www.4teachers.org Tech-along

Read this story in Español.

Methods of Filtering
by Erica Schaapveld
 

In an age where Internet access is available in every public domain, educators are actively calling for a means by which to protect children from inappropriate material. In the past, Acceptable Use Policies (AUPs) served as the main method to monitor the sites children accessed. This honor system is now often enhanced by new filtering technology, blocking devices used to prevent children and youths from viewing sites that contain pornography, online bigotry (hate), cults, and weaponry. Filtering systems utilize databases, which store lists of acceptable sites, banned sites, or inappropriate words and terms. Access is denied to sites banned or containing inappropriate words.

Some Considerations

When you choose a filtering device, consider several questions before making a final decision:

  1. Can you customize the default lists to make it more suitable to your students' needs?
  2. Does the device block chatrooms and forums?
  3. Does the system prevent personal information from being included in e-mail messages?
  4. Is the device compatible with PCs or Macs?
  5. Are activity logs produced to monitor the user's activity?
  6. Could computer literate children hack into the configuration files or disable the filter?
  7. Is it age appropriate for the children using the computer?

Methods of Filtering

Three methods of filtering are software filters, Internet Service Provider filters, and hardware filters.


 

Software Filters

Filtering software is installed directly on your computer. Usually, this allows educators to make a list of words they consider to be unacceptable. When effective, these block any Web site addresses (URLs) containing the blocked terms. Most filtering software is customizable. Not only does the software block URLs, but some filtering software also prohibits the sending or receiving of e-mail messages containing these words. Two top filtering software programs are NetNanny, and We-Blocker. Some software is available as freeware, while other programs are shareware or are sold outright.

ISP Filters

Internet Service Providers (ISP) often offer filtering services. The perks of this type of filtering are that there is no installation of software on your computer. Therefore, you do not have to set up configuration files. A configuration file holds the parameters in which the software must work. These files are made because of the new software being installed. ISP filters offer added protection, because they are usually password protected. This enables one computer to have different levels of filtering depending on the preset information that is triggered by the user entering their password. Examples of ISP filter providers are AOL's Parental Controls and Prodigy's Cyber Patrol. Like software filters, some are offered for free while others have a subscription fee.

Hardware Filters

Hardware filters are gaining remarkable recognition due to their ability to monitor thousands of computers from one small device. Leslie Rullman, teacher and technical coordinator for the Wathena Schools in Kansas City, suggests the use of a device called ScreenDoor.

This image shows the internet, represented in a bubble to the left, going into the internet Router.  It then goes through the ScreenDoor and into three computers that represent a LAN.

This appliance is connected to their school network at the level of the Internet router. Notice in the above image that any requested URL must go through the ScreenDoor filtering system before it is shown to the user. ScreenDoor is managed by a software program on another single machine that is also connected to the same Local Area Network (LAN), which is a collection of computers connected by the same server. The ScreenDoor system is able to block and monitor access to all computers in the network, no matter what the platform. Every two weeks, the management software reminds the administrator to download an updated version of the blocking list. The management software allows an administrator to set different levels of blocking on a machine-by-machine basis, which is important when there are various labs with different age groups connecting to the same network.

 

 

Remember, when choosing a filtering device, carefully consider all the options and capabilities that each method offers. Find one that is completely suited to your students' needs.

 

Special thanks to Leslie Rullman, who has offered to serve as a resource on filtering for other educators.

Created by Erica Schaapveld, University of Kansas, Lawrence

techalong logo
 

 

 

 

 
Erica Schaapveld is a staff writer for www4teachers, located at University of Kansas in Lawrence, Kansas.
 
High Plains RTEC takes nominations and ideas for Tech-along. Send comments to the editor.
Tech-along © 2000, 2001 University of Kansas, High Plains Regional Technology in Education Consortium.

 

This page is Bobby Approved.