Narayanan et al., 2018 - Google Patents
Adult content filtering: Restricting minor audience from accessing inappropriate internet contentNarayanan et al., 2018
- Document ID
- 11266785516810767916
- Author
- Narayanan B
- M R
- M N
- Publication year
- Publication venue
- Education and Information Technologies
External Links
Snippet
With the onset of the twenty-first century, the internet world has seen a pervasive development. Smartphones have become the primordial means of communication and social networking. This has granted the minors an unprecedented access to the internet …
- 238000001914 filtration 0 title description 16
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Lee et al. | Detecting child sexual abuse material: A comprehensive survey | |
Narayanan et al. | Adult content filtering: Restricting minor audience from accessing inappropriate internet content | |
Zittrain et al. | Internet filtering: The politics and mechanisms of control | |
US8601548B1 (en) | Password popularity-based limiting of online account creation requests | |
Gebhart et al. | Internet censorship in Thailand: User practices and potential threats | |
Makin et al. | The secret life of PETs: A cross-sectional analysis of interest in privacy enhancing technologies | |
Tudor | Legal implications of using digital technology in public schools: Effects on privacy | |
Lindner et al. | Subverting surveillance or accessing the Dark Web? Interest in the Tor anonymity network in US States, 2006–2015 | |
Lindorfer | The threat of surveillance and the need for privacy protections | |
Alguliyev et al. | Conceptual model of national intellectucal system for children safety in internet environment | |
Elliot et al. | Dictionary of privacy, data protection and information security | |
Figliola | Promoting Global Internet Freedom: Policy and Technology | |
Tchao et al. | Ghanaian consumers online privacy concerns: Causes and its effects on E-commerce adoption | |
Leary | Katz on a Hot Tin Roof-Saving the Fourth Amendment from Commercial Conditioning by Reviving Voluntariness in Disclosures to Third Parties | |
Vassio et al. | The exploitation of web navigation data: Ethical issues and alternative scenarios | |
Kuyumdzhiev | Controls Mitigating the Risk of Confidential Information Disclosure by Facebook: Essential Concern in Auditing Information Security | |
Cunningham | Free expression, privacy, and diminishing sovereignty in the information age: the internationalization of censorship | |
Maitland et al. | Internet censorship circumvention technology use in human rights organizations: an exploratory analysis | |
Almalki et al. | Social media security and attacks | |
Christensen | The Demise of the CFAA in Data Scraping Cases | |
Henricks | Social Media, Publicly Available Information, and the Intelligence Community | |
Kopczewski et al. | Security threats in cyberspace | |
Nakerekanti et al. | Secured Multiparty Access Control Model for Online Social Networking using Machine Learning | |
Charoen | The analysis of the computer crime act in thailand | |
Soboroff | Privacy in Information Retrieval |