Abstract
With the onset of the twenty-first century, the internet world has seen a pervasive development. Smartphones have become the primordial means of communication and social networking. This has granted the minors an unprecedented access to the internet which poses the risk of both unwanted exposure as well as intended access to the harmful internet content such as pornography, violence, unmoderated chat sites, etc. which can have profound effects both in the personal as well as professional life of the minors, and has proved to be catastrophic in the past. The benefits of the proposed reinforced strategy are two-folds; It can actively filter and block internet users, especially minors, from the NSFW content, and it can also act as a watchdog and moderate websites making sure that they don’t trade on illegal contents.
Similar content being viewed by others
References
Anna, L. (2014). Children online: the security formula. Retrieved 1 November, 2017, from https://securelist.com/children-online-the-security-formula/63866/
Beresin, E. V. (2017). The Impact of Media Violence on Children and Adolescents: Opportunities for Clinical Interventions Retreived 1 November, 2017, https://www.aacap.org/aacap/Medical_Students_and_Residents/Mentorship_Matters/DevelopMentor/The_Impact_of_Media_Violence_on_Children_and_Adolescents_Opportunities_for_Clinical_Interventions.
Cameron, K. A., Salazar, L. F., Bernhardt, J. M., Burgess-Whitman, N., Wingood, G. M., & DiClemente, R. J. (2005). Adolescents’ experience with sex on the web: Results from online focus groups. Journal of Adolescence, 28(4), 535–540.
Campbell, B. (2015). Child can convert to local account to bypass family safety in windows 10 ?. Retrieved 4 February, 2018, from https://answers.microsoft.com/en-us/windows/forum/windows_10-security-winpc/child-can-convert-to-local-account-to-bypass/76ddf8c9-0a45-4d9b-b71c-9dd1255f10c2?auth=1
Cirasole, P., DeRosa, R. & Fox, R., 1999. Method and system for content filtering information retrieved from an internet computer network. US, Patent No. US Patent 5,987,606.
Collins, R. L., Strasburger, V. C., Brown, J. D., Donnerstein, E., Lenhart, A., & Ward, L. M. (2017). Sexual media and childhood well-being and health. Pediatrics, 140(Supplement 2), S162–S166.
Dombrowski, S. C., Karen, L. G., & Theo, D. (2007). Safeguarding young people from cyber pornography and cyber sexual predation: a major dilemma of the internet. Child Abuse Review, 16(3), 153–170.
Flood, M. (2009). The harms of pornography exposure among children and young people. Child Abuse Review, 18(6), 384–400.
Glass, P., 2005. System and method for verifying the age and identity of individuals and limiting their access to appropriate material. US, Patent No. US Patent App. 11/118,667.
GoogleSupport, (2018). Disable or enable restricted mode - computer - YoutTube help. Retrieved 5 feburuary, 2018, From https://support.google.com/youtube/answer/174084?co=GENIE.Platform%3DDesktop&hl=en.
Janis, W., Kimberly, M., & Finkelhor, D. (2007). Unwanted and wanted exposure to online pornography in a National Sample of youth internet users. Pediatrics, 119(2), 247–257.
Lee, P. Y., Siu, C. H., & Fong, A. C. M. (2003). A structural and content-based analysis for web filtering. Internet Research, 13(1), 27–37.
Medium, (2017). How big is the porn industry?. Retrieved 28 January, 2018, From https://medium.com/@Strange_bt_True/how-big-is-the-porn-industry-fbc1ac78091b.
Mutton, P, (2018). February 2018 Web Server Survey. Retrieved 4 Feburuary 2018, from https://news.netcraft.com/.
Newman, L., 2003. Group Pushes to Ban Porn on Campus. Mustang DAILY, 10 February, pp. 1–4.
NSPCC, (2017). Online abuse Facts and statistics. Retrieved 17 November, 2016, from https://www.nspcc.org.uk/preventing-abuse/child-abuse-and-neglect/online-abuse/facts-statistics/.
Peter, J., & Valkenburg, P. M. (2016). Adolescents and pornography: a review of 20 years of research. The Journal of Sex Research, 53(4–5), 509–531.
Phil, A., Kevin, S. & Andrea, P. (2010). Protocol for Web Description Resources (POWDER): Description Resources. Retrieved 30 January, 2018, from https://www.w3.org/TR/powder-dr/
Rajesh, K., 2009. Why is URL Filtering required and how it is accomplished. Retrieved 31 January, 2018, from http://www.excitingip.com/369/why-is-url-filtering-required-and-how-it-is-accomplished/
Ropelato, (2017). Internet pornography statistics. Retrieved 29 January, 2018, From http://www.toptenreviews.com/internet-pornography-statistics/.
Smith, (2012). How do I bypass parental controls?. Retrieved 5 February, 2018, From https://discussions.apple.com/thread/4567279.
Symons, K., Ponnet, K., Emmery, K., Walrave, M., & Heirman, W. (2017). Parental knowledge of adolescents’ online content and contact risks. Journal of Youth and Adolescence, 46(2), 401–416.
Temko, S. (2016). How Well Can Kids Get Past Parental Control Software?. Retrieved 5 February, 2018, from http://abcnews.go.com/Lifestyle/kids-past-parental-control-software/story?id=43514662
Tosa, P. (2012). parentalcontrolsd using nearly 100% of one CPU 24/7 after Mountain Lion update. Retrieved 5 February, 2018,from https://discussions.apple.com/thread/4429396
Tuscano, P. S. & Money, J. E., 2012. Age verification and content filtering systems and methods. US, Patent No. US Patent 8,131,763.
Walters, L. G., 2005. Method of age verification for electronic media. US, Patent No. US Patent 6,959,861.
Ybarra, M. L., David, F., Kimberly, J. M., & Janis, W. (2009). Associations between blocking, monitoring, and filtering software on the home computer and youth-reported unwanted exposure to sexual material online. Child Abuse and Neglect, 33(12), 857–869.
Zillmann, D. (2000). Influence of unrestrained access to erotica on adolescents' and young adults' dispositions toward sexuality. Journal of Adolescent Health, 27(2), 41–44.
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Narayanan, B.K., M, R., J, S. et al. Adult content filtering: Restricting minor audience from accessing inappropriate internet content. Educ Inf Technol 23, 2719–2735 (2018). https://doi.org/10.1007/s10639-018-9738-y
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s10639-018-9738-y