Youth, pornography and the Internet /
Saved in:
Imprint: | Washington, D.C. : National Academy Press, c2002. |
---|---|
Description: | xxviii, 450 p. ; 23 cm. |
Language: | English |
Subject: | Internet and teenagers. Internet -- Security measures. Internet pornography. Parenting. Internet and children. Internet and teenagers. Internet pornography. Internet -- Security measures. Parenting. |
Format: | Print Book |
URL for this record: | http://pi.lib.uchicago.edu/1001/cat/bib/4697690 |
LEADER | 07438cam a2200493Ia 4500 | ||
---|---|---|---|
001 | 4697690 | ||
005 | 20170327115010.1 | ||
008 | 020807s2002 dcu b 001 0 eng d | ||
003 | ICU | ||
010 | |a 2002110219 | ||
020 | |a 0309082749 | ||
035 | |a (OCoLC)50318857 | ||
040 | |a NRZ |c NRZ |d ZBL |d NTD |d SYB |d OCoLC |d OrLoB-B | ||
049 | |a CGUA | ||
090 | |a HQ784.I58 |b Y68 2002 | ||
245 | 0 | 0 | |a Youth, pornography and the Internet / |c Dick Thornburgh and Herbert S. Lin, editors, Committee to Study Tools and Strategies for Protecting Kids from Pornography and Their Applicability to Other Ianappropriate Internet Content, Computer Science and Telecommunications Board, National Research Council. |
260 | |a Washington, D.C. : |b National Academy Press, |c c2002. | ||
300 | |a xxviii, 450 p. ; |c 23 cm. | ||
336 | |a text |b txt |2 rdacontent |0 http://id.loc.gov/vocabulary/contentTypes/txt | ||
337 | |a unmediated |b n |2 rdamedia |0 http://id.loc.gov/vocabulary/mediaTypes/n | ||
338 | |a volume |b nc |2 rdacarrier |0 http://id.loc.gov/vocabulary/carriers/nc | ||
500 | |a Includes bibliographical references and index. | ||
505 | 0 | 0 | |g 1. |t Introduction -- |g 1.1. |t The Internet: Source of Promise, Source of Concern -- |g 1.2. |t A Critical Definitional Issue - What Is "Pornography"? -- |g 1.3. |t Other Types of Inappropriate Material and Experiences -- |g 1.4. |t A Broad Spectrum of Opinion and Views -- |g 1.5. |t Focus and Structure of This Report -- |g 2. |t Technology -- |g 2.1. |t An Orientation to Cyberspace and the Internet -- |g 2.2. |t Technologies of Information Retrieval -- |g 2.3. |t Technologies Related to Access Control and Policy Enforcement -- |g 2.4. |t What the Future May Bring -- |g 3. |t The Adult Online Entertainment Industry -- |g 3.1. |t The Structure and Scale of the Online Adult Entertainment Industry -- |g 3.2. |t The Generation of Revenue -- |g 3.3. |t Practices Related to Minors -- |g 3.4. |t What the Future May Hold -- |g 3.5. |t Industry Structure, Product Differentiation, and Aggressive Promotion -- |g 4. |t Legal and Regulatory Issues -- |g 4.1. |t The First Amendment -- |g 4.2. |t Relevant Statutes and Common Law -- |g 4.3. |t Law Enforcement, Training, and Education -- |g 5. |t Children, Media, and Exposure to Sexually Explicit Material -- |g 5.1. |t Children and How They Use Media -- |g 5.2. |t Sexuality in Culture -- |g 5.3. |t The Role of Media in Providing Information on Sexuality to Youth -- |g 5.4. |t Dimensions of Exposure and Access to the Internet -- |g 5.5. |t Internet Exposure to Sexually Explicit Material, Solicitations, and Harassment -- |g 6. |t The Research Base on the Impact of Exposure to Sexually Explicit Material: What Theory and Empirical Studies Offer -- |g 6.1. |t Theoretical Considerations -- |g 6.2. |t Empirical Work -- |g 6.3. |t Factors Affecting the Impact on Minors of Exposure to Sexually Explicit Material -- |g 7. |t Beyond the Science: Perspectives on Impact and the Public Debate -- |g 7.1. |t Challenges to Parents -- |g 7.2. |t Speculations and Other Perspectives on Possible Impact -- |g 7.3. |t Rhetorical Concerns and Issues of Public Debate -- |g 7.4. |t Judgments in the Absence of a Reliable Research Base -- |g 7.5. |t Concluding Observations -- |g 8. |t Approaches to Protection from Inappropriate Material -- |g 8.1. |t The Identification of Inappropriate Material -- |g 8.2. |t Dimensions of "Protection" -- |g 8.3. |t The Time Line of Protective Actions -- |g 8.4. |t Differing Institutional Missions of Schools and Libraries -- |g 8.5. |t The Politics of Protection and Inappropriate Material - Who and When? -- |g 8.6. |t Techniques of Protection -- |g 8.7. |t Approaches to Protection -- |g 9. |t Legal and Regulatory Tools -- |g 9.1. |t Vigorous Prosecutions of Obscene Material -- |g 9.2. |t Civil Liability for Presenting Obscene Material on the Internet -- |g 9.3. |t Options for Dealing with Material That Is Obscene for Minors -- |g 9.4. |t Enforcement of Record-Keeping Requirements -- |g 9.5. |t Streamlining the Process of Handling Violations -- |g 9.6. |t Self-Regulatory Approaches -- |g 9.7. |t General Observations -- |g 10. |t Social and Educational Strategies to Develop Personal and Community Responsibility -- |g 10.1. |t Foundations of Responsible Choice -- |g 10.2. |t Definition of a Social or Educational Strategy -- |g 10.3. |t Contextual Issues for Social and Educational Strategies -- |g 10.4. |t Parental Involvement and Supervision -- |g 10.5. |t Peer Assistance -- |g 10.6. |t Acceptable Use Policies -- |g 10.7. |t After-the-Fact Strategies -- |g 10.8. |t Education -- |g 10.9. |t Compelling and Safe Content -- |g 10.10. |t Public Service Announcements and Media Campaigns -- |g 10.11. |t Findings and Observations About Social and Educational Strategies -- |g 11. |t A Perspective on Technology-Based Tools -- |g 11.1. |t Technology-Based Tools -- |g 11.2. |t Contextual Issues for Technology-Based Tools -- |g 11.3. |t The Questions to Be Asked of Each Tool -- |g 12. |t Technology-Based Tools for Users -- |g 12.1. |t Filtering and Content-Limited Access -- |g 12.2. |t Monitoring -- |g 12.3. |t Tools for Controlling or Limiting "Spam" -- |g 12.4. |t Instant Help -- |g 13. |t Technology-Based Tools Available to Non-End Users -- |g 13.1. |t A .xxx Top-Level Domain -- |g 13.2. |t A .kids Top-Level Domain -- |g 13.3. |t Age Verification Technologies -- |g 13.4. |t Tools for Protecting Intellectual Property -- |g 14. |t Findings, Conclusions, and Future Needs -- |g 14.1. |t Framing the Issue -- |g 14.2. |t On the Impact on Children of Exposure to Sexually Explicit Material and Experiences -- |g 14.3. |t On Approaches to Protection -- |g 14.4. |t Trade-offs and Complexity -- |g 14.5. |t Take-Away Messages for Different Parties -- |g 14.6. |t Research Needs -- |g 14.7. |t Conclusion. |g App. A. |t Information-Gathering Sessions of the Committee -- |g App. B. |t Glossary and Acronyms -- |g App. C. |t Selected Technology Issues -- |g App. D. |t Site Visit Synthesis. |
650 | 0 | |a Internet and teenagers. |0 http://id.loc.gov/authorities/subjects/sh00002235 | |
650 | 0 | |a Internet |x Security measures. |0 http://id.loc.gov/authorities/subjects/sh2008104644 | |
650 | 0 | |a Internet pornography. |0 http://id.loc.gov/authorities/subjects/sh00007414 | |
650 | 0 | |a Parenting. |0 http://id.loc.gov/authorities/subjects/sh85098009 | |
650 | 7 | |a Internet and children. |2 fast |0 http://id.worldcat.org/fast/fst00977226 | |
650 | 7 | |a Internet and teenagers. |2 fast |0 http://id.worldcat.org/fast/fst00977229 | |
650 | 7 | |a Internet pornography. |2 fast |0 http://id.worldcat.org/fast/fst00977279 | |
650 | 7 | |a Internet |x Security measures. |2 fast |0 http://id.worldcat.org/fast/fst01751426 | |
650 | 7 | |a Parenting. |2 fast |0 http://id.worldcat.org/fast/fst01053407 | |
700 | 1 | |a Thornburgh, Dick. |0 http://id.loc.gov/authorities/names/n81137833 |1 http://viaf.org/viaf/79410628 | |
700 | 1 | |a Lin, Herbert. |0 http://id.loc.gov/authorities/names/n86039872 |1 http://viaf.org/viaf/112241 | |
710 | 2 | |a National Research Council (U.S.). |b Computer Science and Telecommunications Board. |b Committee to Study Tools and Strategies for Protecting Kids from Pornography and Their Applicability to Other Inappropriate Internet Content. | |
901 | |a ToCBNA | ||
903 | |a HeVa | ||
903 | |a Hathi | ||
929 | |a cat | ||
999 | f | f | |i d8ab08d1-3129-561f-8cd5-175b5edc5dd8 |s ec007048-d36a-50f2-b2ab-1410f765863c |
928 | |t Library of Congress classification |a HQ784.I58Y68 2002 |l JRL |c JRL-Gen |i 4394790 | ||
928 | |t Library of Congress classification |a HQ784.I58Y68 2002 |l DLL |c DLL-Law |i 4549259 | ||
927 | |t Library of Congress classification |a HQ784.I58Y68 2002 |l JRL |c JRL-Gen |e BOGU |b 59564519 |i 7304456 | ||
927 | |t Library of Congress classification |a HQ784.I58Y68 2002 |l DLL |c DLL-Law |b 53252076 |i 7304457 |