Downloads on Peer-To- Peer Networks Contain Pornography
Total Page:16
File Type:pdf, Size:1020Kb
Chapter 1 Introduction 1.1 Background to research problem Pornography in Western universities is common, especially in North America where student newspapers and magazines dealing with sexual expression and sexuality can be found. Two examples are the Boink Magazine at Boston University and the H-Bomb at Harvard University (Chheuy 2004). Some US universities, such as New York University, UMass Amherst, Penn State, Vanderbilt, North Western, San Francisco State, UCLA, UC Berkley, UC Santa Barbra and Arizona State University, offer pornography courses as a possible career opportunity (Cullen 2006). The University of Johannesburg (UJ) is a newly formed university comprising of three previous institutions: Rand Afrikaans University, Technikon Witwatersrand and Vista University’s Soweto and East Rand campuses. The challenge for successful integration is the development of new policies to meet the needs of the new organisation’s stakeholders. At present there is no formal UJ Acceptable Use Policy (AUP), which is the basis on which staff and students are required to conduct their behaviour in the online environment. Currently UJ employs different content filtering software at the different campuses to regulate and manage access to unwanted content in the online environment. The Bunting Rd and Doornfontein campuses use a product called Dans Guardian and on the East Rand, Kingsway and Soweto campuses, Squid Guard is used. The problem with the use of the two different content filters is that there is no consistency in terms of what content access is granted to. This creates a problem, as UJ is unable to block access to pornography consistently at all the campuses. The AUP, together with content filtering, creates a comprehensive approach to preventing access to online pornography. Students at UJ have actively voiced their concern as to what is being done to prevent access to pornography through the Auckland Park Campus Beeld (newspaper). Often unsupported claims are made as to the state of the problem. UJ needs to address the concerns of the students through the development of a well structured, comprehensive AUP and accurate content filtering for all the campuses. 1 1.2 Rationale and benefits to be derived from the study The underlying purpose of the study is to test the effectiveness of current online content filters and AUP at UJ. From the research data gathered, recommendations will be made for the creation of a comprehensive approach to managing access to pornography in an online environment. This approach should ideally consist of two components, an active and passive approach. The active approach typically consists of a mechanism (content filtering solution) that physically restricts users from viewing content outlined as unacceptable. The passive approach cannot physically restrict users from viewing unacceptable content but in the form of a policy it may condemn such behaviour. This solution should be used at all five campuses, ensuring a single institutional approach to managing access to online pornography that protects staff and students from any implications that may emanate from the distribution or accessing of pornographic content via the Internet. 1.3 Research problem and sub-problems The following research problem was formulated for this study: “To what extent can access to online pornography be managed at the University of Johannesburg?” In order to address this problem successfully, the following sub-problems will be investigated: – What is pornography? – What is the difference between legal and illegal pornography? – What are online content filters? – What are the advantages and disadvantages of different content filtering solutions? – What is an Acceptable Use Policy (AUP)? – What content should an AUP typically include? 1.4 Research methodology The underlying aim of the research is to determine to what extent access to online pornography can be managed at the University of Johannesburg? For the purpose of addressing the research problem a comprehensive literature review was completed, followed by an empirical component, which consisted of content filtering testing and a quantitative survey. 2 1.4.1 Literature review Chapters 2, 3 and 4 create a theoretical framework from which to conduct the empirical research. These chapters deal with the underlying themes and components of the research problem. The literature review is essential in the solving of the identified sub-problems. Below is a short summary of the literature review. Chapter 2 Chapter 2 defines the term “pornography” and creates a taxonomy that identifies the different types of pornography. The taxonomy is used to show the distinction between illegal and legal pornography in an easy to understand layout. Different points of view on the use of pornography in society are discussed. Owing to the evolution of the media and technology, pornography is becoming a more prominent feature in our lives. The Internet is a breeding ground for pornographers who are looking to distribute their content to an easily reachable international mass market. From the humble beginnings of a form of art, pornography is one of the most successful e- commerce ventures, turning over billions of dollars a year. The difficulty in defining pornography makes it harder to manage. Pornography comes in many different formats, some more tolerant than others. Some content may be legal while certain content remains illegal under the SA Films and Publications Act. Universities have to decide what content will be tolerated and what measures will be taken against those in possession of, viewing or distributing intolerable content. Chapter 3 This chapter is dedicated to the examination of various content filters and identifies the unique characteristics of popular content filtering methods. Different content filtering methods are described, along with their strengths and weaknesses. The filtering methods discussed include: keyword filters, Unique Resource Locator (URL) blocking, protocol blocking and content filtering rating systems and services. This chapter will also investigate future developments in content filtering in order to provide a more comprehensive filtering service. 3 In addition, this chapter deals with the topic of censorship of content. Content filtering is a form of censorship predominately used on Internet applications such as the World Wide Web (WWW). Censorship of content is nothing new. For thousands of years censorship has been employed by those in a position of power to varying effect. This term often has negative connotations, as it restricts the right to freedom of expression. Filtering content on the Web is a fairly new phenomenon and seen as necessary for some, in view of the evolving nature of content on the Web. There are different views on the function of censorship in society. Certain groups of people believe that there is a need for censorship while others believe censorship should be condemned. An overview of the advantages and disadvantages of censorship is discussed in this chapter, with reference to content filtering. Chapter 4 This chapter is dedicated to exploring Acceptable Use Policies (AUPs) as a passive tool for preventing access to pornography. AUPs are often not seen as proactive tools in preventing access to pornography, but behind any successful content filtering solution a thorough AUP should be accredited. An AUP is typically divided into different sections, making it easier to understand and follow, allowing for continuity. Each section of the AUP will deal with a different focus area. When dealing with access to pornography, universities need to define clearly what content is acceptable and what measurers are taken to prevent access to unacceptable content such as pornography. In addition, an AUP should include a section on what disciplinary action will be taken against those who are caught accessing or distributing pornography in the university environment. 1.4.2 Empirical research Chapter 5 is dedicated to empirical research, along with the findings and interpretations. Chapter 6 includes recommendations for implementing a comprehensive approach to managing access to online pornography at the University of Johannesburg. Following is a brief summary of the empirical research. 4 Chapter 5 In this chapter the empirical research is discussed along with the research methodology, statistical analysis and findings. The research methodology explored the research problem and sub-problems. The research approach followed for this research project can be classified under Pasteur’s quadrant of Stokes Research Classification Quadrants (1997), as “use-inspired basic research”. This type of research is deemed the ultimate type of research, as it is devoted to solving problems in order to improve people’s lives. As part of Pasteur’s quadrant the main objective of the research is to discover new facts and knowledge as to how the University of Johannesburg can improve in their quest to manage access to online pornography. In addition, action research can be classified under Pasteur’s quadrant, as it presumes an alliance between research and action, leaving the research outcomes highly organisation specific. A quantitative research methodology was chosen for this research project, as specific variables to be measured and sample sizes had been identified. A simple random sampling method was used for the survey (Scheaffer et al 1979: 31). The size of the target group is also discussed, as well as the process of data collection and data processing. For the