Youth, pornography and the Internet /

Saved in:
Bibliographic Details
Imprint:Washington, D.C. : National Academy Press, c2002.
Description:xxviii, 450 p. ; 23 cm.
Language:English
Subject:Internet and teenagers.
Internet -- Security measures.
Internet pornography.
Parenting.
Internet and children.
Internet and teenagers.
Internet pornography.
Internet -- Security measures.
Parenting.
Format: Print Book
URL for this record:http://pi.lib.uchicago.edu/1001/cat/bib/4697690
Hidden Bibliographic Details
Other authors / contributors:Thornburgh, Dick.
Lin, Herbert.
National Research Council (U.S.). Computer Science and Telecommunications Board. Committee to Study Tools and Strategies for Protecting Kids from Pornography and Their Applicability to Other Inappropriate Internet Content.
ISBN:0309082749
Notes:Includes bibliographical references and index.
LEADER 07438cam a2200493Ia 4500
001 4697690
005 20170327115010.1
008 020807s2002 dcu b 001 0 eng d
003 ICU
010 |a 2002110219 
020 |a 0309082749 
035 |a (OCoLC)50318857 
040 |a NRZ  |c NRZ  |d ZBL  |d NTD  |d SYB  |d OCoLC  |d OrLoB-B 
049 |a CGUA 
090 |a HQ784.I58  |b Y68 2002 
245 0 0 |a Youth, pornography and the Internet /  |c Dick Thornburgh and Herbert S. Lin, editors, Committee to Study Tools and Strategies for Protecting Kids from Pornography and Their Applicability to Other Ianappropriate Internet Content, Computer Science and Telecommunications Board, National Research Council. 
260 |a Washington, D.C. :  |b National Academy Press,  |c c2002. 
300 |a xxviii, 450 p. ;  |c 23 cm. 
336 |a text  |b txt  |2 rdacontent  |0 http://id.loc.gov/vocabulary/contentTypes/txt 
337 |a unmediated  |b n  |2 rdamedia  |0 http://id.loc.gov/vocabulary/mediaTypes/n 
338 |a volume  |b nc  |2 rdacarrier  |0 http://id.loc.gov/vocabulary/carriers/nc 
500 |a Includes bibliographical references and index. 
505 0 0 |g 1.  |t Introduction --  |g 1.1.  |t The Internet: Source of Promise, Source of Concern --  |g 1.2.  |t A Critical Definitional Issue - What Is "Pornography"? --  |g 1.3.  |t Other Types of Inappropriate Material and Experiences --  |g 1.4.  |t A Broad Spectrum of Opinion and Views --  |g 1.5.  |t Focus and Structure of This Report --  |g 2.  |t Technology --  |g 2.1.  |t An Orientation to Cyberspace and the Internet --  |g 2.2.  |t Technologies of Information Retrieval --  |g 2.3.  |t Technologies Related to Access Control and Policy Enforcement --  |g 2.4.  |t What the Future May Bring --  |g 3.  |t The Adult Online Entertainment Industry --  |g 3.1.  |t The Structure and Scale of the Online Adult Entertainment Industry --  |g 3.2.  |t The Generation of Revenue --  |g 3.3.  |t Practices Related to Minors --  |g 3.4.  |t What the Future May Hold --  |g 3.5.  |t Industry Structure, Product Differentiation, and Aggressive Promotion --  |g 4.  |t Legal and Regulatory Issues --  |g 4.1.  |t The First Amendment --  |g 4.2.  |t Relevant Statutes and Common Law --  |g 4.3.  |t Law Enforcement, Training, and Education --  |g 5.  |t Children, Media, and Exposure to Sexually Explicit Material --  |g 5.1.  |t Children and How They Use Media --  |g 5.2.  |t Sexuality in Culture --  |g 5.3.  |t The Role of Media in Providing Information on Sexuality to Youth --  |g 5.4.  |t Dimensions of Exposure and Access to the Internet --  |g 5.5.  |t Internet Exposure to Sexually Explicit Material, Solicitations, and Harassment --  |g 6.  |t The Research Base on the Impact of Exposure to Sexually Explicit Material: What Theory and Empirical Studies Offer --  |g 6.1.  |t Theoretical Considerations --  |g 6.2.  |t Empirical Work --  |g 6.3.  |t Factors Affecting the Impact on Minors of Exposure to Sexually Explicit Material --  |g 7.  |t Beyond the Science: Perspectives on Impact and the Public Debate --  |g 7.1.  |t Challenges to Parents --  |g 7.2.  |t Speculations and Other Perspectives on Possible Impact --  |g 7.3.  |t Rhetorical Concerns and Issues of Public Debate --  |g 7.4.  |t Judgments in the Absence of a Reliable Research Base --  |g 7.5.  |t Concluding Observations --  |g 8.  |t Approaches to Protection from Inappropriate Material --  |g 8.1.  |t The Identification of Inappropriate Material --  |g 8.2.  |t Dimensions of "Protection" --  |g 8.3.  |t The Time Line of Protective Actions --  |g 8.4.  |t Differing Institutional Missions of Schools and Libraries --  |g 8.5.  |t The Politics of Protection and Inappropriate Material - Who and When? --  |g 8.6.  |t Techniques of Protection --  |g 8.7.  |t Approaches to Protection --  |g 9.  |t Legal and Regulatory Tools --  |g 9.1.  |t Vigorous Prosecutions of Obscene Material --  |g 9.2.  |t Civil Liability for Presenting Obscene Material on the Internet --  |g 9.3.  |t Options for Dealing with Material That Is Obscene for Minors --  |g 9.4.  |t Enforcement of Record-Keeping Requirements --  |g 9.5.  |t Streamlining the Process of Handling Violations --  |g 9.6.  |t Self-Regulatory Approaches --  |g 9.7.  |t General Observations --  |g 10.  |t Social and Educational Strategies to Develop Personal and Community Responsibility --  |g 10.1.  |t Foundations of Responsible Choice --  |g 10.2.  |t Definition of a Social or Educational Strategy --  |g 10.3.  |t Contextual Issues for Social and Educational Strategies --  |g 10.4.  |t Parental Involvement and Supervision --  |g 10.5.  |t Peer Assistance --  |g 10.6.  |t Acceptable Use Policies --  |g 10.7.  |t After-the-Fact Strategies --  |g 10.8.  |t Education --  |g 10.9.  |t Compelling and Safe Content --  |g 10.10.  |t Public Service Announcements and Media Campaigns --  |g 10.11.  |t Findings and Observations About Social and Educational Strategies --  |g 11.  |t A Perspective on Technology-Based Tools --  |g 11.1.  |t Technology-Based Tools --  |g 11.2.  |t Contextual Issues for Technology-Based Tools --  |g 11.3.  |t The Questions to Be Asked of Each Tool --  |g 12.  |t Technology-Based Tools for Users --  |g 12.1.  |t Filtering and Content-Limited Access --  |g 12.2.  |t Monitoring --  |g 12.3.  |t Tools for Controlling or Limiting "Spam" --  |g 12.4.  |t Instant Help --  |g 13.  |t Technology-Based Tools Available to Non-End Users --  |g 13.1.  |t A .xxx Top-Level Domain --  |g 13.2.  |t A .kids Top-Level Domain --  |g 13.3.  |t Age Verification Technologies --  |g 13.4.  |t Tools for Protecting Intellectual Property --  |g 14.  |t Findings, Conclusions, and Future Needs --  |g 14.1.  |t Framing the Issue --  |g 14.2.  |t On the Impact on Children of Exposure to Sexually Explicit Material and Experiences --  |g 14.3.  |t On Approaches to Protection --  |g 14.4.  |t Trade-offs and Complexity --  |g 14.5.  |t Take-Away Messages for Different Parties --  |g 14.6.  |t Research Needs --  |g 14.7.  |t Conclusion.  |g App. A.  |t Information-Gathering Sessions of the Committee --  |g App. B.  |t Glossary and Acronyms --  |g App. C.  |t Selected Technology Issues --  |g App. D.  |t Site Visit Synthesis. 
650 0 |a Internet and teenagers.  |0 http://id.loc.gov/authorities/subjects/sh00002235 
650 0 |a Internet  |x Security measures.  |0 http://id.loc.gov/authorities/subjects/sh2008104644 
650 0 |a Internet pornography.  |0 http://id.loc.gov/authorities/subjects/sh00007414 
650 0 |a Parenting.  |0 http://id.loc.gov/authorities/subjects/sh85098009 
650 7 |a Internet and children.  |2 fast  |0 http://id.worldcat.org/fast/fst00977226 
650 7 |a Internet and teenagers.  |2 fast  |0 http://id.worldcat.org/fast/fst00977229 
650 7 |a Internet pornography.  |2 fast  |0 http://id.worldcat.org/fast/fst00977279 
650 7 |a Internet  |x Security measures.  |2 fast  |0 http://id.worldcat.org/fast/fst01751426 
650 7 |a Parenting.  |2 fast  |0 http://id.worldcat.org/fast/fst01053407 
700 1 |a Thornburgh, Dick.  |0 http://id.loc.gov/authorities/names/n81137833  |1 http://viaf.org/viaf/79410628 
700 1 |a Lin, Herbert.  |0 http://id.loc.gov/authorities/names/n86039872  |1 http://viaf.org/viaf/112241 
710 2 |a National Research Council (U.S.).  |b Computer Science and Telecommunications Board.  |b Committee to Study Tools and Strategies for Protecting Kids from Pornography and Their Applicability to Other Inappropriate Internet Content. 
901 |a ToCBNA 
903 |a HeVa 
903 |a Hathi 
929 |a cat 
999 f f |i d8ab08d1-3129-561f-8cd5-175b5edc5dd8  |s ec007048-d36a-50f2-b2ab-1410f765863c 
928 |t Library of Congress classification  |a HQ784.I58Y68 2002  |l JRL  |c JRL-Gen  |i 4394790 
928 |t Library of Congress classification  |a HQ784.I58Y68 2002  |l DLL  |c DLL-Law  |i 4549259 
927 |t Library of Congress classification  |a HQ784.I58Y68 2002  |l JRL  |c JRL-Gen  |e BOGU  |b 59564519  |i 7304456 
927 |t Library of Congress classification  |a HQ784.I58Y68 2002  |l DLL  |c DLL-Law  |b 53252076  |i 7304457