In response to a mandate from Congress in conjunction with the Protection of Children from Sexual Predators Act of 1998, the Computer Science and Telecommunications Board (CSTB) and the Board on Children, Youth, and Families of the National Research Council (NRC) and the Institute of Medicine established the Committee to Study Tools and Strategies for Protecting Kids from Pornography and Their Applicability to Other Inappropriate Internet Content. To collect input and to disseminate useful information to the nation on this question, the committee held two public workshops. On December 13, 2000, in Washington, D.C., the committee convened a workshop to focus on nontechnical strategies that could be effective in a broad range of settings (e.g., home, school, libraries) in which young people might be online. This workshop brought together researchers, educators, policy makers, and other key stakeholders to consider and discuss these approaches and to identify some of the benefits and limitations of various nontechnical strategies.The December workshop is summarized in Nontechnical Strategies to Reduce Children's Exposure to Inappropriate Material on the Internet: Summary of a Workshop. The second workshop was held on March 7, 2001, in Redwood City, California. This second workshop focused on some of the technical, business, and legal factors that affect how one might choose to protect kids from pornography on the Internet. The present report provides, in the form of edited transcripts, the presentations at that workshop.
Committee to Study Tools and Strategies for Protecting Kids from Pornography and Their Applicability to Other Inappropriate Internet Content, Board on Children, Youth, and Families, National Research Council
1 Front Matter; 2 1 Basic Concepts in Information Retrieval; 3 2 Text Categorization and Analysis; 4 3 Categorization of Images; 5 4 The Technology of Search Engines; 6 5 Cyber Patrol: A Major Filtering Project; 7 6 Advanced Techniques for Automatic Web Filtering; 8 7 A Critique of Filtering; 9 8 Authentication Technologies; 10 9 Infrastructure for Age Verification; 11 10 Automated Policy Preference Negotiation; 12 11 Digital Rights Management Technology; 13 12 A Trusted Third Party in Digital Rights; 14 13 Problems with a Dot-XXX Domain; 15 14 Business Dimensions: The Education Market; 16 15 Business Models: Kid-Friendly Internet Businesses; 17 16 Business Models Based on Advertising; 18 17 Constitutional Law and the Law of Cyberspace; 19 Appendix: Biographies of Presenters
National Research Council, Division of Behavioral and Social Sciences and Education, Institute of Medicine, and Families Board on Children, Youth, Steve Olson
Institute of Medicine, Board on the Health of Select Populations, and Transgender Health Issues and Research Gaps and Opportunities Committee on Lesbian, Gay, Bisexual
Institute of Medicine, Board on Population Health and Public Health Practice, Division of Health Promotion and Disease Prevention, Division of International Health
Institute of Medicine, Committee to Develop Methods Useful to the Department of Veteran Affairs in Estimating Its Physician Requirements, Joseph Lipscomb
National Research Council, Computer Science and Telecommunications Board, Committee to Study Tools and Strategies for Protecting Kids from Pornography and Their Applicability to Other Inappropriate Internet Content, Herbert S. Lin, Dick Thornburgh
Institute of Medicine, National Research Council, Division on Engineering and Physical Sciences, Division of Behavioral and Social Sciences and Education, Computer Science and Telecommunications Board, and Families Board on Children, Youth, Committee to Study Tools and Strategies for Protecting Kids from Pornography and Their Applicability to Other Inappropriate Internet Content, Joah G. Iannotta