Internet Filters


Book Description

This report summarizes a survey, which was taken by the NCAC in the spring and summer of 2001 that looked at studies and tests describing the operation of products or software programs used to filter WWW sites.







A History of ALA Policy on Intellectual Freedom


Book Description

Collecting several key documents and policy statements, this supplement to the ninth edition of the Intellectual Freedom Manual traces a history of ALA’s commitment to fighting censorship. An introductory essay by Judith Krug and Candace Morgan, updated by OIF Director Barbara Jones, sketches out an overview of ALA policy on intellectual freedom. An important resource, this volume includes documents which discuss such foundational issues as The Library Bill of RightsProtecting the freedom to readALA’s Code of EthicsHow to respond to challenges and concerns about library resourcesMinors and internet activityMeeting rooms, bulletin boards, and exhibitsCopyrightPrivacy, including the retention of library usage records




A Practical Guide to Internet Filters


Book Description

What are filters and how do they work? Which ones are the most effective for school and public libraries? Are there legal ramifications to using filters. As more libraries offer Internet access to their customers, filtering is becoming a major topic with library boards, governing officials, and the community. This book is a guide that aims to prepare and inform librarians in schools and public libraries about the issue. Contents include: a description of filters and their alternatives, along with factors to consider in the library's decision whether to use them or not; explanations and evaluations of over a dozen client-based filters, proxy servers, and proxy server enhancements including Bess, Cyber Patrol, Cybersitter, Net Nanny, Safesurf, Surf Watch, and Websense; a discussion on the legal issues involving filters, including recent cases and the question of how much legal responsibility libraries have for Web content they make available.







The Filter Bubble


Book Description

A report on how internet personalization is controlling and limiting information to users reveals how sites like Google and Facebook only display search results that they believe people are most likely to select, raising a risk that users will become less informed, more biased and increasingly isolated. 50,000 first printing.




The SAGE Encyclopedia of the Internet


Book Description

The Internet needs no introduction, and its significance today can hardly be exaggerated. Today, more people are more connected technologically to one another than at any other time in human existence. For a large share of the world’s people, the Internet, text messaging, and various other forms of digital social media such as Facebook have become thoroughly woven into the routines and rhythms of daily life. The Internet has transformed how we seek information, communicate, entertain ourselves, find partners, and, increasingly, it shapes our notions of identity and community. The SAGE Encyclopedia of the Internet addresses the many related topics pertaining to cyberspace, email, the World Wide Web, and social media. Entries will range from popular topics such as Alibaba and YouTube to important current controversies such as Net neutrality and cyberterrorism. The goal of the encyclopedia is to provide the most comprehensive collection of authoritative entries on the Internet available, written in a style accessible to academic and non-academic audiences alike.




ISSE 2009 Securing Electronic Business Processes


Book Description

This book presents the most interesting talks given at ISSE 2009 – the forum for the inter-disciplinary discussion of how to adequately secure electronic business processes. The topics include: - Economics of Security and Identity Management - Security Services and Large Scale Public Applications - Privacy and Data Protection and Awareness Raising - Standards and Technical Solutions - Secure Software, Trust and Assurance Adequate information security is one of the basic requirements of all electronic business processes. It is crucial for effective solutions that the possibilities offered by security technology can be integrated with the commercial requirements of the applications. The reader may expect state-of-the-art: best papers of the Conference ISSE 2009.




Administering the School Library Media Center


Book Description

This is the most comprehensive textbook on school library administration available, now updated to include the latest standards and address new technologies. This reference text provides a complete instructional overview of the workings of the library media center—from the basics of administration, budgeting, facilities management, organization, selection of materials, and staffing to explanations on how to promote information literacy and the value of digital tools like blogs, wikis, and podcasting. Since the publication of the fourth edition of Administering the School Library Media Center in 2004, many changes have altered the landscape of school library administration: the implementation of NCLB legislation and the revision of AASL standards, just to mention two. The book is divided into 14 chapters, each devoted to a major topic in school library media management. This latest edition gives media specialists a roadmap for designing a school library that is functional and intellectually stimulating, while leading sources provide guidance for further research.




Programming for TV, Radio, and the Internet


Book Description

First Published in 2005. Routledge is an imprint of Taylor & Francis, an informa company.