Media accessibility via internet is rapidly increasing within the last decade. Reaching every kind of data,including media content have become easier due to the widespread internet access and fastly improving technologies, especially mobile devices. Likewise providers have found an opportunity to reach the user faster and easier than before. Although benefits of improvement of internet technologies are inestimable,
technologies can also bring risks. Nowadays communication technologies help not only reaching information but also harmful content which is harmful for the minors, usually for people under specific age. Lots of scientific researches shows us that these harmful contents such as pornography and violence have impairable effects on growing of minors.
Such undesirable minors' contact with harmful contents necessitates some new regulations on providing content in internet. Luckily, there are already some public institutions, nongovernmental organizations working towards protecting minors from harmful media content. For the case study about harmful content regulations and minors protection.
German regulations and laws against harmful content, especially pornography, have lots of similarities with other western countries. For example age limit regulations up to 16 or 18 years for buying pornographic content or time scheduling for softcore broadcasting like after 22:00 or 23:00. But pornographic and any other adult materials web-casting has very strict rules in Germany compared to other EU countries. German media laws made to reach harmful material in internet very hard for children and adolescents via unique web-casting regulations without national level censorship like in China, Iran or North Korea.
[...] KJM has no enforcement on the providers to make them use specific system for Closed User Groups. Nevertheless KJM has a competence to positively evaluate new technologies, assessing and licensing encryption and blocking technologies and certifying technical systems, as it is done in the case of Closed User Gropus. KJM is ensuring it is proper usage Closed User Groups through Age Verification System that I am describing and presenting next Age Verification System Age Verification System (AVS) also known as Adult Verification System is a computing system used by a website to confirm the information about the user attempting to access their website . [...]
[...] Firstly due to the globalization and new technologies, media contents crossovered all possibel protection borders. Next, enormous amount of media content, and the electronic crossborder transmission paths are made very difficult to generate effective control mechanisms. After rapidly growth media technologies such as internet and mobile devices, media laws like JMStV plays a very important role for protecting of minors in harmful media . For protecting minors besides the pedagogic measures tecnical measures are as well extremely important. Due to technological improvement in media, JMStV and its technical procedures became inseparable part of the protecting of minors Interstate Treaty on the Protection of Human Dignity and the Protection of Minors in Broadcasting and in Telemedia - JMStV JMStV is a Interstate Treaty on the Protection of Human Dignity and the Protection of Minors in Broadcasting and in Telemedia. [...]
[...] The content is defined in Article 86 of the German Criminal Code as Dissemination of propaganda material of unconstitutional organizations. Using insignia of organizations which are prohibited under the German Constitution as defined in Article 86a of the German Criminal Code. The German Criminal Code in 86a outlaws "use of symbols of unconstitutional organizations". This concerns Nazi symbolism in particular and is the part of denazification efforts following the fall of the Third Reich. The law prohibits the distribution or public use 1 of symbols of unconstitutional groups, in particular, flags, insignia, uniforms, slogans and forms of greeting. [...]
[...] However, onetime PIN procedures are sufficient where there is a copy-protected usable hardware to generate or receive only once access permissions. Identification of the terminal: Here the computer itself or the output device for protection against multiplication and dissemination of credentials is used (e.g., query the processor ID). By an appropriate combination of access software and hardware of the terminal with sufficient safety can be ensured, so that access is authorized and a single terminal can be used. Solution Version Subjective difficulty of unauthorized use of access privileges in the sphere of the user (risk reduction the Transmission) RISK SOLUTION: The risk that the authorized user's access privileges to itself passes unauthorized party can be reduced, that the user thereby can occur significant material or immaterial disadvantages. [...]
[...] In both cases, the access to closed user group must be enabled, when each process is completed successfully. A preliminary validation of the access (so-called "Trial Access") is not accepted. The JMStV contains no recognition procedure for closed user groups or AV Systems. Therefore, the KJM developed a process for positive evaluation that is the concepts of the related companies or providers. This serves to improve the protection of minors on the Internet and also provides a service for the provider for more legal and planning security. [...]
APA Style referenceFor your bibliography
Online readingwith our online reader
Content validatedby our reading committee