Tuesday, November 27, 2007

D#14,HW#1 Draft WP#4

I will share this in Google Documents as soon as this is posted. See you all Thursday.

Kathy Lacey
WP#4 Draft
102-7891 Adams
27 Nov. 2007

Reflective Cover Letter


Looking back at the course information presented in the syllabus, I truly believe each of the writing projects has helped me to improve my writing. It has been many years since I was enrolled in any kind of formal writing instruction class. The techniques and strategies I discovered this semester will no doubt be useful in any future writing that I undertake, whether for school, work, or personal pleasure. The Course Competencies listed in the syllabus identify the specific skills targeted in this class.
Competency #1 deals with writing for specific rhetorical contexts. That was not a term I really understood before reading the text chapters and reviewing the linked Web pages. The Rodrigo tutorial was most effective for me. The homework assignments for deadline #3 (D#3,HW#2 Research Question, D#3,HW#4 Who should read...?, D#3,HW#5 Audience analysis, D#3,HW#6 Rhetorical situation )required a basic understanding of identifying an audience, and the rhetorical situation. Homework #6 asked that we analyze the rhetorical situation of our research project, and of the proposal composed for Writing Project #1. Completing that activity made me aware of the importance of writing to a specific audience, about an interesting topic, and within an identified context. Completing the Research Proposal (D#6,HW#2 Final WP#1) was most helpful to me later on, when I needed to narrow my topic and focus my research. As I investigated new sources of information, I was able to note how the evidence presented could be used to support or refute my argument. Chapter 5 in Everything's an Argument also offered a good checklist for "Composing a Rhetorical Analysis," which helped me analyze the Pareles essay about Coldplay (D#8,HW#4 Essay Analysis). My WP#1 Reflection (D#6,HW#3 WP#1 Reflection) details more of the specific skills I worked on. One thing I need to strive to improve in this area is developing a better understanding of the cultural implications of my writing. I am familiar enough with ethical and political implications, but don't always see the "big picture" when I am drafting an essay or a research paper. Writing for a specific rhetorical context will help me draft many types of writing necessary for the work I hope to continue to do in a library setting.
Competency #2 concerns organization of writing to support a central idea. Logical progression of ideas has always been my preferred method of writing, and one of my stronger skills. The problems I had in the past were with unity and coherence. One of the grammar exercises I completed (D#10,HW#6 Grammar) dealt with transitions, one area that I felt needed improvement. Another grammar assignment helped with developing a strong thesis statement (D#13,HW#1 Grammar Assignment), which clarified what I needed to improve in the introduction of my Writing Project #3. The assignments that covered outlining (D#9,HW#6 Outline, D#9,HW#4 Toulmin outline) helped me organize my research, and kept my focus on the main topic. The Toulmin method will be useful for any future argumentative writing that I attempt.
Competency #3 has to do with using consistent tone, voice, diction, grammar, and mechanics. Grammar has always been one of my strong qualities, but there was definitely room for improvement. The Bedford textbook, chapter 12, offered a good review of tone and style. The homework assignments for deadline #11 (D#11,HW#2 Intros/Conclusions) were very beneficial for improving my introduction and conclusion for WP#3. The revisions of the WP#3 draft required for deadline#12 (D#12,HW#2 Revision/Draft2, D#12,HW#3 Revision/Draft#3, D#12,HW#4 Style) made me aware of some problems with the mechanics of the original draft. Other grammar assignments and activities that I completed (D#4, HW#2 Grammar Assignment #1, D#6,HW#7 Grammar, D#8,HW#5 Grammar Assignment) were a great source of review, and helped me polish some "rusty" habits I had developed over the years. The online resources linked for us in the syllabus (especially the Paradigm and OWL sites) contained some of the best presentations of the materials that I have seen, and I enjoyed completing some of the grammar exercises. I will continue to strive to improve my writing style, and will definitely make further use of the mentioned text and Web sites for new writing that I do.
Competency #4 refers to online and print sources of information. The recent Library Tech classes that I have completed have been extremely helpful to me in this area. We are required to become experienced in the use of all types of resources to be able to assist library patrons doing different types of research. The homework assignment that called for a thorough analysis of one of our sources (D#6,HW#6 Evaluate) allowed me to utilize some of those skills. Every day at work I see students working on assigned research projects, and I try to teach them to do more than just "Google" a topic. Locating credible sources of information is definitely a skill that requires practice, especially with the rapidly changing nature of electronic access. The Annotated Bibliography assignments (D#2,HW#6 Annotated Bib for Internet, D#4,HW#5 Annotated Bib.x4, D#5,HW#4 Annotated Bib X 3, D#7,HW#2 Annotated Bib X 3) required us to investigate several different online and print sources. My successful completion of those assignments and the Annotated Bibliography Writing Project (WP#2 Final) are evidence of my use of different sources.
Competency #5 deals with the integration of sources into our writing, while avoiding any instances of plagiarism. It is important to be able to properly summarize, paraphrase, or quote information gathered from an outside source. Several of my reading reflections (D#8,HW#1 Reading Reflection, D#9,HW#1 Reading Reflection) contain references to information found in the text, and I named the source, but did not follow MLA format for page numbers. In any future formal writing, I now know how to cite within the text, as I tried to do in my Researched Argument (WP#3). Once it is graded, I will know if I was able to format my in-text citations correctly.
Competency #6 covers the documentation style used in our writing projects, which was expected to be Modern Language Association (MLA). There were some tricks to learn in order to get things to show up correctly in the blogs, but I think I mastered it. The Annotated Bibliography homework assignments (D#4,HW#5 Annotated Bib.x4) helped me practice, but none of them were graded. Peer reviews of Writing Project #2 helped. The instructor comments indicate that I utilized proper MLA format in my final Annotated Bibliography (link above).
Competency #7 refers to feedback and peer review of writing. This was the first time I had experienced a formal peer review process, and I found it to be especially helpful. Having other people read and suggest improvements for my writing made me look at what impact that writing had on my audience. It is great to get a fresh perspective. Reading through the Web sites that covered peer editing also helped me look for more than just grammatical errors in other writing. I learned to look at content, and to try to analyze the context and intended audience of the compositions I was reviewing. As a result, I have been able to do a better job when helping students at the high school and middle school levels with their essays. The actual peer review homework assignments that I completed (D#8,HW#2 Peer Reviews, D#5,HW#2 Peer Review) helped me to realize the importance of having someone else review all writing.
Competency #8 states that we should be able to assess our own writing through various processes. The deadline reflections (D#6,HW#8 Deadline Reflection, D#7,HW#5 Deadline reflection, D#12,HW#9 Deadline Reflection) and writing project reflections (D#6,HW#3 WP#1 Reflection, D#9,HW#3 WP2 Reflection, D#13,HW#3 Writing Project #3 Reflection) were one way I learned how to evaluate my strengths and identify things that needed improvement. The comments posted in reply to my blogs also helped. The instructor's comments posted on my writing projects were a valuable tool for assessing the effectiveness of my writing style and effectiveness. All of these things will combine to assure that I will be able to complete any future writing that I do with confidence.
Competency #9 was the one I was most worried about. When I took English 101, there were no electronic resources or methods of delivery. I try to learn new things, and actually enrolled in a couple of Library Tech classes online with WebCT. I managed to complete both of them successfully, but never felt comfortable with the technology. Part of my frustration might have been our dial-up service at home. It was aggravating to have to wait for things to load, and I had a hard time maintaining focus. This class required so much time online that I had no choice but to learn how to post, reply, share, edit, and set up accounts to help manage all of the information. The online Bedford Bibliographer (Bedford Login Page) was one of the most useful resources, and one that I will definitely make use of in the future. The fact that I posted every homework blog entry, on time, and submitted the required papers to Turnitin.com within the deadline, is evidence of some proficiency in the use of appropriate technologies. Much of what I learned has helped me relate better to what some of the students are doing and their preferred methods of communication. I am confident that I can continue to adapt my archaic methods to the latest innovations and electronic information access formats. All that, and I managed to improve my writing skills, too! Now, if only I could figure out how to retain paragraph formatting in these blogs...

Wednesday, November 21, 2007

D#13,HW#7 Deadline Reflection

This was probably the most stressful week so far for me. I missed 2 days of work to a serious eye condition (finally improving). Sitting in Doctor's offices didn't allow any time to work on D#13. I wasn't sure if I was going to be able to make tonight's deadline or not.
Now that everything is complete, I plan to kick back for a few days. Tomorrow, I will sleep past 5am for a change, cook a turkey dinner for my family, and relax with a good book when I can.
I hope all of you have a safe, happy, and healthy Thanksgiving. Try not to take for granted those things that we should all be truly thankful for.
Comments this week:

"D#13, HW#1, Grammar Assignment" Coralee

"D13, HW1, Grammar Assignment" Jared

"D#13, HW#3, Writing Reflection" Mike

"D13HW5 reading refections" Stephann



D#13,HW#6 Deadline Reflections

Reading back through my deadline reflections made me realize how much we have accomplished in this class. Deadlines 1-4 showed some of the frustration I had to overcome when using dial-up or waiting for others to post. Deadlines 5-8 showed progress with peer reviewing, grammar, and mechanics. Deadlines 9-12 reflect skills necessary for writing the researched argument.
It appears that we have lost over half of the class this semester. That is too bad.

D#13,HW#5 Reading Reflections

The textbook readings were a good review of the steps necessary for completion of different types of essays and other compositions. The Bedford Researcher is among the most helpful tools I have ever used. The online component has easy-to-follow tutorials, and the Bibliographer tool helped me organize my sources and annotations.
The links to online resources gave me some additional review opportunities, and Shelley's pages covering the Rhetorical Situation cleared up some questions I had. Again, specifics and links will be in the final reflection letter.

D#13,HW#4 WP Reflections

The research proposal (WP#1) will show my progress in course outcomes 1,2,3 & 9. The annotated bibliography (WP#2) was more work, but it helped me improve my skills a great deal in outcomes 4,5,6 & 7. The researched argument strengthened my abilities in all of the outcomes except #8 (which will happen with WP#4). The specific skill sets and examples will be in my reflective cover letter for WP#4.

D#13,HW#3 Writing Project #3 Reflection

D#13,HW#3 Writing Project Reflection

This writing project involved more steps than I have ever taken for a single research paper. All of the initial assignments we completed helped to narrow my topic and focus my research. The annotated bibliographies made it much easier to go back and pull information and quotes for the body of the paper. The peer review sessions were especially useful for ensuring clarity. The grammar assignments made me aware of my rusty language skills (I haven’t taken an English class in 34 years). Outlining was good for developing structure and paragraphs.

I am proud of my annotations, and the fact that I learned proper format for MLA. My Library Class instructors all made sure we had every citation correct. I am concerned about the way I tried to present the opposing view in my paper. It probably could have been much stronger. If I had to do it again, I would try to include more opposition to my thesis.

As far as the writing process itself, I think I was able to improve my use of transitions, drafting outlines, and developing a strong thesis. In my next writing project, I would like to improve overall sentence structure. I need to work on varying the length.

Course competencies that I worked toward on this project include 1-7 and 9 (from page 5 of the syllabus):

  1. I learned to identify the rhetorical situation and audience involved in writing a researched argument.
  2. I learned to use that context when organizing my writing.
  3. I reviewed the conventions of voice, tone, grammar, and mechanics.
  4. I learned to use and evaluate sources to cover multiple perspectives of a topic.
  5. I learned to use summarizing, paraphrasing, and quotation within a document to avoid cases of plagiarism.
  6. I learned to use MLA format for in-text citations.
  7. I learned to use the peer review process to help others improve their writing, and to accept peer review of my own work for the same reason.
  8. N/A
  9. I learned to use Google Documents, requiring some different format and structure techniques.

I am looking forward to drafting my portfolio to assess my strengths and identify some strategies to work on for the next writing that I undertake.

D#13,HW#2 Submit WP3

Submitted WP#3 to turnitin.com, and shared final WP#3 Google document with Devon.

Sunday, November 18, 2007

D#13,HW#1 Grammar Assignment

The first element I decided to focus on was developing an effective thesis statement. What was clear in my mind was apparently not as clear to my readers (thanks, Jared). I went back to the Bedford text (p. 158-161), the Paradigm site (http://www.powa.org/content/view/262/156/), and two additional web pages that explain thesis statements: http://grammar.ccc.commnet.edu/grammar/composition/thesis.htm# and http://www.indiana.edu/%7Ewts/pamphlets/thesis_statement.shtml. The Indiana University site has a section titled: "How to Tell a Strong Thesis Sentence from a Weak One.” This has some of the best explanations of thesis statements that I have seen. Next, I reviewed my research question, and drafted some alternates. My focus question has changed over the course of the semester.

Question: Are current laws effectively protecting children who use the Internet in public and school libraries?

Original thesis statement: To better protect our children, the law should be changed to include all public and school libraries, with minimum standards outlined for identifying content that should be blocked.

Revised thesis: Federal laws governing Internet access for children in public and school libraries should be changed.

Using this statement, I drafted a "Skeleton Essay" (example on Paradigm
http://www.powa.org/content/view/263/110/1/1/) composed of my reasons and evidence to see if I had included all of the relevant points for both sides of the argument. It took quite a bit of time, but really did help me see the paper from the point of view of the intended reader. It looks like I will be making lots of changes before the Wednesday deadline.



Thursday, November 15, 2007

D#12,HW#9 Deadline Reflection

D12HW9 Deadline Reflection

The multiple revisions this week have really helped improve what we will ultimately submit as our final. Slowly chipping away at the course outcomes is helping me to understand the steps required for a well-researched argument.

I’m not sure why I am not seeing all of the WP3s in Google Documents, but only 7 of the 14 class members are showing up for me. Is anyone else having the same problem?

I posted 5 comments this week:

"D#12, HW#6, Page Layout Strategies" Coralee

"Deadline #12, HW# 9 Deadline Reflection" Camille

"D12, HW9, Deadline Reflection" Jared

"D#12,HW#2 Revision/Draft2" Kathy (I replied to 2 very interesting comments from an outside party…safelibraries.org. One of the perks of being in the blogosphere, I guess.

D#12,HW#8 Peer Review Reflection

I peer reviewed the following drafts this week:

WP #3 Justin Winter draft

WP#3 Draft, Coralee Harding (She has posted a new draft since I did the peer review).

Commenting on these drafts made me realize the importance of having another person review my writing. I get in too much of a hurry sometimes, and simple mistakes get by me. Justin did a really good job explaining both sides of the hunting controversy. His sources are credible and well documented. Coralee is obviously passionate about her topic, too. I only had a few questions for her.

Coralee and Jared peer reviewed my draft, and offered some very good suggestions. I will add the things they mentioned to my final draft. I also need to finish my annotations. Some sources were added as I developed my paper—mainly because I liked the way they presented statistics.

Overall, this has been a positive experience, and I learned many things about the topic that I was not aware of. Jared has shared some of the things he knows about, which helped me focus on items that I needed to clarify for my readers and myself. Thanks for that, Jared.

D#12,HW#7 Peer reviews

I peer reviewed the following drafts this week:

WP #3 Justin Winter draft

WP#3 Draft, Coralee Harding (She has posted a new draft since I did the peer review).

Tuesday, November 13, 2007

D#12,HW#6 Page Layout

Google Documents does not give too many options for changing the design of the paper. I tried copying some formatted columns, but that doesn’t work. I think columns would improve the overall appearance of the documents. Also, because of the basic layout, normal page breaks have to be added. I really prefer using Word, but that is probably because I am much more familiar with it.

The things I can control, such as spacing and the style of the header, follow the standard for MLA format (double spacing, left-justified text). I decided against using headings and subheadings within the paper, but have done that in the past. I also use bulleted points for emphasis in some of my library class documents, but did not use any in my WP3. If I add any graphics to the paper, I will use a caption to identify the source. None of the quotes I used were long enough to require a separate, indented paragraph. Using sidebars or pull quotes would certainly make the document more visually appealing, but I haven’t played around with that yet.

D#12,HW#5 Figurative Language



In place of the following sentence,

That is a lofty goal, but in reality, children are not mature enough to surf the Internet with no boundaries in place. I could try:

That is a lofty goal, but letting children surf the Internet without boundaries would be like handing over the keys to the candy store…children just are not mature enough to make good decisions about some things.

Another example:

Web pages are created at a phenomenal rate, and no software provider has the time or resources to evaluate every single one.

Web pages are created faster than a speeding bullet, and no software company can keep up.

D#12,HW#4 Style

Word Choice: I tried to use words with clear meaning to convey my ideas.

The Intellectual Freedom Committee of the ALA published a "Statement on Library Use of Filtering Software" in 1997, which was revised in 2000, attempting to provide some guidance for all libraries facing filtering decisions. The statement lists eleven problems associated with filtering software, and seven things that libraries can do to address those problems (ala.org: Statement). The position of the ALA has a great deal of influence over policies enacted by public libraries, and they remain steadfastly against filtering. In their "Core Values of Librarianship" statement they address the topic of access, stating that "[a]ll information resources that are provided directly or indirectly by the library, regardless of technology, format, or methods of delivery, should be readily, equally, and equitably accessible to all library users" (ala.org: Core Values). They make no distinction regarding the age of the library user, and recommend that libraries apply the lowest level of filtering possible to conform to CIPA guidelines (ala.org: Toolkit). One of the "Key Messages" in the ALA Internet Toolkit states: "The only lifelong Internet protection for children is to teach them to use the Internet properly and to teach them to be information literate, so they can make informed choices" (ala.org). That is a lofty goal, but in reality, children are not mature enough to surf the Internet with no boundaries in place. Libraries serving children, and especially school libraries, are under constant scrutiny regarding the measures they employ to protect children.

Sentence Structure: I tried to vary the length of the sentences to strengthen my argument.

Two steps should be taken to improve the situation. First, legislation should be drafted that will expand CIPA to include all public and school libraries. According to Nancy Kranich, former president of the ALA, the current legislation "force[s] libraries in economically disadvantaged areas to use already scarce resources to install expensive and unreliable filtering technologies or lose vital federal funds they need[...]"(Jost 481). Funding should not be used to blackmail libraries. Second, filtering requirements should be standardized for public and school libraries in order to reassure parents and teachers that children will be protected when accessing information on public computers. As outspoken as the ALA has been on the subject of freedom of access to information, they admit the need for additional measures to protect children, and their "Internet Toolkit" includes several pages of recommendations to help libraries deal with the issue (ala.org: Toolkit 6-9). Consumer Reports testing showed that even the worst filter successfully blocked eighty-eight percent of the access to pornography (ConsumerReports.org). That seems worth the effort.

Punctuation: Used a colon to introduce a short list, and a semi-colon to separate the two sets of details.

According to CIPA, filtering is only mandated for computers in libraries receiving two types of federal funds: E-rate and Library Services Technology Act (LSTA) (Bocher 36). E-rate funds are awarded in the form of discounts for Internet service (Carson 247); LSTA provides funds for Internet access or for the purchase of computers used for that access (Bocher 36).

Monday, November 12, 2007

D#12,HW#3 Revision/Draft#3

This revision assignment was more helpful than the last one. I ended up changing a couple of sources and adding one that I had meant to include. The paper is starting to shape up fairly well (I'll know for sure after the peer reviews). I removed the class as collaborators on my first draft so that only the second draft is available for peer review. Here is my 3rd draft, without the annotated bibliography:

Children and the Internet

The teacher and librarian were both shocked when they discovered a third-grade student using a computer to play games on Playboy.com. They had mistakenly assumed that the Internet filter would automatically block access to the site. One reason for this assumption may be the current law that governs the use of Internet filtering software on computers used by children in public and school libraries. Congress passed the Children’s Internet Protection Act (CIPA) in December of 2000 (Carson 248). Soon after passage, the American Library Association (ALA) filed suit in federal District Court, which ruled in 2002 that the act was unconstitutional (Carson 248). The government appealed the decision, and the Supreme Court struck down the lower court ruling and found CIPA to be constitutional in 2003 (Carson 249). All of the provisions outlined in the act are now in effect, but that does not guarantee that all libraries provide filtered Internet access for children. Unfortunately, the provisions of the Act do not pertain to all libraries, and the specific content that must be restricted or blocked is limited (Bocher 36). The result is that children are not as safe as many parents and teachers have been led to believe. To better protect our children, the law should be changed to include all public and school libraries, with minimum standards outlined for identifying content that should be blocked.
According to CIPA, filtering is only mandated for computers in libraries receiving two types of federal funds: E-rate and Library Services Technology Act (LSTA) (Bocher 36). E-rate funds are awarded in the form of discounts for Internet service (Carson 247). LSTA provides funds for Internet access or for the purchase of computers used for that access (Bocher 36). Libraries that do not receive either type of funding are not required to comply with CIPA provisions. In fact, some libraries have actually made the decision to withdraw from federal funding programs in order to remain exempt from CIPA constraints, citing the added financial burden or their reluctance to restrict free information access (Bocher 36). As a result, it is difficult for library patrons to know what can be accessed on the public computers at any particular library. Congress attempted to solve that dilemma by requiring that libraries have a written Internet safety policy, and hold public meetings to review that policy (Boss 1). That “solution” only helps people who have the time and inclination to discover what those policies are, and even then, they may be unable to understand the technical aspects of filtering.
Technology consultant Bob Bocher explains that specific content that must be blocked under CIPA is limited to "visual depictions that 1) are obscene, 2) contain child pornography, or 3) are harmful to minors" (36). These terms are defined in CIPA or other federal statutes (Bocher 36). The fact that only images are addressed by the law, and not text, means that children may still be exposed to a great deal of inappropriate content. In addition, one crucial aspect of CIPA is the requirement that adult patrons may request that sites be unblocked or filtering turned off (Bocher 37). As a result, children walking past unfiltered computers may be exposed to very graphic images. Placement of adult computers away from high-traffic areas is one way to reduce this type of exposure. Filtering children’s Internet access is an effective way to use technology to limit exposure to other types of undesirable content.
The technology required for filtering works primarily through the use of either a network firewall or a proxy server. Only a network administrator can change firewall filter settings. Computer users, including children, can adjust proxy filter settings (McCarthy 9). Simple filters may block Web sites that contain predetermined words or phrases (Jost 469). Content filters use rules to screen sites, and are subject to the limitations of the person or group writing the rules (McCarthy 9). Filters are designed to block material deemed offensive or inappropriate, but the inadvertent blocking of legitimate information (overblocking) is a major drawback. After an exhaustive review of large studies and separate tests of commercially available blocking software, the Brennan Center for Justice at New York University School of Law issued a public policy report detailing their findings. The revised second edition, published in 2006, concluded "Filters provide a false sense of security, while blocking large amounts of important information in an often irrational or biased way" (Heins ii). Consumer Reports tested filtering software in 2005, and found similar results. They conclude, "while Internet blockers have gotten better at blocking pornography, the best also tend to block many sites they shouldn't" (ConsumerReports.org). Libraries are faced with a complex and difficult decision.
The Intellectual Freedom Committee of the ALA published a "Statement on Library Use of Filtering Software" in 1997, which was revised in 2000, attempting to provide some guidance for all libraries facing filtering decisions. The statement lists eleven problems associated with filtering software, and seven things that libraries can do to address those problems (ala.org: Statement). The position of the ALA has a great deal of influence over policies enacted by public libraries, and they remain steadfastly against filtering. In their "Core Values of Librarianship" statement they address the topic of access, stating that "[a]ll information resources that are provided directly or indirectly by the library, regardless of technology, format, or methods of delivery, should be readily, equally, and equitably accessible to all library users" (ala.org: Core Values). They make no distinction regarding the age of the library user, and recommend that libraries apply the lowest level of filtering possible to conform to CIPA guidelines (ala.org: Toolkit). One of the "Key Messages" in the ALA Internet Toolkit states: "The only lifelong Internet protection for children is to teach them to use the Internet properly and to teach them to be information literate, so they can make informed choices" (ala.org). That is a lofty goal, but in reality, children are not mature enough to surf the Internet with no boundaries in place. Libraries serving children, and especially school libraries, are under constant scrutiny regarding the measures they employ to protect children.
Schools answer to their school board members and parents, and frequently come under fire for underblocking, or not preventing access to inappropriate materials, and also for overblocking, or preventing access to sites with genuine research value (Johnson 40). More and more librarians, as well as teachers, have begun to realize that filtering software is not able to block all inappropriate content, and is just as likely to prevent access to material that should not have been blocked at all. A survey conducted by Ann Curry and Ken Haycock for School Library Journal in 2001 concluded that librarians' main reasons for filtering included "the role of the school library, uneasiness about personal liability, frustration with the amount of time they were spending monitoring students' Web searching, and concerns about student safety" (Curry 42). These concerns have also caused some school libraries to react by adopting overly restrictive Internet use policies, or even denying Internet access altogether (Bell). Schools should not have to resort to such extreme tactics out of fear. Establishing uniform standards or criteria for identifying materials that should be blocked would help relieve some of the pressure the librarians feel concerning Internet access.
The effectiveness of filters is improving, but their use continues to be hotly debated. One of the conclusions reached by the authors of the Brennan Public Policy Report is that "Internet filters are powerful, often irrational, censorship tools" (Heins 73). Many librarians cringe at the mention of censorship, but most agree that children must be protected against exposure to inappropriate materials. Selection policies for libraries determine what items will or will not be included in the library collection. Filtering attempts to do the same thing. According to Mark Smith in his Internet Policy Handbook for Libraries, "Selection is about deciding what goes into the library, filtering is the process of deciding what stays out of the library" (79). Librarians are generally not making those decisions. Developers of filtering software are marketing to libraries everywhere, and the filters are not able to evaluate sites or information. They can only mechanically search for keywords, phrases, images, or site addresses, and will block everything conforming to the criteria built into the software application. Web pages are created at a phenomenal rate, and no software provider has the time or resources to evaluate every single one. Parents, teachers, and librarians have no way of knowing in advance if a child is going to have a positive experience when using the Internet.
Two steps should be taken to improve the situation. First, legislation should be drafted that will expand CIPA to include all public and school libraries. According to Nancy Kranich, former president of the ALA, the current legislation "force[s] libraries in economically disadvantaged areas to use already scarce resources to install expensive and unreliable filtering technologies or lose vital federal funds they need[...]"(Jost 481). Funding should not be used to blackmail libraries. Second, filtering requirements should be standardized for public and school libraries in order to reassure parents and teachers that children will be protected when accessing information on public computers. As outspoken as the ALA has been on the subject of freedom of access to information, they admit the need for additional measures to protect children, and their "Internet Toolkit" includes several pages of recommendations to help libraries deal with the issue (ala.org: Toolkit 6-9). Consumer Reports testing showed that even the worst filter successfully blocked eighty-eight percent of the access to pornography (ConsumerReports.org). That seems worth the effort.
Rapid advances in technology and information access via the World Wide Web almost guarantee that filtering will continue to be a controversial topic. Parents and teachers need to feel confident that children will be exposed to a minimal amount of inappropriate material when using the Internet for research or pleasure. The current laws must be changed to address that need. One way to ensure children’s safety is to effectively filter or block the “bad” sites, and to do it uniformly on all publicly accessible computers. Admittedly, no filter will be one hundred percent effective. Teaching children to use safe techniques for all aspects of Internet activity, including social networking, doing research, or just “surfing the Web” for pleasure, must remain a high priority in schools and libraries. Most librarians are careful about the print resources they make available for children, and should be just as concerned about electronic resources. As adults, our goal should be to do whatever we can to make access to information safe for children. Technology may change the situation, but for right now, effective filtering, applied uniformly, is one way to achieve that goal.

Sunday, November 11, 2007

D#12,HW#2 Revision/Draft2

Original:

Internet Filtering

Several years ago, there was public controversy over a book titled, Why Johnny Can't Read. Now, the controversy has become, "What Johnny is Viewing on his Computer Screen." Many parents believe that their children are protected against exposure to inappropriate content when those children use computers at school and in public libraries, but that is not necessarily true. While Internet filtering and blocking software has been installed on many public and school computers, the effectiveness of that software is constantly being challenged. Congress attempted to address the issue when it passed the Children's Internet Protection Act (CIPA) in December 2000 (Carson 248). Unfortunately, the provisions of this law do not pertain to all libraries, and the content that must be restricted is limited (Bocher 36). The result is that children are not as safe as many parents have been led to believe. Federal regulations governing the use of Internet filtering software need to be modified to include all public and school libraries, with no stipulation as to the source of funding for any particular library.
Although CIPA was passed in 2000, it did not become law until a few years later. Soon after passage, the American Library Association (ALA) filed suit in federal District Court, which ruled in 2002 that the act was unconstitutional (Carson 248). The government appealed the decision, and the Supreme Court struck down the lower court ruling and found CIPA to be constitutional in 2003 (Hansen). All of the provisions outlined in the act are now in effect, but that does not guarantee that all libraries provide filtered Internet access for children.
According to CIPA, filtering is mandated for all computers in libraries receiving two types of federal funds: E-rate and Library Services Technology Act (LSTA). E-rate funds are awarded in the form of discounts for Internet service (Carson 247). LSTA provides funds for Internet access or for the purchase of computers used for that access (Bocher 36). Libraries that do not receive either type of funding are not required to comply with CIPA provisions. Some libraries have actually made the decision to withdraw from federal funding programs in order to remain exempt from CIPA constraints, citing the added financial burden or their reluctance to restrict free information access (Bocher 36). As a result, it is difficult for library patrons to know what can be accessed on the public computers at any particular library. Congress attempted to solve that dilemma by requiring that libraries have a written Internet safety policy, and hold public meetings to review that policy (Boss 1). Written policies should cover exactly what level of filtering will be in place, and the steps necessary to request blocking or unblocking of sites.
Technology consultant Bob Bocher explains that specific content that must be blocked under CIPA is limited to "visual depictions that 1) are obscene, 2) contain child pornography, or 3) are harmful to minors" (36). These terms are defined in CIPA or other federal statutes (Bocher 36). The fact that only images are addressed by the law, and not text, means that children may still be exposed to a great deal of inappropriate content. One crucial aspect of CIPA is the requirement that adult patrons may request that sites be unblocked or filtering turned off without explanation (Bocher 37). Children walking by unfiltered computers may be exposed to very graphic images. Libraries have many different options and technologies available to address the issue, but no method guarantees the complete safety of children.
The technology required for filtering works primarily through the use of either a network firewall or a proxy server. Only a network administrator can change firewall filter settings. Computer users, including children, can adjust proxy filter settings (McCarthy 9). Simple filters may block Web sites that contain predetermined words or phrases (Jost 469). Content filters use rules to screen sites, and are subject to the limitations of the person or group writing the rules (McCarthy 9). Filters are designed to block material deemed offensive or inappropriate, but the inadvertent blocking of legitimate information (over blocking) is a major drawback. After an exhaustive review of large studies and separate tests of commercially available blocking software, the Brennan Center for Justice at New York University School of Law issued a public policy report detailing their findings. The revised second edition, published in 2006, concluded "[f]ilters provide a false sense of security, while blocking large amounts of important information in an often irrational or biased way" (Heins ii). Consumer Reports tested filtering software in 2005, and found similar results. They conclude, "while Internet blockers have gotten better at blocking pornography, the best also tend to block many sites they shouldn't" (ConsumerReports.org). Libraries are faced with a complex and difficult decision.
The Intellectual Freedom Committee of the ALA published a "Statement on Library Use of Filtering Software" in 1997, which was revised in 2000, attempting to provide some guidance for all libraries, whether they filter voluntarily, or as a result of CIPA regulations. The statement lists eleven problems associated with filtering software, and seven things that libraries can do to address those problems (ala.org: Statement). The position of the ALA has a great deal of influence over policies enacted by public libraries, and they remain steadfastly against filtering. In their "Core Values of Librarianship" statement they address the topic of access, stating that "[a]ll information resources that are provided directly or indirectly by the library, regardless of technology, format, or methods of delivery, should be readily, equally, and equitably accessible to all library users" (ala.org: Core Values). They make no distinction regarding the age of the library user, and recommend that libraries apply the lowest level of filtering possible to conform to CIPA guidelines (ala.org: Toolkit). One of the "Key Messages" in the ALA Internet Toolkit states: "The only lifelong Internet protection for children is to teach them to use the Internet properly and to teach them to be information literate, so they can make informed choices" (ala.org). That is a lofty goal, but in reality, children are not mature enough to surf the Internet with no boundaries in place. Libraries serving children, and especially school libraries, are under constant to protect children.
Schools answer to their school board members and parents, and frequently come under fire for under blocking, or not preventing access to inappropriate materials, and also for over blocking, or preventing access to sites with genuine research value (Johnson 40). More and more librarians, as well as teachers, have begun to realize that filtering software is not able to block all inappropriate content, and is just as likely to prevent access to material that should not have been blocked at all. Each school community must identify the reasons for their filtering decisions. A survey conducted by Ann Curry and Ken Haycock for School Library Journal in 2001 concluded that librarians' main reasons for filtering included "the role of the school library, uneasiness about personal liability, frustration with the amount of time they were spending monitoring students' Web searching, and concerns about student safety" (Curry 42). Those are all valid concerns, and rapidly changing technology makes it imperative that libraries continue to review the use and reliability of the software they choose.
The effectiveness of filters is improving, but their use continues to be hotly debated. One of the conclusions reached by the authors of the Brennan Public Policy Report is that "Internet filters are powerful, often irrational, censorship tools" (Heins 73). Many librarians cringe at the mention of censorship, but most agree that children must be protected against exposure to inappropriate materials. Selection policies for libraries determine what items will or will not be included in the library collection. Filtering attempts to do the same thing. According to Mark Smith in his Internet Policy Handbook for Libraries, "Selection is about deciding what goes into the library, filtering is the process of deciding what stays out of the library" (79). Librarians are generally not making those decisions. Developers of filtering software are marketing to libraries everywhere, and the filters are not able to evaluate sites or information. They can only mechanically search for keywords, phrases, images, or site addresses, and will block everything conforming to the criteria built into the software application. Web pages are created at a phenomenal rate, and no software provider has the time or resources to evaluate every single one. Parents, teachers, and librarians have no way of knowing in advance if a child is going to have a positive experience when using the Internet.
Two steps should be taken to improve the situation. First, legislation should be drafted that will expand CIPA to include all public and school libraries. According to Nancy Kranich, former president of the ALA, the current legislation "force[s] libraries in economically disadvantaged areas to use already scarce resources to install expensive and unreliable filtering technologies or lose vital federal funds they need..."(Jost 481). Funding should not be used to blackmail libraries. Second, filtering requirements should be standardized for public and school libraries in order to reassure parents and teachers that children will be protected when accessing information on public computers. As outspoken as the ALA has been on the subject of freedom of access to information, they admit the need for additional measures to protect children, and their "Internet Toolkit" includes several pages of recommendations to help libraries deal with the issue (ala.org: Toolkit 6-9). Consumer Reports testing showed that even the worst filter successfully blocked 88 percent of the access to pornography (ConsumerReports.org). That seems worth the effort. No filter will be 100 percent effective, and educating users about safety will remain a high priority. The Internet will continue to see increased use in the immediate future, and it is up to responsible adults to ensure that our children have positive experiences in their quests for knowledge.

Draft #2:

Children and the Internet

The teacher and librarian were both shocked when they discovered a third-grade student using a computer to play games on Playboy.com. They had mistakenly assumed that the Internet filter would automatically block access to the site. One reason for this assumption may be the current law that governs the use of Internet filtering software on computers used by children in public and school libraries. Congress passed the Children’s Internet Protection Act (CIPA) in December of 2000 (Carson 248). Soon after passage, the American Library Association (ALA) filed suit in federal District Court, which ruled in 2002 that the act was unconstitutional (Carson 248). The government appealed the decision, and the Supreme Court struck down the lower court ruling and found CIPA to be constitutional in 2003 (Hansen). All of the provisions outlined in the act are now in effect, but that does not guarantee that all libraries provide filtered Internet access for children. Unfortunately, the provisions of the Act do not pertain to all libraries, and the specific content that must be restricted or blocked is limited (Bocher 36). The result is that children are not as safe as many parents and teachers have been led to believe. To better protect our children, the law should be changed to include all public and school libraries, with minimum standards outlined for identifying content that should be blocked. (Intro) (Main point)
According to CIPA, filtering is only mandated for computers in libraries receiving two types of federal funds: E-rate and Library Services Technology Act (LSTA). E-rate funds are awarded in the form of discounts for Internet service (Carson 247). LSTA provides funds for Internet access or for the purchase of computers used for that access (Bocher 36). Libraries that do not receive either type of funding are not required to comply with CIPA provisions. Some libraries have actually made the decision to withdraw from federal funding programs in order to remain exempt from CIPA constraints, citing the added financial burden or their reluctance to restrict free information access (Bocher 36). As a result, it is difficult for library patrons to know what can be accessed on the public computers at any particular library. Congress attempted to solve that dilemma by requiring that libraries have a written Internet safety policy, and hold public meetings to review that policy (Boss 1). That “solution” only helps people who have the time and inclination to discover what those policies are, and even then, they may be unable to understand the technical aspects of filtering.
Technology consultant Bob Bocher explains that specific content that must be blocked under CIPA is limited to "visual depictions that 1) are obscene, 2) contain child pornography, or 3) are harmful to minors" (36). These terms are defined in CIPA or other federal statutes (Bocher 36). The fact that only images are addressed by the law, and not text, means that children may still be exposed to a great deal of inappropriate content. In addition, one crucial aspect of CIPA is the requirement that adult patrons may request that sites be unblocked or filtering turned off (Bocher 37). As a result, children walking past unfiltered computers may be exposed to very graphic images. Placement of adult computers away from high-traffic areas is one way to reduce this exposure. Libraries also have other options and technologies available to address the issue, but no method guarantees the complete safety of children.
The technology required for filtering works primarily through the use of either a network firewall or a proxy server. Only a network administrator can change firewall filter settings. Computer users, including children, can adjust proxy filter settings (McCarthy 9). Simple filters may block Web sites that contain predetermined words or phrases (Jost 469). Content filters use rules to screen sites, and are subject to the limitations of the person or group writing the rules (McCarthy 9). Filters are designed to block material deemed offensive or inappropriate, but the inadvertent blocking of legitimate information (over blocking) is a major drawback. After an exhaustive review of large studies and separate tests of commercially available blocking software, the Brennan Center for Justice at New York University School of Law issued a public policy report detailing their findings. The revised second edition, published in 2006, concluded "Filters provide a false sense of security, while blocking large amounts of important information in an often irrational or biased way" (Heins ii). Consumer Reports tested filtering software in 2005, and found similar results. They conclude, "while Internet blockers have gotten better at blocking pornography, the best also tend to block many sites they shouldn't" (ConsumerReports.org). Libraries are faced with a complex and difficult decision.

The Intellectual Freedom Committee of the ALA published a "Statement on Library Use of Filtering Software" in 1997, which was revised in 2000, attempting to provide some guidance for all libraries, whether they filter voluntarily, or as a result of CIPA regulations. The statement lists eleven problems associated with filtering software, and seven things that libraries can do to address those problems (ala.org: Statement). The position of the ALA has a great deal of influence over policies enacted by public libraries, and they remain steadfastly against filtering. In their "Core Values of Librarianship" statement they address the topic of access, stating that "[a]ll information resources that are provided directly or indirectly by the library, regardless of technology, format, or methods of delivery, should be readily, equally, and equitably accessible to all library users" (ala.org: Core Values). They make no distinction regarding the age of the library user, and recommend that libraries apply the lowest level of filtering possible to conform to CIPA guidelines (ala.org: Toolkit). One of the "Key Messages" in the ALA Internet Toolkit states: "The only lifelong Internet protection for children is to teach them to use the Internet properly and to teach them to be information literate, so they can make informed choices" (ala.org). That is a lofty goal, but in reality, children are not mature enough to surf the Internet with no boundaries in place. Libraries serving children, and especially school libraries, are under constant scrutiny regarding the measures they employ to protect children.
Schools answer to their school board members and parents, and frequently come under fire for under blocking, or not preventing access to inappropriate materials, and also for over blocking, or preventing access to sites with genuine research value (Johnson 40). More and more librarians, as well as teachers, have begun to realize that filtering software is not able to block all inappropriate content, and is just as likely to prevent access to material that should not have been blocked at all. Each school community must identify the reasons behind their filtering decisions. A survey conducted by Ann Curry and Ken Haycock for School Library Journal in 2001 concluded that librarians' main reasons for filtering included "the role of the school library, uneasiness about personal liability, frustration with the amount of time they were spending monitoring students' Web searching, and concerns about student safety" (Curry 42). Those are all valid concerns, and rapidly changing technology makes it imperative that libraries continue to review the use and reliability of the software they choose.
The effectiveness of filters is improving, but their use continues to be hotly debated. One of the conclusions reached by the authors of the Brennan Public Policy Report is that "Internet filters are powerful, often irrational, censorship tools" (Heins 73). Many librarians cringe at the mention of censorship, but most agree that children must be protected against exposure to inappropriate materials. Selection policies for libraries determine what items will or will not be included in the library collection. Filtering attempts to do the same thing. According to Mark Smith in his Internet Policy Handbook for Libraries, "Selection is about deciding what goes into the library, filtering is the process of deciding what stays out of the library" (79). Librarians are generally not making those decisions. Developers of filtering software are marketing to libraries everywhere, and the filters are not able to evaluate sites or information. They can only mechanically search for keywords, phrases, images, or site addresses, and will block everything conforming to the criteria built into the software application. Web pages are created at a phenomenal rate, and no software provider has the time or resources to evaluate every single one. Parents, teachers, and librarians have no way of knowing in advance if a child is going to have a positive experience when using the Internet.
Two steps should be taken to improve the situation. First, legislation should be drafted that will expand CIPA to include all public and school libraries. According to Nancy Kranich, former president of the ALA, the current legislation "force[s] libraries in economically disadvantaged areas to use already scarce resources to install expensive and unreliable filtering technologies or lose vital federal funds they need[...]"(Jost 481). Funding should not be used to blackmail libraries. Second, filtering requirements should be standardized for public and school libraries in order to reassure parents and teachers that children will be protected when accessing information on public computers. As outspoken as the ALA has been on the subject of freedom of access to information, they admit the need for additional measures to protect children, and their "Internet Toolkit" includes several pages of recommendations to help libraries deal with the issue (ala.org: Toolkit 6-9). Consumer Reports testing showed that even the worst filter successfully blocked eighty-eight percent of the access to pornography (ConsumerReports.org). That seems worth the effort.

Rapid advances in technology and information access via the World Wide Web almost guarantee that filtering will continue to be a controversial topic. Parents and teachers need to feel confident that children will be exposed to a minimal amount of inappropriate material when using the Internet for research or pleasure. The current laws must be changed to address that need. One way to ensure children’s safety is to effectively filter or block the “bad” sites, and to do it uniformly on all publicly accessible computers. Admittedly, no filter will be one hundred percent effective. Teaching children to use safe techniques for all aspects of Internet activity, including social networking, doing research, or just “surfing the Web” for pleasure, must remain a high priority in schools and libraries. Most librarians are careful about the print resources they make available for children, and should be just as concerned about electronic resources. As adults, our goal should be to do whatever we can to make access to information safe for children. Technology may change the situation, but for right now, effective filtering, applied uniformly, is one way to achieve that goal. (Conclusion) (Main point)

Saturday, November 10, 2007

D#12,HW#1 Reading Reflection

Chapter 12 in Everything's an Argument has good examples of different styles used by writers to reach their intended audience. I don't remember learning the term "tropes" before, but I am familiar with metaphor, simile, and analogy in writing. I also like the authors' description of hyperbole as "pyrotechnics in prose" (384).
Chapter 15 in Bedford should be especially helpful as I begin revising my WP3. The "Revision" tab in Google documents lets you restore versions of the document as it existed before changes, which allows you to "save multiple drafts" (200). The "Strategies for Challenging Your Argument, Ideas, and Evidence" (201) will help me draft the versions required for HW2 and HW3. It seems like too much work for just a couple of homework points, but I know it will improve my final WP3 that I submit.
Finally, Chapter 16 went into great detail about different design possibilities for writing. I am anxious to play around in Google documents to see what can be done. I really dislike the way it fills the page with text in standard format.

Thursday, November 8, 2007

D#11,HW#3 Deadline Reflection

I agree with other posts that this week was light. It was nice to be able to get caught up on other classwork. Looking ahead to D#12, it will make up for it.
The papers are looking good, but all of our annotated bibliographies need work. It will be interesting to see the peer reviews next week.
I posted comments on the following blogs:

"Deadline #11 HW #2 2x Introductions and Conclusions" Justin
"D11HW3 Deadline Reflection" Stephann
"D#11 HW#2, Intro's and Conclusions" Coralee

Tuesday, November 6, 2007

D#11,HW#2 Intros/Conclusions

This assignment really made me think about the way I am presenting information in my paper. I used the methods suggested in the text to revise my intro and conclusion a couple of different ways.

Original intro (Defining a problem)

Several years ago, there was public controversy over a book titled, Why Johnny Can't Read. Now, the controversy has become, "What Johnny is Viewing on his Computer Screen." Many parents believe that their children are protected against exposure to inappropriate content when those children use computers at school and in public libraries, but that is not necessarily true. While Internet filtering and blocking software has been installed on many public and school computers, the effectiveness of that software is constantly being challenged. Congress attempted to address the issue when it passed the Children's Internet Protection Act (CIPA) in December 2000 (Carson 248). Unfortunately, the provisions of this law do not pertain to all libraries, and the content that must be restricted is limited (Bocher 36). The result is that children are not as safe as many parents have been led to believe. Federal regulations governing the use of Internet filtering software need to be modified to include all public and school libraries, with no stipulation as to the source of funding for any particular library.

Revision 1 (Defining the argument)

Federal regulations governing the use of Internet filtering software need to be modified to include computers in all public and school libraries, regardless of the sources of funding used by those libraries. The laws that currently apply do not go far enough to protect children from inappropriate or undesirable content. Although Internet filtering software has been installed on many public and school computers, the effectiveness of that software is far from ideal. Congress attempted to address the issue when it passed the Children’s Internet Protection Act (CIPA) in December of 2000 (Carson 248). Unfortunately, the provisions of the Act do not pertain to all libraries, and the content that must be restricted is limited (Bocher 36). The result is that children using public or school computers may not be as safe as parents and teachers may have been led to believe.

Revision 2 (Tell a story)

The teacher and librarian were both shocked when they discovered a third-grade student using a computer to play games on Playboy.com. They did not understand why the Internet filter had not automatically blocked access to the site. One of the reasons may be the current laws that govern the use of Internet filtering software on computers used by children in public and school libraries. The federal law that applies to filtering is known as the Children’s Internet Protection Act (CIPA), which was passed in December of 2000 (Carson 248). Unfortunately, the provisions of the Act do not pertain to all libraries, and the specific content that must be restricted or blocked is limited (Bocher 36). The result is that children are not as safe as many parents and teachers have been led to believe.

Original conclusion

Two steps should be taken to improve the situation. First, legislation should be drafted that will expand CIPA to include all public and school libraries. According to Nancy Kranich, former president of the ALA, the current legislation "force[s] libraries in economically disadvantaged areas to use already scarce resources to install expensive and unreliable filtering technologies or lose vital federal funds they need[...]"(Jost 481). Funding should not be used to blackmail libraries. Second, filtering requirements should be standardized for public and school libraries in order to reassure parents and teachers that children will be protected when accessing information on public computers. As outspoken as the ALA has been on the subject of freedom of access to information, they admit the need for additional measures to protect children, and their "Internet Toolkit" includes several pages of recommendations to help libraries deal with the issue (ala.org: Toolkit 6-9). Consumer Reports testing showed that even the worst filter successfully blocked 88 percent of the access to pornography (ConsumerReports.org). That seems worth the effort. No filter will be 100 percent effective, and educating users about safety will remain a high priority. The Internet will continue to see increased use in the immediate future, and it is up to responsible adults to ensure that our children have positive experiences in their quests for knowledge.

Revision 1 (Summarize the argument)

Rapid advances in technology and information access via the World Wide Web almost guarantee that filtering will continue to be a controversial topic. Parents and teachers need to feel confident that children will be exposed to a minimal amount of inappropriate material when using the Internet for research or pleasure. The current laws need to be changed to address that need. One way to ensure children’s safety is to effectively filter or block the “bad” sites, and to do it uniformly on all publicly accessible computers. Admittedly, no filter will be 100 percent effective. Teaching children to use safe techniques for all aspects of Internet use, including social networking, doing research, or just “surfing the Web” for pleasure, must remain a high priority in schools and libraries. Libraries are careful about the print resources they make available for children, and should be just as concerned about electronic resources. As adults, our goal should be to do whatever we can to make access to information safe for children. Technology may change, but for right now, effective filtering is one way to achieve that goal.

Revision 2 (Speculate about the future)

Technology is advancing at a phenomenal rate, and the software used to filter Internet access will undoubtedly continue to see improvement. Perhaps the day will arrive when computers will be “smart” enough to filter content according to the age of the user. Until then, responsible adults must rely upon the capabilities of the filtering software available. Those adults should insist that the law be changed to include all public and school libraries that offer Internet access for children. Only then will it be reasonable to expect a basic level of safety for children surfing the World Wide Web.

Sunday, November 4, 2007

D#11,HW#1 Reading Reflection

The chapter readings this week were mostly review, but as I read I thought of things that I need to watch out for in my WP#3. A couple of things that were helpful to me were the samples of in-text documentation on the Bedford "Works Cited" tutorial, and the explanations of paraphrasing in the text and online. I definitely need to check my writing projects to make sure I am using my own words to paraphrase something from an outside source.
Drafting new introductions and conclusions will help ensure that I am making my point correctly with my thesis statement, and should give me additional insight about other revisions that may be needed.

Thursday, November 1, 2007

D#10,HW#7 Deadline reflection

It is such a relief to be finished with my rough draft! The process of working through all of the sources, notes, and outlines was a challenge. I didn't end up following the original outline, or using some of the sources that I thought I would. I can already think of a couple of points I didn't include, but will fix that in the final. Judging by the lack of other postings this late on Thursday, I was not the only one who was stressed out this week. I was lucky, though. We had AIMS testing in the library 3 days this week, so I was able to work quietly for several hours. It made a big difference.
The homework for this week said to comment on 2 essay analyses and 1 Toulmin outline. We pretty much covered the essay analysis in class with Devon.

I posted a comment on Justin's Blog:

"Deadline #9 HW #4 Toulmin Method

Now that Devon has posted some additional comments on his blog, I guess I am not as finished as I thought. Since the MCC page is apparently down, and I can't get to my mail to get to the documents, I guess I will be trying to add the annotations this weekend. So much for my half-day off.

D#10,HW#6 Grammar

Now that my draft is finished, I went back through and looked at some particular issues that I need to work on. The first two were grammar reviews:

http://owl.english.purdue.edu/owl/resource/574/02/ Transitional Devices

http://owl.english.purdue.edu/owl/resource/623/01/ Parallel Structure

I will make changes needed to the Google document itself.

D#10,HW#5 Paragraphs

Blue = Intro

Yellow = Paraphrasing or quotation

Purple = In-text citation

Although CIPA was passed in 2000, it did not become law until a few years later. Soon after passage, the American Library Association (ALA) filed suit in federal District Court, which ruled in 2002 that the act was unconstitutional (Carson 248). The government appealed the decision, and the Supreme Court struck down the lower court ruling and found CIPA to be constitutional in 2003 (Hansen). All of the provisions outlined in the act are now in effect, but that does not guarantee that all libraries provide filtered Internet access for children.

Technology consultant Bob Bocher explains that specific content that must be blocked under CIPA is limited to "visual depictions that 1) are obscene, 2) contain child pornography, or 3) are harmful to minors" (36). These terms are defined in CIPA or other federal statutes (Bocher 36). The fact that only images are addressed by the law, and not text, means that children may still be exposed to a great deal of inappropriate content. One crucial aspect of CIPA is the requirement that adult patrons may request that sites be unblocked or filtering turned off without explanation (Bocher 37). Children walking by unfiltered computers may be exposed to very graphic images. Libraries have many different options and technologies available to address the issue, but no method guarantees the complete safety of children.

My bibliographic citations are at the bottom of the Google document.

I have not revised either paragraph yet. Any suggestions?

D#10,HW#4 Turnitin

No longer required.

D#10,HW#3 WP#3

Finally!
Kathy Lacey
WP#3 Draft
Eng 102-7891
1 Nov. 2007

Internet Filtering

Several years ago, there was public controversy over a book titled, Why Johnny Can't Read. Now, the controversy has become, "What Johnny is Viewing on his Computer Screen." Many parents believe that their children are protected against exposure to inappropriate content when those children use computers at school and in public libraries, but that is not necessarily true. While Internet filtering and blocking software has been installed on many public and school computers, the effectiveness of that software is constantly being challenged. Congress attempted to address the issue when it passed the Children's Internet Protection Act (CIPA) in December 2000 (Carson 248). Unfortunately, the provisions of this law do not pertain to all libraries, and the content that must be restricted is limited (Bocher 36). The result is that children are not as safe as many parents have been led to believe. Federal regulations governing the use of Internet filtering software need to be modified to include all public and school libraries, with no stipulation as to the source of funding for any particular library.
Although CIPA was passed in 2000, it did not become law until a few years later. Soon after passage, the American Library Association (ALA) filed suit in federal District Court, which ruled in 2002 that the act was unconstitutional (Carson 248). The government appealed the decision, and the Supreme Court struck down the lower court ruling and found CIPA to be constitutional in 2003 (Hansen). All of the provisions outlined in the act are now in effect, but that does not guarantee that all libraries provide filtered Internet access for children.
According to CIPA, filtering is mandated for all computers in libraries receiving two types of federal funds: E-rate and Library Services Technology Act (LSTA). E-rate funds are awarded in the form of discounts for Internet service (Carson 247). LSTA provides funds for Internet access or for the purchase of computers used for that access (Bocher 36). Libraries that do not receive either type of funding are not required to comply with CIPA provisions. Some libraries have actually made the decision to withdraw from federal funding programs in order to remain exempt from CIPA constraints, citing the added financial burden or their reluctance to restrict free information access (Bocher 36). As a result, it is difficult for library patrons to know what can be accessed on the public computers at any particular library. Congress attempted to solve that dilemma by requiring that libraries have a written Internet safety policy, and hold public meetings to review that policy (Boss 1). Written policies should cover exactly what level of filtering will be in place, and the steps necessary to request blocking or unblocking of sites.
Technology consultant Bob Bocher explains that specific content that must be blocked under CIPA is limited to "visual depictions that 1) are obscene, 2) contain child pornography, or 3) are harmful to minors" (36). These terms are defined in CIPA or other federal statutes (Bocher 36). The fact that only images are addressed by the law, and not text, means that children may still be exposed to a great deal of inappropriate content. One crucial aspect of CIPA is the requirement that adult patrons may request that sites be unblocked or filtering turned off without explanation (Bocher 37). Children walking by unfiltered computers may be exposed to very graphic images. Libraries have many different options and technologies available to address the issue, but no method guarantees the complete safety of children.
The technology required for filtering works primarily through the use of either a network firewall or a proxy server. Only a network administrator can change firewall filter settings. Computer users, including children, can adjust proxy filter settings (McCarthy 9). Simple filters may block Web sites that contain predetermined words or phrases (Jost 469). Content filters use rules to screen sites, and are subject to the limitations of the person or group writing the rules (McCarthy 9). Filters are designed to block material deemed offensive or inappropriate, but the inadvertent blocking of legitimate information (over blocking) is a major drawback. After an exhaustive review of large studies and separate tests of commercially available blocking software, the Brennan Center for Justice at New York University School of Law issued a public policy report detailing their findings. The revised second edition, published in 2006, concluded "[f]ilters provide a false sense of security, while blocking large amounts of important information in an often irrational or biased way" (Heins ii). Consumer Reports tested filtering software in 2005, and found similar results. They conclude, "while Internet blockers have gotten better at blocking pornography, the best also tend to block many sites they shouldn't" (ConsumerReports.org). Libraries are faced with a complex and difficult decision.
The Intellectual Freedom Committee of the ALA published a "Statement on Library Use of Filtering Software" in 1997, which was revised in 2000, attempting to provide some guidance for all libraries, whether they filter voluntarily, or as a result of CIPA regulations. The statement lists eleven problems associated with filtering software, and seven things that libraries can do to address those problems (ala.org: Statement). The position of the ALA has a great deal of influence over policies enacted by public libraries, and they remain steadfastly against filtering. In their "Core Values of Librarianship" statement they address the topic of access, stating that "[a]ll information resources that are provided directly or indirectly by the library, regardless of technology, format, or methods of delivery, should be readily, equally, and equitably accessible to all library users" (ala.org: Core Values). They make no distinction regarding the age of the library user, and recommend that libraries apply the lowest level of filtering possible to conform to CIPA guidelines (ala.org: Toolkit). One of the "Key Messages" in the ALA Internet Toolkit states: "The only lifelong Internet protection for children is to teach them to use the Internet properly and to teach them to be information literate, so they can make informed choices" (ala.org). That is a lofty goal, but in reality, children are not mature enough to surf the Internet with no boundaries in place. Libraries serving children, and especially school libraries, are under constant to protect children.
Schools answer to their school board members and parents, and frequently come under fire for under blocking, or not preventing access to inappropriate materials, and also for over blocking, or preventing access to sites with genuine research value (Johnson 40). More and more librarians, as well as teachers, have begun to realize that filtering software is not able to block all inappropriate content, and is just as likely to prevent access to material that should not have been blocked at all. Each school community must identify the reasons for their filtering decisions. A survey conducted by Ann Curry and Ken Haycock for School Library Journal in 2001 concluded that librarians' main reasons for filtering included "the role of the school library, uneasiness about personal liability, frustration with the amount of time they were spending monitoring students' Web searching, and concerns about student safety" (Curry 42). Those are all valid concerns, and rapidly changing technology makes it imperative that libraries continue to review the use and reliability of the software they choose.
The effectiveness of filters is improving, but their use continues to be hotly debated. One of the conclusions reached by the authors of the Brennan Public Policy Report is that "Internet filters are powerful, often irrational, censorship tools" (Heins 73). Many librarians cringe at the mention of censorship, but most agree that children must be protected against exposure to inappropriate materials. Selection policies for libraries determine what items will or will not be included in the library collection. Filtering attempts to do the same thing. According to Mark Smith in his Internet Policy Handbook for Libraries, "Selection is about deciding what goes into the library, filtering is the process of deciding what stays out of the library" (79). Librarians are generally not making those decisions. Developers of filtering software are marketing to libraries everywhere, and the filters are not able to evaluate sites or information. They can only mechanically search for keywords, phrases, images, or site addresses, and will block everything conforming to the criteria built into the software application. Web pages are created at a phenomenal rate, and no software provider has the time or resources to evaluate every single one. Parents, teachers, and librarians have no way of knowing in advance if a child is going to have a positive experience when using the Internet.
Two steps should be taken to improve the situation. First, legislation should be drafted that will expand CIPA to include all public and school libraries. According to Nancy Kranich, former president of the ALA, the current legislation "force[s] libraries in economically disadvantaged areas to use already scarce resources to install expensive and unreliable filtering technologies or lose vital federal funds they need..."(Jost 481). Funding should not be used to blackmail libraries. Second, filtering requirements should be standardized for public and school libraries in order to reassure parents and teachers that children will be protected when accessing information on public computers. As outspoken as the ALA has been on the subject of freedom of access to information, they admit the need for additional measures to protect children, and their "Internet Toolkit" includes several pages of recommendations to help libraries deal with the issue (ala.org: Toolkit 6-9). Consumer Reports testing showed that even the worst filter successfully blocked 88 percent of the access to pornography (ConsumerReports.org). That seems worth the effort. No filter will be 100 percent effective, and educating users about safety will remain a high priority. The Internet will continue to see increased use in the immediate future, and it is up to responsible adults to ensure that our children have positive experiences in their quests for knowledge.

Works Cited:


Bocher, Bob. "A CIPA Toolkit." Library Journal 128.13 (2003): 36-37. Education Research Complete. EBSCO. Mesa Community Coll., Paul A. Elsner Lib., Mesa, AZ. 17 Sept. 2007 <http://ezp.mc.maricopa.edu:2048/login?url=http://search.ebscohost.com/login.aspx?direct=true&db=ehh&AN=10566884&site=ehost-live>.


Boss, Richard. "Meeting CIPA Requirements With Technology." ala.org. 14 Apr. 2004. American Library Association. 10 Sept. 2007 <http://www.ala.org/ala/pla/plapubs/technotes/internetfiltering.cfm>.



Carson, Bryan. The Law of Libraries and Archives. Lanham, MD: Scarecrow Press, 2007. 247-260.


ConsumerReports.org. June 2005. Consumers Union of U.S., Inc. 30 Oct. 2007 <http://www.consumerreports.org/cro/cu-press-room/pressroom/archive/2005/06/eng0506sof.htm?resultPageIndex=1&resultIndex=2&searchTerm=internet%20filters>.


"Core Values of Librarianship." ala.org. 29 June 2004. American Library Association. 30 Oct. 2007 <http://www.ala.org/ala/oif/statementspols/corevaluesstatement/corevalues.htm>.


Curry, Ann, and Ken Haycock. "Filtered or Unfiltered?" School Library Journal 47.1 (2001): 42-42. ERIC. EBSCO. Mesa Community Coll., Paul A. Elsner Lib., Mesa, AZ. 12 Sept. 2007 <http://ezp.mc.maricopa.edu:2048/login?url=http://search.ebscohost.com/login.aspx?direct=true&db=eric&AN=EJ625144&site=ehost-live>.


Hansen, Chris, and Ann Beeson. "Library Filtering After US v. ALA: What Does it All Mean and What Should We Do." aclu.org. 1 Aug. 2003. American Civil Liberties Union. 5 Oct. 2007 <http://www.aclu.org/privacy/speech/14938res20030801.html>.


Heins, Marjorie, Christina Cho, and Ariel Feldman. "Internet Filters: A Public Policy Report." 2nd ed. 2006. Brennan Center for Justice at NYU School of Law. 5 Oct. 2007 <http://www.fepproject.org/policyreports/filters2.pdf>.


Johnson, Doug. "Maintaining Intellectual Freedom in a Filtered World." Learning and Leading with Technology 32.8 (2005): 39. ERIC. EBSCO. Mesa Community Coll., Paul A. Elsner Lib., Mesa, AZ. 1 Oct. 2007 <http://ezp.mc.maricopa.edu:2048/login?url=http://search.ebscohost.com/login.aspx?direct=true&db=eric&AN=EJ697382&site=ehost-live>.


Jost, Kenneth. "Libraries and the Internet." The CQ Researcher 11.21 (2001): 465-88. CQ Researcher. CQ Press. Mesa Community Coll., Paul A. Elsner Lib., Mesa, AZ. 2 Sept. 2007 <http://library.cqpress.com/cqresearcher/cqresrre2001060100>.


"Libraries & the Internet Toolkit." ala.org. 9 Dec. 2003. American Library Association. 30 Oct. 2007 <http://www.ala.org/alaorg/oif/internettoolkit.html>.


McCarthy, David. "Internet Filtering for Schools - An Update." Media & Methods 41.6 (2005): 9-11. Education Research Complete. EBSCO. Mesa Community Coll., Paul A. Elsner Lib., Mesa, AZ. 12 Sept. 2007 .


Smith, Mark. "Filtering Considerations." Neal-Schuman Internet Policy Handbook for Libraries. New York: Neal-Schuman, 1999. 75-98.


"Statement on Library Use of Filtering Software." ala.org. 17 Nov. 2000. American Library Association. 10 Oct. 2007 <http://www.ala.org/ala/oif/statementspols/ifresolutions/statementlibrary.htm>.