National Academies Press: OpenBook

Youth, Pornography, and the Internet (2002)

Chapter: 8. Approaches to Protection from Inappropriate Material

« Previous: 7. Beyond the Science: Perspectives on Impact and the Public Debate
Suggested Citation:"8. Approaches to Protection from Inappropriate Material." National Research Council. 2002. Youth, Pornography, and the Internet. Washington, DC: The National Academies Press. doi: 10.17226/10261.
×
Page 181
Suggested Citation:"8. Approaches to Protection from Inappropriate Material." National Research Council. 2002. Youth, Pornography, and the Internet. Washington, DC: The National Academies Press. doi: 10.17226/10261.
×
Page 182
Suggested Citation:"8. Approaches to Protection from Inappropriate Material." National Research Council. 2002. Youth, Pornography, and the Internet. Washington, DC: The National Academies Press. doi: 10.17226/10261.
×
Page 183
Suggested Citation:"8. Approaches to Protection from Inappropriate Material." National Research Council. 2002. Youth, Pornography, and the Internet. Washington, DC: The National Academies Press. doi: 10.17226/10261.
×
Page 184
Suggested Citation:"8. Approaches to Protection from Inappropriate Material." National Research Council. 2002. Youth, Pornography, and the Internet. Washington, DC: The National Academies Press. doi: 10.17226/10261.
×
Page 185
Suggested Citation:"8. Approaches to Protection from Inappropriate Material." National Research Council. 2002. Youth, Pornography, and the Internet. Washington, DC: The National Academies Press. doi: 10.17226/10261.
×
Page 186
Suggested Citation:"8. Approaches to Protection from Inappropriate Material." National Research Council. 2002. Youth, Pornography, and the Internet. Washington, DC: The National Academies Press. doi: 10.17226/10261.
×
Page 187
Suggested Citation:"8. Approaches to Protection from Inappropriate Material." National Research Council. 2002. Youth, Pornography, and the Internet. Washington, DC: The National Academies Press. doi: 10.17226/10261.
×
Page 188
Suggested Citation:"8. Approaches to Protection from Inappropriate Material." National Research Council. 2002. Youth, Pornography, and the Internet. Washington, DC: The National Academies Press. doi: 10.17226/10261.
×
Page 189
Suggested Citation:"8. Approaches to Protection from Inappropriate Material." National Research Council. 2002. Youth, Pornography, and the Internet. Washington, DC: The National Academies Press. doi: 10.17226/10261.
×
Page 190
Suggested Citation:"8. Approaches to Protection from Inappropriate Material." National Research Council. 2002. Youth, Pornography, and the Internet. Washington, DC: The National Academies Press. doi: 10.17226/10261.
×
Page 191
Suggested Citation:"8. Approaches to Protection from Inappropriate Material." National Research Council. 2002. Youth, Pornography, and the Internet. Washington, DC: The National Academies Press. doi: 10.17226/10261.
×
Page 192
Suggested Citation:"8. Approaches to Protection from Inappropriate Material." National Research Council. 2002. Youth, Pornography, and the Internet. Washington, DC: The National Academies Press. doi: 10.17226/10261.
×
Page 193
Suggested Citation:"8. Approaches to Protection from Inappropriate Material." National Research Council. 2002. Youth, Pornography, and the Internet. Washington, DC: The National Academies Press. doi: 10.17226/10261.
×
Page 194
Suggested Citation:"8. Approaches to Protection from Inappropriate Material." National Research Council. 2002. Youth, Pornography, and the Internet. Washington, DC: The National Academies Press. doi: 10.17226/10261.
×
Page 195
Suggested Citation:"8. Approaches to Protection from Inappropriate Material." National Research Council. 2002. Youth, Pornography, and the Internet. Washington, DC: The National Academies Press. doi: 10.17226/10261.
×
Page 196
Suggested Citation:"8. Approaches to Protection from Inappropriate Material." National Research Council. 2002. Youth, Pornography, and the Internet. Washington, DC: The National Academies Press. doi: 10.17226/10261.
×
Page 197
Suggested Citation:"8. Approaches to Protection from Inappropriate Material." National Research Council. 2002. Youth, Pornography, and the Internet. Washington, DC: The National Academies Press. doi: 10.17226/10261.
×
Page 198
Suggested Citation:"8. Approaches to Protection from Inappropriate Material." National Research Council. 2002. Youth, Pornography, and the Internet. Washington, DC: The National Academies Press. doi: 10.17226/10261.
×
Page 199
Suggested Citation:"8. Approaches to Protection from Inappropriate Material." National Research Council. 2002. Youth, Pornography, and the Internet. Washington, DC: The National Academies Press. doi: 10.17226/10261.
×
Page 200

Below is the uncorrected machine-read text of this chapter, intended to provide our own search engines and external engines with highly rich, chapter-representative searchable text of each book. Because it is UNCORRECTED material, please consider the following text as a useful but insufficient proxy for the authoritative book pages.

PART II

Prepublication copy- subject to further editorial correction 8-6 their desire for such materials, their motivation often enables them to overcome many obstacles in their path, whatever the nature of those obstacles. "Protection" has other important dimensions. The extent to which a child can be protected is an important element of the debate. It is easy to say that 100 percent protection is impossible—but such a statement begs the question of what "80 percent protection" might mean. Does it mean that the child is exposed to inappropriate material 20 percent as much as another child who does not have such protection? Should the evaluator rely primarily on the number of incidents of exposure? Or are other aspects of the exposure, such as its nature or duration, important as well? An important challenge—as yet unresolved—is to articulate appropriate metrics of protection. A key dimension of protection is the issue of false positives and false negatives. In deciding whether a given piece of material is appropriate or inappropriate? it is inevitable that some material will be designated as inappropriate when it should have been designated as appropriate errors of this type are false positives. On the other hand, some material will be designated as appropriate even when it should have been designated as inappropriate errors of this type are false negatives. Perfect protection (" 100 percent") is possible only at the cost of many false positives— and is in fact simple to provide. A cable with an air gap in it (or, equivalently, disconnecting from the Internet) will provide 100 percent protection in the sense that it will screen out al] inappropriate material. But it will also block all appropriate content as well. In the real world, those wishing to provide protection (e.g., parents, school administrators, and so on) must balance the rate of false positives against the rate of false negatives. A third dimension of "protect" might refer to measures taken to ensure that the child suffers no ill effects from being exposed to inappropriate material. This approach recognizes that absolute protection from inappropriate material is impossible to achieve (except at the cost of total disconnection) and that nurturing a child who is able to place inappropriate material into context, to evaluate and make good judgments about it, and to deal with it appropriately is an important element of the overall goal of keeping children from harm. The relevance of these different definitions and dimensions of "protect" depends on the developmental maturity of a child. The range from birth to 18 spans a very broad developmental range in a psychological sense. What may be developmentally inappropriate for a very young child may not be inappropriate for a teenager. It can be taken as a given that teenagers will be more interested in sexual matters than will young children, and a site providing a detailed scientific description of human reproduction, for example, may be more appropriate for the former than the latter. Parents and other responsible adults may thus wish to consider developmental factors in weighing the costs and benefits of different approaches to protection. For example, at very young ages, one might be inclined to shield children from any Internet exposure at all (e.g., confining a very young child's computer experience to CD-ROMs). As he or she matured, a next step might be to allow online experiences only in environments that were specially created for children. Then, at a further stage of maturity, one might seek to educate one's child in safe Internet use and use technology to screen out objectionable material. Finally, one might simply allow unconstrained Internet access but keep an eye on the child's

8 Approaches to Protection from Inappropriate Material This chapter provides a general framework for understanding what it means to protect youth from inappropriate material. Part of the complex- ity of the task is seen in the observation that "protect" and "inappropriate material" are terms without clear and unambiguous definition. 8.1 THE IDENTIFICATION OF INAPPROPRIATE MATERIAL 8.1.1 In Principle The determination that particular material is inappropriate for chil- dren begins with a human judgment. The judging party can be a parent, a teacher, a librarian, the child himself or herself, the creator of the mate- rial, the carrier (distributor) of that material, a third-party rating service, or a government agency. Given a particular universe of material (e.g., a set of images), it is likely that any group of judges will agree on some material as "appropri- ate" and some as "inappropriate," and that there will be some material about which the judges will disagree. Of course, depending on the par- ticular judges involved, the term "inappropriate" could include a very large variety of material, including some or all sexually explicit material, bomb-making recipes, extremist material, birth control information, hate sites, and the platforms of particular political or social groups. Indeed, judgments about inappropriateness are closely tied to the values of those making the judgments. 183

184 YOUTH, PORNOGRAPHY, AND THE INTERNET The general pattern would not change even when judgments are con- fined to a specific area such as sexually explicit material. Some material would be unanimously classified as inappropriate, some would be unani- mously classified as not inappropriate, and some would be indetermi- nate. fudges drawn from different segments of the U.S. public would disagree strongly about whether certain materials were inappropriate for children, and what is obscene or obscene with respect to minors, in Cali- fornia may well be different from what is obscene or obscene with respect to minors in Tennessee because the community standards of California may be different from those of Tennessee. In other words, as the Supreme Court has made clear, the determination that material is obscene, or ob- scene with respect to minors, depends on criteria that are extrinsic to the material itself. In the absence of universal criteria, the most relevant standard for validity or accuracy is the standard of the individualist responsible for making decisions about inappropriateness on behalf of the child. Thus, it is often said that the best protection against children being exposed to inappropriate material on the Internet is the presence and guidance of a responsible parent or guardian while the child is using the Internet the reason is that when such an adult is involved, his or her standards can be trusted as the basis for good judgments for the child's welfare. When the presence and guidance of a responsible parent or guardian during Internet use are not possible, protection depends on the judgment of a proxy. The proxy's judgments must then be evaluated against the standard of the responsible adult who would otherwise make such deci- sions for the child. The proxy may be another adult such as a teacher acting in loco parentis, the board of a public library system, another trusted adult, an Internet service provider, a developer of filtering soft- ware,1 a local jury deciding an obscenity case, the U.S. Congress, or a state legislature. But whatever the proxy, the validity of the proxy's assess- ments about inappropriate material is indicated by its consistency with the judgments of the party responsible for deciding on behalf of the child. Different proxies have different methodologies for determining inap- propriateness. A proxy that uses one reviewer is likely to have a different set of consistencies than an agency that has a hundred reviewers. The former is likely to have a higher reliability than the latter, while the latter is more likely than the former to establish a standard for accuracy or validity that reflects the larger population from which those reviewers are drawn. 1The developer of software builds into a tool assumptions about what content is appro- priate (and for whom) and also establishes the standard of accurate performance that the tool will meet.

APPROACHES TO PROTECTION FROM INAPPROPRIATE MATERIAL 185 Moreover, even if agreement can be obtained on particular content (e.g., that a given image is inappropriate), it is hard to define clear rules about how to identify "similar" material in a consistent manner. Put differently, it is difficult to articulate a set of rules that clearly defines a specific class of "inappropriate" material that is both sufficiently inclusive (includes most or all material that is inappropriate) and sufficiently exclu- sive (excludes most or all material that is appropriate). Given a need for proxies, how does a proxy make reasonable judg- ments about what sexually explicit material may be inappropriate for view- ing by children at any age? To answer this question, it is important to distinguish conceptually between reliability (or consistency) and validity. The most common example to illustrate the distinction between reli- ability and validity is that of a shooter aiming at a target and firing mul- tiple rounds. Reliability is a measure of the repeatability of the shooter's aim. A tight cluster of shots indicates high repeatability (reliability). However, reliability says nothing about how close that cluster of shots is to the actual target. For that, validity indicates the accuracy of those shots: a small distance between the center of the cluster and the center of the target indicates high accuracy (validity). Validity means that one is measuring what one claims to be measuring. A highly reliable measure may not be valid, and a highly valid result may not be reliable.2 In determining whether certain material is inappropriate, reliability refers to the reproducibility of an assessment that a given piece of mate- rial is inappropriate. To test for reliability, one might ask an individual to evaluate a collection of materials several times under different circum- stances. If this individual's judgments were generally consistent, he or she would be said to be a reliable judge. Because the same person may classify a given piece of material differently depending on his or her mood or from one day to another or what else he or she might have seen or read during that period of time, an individual's reliability as a judge cannot be taken for granted. Reliability is even more difficult when multiple people are involved in judging content. Different people may classify a given piece of material differently even if they are ostensibly using the same rules for classifica- tion. Thus, to determine the reliability of a group of judges, one might ask them to evaluate a collection of materials; if their judgments were gener- ally consistent with each other, this group would be said to make reliable judgments. Key to this process is an agreed-upon operational specifica- tion of how to make a judgment. 2For practical purposes, a variable with low reliability (i.e., with a wide spread) is hard to use for empirical work. However, it can still be highly valid in the formal sense of the term, even if it is not useful.

186 YOUTH, PORNOGRAPHY, AND THE INTERNET This definition of reliability implies that machine assessment (a given version of software running on a given computer) is inevitably more reliable (or consistent) than human assessment given the strictly algo- rithmic process, the reliability of machine assessment is 100 percent.3 The reliability of human assessment is likely to be considerably lower, even when the same rules of classification apply to all assessments, simply because people interpret the same rules differently. Validity is a more problematic concept because there is no universally accepted standard (no "gold standard") for what counts as inappropriate. In other words, there are no universally accepted criteria that define whether something is obscene or inappropriate for viewing by children. These comments do not exclude the possibility of broad agreement over many possible decision-making parties in a particular instance char- acterized, for example, by child pornography, just as even the worst- made rifle can make bull's eyes for a particular target with a very large bull's eye. Rather, the accuracy of a rifle is best tested against a target with a very small bull's eye, so that variations in accuracy can be readily observed. Similarly, the validity of a process for making judgments about inappropriateness is best indicated by examining judgments of "ques- tionable" material about which people do not hold similar views. Reliability and validity (as measured from the perspective of a re- sponsible adult) are the primary determinants of a "good" proxy for that adult. Because different proxies have different methodologies, an indi- vidual faced with the responsibility for deciding inappropriateness for a child can, in principle, choose to adopt the approach used by a trusted proxy. Thus, in principle, an individual (e.g., a parent) might choose to trust the judgments of Disney, the American Civil Liberties Union, the Christian Coalition, or another organization that has a well-known repu- tation for espousing a particular set of views or values. 8.1.2 In Practice Given the general principles described above, three methods can be used in practice to identify inappropriate material. The decision-making party, whether machine or human, can · Make a real-time assessment of the material in question based on the con- tent of the incoming information. This approach would require the decision- 1 1 3This statement must be qualified if the assessment software relies on elements that change over time. For example, the assessment software may rely on a database that is updated from time to time with new or additional data, the results of the assessment of, say, a given image may well vary.

APPROACHES TO PROTECTION FROM INAPPROPRIATE MATERIAL 187 making party to screen each item of information immediately prior to the child's viewing of it. Items judged to be appropriate are immediately passed to the child, while items judged to be inappropriate are not. · Rely on a tag or label associated with the material in question. Labels can contain either a description of the material or a judgment about the material. (In principle, a label can be created by the content creator or by another party.) If the label contains a description, the description is a highly condensed description of the material with respect to dimensions of content likely to involve judgments of inappropriateness. Thus, the label might indicate "image contains frontal nudity" because decision makers are likely to want to make decisions based on the presence or absence of frontal nudity. By contrast, the label would not indicate "im- age contains people," because that fact is not likely to be the basis on which judgments about inappropriateness are likely to be made. Alterna- tively, the label may contain a judgment about the material (e.g., inappro- priate for those 14 and under). In this case, the label represents a time- delayed judgment of content that has been made by a third party. · Examine the source of the material. Some sources can be trusted to provide only appropriate material; others provide a large volume of inap- propriate material.4 Rather than assessing the material itself (an effort that may be unduly time-consuming), the evaluation is based on the source. Note that relying on an evaluation of the source is, in essence, reliance on a label the name of the source is the label, and material from that source is rejected or accepted depending on the particulars of the source's identity. A second dimension of identifying inappropriate material in practice is a consequence of the size of the Internet. The volume of information on the Internet is so large and changes so rapidly that it is simply imprac- tical for human beings to evaluate every discrete piece of information for inappropriateness. Moreover, the content of some existing Web pages changes very rapidly, and new Web pages appear at a very rapid rate.5 This fact leads to one of two approaches. One is based on an auto- mated, machine-executable process for identifying inappropriate content 4sources of adult-oriented, sexually explicit material are generally consistent in their of- ferings such content is available on their Web sites today, and will be available tomorrow tif they are still in businessy. Yet the content on one such site is often generically similar to that on another site, so ''brand loyalties,, that keep viewers coming back are hard for any one business entity to establish. The most successful commercial entities are those that have been able to establish such loyalties. 5No data was available to the committee on the first point, but on the second point, the number of publicly accessible Web pages increased by 300 million in the period from July to October 2001 "according to the Google statistics on the number of pages indexed.

188 YOUTH, PORNOGRAPHY, AND THE INTERNET (generally used for evaluating content "on the flyby; such processes are less expensive than manual processes for screening content, but as a rule, they result in judgments that are less valid than those of human evalua- tors. Automated approaches must be based on machine-executable rules that are abstracted from human judgments such abstraction inevitably misses nuances in those human judgments and reduces their validity compared to that of humans. Reliance on labels depends on the label's accuracy, and only a human's action binds a particular label to a given piece of material. And, the identity of a source may not be an adequate indicator of material coming from it. The second approach is the human-performed explicit identification of specifically appropriate material and the exclusion of everything else (or its reverse the explicit identification of specifically inappropriate material for exclusion and the inclusion of everything else). This approach is expen- sive. The first variant runs the risk that large volumes of appropriate mate- rial will be excluded, but is likely to result in a very low fraction of inappro- priate material being displayed. The second variant captures only some (perhaps a large fraction) of the inappropriate material on the Internet, but allows a large volume of appropriate material to pass. In practice, a combination of approaches can be used as well a com- bination would rely on an automated search for material that might be inappropriate, but would rely on a human judgment for the final determi- nation. In this case, inappropriate material not identified in the auto- mated search does not reach a human decision maker and so it mistakenly identified as appropriate. To the extent that the threshold of identifica- tion is set so that a greater volume of possibly inappropriate material is identified (so as to reduce the likelihood that inappropriate material is not mistakenly identified), the volume of material that is subject to actual human judgment is increased in which case the issues regarding human review discussed in the previous paragraph obtain. 8.2 DIMENSIONS OF "PROTECTION" In the context of "protecting youth from inappropriate material or experiences," the term "protect" has a number of plausible definitions. "Protection" can mean: · Preventing children from deliberately finding inappropriate mate- rial or experiences (e.g., searching out an adult-oriented Web site); · Preventing children from being inadvertently exposed to such ma- terial or experiences (e.g., receiving an unsolicited e-mail containing an inappropriate image or text); and/or · Developing in the child skills that enable him or her to cope con-

APPROACHES TO PROTECTION FROM INAPPROPRIATE MATERIAL 189 structively with such exposure should it occur and making available a support infrastructure that reduces the harm or injury that might result from being exposed to such material or experiences. The approaches needed to implement these definitions of protection differ but are not mutually exclusive. Protecting children from deliberate exposure is a very different enterprise and entails very different costs- compared with protecting children only from inadvertent exposure, though approaches to each may have common elements. Further, teach- ing a child to cope constructively is likely to be helpful in the event that other protection measures fail. The primary difficulty of protecting children and youth against delib- erate exposure is the fact that many adolescents, especially boys, are highly motivated to seek out sexually explicit materials, including mate- rial that is ostensibly limited to adults. Absent a significant change in their desire for such materials, their motivation often enables them to overcome many obstacles in their path, whatever the nature of those obstacles. "Protection" has other important dimensions. The extent to which a child can be protected is an important element of the debate. It is easy to say that 100 percent protection is impossible but such a statement begs the question of what "80 percent protection" might mean. Does it mean that the child is exposed to inappropriate material 20 percent as much as another child who does not have such protection? Should the evaluator rely primarily on the number of incidents of exposure? Or are other aspects of the exposure, such as its nature or duration, important as well? An important challenge as yet unresolved is to articulate appropriate metrics of protection. A key dimension of protection is the issue of false positives and false negatives. In deciding whether a given piece of material is appropriate or inappropriate, it is inevitable that some material will be designated as inappropriate when it should have been designated as appropriate er- rors of this type are false positives. On the other hand, some material will be designated as appropriate even when it should have been designated as inappropriate errors of this type are false negatives. Perfect protection ("100 percent") is possible only at the cost of many false positives and is in fact simple to provide. A cable with an air gap in it (or, equivalently, disconnecting from the Internet) will provide 100 percent protection in the sense that it will screen out all inappropriate material. But it will also block all appropriate content as well. In the real world, those wishing to provide protection (e.g., parents, school adminis- trators, and so on) must balance the rate of false positives against the rate of false negatives.

190 . . ~ . YOUTH, PORNOGRAPHY, AND THE INTERNET A third dimension of "protect" might refer to measures taken to en- sure that the child suffers no ill effects from being exposed to inappropri- ate material. This approach recognizes that absolute protection from in- appropriate material is impossible to achieve (except at the cost of total disconnection) and that nurturing a child who is able to place inappropri- ate material into context, to evaluate and make good judgments about it, and to deal with it appropriately is an important element of the overall goal of keeping children from harm. The relevance of these different definitions and dimensions of "protect" depends on the developmental maturity of a child. The range from birth to 18 spans a very broad developmental range in a psychological sense. What may be developmentally inappropriate for a very young child may not be inappropriate for a teenager. It can be taken as a given that teenagers will be more interested in sexual matters than will young children, and a site provid- ing a detailed scientific description of human reproduction, for example, may be more appropriate for the former than the latter. Parents and other respon- sible adults may thus wish to consider developmental factors in weighing the costs and benefits of different approaches to protection. For example, at very young ages, one might be inclined to shield children from any Internet exposure at all (e.g., confining a very young child's computer experience to CD-ROMs). As he or she matured, a next step might be to allow online experiences only in environments that were specially created for children. Then, at a further stage of maturity, one might seek to educate one's child in safe Internet use and use technology to screen out objectionable material. Finally, one might simply allow unconstrained Internet access but keep an eye on the child's Internet ac- tivities. The assumption underlying such a progression is that as the child matures, his or her judgment and capability for responsible action grows, and different kinds of "protection" are necessary. (All of these options are discussed in subsequent chapters.) In the context of protecting children from pornography and perhaps other types of material as well, it is also important to distinguish between protecting children from being exposed to pornography (the subject of the discussion above) and protecting children from participating in por- nography (which is the ultimate and primary rationale for laws that strictly proscribe child pornography). The discussion below and in Chap- ters 9 through 13 focuses primarily on protection from exposure, but addresses protection from participation as appropriate. 8.3 THE TIME LINE OF PROTECTIVE ACTIONS Actions can be taken at a variety of times. Actions can be taken to protect a child before potential exposure to inappropriate material, at the

APPROACHES TO PROTECTION FROM INAPPROPRIATE MATERIAL 1 Al moment of that exposure, and after that exposure. For example, as Chap- ter 10 discusses, various education and media literacy strategies may help the child to decide not to be exposed to inappropriate material. Such strategies must obviously be implemented before exposure that is, the child must begin to learn (internalize) norms of appropriate conduct and behavior. At the moment of potential exposure, tools such as filters (de- scribed in Chapter 12) are relevant, because they can help to block expo- sure to such material. And, after exposure, a variety of measures (e.g., getting help, reporting to a responsible adult) can help to mitigate any negative effects that may result from such exposure. 8.4 DIFFERING INSTITUTIONAL MISSIONS OF SCHOOLS AND LIBRARIES Even the same community, libraries, and schools often have very different policies regarding the need for filtering. In some communities visited by the committee, schools had implemented filtering for all school- based Internet connections, whereas the public libraries in that same com- munity did not have filters. To understand why such differences might arise, consider the differ- ent purposes served by public schools and libraries. A public school serves the primary purpose of providing academic instruction for indi- viduals who have not attained the age of majority. Parents send their children to school in the legally enforceable expectation that school per- sonnel will take responsible care to protect them from harm and to pro- vide adequate instruction (i.e., that they will act in loco parentis). By contrast, a public library serves the primary purpose of providing a broad range of information to the entire community in which it is based. This community includes children, but also includes adults, and the infor- mation needs of the community taken as a whole are generally much more diverse than those of children and youth in school.6 Thus, given these differing purposes, it is not at all unexpected that school and librar- ies have different needs and might take different approaches in seeking 6For example, the position of the American Library Association is that "librarians believe in supporting a wide variety of information needs," and emphasis should be placed "on the patron's right to choose," an emphasis that is "consistent with [the library] profession's commitment to intellectual freedom." Further, "libraries rarely limit what can be read in a library. Librarians do not search patrons' book-bags for titles the library would not purchase, or police reading tables to see if patrons are reading materials consistent with local collection-development policies. In a similar vein, many libraries offer open access to the Internet, so that the patron may choose what to read." See <http://www.pla.org/ publications /technotes /technotes_filtering.html>.

92 YOUTH, PORNOGRAPHY, AND THE INTERNET to protect children and youth from inappropriate Internet material and experiences. Approaches of schools and of libraries for protecting children and youth from inappropriate Internet materials and experiences must be as- sessed against this backdrop. Some elements of these approaches will be similar, but it is also to be expected that other elements will be different because of differences in fundamental purpose. 8.5 THE POLITICS OF PROTECTION AND INAPPROPRIATE MATERIAL WHO AND WHEN? Within this framework of different dimensions of "protection" and "inappropriate material," a range of approaches to the definitional pro- cess can be identified. One approach, rarely stated but often implicit as the motivating force behind certain policy positions, is the idea that a particular definition of "inappropriate" is appropriate for all communi- ties. Underpinning this approach is the view described in Box 7.2 in Chapter 7 that inappropriate material and in particular, sexually ex- plicit material can be so dangerous that even a single exposure of a child can result in very harmful consequences. Examples to support this point of view tend to be drawn from the more extreme sexually explicit material found on the Internet and not coincidentally material that tends to arouse revulsion in a large segment of the population. Thus, "protection" of children must be as airtight as possible, and false positives that improperly classify appropriate material as inappropriate are preferable to false negatives that improperly classify inappropriate material as appropriate.7 Note also that if one believes that even one exposure of a child to such material is likely to have long-lasting and profoundly negative effects on his or her development, then nothing less than perfection suffices. For such individuals, technologies that seek to isolate and wall off a child from untoward influences are likely to have considerable appeal. A second approach asserts that individual communities have the right (and obligation) to define for themselves what is inappropriate. Believers in this philosophy reject the notion that there are, or that there should be, universal standards of inappropriateness. To buttress their view, they tend to draw on examples of material that many people would not find inappropriate or offensive information that can be characterized as more "mainline" than "extreme." They tend to doubt that exposure to sexually 7Child pornography is an area where a similar philosophy has led to strong legal protec- tions against the harms of child sexual abuse that typically define the material

APPROACHES TO PROTECTION FROM INAPPROPRIATE MATERIAL 193 explicit material will have a damaging impact on most children, and thus are willing to accept false negatives as the cost of avoiding false positives. For those who believe in the resilience of children when given appropri- ate guidance, social and educational strategies that teach a child how to make good decisions about such material and how to cope with it should exposure occur are likely to have more appeal than approaches that rely primarily on technology. These two approaches represent polar opposites. In practice, most people fall somewhere in between. That is, they might well say that some types of material should indeed be universally prohibited, regardless of community standards (e.g., child pornography), but conclude that for other types of sexually explicit material, communities should be free to decide for themselves. A third approach, in general independent of those described above, focuses on empowering children to protect themselves. This approach calls for adult definition of inappropriate material (and could be defined either universally or on a community-by-community basis, but in any event would ideally account for developmental maturity) but focuses on the child rather than the adult as the primary decision maker. This does not mean that adults have no role, or that protective mechanisms are inappropriate, but rather that reliance on externally driven protective mechanisms can be reduced as the child's judgment increases. (The ap- propriate analogy would be that externally driven protective mechanisms for a child whose judgment is developing and maturing serve the same role as "training wheels" serve for someone learning to ride a bicycle.) Under this approach, the goal is not to protect the child from exposure as an end in itself, but rather to educate the child to cope well with offensive or inappropriate materials. This approach is based on the idea that in a free and pluralistic society, one will inevitably be exposed to material that he or she may find disturbing, offensive, or distasteful, and that the best way to deal with such situations is to develop coping mechanisms through experience. It is also important to consider the time scale over which politics is conducted. In one site visit to a state generally regarded as politically and socially conservative, discussion with those familiar with the local com- munity revealed a difference in the politics associated with schools (which did have filtering for all its schools) and libraries (which did not). The membership of the school board had changed relatively suddenly, on the time scale of a year (one election), whereas the membership of the library board changed very slowly. Thus, filtering could be driven by new mem- bers of the school board, whereas library board membership was more stable and thus changes to policy took longer to implement in the ab- sence of sustained and demonstrable public concern.

94 YOUTH, PORNOGRAPHY, AND THE INTERNET 8.6 TECHNIQUES OF PROTECTION Chapters 9 through 13 address the challenges of protecting children against exposure from inappropriate sexually explicit material. This sec- tion introduces some general concepts for protection that underpin more specific approaches: · Blocking inappropriate material refers to techniques that prevent a child from being exposed to material that has been judged to be inappro- priate. Blocking protects against both deliberate and inadvertent expo- sure. However, all material that is not explicitly identified as inappropri- ate ("black-listed" material) is treated as appropriate. Blocking can be circumvented by defeating the blocking mechanism, by gaining access to material that is generically equivalent to the blocked material, or by ac- cessing that material in a venue that is not blocked.8 · Restricting a child to appropriate material refers to techniques that give a child access only to material that is explicitly judged to be appro- priate for him or her. Children cannot reach inappropriate material be- cause the only material they can reach has been judged as appropriate. All material that is not explicitly identified as appropriate ("white-listed" material) is treated as inappropriate. Restrictions can be circumvented by defeating the restriction mechanism or by accessing non-white-listed ma- terial in a venue that does not restrict the user. The key difference be- tween blocking and restricting is that blocking allows access to every- thing that has not been blocked, whereas restricting gives access only to what has been approved. · Warning a child of impending exposure to inappropriate material leaves him or her with an explicit choice to accept or decline a viewing. Warning protects against inadvertent exposure to inappropriate material, but not against deliberate exposure. As with blocking, all material that is not ex- plicitly identified as inappropriate is treated as appropriate. However, circumvention is unnecessary, because the ultimate decision about whether to access the material is made by the child. · Suggesting appropriate material to a child provides direction but does not foreclose the exercise of choice. The child may disregard such sugges- tions, but such suggestions can influence him or her to proceed in "appro- ~Note the existence of "gray." "Gray" may be material that, while not exactly inappropri- ate for children, is regarded as not particularly helpful to them "waste-of-time" material. For example, one could imagine some schools putting Web sites that relate to games, sports, entertainment, and celebrities on a "black list" because spending time on such sites and with such material would not be regarded as having educational value. On the other hand, creative teachers may well be able to extract educational value from such sites and block- ing such material might reduce the educational opportunities available.

APPROACHES TO PROTECTION FROM INAPPROPRIATE MATERIAL 195 priate" directions. Suggestions are, of necessity, more limited than the entire universe of material that might be regarded as appropriate, and thus tend to focus on material that is regarded as being of particularly high value. · Deterring the access of children to inappropriate material depends on two factors: detection of access and subsequent penalty. Detection can be overt or covert, and penalties can vary across a very broad range, from social sanction to incarceration. Deterrence relies on a choice of the indi- vidual involved to refrain from accessing inappropriate material, a choice motivated by concern over being detected and of the subsequent penalty. Thus, deterrence is directly relevant to preventing or reducing deliberate access to such material. (However, if the threat of punishment makes the individual more careful, inadvertent access may be reduced as well.) The threat of a penalty being imposed for an inappropriate use detected through monitoring a child's Internet access is an example of an approach that relies on deterrence. · Educating a child about accessing inappropriate material has two com- ponents. One is much like deterrence, except that the motivation is differ- ent. Whereas deterrence depends on the possibility of detection and pun- ishment, education is an integral part of helping a child choose to refrain from accessing inappropriate material by inculcating an internal sense of personal responsibility. The second component is education about the Internet and the development of critical thinking that can help the child to conduct searches that are less likely to turn up inappropriate material and to recognize inappropriate material more effectively. · Helping a child to cope with exposure to inappropriate material recog- nizes that some exposure to such material is likely for most Internet users. Coping strategies are especially useful for children inadvertently exposed to inappropriate material and may involve ways of putting such material into context, understanding the difference between fantasy and reality, and so on. , ~ · Keeping a child "on task." In an environment in which time limits on Internet access can be enforced, children can be given specific tasks to accomplish. If they are held responsible for these tasks (as they might be in, for example, a school setting), they will simply have less time to seek out activities that are inappropriate. · Reducing the accessibility of inappropriate material to children can re- sult from a variety of actions, including making inappropriate material harder to find and reducing the amount of inappropriate material on the Internet. Supply-side actions have a different structure and are discussed further in Chapter 9. · Reducing the appeal of deliberate contact with inappropriate material. This approach leaves the essential content of such material untouched but

196 YOUTH, PORNOGRAPHY, AND THE INTERNET makes the user's engagement with the material (and only such material) more difficult, cumbersome, and inconvenient. It is important to note that the techniques discussed above are not mutually exclusive. For example, a message indicating that access to ma- terial has been blocked can also be accompanied by suggestions for alter- native but appropriate material instead. Indeed, combining some tech- niques may enhance effectiveness; such instances must be determined on a case-by-case basis. 8.7 APPROACHES TO PROTECTION Society has responded to concerns about the possibility that children and youth might be exposed to inappropriate material in a number of ways. For example, consider the following: · By legislative mandate, a "V-chip" is contained in every new tele- vision sold in the United States. The purpose of the V-chip is to give parents greater control over the television content to which their children are exposed. · In many communities, parents have the explicit right to "opt out" of school-provided sex education for their own children.9 · Members of a community often complain to schools or public li- braries about materials (usually books) that the complainants feel should not be available to the public, and especially to children. The content of such materials covers a wide range homosexuality, drugs, religious cults, bomb making, human sexuality, and race relations, to name a few. In some cases, schools and libraries do remove material found to be offen- sive by members of the local community. However, these examples do not illustrate a social consensus on their appropriateness or desirability. For example, most parents do not use V- chips in controlling their children's television usage (Box 8.1) and do not 9For example, Section 51550 of the California Education Code states, No governing board of a public elementary or secondary school may require pupils to attend any class in which human reproductive organs and their functions and processes are described, illustrated or discussed, whether such class be part of a course designated "sex education" or "family life education" or by some similar term, or part of any other course which pupils are required to attend.... Opportunity shall be provided to each parent or guardian to request in writing that his child not attend the class, [and] no child may attend a class if a request that he not attend the class has been received by the school. Available online at <http://www.leginfo.ca.gov/cgi-bin/waisgate.?WAISdocID=07839714985+ O+O+O&WAISaction=retrieve>.

APPROACHES TO PROTECTION FROM INAPPROPRIATE MATERIAL 197

198 YOUTH, PORNOGRAPHY, AND THE INTERNET remove their children from sex education classes in school.~° In the case of removing materials from libraries, a formal hearing process often guar- antees that removal will have a high political profile in the community involved, and constitutional issues arise as well. Nevertheless, there is one example of action taken in this area that the committee believes provides a helpful analogy. In particular, many com- munities deal with the issue of preventing minors from reading and view- ing adult-oriented magazines available at a newsstand through a number of steps. Children are taught by parents not to seek out such magazines, and parents refrain from leaving such magazines lying around the house (social and educational measures). In the stores, adult magazines are placed on the highest shelves, so that they are harder for shorter people to reach (a social measure). They are sealed in plastic, so that browsing them in the store is more difficult (a technology measure). An opaque "belly band" obscures the picture on the front (another technology measure). The picture itself, while sexually suggestive, does not depict either overt sexual activity or the genitalia of the models (a public policy measure). A purchaser of such magazines must usually make the transaction face-to- face with the operator of the newsstand, who can generally distinguish between a 12-year-old boy and an adult and whose very presence helps to deter some minors from even seeking to make such a purchase (another social measure). And the operator of the newsstand may be subject to prosecution if he knowingly sells an adult magazine to a minor under state and local laws that prohibit such sales to minors (another public policy measure). All of these measures combine into an approach to the sale of adult magazines that has not absolutely prevented minors from viewing their contents, but there is not much controversy about the approach, imperfect though it is. In other words, there is a rough social consensus that this approach is for the most part not unreasonable, either in its implementa- tion or its philosophy. It provides some protection, though the protection is not absolute, and the burden it places on magazine vendors and adult consumers is not particularly significant. Further, the protection that it does provide is adequate for publishers and vendors of adult magazines to be able to plausibly assert that they are taking reasonable steps to keep such material out of the hands of children. Hyphen given a choice, only ~ to 5 percent of parents remove their children from compre- hensive sexual education classes. See Kaiser Family Foundation. 2000. Sex Education in America: A View from Inside America's Classrooms. The Henry J. Kaiser Family Foundation, Menlo Park, Calif.

APPROACHES TO PROTECTION FROM INAPPROPRIATE MATERIAL 1 99 How should one view approaches to protecting children from inap- propriate sexually explicit material on the Internet? While the discussion of the corner newsstand above is helpful in understanding how to think about this issue, cyberspace is unlike a corner newsstand in many ways, and much of the controversy about inappropriate sexually explicit mate- rial on the Internet arises because of the differences between the corner newsstand and cyberspace. Nevertheless, a reasoned approach to pro- tection in cyberspace also relies on the three generic elements mentioned in the corner newsstand issue social and educational measures, technol- ogy, and public policy. There is a broad consensus that the ideal approach for keeping kids safe on the Internet in any dimension one wishes to consider is the presence of a trusted, responsible adult providing guidance, pedagogy, and supervision along with encouragement and understanding. But as a practical matter, many children are likely to have some degree of unsu- pervised access to the Internet or other online services (e.g., because of the infeasibility of continuous parental monitoring of children's Internet use). While parents with the education, resources, and time to understand and deal with the problem may approach the ideal described above, others who do not have these benefits also seek solutions to what they see as a real problem. It is thus not unreasonable to consider a combination of protective elements whose use can reinforce one another, though the closer one can get to the ideal described in the preceding discussion, the better. For example, parents can place computers at home in public places so that they can better supervise the Internet use of their children. Schools and libraries can teach children to avoid behavior that can lead to inadvertent exposure to inappropriate sexually explicit materials. Technology can be used to create Internet environments for very young children in which all content is specifically designed to be age-appropriate and educational. Public policy measures may be able to reduce the amount of adult- oriented, sexually explicit material that is accessible without some kind of age verification. (All of these elements, and others, are discussed in the following chapters.) The possibility of such synergistic effects should not be taken to mean that one particular combination of protective elements is right in all cases. Furthermore, no combination of protective elements will be free of trade- offs, both within the space of protecting children and youth from inap- propriate sexually explicit material on the Internet and with respect to how this space interacts with other societal issues. Thus, the appropriate combination of protective elements will vary substantially across differ- ent communities and styles of parenting, and it is important that parents

200 YOUTH, PORNOGRAPHY, AND THE INTERNET and communities retain the ability and authority to determine what is best for their children and how to make those trade-offs in accordance with their own values. Chapters 9 through 13 address a variety of options for public policies, strategies, and tools, and some of the benefits of coordinating their use.

Next: 9. Legal and Regulatory Tools »
Youth, Pornography, and the Internet Get This Book
×
Buy Paperback | $65.00 Buy Ebook | $54.99
MyNAP members save 10% online.
Login or Register to save!
Download Free PDF

The Internet has changed the way we access the world. This is especially true for kids, who soak up new technologies like eager little sponges. They have access to an enormous array of material, including educational links, sports info, chat rooms—and, unfortunately, pornography. But we must approach our need to protect children with care to avoid placing unnecessary restrictions on the many positive features of the Internet.

Youth, Pornography, and the Internet examines approaches to protecting children and teens from Internet pornography, threats from sexual predators operating on-line, and other inappropriate material on the Internet. The National Research Council’s Computer Science and Telecommunications Board explores a number of fundamental questions: Who defines what is inappropriate material? Do we control Internet access by a 17-year-old in the same manner as for a 7-year-old? What is the role of technology and policy in solving such a problem in the context of family, community, and society?

The book discusses social and educational strategies, technological tools, and policy options for how to teach children to make safe and appropriate decisions about what they see and experience on the Internet. It includes lessons learned from case studies of community efforts to intervene in kids’ exposure to Internet porn.

Providing a foundation for informed debate, this very timely and relevant book will be a must-read for a variety of audiences.

  1. ×

    Welcome to OpenBook!

    You're looking at OpenBook, NAP.edu's online reading room since 1999. Based on feedback from you, our users, we've made some improvements that make it easier than ever to read thousands of publications on our website.

    Do you want to take a quick tour of the OpenBook's features?

    No Thanks Take a Tour »
  2. ×

    Show this book's table of contents, where you can jump to any chapter by name.

    « Back Next »
  3. ×

    ...or use these buttons to go back to the previous chapter or skip to the next one.

    « Back Next »
  4. ×

    Jump up to the previous page or down to the next one. Also, you can type in a page number and press Enter to go directly to that page in the book.

    « Back Next »
  5. ×

    To search the entire text of this book, type in your search term here and press Enter.

    « Back Next »
  6. ×

    Share a link to this book page on your preferred social network or via email.

    « Back Next »
  7. ×

    View our suggested citation for this chapter.

    « Back Next »
  8. ×

    Ready to take your reading offline? Click here to buy this book in print or download it as a free PDF, if available.

    « Back Next »
Stay Connected!