Internet Safety for Children Stranger Danger, Misbehaviour and Problems When Online
Total Page:16
File Type:pdf, Size:1020Kb
Internet Safety for Children Stranger danger, misbehaviour and problems when online Seamus Fergus Information Security, master's level (120 credits) 2018 Luleå University of Technology Department of Computer Science, Electrical and Space Engineering Abstract The Internet has evolved and continues to evolve rapidly and as adults we understand the need to be careful with various issues including our privacy, scams, bullying and as adults we stumble across unwanted material that might be considered inappropriate. Children also need to be protected and this thesis will research what children do when they are online, and what protection is currently given to children. The research will also include input from teachers and parents and find out what experiences they have and what they are doing to protect children. The thesis will involve software testing to evaluate how effective parental control software is, and possibilities of it being hacked. This research will concentrate on smartphones, and in particular the Android operating system, the reason is that Android phones can be purchased cheaper than an iPhone, and therefore are more likely to be used by a child. A developer’s version of Android can also be configured to run it in a virtual machine running on a PC which makes various testing possible. The thesis will also involve reviewing other organisation’s research and findings and how it compares to my own research. The thesis will give advice on how to move forward in relation to keeping children safe online. Keywords Information security, parental control, smartphone, Android systems, experimental study, qualitative research. Contents 1 INTRODUCTION........................................................................................................................... 2 1.1 CYBERSAFEIRELAND ...................................................................................................................................... 2 1.2 PURPOSE ........................................................................................................................................................ 3 1.3 DELIMITATION OF THE STUDY .......................................................................................................................... 3 1.4 DISPOSITION ................................................................................................................................................... 4 2 METHODOLOGY ......................................................................................................................... 5 2.1 STRATEGY AND APPROACH .............................................................................................................................. 5 2.2 LITERATURE REVIEW ....................................................................................................................................... 5 2.3 DATA COLLECTION .......................................................................................................................................... 5 2.3.1 Interviews .................................................................................................................................................................................. 6 2.3.2 Questionnaire ............................................................................................................................................................................ 6 2.3.3 Seminars .................................................................................................................................................................................... 7 2.3.4 Software testing ......................................................................................................................................................................... 7 2.3.5 Internet search .......................................................................................................................................................................... 7 2.4 OVERVIEW OF DATA COLLECTION ..................................................................................................................... 8 3 KNOWLEDGE DOMAINS ............................................................................................................ 9 3.1 INFORMATION SECURITY: CONFIDENTIALITY, INTEGRITY AND AVAILABILITY ........................................................ 9 3.2 PRIVACY ...................................................................................................................................................... 10 3.3 AUTHENTICITY AND ACCOUNTABILITY ............................................................................................................ 12 3.4 IDENTIFIED RISKS WHILE USING THE INTERNET ................................................................................................ 13 3.5 POPULAR SOFTWARE AND APPS FOR SMARTPHONES .......................................................................................... 13 3.6 WAYS CHILDREN CAN BYPASS PARENTAL CONTROL SOFTWARE ......................................................................... 14 3.7 CYBERSTALKING .......................................................................................................................................... 15 3.8 SEXTORTION................................................................................................................................................. 17 3.9 WHAT TO DO IN THE EVENT OF CYBERSTALKING .............................................................................................. 17 3.10 RECOMMENDATIONS TO PROTECT CHILDREN ONLINE ........................................................................................ 18 3.11 PRIVACY-BY-PROXY ...................................................................................................................................... 19 4 FINDINGS .................................................................................................................................... 21 4.1 INTERNET HABITS AND USE ............................................................................................................................ 21 4.2 PARENTAL CONTROL SOFTWARE ..................................................................................................................... 22 4.2.1 Qustodio................................................................................................................................................................................... 23 4.2.2 Norton Family parental control ............................................................................................................................................. 24 4.3 METHODS ON HOW TO BYPASS PARENTAL CONTROLS ....................................................................................... 27 5 ANALYSIS AND DISCUSSION .................................................................................................. 31 5.1 CHILDREN .................................................................................................................................................... 31 5.2 TEACHERS, PARENTS AND GUARDIANS ............................................................................................................ 32 5.3 ANTI-VIRUS SOFTWARE AND UPDATED SYSTEM ................................................................................................ 33 5.4 DEVELOPERS ................................................................................................................................................ 34 5.5 PARENTAL CONTROL SOFTWARE ..................................................................................................................... 34 5.6 YOUTUBE .................................................................................................................................................... 35 5.7 WEBSITES .................................................................................................................................................... 36 6 CONCLUSIONS AND FUTURE RESEARCH ........................................................................... 38 6.1.1 Appropriate classification ...................................................................................................................................................... 38 6.1.2 Service providers..................................................................................................................................................................... 38 6.1.3 Education ................................................................................................................................................................................. 38 6.1.4 Digital age of consent ............................................................................................................................................................. 39 6.1.5 Android platform ..................................................................................................................................................................... 39 6.1.6 Privacy ..................................................................................................................................................................................... 39 6.2 FUTURE RESEARCH........................................................................................................................................ 39 REFERENCES .......................................................................................................................................