Personal Tech Pipeline | Wireless Carriers Urged To Control Mobile Porn

White Papers

Sponsor Resources

WebCasts
Free Newsletter GlossaryContact UsAbout Us
Players & CamsPhones & PDAsHome & AutoOnline

June 14, 2005

Wireless Carriers Urged To Control Mobile Porn



Courtesy of Mobile Pipeline

Wireless operators stand to profit from mobile adult content but the government will step in if they don't take significant steps to prevent minors from accessing that content, market research firm Yankee Group said Monday.

"How wireless carriers choose to respond to this growing industry concern will dictate the impact of their role with the government and within the industry," Adam Zawel, Yankee Group senior analyst, said in a statement. "With solid, strategic investment in self-regulation, wireless carriers can achieve dual benefit of protecting minors from adult content while safely profiting from the opportunity."

The market research firm said that wireless carriers must create a plan to regulate themselves on the issue of pornography. Specifically, they shouldn't offer adult content until they have a plan and technology in place, the study said.

In particular, the carriers should take a parental control approach similar to that used for home PCs, Yankee Group said.

E-mail This Story
Print This Story
Reprint This Story




Get the latest Personal Tech news, product info, and trends every week.


Related Content

  Right-click and choose Copy to extract RSS Feed URL  Personal Tech Pipeline's Main RSS Feed
  Right-click and choose Copy to extract RSS Feed URL  Personal Tech Pipeline's Blog RSS Feed

<A HREF="http://as.cmpnet.com/event.ng/Type=click&amp;FlightID=43527&amp;AdID=72504&amp;TargetID=3743&amp;Segments=1411,1892,2691,3108,3448,4526,4760&amp;Targets=1491,2625,2878,3743&amp;Values=34,46,51,63,77,85,90,100,140,222,227,399,442,645,646,659,1184,1311,1405,1431,1716,1767,1785,1798,1901,1925,1935,1936,1945,1970,2217,2299,2310,2329,2352,2678,2767,2787,2862,2878,2942,2956,3240,3347,3385&amp;RawValues=&amp;Redirect=http://www.cmp.com/" target="_top"><IMG SRC="http://i.cmpnet.com/ads/graphics/as5/ps/House/CMP_getthere_300x250_01.gif" WIDTH=300 HEIGHT=250 BORDER=0></A>

Keeping Up To Date On Enterprise Server Tech?
Review our compilation of columns on server security, database software, and Linux issues.
How to Achieve High Performance Through IT
Learn to achieve high performance by aligning IT to
strategic objectives and solutions to unlock that value.
Using Current Performance to Shape
Future Results

Hear new strategies for improving business
performance and results.

Editor's Picks

Well, Microsoft has "unfolded" its "Origami" ultra-mobile PC platform Thursday. It turned out to be a full-featured PC smaller than a tablet but bigger than a PDA. Are you impressed?
Yes! I want one!
Sort of. We'll see.
No! It's too big for a pocket and too small for real computing. What's the point?


In search of personal tech products? See our new Product Finder, where you'll find personal computing devices, communications solutions, security products, and more.



PERSONAL TECH PIPELINE MARKETPLACE (sponsored links)
Critical Steps for a Successful VoIP Deployment
Enterprises expect voice and data network convergence to reduce management complexity, drive down operating costs, and enable more efficient communications. Use this "how-to" guide to effectively assess the current state of your network.

SEC & HIPAA IM Compliance
Satisfy regulatory and compliance requirements for instant messaging.

Network & Application Performance doc downloads
Free white papers, buyers guide, application notes, industry articles, and more. NetScout's nGenius Solution provides network performance management and application monitoring for complex enterprise networks.

THE EVENT for Email Security, Policy, Compliance
Learn the latest on Email Security, Systems, Technology, Privacy, Policy and Compliance at INBOX: The Email Event, May 31-June 1, 2006. Meet industry leaders and your peers to debate and discuss best practices, products and cost-effective systems.

Security Within - Configuration based Security
Configuration and policy based security systems are a pro-active way to defend against IT security attacks. Click here to request our white papers, "Security Within - Configuration based Security" and "Policy Management vs. Vulnerability Scanning".


Buy a Link Now


Top ten search terms from the TechWeb TechEncyclopedia
How does your pay rate? Check the InformationWeek Salary Survey
Mobilized Solutions Guide: Find and compare solutions for your business
Top Requested White Paper Categories from TechWeb White paper Library
Top ten search terms from the TechWeb TechEncyclopedia