onto specific topics
Why Filters? • Fear of “bad stuff” on the Internet • Need to control resources • Belief that filters work • Lack of confidence in other solutions
Filter Blocking Technologies • Keyword blocking: blocking word patterns (breast, butt, death) • Site blocking: blocking pre-identified URLs • Web Rating Systems
Keyword vs. Site Blocking • Keyword blocking uses software to identify sites • Cheap but inaccurate • Site blocking uses humans to select and categorize URLS • Costlier but less inaccurate
Keyword Blocking: Obliterating In Context • Typical of Cybersitter, Net Nanny • “____on, _____on, who’s got the ____on” • “Because I could not stop for ______” • “The owl and the ____-cat went to sea”
Keyword and Site Blocking: Preventing Site Transmission • Entire files or directories are blocked • Typical of most filters
Site Lists Prevent Local Control • Hidden, proprietary information--you don’t know what’s being blocked • A shoebox fit for community values--one list for everyone • Site lists outsource library work to nonprofessional third parties
Other technologies: blocking by… • Category • Specific user or Workstation ID • Time of day • Protocol (nntp, ftp, irc…)
Job Search Cult/New Age Homosexuality Drugs Travel Abortion/Pro-Life Racism Religion Sports Tasteless Chat Vehicles Examples of Filter Categories
Types of Filter Software • Client Software • Cyber Patrol, Surfwatch, Net Shepherd • Server-based software--usually a proxy-server • Cyber Patrol, Websense, Smart Filter, I-Gear, X-Stop
Clients • A client is a single computer or workstation • Client software is “standalone” (one copy per computer)
Servers • Servers are computers that provide services to a network
Many server-based filters work with proxy servers • Proxy servers redirect Internet queries from your browser through the proxy server P Internet
Filter Pricing Examples • Client Software: $12-40/copy per year • Server software pricing examples: • $2,000/50-user license • $4,000 startup plus $1/computer monthly license • $2685 for 50 simultaneous users
Filter Sequence of Events • You tell your browser to go to a website • The filter reviews the request…. Is this site or word allowed or denied by the filter?
Other things on the filter’s mind: Is access allowed for this user...time of day...type of resource? Hmmmmmmmmm... Let me check and see
Filter Sequence of Events, Continued • If the site, word or other value is NOT denied, you go there. • Otherwise, you see the denial page.
Web Ratings: how they work <META http-equiv="PICS-Label" content='(PICS-1.1 "http://www.rsac.org/ratingsv01.html" l gen true comment "RSACi North America Server" by "kgs@bluehighways.com" for "http://www.bluehighways.com/tifap/" on “2000.08.30T12:22-0500" r (n 0 s 0 v 0 l 1))'>
Nudity = 0 Violence = 0 Sex = 0 Language = 1 So the Rating for TIFAP Is: r (n 0 s 0 v 0 l 1)
Rating System Logic • If your browser is set to use RSACi, • And your threshold in the language category is 0, • You will NOT see the TIFAP website
How about Library Channel? • “Selection” tool pointing to 18,000 URLs • Includes blocking mechanisms • Three indexed fields • Title, URL, keywords
Library Channel... • Didn’t fare well with TIFAP testers • Browsing environment felt strange • Retrieval dependent on subject drill-down • Terms such as penis, herpes, trich were not good access points
Librarians tested filters used real questions from patrons Filters were tested in different configurations Most vendors cooperated by sharing full-strength versions of their filters The Internet Filter Assessment Project
TIFAP Findings • Fully-configured filters interfered with question-answering 35% of the time • Keyword blocking was a major source of interference • No filter ever performed flawlessly in either “direction” (over-blocking or leakage)
Advice from TIFAP • Test Filters • Configure Filters • Filters need feedback and QA tools
Filters are not Magic Cookies • Filters let through sexually-explicit material • Filters block protected speech • Filters require funding and maintenance
Filters Provide Poor Feedback • This is not the level of information libraries provide patrons when material is unavailable.
What Else Can’t Filters Do? • Filters can’t prevent adults from preying on children • “Presumption of prurience”: filters can’t identify intent • Filters can’t teach appropriate behavior
Minimum criteria for a filter • Compatible with existing software and hardware • Able to communicate with your system software • Viewable content • Content controllable at the local level • Access controlled by patron status and/or patron choice
Policy is the First Tool • policies for behavior • how to manage people in public places
Library Patrons Behaving Badly: • Sex in the bathrooms • A man belly-crawling through stacks to lick patrons’ feet • Irate husband chasing wife with gun • Shootings • Mutilating or stealing books & equipment • Putting Polaroids of penises in books • Peepers, flashers, starers, followers, etc.
Policy is a Local Solution • policies are set by local Boards • Boards create policy based upon…
Policy Reflects School/Community • What works best right here, right now? • What keeps most people happy???
Policies for Adults • These people are not so much adults as they are employees. • Right to Privacy? • Search and Sezure? • Library policies generally tell adults what they can’t DISPLAY--not what they can’t READ • library vs. public library vs. classroom with books
Policies for Children Reflect Local Standards for Control • require parental consent for child use of computers with Web access?? • sometimes used with filtering
Strong PR Parental consent forms Privacy screens & desks Computer positioning Filtering User education Good media & government relations School Board cooperation Security/ resource tools Beyond Policy: Other Tools for Internet Access Management
Filter Option #1: Filter Nothing(And Do Nothing Else) • Does not address loud public debate on Internet content • Lost opportunities for proactive leadership
Filter Option #2:Proactively Choose Not to Filter • Friendliest toward commitment to open access • Most difficult to administer
Filter Option #3:Filter Everything • Potential for legal action • Negative impact on information services • Bad blood in the community
Filter Option #4:Filter Selectively • Filter children’s workstations • Filter some (all) adult workstations • Password or leveled access for staff
User Education • It’s Popular • PR campaign • Aggressively proactive-- you set the tone
Privacy Screens • Some find them annoying(even MS teachers) • Can interfere with group work • Good for supporting privacy
Computer Positioning • “I’ll be right here (watching) if you have any questions”