Web content filtering for Educational & Business Organization: A Review
Journal Title: International Journal for Research in Applied Science and Engineering Technology (IJRASET) - Year 2014, Vol 2, Issue 7
Abstract
In the recent years, we have witnessed an impressive growth of on-line information and resources. The selfregulating nature of Web publishing, along with the ease of making information available on the Web, has allowed that some publishers make offensive, harmful or even illegal contents present in Web sites across the world. There are many different reasons you would want to block certain content from users. One popular example is having internet access at work place; another is making sure students at schools of all type do not go to inappropriate sites that are prohibited in the school policy. According to Mr. Navneet (Researcher & web expert) and Ms. Barkha, Content filtering is the only suitable solutions to all such problems. It is the process of removing certain (illegal, not suitable contents as per requirement) content from the web before it gets to the user that requested. Actually this content filters blocking access from potentially objectionable, offensive, or irrelevant subject as per their setting.There are lots of sites that you might want to filter out. The most popular is pornography and some others are chat, email, games, personal; guns, bombs, news, advertisements etc. This paper will discuss the problem area which identified absence of web filters, solutions analysis, needs for web filtering, and related to some best tools & technique. It also shows how filtering content can be helpful to raise productivity in school, college, jobs and other business organization.
Authors and Affiliations
Navneet Kumar, Barkha Narang
Implementation of Banking Support System Using Naive Bayes Algorithm
Earlier the bank had a system called Banking Support Centre(BSC). The BSC system is also called as Standard Bancs Link(SBL). The objective of this project is to allow building a low maintenance web based system that is...
Improving Security Rate with Cognitive Radio Networks Using Cooperative Secure Resource Allocation
A secure communication in cognitive radio networks, where the secondary users are allowed to access the spectrum of the primary users as long as they preserve the secure communication of PU in the presence of malicious...
Data Hiding Using Block Based Mosaic Images in Video
In today’s modern world the digital technologies have helped peoples to exchange data on large due to availability of fast internet connectivity it has become very easy to exchange data. The security, integrity and reli...
Design and Implementation of WIFI Based PC and Mobile Control
For the users, needing to switch continuously between their mobile and PC, it is not so easy to constantly access their phones at work. As a solution to such a problem this application lets one to manage messages, manag...
Fine Grained Interference and Deadline Aware Scheduling For Data-Intensive Applications in Virtualized Environments
Nowadays many of the organization make use of virtualized environment of cloud computing to improve their resource sharing. When sharing the resources for task scheduling particularly for data intensive applications int...