Skip to main content
Log in

The digital classroom

Are you sure you want an internet filter? Virtual censorship is censorship

  • Column
  • Published:
TechTrends Aims and scope Submit manuscript

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

References

  • American Civil Liberties Union. (1997). Cyber-liberties. [online] www.aclu. org/issues/cyber/hmcl.html.

  • American Library Association. (1996). Access to electronic information, services and networks: an interpretation of the library bill of rights. [online] winslo.ohio.gov/alaacces.html.

  • Berlin, E. & Kantor, A. (1996). Who will watch the watchmen (The Surfboard).Internetworld, 7, 11, 30.

    Google Scholar 

  • Johnson, D. (1995). Emerging technologies, emerging concerns.Technology Connection, 2, 8, 50.

    Google Scholar 

  • Johnson, D. (1995). Student access to Internet.The Emergency Librarian, 22, 3, 8–12.

    Google Scholar 

  • McCullagh, D. (1997). Censorware search engine 2.0. [online] pathfinder, com/netly/spoofcentral/censored.

  • McCullagh, D. (1996). The cybersitter diaper change, [online] cgi.pathfinder. com/netly/1,1039,453,00. html.

  • McCullagh, D. (1996). The keys to the kingdom. [online] www.eff.org/pub/ Publications/Declan_McCullagh/ cwd.keys.to.the.kingdom.0796.article

  • Munro, K. (1997). Filtering utilities. PC Magazine On-line. [online] www8. zdnet.com/pcmag/features/utility/ filter/_open.htm.

  • Postman, N. (1994).The disappearance of childhood. New York: Vintage.

    Google Scholar 

  • Robinson, P. (1997). Grad school: blockers keep the net safe for child’s play. [online] www.connect-time.com/ tutorials/blockers.html.

  • Reingold, H. (1994). Why censoring cyberspace is dangerous & futile. [online] www.well.com/user/hlr/ tomorrow/tomorrowcensor.html.

  • Richtel, M. (1997). Poll: protect kids from net smut. Wired. [online] The PointCast Network. (May 13)

  • Teenagers and technology. (1997)Newsweek, 129, 17, 86.

    Google Scholar 

  • Venditto, G. (1996). Safe computing: seven programs that filter Internet access.Internet World, 7, 9, 48–58.

    Google Scholar 

  • Willard, N. (1996). A legal and educational analysis of K-12 Internet acceptable use policies. [online] www. erehwon.com/k12aup/legal_analysis. html.

  • Winner, L. (1997). Electronically implanted “values.”Technology Review, 100, 2, 69.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Doug Johnson.

Additional information

Laurie Quinlan is a communications instructor at Lakeville High School, Lakeville, Minnesota. She welcomes reader feedback on topics of interest to the classroom teacher, and would like to hear of classroom victories that can be shared with readers in subsequent columns. She can be reached at the Internet address above or through the AECT National Office in Washington, DC.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Johnson, D. The digital classroom. TECHTRENDS TECH TRENDS 43, 6–9 (1998). https://doi.org/10.1007/BF02824046

Download citation

  • Issue Date:

  • DOI: https://doi.org/10.1007/BF02824046

Keywords

Navigation