skip to main content
10.1145/3474124.3474196acmotherconferencesArticle/Chapter ViewAbstractPublication Pagesic3Conference Proceedingsconference-collections
research-article

Parental Security Control: A tool for monitoring and securing children's online activities.

Published:04 November 2021Publication History

ABSTRACT

The use of internet browsing through laptops, desktop systems, and mobile phones by kids has augmented manifold during this COVID-19 pandemic for online education. Since there is an inordinateness of objectionable content on the internet, the kids might get exposed to this content typically accidentally whereas sometimes intentionally. Therefore, it becomes vital to observe the web activities of kids by the parents. The lack of parental control, guidance & inability of parents to monitor their kids throughout the whole time frame motivated us to style and develop a parental control and management tool. Initially, we conducted a background study to understand the state-of-the-art tools currently available in the market and compare those tools in terms of functionality, accuracy, efficiency, usability, and security. We also studied the benchmark requirements set by the parents and the freedom of access expressed by the children. We have implemented a front-end solution and an Android App that follows the default criteria set by us. As the internet is a highly dynamic space, we have used a Machine Learning-based approach to classify the website dynamically to provide dynamicity to the tool. The very basic idea is to scrape a website's content once the user enters the URL and then apply an appropriate algorithm to classify the same, essentially converting the problem into a multi-class classification problem. The result indicates that our tool efficiently blocks inappropriate content and facilitates parents with features to control and monitor their children's online activity and help mitigate the risk of cyber threats for children of the current age.

Skip Supplemental Material Section

Supplemental Material

p469_demo_video.mp4

mp4

14.5 MB

References

  1. Karthikeyan, V. (2014). Web Content Filtering Techniques: A Survey.Google ScholarGoogle Scholar
  2. Walter Fuertes, Karina Quimbiulco, , Fernando Galárraga and José Luis García-Dorado: ‘On the Development of advanced Parental Control Tools’ , International Conference on Software Security and AssuranceGoogle ScholarGoogle Scholar
  3. Hamza H. M. Altarturi and Nor BadrulAnuar: “A preliminary study of cyber parental control and its methods”, 020 IEEE Conference on Application, Information and Network Security (AINS)Google ScholarGoogle Scholar
  4. Santhanam, Ramraj&Uzir, Nishant & Raman, Sunil & Banerjee, Shatadeep. (2017). Experimenting XGBoost Algorithm for Prediction and Classification of Different Datasets.Google ScholarGoogle Scholar
  5. Kumar, M., Dwivedi, V., Sanyal, A. and Bhatt, P. 2021. Website classification. Kaggle.com. https://www.kaggle.com/vaibhavdwivedi/website-classification?select=Dataset.Google ScholarGoogle Scholar
  6. Peng, C., Lee, K. and Ingersoll, G. 2002. An Introduction to Logistic Regression Analysis and Reporting. The Journal of Educational Research96, 1, 3-14.Google ScholarGoogle Scholar
  7. Loper, E. and Bird, S. 2002. NLTK. Proceedings of the ACL-02 Workshop on Effective tools and methodologies for teaching natural language processing and computational linguistics -.Google ScholarGoogle Scholar
  8. Devi, J., Bhatia, K. and Sharma, R. 2017. A Study on Functioning of Selenium Automation Testing Structure. International Journal of Advanced Research in Computer Science and Software Engineering7, 5, 855-862.Google ScholarGoogle Scholar

Recommendations

Comments

Login options

Check if you have access through your login credentials or your institution to get full access on this article.

Sign in
  • Published in

    cover image ACM Other conferences
    IC3-2021: Proceedings of the 2021 Thirteenth International Conference on Contemporary Computing
    August 2021
    483 pages
    ISBN:9781450389204
    DOI:10.1145/3474124

    Copyright © 2021 ACM

    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    • Published: 4 November 2021

    Permissions

    Request permissions about this article.

    Request Permissions

    Check for updates

    Qualifiers

    • research-article
    • Research
    • Refereed limited

PDF Format

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

HTML Format

View this article in HTML Format .

View HTML Format