Tuesday, April 20, 2010

Kids and the Internet

clip_image001

Introduction

The internet has transformed how businesses, consumers and individuals communicate in the 21st century. The internet user has access to an unprecedented amount of information and can communicate with more people than ever before. This medium is fast, cheap and readily accessible to people at work, home and school.

This paper will examine the negative aspects of internet usage by minors and explore what solutions are available to parents, guardians and educators.

Inappropriate Content

The proliferation of the home computers and easy access to the internet has led to the publication of a smorgasbord of content. Most content is harmless but some categories are generally accepted to be inappropriate and potentially harmful to children. Pornography is obviously not acceptable, but parents may also want to screen their children from sites promoting gambling or hate.

Undesirable content can be filtered using hardware, software or even by an Internet Service Provider (ISP). Obviously no system is perfect, content filters may inadvertently block valid material or permit objectionable material.

Naturally, if there is a system to block content, then there is probably a counter-measure and someone willing to use it.

Sexual Predators

A predator is an adult that attempts to communicate with minors through the internet. Predators employ a number of techniques such as prowling chat rooms and social networking web sites. Ultimately the predator will attempt to engineer a face to face meeting.

If a minor is permitted to visit chat rooms and social network website, it is almost impossible to discern a predator from a non-predator.

Probably the only affective solution to combat predators is with direct adult supervision. Adults have the social skills to discern normal behavior from that which is questionable.

Cyber bulling

The past few years has seen an explosion of social networking sites. These sites offer the internet user a convenient way to post content on personalized pages. But unfortunately these sites can also be the venue for people to post hateful or abusive comments about an individual.

Because hateful contributions are written and read outside the class room, some schools may not see a need to address this problem. It is important to note that unlike a school yard accusation, cyber bulling is normally anonymous with an audience of thousands.

The concern is that bullying is still perceived by many educators and parents as a problem that involves physical contact. Most research and enforcement efforts focus on bullying in school classrooms, locker rooms, hallways and bathrooms. But given that 80 percent of adolescents use cell phones or computers, “social interactions have increasingly moved from personal contact at school to virtual contact in the chat room,” write Kirk R. Williams and Nancy G. Guerra, researchers at the University of California, Riverside and co-authors of one of the journal reports. “Internet bullying has emerged as a new and growing form of social cruelty.”
(Parker-Pope, 2007)

It is likely that legislation may be need to be considered to protect individuals and allow state and federal prosecutors to charge perpetrators.

Internet Overuse

One criticism of the internet is that children are spending more time inside behind a screen than outside. This issue is not specifically focused on the internet but on gaming and computing in general. It is natural that children (like adults) would choose the path of least resistance, that is, browsing the internet is just an entertaining as playing soccer but requires significantly less exertion.

The issue of internet overuse is can be alleviated with parent education. I suspect that as the adolescent obesity epidemic worsens, health officials will be forced to undertake a campaign to educate parents.

Parental Guidance

During class discussions on 9/15/2008, a few of my colleagues discribed techniques they employ with their children at home. SF commented that in his household, his children are only permitted to use the internet whilst supervised in their family’s living room. RW imposed a somewhat stricter rule, her step children must let her examine a website before they exit or log out.

Conclusion

I must admit, when researching this article I was skeptical about the perceived threat from sexual predators. Well, that changes when I read the following.

In case you are wondering whether any of this is necessary, consider this. According to US-based research, one in seven teenagers has met, face-to-face, total strangers they met online, 54 per cent have communicated with a stranger online, and 47 per cent have received pornographic e-mail.
(Taylor, 2006)

As stated above, it is dangerous to rely on software to guard our children from objectionable material or dangerous individuals. Parents and guardians must take an active role in supervising children whilst permitting a limited amount of autonomy. Below is a list of useful recommendations.

…keep the computer in a shared living area; supervise children's online activities; encourage children to discuss any unsavoury content they have found; warn children about the potential dangers of chatrooms; use parental control software but do not over rely on it; change your parental control access password regularly.
(Parental control software, 2005)

Lastly, the power of the internet has changed the way we work and play. But the internet need not change the way we think.

References

  • Parker-Pope, T. (2007, November 27). More Teens Victimized by Cyber-Bullies. In New York Times. Retrieved 9/18/2009 from
    http://well.blogs.nytimes.com/2007/11/27/more-teens-victimized-by-cyber-bullies/?scp=3&sq=cyberbulling%20&st=cse
  • Taylor P. (2006, November 11). Need a cybernanny? TECHNICALLY SPEAKING: Paul Taylor recommends software for parentswho are looking toprotect their childrenfrom online hazards :[LONDON 1ST EDITION]. Financial Times,p. 10.  Retrieved September 19, 2008, from ABI/INFORM Global database. (Document ID: 1160632511).
  • Parental control software is not enough to protect children - claim. (2005, August). Telecomworldwire,1.  Retrieved September 19, 2008, from ABI/INFORM Trade & Industry database. (Document ID: 888601501).

Monday, April 19, 2010

The General Public License

File:Heckert GNU white.svg

The article was first published on 6/2/2008.

In the twenty first century, people in developed countries interact with computers on a daily basis. The interaction could be with a personal computer or a computer embedded into a device such as a television or microwave. Regardless, all computers rely on a set of instructions that describe how the hardware should operate. These instructions are collectively called software.

Software is normally developed in human readable text and then compiled into a machine readable binary file. Whilst binary files are normally distributed with hardware or sold separately, the human readable text (or source code) is not. This is mainly because distribution of source code is unnecessary plus doing so would comprise the software developer’s competitive advantage.

When a consumer purchases software, the software may be duplicated on a hard drive and in the random access memory (RAM) for routine use. In 1980, the legislature introduced section 117(a)(1) into the Copyright Act to specifically permit this type of software duplication. This amendment may have contributed to the software industry’s reluctance to distribute source code even though it may have hindered innovation.

Open source is essentially a counter to proprietary (or closed source) software. The philosophy was first introduced in the early 1980’s by Richard Stallman when he started working on the GNU project. Stallman’s intent was to make software source code available to the public with relaxed (or non-existent) copyright.

In the late 1990’s, Microsoft and Netscape battled for supremely in the legendary “browser wars”. The early dominance of Netscape’s Navigator was eventually overtaken by Microsoft’s Internet Explorer. In 1998, Netscape conceded defeat but also brought “open source” to the public’s attention by releasing Navigator’s source code under an open source license, specifically the GNU General Public License (or GPL).

The GPL is one of many licenses approved by the Free Software Foundation and the Open Source Initiative but it is by far the most popular. GPL is used by more than half of the projects hosted on freemeat.net and sourceforge.net, the two most popular open source websites.

Richard Stallman, an open source pioneer, founded the Free Software Foundation in 1985 but also wrote the GPL. The popularity of GPL could be explained by the fact that contributors to a GPL project felt assured that their contributions would benefit all and not be exploited by software companies.

The GPL was first released in 1989. The key clauses in the license are as follow:

  1. The licensee has permission to modify, copy, redistribute the original or derived work.
  2. The pre-compiled binaries must be accompanied by the source code or a mechanism to access it.
  3. The distributor of the derived work is compelled to use the GPL.
  4. The distributor can charge a fee. However, this is somewhat muted with full disclosure of the source code.
  5. The distributor cannot impose restrictions that contradict the GPL. For example, a distributor cannot distribute software under a non-disclosure agreement.
  6. The GPL is designed to be interpreted as a license rather than a contract. In common law jurisdictions like the United States this means that the GPL is enforced by copyright laws.

As stated in (6), a person can choose to disagree with the license and continue to use it legally. However that person is not permitted to distribute the software.

Commercial software companies generally avoid using GPLed software because the software is usually unsupported, changes rapidly or has an uncertain roadmap. But the most important consideration is the “viral” nature of GPL software as stated in (3), that is, derived software must adopt the GPL. Whilst GPL software may be low cost (or free) it does present a significant risk to organizations that wish to keep their source code proprietary.

A prominent issue today in the open source community is whether dynamic linking to GPL libraries is considered a “derived work”. The community is split on the question but Determann (2006) concludes:

…dynamic linking to GPLed programs would not normally trigger the application of the GPL to the linking program, even if both programs are distributed together.

Now consider Mozilla Firefox, a popular web browser licensed under GPL. Could a hypothetical software developer distribute a proprietary add-on? Determann (2006) says yes:

…contrary to the views expressed by the Free Software Foundation, distributors can separately distribute add-on products intended for combination with GPLed code without fear of incurring contributory liability.

In Wallace v. International Business Machines Corp. et al. 467 F.3d 1104 the plaintiff alleged the defendants IBM, Red Hat and Novell used the GPL to illegally stifle competition. Chief Judge Easterbrook in the seventh court of appeals ruled that the GPL did not contravene federal antitrust laws. Fayle (2006) states:

Chief Judge Easterbrook, writing for the court, dismissed these arguments and reassured free software advocates that “[t]he GPL and open-source software have nothing to fear from the antitrust laws.”… …The GPL actually results in increased output and the lowest possible prices, this antitrust law has no interest in breaking up the GPL’s “conspiracy”.

In 2006, a German court ruled that DLink Germany Gmbh infringed copyright by using parts of the Linux operating system in its Network Attached Storage (NAS) device. This was the first time that a court had judged that the GPL was enforceable.

The following statement by Carver (2003) still holds true today:

Historically, the GPL has been primarily enforced through private negotiation and settlement agreements. This process has been successful thus far because most alleged violators have apparently been eager to correct any defects in their compliance. These extra-judicial resolutions have generally satisfied the goals of the copyright holders enforcing the GPL, but left questions of the GPL’s enforceability in court largely unanswered.

From 2007, there have been four cases that have centered on a small Linux utility called BusyBox. The BusyBox software was published under a GPL license but was found to be used in the firmware of Monsoon Multimedia Inc., Xterasys, High-Gain Antennas and most recently Verizon Communications. All four cases resulted in the hardware manufactures agreeing to pay the plaintiff’s legal costs and publishing their “derived” works.

References