Skip to main content

Currently Skimming:

Index
Pages 445-450

The Chapter Skim interface presents what we've algorithmically identified as the most significant single chunk of text within every page in the chapter.
Select key terms on the right to highlight them within pages of the chapter.


From page 445...
... See also Spam Age verification, 62-65, 78-79,102, 206-209, 216, 328-329, 339-349, 360 AltaVista, 273 Ambiguities in language as related to filtering, 54-55, 138-140, 278, 420421, 422 445 American Family Online, 167-168 American Civil Liberties Union, 104 American Family Association, 168 American Social Health Association, 126, 173 Anonymizers, 66, 67,164 AOL parental controls, 162, 272, 275, 276, 284 Authentication technologies, 59, 62-64, 346 Automated policy preference negotiation, 346-347 B Bag-of-words model for matching documents, 422 Bandwidth, 37, 73 Beaver College, 278 n.l5 Best practices for homes, schools, libraries, 374-386 Biometric signatures, 62, 64-65 Black lists of inappropriate material, 52, 54 Blocking inappropriate material, 51-61,100, 103-104, 162, 194, 273-274, 279-280 Bulletin boards, 130, 272, 284 C Chain letters, 109-110
From page 446...
... interactive, 25, 139, 328-329 routes to, 40, 128-142, 281 theoretical perspectives, 117, 143-149 types of materials and experiences, 128129, 136-137, 159 warnings, 194, 300, 340, 341 F FBI Sex Offender Database, 114 Federal Communications Commission, 103, 110-112 Federal Trade Commission, 80, 106, 107110 File sharing (peer-to-peer)
From page 447...
... image analysis, 55-56, 58, 274, 298-299, 423424 location verification, 66-68, 426-428 search engines, 39, 41, 56, 74, 108, 342, 422, 424-426 technologies, 49-51, 418424 textual analysis, 54, 55, 58, 274, 418-422 user interfaces, 428429 INHOPE Hotlines, 215 Instant help, 268-269, 322-326 Instant messaging, 40, 4445, 130-131, 140, 141-142, 272, 274 n.6, 276, 286 Institute of Museum and Library Sciences, 103 Intel Corporation, 61 Intellectual property protection tools, 328329, 349-353 Internet access devices, 35-36, 381 anonymity, 33, 35, 66 applications running on, 45-46 benefits, 32, 294 child predation, 24,113,141-142, 166 and communication, 33 comparison to other media types, 32-35, 124-125 connectivity, 31-32, 36-38 deliberate exposure, 137,138,139,141142, 195-196, 268-269, 275, 341, 342 digital information characteristics, 31-32 economic issues, 35, 47, 72, 73, 361-362
From page 448...
... See child predation Monitoring and development of self-discipline, 308309, 313 and punishment, 308, 311 and trust, 312 defined, 305 privacy implications, 312-314 techniques of, 305-306 Mousetrapping, 74, 75, 78-79, 80, 108, 212213 Movies, 57-58, 81, 121, 133 n.39 N National Center for Missing and Exploited Children, 114, 214-215 National Crime Information Center, 114 National Law Enforcement Telecommunications Center, 114 National Telecommunications and Information Administration, 119-120 Netscape, 59, 282 Network interface card, 61 Network Solutions Inc., 109 Nielsen/Net Ratings, 78 o Obscene for minors definition, 107, 113-114, 137, 294, 359 labeling, 209 prohibitions against spam and mouse/rapping, 209-213 Obscenity civil liability for, 205 community standards, 66, 97, 98, 99, 107, 136 n.42, 137, 184, 203-204, 206207, 359 federal statutes, 96-97 First Amendment issues, 87-89, 96-97, 98, 137 prosecution for, 112-113, 201-205, 216-217 record keeping on performers, 99, 213 Offensive material, 137 Overblocking, 58-59, 275, 277, 278-279, 284
From page 449...
... soft-core, 25-26, 424 identifying, 51-59 impacts of viewing, 143-160,166-172 obscene for minors, 107, 137, 209-213, 359 and obscenity, 66, 86-89, 96-97, 98, 99, 107, 136 n.42, 137, 201-205, 359 as proxy in political debate, 172-180, 282-283, 373-374 range, 21-22, 71,128-129,136,160 sources, 136-142 Privacy, 66, 93,104-107, 268-269, 344 Protection. See also Regulatory efforts; Social and education strategies; Statutes and common law; Technology-based tools approaches, 196-200, 218-221, 364-368 dimensions, 188-190 449 First Amendment and, 89-92 identification of inappropriate material, 51-59, 183-188 institutional mission and, 191-192 politics of inappropriate material, 25-28, 192-194, 202-203 techniques, 194-196, 206-209 time line of actions, 190-191 trade-offs in, 368-374 Proxy servers, 281 n.21 Psychoanalytic theory, 117,146 Public policy, 202-203, 373-374, 383-386 Public records, 63-64, 342, 344, 345 Public terminals, 36, 37,127-128 Publius, 67 R Regulatory efforts, 80,107-112 Research needs, 386-387 Restore America's Moral Pride, 168 S Safe harbors for adult industry, 107, 208209, 342 School environments, 37, 95-96,100,103104, 124, 140, 162, 191-192, 273, 274, 280, 285, 378-380 Screen names, 272 Search engines, 39, 41, 56, 74, 108, 138,141, 208, 271, 342, 422, 424426.
From page 450...
... See also Filters/filtering, Monitoring, and Chapters 12 and 13 more generally contextual issues, 261-265 for non-end users, 327-353 questions to be asked about, 265-266 trade-offs in, 371-373 for users, 267-326 Text classification or categorization, 55, 420421 Third-party billing processors, 77 Thornburgh, Dick (chair) , personal statement, xv-xviii Time limits for Internet use, 195 U Underblocking, 58-59, 276-277, 284 Unfair and deceptive trade practices, 81, 107-110 University of Pennsylvania Center for the Study of Youth Policy, 141 Usenet newsgroups, 40, 42-43, 100, 129, 130, 131-132, 271, 276 User interfaces, 428429 User profiles, 130 V V-chip, 57, 61, 110, 111, 196, 197 Video games, 36, 57-58, 119 Videoconferencing, 45, 274 n.6 Violent speech and imagery, 23, 121-122, 149-153 Virtual reality, 69, 98 Voice interaction, 69 W White lists for appropriate content, 52, 272, 273 World Wide Web, 39, 40, 4546, 72-73, 101103 Consortium on Metadata, 57 hi' y Yahoo, 273 Youth Internet Safety Survey, 134


This material may be derived from roughly machine-read images, and so is provided only to facilitate research.
More information on Chapter Skim is available.