Search icone
Search and publish your papers
Our Guarantee
We guarantee quality.
Find out more!

Age verification systems and closed user groups in Germany

Or download with : a doc exchange

About the author

marketer
Level
General public
Study
management
School/University
university...

About the document

Umut d.
Published date
Language
documents in English
Format
pdf
Type
case study
Pages
20 pages
Level
General public
Accessed
0 times
Validated by
Committee Oboolo.com
0 Comment
Rate this document
  1. Introduction
  2. Overview to the protection of youth in Germany
  3. Interstate treaty on the protection of human dignity and the protection of minors in broadcasting and in telemedia - JMStV
  4. Competences of the KJM
  5. Closed user groups
  6. Age verification systems
  7. Current criteria of the KJM
  8. Concept of the plausible age verification system
  9. Conclusion

Media accessibility via internet is rapidly increasing within the last decade. Reaching every kind of data,including media content have become easier due to the widespread internet access and fastly improving technologies, especially mobile devices. Likewise providers have found an opportunity to reach the user faster and easier than before. Although benefits of improvement of internet technologies are inestimable, technologies can also bring risks. Nowadays communication technologies help not only reaching information but also harmful content which is harmful for the minors, usually for people under specific age. Lots of scientific researches shows us that these harmful contents such as pornography and violence have impairable effects on growing of minors. Such undesirable minors' contact with harmful contents necessitates some new regulations on providing content in internet. Luckily, there are already some public institutions, nongovernmental organizations working towards protecting minors from harmful media content. For the case study about harmful content regulations and minors protection. German regulations and laws against harmful content, especially pornography, have lots of similarities with other western countries. For example age limit regulations up to 16 or 18 years for buying pornographic content or time scheduling for softcore broadcasting like after 22:00 or 23:00. But pornographic and any other adult materials web-casting has very strict rules in Germany compared to other EU countries. German media laws made to reach harmful material in internet very hard for children and adolescents via unique web-casting regulations without national level censorship like in China, Iran or North Korea.

[...] KJM has no enforcement on the providers to make them use specific system for Closed User Groups. Nevertheless KJM has a competence to positively evaluate new technologies, assessing and licensing encryption and blocking technologies and certifying technical systems, as it is done in the case of Closed User Gropus. KJM is ensuring it is proper usage Closed User Groups through Age Verification System that I am describing and presenting next Age Verification System Age Verification System (AVS) also known as Adult Verification System is a computing system used by a website to confirm the information about the user attempting to access their website . [...]


[...] Firstly due to the globalization and new technologies, media contents crossovered all possibel protection borders. Next, enormous amount of media content, and the electronic crossborder transmission paths are made very difficult to generate effective control mechanisms. After rapidly growth media technologies such as internet and mobile devices, media laws like JMStV plays a very important role for protecting of minors in harmful media . For protecting minors besides the pedagogic measures tecnical measures are as well extremely important. Due to technological improvement in media, JMStV and its technical procedures became inseparable part of the protecting of minors Interstate Treaty on the Protection of Human Dignity and the Protection of Minors in Broadcasting and in Telemedia - JMStV JMStV is a Interstate Treaty on the Protection of Human Dignity and the Protection of Minors in Broadcasting and in Telemedia. [...]


[...] alive detection and sufficient image quality are required to ensure that it is a real person sitting in front of the camera and to current possibilities of circumvention to exclude for example by films or rehearsed masking. Doubts who are given by the appearance, behavior and statements of the impression that it might be a minor, must be cleared by checking of both side of the ID card of the user. If there are still doubts the user is not allowed to access to the content. If the user is not clearly of age, an additional identification test by ID card must be carried out. [...]


[...] Likewise providers have found an opportunity to reach the user faster and easier than before. Although benefits of improvement of internet technologies are inestimable, technologies can also bring risks. Nowadays communication technologies help not only reaching information but also harmful content which is harmful for the minors, usually for people under pecific age. Lots of scientific researches shows us that these harmful contents such as pornography and violence have impairable effects on growing of minors. Such Undesirable minors' contact with harmful contents necessitates some new regulations on providing content in internet. [...]


[...] The dissemination safety can be either realized through technical measures for complicating the multiplication (Solution Option hardware solution / Unique Identifier solution) or by personal risks in the sphere of the user (Solution Version Risk-solution) Solution Option Possible control measures for complicating multiplication of access permissions HARDWARE or UNIQUE IDENTIFIER SOLUTION: Testing of biometric data: access to closed user group can only get identified users (then on biometrics such as fingerprint, iris recognition to authenticate). Access permissions cannot multiplied or used by third parties, in case that in the collection of biometric data and the authentication sufficiently secure verification components are used. Active Hardware: Active hardware has (eg ID chip, SIM card) the capability that can be performed on-chip computing operations. They may be reproduced only with great effort. The access authorization (hardware + password) can be passed only sequentially each to an individual person. [...]

Top sold for management

Strategic management: Celerita Inc. case study

 Business & market   |  Management   |  Case study   |  07/09/2012   |   .doc   |   13 pages

Easy-jet's position in the low-cost carrier market: Recommendations for the best strategic plans...

 Business & market   |  Management   |  Research papers   |  06/03/2008   |   .doc   |   4 pages

Most rated for management

Conceptual models in strategic management: The Boston Consulting Group growth / share matrix

 Business & market   |  Management   |  Presentation   |  01/16/2009   |   .doc   |   9 pages

Risk management when dealing with foreign exchange (forex)

 Business & market   |  Management   |  Thesis   |  04/08/2009   |   .doc   |   77 pages