Language:EN
Pages: 20
Words: 3823
Rating : ⭐⭐⭐⭐⭐
Price: $10.99
Page 1 Preview
from net nanny parental controls http

From net nanny parental controls http

Project Proposal

Children Security Software

2.2. Existing System 5

2.3. Description of the proposed system 6

4. Design 10

5. Schedule and Budget Summary 16

  1. Introduction

One day, a friend of mine asked me to babysit her children; which I was so happy to do for her. They are two boys and they love computer so much. While I was watching them, I noticed them watching YouTube videos on the computer. The problem when they search for videos, there are some unsuitable videos in the right side of the page, which are (Song, Park, Chung, Kwon, & Lee, 2007) not related to the search topic. At this moment, I recognized the danger of the internet for children, especially these days when the internet network is open for anyone and anytime. At this time, I started searching and reading about the problem. Upon my research I found many stories of children who were victims of the internet, such as child molesters, sexual offenders and pedophiles. In addition, there are many children around the world that solicited for sex, received aggressive sexual solicitations, exposed to photos of people having sex or of naked people, and threatened on the internet. I became shocked about all of this news and I tried to find a solution to protect these children.

Moreover, children do not need to be in the company of a responsible adult all of the time in order to use a computer. Technology is rapidly increasing the ways to access the web, such as cell phones. Arguably, the Internet poses a much greater risk of damage to children than television or movies do. For this reason, parents should take steps to limit inappropriate exposure and minimize the chances of children being victimized (NetSmartz411, 2007).

Objective of the System and the target Audience

  • Limits access by time.

  • Blocks sites, and allows parents to read a list of blocked sites.

Furthermore, parents have several alternative ways instead of the blocking programs, such as built-in parental controls. Some of the latest versions of the two main computer-operating systems, Microsoft's Windows and Apple’s Mac, have a built-in, which has free and easy-to-use features that allow parents to control which programs a child runs and to specify which web sites he or she can visit (Windows, 2010).

Other more ways to protect children are child-friendly filtering services and web sites. Some child-friendly ISPs offer programs that provide a safe environment for children. These include AOL, Earthlink, MSN, Comcast, and TimeWarner Cable. For example, AOL enables parents to steer children to "kids only" or "young teens" areas.

  1. Children Security software program will help the parent to know immediately by sending email when their kids search about inapproprate words.

  2. Provides complete activity and content filtering capabilities to parents. They can also block websites based on the site's name or keywords parents specify. For example, they can block any page containing "sex" or "myspace" within the page's text or web address.

  3. Provides pop-up blocking.

  4. Ease to use: the program will design with ease-of-use in mind. It doesn't matter if you know a little or a lot about computers.

  1. Software Requirements

  1. Platform:   Windows 2000 / 98 / NT / Me / 95 / XP / Vista

Children Security will be witten by Java language because Java is a general purpose programming language similar to C++, but it is easier. Java has many features which will be mentioned in the next section.

  1. Internet connection required

Children Security software program is a small program, which does not need complicated hardware requirments. This software has been developed in Java so it is platform independent. It can run on any of the platform, although there are certain technical minimum requirements which the platform or underlying personal computer must have like RAM, processing speed of PC etc., which has been mentioned below. But this application can easily be run on any of the platform of Windows or Linux like Fedora, Red Hat etc. (Robertson, 2005)

  1. Processor: Pentium IV

  1. Design

Children Security will be witten by Java language, which is a general purpose programming language similar to C++, but simplified to eliminate language features that cause common programming errors. Java has many features therefore the Children Security software would be written by it:

  • Java is secure, which is one of the first programming languages to consider security as part of its design.

  • Java is user friendly, easy to write, compile, debug, and learn, making it more simple than other programming languages.

  • The major modules are the page scanner module, page loader; pop up blocker are few of the major modules.

  • The major module like scanner module is a module in which there is a scanner which goes through the pages which are being accessed by the user, before the page is being loaded by the class loader. The idea of this scanner is that the keywords from the html pages are parsed and traced so that user is not able to load those pages which are avoided. The database which is being used here is Hash Map in which key words are being stored. Input required by this module is the page content. (Savidis, Grammenos, & Stephanidis, 2005)

Architecture Design of the system

In this architecture design there major modules which are interacting the minor modules, in this design it has been shown the input which is being expected and the output as well which is being expected by the user. In this design there are some small modules like content analyzer which gets the input of the content (Savidis, Grammenos, & Stephanidis, 2005) from scanner which in turns parser the content and decides the validity of the content.

  • There need to be a functionality which need to take care and take decision that whether the given data structures for the requested page has valid contents or not, if yes it give true Boolean and if not then false Boolean value.

  • Now a small functionality which need to be prepared which will take action as per the final scan of the pages, i.e. it will take some predefined action. This functionality will load the page if everything is all right or it will display an error pop up page.

  1. 5.2. Tasks and Timeline: the Gantt chart featured below provides a list of the tasks to be completed and expected dates of completion. There are seven major tasks involved with this project that are presented in the below chart. This represents a heavily itemized decomposition of the tasks and provides a draft for how these tasks have been scheduled throughout the semester:

Estimate Project Timeline

Task Week of …
May June July August September October Nov
5/24 6/1 6/8 6/15 6/22 7/1 7/8 7/15 7/22 8/1 8/8 8/15 8/22 9/1 9/8 9/15 9/22 10/1 10/8 10/15 10/22 11/1 11/15
Decide Topics of Interest
Write the Proposal
Set UP Programming Environment
Write the program
Test the program
Perform Final Test
Write Final Paper and Prepare Presentation

Market Potential of the Proposed Project

S/N Target Market Projected Sales
1 Family Version Free
2 Premium Version 20$

Summary of the costs of the proposed project

S/N Summary of costs Cost
1 Total Project Cost 1000$
23 Projected Revenue from Premium Version 2000$
Name Soha Abdullah Alhelaly
Job Description Graduate student

Bibliography

  • HallL, M., & Brown, L. (2003). Inroduction to Java.

  • Net Nanny Parental Controls 6.5 . (2010). Retrieved 2010, from Net Nanny Parental Controls 6.5 : http://internet-filter-review.toptenreviews.com/netnanny-review.html

  • Song, H. T., Park, H. J., Chung, M. S., Kwon, H. S., & Lee, S. 2007. A study on usability of human-robot interaction using a mobile computer and a human interface device. MobileHCI '07: Proceedings of the 9th international conference on Human computer interaction with mobile devices and services. ACM

You are viewing 1/3rd of the document.Purchase the document to get full access instantly

Immediately available after payment
Both online and downloadable
No strings attached
How It Works
Login account
Login Your Account
Place in cart
Add to Cart
send in the money
Make payment
Document download
Download File
img

Uploaded by : Manikya Kunda

PageId: DOCD994331