Table of Contents
1
Platform for Internet Content Selection
2
PICS Members
3
Table of Contents
- Introduction
- Scenario 1 (10 year old)
- Scenario 2 (14 year old)
- How Selective Access works
4
Introduction
The Internet, Online services and the World Wide Web increase access to
information which can be both fun and educational
5
Ideally children use the Internet with their parents
6
But parents may not always be present and children may run into
inappropriate material.
7
The Solution:
A System for Selective Access
8
Some software already addresses the problem
9
Scenario 1
Mom sets up system for 10 year old son.
10
She begins by creating a new account
11
She has a choice of services and levels. She chooses RSAC and sets minimum
age to 10.
12
Later when her son turns on the computer to begin using the internet...
13
he will sign on and enter his password before being allowed access to the
internet.
14
He might turn to a directory service such as Infoseek.
15
A request to visit an appropriate site such as Nickelodeon would be allowed.
16
Returning to the directory, ha might select a link to questionable material.
17
If he really needs access, he can ask his Mom's permission.
18
Later, when Mom is home
19
She can review the permission requests and allow access to specific
content. She may also block specific content.
20
She can also set up a new account. This time for her 14 year old daughter.
21
When her daughter turns on the computer to begin using the internet...
22
She will sign on and enter her password before being allowed access to the
internet.
23
She might also turn to a directory service. She might even select one of
the links her brother tried.
24
Where as her brother was not allowed access to the same material, she has
access because she is older.
25
Returning to the directory, she might select a link to questionable material.
26
How Selective Access works
Parents have a choice
-They choose from a range of services
-They can set values within each service modifying the service's
recommendations.
-They can explicitly block material, or at their discretion allow access to
material blocked by the service.
27
Elements of the system
28
Labels may be created by:
-Authors and publishers
-Third-party independent services
-Parents
Labels may be distributed
-With documents themselves
-via compact disc
-via on-line service or web server
Blocking may occur at
-The home computer
-A proxy server
-The online service
-The information provider
29
Services May:
-Be free or paid
-Use computer analysis of text and images or employ people to assign labels
-Block one subject broadly (eg. Just nudity)
-Include multiple dimensions (eg. sex, violence, language, age)
-Focus on a narrow subject (eg. Allow only history)
30
Establishing a rating service involves:
-Defining categories or dimensions to rate, and setting scales for each
-Creating labels
-Setting up an online site
-To provide a description of the service
-To provide access to the labels
-And optionally, arranging with information services or information
providers to redistribute the labels
31
Next Steps
-PICS develops standards
-PICS proposes standards to the IETF and industry
-Posts standards and public domain code implementing them on the web
-Individual companies begin developing products implementing the standards