ArtsAutosBooksBusinessEducationEntertainmentFamilyFashionFoodGamesGenderHealthHolidaysHomeHubPagesPersonal FinancePetsPoliticsReligionSportsTechnologyTravel

Protecting Children from Harmful Websites

Updated on November 21, 2015
The Connected World
The Connected World | Source

Technology follows a path that initially enables the free flow of information but this freedom leads to efforts to regulate and control. The differing viewpoints between regulators and users date back to the introduction of typeset pages. However, the nature of the Internet with a fundamental lack of central control and global distribution makes regulating the content of the Internet a dificult task. (Lawson & Comber, 2000).

Many extremist organizations use the Internet for communication and recruiting activities and one very disturbing trend is the move by these organizations to target youth (Taylor, Fritsch, Liederbach, and Holt, 2011). The Web is not composed of static content but offers a rich interactive experience that a user may access from a variety modern devices, including a Personal Digital Assistant (PDA), smart phone, TV, computer, or even a Game Boy (Hart, 2001). Web sites geared toward promoting hateful anarchist and extremist organizations target youth by taking advantage of the content that youthful visitors naturally gravitate to, such as music and videos, cartoons, and video games (Taylor, et al., 2011). The number of hate sites that reside on the Web to promote funding for hate groups and recruit new members is growing at an alarming rate and expose children to significant risk (Katzman, 2005).

Teaching Hatred to Children

Teaching hatred to children is not an activity taken solely by the masters of rogue Web sites. The political powers of certain countries promote hatred by subsidizing school curriculum that teaches hatred to children (Katzman, 2005). Hate groups also attempt to lure children into acting out hateful phylosophies under the guise of entertainment. Such hate groups as the Neo-Nazi skinheads and the KKK, among others, specifically reach out to children at vulnerable ages to try to attain organizational recruitment goals (Anti Defamation League, 1999). "Extremists are trying to seduce our children with multimedia on-line messages designed to mask the hideous face of hatred and violence and attract and influence young people” (Anti Defamation League, 1999, para. 4).

Attempting to curb the proliferation of hate content on the web aimed at children in a democracy is complicated. Katzman (2005) stated “In a democracy, the right to freedom of speech comes up against the concern for teaching hate, which often leads to violent oratory and actions” (p. 148). Academic communities view the Internet as a resource that empowers the students. The existence of sites containing content not suitable for young students is viewed as an unavoidable consequence of access to important learning resources (Lawson & Comber, 2000).

Easy Access
Easy Access | Source

Parental Anxiety Over Internet Content

Parental anxiety over the types of content that their children are exposed to increases with the growing dependence on Web content by school systems (Lawson & Comber, 2000). Teachers, who ultimately control student Internet access at school, face the dilemma between permitting unlimited Internet access or censoring content and possibly infringing on the First Amendment rights of students (Lawson & Comber, 2000). However, limiting student exposure at school would not provide a total solution to the problem of exposure to harmful material; students can also access the Internet from sources outside of the school including the student’s home, libraries, the homes of friends, and Internet cafes.

Predators Target Girls on Social Media

Many school districts began taking measures to implement the Children’s Internet Protection Act (CIPA) in the year 2001 (Anderson, 2010). As a legislative effort, the CIPA mandates that schools take protective measures in school libraries to protect children against harmful Internet content (Charma, 2010). The measures imposed by the CIPA present protection guidelines but a more comprehensive plan that takes into consideration locations outside the school is called for.

Strategy for Child Protection

The author asserts that as a matter of common knowledge, children will challenge the rules and seek ways to circumvent those rules. The CIPA legislative effort will help protect children from viewing harmful content while at school but is ineffective while children are away from school. Current legislative efforts have not effectively addressed the problems associated with children accessing harmful material online or in print. As a global resource, the Internet provides harmful content to areas where such content is regulated from countries where the content is considered legally accessible (Lawson & Comber, 2000, p. 279).

Predators Target Boys on Social Media

The primary strategies adopted by many schools and colleges to comply with the CIPA and protect minors while online include the following elements:

  • restrict access using supervised sessions
  • use content filtering software
  • implement acceptable use policies
  • implement an honor system
  • monitor student Internet activity (Lawson & Comber, 2000)

The author recommends that parents coordinate student Internet access outside of school with the parents of their children’s friends to incorporate these elements in the children’s extracurricular activities. Controlling Internet access for children while at school provides limited protection if those children may then access the restricted material once they arrive home.

Restrict Access using Supervised Sessions

One argument for supervising access to the Internet is the possibility of litigation resulting from parental complaints originating from students visiting sites that display inappropriate material (Lawson & Comber, 2000). However, all Internet access must be supervised for this strategy to be effective and this strategy somewhat detracts from the power of the Internet as a learning tool. Studies referenced by Lawson and Comber (2000) “showed that there was a great deal of visiting unscheduled web pages, especially chat lines, when the teachers, nominally in charge of a session, had their attention elsewhere” (p. 279).

Use Content Filters

A content filter provides a method to protect a child from harmful Internet content by comparing a Web site that a child tries to access to a database containing the classifications and locations of harmful sites (K12USA.com, 2012; ADL, 2002; FOSI.org, n.d.:). Various content filters are available to institutions and individuals but the Anti Defamation League released a content filter specifically targeting hate sites, which the organization named HateFilter (ADL, 2002). HateFilter relies on the rating system imposed by the Family Online Safety Institute (FOSI), formerly known as the Internet Content Rating Association (ICRA) (ADL, 2012; FOSI.org, n.d.).

There are a couple of caveats involved in using content filters. One caveat is that a crafty student may attempt to bypass the filter by using a proxy server (FOSI.org, n.d.). A solution to the problem posed by proxy servers is to use an appliance, such as SecureSchool. “SecureSchool combines Internet filtering, proxy server, firewall, and several other functions to keep students out of sites like myspace and keeps them from evading filtering by blocking use of outside proxy filters” (K12USA.com, 2012). The second caveat is the reliance on the ICRA database. The FOSI uses a voluntary questionnaire submitted by publishers to develop the ratings and vocabulary for searches (FOSI.org, n.d.). However, publishers of hate sites may not submit the questionnaires to the filtering organization so those sites may not be included in the filter.

Enforce Acceptable Use Policies

Content filters help isolate content but there is no completely technical solution to the problem of children viewing inappropriate content online (Lawson & Comber, 2000). Many schools attempt to fill the void by implementing acceptable use policies. The policies may take the form of documents signed by both the students and the students’ parents, which define appropriate use of the Internet and content that may not be viewed (Anderson, 2010; Lawson & Comber, 2000). These policies are then used in combination with content filters, the honor system and monitoring techniques. The author maintains that parents should explain the policy to their child and require the child’s agreement to the policy as a requirement for permitting Internet access both inside and outside the home.

Social Networking Sites
Social Networking Sites | Source

The Honor System

Responsible students who do not attempt to circumvent the system and follow the acceptable use policy may be granted less restrictive access under an honor system that lifts the content filters. The honor system appears to be effective for older students who require less restriction for legitimate purposes (Lawson & Comber, 2000). An evaluation report, cited by Lawson and Comber stated, “only one student out of 180 has been excluded’ over the year-long period of the evaluation” (p. 281). However, Lawson and Comber also concluded that an honor system might not be an appropriate course of action for younger students who may be more susceptible to temptation.

Monitor Student Internet Activity

Technology changes constantly and children easily adapt to technological change. Combining new technology with Internet access at school and at home leads some children to “test the fringes of filtering processes in order to bypass blocking” (Anderson, 2010, p. 121). Most of the participants in the study cited by Lawson and Comber (2000) acknowledged that their respective schools reinforced the preceding elements by using “some form of scare tactic about being caught” (p. 281). The typical method associated with the tactic was monitoring student Internet activity. Informing students that their activity may be monitored at any time and punishing offenders resulted in building a trustful environment where students could access the Web unsupervised (Lawson & Comber, 2000).

First Amendment Rights

The question of individual’ rights come up often when discussions commence concerning controlling access to the Internet for schoolchildren (Chmara, 2010). Early actions taken during the process of implementing the CIPA were to hold meetings with concerned parents to explain the measures and elicit parental response (Anderson, 2010). The first mandate under the CIPA required schools to take technological measures to block access to pictures that were obscene or portrayed child pornography (Anderson, 2010). Under the CIPA, obscene was defined as any material that is “offensive to morality or decency; indecent; depraved; causing uncontrolled sexual desire or abominable; disgusting; repulsive” (p. 117).

Should children access social networking sites?

See results

Later provisions of the CIPA included any material that is harmful to children (Chmara, 2010). No challenges to the provisions of the CIPA have been filed to date on the grounds that the provisions violate the First Amendment rights of children (Chmara, 2010). However, someone must decide what material is offensive and remove any blocks to material that should be accessible under the First Amendment (Chmara, 2010; Lawson & Comber, 2000).

Conclusion

Although information and media may be found on the Internet covering almost any topic, not all of the available content is appropriate for children and some sites may be considered harmful. Certain extremist and anarchist organizations developed Web-presences to promote hate and aid in fund raising and recruiting efforts. Many of those organizations specifically target children while those children are in the vulnerable stages of child development to lure those children into developing hateful philosophies. Certain foreign nations also participate in teaching hate to children and those nations reflect this hateful philosophy on the Web.

Schools have come to rely more and more on Web content to reinforce learning but parents and teachers are concerned that children may navigate to those harmful sites. Legislative efforts aimed at protecting children online include the CIPA but contain mostly technical controls. A more comprehensive protection plan for children in and out of school is called for.

A plan including supervised access, content filters, an honor system, and activity monitoring could fill the gap between the protections provided by school implemented technical controls and a child’s natural tendencies to test the system. Such a plan should be effective at protecting a child from harmful Web sites but not at the cost of violating the child’s First Amendment rights. Implementing such a plan would require coordinating protective measures by the school system, the child’s parents, and the parents of the child’s friends. Although isolating a child from all harmful content may not be practical or achievable, measures that are more effective could be taken to limit the exposure of children to such sites.

  • Anderson, W. L. (2010). Children's Internet Protection Act: Balancing compliance with access. Global Education Journal, (4), 117-123

  • Chmara, T. (2010). Minors' First Amendment rights: CIPA & schools. Knowledge Quest, 39(1), 16-21.

  • Hart, I. (2001). Deschooling and the Web: Ivan Illich 30 years on. Educational Media International, 38(2/3), 69-76. doi:10.1080/09523980110041449

  • Katzman, G. H. (2005). A bioethical analysis of a form of psychologic abuse: Teaching hatred to children. Clinical Pediatrics, 44(2), 143-150. doi:10.1177/000992280504400206
  • Lawson, T., & Comber, C. (2000). Censorship, the Internet and schools: a new moral panic? Curriculum Journal, 11(2), 273-285. doi:10.1080/09585170050045236
  • Taylor, R. W., Fritsch, E. J., Liederbach, J., & Holt, T. J. (2011). Digital Crime and Digital Terrorism (2nd ed.). Upper Saddle River, NJ: Prentice Hall.

working

This website uses cookies

As a user in the EEA, your approval is needed on a few things. To provide a better website experience, hubpages.com uses cookies (and other similar technologies) and may collect, process, and share personal data. Please choose which areas of our service you consent to our doing so.

For more information on managing or withdrawing consents and how we handle data, visit our Privacy Policy at: https://corp.maven.io/privacy-policy

Show Details
Necessary
HubPages Device IDThis is used to identify particular browsers or devices when the access the service, and is used for security reasons.
LoginThis is necessary to sign in to the HubPages Service.
Google RecaptchaThis is used to prevent bots and spam. (Privacy Policy)
AkismetThis is used to detect comment spam. (Privacy Policy)
HubPages Google AnalyticsThis is used to provide data on traffic to our website, all personally identifyable data is anonymized. (Privacy Policy)
HubPages Traffic PixelThis is used to collect data on traffic to articles and other pages on our site. Unless you are signed in to a HubPages account, all personally identifiable information is anonymized.
Amazon Web ServicesThis is a cloud services platform that we used to host our service. (Privacy Policy)
CloudflareThis is a cloud CDN service that we use to efficiently deliver files required for our service to operate such as javascript, cascading style sheets, images, and videos. (Privacy Policy)
Google Hosted LibrariesJavascript software libraries such as jQuery are loaded at endpoints on the googleapis.com or gstatic.com domains, for performance and efficiency reasons. (Privacy Policy)
Features
Google Custom SearchThis is feature allows you to search the site. (Privacy Policy)
Google MapsSome articles have Google Maps embedded in them. (Privacy Policy)
Google ChartsThis is used to display charts and graphs on articles and the author center. (Privacy Policy)
Google AdSense Host APIThis service allows you to sign up for or associate a Google AdSense account with HubPages, so that you can earn money from ads on your articles. No data is shared unless you engage with this feature. (Privacy Policy)
Google YouTubeSome articles have YouTube videos embedded in them. (Privacy Policy)
VimeoSome articles have Vimeo videos embedded in them. (Privacy Policy)
PaypalThis is used for a registered author who enrolls in the HubPages Earnings program and requests to be paid via PayPal. No data is shared with Paypal unless you engage with this feature. (Privacy Policy)
Facebook LoginYou can use this to streamline signing up for, or signing in to your Hubpages account. No data is shared with Facebook unless you engage with this feature. (Privacy Policy)
MavenThis supports the Maven widget and search functionality. (Privacy Policy)
Marketing
Google AdSenseThis is an ad network. (Privacy Policy)
Google DoubleClickGoogle provides ad serving technology and runs an ad network. (Privacy Policy)
Index ExchangeThis is an ad network. (Privacy Policy)
SovrnThis is an ad network. (Privacy Policy)
Facebook AdsThis is an ad network. (Privacy Policy)
Amazon Unified Ad MarketplaceThis is an ad network. (Privacy Policy)
AppNexusThis is an ad network. (Privacy Policy)
OpenxThis is an ad network. (Privacy Policy)
Rubicon ProjectThis is an ad network. (Privacy Policy)
TripleLiftThis is an ad network. (Privacy Policy)
Say MediaWe partner with Say Media to deliver ad campaigns on our sites. (Privacy Policy)
Remarketing PixelsWe may use remarketing pixels from advertising networks such as Google AdWords, Bing Ads, and Facebook in order to advertise the HubPages Service to people that have visited our sites.
Conversion Tracking PixelsWe may use conversion tracking pixels from advertising networks such as Google AdWords, Bing Ads, and Facebook in order to identify when an advertisement has successfully resulted in the desired action, such as signing up for the HubPages Service or publishing an article on the HubPages Service.
Statistics
Author Google AnalyticsThis is used to provide traffic data and reports to the authors of articles on the HubPages Service. (Privacy Policy)
ComscoreComScore is a media measurement and analytics company providing marketing data and analytics to enterprises, media and advertising agencies, and publishers. Non-consent will result in ComScore only processing obfuscated personal data. (Privacy Policy)
Amazon Tracking PixelSome articles display amazon products as part of the Amazon Affiliate program, this pixel provides traffic statistics for those products (Privacy Policy)
ClickscoThis is a data management platform studying reader behavior (Privacy Policy)