| |
| |
Executive Summary | |
| |
| |
| |
| |
| |
| |
Introduction | |
| |
| |
| |
The Internet: Source of Promise, Source of Concern | |
| |
| |
| |
A Critical Definitional Issue--What Is "Pornography"? | |
| |
| |
| |
Other Types of Inappropriate Material and Experiences | |
| |
| |
| |
A Broad Spectrum of Opinion and Views | |
| |
| |
| |
Focus and Structure of This Report | |
| |
| |
| |
Technology | |
| |
| |
| |
An Orientation to Cyberspace and the Internet | |
| |
| |
| |
Characteristics of Digital Information | |
| |
| |
| |
The Nature of the Internet Medium and a Comparison to Other Media Types | |
| |
| |
| |
Internet Access Devices | |
| |
| |
| |
Connecting to the Internet | |
| |
| |
| |
Identifying Devices on the Internet: The Role of Addressing | |
| |
| |
| |
Functionality of the Internet | |
| |
| |
| |
Cost and Economics of the Internet | |
| |
| |
| |
A Global Internet | |
| |
| |
| |
The Relative Newness of the Internet | |
| |
| |
| |
Technologies of Information Retrieval | |
| |
| |
| |
Technologies Related to Access Control and Policy Enforcement | |
| |
| |
| |
Filtering Technologies | |
| |
| |
| |
Technologies for Authentication and Age Verification | |
| |
| |
| |
Encryption (and End-to-End Opacity) | |
| |
| |
| |
Anonymizers | |
| |
| |
| |
Location Verification | |
| |
| |
| |
What the Future May Bring | |
| |
| |
| |
The Adult Online Entertainment Industry | |
| |
| |
| |
The Structure and Scale of the Online Adult Entertainment Industry | |
| |
| |
| |
The Generation of Revenue | |
| |
| |
| |
Practices Related to Minors | |
| |
| |
| |
What the Future May Hold | |
| |
| |
| |
The Structural Evolution of the Industry | |
| |
| |
| |
Increased Regulation | |
| |
| |
| |
Future Products and Services | |
| |
| |
| |
Industry Structure, Product Differentiation, and Aggressive Promotion | |
| |
| |
| |
Legal and Regulatory Issues | |
| |
| |
| |
The First Amendment | |
| |
| |
| |
First Principles | |
| |
| |
| |
The First Amendment, Pornography, and Obscenity | |
| |
| |
| |
The First Amendment and Protecting Children from Exposure to Sexually Explicit Material | |
| |
| |
| |
The First Amendment Rights of Minors | |
| |
| |
| |
The First Amendment and Child Pornography | |
| |
| |
| |
The First Amendment in Public Libraries | |
| |
| |
| |
The First Amendment in Public Schools | |
| |
| |
| |
The First Amendment and the Commercial Advertising of Sexually Explicit Material | |
| |
| |
| |
Relevant Statutes and Common Law | |
| |
| |
| |
Federal Obscenity Statutes | |
| |
| |
| |
Child Pornography Statutes | |
| |
| |
| |
The Communications Decency Act | |
| |
| |
| |
The Child Online Protection Act | |
| |
| |
| |
The Children's Internet Protection Act | |
| |
| |
| |
The Children's Online Privacy Protection Act | |
| |
| |
| |
State Statutes | |
| |
| |
| |
Regulatory Efforts | |
| |
| |
| |
International Dimensions | |
| |
| |
| |
Law Enforcement, Training, and Education | |
| |
| |
| |
Children, Media, and Exposure to Sexually Explicit Material | |
| |
| |
| |
Children and How They Use Media | |
| |
| |
| |
Sexuality in Culture | |
| |
| |
| |
The Role of Media in Providing Information on Sexuality to Youth | |
| |
| |
| |
Dimensions of Exposure and Access to the Internet | |
| |
| |
| |
Venues of Access | |
| |
| |
| |
Sources and Channels of Exposure | |
| |
| |
| |
Extent of Exposure | |
| |
| |
| |
Internet Exposure to Sexually Explicit Material, Solicitations, and Harassment | |
| |
| |
| |
Deliberate Search for Sexually Explicit Material | |
| |
| |
| |
Inadvertent Exposure to or Intrusion of Sexually Explicit Material | |
| |
| |
| |
Sexual Solicitations and Approaches | |
| |
| |
| |
Harassment | |
| |
| |
| |
The Research Base on the Impact of Exposure to Sexually Explicit Material: What Theory and Empirical Studies Offer | |
| |
| |
| |
Theoretical Considerations | |
| |
| |
| |
Empirical Work | |
| |
| |
| |
Violence | |
| |
| |
| |
Sexually Violent Material | |
| |
| |
| |
Exposure to Non-violent Sexual Material | |
| |
| |
| |
Caveats and Cautions | |
| |
| |
| |
Factors Affecting the Impact on Minors of Exposure to Sexually Explicit Material | |
| |
| |
| |
Impact | |
| |
| |
| |
Minors | |
| |
| |
| |
Gender | |
| |
| |
| |
Special Needs | |
| |
| |
| |
Exposure | |
| |
| |
| |
The Type of Sexually Explicit Material | |
| |
| |
| |
Beyond the Science: Perspectives on Impact and the Public Debate | |
| |
| |
| |
Challenges to Parents | |
| |
| |
| |
Speculations and Other Perspectives on Possible Impact | |
| |
| |
| |
Rhetorical Concerns and Issues of Public Debate | |
| |
| |
| |
Judgments in the Absence of a Reliable Research Base | |
| |
| |
| |
Concluding Observations | |
| |
| |
| |
| |
| |
| |
Approaches to Protection From Inappropriate Material | |
| |
| |
| |
The Identification of Inappropriate Material | |
| |
| |
| |
In Principle | |
| |
| |
| |
In Practice | |
| |
| |
| |
Dimensions of "Protection" | |
| |
| |
| |
The Time Line of Protective Actions | |
| |
| |
| |
Differing Institutional Missions of Schools and Libraries | |
| |
| |
| |
The Politics of Protection and Inappropriate Material--Who and When? | |
| |
| |
| |
Techniques of Protection | |
| |
| |
| |
Approaches to Protection | |
| |
| |
| |
Legal and Regulatory Tools | |
| |
| |
| |
Vigorous Prosecutions of Obscene Material | |
| |
| |
| |
Civil Liability for Presenting Obscene Material on the Internet | |
| |
| |
| |
Options for Dealing with Material That Is Obscene for Minors | |
| |
| |
| |
Age Verification | |
| |
| |
| |
Plain Brown Wrappers and Age Verification | |
| |
| |
| |
Labeling of Material That Is Obscene for Minors | |
| |
| |
| |
Prohibiting Spam That Is Obscene for Minors | |
| |
| |
| |
Prohibiting the Practice of Mousetrapping to Web Sites Containing Material That Is Obscene for Minors | |
| |
| |
| |
Enforcement of Record-Keeping Requirements | |
| |
| |
| |
Streamlining the Process of Handling Violation | |
| |
| |
| |
Self-Regulatory Approaches | |
| |
| |
| |
General Observations | |
| |
| |
| |
Social and Educational Strategies to Develop Personal and Community Responsibility | |
| |
| |
| |
Foundations of Responsible Choice | |
| |
| |
| |
Definition of a Social or Educational Strategy | |
| |
| |
| |
Contextual Issues for Social and Educational Strategies | |
| |
| |
| |
Parental Involvement and Supervision | |
| |
| |
| |
Peer Assistance | |
| |
| |
| |
Acceptable Use Policies | |
| |
| |
| |
After-the-Fact Strategies | |
| |
| |
| |
Education | |
| |
| |
| |
Internet Safety Education | |
| |
| |
| |
Information and Media Literacy | |
| |
| |
| |
Collateral Issues | |
| |
| |
| |
Compelling and Safe Content | |
| |
| |
| |
Public Service Announcements and Media Campaigns | |
| |
| |
| |
Findings and Observations About Social and Educational Strategies | |
| |
| |
| |
A Perspective on Technology-Based Tools | |
| |
| |
| |
Technology-Based Tools | |
| |
| |
| |
Contextual Issues for Technology-Based Tools | |
| |
| |
| |
The Questions to Be Asked of Each Tool | |
| |
| |
| |
Technology-Based Tools for Users | |
| |
| |
| |
Filtering and Content-Limited Access | |
| |
| |
| |
What Is Filtering and Content-Limited Access? | |
| |
| |
| |
How Well Does Filtering Work? | |
| |
| |
| |
Who Decides What Is Inappropriate? | |
| |
| |
| |
How Flexible and Usable Is the Product? | |
| |
| |
| |
What Are the Costs of and the Infrastructure Required for Filtering? | |
| |
| |
| |
What Does the Future Hold for Filtering? | |
| |
| |
| |
What Are the Implications of Filtering Use? | |
| |
| |
| |
Findings on Filters | |
| |
| |
| |
Monitoring | |
| |
| |
| |
What Is Monitoring? | |
| |
| |
| |
How Well Does Monitoring Work? | |
| |
| |
| |
Who Decides What Is Inappropriate? | |
| |
| |
| |
How Flexible and Usable Are Products for Monitoring? | |
| |
| |
| |
What Are the Costs and Infrastructure Required for Monitoring? | |
| |
| |
| |
What Does the Future Hold for Monitoring? | |
| |
| |
| |
What Are the Implications of Using Monitoring? | |
| |
| |
| |
Findings on Monitoring | |
| |
| |
| |
Tools for Controlling or Limiting "Spam" | |
| |
| |
| |
What Are Technologies for Controlling Spam? | |
| |
| |
| |
How Well Do Spam-Controlling Technologies Work? | |
| |
| |
| |
Who Decides What Is Spam? | |
| |
| |
| |
How Flexible and Usable Are Products for Controlling Spam? | |
| |
| |
| |
What Are the Costs and Infrastructure Required for Using Spam-Control Products? | |
| |
| |
| |
What Does the Future Hold for Spam-Controlling Systems? | |
| |
| |
| |
What are the Implications of Using Spam-Controlling Systems? | |
| |
| |
| |
Findings on Spam-Controlling Technologies | |
| |
| |
| |
Instant Help | |
| |
| |
| |
What Is Instant Help? | |
| |
| |
| |
How Well Might Instant Help Work? | |
| |
| |
| |
Who Decides What Is Inappropriate? | |
| |
| |
| |
How Flexible and Usable Is Instant Help? | |
| |
| |
| |
What Are the Costs and Infrastructure Required for Instant Help? | |
| |
| |
| |
What Does the Future Hold for Instant Help? | |
| |
| |
| |
What Are the Implications of Using Instant Help? | |
| |
| |
| |
Findings on Instant Help | |
| |
| |
| |
Technology-Based Tools Available to Non-End Users | |
| |
| |
| |
A .xxx Top-Level Domain | |
| |
| |
| |
What Is a .xxx Top-level Domain? | |
| |
| |
| |
How Well Would a .xxx Top-Level Domain Work? | |
| |
| |
| |
Who Decides What Material Should Be Confined to .xxx Web Sites? | |
| |
| |
| |
How Flexible and Usable Are Schemes Based on a .xxx Top-Level Domain? | |
| |
| |
| |
What Are the Costs and Infrastructure Required for a .xxx Top-Level Domain? | |
| |
| |
| |
What Does the Future Hold for a .xxx Top-Level Domain? | |
| |
| |
| |
What Are the Implications of Using a .xxx Top-Level Domain? | |
| |
| |
| |
Findings on a .xxx Top-Level Domain | |
| |
| |
| |
A .kids Top-Level Domain | |
| |
| |
| |
What is a .kids Top-level Domain? | |
| |
| |
| |
How Well Would a .kids Top-Level Domain Work? | |
| |
| |
| |
Who Decides What Material Should Be Allowed in .kids Web Sites? | |
| |
| |
| |
How Flexible and Usable Are Schemes Based on a .kids Top-Level Domain? | |
| |
| |
| |
What Are the Costs and Infrastructure Required for a .kids Top-Level Domain? | |
| |
| |
| |
What Does the Future Hold for a .kids Top-Level Domain? | |
| |
| |
| |
What Are the Implications of Using a .kids Top-Level Domain? | |
| |
| |
| |
Findings on a .kids Top-Level Domain | |
| |
| |
| |
Age Verification Technologies | |
| |
| |
| |
What Are Age Verification Technologies? | |
| |
| |
| |
How Well Do Age Verification Technologies Work? | |
| |
| |
| |
Who Decides What Is Inappropriate? | |
| |
| |
| |
How Flexible and Usable Are Products for Verifying Age? | |
| |
| |
| |
What Are the Costs and Infrastructure Required for Age Verification? | |
| |
| |
| |
What Does the Future Hold for Age Verification Systems? | |
| |
| |
| |
What Are the Implications of Using Age Verification Systems? | |
| |
| |
| |
Findings on Age Verification Technologies | |
| |
| |
| |
Tools for Protecting Intellectual Property | |
| |
| |
| |
What Are Tools for Protecting Intellectual Property? | |
| |
| |
| |
How Well Do Tools for Protecting Intellectual Property Work? | |
| |
| |
| |
Who Decides What Is Inappropriate? | |
| |
| |
| |
How Flexible and Usable Are Products for Protecting Intellectual Property? | |
| |
| |
| |
What Are the Costs and Infrastructure Required for Protecting Intellectual Property? | |
| |
| |
| |
What Does the Future Hold for Tools for Protecting Intellectual Property? | |
| |
| |
| |
What Are the Implications of Tools for Protecting Intellectual Property? | |
| |
| |
| |
Findings on Tools for Protecting Intellectual Property | |
| |
| |
| |
| |
| |
| |
Findings, Conclusions, and Future Needs | |
| |
| |
| |
Framing the Issue | |
| |
| |
| |
Social Dimensions | |
| |
| |
| |
Developmental Dimensions | |
| |
| |
| |
Legal Dimensions | |
| |
| |
| |
Technical Dimensions | |
| |
| |
| |
Economic Dimensions | |
| |
| |
| |
On the Impact on Children of Exposure to Sexually Explicit Material and Experiences | |
| |
| |
| |
On Approaches to Protection | |
| |
| |
| |
Trade-offs and Complexity | |
| |
| |
| |
Social and Educational Trade-offs | |
| |
| |
| |
Technology Trade-offs | |
| |
| |
| |
Public Policy Trade-offs | |
| |
| |
| |
Take-Away Messages for Different Parties | |
| |
| |
| |
Parents | |
| |
| |
| |
Teachers and Librarians | |
| |
| |
| |
Industry | |
| |
| |
| |
Makers of Public Policy | |
| |
| |
| |
Research Needs | |
| |
| |
| |
Conclusion | |
| |
| |
Appendixes | |
| |
| |
| |
Information-Gathering Sessions of the Committee | |
| |
| |
| |
Glossary and Acronyms | |
| |
| |
| |
Selected Technology Issues | |
| |
| |
| |
Site Visit Synthesis | |
| |
| |
| |
Biographies | |
| |
| |
Index | |