Internet Filtering in Schools: Protection or Censorship?

December 2010
Journal of Curriculum & Pedagogy;Winter2010, Vol. 7 Issue 2, p51
Academic Journal
The article looks at blocking or filtering internet content in schools and whether it could be considered as censorship or protection. It mentions several reasons against filtering including its being anti-educational, the damage it can cause to knowledge and blocking internet content that can block learning as well. It also notes that as filtering can prevent K-12 students from visiting questionable sites, they are also prevented from visiting good or clean or educational sites and remove ways for students to make ethical choices.


Related Articles

  • Development of a Support Tool for Introducing a Filtering Service into a Personal Computer. Homma, Yuta; Kawakami, Masatoshi; Sasaki, Ryoichi // International Proceedings of Economics Development & Research;2012, Vol. 27, p168 

    Not only PC users at businesses but also PC users at home are exposed to security threats. Elearning, which makes it possible to study anytime and anywhere, is an effective education method that can be used for information security education. To create scalable and flexible e-learning for such...

  • A Comparative Study: Efficient Multihop Broadcast Protocol and Receiver Initiated-Medium Access Control Protocol. Pramatha, S.; Sakthivel, N. K.; Subasree, S. // International Journal of Computer Science & Information Technolo;2014, Vol. 5 Issue 3, p4665 

    In this paper, we propose the comparison of an Efficient Multihop Broadcast Protocol for Asynchronous Duty-Cycled Wireless Sensor Networks (EMBA) and Receiver Initiated-Medium Access Control (RI-MAC) protocol. EMBA comprises two techniques for asynchronous mode broadcast of messages namely the...

  • New anti-censorship scheme could make it impossible to block individual sites.  // Biomedical Market Newsletter;8/12/2011, Vol. 21, p416 

    The article reports that the new approach that prevents Internet censorship can turn the entire web into a proxy server, in which a censoring government can have difficulties in blocking individual web sites.

  • Anti-Filtering Snapping Turtle. Bell, Mary Ann // MultiMedia & Internet@Schools;Mar/Apr2009, Vol. 16 Issue 2, p37 

    The author looks at some of the most common reasons that are used to support the overly restrictive filtering. She admits that she is not opposed to using filtering in K-12 schools. She explains why filters are keeping students safe. She emphasizes the need for educators to work up the chain of...

  • Zen and the Art of Internet Security. Hansen, Bradford // Air Conditioning Heating & Refrigeration News;11/27/2000, Vol. 211 Issue 13, p1 

    Recommends Internet and computer security practices in the United States. Establishment of a system to thwart hackers; Importance of choosing passwords which are harder to guess.

  • Securing Web services. Briggs, Barry // InfoWorld;6/17/2002, Vol. 24 Issue 24, p58 

    Focuses on Web services security. Factors to consider in exploiting the value of Web services; Sample of problems brought by Web services; Efforts of IBM, Microsoft and VeriSign.

  • Privacy on the Internet.  // Caribbean Business;12/31/1998, Vol. 26 Issue 52, p41 

    Provides tips on how to safeguard privacy on the Internet.

  • Notes on Internet privacy. Perl, H.W. // Caribbean Business;10/31/1996, Vol. 24 Issue 43, p11 

    Stresses the need for computer users using the Internet for electronic mail and other purposes to be wary of what security measures to take. Internet service providers' policies meant to protect customers' privacy; Categories of Internet security concerns; Usual method of securing electronic...

  • Net surfers: Risky corporate business.  // Communications News;Sep96, Vol. 33 Issue 9, p8 

    Reports on the findings of a survey on security policies concerning employees' use of the Internet and other online services. Restrictions on access and downloading of data; Recommendation for the upgrading of formal policies on employees' use of information and communications technologies.


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics