Browse Definitions:
Definition

Internet porn

Contributor(s): Ivy Wigmore

Internet porn is sexually explicit content made available online in various formats including images, video files, video games and streaming video.

The legitimacy of pornography is a controversial issue. In the corporate world, however, Internet porn is unquestionably problematic. According to M. J. McMahon, publisher of AVN magazine, a trade publication that tracks the adult video industry, porn sites receive more hits during business hours than at other times of the day. Nielsen reported that 25% of employees access porn during business hours. 

Employees surfing porn wastes corporate resources and lowers productivity. Furthermore, the business may be legally responsible for illicit acts on the part of the employee, such as distributing child pornography or sending pornographic content – perhaps in an email message with a corporate signature -- to someone who doesn’t want to receive it. Because porn sites are known sources of viruses, spyware and adware, they also pose a security risk to users’ computers and the corporate network.

Many organizations use Web monitoring software to track employees’ online activity. Such software usually monitors Web site visits, email, IM, chat and searches in internal applications. It may also include a keylogger, to track what employees type. Email image monitoring programs can identify and block pornographic images. Monitoring software typically issues reports in the event of any breach of an organization’s acceptable use policy (AUP), identifying the employee and details of the activity.

The easy and usually free access to online porn, in combination with user anonymity, can lead to obsessive use. Obsessive use of Internet porn, online gaming and communication (which includes social media, email and instant messaging) are the three main variants of Internet addiction disorder (IAD), which is under review for inclusion in the Diagnostic and Statistical Manual of Mental Disorders (DSM-V).

This was last updated in June 2012

Continue Reading About Internet porn

Start the conversation

Send me notifications when other members comment.

By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Please create a username to comment.

-ADS BY GOOGLE

File Extensions and File Formats

SearchCompliance

  • pure risk (absolute risk)

    Pure risk, also called absolute risk, is a category of threat that is beyond human control and has only one possible outcome if ...

  • risk assessment

    Risk assessment is the identification of hazards that could negatively impact an organization's ability to conduct business.

  • audit program (audit plan)

    An audit program, also called an audit plan, is an action plan that documents what procedures an auditor will follow to validate ...

SearchSecurity

  • insider threat

    Insider threat is a generic term for a threat to an organization's security or data that comes from within.

  • ransomware

    Ransomware is a subset of malware in which the data on a victim's computer is locked, typically by encryption, and payment is ...

  • hacker

    A hacker is an individual who uses computer, networking or other skills to overcome a technical problem.

SearchHealthIT

SearchDisasterRecovery

  • business continuity and disaster recovery (BCDR)

    Business continuity and disaster recovery (BCDR) are closely related practices that describe an organization's preparation for ...

  • business continuity plan (BCP)

    A business continuity plan (BCP) is a document that consists of the critical information an organization needs to continue ...

  • call tree

    A call tree -- sometimes referred to as a phone tree -- is a telecommunications chain for notifying specific individuals of an ...

SearchStorage

SearchSolidStateStorage

  • 3D XPoint

    3D XPoint is memory storage technology jointly developed by Intel and Micron Technology Inc.

  • RRAM or ReRAM (resistive RAM)

    RRAM or ReRAM (resistive random access memory) is a form of nonvolatile storage that operates by changing the resistance of a ...

  • JEDEC

    JEDEC is a global industry group that develops open standards for microelectronics.

SearchCloudStorage

  • Google Cloud Storage

    Google Cloud Storage is an enterprise public cloud storage platform that can house large unstructured data sets.

  • RESTful API

    A RESTful application program interface breaks down a transaction to create a series of small modules, each of which addresses an...

  • cloud storage infrastructure

    Cloud storage infrastructure is the hardware and software framework that supports the computing requirements of a private or ...

Close