Impact of Filtering on U.K. Youth

Author(s):  
E. Halpin ◽  
D. Griffin ◽  
P. Trevorrow

This paper considers the issues of youth citizenship, access to information and community participation via the Internet for young people and the effects of filtering upon this. Two empirical studies on internet filtering in public libraries and young peoples perceptions of filtering and their access to information inform the paper.Cet article considère les questions de la citoyenneté pour les jeunes, de l’accès à l’information et la participation de la communauté via l’Internet pour les jeunes et les effets du filtrage sur ces questions. Deux études empiriques sur le filtrage d’Internet dans les bibliothèques publiques et sur les perceptions des jeunes au sujet du filtrage et de leur accès à l’information documentent cet article. 

Author(s):  
Elizabeth Gould ◽  
Ricardo Gomez

Libraries play a central role as venues that offer public access to information. Increasingly, libraries in developing countries are offering access to computers and the Internet, as well as to books and other types of information services and resources. Given the relatively scant literature on public access to ICT in libraries in many countries, we explore in this chapter the specific challenges libraries face in the countries we studied in the Landscape Study. How are public libraries serving the information needs of marginalized communities in developing countries? How is access to new information and communication technologies (ICT) changing the landscape of public access to information? How can libraries better collaborate with other types of venues (such as telecenters and cybercafés) that offer public access to computers and the Internet? These are some of the questions that we seek to answer in this chapter.


2021 ◽  
pp. 121-132
Author(s):  
Ken Haycock

A primary purpose of the school library program is to enable young people to access and make effective use of information and ideas. This role has been enhanced through access to electronic resources. The Internet, however, is not a pre-selected menu of information sources deemed appropriate for children and young adults. Therefore, some libraries employ software to block or filter unfettered access to information. The purpose of this study was to measure the penetration of this filtering software in North America, to ascertain which types of software are used, and to determine librarians' levels of satisfaction.


Crisis ◽  
2015 ◽  
Vol 36 (3) ◽  
pp. 211-219 ◽  
Author(s):  
Vinod Singaravelu ◽  
Anne Stewart ◽  
Joanna Adams ◽  
Sue Simkin ◽  
Keith Hawton

Abstract. Background: The Internet is used by young people at risk of self-harm to communicate, find information, and obtain support. Aims: We aimed to identify and analyze websites potentially accessed by these young people. Method: Six search terms, relating to self-harm/suicide and depression, were input into four search engines. Websites were analyzed for access, content/purpose, and tone. Results: In all, 314 websites were included in the analysis. Most could be accessed without restriction. Sites accessed by self-harm/suicide search terms were mostly positive or preventive in tone, whereas sites accessed by the term ways to kill yourself tended to have a negative tone. Information about self-harm methods was common with specific advice on how to self-harm in 15.8% of sites, encouragement of self-harm in 7.0%, and evocative images of self-harm/suicide in 20.7%. Advice on how to get help was given in 56.1% of sites. Conclusion: Websites relating to suicide or self-harm are easily accessed. Many sites are potentially helpful. However, a significant proportion of sites are potentially harmful through normalizing or encouraging self-harm. Enquiry regarding Internet use should be routinely included while assessing young people at risk.


Author(s):  
Hind Mohammed Abdul Jabbar Ali

Connecting to the  electronic information network (internet) became the most characteristic that distinguish this era However , the long hours which young men daily spend on the internet On the other hand ,there are many people who are waiting for the chance to talk and convince them with their views This will lead the young people to be part in the project of the “cyber armies “that involved with states and terrorist organizations  This project has been able  to recruitment hundreds of people every day to work in its rank . It is very difficult to control these websites because we can see the terrorist presence in all its forms in the internet   In addition there are many incubation environments that feed in particular the young people minds                                                                                         Because they are suffering from the lack of social justice Also the unemployment, deprivation , social and political repression So , that terrorist organizations can attract young people through the internet by convincing them to their views and ideas . So these organizations will enable to be more  stronger.


Mousaion ◽  
2016 ◽  
Vol 34 (1) ◽  
pp. 83-100
Author(s):  
Solomon Bopape

The study of law focuses, among other aspects, on important issues relating to equality, fairness and justice in as far as free access to information and knowledgeis concerned. The launching of the Open Access to Law Movement in 1992, the promulgation of the Durham Statement on Open Access to Legal Scholarshipin 2009, and the formation of national and regional Legal Information Institutes (LIIs) should serve as an indication of how well the legal world is committed to freely publishing and distributing legal information and knowledge through the Internet to legal practitioners, legal scholars and the public at large aroundthe world. In order to establish the amount of legal scholarly content which is accessible through open access publishing innovations and initiatives, this studyanalysed the contents of websites for selected open access resources on the Internet internationally and in South Africa. The results of the study showed that there has been a steady developing trend towards the adoption of open access for legal scholarly literature internationally, while in South Africa legal scholarly literature is under the control of commercial publishers. This should be an issue for the legal scholarship which, among its focus, is to impart knowledge about the right of access to information and knowledge.


2020 ◽  
pp. 12-24
Author(s):  
O. Ya. Gelikh ◽  
A. N. Levitskaya ◽  
N. N. Pokrovskaia

A sociological analysis of the factors of integration of young generations into active economic life is based on a study of the values of young people in relation to employment and professional growth. The information society has two key parameters that influence the construction of the trajectory of educational, professional, labor or entrepreneurial activity — the significant role of knowledge in creating value and the digital space as a source of information and the place for individuals to fulfill themselves in society and the social and professional community. A theoretical analysis of labor socialization allows researchers to move on to the results of empirical studies carried out with the participation of authors in 2017 and 2019-2020. The data obtained are evaluative in nature and allow authors to draw conclusions about the influence of the media space on young people entering working age taking decisions on choosing a profession and a form of economic activity, planning employment and career growth.


Author(s):  
Дмитрий Викторович Кияйкин ◽  
Екатерина Андреевна Дворецкая

В статье раскрываются особенности сущностного понимания религиозного экстремизма и организационно-правовой профилактики данного явления. Обращено внимание на важность профилактической работы в рамках предупреждения антиобщественного (девиантного) поведения. Авторами рассматриваются причины и условия формирования религиозного экстремизма и наполнения им сети Интернет. Интернет-сообщество сталкивается с массовой информационной угрозой со стороны экстремистских организаций. Это связано с катастрофически быстрым распространением радикальных идеологий, всеобщей компьютеризацией и информатизацией общественных процессов, что облегчает процесс распространения материалов, носящих экстремистский характер. Религиозный экстремизм является источником вооруженных конфликтов во всем мире. Жертвами этого страшного явления, как правило, являются дети, подростки, молодые люди, кого легко заманить в сети идеологического обмана. Религиозный экстремизм опасен не только разрушением социальных объектов и ценностей, убийствами, террором. Гораздо опаснее сама идеология экстремизма, которая искажает мировоззрение и психику человека. В этих условиях эффективным является проведение профилактических мероприятий с молодым поколением, доведение до людей важности вопроса, осуществление контроля за неблагополучными семьями, обучение молодых лиц толерантности и уважению к окружающим людям. В работе определены направления работы правоохранительных органов по вопросу совершенствования механизма противодействия распространению экстремистской информации. Определена важность международного сотрудничества. The article reveals the features of the essential understanding of religious extremism and organizational and legal prevention of this phenomenon. Attention is drawn to the importance of preventive work as part of the prevention of antisocial (deviant) behavior. The authors consider the reasons and conditions for the formation of religious extremism and the filling of the Internet. The online community is facing a massive information threat from extremist organizations. This is due to the catastrophically lightning-fast spread of radical ideologies, the general computerization and informatization of social processes, which facilitates the process of distributing materials of an extremist nature. Religious extremism is a source of armed conflict throughout the world. The victims of this terrible phenomenon, as a rule, are children, adolescents, young people and girls - whom it is easy to lure into networks of ideological deception. Religious extremism is dangerous not only the destruction of social objects and values, murders, terror. The ideology of extremism itself, which distorts the worldview and the human psyche, is much more dangerous. Religious extremism is a source of armed conflict throughout the world. The victims of this terrible phenomenon, as a rule, are children, adolescents, young people and girls - whom it is easy to lure into networks of ideological deception. Religious extremism is dangerous not only the destruction of social objects and values, murders, terror. The ideology of extremism itself, which distorts the worldview and the human psyche, is much more dangerous.


2020 ◽  
Vol 4 (1) ◽  
pp. 58-74
Author(s):  
Hannah Edlund

AbstractDrawing on and expanding previous graduate course research, this paper investigated and analyzed public libraries’ policies regarding patron use of legal, visual Internet pornography on public computers. Pornographic imagery that falls within legal boundaries is protected by the First Amendment. Incidents of, and library responses to, pornography viewing are not a new issue and have caused turmoil across the field of library and information science. In an attempt to understand the problem, the research question asks: how do public libraries respond to patrons viewing legal Internet pornography, while upholding First Amendment rights as well as the Children’s Internet Protection Act (CIPA) and other legal requirements? Libraries tread a fine line to protect First Amendment rights, respect community laws, and uphold CIPA. Research indicated that responding to Internet pornography use in public libraries is heavily dependent on individual, community and library values. Policies are more likely to prohibit patrons from accessing Internet pornography, and most libraries have at least some Internet filtering software restricting what content may be accessed on public use computers. However, evidence also suggests that regardless of policy or filters, library staff will at some point encounter a patron accessing Internet pornography.


Sign in / Sign up

Export Citation Format

Share Document