Shining Light on Filters in Libraries

advertisement
Shining A Light on Filters
© 1998 Karen G. Schneider, MSLIS
What We Will Cover
• What Filters Are & How They Work
• The Internet Filter Assessment Project
• The Role of Policy
• Other Access Management Options
Filters are tools that block
Internet content. They can:
• Proscribe content
• Allocate resources
• Focus staff/students onto specific
topics
Why Filters?
• Fear of “bad stuff” on the Internet
• Need to control resources
• Belief that filters work
• Lack of confidence in other solutions
Filter Blocking Technologies
• Keyword blocking: blocking word
patterns (breast, butt, death)
• Site blocking: blocking pre-identified
URLs
• Web Rating Systems
Keyword vs. Site Blocking
• Keyword blocking uses software to
identify sites
– Cheap but inaccurate
• Site blocking uses humans to select
and categorize URLS
– Costlier but less inaccurate
Keyword Blocking:
Obliterating In Context
• Typical of Cybersitter, Net Nanny
– “____on, _____on, who’s got the
____on”
– “Because I could not stop for ______”
– “The owl and the ____-cat went to sea”
Keyword and Site Blocking:
Preventing Site Transmission
• Entire files or
directories
are blocked
• Typical of
most filters
Site Lists Prevent Local Control
• Hidden, proprietary information--you
don’t know what’s being blocked
• A shoebox fit for community values-one list for everyone
• Site lists outsource library work to
nonprofessional third parties
Other technologies: blocking by…
• Category
• Specific user or Workstation ID
• Time of day
• Protocol (nntp, ftp, irc…)
Examples of Filter Categories
•
•
•
•
•
•
Job Search
Cult/New Age
Homosexuality
Drugs
Travel
Abortion/Pro-Life
•
•
•
•
•
•
Racism
Religion
Sports
Tasteless
Chat
Vehicles
Types of Filter Software
• Client Software
– Cyber Patrol, Surfwatch, Net Shepherd
• Server-based software--usually a
proxy-server
– Cyber Patrol, Websense, Smart Filter, IGear, X-Stop
Clients
• A client is a single
computer or
workstation
• Client software is
“standalone” (one
copy per computer)
Servers
• Servers are
computers that
provide services to
a network
Many server-based filters work
with proxy servers
• Proxy servers redirect Internet queries
from your browser through the proxy
server
P
Internet
Filter Pricing Examples
• Client Software: $12-40/copy per year
• Server software pricing examples:
– $2,000/50-user license
– $4,000 startup plus $1/computer
monthly license
– $2685 for 50 simultaneous users
How Filters
Work...
Filter Sequence of Events
• You tell your browser to go to a website
• The filter reviews the request….
Is this site or word allowed or
denied by the filter?
Other things on the filter’s mind:
Is access allowed for this user...time
of day...type of resource?
Hmmmmmmmmm...
Let me check and see
Filter Sequence of Events,
Continued
• If the site, word or
other value is NOT
denied, you go
there.
• Otherwise, you
see the denial
page.
Web Ratings: how they work
<META http-equiv="PICS-Label"
content='(PICS-1.1
"http://www.rsac.org/ratingsv01.html
" l gen true comment
"RSACi North America Server" by
"kgs@bluehighways.com" for
"http://www.bluehighways.com/tifap/
" on “2000.08.30T12:22-0500"
r (n 0 s 0 v 0 l 1))'>
So the Rating for TIFAP Is:
• Nudity = 0
• Sex = 0
• Violence = 0 • Language = 1
r (n 0 s 0 v 0 l 1)
Rating System Logic
• If your browser is
set to use RSACi,
• And your threshold
in the language
category is 0,
• You will NOT see the
TIFAP website
How about Library Channel?
• “Selection” tool pointing to 18,000 URLs
• Includes blocking mechanisms
• Three indexed fields
– Title, URL, keywords
Library Channel...
• Didn’t fare well with TIFAP testers
• Browsing environment felt strange
• Retrieval dependent on subject drill-down
• Terms such as penis, herpes, trich were not
good access points
The Internet Filter Assessment
Project
• Librarians tested filters used real questions
from patrons
• Filters were tested in different
configurations
• Most vendors cooperated by sharing fullstrength versions of their filters
TIFAP’s Start:
A Famous Alligator Story. . .
TIFAP Findings
• Fully-configured filters interfered with
question-answering 35% of the time
• Keyword blocking was a major source of
interference
• No filter ever performed flawlessly in either
“direction” (over-blocking or leakage)
Advice from TIFAP
• Test Filters
• Configure Filters
• Filters need feedback and QA tools
Filters are not Magic Cookies
• Filters let through sexually-explicit
material
• Filters block protected speech
• Filters require funding and maintenance
Filters Provide Poor Feedback
• This is not the
level of
information
libraries
provide patrons
when material
is unavailable.
What Else Can’t Filters Do?
• Filters can’t prevent adults from preying on
children
• “Presumption of prurience”: filters can’t
identify intent
• Filters can’t teach appropriate behavior
Minimum criteria for a filter
• Compatible with existing software and
hardware
• Able to communicate with your system
software
• Viewable content
• Content controllable at the local level
• Access controlled by patron status and/or
patron choice
Real-World Tools
for Internet Access
Management
Policy is the First Tool
• policies for behavior
• how to manage people
in public places
Amazing but True
Examples of
Behavior...
Library Patrons Behaving Badly:
• Sex in the bathrooms
• A man belly-crawling through stacks to lick
patrons’ feet
• Irate husband chasing wife with gun
• Shootings
• Mutilating or stealing books & equipment
• Putting Polaroids of penises in books
• Peepers, flashers, starers, followers, etc.
Policy is a Local Solution
• policies are set by
local Boards
• Boards create policy
based upon…
Policy Reflects
School/Community
• What works best
right here, right
now?
• What keeps most
people happy???
Policies for Adults
• These people are not so much adults as they are
employees.
– Right to Privacy?
– Search and Sezure?
• Library policies generally tell adults what they
can’t DISPLAY--not what they can’t READ
– library vs. public library vs.
classroom with books
Policies for Children Reflect
Local Standards for Control
• require parental consent for child
use of computers with Web
access??
• sometimes used
with filtering
Beyond Policy: Other Tools for
Internet Access Management
• Strong PR
• Parental consent
forms
• Privacy screens &
desks
• Computer
positioning
• Filtering
• User education
• Good media &
government
relations
• School Board
cooperation
• Security/
resource tools
Filter Option #1: Filter Nothing
(And Do Nothing Else)
• Does not address
loud public debate
on Internet content
• Lost opportunities
for proactive
leadership
Filter Option #2:
Proactively Choose Not to Filter
• Friendliest
toward
commitment to
open access
• Most difficult to
administer
Filter Option #3:
Filter Everything
• Potential for legal
action
• Negative impact on
information
services
• Bad blood in the
community
Filter Option #4:
Filter Selectively
• Filter children’s
workstations
• Filter some (all) adult
workstations
• Password or leveled
access for staff
Other Internet
Access
Management
Tools
User Education
• It’s Popular
• PR campaign
• Aggressively
proactive-you set the tone
Privacy Screens
• Some find them
annoying
(even MS teachers)
• Can interfere with
group work
• Good for supporting
privacy
Computer Positioning
• “I’ll be right here
(watching) if you
have any
questions”
Privacy-enhancing Furniture
• See http://www.novadesk.com
• Aesthetically appealing, ergonomically healthy
• Expensive and not suited for every setting
Resource Allocation Tools
• Fortres: File-level
security
• WinU, WinKiosk:
– Interface control
– Time-outs
• Cybrarian:
– Security, control
– Time control
Proactive guidance
• Teaches people
what’s good about the
Internet
• Many good sites for
kids
• Very traditional
school work
“Go Lists” make great guides
Some are from libraries, some from
commercial services such as Disney
Get everyone singing
from the same sheet
• Staff
• School Board
• Media
• Government
Download