From net nanny parental controls http
Project Proposal
Children Security Software
2.3. Description of the proposed system 6
5. Schedule and Budget Summary 16
Introduction
One day, a friend of mine asked me to babysit her children; which I was so happy to do for her. They are two boys and they love computer so much. While I was watching them, I noticed them watching YouTube videos on the computer. The problem when they search for videos, there are some unsuitable videos in the right side of the page, which are (Song, Park, Chung, Kwon, & Lee, 2007) not related to the search topic. At this moment, I recognized the danger of the internet for children, especially these days when the internet network is open for anyone and anytime. At this time, I started searching and reading about the problem. Upon my research I found many stories of children who were victims of the internet, such as child molesters, sexual offenders and pedophiles. In addition, there are many children around the world that solicited for sex, received aggressive sexual solicitations, exposed to photos of people having sex or of naked people, and threatened on the internet. I became shocked about all of this news and I tried to find a solution to protect these children.
Moreover, children do not need to be in the company of a responsible adult all of the time in order to use a computer. Technology is rapidly increasing the ways to access the web, such as cell phones. Arguably, the Internet poses a much greater risk of damage to children than television or movies do. For this reason, parents should take steps to limit inappropriate exposure and minimize the chances of children being victimized (NetSmartz411, 2007).
Objective of the System and the target Audience
Limits access by time.
Blocks sites, and allows parents to read a list of blocked sites.
Furthermore, parents have several alternative ways instead of the blocking programs, such as built-in parental controls. Some of the latest versions of the two main computer-operating systems, Microsoft's Windows and Apple’s Mac, have a built-in, which has free and easy-to-use features that allow parents to control which programs a child runs and to specify which web sites he or she can visit (Windows, 2010).
Other more ways to protect children are child-friendly filtering services and web sites. Some child-friendly ISPs offer programs that provide a safe environment for children. These include AOL, Earthlink, MSN, Comcast, and TimeWarner Cable. For example, AOL enables parents to steer children to "kids only" or "young teens" areas.
Children Security software program will help the parent to know immediately by sending email when their kids search about inapproprate words.
Provides complete activity and content filtering capabilities to parents. They can also block websites based on the site's name or keywords parents specify. For example, they can block any page containing "sex" or "myspace" within the page's text or web address.
Provides pop-up blocking.
Ease to use: the program will design with ease-of-use in mind. It doesn't matter if you know a little or a lot about computers.
Software Requirements
Platform: Windows 2000 / 98 / NT / Me / 95 / XP / Vista
Children Security will be witten by Java language because Java is a general purpose programming language similar to C++, but it is easier. Java has many features which will be mentioned in the next section.
Internet connection required
Children Security software program is a small program, which does not need complicated hardware requirments. This software has been developed in Java so it is platform independent. It can run on any of the platform, although there are certain technical minimum requirements which the platform or underlying personal computer must have like RAM, processing speed of PC etc., which has been mentioned below. But this application can easily be run on any of the platform of Windows or Linux like Fedora, Red Hat etc. (Robertson, 2005)
Processor: Pentium IV
Design
Children Security will be witten by Java language, which is a general purpose programming language similar to C++, but simplified to eliminate language features that cause common programming errors. Java has many features therefore the Children Security software would be written by it:
Java is secure, which is one of the first programming languages to consider security as part of its design.
Java is user friendly, easy to write, compile, debug, and learn, making it more simple than other programming languages.
The major modules are the page scanner module, page loader; pop up blocker are few of the major modules.
The major module like scanner module is a module in which there is a scanner which goes through the pages which are being accessed by the user, before the page is being loaded by the class loader. The idea of this scanner is that the keywords from the html pages are parsed and traced so that user is not able to load those pages which are avoided. The database which is being used here is Hash Map in which key words are being stored. Input required by this module is the page content. (Savidis, Grammenos, & Stephanidis, 2005)
Architecture Design of the system
In this architecture design there major modules which are interacting the minor modules, in this design it has been shown the input which is being expected and the output as well which is being expected by the user. In this design there are some small modules like content analyzer which gets the input of the content (Savidis, Grammenos, & Stephanidis, 2005) from scanner which in turns parser the content and decides the validity of the content.
There need to be a functionality which need to take care and take decision that whether the given data structures for the requested page has valid contents or not, if yes it give true Boolean and if not then false Boolean value.
Now a small functionality which need to be prepared which will take action as per the final scan of the pages, i.e. it will take some predefined action. This functionality will load the page if everything is all right or it will display an error pop up page.
5.2. Tasks and Timeline: the Gantt chart featured below provides a list of the tasks to be completed and expected dates of completion. There are seven major tasks involved with this project that are presented in the below chart. This represents a heavily itemized decomposition of the tasks and provides a draft for how these tasks have been scheduled throughout the semester:
Estimate Project Timeline
Task | Week of … | ||||||||||||||||||||||
May | June | July | August | September | October | Nov | |||||||||||||||||
5/24 | 6/1 | 6/8 | 6/15 | 6/22 | 7/1 | 7/8 | 7/15 | 7/22 | 8/1 | 8/8 | 8/15 | 8/22 | 9/1 | 9/8 | 9/15 | 9/22 | 10/1 | 10/8 | 10/15 | 10/22 | 11/1 | 11/15 | |
Decide Topics of Interest | |||||||||||||||||||||||
Write the Proposal | |||||||||||||||||||||||
Set UP Programming Environment | |||||||||||||||||||||||
Write the program | |||||||||||||||||||||||
Test the program | |||||||||||||||||||||||
Perform Final Test | |||||||||||||||||||||||
Write Final Paper and Prepare Presentation |
Market Potential of the Proposed Project
S/N | Target Market | Projected Sales |
1 | Family Version | Free |
2 | Premium Version | 20$ |
Summary of the costs of the proposed project
S/N | Summary of costs | Cost |
1 | Total Project Cost | 1000$ |
23 | Projected Revenue from Premium Version | 2000$ |
Name | Soha Abdullah Alhelaly |
Job Description | Graduate student |
Bibliography
HallL, M., & Brown, L. (2003). Inroduction to Java.
Net Nanny Parental Controls 6.5 . (2010). Retrieved 2010, from Net Nanny Parental Controls 6.5 : http://internet-filter-review.toptenreviews.com/netnanny-review.html
Song, H. T., Park, H. J., Chung, M. S., Kwon, H. S., & Lee, S. 2007. A study on usability of human-robot interaction using a mobile computer and a human interface device. MobileHCI '07: Proceedings of the 9th international conference on Human computer interaction with mobile devices and services. ACM