User Types and Filter Effectiveness: A University Case Study

User Types and Filter Effectiveness: A University Case Study

Geoffrey Sandy (Victoria University, Australia) and Paul Darbyshire (Victoria University, Australia)
DOI: 10.4018/978-1-93177-743-8.ch007
OnDemand PDF Download:


As the amount of content on the Web grows almost exponentially, one of the new growth industries is that of filtering products. The effectiveness of Web-filtering software depends on a number of factors including the architecture of the software itself, and the sophistication of the users operating within its application domain. The main use of filtering software is to “block” access to controversial content such as pornography. This paper reports an investigation of the effectiveness of a filter called squidGuard in the real-world environment of an Australian University. The product is used to “block” pornographic material. This investigation simulates three classes of web users in trying to access pornography. While squidGuard did have limited success in blocking such material from novice users, the blocking rate dropped dramatically for the more experienced users using access lists. In all cases, however, access to supposedly filtered material was gained in seconds. Under such testing, the effectiveness of squidGuard as a specific-content filter for “pornographic” material can only be seen as superficial approach at best. The use of anonymous proxy servers was found to be an easy means to by-pass the filter.

Complete Chapter List

Search this Book:
Table of Contents
Rasool Azari
Chapter 1
Göran Pulkkis, Kaj J. Grahn, Peik Åström
This chapter is a topical overview of network security software and related skills needed by network users, IT professionals, and network security... Sample PDF
Network Security Software
Chapter 2
Vlasti Broucek, Paul Turner
This chapter is divided to two parts. Part one identifies common security and privacy weaknesses that exist in e-mail and WWW browsers and... Sample PDF
A Forensic Computing Perspective on the Need for Improved User Education for Information Systems Security Management
Chapter 3
Sr. Korzyk
The U.S. military’s concept of a Cooperative Engagement Capability should serve as a useful referent for those attempting to design/develop large... Sample PDF
Integrating Cooperative Engagement Capability into Network-Centric Information System Security
Chapter 4
Maria Grazia Fugini, Pierluigi Plebani
In building cooperative distributed information systems, a methodology for analysis, design and implementation of security requirements of involved... Sample PDF
A Methodology for Developing Trusted Information Systems: The Security Requirements Analysis Phase
Chapter 5
Vernon Stagg, Matthew Warren
Information infrastructures are an eclectic mix of open and closed networks, private and public systems, the Internet, and government, military, and... Sample PDF
A National Information Infrastructure Model for Information Warfare Defence
Chapter 6
Stewart T. Fleming
This chapter discusses the current state of the art of biometric systems. The use of biometrics is an important new part of the design of secure... Sample PDF
Biometrics: Past, Present and Future
Chapter 7
Geoffrey Sandy, Paul Darbyshire
As the amount of content on the Web grows almost exponentially, one of the new growth industries is that of filtering products. The effectiveness of... Sample PDF
User Types and Filter Effectiveness: A University Case Study
Chapter 8
Bernd Carsten Stahl
Social responsibility is a highly popular term, and it seems to be of importance to what is happening in the information age. In this paper, the... Sample PDF
What is the Social Responsibility in the Information Age? Maximising Profits?
Chapter 9
Robert Joseph Skovira
This chapter introduces the social contract as a basis for personal and corporate responsibility and obligation. I briefly discuss three... Sample PDF
The Social Contract Revised: Obligation and Responsibility in the Information Society
Chapter 10
Rasool Azari, James Pick
This paper examines the technological level of 74 counties in technologically advanced states in the United States at the end of the 1990s. The... Sample PDF
The Influence of Socioeconomic Factors on Technological Change: The Case of High-Tech States in the U.S.
Chapter 11
Heberto J. Ochoa-Morales
In Latin America, the proliferation of regional and multilateral agreements with integration as a purpose has generated a high flow of goods... Sample PDF
Social Responsibility and the Transition Toward a Knowledge-Based Society in Latin America
Chapter 12
Husain Al-Lawatia, Thomas Hilton
This chapter explores similarities and differences between two cultures, the USA and the Arab World, in BIS ethics, through a survey of American and... Sample PDF
Information Systems Ethics in the USA and in the Arab World
Chapter 13
Li Qi, Zhang Xianfeng
Based on some new traits of the Internet environment, this chapter discusses lemon problems in the Internet transactions. It points out that the... Sample PDF
Lemon Problems in the Internet Transactions and Relative Strategies
Chapter 14
Zhangxi Lin, Dahui Li, Wayne Huang
Reputation is an important organization asset, particularly in the era of e-commerce. In an online consumer-to-consumer (C2C) auction market, a... Sample PDF
Reputation, Reputation System and Reputation Distribution - An Exploratory Study in Online Consumer-to-Consumer Auctions
Chapter 15
Hasan A. Abbas, Salah M. Al-Fadhly
The Internet is a hot issue nowadays because of its important role at different levels. The topic of privacy is a debatable issue: we read in the... Sample PDF
Privacy Perspective from Utilitarianism and Metaphysical Theories
About the Authors