0% found this document useful (0 votes)
36 views21 pages

Project Report

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
36 views21 pages

Project Report

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 21

Project Title (Caps)

REPORT

Submittedby

JANANI S(917723IT056)
SADHANA SRI(917723IT124)
KARTHIYAYINI R(917723IT064)
AMIRTHA V(917723IT012)

In partial fulfillment for the completion of course Design Thinking


of
BACHELOR OF TECHNOLOGY
IN
COMPUTER SCIENCE AND BUSINESS SYSTEMS

THIAGARAJAR COLLEGE OFENGINEERING,MADURAI–15


(AGovt. Aided, AutonomousInstitution,AffiliatedtoAnnaUniversity)

JUNE 2022
THIAGARAJARCOLLEGEOFENGINEERING,MADURAI-15
(AGovt.Aided, AutonomousInstitution,AffiliatedtoAnnaUniversity)

BONAFIDECERTIFICATE
Certified that this project report “Project Title” is the bonafide work of “Name
with Intials (Reg No) ”who carried out the project work under my supervision
during the Academic Year 2021-2022

SIGNATURE
Mrs. R. PARKAVI,
ASSISTANT PROFESSOR
INFORMATIONTECHNOLOGY
THIAGARAJAR COLLEGEOF
ENGINEERING,
MADURAI-15

2
TABLE OF CONTENTS

SL. NO. DETAILS PAGE NO.

1 ABSTRACT 4

2 PROBLEM DESCRIPTION 4

3 EXISTING SOLUTIONS – RESEARCH PAPER, 5

PATENT, APPLICATIONS

4 OBJECTIVES & CONSTRAINTS 7

5 STAKEHOLDERS PROFILE 8

6 FUNCTIONAL AND NON-FUNCTIONAL 9

REQUIREMENTS

7 CODE OF COOPERATION 10

8 LOW COST MODEL – DESIGNS 11

9 DESIGN EVALUATION PARAMETERS 12

10 FINAL PROTOTYPE – DESIGNS/ PICS 27

11 POSTER 28

12 REFERENCES 29

13 CONCLUSIONS AND FUTURE PLAN/WORKS 30

ABSTRACT:
3
Parental monitoring is the practice of overseeing
children’s online activities to ensure their safety in an increasingly
digital world. With the widespread use of smartphones, tablets, and
computers by children, they are exposed to potential risks such as
cyberbullying, inappropriate content, learn about the cyber security
through games and about online predators.
Parental monitoring aims to provide tools and techniques that
allow parents to track, manage, and guide their children’s digital
interactions. The challenge is to strike a balance between protecting
children and respecting their privacy, fostering trust while ensuring
they are safe from harmful content or behavior online.

PROBLEM DESCRIPTION:
As children increasingly engage with the internet for
education, entertainment, and social interaction, they become
vulnerable to various online risks, including exposure to
inappropriate content, cyberbullying, and online predators. Parents
and guardians often struggle to monitor their children's online
activities effectively, due to the overwhelming amount of digital
platforms and the lack of clear, user-friendly tools for managing
online safety.
Current solutions often focus on either content filtering or screen
time management but fail to offer a holistic approach that educates
children about responsible digital behavior while allowing parents
4
to maintain oversight. Additionally, many existing apps are
complex, hard to navigate, or do not provide real-time alerts to help
parents respond quickly to potential risks.
There is a need for a comprehensive, accessible tool that not only
ensures children are safe from harmful content but also fosters
awareness of digital safety through an engaging learning experience.
This solution must be designed to balance child empowerment with
parental control, making it easier for families to navigate the digital
landscape securely.

EXISTING SOLUTION :

● RESEARCH PAPER PATENTS

Sl. Author Details Paper Title Journal Observations


No name, year

1 

Heidi IDC '16:


HartikainenIN Proceedings of The journal suggests that a
TERACT Should We Design the The 15th balanced approach incorporating
Research Unit, for Control, Trust International elements of control, trust, and
University of or Involvement?: A Conference on involvement is critical for creating
Oulu, Oulu, Discourses Survey Interaction effective tools that not only protect
Finland about Children's Design and children but also foster healthy
 Online Safety Children digital habits and family
communication. It calls for designs
that move away from purely
surveillance-based models and
Netta towards more collaborative and
IivariINTERAC Publication: educational approaches.

5
T Research 21 June 2016
Unit,
University of
Oulu, Oulu,
Finland

Marianne
KinnulaINTER
ACT Research
Unit,
University of
Oulu, Oulu,
Finland

2  Co-designing CHI '18: The importance of involving


Mobile Online Proceedings of children in the design process to
Safety Applications the 2018 CHI create effective and engaging
with Children Conference on digital safety tools. Key
Brenna Human observations highlight that children
McNallyUniver Factors in have varying levels of awareness
sity of Computing about online risks, and they prefer
Maryland, Systems intuitive, user-friendly designs with
College Park, interactive elements. By co-
MD, USA designing, apps can better align
 Published: 21 with children’s preferences for
April 2018 privacy settings, real-time alerts,
and educational features that
encourage safe online behavior.
Priya C. The involvement of parents
KumarUniversi remains essential for monitoring
ty of Maryland, and guiding children’s activities,
College Park, ensuring a balanced approach to
MD, USA digital safety. Additionally,
 children are more likely to trust and
engage with apps they helped
shape, fostering greater long-term
use and adherence.
Chelsea
HordattUnivers
ity of
Maryland,
College Park,

6
MD, USA

Matthew Louis
MaurielloUniv
ersity of
Maryland,
College Park,
MD, USA

3. Danah Connected and Parents' concerns about their


boyd, Eszter concerned: https:// children's online safety vary
Hargittai Variation in doi.org/ significantly based on factors such
parents' online 10.1002/1944- as their level of digital literacy, the
safety concerns 2866.POI332 age of their children, and the
perceived risks associated with
different online platforms. While
many parents express general
Published: 21 concerns about cyberbullying,
October 2013 inappropriate content, and online
predators, these concerns are more
pronounced among parents who
feel less confident in navigating the
digital world themselves. The study
emphasizes the need for targeted
resources and support to help
parents better manage their
children's online safety, particularly
in light of the fast-evolving nature
of digital risks.
4 Heidi Hartikain Children’s design Erratum Effective online safety education
en, recommendations for regarding for children should focus on
online safety missing interactive, age-appropriate content
Netta Iivari, education declaration of that fosters engagement and
competing learning. It highlights the
interest importance of designing tools that
Marianne Kinn statements in are not only informative but also
ula previously fun, using gamified elements and
published real-life scenarios to teach safety
articles concepts. The journal recommends
integrating both parental oversight
https:// and child autonomy, where
doi.org/ children can learn to make

7
10.1016/ informed decisions about their
j.ijcci.2019.10 online behavior while parents are
0146 provided with clear, actionable
insights. Additionally, it stresses
the need for an intuitive interface,
ensuring that children can easily
navigate and understand the app’s
features without feeling
overwhelmed.
Online risk, harm The evidence The complex nature of online risks
5 Professor Sonia and vulnerability: base for child faced by children, emphasizing that
Livingstone reflections on the Internet safety these risks are multifaceted,
evidence base for policy. ZER: including exposure to inappropriate
Professor of child Internet Journal of content, cyberbullying, and online
Social safety policy Communicatio exploitation. It underscores the
Psychology n Studies, 18 need for a balanced approach to
(35). pp. 13- child Internet safety, stressing the
Department of 28. ISSN importance of evidence-based
Media and 1137-1102 policies that go beyond simplistic
Communicatio content filtering to address the
ns psychological, social, and
developmental impacts of online
interactions. The article calls for
improved research and a more
nuanced understanding of
children's online behaviors to
create effective, adaptive safety
strategies that empower both
children and parents in navigating
the digital world.

● EXISTING PROJECTS:

Sl. No Application title Company OBSERVATIONS

1 Qustodio Qustodio  Key Features:


Technologies  Web Filtering: Blocks harmful content
based on categories.
 App Management: Monitors apps,
including usage time and activity.
 Screen Time Management: Allows
parents to set device usage limits.
 Location Tracking: Tracks the child’s real-
time location and provides geofencing
8
alerts.
 Battery Tracker: Alerts when the child’s
device battery is running low.
 Constraints:
 Limited free features; requires premium
subscription for full functionality.
 Can sometimes be slow in syncing data
across devices.

2 Bark Bark  Key Features:


Technologies  Social Media Monitoring: Monitors over
30 social media platforms for harmful
content.
 Text Message & Email Monitoring:
Detects risky or inappropriate
communication.
 Alerts for Parents: Provides alerts for
potentially dangerous situations, such as
cyberbullying, suicidal ideation, or adult
content.
 Screen Time Limits: Allows parents to set
limits on device usage.
 Website Filtering: Blocks inappropriate
websites.
 Constraints:
 Only supports certain platforms (e.g., iOS,
Android, and Amazon devices).
 Limited features in the free version;
premium version required for full acces

3 Norton Family NortonLifeLo  Key Features:


ck (formerly  Web Monitoring: Tracks websites visited
Symantec) and allows parents to block harmful sites.
 Time Supervision: Set device time limits
and schedules.
 Location Tracking: Provides real-time
GPS location updates.
 Search Monitoring: Keeps an eye on
searches children conduct online.
 Instant Alerts: Sends notifications for

9
potentially risky activities.
 Constraints:
 Limited device compatibility, with some
features only available on specific platforms
(Android, Windows).
 The premium version required for more
advanced features

4 Kaspersky Safe Kaspersky Lab  Key Features:


Kids o Web Filtering: Blocks harmful
content based on categories.
o App Management: Monitors apps,
including usage time and activity.
o Screen Time Management: Allows
parents to set device usage limits.
o Location Tracking: Tracks the
child’s real-time location and
provides geofencing alerts.
o Battery Tracker: Alerts when the
child’s device battery is running
low.
 Constraints:
o Limited free features; requires
premium subscription for full
functionality.
o Can sometimes be slow in syncing
data across devices.

5 FamilyTime Familone  Key Features:


 Geo-Fencing: Set geofences and receive
notifications when a child enters or exits a
designated area.
 Screen Time Control: Set limits on how
long children can use their devices.
 Location Tracking: Real-time tracking of
children’s location.
 App Blocking: Block or monitor the use of
specific apps.
 Call & Text Monitoring: Monitor calls
and text messages for any suspicious
10
activity.
 Constraints:
 Some features are available only with
premium plans.
 Limited device compatibility for advanced
features.

OBJECTIVES:

The objective of the app is to provide a comprehensive online safety

solution for children by integrating interactive learning and gaming. The app

aims to educate children about cybersecurity in an engaging and fun way,

using gamified lessons and activities that teach them how to recognize online

threats, protect their personal information, and engage safely in digital spaces.

Through a combination of interactive games, real-time monitoring tools, and

educational modules, the app empowers children to make informed decisions

about their online behavior while giving parents the ability to manage and

ensure their safety.

CONSTRAINTS:
1.Platform Compatibility:The app may have limited compatibility with certain
devices or operating systems (e.g., iOS vs. Android), potentially affecting its reach
and user experience across different platforms.
2. Content Complexity:

11
 Designing age-appropriate and engaging cybersecurity lessons through
games can be challenging. Balancing educational value with entertainment is
crucial to maintaining the children’s attention and ensuring they absorb
important concepts.
3. Data Privacy and Security:
 Handling sensitive data, such as children’s activity logs and personal
information, requires strict adherence to privacy regulations like COPPA
(Children’s Online Privacy Protection Act) or GDPR for minors. Securing
this data can pose significant challenges.
4. User Engagement:
 Ensuring sustained user engagement over time can be difficult, especially
with a learning-driven app. Without continuous updates, new challenges, or
game features, children may lose interest, reducing the app's long-term
effectiveness.
5. Parental Control Integration:
 Integrating parental control features (e.g., monitoring usage, setting time
limits) while maintaining a balance between independence and oversight can
be tricky. Overreliance on parental control could interfere with the child’s
experience and autonomy in learning.

STACKHOLDERS PROFILE:

NAME MOBILE NUMBER

12
SURVEY QUESTIONS:
Question Set 1:
1. How concerned are you about online privacy and security?
2. How important do you think online safety apps are for children
today?
3. What features do you think are most useful in a children’s online
safety app?
4. Would you feel comfortable if your online activities were monitored
when you were younger?
5. How do you think children can be taught online safety effectively?

Question Set 2
FUNCTIONAL REQUIREMENTS:

13
NON-FUNCTIONAL REQUIREMENTS

CODE OF CO-OPERATION:

14
LOW-COST MODEL DESIGNS:

15
DESIGN EVALUATION PARAMETERS:

Sub Function 1: Implementation of Natural Language Processing


Scale (1 – Low & 4 - High)
Criteria MedinReal Panda.ai DatatoBiz IBM Watson Glove

Efficiency 4 3 3 4 3

Emotion 3 2 3 3 2

Chatbot
Response
3 4 3 2 1
volume
Non
response
Rate 4 3 2 3 4

Security 4 2 3 4 3

Questions
per
conversation 4 1 2 2 2

UI 2 2 3 1 1

Total 24 17 19 20 16

Sub Function 2: Implementation of Natural Language generation


Scale (1 – Low & 4 - High)
Criteria MS Azure IBM Watson AX Semantics Markov Chain RNN

16
Sub Function 3: Design of Report Manager

Scale (1 – Low & 4 - High)


Criteria InetSoft DashThis Ubiq Finereport ProWorkflow

Sub Function 4: Implementation of Linked Devices Manager


Scale (1 – Low & 4 - High)
Google Link
Criteria OAuth Linking Services App Flip IBM Watson Glove

17
FINAL PROTOTYPES- DESIGN/PICS:

18
19
REFERENCES:

20
POSTER:

CONCLUSION / FUTURE PLANS:

21

You might also like