Calculating Error Rates for Filtering Software*
|
|
|
- Ashlynn Catherine McDowell
- 10 years ago
- Views:
Transcription
1 To Appear in Communications of the CACM, September 2004 Calculating Error Rates for Filtering Software* Paul J. Resnick, PhD School of Information, University of Michigan Derek L. Hansen School of Information, University of Michigan Caroline R. Richardson, MD Department of Family Medicine, University of Michigan Medical School VA Health Services Research and Development Service Corresponding Author: Paul J. Resnick School of Information The University of Michigan 314 West Hall Ann Arbor, MI Phone: Fax: *This research was supported under a contract with the Kaiser Family Foundation. Surveys in the U.S. have found that 95% of schools [4], 43% of public libraries [5], and 33% of teenagers parents [8] employ filtering software to block access to pornography and other inappropriate content. Many products are also now available to filter out spam . Filtering software, however, cannot perfectly discriminate between allowed and forbidden content, resulting in two types of errors. First, under-blocking occurs when content is not blocked that should be restricted. Second, over-blocking occurs when content is blocked that should not have been restricted. Steps can be taken to reduce the frequency of errors, and to reduce their costs (e.g., providing easy appeals processes and quick overrides and corrections) but some errors are inevitable.
2 Draft do not cite or distribute without contacting authors first Resnick et al 2 The frequency of errors is an empirical question of great importance. For, example, in 2000, the U.S. Congress passed the Child Internet Protection Act (CIPA) mandating that schools and libraries install content filtering software in order to be eligible for some forms of federal funding. A district court struck down the requirement for libraries on the grounds that it violates the First Amendment. Much of that court s finding of facts was devoted to analyses of error rates [1] and some of the arguments made on appeal to the U.S. Supreme Court also hinged on analyses of error rates. Most empirical studies of error rates have suffered from methodological flaws in sample selection, classification procedures, or implementation of blocking tests. Results have also been interpreted inappropriately, in part because there are two independent measures of over-blocking that are sometimes confused, and likewise for under-blocking. This paper presents a framework to guide the design and interpretation of evaluation studies. While the framework applies with only minor modifications to evaluation of spam filters, the examples and discussion here focus on pornography filters.
3 Draft do not cite or distribute without contacting authors first Resnick et al 3 Step 1: Create a Test Set of URLs Step 2a: Blocking Test (Would be Blocked?) Yes No Step 2b: Classification (Should be Blocked?) Yes No Correct Block Over-Block Under-Block Correct Non- Block Step 3: Calculate Over- and Under-Blocking II. A Framework for Testing Filtering Software The process of testing filter effectiveness is graphically outlined in Figure 1. A test set of items is generated. These items are classified to see whether they should be blocked and are tested to see whether they are actually blocked by filters. For each item, then, there are four possible outcomes: it may be correctly blocked, incorrectly blocked (which we refer to as an over-block), correctly not blocked, or incorrectly not blocked (which we refer to as an underblock). Finally, in step 3, the rates of over- and under-blocking are calculated. Step 1: Create a Test Set Figure 1: Summary of process for testing filter effectiveness The first major step in the process is to create a test set of web sites or other Internet content on which the filters performance will be judged. One approach is to collect a set of accessed items, as a way of evaluating filters impact on users. For example, for the CIPA case, Cory Finnell selected sites from the access logs of three public libraries proxy servers [1]. Simulations can also be conducted, to approximate what users might access. For example, for a
4 Draft do not cite or distribute without contacting authors first Resnick et al 4 study of filtering error rates on health information, we entered search strings on 24 health topics into six search engines and collected the first 40 results from each search [7]. A second approach is to collect a set of accessible items, as a way of evaluating filters impact on publishers. There is no good way to sample from all the available web pages (even search engines index only a fraction of pages that they encounter). Instead, some well-defined subset of Internet content must be chosen, such as the health listings from certain portal sites or all the web pages served by particular web servers. Test sets are only representative of the larger collection from which they were drawn. For different purposes it is appropriate to estimate error rates for different subsets. For example, even within the overall domain of health sites, our study found quite different error rates from searches on the terms condom and gay than for searches on depression and breast cancer [7]. The collection process should satisfy three properties. First, it should be objective and repeatable. Many studies have relied on tester judgment to select interesting or relevant items [2, 3, 10], possibly introducing bias. Second, the collection process should be independent of the filters to be tested. The sample used by Finnell reflected patrons access patterns when filters were installed, not what their access patterns would have been without filters. Third, large test sets should be assembled. Some studies have relied on small test sets. Others with large test sets covered so many categories of content that there was not enough statistical power to evaluate filters effectiveness for particular categories [2, 3, 10]. Step 2a: Blocking Test Each selected URL is tested against the various filters to see whether access to the site is blocked or not. This is best performed through automated processes that are able to quickly test a
5 Draft do not cite or distribute without contacting authors first Resnick et al 5 large number of URLs against the filters. Automated tests must take into account the possibility that sites may redirect browsers, through HTTP headers, HTML, or javascript code, to other sites. A Web browser would attempt to access the original URL and then the destination URL. Thus, in an automated test, a filter should also be tested against both URLs and the site should be considered blocked if either one is blocked. Vendors regularly update the contents of their blocking lists and rules. In order to maintain comparability between vendors, therefore, all products being compared should be updated just before the tests are run. In addition, all tests should be run simultaneously or nearly so, to allow for a fair comparison. If the test set reflects the results of simulated searches, the blocking tests should be conducted as soon as possible after the searches are run, so that the results reflect what would have been accessible to a user from the search. Product configuration choices can have a large impact on rates of over-blocking and under-blocking. For example, nearly all products offer a variety of settings or categories that can be chosen. These categories range from pornography to gambling to hobbies and rarely match up perfectly across products, making comparisons across products difficult. Calls to 20 school systems and libraries confirmed wide variability in their configurations and that none was using a vendor's default setting [7]. Thus, tests should be run against a range of configurations. Step 2b: Classification of Sites Each URL in the test set is classified to determine whether it should have been blocked or not. The definition of what should be blocked will depend on the purpose of the test. For example, in order to test the over- and under-blocking of pornographic material it would be necessary to classify each site as containing or not containing pornographic material. In order to test whether filtering software implements the CIPA standard, or the legal definition of
6 Draft do not cite or distribute without contacting authors first Resnick et al 6 obscenity, sites would have to be classified according to those criteria. And if the goal were simply to test whether filtering software correctly implements the vendor s advertised classification criteria, the sites would be independently classified according to those criteria. Ideally, the classification process should satisfy three properties [6]. First, it should have face validity, meaning that there is an obvious connection to the underlying definition of what should be blocked. Second, the procedure should be reliable, meaning that the process is sufficiently documented to be repeatable and that multiple ratings of items would be in substantial agreement. Third, there should be construct and criterion validity, meaning that the classifications should be in substantial agreement with those produced by other processes that have reliability and face validity. Because site content can change over time, sites should ideally be classified according to their state at the time that the blocking tests were run. By caching the contents of sites as of the time blocking tests are run, it is acceptable to delay the actual classification. This also allows the cache to be made public, so that others can scrutinize the classification decisions made by the raters in the study or classify the sites independently according to different criteria. Step 3: Over- and Under-Blocking Reporting For any product configuration and set of URLs tested, there are four results from the testing and classification, as shown in the top part of Figure 2: (a) the number of correct blocks, (b) the number of under-blocks, (c) the number of over-blocks, and (d) the number of correct non-blocks. For brevity, we will refer to sites as bad if they should be blocked and as OK if they should not be blocked according to the classification that was done: no value judgment is intended.
7 Draft do not cite or distribute without contacting authors first Resnick et al 7 Figure 2: Calculating error rates Blocked Unblocked Bad a b OK c d Over-blocking errors OK-sites overblock rate (1-specificity): Blocked-sites overblock rate (1-precision or 1- pos. pred. value): Under-blocking errors Bad-sites underblock rate (1-recall or 1-sensitivity): Unblocked-sites underblock rate (1- neg. pred. value): c d + c c a + c b a + b b d + b Two-by-two outcome tables arise when evaluating all sorts of binary decisions, from radar operators detecting the presence or absence of enemies to medical diagnostic tests to information retrieval techniques that select documents from a large corpus. The most useful summaries of filtering test outcomes describe under-blocking and over-blocking error rates (i.e., percents). There are two natural ways to calculate each error rate, each providing different information. Figure 2 summarizes how to calculate the error rates and their relation to measures usually reported in information science and medical research. Consider, first, the amount of over-blocking. One measure, which we call the OK-sites overblock rate, is the fraction of acceptable sites that are blocked. This measure is related to what medical researchers would call the specificity of a diagnostic test. It is useful in answering the question of how frequently a user who is trying to access OK (e.g., non-porn) sites will be
8 Draft do not cite or distribute without contacting authors first Resnick et al 8 blocked. This is the number that a school or library or parent should consider when deciding whether a filter is overly broad in restricting access to information that should be available. This error rate could also be relevant to a U.S. court performing an intermediate scrutiny or reasonableness analysis. To be reasonable, restrictions must not interfere substantially with the legitimate uses of a forum. One interpretation is that over-blocks must be few in relation to correct non-blocks of OK sites: in other words, the OK-sites overblock rate must be low. A second measure of over-blocking, which we call the blocked-sites overblock rate, is the fraction of all blocked sites that are OK (e.g., not porn). This measure is related to what information scientists would call precision and medical researchers would call positive predictive value. It might be useful to a school or library or parent when deciding whether to monitor for blocks as evidence of violation of acceptable use policies. For example, if a high proportion of blocked sites are in fact OK, then the mere fact that a user tries to access a blocked site would not be a reason to suspect that user of trying to access pornography. This error rate could also be relevant to a U.S. court performing a strict scrutiny analysis. To satisfy strict scrutiny, restrictions must be narrowly tailored to meeting a compelling government interest. One interpretation is that over-blocks must be few in relation to correct blocks of bad sites: in other words, the blocked-sites overblock rate must be low. Note that the two measures of over-blocking are independent, as illustrated in Tables 1 and 2, which give results from hypothetical tests of two filters, on the same set of sites. In both tables, the fictitious filters have a blocked-sites overblock rate of 50%: they are equally imprecise. They differ in the OK-sites overblock rate, however. In Table 1, 99% of the OK sites are blocked but in Table 2 only 1% are blocked.
9 Draft do not cite or distribute without contacting authors first Resnick et al 9 Table 1 Blocked Unblocked Bad 99 1 OK 99 1 Table 2 Blocked Unblocked Bad 1 99 OK 1 99 Table 3 Blocked Unblocked Bad 99 1 OK 1 99 Table 4 Blocked Unblocked Bad 99 1 OK Any estimate of the blocked-sites overblock rate is sensitive to the prevalence of OK sites in the test set. Table 4 differs from Table 3 only in having a higher concentration of OK sites. The error rates of the filter on bad and OK sites are both 1% in both tables. The blocked-site overblock rate, however, goes from 1% to 50%. Consider, for example, Edelman s selection of 6,777 blocked sites as presented in the CIPA case [1]. Janes classification process, as also reported in the court s decision, estimated that about two-thirds of those were over-blocks. But since the sampling process drew from a set deliberately designed to have a very high concentration of OK items, it should be expected that a large percentage of the blocked items would also be OK. An even more fundamental problem occurred in studies presented by Hunter [1] and Lemmons [1, 10] that employed separate samples of OK and bad sites. Any estimate of the blocked-site overblock rate from such tests is arbitrary: selecting a larger or smaller sample of OK sites, while holding everything else constant, would yield different estimates of the blocked-site overblock rate. If a study selects only blocked items for a test set, it cannot calculate the OK-sites overblock rate. To do that, one would need additional information about the proportion of
10 Draft do not cite or distribute without contact authors first Resnick et al 10 blocked to unblocked sites and the proportion of unblocked sites that were OK. For example, Edelman tested more than 500,000 URLs in order to select the 6,777 blocked items. If, as seems likely, the vast majority of the 500,000+ unblocked sites were acceptable, then the OK-sites overblock rate may have been under 1%. However, one can not be sure since the study was designed only to identify blocking errors, not their frequency among all OK sites. Now consider the rate of under-blocking. One measure, which we call the bad-sites underblock rate, is the percentage of all unacceptable sites that were not blocked. This measure is related to recall in information science and sensitivity in medical research. It is the number that a school or library or parent or judge should consider when deciding whether blocking software is effective at preventing children from accessing pornography or other undesirable materials. Another measure, the unblocked sites underblock rate, is the percentage of all unblocked sites that should have been blocked. This measure could be useful in determining whether an honor code is needed in addition to any installation of filters. For example, if this error rate is high, then the fact that a site was not blocked does not necessarily mean that it is nonpornographic, and it might be necessary to inform students that they are still responsible for not visiting porn sites even if the filters do not block their access. Again, the two measures of the under-blocking rate are independent: one may be high without the other being high. In Tables 1 and 2, the unblocked sites underblock rates are both 50%, but the bad-sites underblock rates are 1% and 99% respectively. III. Conclusion There have been numerous studies that report the over- and under-blocking rates of filtering software products. The methodology of such studies has improved substantially in recent years, but significant concerns still remain. Figure 3 summarizes desirable methods.
11 Draft do not cite or distribute without contact authors first Resnick et al 11 There is no easy answer to the question of how to best protect children from inappropriate material on the Internet [9], or even whether any protection is needed. Certainly filtering software is not a silver bullet. There are other approaches available, including student education, privacy screens, honor codes, and adult monitoring. However, the amount of attention and public concern about whether filters are helpful or harmful suggests an ongoing need for careful empirical investigation. Objective and methodologically sound research must inform the debate. Values, however, will still have the final word. How much over-blocking or underblocking is too much? When we reported finding of error rates in blocking health information [7], few questioned our methods or findings, but both supporters and opponents of filtering claimed that the results supported their positions. People simply differ in their assessments of the benefits of blocking bad sites and the costs of blocking OK sites. Methodologically sound research is needed to redirect attention away from meaningless debates comparing misleading study results toward meaningful debates about values.
12 Draft do not cite or distribute without contact authors first Resnick et al 12 Figure 3. Methodology Checklist Test Set Selection Objective and repeatable process Independent of filters Large enough set to give statistical power Blocking Test Redirects handled properly Updated blocking lists Multiple configurations tested Classification Face validity Reliability Criteria documented sufficiently to allow repetition Inter-rater reliability reported Construct and criterion validity Sites cached at time of blocking tests Error Rate Reporting OK-site overblock rate Blocked-site overblock rate Bad-site underblock rate Unblocked-site underblock rate
13 Draft do not cite or distribute without contact authors first Resnick et al 13 References 1. American Library Association, Inc., v. United States. 2002, E.D. PA. 2. Brunessaux, S., O. Isidoro, S. Kahl, G. Ferlias, and A.L.R. Soares, Report on Currently Available COTS Filtering Tools. 2001, MATRA Systemes & Information; Matra Global Netservices; Sail Labs; Hypertech; Red Educativa. Available online at 3. Greenfield, P., P. Rickwood, and H.C. Tran, Effectiveness of Internet Filtering Software Products. 2001, CSIRO Mathematical and Information Sciences. Available online at 4. Kleiner, A. and L. Lewis, Internet Access in U.S. Public Schools and Classrooms: , U. S. Department of Education, National Center for Education Statistics: Washington, DC. NCES Available online at 5. Oder, N., The New Wariness. Library Journal, (1): p Pedhazur, E.J. and L.P. Schmelkin, Measurement, Design, and Analysis : an Integrated Approach. 1991, Hillsdale, NJ: Lawrence Erlbaum and Associates Richardson, C., P. Resnick, D. Hansen, and V. Rideout, Does Pornography-Blocking Software Block Access to Health Information on the Internet? Journal of the American Medical Association, (22). 8. Rideout, V., Generation Rx.com: How Young People Use the Internet for Health Information. 2001, Henry J. Kaiser Family Foundation: Menlo Park, California. 9. Thornburgh, R. and H. Lin, eds. Youth, Pornography, and the Internet. 2002, National Academy Press: Washington, DC. 10. U.S Department of Justice, Web Content Filtering Software Comparison. 2001, etesting Labs: Morrisville, NC. Available online at
Minors First Amendment Rights:
FEATURE All materials in this journal subject to copyright by the American Library Association Minors First Amendment Rights: CIPA ANd School libraries 16 Knowledge Quest Intellectual Freedom Online Volume
Internet Filtering Today in the Schools: The Debate Continues. Barry D. Thibault. University Of West Georgia
Internet Filtering 1 Running Head: Internet Filtering Today in the Schools Internet Filtering Today in the Schools: The Debate Continues Barry D. Thibault University Of West Georgia Internet Filtering
IN THE UNITED STATES DISTRICT COURT EASTERN DISTRICT OF MISSOURI EASTERN DIVISION ) ) ) ) ) ) ) ) ) ) ) ) ) ) ) ) ) ) COMPLAINT
IN THE UNITED STATES DISTRICT COURT EASTERN DISTRICT OF MISSOURI EASTERN DIVISION ANAKA HUNTER, Plaintiff, v. CITY OF SALEM, MISSOURI, a municipality and political subdivision of the State of Missouri,
Consumer s Guide to Research on STEM Education. March 2012. Iris R. Weiss
Consumer s Guide to Research on STEM Education March 2012 Iris R. Weiss Consumer s Guide to Research on STEM Education was prepared with support from the National Science Foundation under grant number
MEMORANDUM. surrounding Internet filtering by libraries. Several libraries have been sued recently on the
MEMORANDUM TO: FROM: Barbara Jones Deborah Caldwell-Stone Freedom to Read Foundation Theresa Chmara General Counsel DATE: July, 2012 SUBJECT: Library Internet Filtering Update The Freedom to Read Foundation
Manage Workflows. Workflows and Workflow Actions
On the Workflows tab of the Cisco Finesse administration console, you can create and manage workflows and workflow actions. Workflows and Workflow Actions, page 1 Add Browser Pop Workflow Action, page
Forrestville Valley School District #221
Forrestville Valley School District #221 Student Acknowledgment of Receipt of Administrative Procedures for Acceptable Use of the Electronic Network 2015-2016 All use of electronic networks shall be consistent
The Effectiveness of Internet Content Filters
The Effectiveness of Internet Content Filters Philip B. Stark Department of Statistics University of California, Berkeley November 10, 2007 Abstract. As part of its defense of the Child Online Protection
User Guide. You will be presented with a login screen which will ask you for your username and password.
User Guide Overview SurfProtect is a real-time web-site filtering system designed to adapt to your particular needs. The main advantage with SurfProtect over many rivals is its unique architecture that
Director Test Research: David Walkiewicz
7th August 2015 created by Markus Selinger Test: Parental control software for Windows and Mac OS X Those who don't want their children to be exposed to early unattended lessons in the birds and the bees
Load testing with. WAPT Cloud. Quick Start Guide
Load testing with WAPT Cloud Quick Start Guide This document describes step by step how to create a simple typical test for a web application, execute it and interpret the results. 2007-2015 SoftLogica
Quarantined Messages 5 What are quarantined messages? 5 What username and password do I use to access my quarantined messages? 5
Contents Paul Bunyan Net Email Filter 1 What is the Paul Bunyan Net Email Filter? 1 How do I get to the Email Filter? 1 How do I release a message from the Email Filter? 1 How do I delete messages listed
COMPUTER /ONLINE SERVICES (Acceptable Use and Internet Safety)
COMPUTER /ONLINE SERVICES (Acceptable Use and Internet Safety) The Middletown City School District provides an electronic communications network that allows District-authorized individuals internal access
Computer, Network, Internet and Web Page Acceptable Use Policy for the Students of the Springfield Public Schools
Computer, Network, Internet and Web Page Acceptable Use Policy for the Students of the The computer and information technology resources, which includes World Wide Web access and electronic mail capability,
MARIN COUNTY OFFICE OF EDUCATION. EDUCATIONAL INTERNET ACCOUNT Acceptable Use Agreement TERMS AND CONDITIONS
MARIN COUNTY OFFICE OF EDUCATION EDUCATIONAL INTERNET ACCOUNT Acceptable Use Agreement TERMS AND CONDITIONS Please read the following carefully before signing this document. INTERNET access is coordinated
Fee Waivers INTRODUCTION CONTENTS FEES: THE RATIONALE
Number 2 Revised March 2009 Fee Waivers CONTENTS Introduction 1 Fees: the rationale 1 How the Act and Regulation apply to fees and fee waivers Assessment of fees 2 Fees for personal information 2 Payment
PLATO Learning Environment System and Configuration Requirements. for workstations. April 14, 2008
PLATO Learning Environment System and Configuration Requirements Version 1.1 (for use with Academic Systems Algebra only) for workstations April 14, 2008 Windows 2000 Professional with SP4 Windows XP Professional
Comparing Methods to Identify Defect Reports in a Change Management Database
Comparing Methods to Identify Defect Reports in a Change Management Database Elaine J. Weyuker, Thomas J. Ostrand AT&T Labs - Research 180 Park Avenue Florham Park, NJ 07932 (weyuker,ostrand)@research.att.com
E-MAIL FILTERING FAQ
V8.3 E-MAIL FILTERING FAQ COLTON.COM Why? Why are we switching from Postini? The Postini product and service was acquired by Google in 2007. In 2011 Google announced it would discontinue Postini. Replacement:
Code of Virginia, 1950, as amended, Sections 18.2 372, 18.2 374.1:1, 18.2 390, 22.1 70.2, and 22.1 78
Book Section Title Number Status SCS Policy Manual I INSTRUCTION Acceptable Use of Electronic Network Resources and Internet Safety IIBEA * R Active Legal 18 U.S.C. Sections 1460 and 2256 47 U.S.C. Section
The enemy within: Stop students from bypassing your defenses
The enemy within: Stop students from bypassing your defenses Computer literate K-12 students regularly use anonymizing proxies to bypass their school s web filters to access pornography, social networking,
Embedded Network Solutions Australia Pty Ltd (ENSA) INTERNET ACCEPTABLE USE POLICY
T: 1300 00 ENSA (3672) F: 03 9421 6109 (ENSA) INTERNET ACCEPTABLE USE POLICY 1 ABOUT THIS POLICY... 2 2 GENERAL... 2 3 ILLEGAL ACTIVITY... 2 4 SECURITY... 2 5 RISKS OF THE INTERNET... 3 6 CONTENT PUBLISHING...
TIPS DATA QUALITY STANDARDS ABOUT TIPS
2009, NUMBER 12 2 ND EDITION PERFORMANCE MONITORING & EVALUATION TIPS DATA QUALITY STANDARDS ABOUT TIPS These TIPS provide practical advice and suggestions to USAID managers on issues related to performance
Literature Review and Analysis: Internet Filters and Intellectual Freedom. Danielle Cunniff Plumer. The University of Texas at Austin
Literature Review and Analysis: Internet Filters and Intellectual Freedom Danielle Cunniff Plumer The University of Texas at Austin Graduate School of Library and Information Science LIS 384K.16: Creation
DEPLOYMENT GUIDE Version 1.2. Deploying the BIG-IP System v10 with Microsoft IIS 7.0 and 7.5
DEPLOYMENT GUIDE Version 1.2 Deploying the BIG-IP System v10 with Microsoft IIS 7.0 and 7.5 Table of Contents Table of Contents Deploying the BIG-IP system v10 with Microsoft IIS Prerequisites and configuration
Marion County School District Computer Acceptable Use Policy
Marion County School District Computer Acceptable Use Policy The Marion County School District (MCSD) offers currently enrolled students, faculty and staff access to the school computer network through
Technology Department 1350 Main Street Cambria, CA 93428
Technology Department 1350 Main Street Cambria, CA 93428 Technology Acceptable Use and Security Policy The Technology Acceptable Use and Security Policy ( policy ) applies to all CUSD employees and any
WESTLINK MASS MARKET INTERNET SERVICE POLICIES AND CUSTOMER INFORMATION
WESTLINK MASS MARKET INTERNET SERVICE POLICIES AND CUSTOMER INFORMATION The following policies apply to mass market mobile broadband Internet services offered by WestLink. It is WestLink s policy to provide
STAFF RESPONSE TO 10124/07 RULES AND OPEN GOVERNMENT COMMITTEE REFERRAL RELATING TO INTERNET FILTERING AND COMPUTER USE AT SAN JOSE PUBLIC LIBRARIES
RULES COMMITTEE: 11-14-07 ITEM: G1b CITYOF ~- SAN]OSE- CAPITAL OF SILICON VALLEY TO: RULES AND OPEN GOVERN MENT COMMITTEE SUBJECT: SEE BEbOW Memorandum FROM: Jane Light DATE: November-7;2007 Approved I
Executive Summary. Summary - 1
Executive Summary For as long as human beings have deceived one another, people have tried to develop techniques for detecting deception and finding truth. Lie detection took on aspects of modern science
Closed Environment Testing of ISP Level Internet Content Filters. Report to the Minister for Broadband, Communications and the Digital Economy
Closed Environment Testing of ISP Level Internet Content Filters Report to the Minister for Broadband, Communications and the Digital Economy June 2008 Commonwealth of Australia 2008 This work is copyright.
COMPUTER TECHNOLOGY ACCEPTABLE USE & INTERNET SAFETY
FILE: IIBG-PC COMPUTER TECHNOLOGY ACCEPTABLE USE & INTERNET SAFETY PITTSYLVANIA COUNTY SCHOOLS recognizes the importance of computer technology in providing a relevant and appropriate education. Our goal
How To Test Your Web Site On Wapt On A Pc Or Mac Or Mac (Or Mac) On A Mac Or Ipad Or Ipa (Or Ipa) On Pc Or Ipam (Or Pc Or Pc) On An Ip
Load testing with WAPT: Quick Start Guide This document describes step by step how to create a simple typical test for a web application, execute it and interpret the results. A brief insight is provided
FAYETTEVILLE (AR) PUBLIC SCHOOLS COMPUTER/NETWORK USE POLICY
FAYETTEVILLE (AR) PUBLIC SCHOOLS COMPUTER/NETWORK USE POLICY The Fayetteville Board of Education recognizes the need to effectively use digital technology to further enhance the educational goals of the
How To Protect A Web Application From Attack From A Trusted Environment
Standard: Version: Date: Requirement: Author: PCI Data Security Standard (PCI DSS) 1.2 October 2008 6.6 PCI Security Standards Council Information Supplement: Application Reviews and Web Application Firewalls
The Hidden Truth About Search Behavior
The Effectiveness of Internet Content Filters Philip B. Stark Department of Statistics University of California, Berkeley Distinguished Lecture Center for Security, Reliability, and Trust University of
Using TestLogServer for Web Security Troubleshooting
Using TestLogServer for Web Security Troubleshooting Topic 50330 TestLogServer Web Security Solutions Version 7.7, Updated 19-Sept- 2013 A command-line utility called TestLogServer is included as part
More Details About Your Spam Digest & Dashboard
TABLE OF CONTENTS The Spam Digest What is the Spam Digest? What do I do with the Spam Digest? How do I view a message listed in the Spam Digest list? How do I release a message from the Spam Digest? How
ASAV Configuration Advanced Spam Filtering
ASAV Configuration Advanced Spam Filtering Step 1: Login to http://asav.mediaring.sg/ using the login credentials supplied in the Spam, Virus (ASAV) activation email. Step 2: Configuring Protection Level
Defendant brought a Motion to Suppress the DNA Testing Results or in the alternative,
STATE OF MINNESOTA COUNTY OF HENNEPIN COUNTY ` DISTRICT COURT FOURTH JUDICIAL DISTRICT STATE OF MINNESOTA, Plaintiff, vs. JIMMIE DALE JACKSON, File No: 04085182 ORDER AND MEMORANDUM OF LAW Defendant. Defendant
BOARD OF EDUCATION Cherry Hill, New Jersey
BOARD OF EDUCATION Cherry Hill, New Jersey POLICY 6142.12 ACCEPTABLE USE OF TECHNOLOGY Introduction The Board of Education encourages the use of technology in the classroom as an educational tool and to
From: John Morris, Greg Nojeim & Erica Newland Center for Democracy & Technology. Re: Data Retention Mandate in H.R. 1981
MEMORANDUM To: Interested Persons From: John Morris, Greg Nojeim & Erica Newland Center for Democracy & Technology Re: Data Retention Mandate in H.R. 1981 Date: July 19, 2011 As detailed below, the Center
DEPLOYMENT GUIDE Version 1.2. Deploying the BIG-IP System v9.x with Microsoft IIS 7.0 and 7.5
DEPLOYMENT GUIDE Version 1.2 Deploying the BIG-IP System v9.x with Microsoft IIS 7.0 and 7.5 Deploying F5 with Microsoft IIS 7.0 and 7.5 F5's BIG-IP system can increase the existing benefits of deploying
Search Engine Optimization Glossary
Search Engine Optimization Glossary A ALT Text/Tag or Attribute: A description of an image in your site's HTML. Unlike humans, search engines read only the ALT text of images, not the images themselves.
DEPLOYMENT GUIDE Version 2.1. Deploying F5 with Microsoft SharePoint 2010
DEPLOYMENT GUIDE Version 2.1 Deploying F5 with Microsoft SharePoint 2010 Table of Contents Table of Contents Introducing the F5 Deployment Guide for Microsoft SharePoint 2010 Prerequisites and configuration
NineStar Connect MASS MARKET INTERNET SERVICE POLICIES AND CUSTOMER INFORMATION. Policy Statement:
Policy Statement: NineStar Connect MASS MARKET INTERNET SERVICE POLICIES AND CUSTOMER INFORMATION The following policies apply to mass market broadband Internet services offered by NineStar Connect. NineStar
Revised: 6-04, 8-09, 1-12 REGULATION #5420
Adopted: 9-03 PORTAGE PUBLIC SCHOOLS Revised: 6-04, 8-09, 1-12 REGULATION #5420 SUBJECT: Electronic Communications, Internet Safety & Acceptable Use Agreement All PPS electronic information resources are
Geyserville New Tech Academy Student Technology Acceptable Use Policy
Geyserville New Tech Academy Student Technology Acceptable Use Policy Overview. The (GUSD) makes a variety of communications and information technologies available to students through computer/network/internet
Page 1 of 5. How to unblock automatic picture downloads in e-mail messages you receive
Page 1 of 5 How to unblock automatic picture downloads in e-mail messages you receive Page 2 of 5 Block or unblock automatic picture downloads in e-mail messages To help protect you from junk e-mail senders,
MOBICIP NAME. Mobicip. Company. Version 1.3.0.12. Client. Type of product. Computer. Devices supported. Linux Ubuntu Windows 7 (Tested on Windows)
NAME MOBICIP Company Mobicip Version 1.3.0.12 Type of product Devices supported Operating systems Client Computer Linux Ubuntu Windows 7 (Tested on Windows) Price* 1 year - 1 license: 7,75 Language of
PLATO Learning Environment 2.0 System and Configuration Requirements. Dec 1, 2009
PLATO Learning Environment 2.0 System and Configuration Requirements Dec 1, 2009 Table of Contents About this document... 3 Document Change Log... 4 System & Configuration Requirements... 5 Workstation
Children s Internet Protection Plan. IIBGA Children s Internet Protection Plan (CIPA) Plan. Children s Internet Protection Act (CIPA) Safety Plan
IIBGA Children s Internet Protection Plan (CIPA) Plan IIBGA Children s Internet Protection Act (CIPA) Safety Plan [Revise and edit as necessary to fit USD goals and include in Handbook] Goals: It is the
DCPS STUDENT SAFETY AND USE POLICY FOR INTERNET AND TECHNOLOGY
DCPS STUDENT SAFETY AND USE POLICY FOR INTERNET AND TECHNOLOGY Purpose: 1) To establish standards for the acceptable uses of internet and electronic mail (email) services within the computer network maintained
PLATO Learning Environment System and Configuration Requirements for workstations. October 27th, 2008
PLATO Learning Environment System and Configuration Requirements for workstations October 27th, 2008 Windows 2000 Professional with SP4 Windows XP Professional with SP2 Windows XP Home Edition with SP2
PROOFPOINT - EMAIL SPAM FILTER
416 Morrill Hall of Agriculture Hall Michigan State University 517-355-3776 http://support.anr.msu.edu [email protected] PROOFPOINT - EMAIL SPAM FILTER Contents PROOFPOINT - EMAIL SPAM FILTER... 1 INTRODUCTION...
Terms and Definitions for CMS Administrators, Architects, and Developers
Sitecore CMS 6 Glossary Rev. 081028 Sitecore CMS 6 Glossary Terms and Definitions for CMS Administrators, Architects, and Developers Table of Contents Chapter 1 Introduction... 3 1.1 Glossary... 4 Page
Addressing Mobile Load Testing Challenges. A Neotys White Paper
Addressing Mobile Load Testing Challenges A Neotys White Paper Contents Introduction... 3 Mobile load testing basics... 3 Recording mobile load testing scenarios... 4 Recording tests for native apps...
Acceptable Use of Information Technology
Acceptable Use of Information Technology No.: 3501 Category: Information Technology Services Approving Body: Leadership Team Executive Division: Learning and Technology Services Department Responsible:
Click a topic in the Table of Contents to jump to a topic and use Ctrl + Home to return to this page.
Table of Contents Click a topic in the Table of Contents to jump to a topic and use Ctrl + Home to return to this page. RECRUITING WORKFLOW... 1 CREATE JOB OPENING... 2 TEMPORARY JOB OPENING... 2 POSITION
TRACKING TRENDS IN HEALTH SYSTEM PERFORMANCE
TRACKING TRENDS IN HEALTH SYSTEM PERFORMANCE SEPTEMBER 2013 IN STATES HANDS How the Decision to Expand Medicaid Will Affect the Most Financially Vulnerable Americans Findings from the Commonwealth Fund
Blue Coat Security First Steps Solution for Deploying an Explicit Proxy
Blue Coat Security First Steps Solution for Deploying an Explicit Proxy SGOS 6.5 Third Party Copyright Notices 2014 Blue Coat Systems, Inc. All rights reserved. BLUE COAT, PROXYSG, PACKETSHAPER, CACHEFLOW,
So today we shall continue our discussion on the search engines and web crawlers. (Refer Slide Time: 01:02)
Internet Technology Prof. Indranil Sengupta Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur Lecture No #39 Search Engines and Web Crawler :: Part 2 So today we
Taking the First Steps in. Web Load Testing. Telerik
Taking the First Steps in Web Load Testing Telerik An Introduction Software load testing is generally understood to consist of exercising an application with multiple users to determine its behavior characteristics.
Usability Heuristics for the Web. 1. Visibility of system status
Page 1 sur 5 Register Domains[.com.net.org] for only $14.99 at Bluegenesis.com! Usability Related Articles Find Search List Departments List Topics Web Tools Guide Buy Software at the Web Tools Store Search
The District Court suppressed the evidence. The Missouri appellate court agreed. The U.S. Supreme Court agreed the evidence should be suppressed.
MEMO DATE: April 18, 2013 FROM: J.H.B. Wilson, General Counsel RE: McNeely v. Missouri (SCOTUS, 2013) This decision was released April 17, 2013. An abridged version of the Court s Syllabus can be found
