Child Protection on Internet: A Research Proposal on AI and Ethics
VerifiedAdded on 2022/10/19
|24
|6249
|25
Report
AI Summary
This research proposal investigates the impact of the internet on children, focusing on the various threats and inappropriate content that can negatively affect them. The proposal explores several research questions, including how to protect children from adult content, internet predators, and social engineers. A comprehensive literature review examines existing research on the topic, highlighting the negative impacts of inappropriate content, such as the sexualization of children, exposure to explicit materials, and the potential for depression and psychological stress. The proposal also discusses different methodologies for data collection and analysis, considering ethical considerations, and outlining a project plan. It emphasizes the importance of parental controls, internet filters, and understanding family values to safeguard children. The research also addresses the impact of online games and the role of remote management tools in managing children's online activities, offering valuable insights into internet safety and child protection.
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.

Running head: CHILD PROTECTION ON INTERNET
Child protection on the internet
Name of the Student
Name of the University
Author note
Child protection on the internet
Name of the Student
Name of the University
Author note
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.

1CHILD PROTECTION ON INTERNET
Abstract
The foremost determination of this proposal is the identification of the impact of the internet
threats for the children of our society. There are diverse categories of threats coming from the
internet sources which have an undesirable impact on the children. This proposal will be very
much useful to identify the diverse ways to control the adult and the inappropriate internet
contents which might have a direct negative impact on the children of our society.
The proposal will have numerous segments, and each of the segment will be very much
significant in order to maintain the effectiveness and standard of this proposal. Detailed
discussed of the chosen research methodologies like data collection, and data analysis shall
be discussed in this chapter which will be followed by the discussion of the ethical
considerations of this proposal.
Abstract
The foremost determination of this proposal is the identification of the impact of the internet
threats for the children of our society. There are diverse categories of threats coming from the
internet sources which have an undesirable impact on the children. This proposal will be very
much useful to identify the diverse ways to control the adult and the inappropriate internet
contents which might have a direct negative impact on the children of our society.
The proposal will have numerous segments, and each of the segment will be very much
significant in order to maintain the effectiveness and standard of this proposal. Detailed
discussed of the chosen research methodologies like data collection, and data analysis shall
be discussed in this chapter which will be followed by the discussion of the ethical
considerations of this proposal.

2CHILD PROTECTION ON INTERNET
Table of Contents
Introduction................................................................................................................................3
Research Questions....................................................................................................................3
Literature Review.......................................................................................................................4
Literature Gap............................................................................................................................9
Research methodology.............................................................................................................11
Data Collection.....................................................................................................................11
Data Analysis.......................................................................................................................12
Investigation Technique.......................................................................................................13
Sampling..............................................................................................................................13
Aligning with research questions.............................................................................................14
Project plan...............................................................................................................................15
Ethical considerations..............................................................................................................15
References................................................................................................................................16
Appendix..................................................................................................................................21
Table of Contents
Introduction................................................................................................................................3
Research Questions....................................................................................................................3
Literature Review.......................................................................................................................4
Literature Gap............................................................................................................................9
Research methodology.............................................................................................................11
Data Collection.....................................................................................................................11
Data Analysis.......................................................................................................................12
Investigation Technique.......................................................................................................13
Sampling..............................................................................................................................13
Aligning with research questions.............................................................................................14
Project plan...............................................................................................................................15
Ethical considerations..............................................................................................................15
References................................................................................................................................16
Appendix..................................................................................................................................21

3CHILD PROTECTION ON INTERNET
Introduction
The notable determination of this research is the identification of the diverse
categories of internet activities which are having a negative impact on the children of our
society. There are diverse categories of inappropriate contents which are available in diverse
internet sources. The needs and requirements of our society is changing at a huge rate and the
reasons behind using internet is getting increased each and every day. Inappropriate and adult
contents are increasing mainly due to business purposes, this is having an undesirable impact
on the younger sections of the society especially the kids (González, Ramírez and Viadel
2015). There are diverse categories of risks which are associated with diverse internet
contents, at the same time it can also be seen that the international internet safety laws are
unable to protect the adult contents of the website (Oates 2005). There are diverse categories
of tools associated with the protection of the adult contents on the internet platforms, those
tools are also unable to restrict the adult contents which usually have an undesirable impact
on a child who might be using the internet sources for educational purposes.
This proposal will be having two diverse categories of data collection procedures and
data analysis procedures which will be very much significant to understand the ways by
which children can be protected from adults contents which are increasingly becoming
common in most of the internet sources these days (Fink 2019). The required online and
offline which can help the children of our society from these adult or unsocial contents which
are available in the internet sources. The following unit of this research proposal will be very
much useful to identify the research questions.
Research Questions
The unambiguous research questions of this proposal are listed below.
Introduction
The notable determination of this research is the identification of the diverse
categories of internet activities which are having a negative impact on the children of our
society. There are diverse categories of inappropriate contents which are available in diverse
internet sources. The needs and requirements of our society is changing at a huge rate and the
reasons behind using internet is getting increased each and every day. Inappropriate and adult
contents are increasing mainly due to business purposes, this is having an undesirable impact
on the younger sections of the society especially the kids (González, Ramírez and Viadel
2015). There are diverse categories of risks which are associated with diverse internet
contents, at the same time it can also be seen that the international internet safety laws are
unable to protect the adult contents of the website (Oates 2005). There are diverse categories
of tools associated with the protection of the adult contents on the internet platforms, those
tools are also unable to restrict the adult contents which usually have an undesirable impact
on a child who might be using the internet sources for educational purposes.
This proposal will be having two diverse categories of data collection procedures and
data analysis procedures which will be very much significant to understand the ways by
which children can be protected from adults contents which are increasingly becoming
common in most of the internet sources these days (Fink 2019). The required online and
offline which can help the children of our society from these adult or unsocial contents which
are available in the internet sources. The following unit of this research proposal will be very
much useful to identify the research questions.
Research Questions
The unambiguous research questions of this proposal are listed below.
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.

4CHILD PROTECTION ON INTERNET
What are the probable ways to protect a child from adult contents or unsocial
contents?
How inappropriate contents can be restricted in the first place?
What are the ways to protect a child from the internet predators and social engineers?
What internet protocols should be maintained in order to stop adult contents?
Literature Review
As exemplified by Festl and Quandt (2016), daily activities and routines of children
are directly affected by diverse categories of harmful internet contents. The paper was very
much useful to understand that social involvement of the children are getting affected due to
the internet contents. The investigator of this paper stated that most of the children in our
society are getting sexualized due to the adult contents of the website. Sexual materials are
increasingly used in the internet contents, which are have an undesirable in pact on both our
society as well as in commercial establishments. The paper is very much useful to understand
that children aged 8 or 9 are coming across the sexually explicit materials from the internet
sources (Wisniewski et al. 2015). The paper was also very much helpful to understand the
adult contents are having a negative impact on the younger section of the society. The
investigator of this paper stated that behaviours of the children are also getting affected due to
the adult contents which are available in the internet sources. Chances of unprotected sex
among the teenagers are the other negative impact of the internet sources.
However, as debated by Edwards and Olding (2015), drugs and consumption of
alcohol in the teenage periods are the most negative impact of the adult contents on the
internet sources. The investigator of this paper highlighted that pornographic risks of the
teenagers are getting increased each and every day. The investigator of this paper expressed
his opinion about the restrictions which has to be imposed on the internet sources which
What are the probable ways to protect a child from adult contents or unsocial
contents?
How inappropriate contents can be restricted in the first place?
What are the ways to protect a child from the internet predators and social engineers?
What internet protocols should be maintained in order to stop adult contents?
Literature Review
As exemplified by Festl and Quandt (2016), daily activities and routines of children
are directly affected by diverse categories of harmful internet contents. The paper was very
much useful to understand that social involvement of the children are getting affected due to
the internet contents. The investigator of this paper stated that most of the children in our
society are getting sexualized due to the adult contents of the website. Sexual materials are
increasingly used in the internet contents, which are have an undesirable in pact on both our
society as well as in commercial establishments. The paper is very much useful to understand
that children aged 8 or 9 are coming across the sexually explicit materials from the internet
sources (Wisniewski et al. 2015). The paper was also very much helpful to understand the
adult contents are having a negative impact on the younger section of the society. The
investigator of this paper stated that behaviours of the children are also getting affected due to
the adult contents which are available in the internet sources. Chances of unprotected sex
among the teenagers are the other negative impact of the internet sources.
However, as debated by Edwards and Olding (2015), drugs and consumption of
alcohol in the teenage periods are the most negative impact of the adult contents on the
internet sources. The investigator of this paper highlighted that pornographic risks of the
teenagers are getting increased each and every day. The investigator of this paper expressed
his opinion about the restrictions which has to be imposed on the internet sources which

5CHILD PROTECTION ON INTERNET
promotes these adult contents (Graham and Dutton, 2019). The investigator of this paper
stated that internet filters and parenting controls are the prime procedures which can be very
much useful to safeguard the children of our society from various adult contents on internet
sources. The investigator of this paper also stated that family value must be understood by the
children which can be very much useful to address the issue of adult contents.
As revealed by Craun, Bourke and Coulson (2015), decentralization can be very much
useful to safeguard child from the adult contents of the website. The paper is very much
useful to understand the impact of the adult contents on children. The investigator of this
paper highlighted that attitude and sexual behaviour of the children gets affected after
viewing the violent videos which are available in the internet sources. The paper is very much
useful to understand the impact of pornography on children. The paper also helped in
understanding that adult contents are very much easily available these days. Depression is
one of the significant impact of the adult contents of the paper as stated by the researcher of
this paper. The paper is very much significant to understand that emotional stress of the
children increases due to the inappropriate contests which are easily found on the internet
sources. The investigator of this paper highlighted that psychological stress usually (Guedes
et al. 2016). The paper is also very much useful to understand that teenage pregnancy is
slowly getting increased in our society and the adult or the inappropriate contents which are
available on the internet can be the reason behind these in appropriate content. The
investigator of this paper stated that internet filtering services must be provided by each of
the internet services providers which can help them to control the inappropriate contents of
the adult websites. The paper also focused on the huge amount of impact of pornography on
the children. A detailed case study analysis which is provided in this paper showed that more
than 65% children below 10years views porn at least twice in a week (Wang et al. 2017).
promotes these adult contents (Graham and Dutton, 2019). The investigator of this paper
stated that internet filters and parenting controls are the prime procedures which can be very
much useful to safeguard the children of our society from various adult contents on internet
sources. The investigator of this paper also stated that family value must be understood by the
children which can be very much useful to address the issue of adult contents.
As revealed by Craun, Bourke and Coulson (2015), decentralization can be very much
useful to safeguard child from the adult contents of the website. The paper is very much
useful to understand the impact of the adult contents on children. The investigator of this
paper highlighted that attitude and sexual behaviour of the children gets affected after
viewing the violent videos which are available in the internet sources. The paper is very much
useful to understand the impact of pornography on children. The paper also helped in
understanding that adult contents are very much easily available these days. Depression is
one of the significant impact of the adult contents of the paper as stated by the researcher of
this paper. The paper is very much significant to understand that emotional stress of the
children increases due to the inappropriate contests which are easily found on the internet
sources. The investigator of this paper highlighted that psychological stress usually (Guedes
et al. 2016). The paper is also very much useful to understand that teenage pregnancy is
slowly getting increased in our society and the adult or the inappropriate contents which are
available on the internet can be the reason behind these in appropriate content. The
investigator of this paper stated that internet filtering services must be provided by each of
the internet services providers which can help them to control the inappropriate contents of
the adult websites. The paper also focused on the huge amount of impact of pornography on
the children. A detailed case study analysis which is provided in this paper showed that more
than 65% children below 10years views porn at least twice in a week (Wang et al. 2017).

6CHILD PROTECTION ON INTERNET
These statistics are different in each countries, at the same time the researcher also stated that
adolescent boys are more attracted to these inappropriate contents as compared with the girls.
As stated by Edwards and Olding (2015), there are diverse categories of support
which are obtained from anti-virus software programs. The paper is very much helpful to
understand the contribution of K9 web protection facility. The paper is very much significant
to understand the impact of deploying K9 as it can successfully help to monitor the content of
each of the internet pages (Tan et al. 2017). The investigator of this paper also stated that any
sort of negative implications like spyware, malware, inappropriate contents, adult contents
and other issues which might have a direct impact in our society can be managed using the
K9 website protection facilities (Hasan 2016). Being one of the most significant product of
Norton, K9 is very much useful platform which can be very much helpful to protect the
children of our society from the inappropriate contents which are available in the internet
sources.
According to Craun, Bourke and Coulson, 2015), parental controls can be very much
significant to protect the children from adult contents or inappropriate contents. The
investigator of this paper stated that most of Microsoft users can change the internet settings
in the desktop versions. The investigator of this paper fixated on the creation of parental
control which can be very much effective protect the children from the inappropriate
contents. The paper was very much useful for restricted any sort on adult contents as these
usually have a direct negative impact on the children of our society (Pimentel et al. 2016).
The paper is very much useful to manage the threats coming from the inappropriate internet
sources.
Even though as illustrated by Craig (2016), it can be said that keeping an eye on the
web browsers can play a huge role in the addressing the issues coming from the internet
These statistics are different in each countries, at the same time the researcher also stated that
adolescent boys are more attracted to these inappropriate contents as compared with the girls.
As stated by Edwards and Olding (2015), there are diverse categories of support
which are obtained from anti-virus software programs. The paper is very much helpful to
understand the contribution of K9 web protection facility. The paper is very much significant
to understand the impact of deploying K9 as it can successfully help to monitor the content of
each of the internet pages (Tan et al. 2017). The investigator of this paper also stated that any
sort of negative implications like spyware, malware, inappropriate contents, adult contents
and other issues which might have a direct impact in our society can be managed using the
K9 website protection facilities (Hasan 2016). Being one of the most significant product of
Norton, K9 is very much useful platform which can be very much helpful to protect the
children of our society from the inappropriate contents which are available in the internet
sources.
According to Craun, Bourke and Coulson, 2015), parental controls can be very much
significant to protect the children from adult contents or inappropriate contents. The
investigator of this paper stated that most of Microsoft users can change the internet settings
in the desktop versions. The investigator of this paper fixated on the creation of parental
control which can be very much effective protect the children from the inappropriate
contents. The paper was very much useful for restricted any sort on adult contents as these
usually have a direct negative impact on the children of our society (Pimentel et al. 2016).
The paper is very much useful to manage the threats coming from the inappropriate internet
sources.
Even though as illustrated by Craig (2016), it can be said that keeping an eye on the
web browsers can play a huge role in the addressing the issues coming from the internet
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

7CHILD PROTECTION ON INTERNET
contents. The investigator of the paper stated that installation of the mature content filter
software can be very much useful to address the internet safety of the children (Takeuchi et
al. 2018). The paper is very much useful to understand that online game also have few
inappropriate and adult contents these days (Hayn, Kaplan and Clemmons 2016). The paper
was very much useful to understand the significance of the remote management tools which
can be very much useful to manage the contents of the websites which are usually accessed
by the children for educational purposes. The online activities of the children have to be
checked by their respective parents which can be very much beneficial to protect the children
from the internet threats.
As discussed by Celis-Morales et al. (2015), parental control can be easily set from
the configuration page of the routers. The paper was very much useful to understand the
significance of Open DNS which can be very much useful to filter the diverse category of
data which comes in and out of the network. The investigator of this paper focussed on the
effectiveness of the parental controls on the internet sources in a detailed manner. The
limitation of internet usage for the children was highlighted in this paper in a detailed
manner. The researcher of this paper provided a detailed explanation of the way which can be
very much useful to set the parental controls on the Microsoft account (Jain et al. 2018).
Windows settings is the major settings from where parental controls can selected. Family or
child options has to be selected in the first place from the same settings. The settings will also
allow to add family members and also allow in adding a child, it will be followed by the
creation of a Microsoft account (Short, Kasper and Wetterneck 2015). The paper was very
much useful to understand the different categories of ways which can be very much useful to
understand the installation procedure of the parental controls on the internet sources.
contents. The investigator of the paper stated that installation of the mature content filter
software can be very much useful to address the internet safety of the children (Takeuchi et
al. 2018). The paper is very much useful to understand that online game also have few
inappropriate and adult contents these days (Hayn, Kaplan and Clemmons 2016). The paper
was very much useful to understand the significance of the remote management tools which
can be very much useful to manage the contents of the websites which are usually accessed
by the children for educational purposes. The online activities of the children have to be
checked by their respective parents which can be very much beneficial to protect the children
from the internet threats.
As discussed by Celis-Morales et al. (2015), parental control can be easily set from
the configuration page of the routers. The paper was very much useful to understand the
significance of Open DNS which can be very much useful to filter the diverse category of
data which comes in and out of the network. The investigator of this paper focussed on the
effectiveness of the parental controls on the internet sources in a detailed manner. The
limitation of internet usage for the children was highlighted in this paper in a detailed
manner. The researcher of this paper provided a detailed explanation of the way which can be
very much useful to set the parental controls on the Microsoft account (Jain et al. 2018).
Windows settings is the major settings from where parental controls can selected. Family or
child options has to be selected in the first place from the same settings. The settings will also
allow to add family members and also allow in adding a child, it will be followed by the
creation of a Microsoft account (Short, Kasper and Wetterneck 2015). The paper was very
much useful to understand the different categories of ways which can be very much useful to
understand the installation procedure of the parental controls on the internet sources.

8CHILD PROTECTION ON INTERNET
As stated by Brunton et al. (2016), understanding user accounts can be very much
significant in order to protect our child from internet sources. The paper is very much useful
to understand how diverse categories of operating systems provides security over the content
issues. The investigator of this paper mentioned that each website and application must be
having privacy restrictions which can be very much beneficial to protect the children from
adult or inappropriate contents. The investigators of this paper highlighted the significance of
the screen time password which can be very much useful to restrict the adult contents of the
website (Lupien et al. 2017). The paper focussed highly on the content restriction procedures
which can help the children of our society to deal with the inappropriate contents (Songluck
2018). Limitation of adult websites is one of the other ways of restricting the adult contents
of the websites. The investigator of this resources helps in understanding the internet
activities of the children, at the same time this resource was also be very much helpful to
understand the significance of monitoring the internet activities of the children using the
history option.
As mentioned by Brosch (2016), activities of the children on the internet browsers can
be very much significant in order to restrict the adult contents of the website. The investigator
of this paper also stated about the role of the routers which can also be used to restrict the
adult contents from inappropriate sources. Talking to the kids about the negative impact of
the adult contents can also be very much beneficial to abandon or restrict the kids from
getting access to adult websites and other inappropriate contents. The investigator of this
paper stated that setting the expectation and boundaries to the children can be very much
effective to improve the child protection on the internet sources (Mitzner et al. 2016). The
investigator of this paper also focussed on the router setting from where all the internet
activities can be monitored. All the websites which are surfed from internet sources can be
monitored from the router settings. Addition of a router accessory can be very much
As stated by Brunton et al. (2016), understanding user accounts can be very much
significant in order to protect our child from internet sources. The paper is very much useful
to understand how diverse categories of operating systems provides security over the content
issues. The investigator of this paper mentioned that each website and application must be
having privacy restrictions which can be very much beneficial to protect the children from
adult or inappropriate contents. The investigators of this paper highlighted the significance of
the screen time password which can be very much useful to restrict the adult contents of the
website (Lupien et al. 2017). The paper focussed highly on the content restriction procedures
which can help the children of our society to deal with the inappropriate contents (Songluck
2018). Limitation of adult websites is one of the other ways of restricting the adult contents
of the websites. The investigator of this resources helps in understanding the internet
activities of the children, at the same time this resource was also be very much helpful to
understand the significance of monitoring the internet activities of the children using the
history option.
As mentioned by Brosch (2016), activities of the children on the internet browsers can
be very much significant in order to restrict the adult contents of the website. The investigator
of this paper also stated about the role of the routers which can also be used to restrict the
adult contents from inappropriate sources. Talking to the kids about the negative impact of
the adult contents can also be very much beneficial to abandon or restrict the kids from
getting access to adult websites and other inappropriate contents. The investigator of this
paper stated that setting the expectation and boundaries to the children can be very much
effective to improve the child protection on the internet sources (Mitzner et al. 2016). The
investigator of this paper also focussed on the router setting from where all the internet
activities can be monitored. All the websites which are surfed from internet sources can be
monitored from the router settings. Addition of a router accessory can be very much

9CHILD PROTECTION ON INTERNET
beneficial during the installation of the parental controls. The investigator of this paper
acknowledge the content restriction facility which is very much available in the Apple
devices (Stead and Bibby 2017). The investigator of this paper also helped in identifying the
role of the internet services providers who have the detailed data of each of the internet
sources which are browsed in each of the IP addresses. The role of the network
administrator can be very much significant in order to manage the contents of the websites as
they can check and see each of the internet activities.
As illustrated by Brooks, Longstreet and Califf (2017), there are diverse categories of
software like mSpy which are readily available on the internet which can be very much useful
to see the online internet activities of the children of our society (Svantesson 2016). The
investigator of this paper highlighted about the significance and specification provided by
software like Spy Bubble which can be very much useful to monitor any suspected internet
activities. The investigator of this paper also stated about the specification of diverse
categories of software like The Phone Sheriff and Mobicop which can be very much useful to
monitor the internet activities of the kids of our society (Molin, Sorbring and Löfgren-
Mårtenson 2015). The investigator of this paper also highlighted the significance of software
like Mobicop and Mamabear which can be very much useful to monitor the internet activities
of the kids.
However as mentioned by Batalla (2017), smart Wi-Fi account can be very much
useful to restrict internet contents. The paper is very much useful to understand the
significance of the Wi-Fi account which can be very much useful to restrict the internet
access. The paper was also very much useful to understand the exact location of the settings
from where internet access can be restricted. The paper was very much useful to understand
that parental control can also be set on Google platforms (Moore 2017). The paper was also
beneficial during the installation of the parental controls. The investigator of this paper
acknowledge the content restriction facility which is very much available in the Apple
devices (Stead and Bibby 2017). The investigator of this paper also helped in identifying the
role of the internet services providers who have the detailed data of each of the internet
sources which are browsed in each of the IP addresses. The role of the network
administrator can be very much significant in order to manage the contents of the websites as
they can check and see each of the internet activities.
As illustrated by Brooks, Longstreet and Califf (2017), there are diverse categories of
software like mSpy which are readily available on the internet which can be very much useful
to see the online internet activities of the children of our society (Svantesson 2016). The
investigator of this paper highlighted about the significance and specification provided by
software like Spy Bubble which can be very much useful to monitor any suspected internet
activities. The investigator of this paper also stated about the specification of diverse
categories of software like The Phone Sheriff and Mobicop which can be very much useful to
monitor the internet activities of the kids of our society (Molin, Sorbring and Löfgren-
Mårtenson 2015). The investigator of this paper also highlighted the significance of software
like Mobicop and Mamabear which can be very much useful to monitor the internet activities
of the kids.
However as mentioned by Batalla (2017), smart Wi-Fi account can be very much
useful to restrict internet contents. The paper is very much useful to understand the
significance of the Wi-Fi account which can be very much useful to restrict the internet
access. The paper was also very much useful to understand the exact location of the settings
from where internet access can be restricted. The paper was very much useful to understand
that parental control can also be set on Google platforms (Moore 2017). The paper was also
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.

10CHILD PROTECTION ON INTERNET
very much useful to understand the significance of the screen time passwords which can
allow the users to restrict the contents of the website.
The gap in the literature will be presented in the ensuing segment of this proposal in
an organized manner.
Literature Gap
The investigator of this paper failed to focus on the difference between The Phone
Sheriff and mSpy. Valuation of each of the software was not discussed in each of the above
paper, at the same time the limitation of the software which can be used to address the issues
of adult content for the children was not highlighted in any of the above discussion. Each of
this software are very much expensive in nature and it is a huge sources of concern for the
parents of our society. There are diverse limitations associated with this software like
blockage of the essential internet sources which are used by the children for educational
purposes. The installation procedure of this software is very much different from regular
software, which is the other significant concern for the parents this was not nor covered in
any of the discussion in the literature review. The literature review failed to discuss the
effectiveness of this software as any social engineering activity can have a huge impact on
the efficiency of this software.
Setting of the time limitation is one of the prime limitation regarding the deployment
of the parenting controls which are not discussed in a detailed manner in the literature review.
The investigator of the above papers failed to highlight the compatibility of parental control
with diverse categories of internet browsers like Google Chrome and Firefox. The time
limitations of the Chrome book was also not discussed in this paper.
The researchers of these paper also failed to discuss the effectiveness of the wireless
routers, which can be very much useful to keep a log of each of the internet activities of the
very much useful to understand the significance of the screen time passwords which can
allow the users to restrict the contents of the website.
The gap in the literature will be presented in the ensuing segment of this proposal in
an organized manner.
Literature Gap
The investigator of this paper failed to focus on the difference between The Phone
Sheriff and mSpy. Valuation of each of the software was not discussed in each of the above
paper, at the same time the limitation of the software which can be used to address the issues
of adult content for the children was not highlighted in any of the above discussion. Each of
this software are very much expensive in nature and it is a huge sources of concern for the
parents of our society. There are diverse limitations associated with this software like
blockage of the essential internet sources which are used by the children for educational
purposes. The installation procedure of this software is very much different from regular
software, which is the other significant concern for the parents this was not nor covered in
any of the discussion in the literature review. The literature review failed to discuss the
effectiveness of this software as any social engineering activity can have a huge impact on
the efficiency of this software.
Setting of the time limitation is one of the prime limitation regarding the deployment
of the parenting controls which are not discussed in a detailed manner in the literature review.
The investigator of the above papers failed to highlight the compatibility of parental control
with diverse categories of internet browsers like Google Chrome and Firefox. The time
limitations of the Chrome book was also not discussed in this paper.
The researchers of these paper also failed to discuss the effectiveness of the wireless
routers, which can be very much useful to keep a log of each of the internet activities of the

11CHILD PROTECTION ON INTERNET
children. These paper focused mainly on the negative impact of the adult and inappropriate
contents, however diverse social engineering aspects like cyberbullying and cyber predators
was not highlighted by any of the investigators. The paper also failed to discuss the threats
coming from phishing emails and other scamming activities which can have an undesirable
impact on our society. None of the investigators of these papers stated that about the malware
activities which is increasingly becoming common in the recent times. The impact of the
social engineering activities was not highlighted by each of the investigators whose opinions
were considered in the literature review unit of the paper. The diverse categories of threats
like the online scam which can have an undesirable impact on the children of our society. The
concept of ransomware which is one of the prime cybersecurity threat in the last few years,
was not discussed by any of the investigastors of the literature review. There are diverse
categories of violent video which circulates in most of the internet sources, viewing these
sources can have a significant impact on the children of our society. Concepts of gambling
which is also very much common in most of the internet sources have not been discussed by
any of the investigators of this paper. There are diverse categories of websites which shows
the deployment of advanced weapons, these videos also have an undesirable impact on
children; none of the investigators highlighted about the impact of these videos, detailed
discussion of these videos was also not discussed in the literature review. The deployment of
the absence language was also not highlighted by the investigators of the literature review.
The detailed description of the research methodology along with the justification will
be described in the following section of this proposal.
Research methodology
There are sections of research methodology which will be deployed in this research
proposal like research design, data collection procedure, sampling method, data analysis, and
children. These paper focused mainly on the negative impact of the adult and inappropriate
contents, however diverse social engineering aspects like cyberbullying and cyber predators
was not highlighted by any of the investigators. The paper also failed to discuss the threats
coming from phishing emails and other scamming activities which can have an undesirable
impact on our society. None of the investigators of these papers stated that about the malware
activities which is increasingly becoming common in the recent times. The impact of the
social engineering activities was not highlighted by each of the investigators whose opinions
were considered in the literature review unit of the paper. The diverse categories of threats
like the online scam which can have an undesirable impact on the children of our society. The
concept of ransomware which is one of the prime cybersecurity threat in the last few years,
was not discussed by any of the investigastors of the literature review. There are diverse
categories of violent video which circulates in most of the internet sources, viewing these
sources can have a significant impact on the children of our society. Concepts of gambling
which is also very much common in most of the internet sources have not been discussed by
any of the investigators of this paper. There are diverse categories of websites which shows
the deployment of advanced weapons, these videos also have an undesirable impact on
children; none of the investigators highlighted about the impact of these videos, detailed
discussion of these videos was also not discussed in the literature review. The deployment of
the absence language was also not highlighted by the investigators of the literature review.
The detailed description of the research methodology along with the justification will
be described in the following section of this proposal.
Research methodology
There are sections of research methodology which will be deployed in this research
proposal like research design, data collection procedure, sampling method, data analysis, and

12CHILD PROTECTION ON INTERNET
research philosophy (Shin 2015). Research methodology is one of the prime chapters of this
research proposal and the effectiveness of the proposal will depend entirely on this chapter of
the proposal.
Data Collection
There are diverse categories of data collection procedures which are generally used in
the proposals like secondary and primary data collection procedures. Primary data is
generally collected from primary sources using personal interview, Delphi technique, focus
group interview, questionnaires, and group discussion (Mosca and Barrett 2016). Whereas
secondary data collection process is the gathering of the data from secondary resources like
government databases, census researches, personal records, clients, service records and other
significant data sources like Google Scholar. Selection of the data must be from reliable
sources which can be very much significant to maintain the desired standard of this proposal.
Chosen data collection method: Secondary data collection method will be chosen in
this proposal where peer reviewed journal from Google Scholar will be selected for getting
the data of this proposal. Out of data and inaccuracy are the prime limitations of the
secondary data collection procedures. The prime challenges which can be faced during the
secondary data collection is the selection of the latest peer reviewed articles as there are
several peer reviewed articles available in Scholar which can be useful to study the selected
topic in a detailed manner.
Data Analysis
There are diverse categories of data analysis procedures which can be used in the
proposals like exploratory and explanatory procedures. Both these two categories of
procedures are very much beneficial to maintain the reliability of the collected data. Visual
methods are selected for the exploratory data analysis procedures whereas relationships and
research philosophy (Shin 2015). Research methodology is one of the prime chapters of this
research proposal and the effectiveness of the proposal will depend entirely on this chapter of
the proposal.
Data Collection
There are diverse categories of data collection procedures which are generally used in
the proposals like secondary and primary data collection procedures. Primary data is
generally collected from primary sources using personal interview, Delphi technique, focus
group interview, questionnaires, and group discussion (Mosca and Barrett 2016). Whereas
secondary data collection process is the gathering of the data from secondary resources like
government databases, census researches, personal records, clients, service records and other
significant data sources like Google Scholar. Selection of the data must be from reliable
sources which can be very much significant to maintain the desired standard of this proposal.
Chosen data collection method: Secondary data collection method will be chosen in
this proposal where peer reviewed journal from Google Scholar will be selected for getting
the data of this proposal. Out of data and inaccuracy are the prime limitations of the
secondary data collection procedures. The prime challenges which can be faced during the
secondary data collection is the selection of the latest peer reviewed articles as there are
several peer reviewed articles available in Scholar which can be useful to study the selected
topic in a detailed manner.
Data Analysis
There are diverse categories of data analysis procedures which can be used in the
proposals like exploratory and explanatory procedures. Both these two categories of
procedures are very much beneficial to maintain the reliability of the collected data. Visual
methods are selected for the exploratory data analysis procedures whereas relationships and
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

13CHILD PROTECTION ON INTERNET
outcome of the data can be managed using the explanatory data analysis procedures (Müller
et al. 2016). Business decision and other essential decisions can be done in an organized
manner using the diverse categories of data analysis procedures.
Chosen data analysis method: Quantitative data analysis techniques was chosen in
this proposal as it is the best data analysis procedure for the data collection procedure which
was selected for this proposal. However, it can be said that there are diverse categories of
good and bad points. The most significant positive of this data analysis technique is the
scientific approach which is maintained if this data analysis technique is selected.
Effectiveness of the collected data can be maintained using this data analysis technique. The
most significant limitation of this data analysis procedure is the compatibility issues with the
non-probabilistic sampling method (Schröder et al. 2016). The quality of the data collection
is also very much significant in order to identify data analysis techniques.
Investigation Technique
There are diverse categories of investigation technique which are generally deployed
in research proposals like descriptive research approach and explanatory research approach.
Explanatory technique are very much useful to have if there is a clear idea about the selected
topic and descriptive technique is defined as the technique where relevant theories and
concepts are considered (Olanrewaju and Soetan 2018). The efficiency and reliability of the
proposal is hugely depended on the type of investigation technique which is selected in the
research proposals.
Chosen investigation technique: Descriptive investigation technique will be
considered in this proposal as relevant theories from secondary sources will be very much
useful to identify the findings of this proposal. There are limitations and advantages
associated with descriptive investigation techniques. Reliability of the collected data must be
outcome of the data can be managed using the explanatory data analysis procedures (Müller
et al. 2016). Business decision and other essential decisions can be done in an organized
manner using the diverse categories of data analysis procedures.
Chosen data analysis method: Quantitative data analysis techniques was chosen in
this proposal as it is the best data analysis procedure for the data collection procedure which
was selected for this proposal. However, it can be said that there are diverse categories of
good and bad points. The most significant positive of this data analysis technique is the
scientific approach which is maintained if this data analysis technique is selected.
Effectiveness of the collected data can be maintained using this data analysis technique. The
most significant limitation of this data analysis procedure is the compatibility issues with the
non-probabilistic sampling method (Schröder et al. 2016). The quality of the data collection
is also very much significant in order to identify data analysis techniques.
Investigation Technique
There are diverse categories of investigation technique which are generally deployed
in research proposals like descriptive research approach and explanatory research approach.
Explanatory technique are very much useful to have if there is a clear idea about the selected
topic and descriptive technique is defined as the technique where relevant theories and
concepts are considered (Olanrewaju and Soetan 2018). The efficiency and reliability of the
proposal is hugely depended on the type of investigation technique which is selected in the
research proposals.
Chosen investigation technique: Descriptive investigation technique will be
considered in this proposal as relevant theories from secondary sources will be very much
useful to identify the findings of this proposal. There are limitations and advantages
associated with descriptive investigation techniques. Reliability of the collected data must be

14CHILD PROTECTION ON INTERNET
very much on the higher side of descriptive methodology is selected in this proposal.
Confidentiality of the data has to be maintained in the first place according to this
investigation procedure. Generation of generalized results is the significant limitation
associated with this investigation procedure.
Sampling
There are diverse categories of sampling techniques which are usually considered in
research proposal like non-probabilistic and probabilistic sampling method. Primary data are
generally sampled using the probabilistic sampling procedure, whereas the secondary data is
generally sampled using the non-probabilistic sampling procedure (Phelan et al. 2017).
Accuracy of the data analysis can be maintained using both these two categories of sampling
procedures.
Chosen sampling method:
Non-probabilistic sampling method will be chosen in this research proposal as it can
be very much significant to sample the secondary data which will be selected from secondary
sources like Google Scholar. The cost associated with the non-probabilistic sampling method
is one of the prime limitation associated with the non-probabilistic sampling method. Non-
probabilistic sampling method took very less amount of time which is a very significant
positive of the non-probabilistic sampling method (Poushter 2016). After the data analysis
procedure, this sampling method is very much useful to organize the data in an organized
manner.
Aligning with research questions
The selected research methodologies in terms of the data collection procedures, data
analysis, sampling technique and the investigation procedure is very much useful to identify
very much on the higher side of descriptive methodology is selected in this proposal.
Confidentiality of the data has to be maintained in the first place according to this
investigation procedure. Generation of generalized results is the significant limitation
associated with this investigation procedure.
Sampling
There are diverse categories of sampling techniques which are usually considered in
research proposal like non-probabilistic and probabilistic sampling method. Primary data are
generally sampled using the probabilistic sampling procedure, whereas the secondary data is
generally sampled using the non-probabilistic sampling procedure (Phelan et al. 2017).
Accuracy of the data analysis can be maintained using both these two categories of sampling
procedures.
Chosen sampling method:
Non-probabilistic sampling method will be chosen in this research proposal as it can
be very much significant to sample the secondary data which will be selected from secondary
sources like Google Scholar. The cost associated with the non-probabilistic sampling method
is one of the prime limitation associated with the non-probabilistic sampling method. Non-
probabilistic sampling method took very less amount of time which is a very significant
positive of the non-probabilistic sampling method (Poushter 2016). After the data analysis
procedure, this sampling method is very much useful to organize the data in an organized
manner.
Aligning with research questions
The selected research methodologies in terms of the data collection procedures, data
analysis, sampling technique and the investigation procedure is very much useful to identify

15CHILD PROTECTION ON INTERNET
the findings of the paper as only peer reviewed articles were considered in data collection
procedure (Rossi and Rossi 2018). Any sort of discrepancy which is common in the primary
data collection procedures was purposefully avoided in this proposal which was very much
helpful to address the research questions which asked about the probable ways to protect
child from the threats coming from internet sources and to identify the threats coming from
the social engineers. The selected data analysis procedures was very much significant to
identify the threats coming from internet predators.
The ensuing unit of this proposal will be highlighting the project plan of this
assignment, considering each of the major activities and sub activities.
the findings of the paper as only peer reviewed articles were considered in data collection
procedure (Rossi and Rossi 2018). Any sort of discrepancy which is common in the primary
data collection procedures was purposefully avoided in this proposal which was very much
helpful to address the research questions which asked about the probable ways to protect
child from the threats coming from internet sources and to identify the threats coming from
the social engineers. The selected data analysis procedures was very much significant to
identify the threats coming from internet predators.
The ensuing unit of this proposal will be highlighting the project plan of this
assignment, considering each of the major activities and sub activities.
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.

16CHILD PROTECTION ON INTERNET
Project plan
The detailed description of the entire plan of this proposal is represented in the
following pictorial description which is created using MS Project software.
ID Outline
Number
Task
Mode
Task Name Duration Start Finish
0 0 Child protection on
internet
23 days Fri 02-08-19 Tue 03-09-19
1 1 Phase 1 10 days Fri 02-08-19 Thu 15-08-19
2 1.1 Selection of the topic 2 days Fri 02-08-19 Mon 05-08-19
3 1.2 Identification of the
resources required in
this proposal
2 days Tue 06-08-19 Wed 07-08-19
4 1.3 Selection of resources 4 days Thu 08-08-19 Tue 13-08-19
5 1.4 Identifying the issues
of the proposal
2 days Wed 14-08-19 Thu 15-08-19
6 2 Phase 2 10 days Fri 16-08-19 Thu 29-08-19
7 2.1 Data collection 5 days Fri 16-08-19 Thu 22-08-19
8 2.2 Identify the gap in
literature
3 days Fri 23-08-19 Tue 27-08-19
9 2.3 Data Analysis 2 days Wed 28-08-19 Thu 29-08-19
10 3 Phase 3 3 days Fri 30-08-19 Tue 03-09-19
11 3.1 Data Sampling 2 days Fri 30-08-19 Mon 02-09-19
12 3.2 Project closure 1 day Tue 03-09-19 Tue 03-09-19
S W S T M F T S W S T M F T S W S T M
30 Jun '19 28 Jul '19 25 Aug '19 22 Sep '19 20 Oct '19 17 Nov '19 15 Dec '19 12 Jan '20
Figure 1: Scheduling of the proposal
(Source: Created by the author)
Ethical considerations
There are diverse categories of ethical considerations which has to be maintained in
each phase of this process right from the selection of the secondary resources to the
identification of the findings of this proposal. The prime ethical consideration of this proposal
is the data collection procedure, each of the investigators whose works were considered in
this proposal should be given proper the credit in the reference list of this proposal. Privacy
of the collected data must be maintained in each phase of this proposal. The other ethical
consideration of this proposal is that plagiarism should be avoided at any cost in this proposal
Project plan
The detailed description of the entire plan of this proposal is represented in the
following pictorial description which is created using MS Project software.
ID Outline
Number
Task
Mode
Task Name Duration Start Finish
0 0 Child protection on
internet
23 days Fri 02-08-19 Tue 03-09-19
1 1 Phase 1 10 days Fri 02-08-19 Thu 15-08-19
2 1.1 Selection of the topic 2 days Fri 02-08-19 Mon 05-08-19
3 1.2 Identification of the
resources required in
this proposal
2 days Tue 06-08-19 Wed 07-08-19
4 1.3 Selection of resources 4 days Thu 08-08-19 Tue 13-08-19
5 1.4 Identifying the issues
of the proposal
2 days Wed 14-08-19 Thu 15-08-19
6 2 Phase 2 10 days Fri 16-08-19 Thu 29-08-19
7 2.1 Data collection 5 days Fri 16-08-19 Thu 22-08-19
8 2.2 Identify the gap in
literature
3 days Fri 23-08-19 Tue 27-08-19
9 2.3 Data Analysis 2 days Wed 28-08-19 Thu 29-08-19
10 3 Phase 3 3 days Fri 30-08-19 Tue 03-09-19
11 3.1 Data Sampling 2 days Fri 30-08-19 Mon 02-09-19
12 3.2 Project closure 1 day Tue 03-09-19 Tue 03-09-19
S W S T M F T S W S T M F T S W S T M
30 Jun '19 28 Jul '19 25 Aug '19 22 Sep '19 20 Oct '19 17 Nov '19 15 Dec '19 12 Jan '20
Figure 1: Scheduling of the proposal
(Source: Created by the author)
Ethical considerations
There are diverse categories of ethical considerations which has to be maintained in
each phase of this process right from the selection of the secondary resources to the
identification of the findings of this proposal. The prime ethical consideration of this proposal
is the data collection procedure, each of the investigators whose works were considered in
this proposal should be given proper the credit in the reference list of this proposal. Privacy
of the collected data must be maintained in each phase of this proposal. The other ethical
consideration of this proposal is that plagiarism should be avoided at any cost in this proposal

17CHILD PROTECTION ON INTERNET
as any act of plagiarism can have an undesirable impact on the effectiveness of the findings
of the proposal.
as any act of plagiarism can have an undesirable impact on the effectiveness of the findings
of the proposal.

18CHILD PROTECTION ON INTERNET
References
Batalla, J.M. ed., 2017. Beyond the Internet of Things. Switzerland: Springer.
Brooks, S., Longstreet, P. and Califf, C., 2017. Social media induced technostress and its
impact on internet addiction: A distraction-conflict theory perspective. AIS Transactions on
Human-Computer Interaction, 9(2), pp.99-122.
Brosch, A., 2016. When the child is born into the Internet: Sharenting as a growing trend
among parents on Facebook.
Brunton, L., Hall, S., Passingham, A., Wulff, J. and Delitala, R., 2016. The prevalence,
location, severity, and daily impact of pain reported by youth and young adults with cerebral
palsy. Journal of pediatric rehabilitation medicine, 9(3), pp.177-183.
Celis-Morales, C., Livingstone, K.M., Woolhead, C., Forster, H., O’Donovan, C.B.,
Macready, A.L., Fallaize, R., Marsaux, C.F., Tsirigoti, L., Efstathopoulou, E. and Moschonis,
G., 2015. How reliable is internet-based self-reported identity, socio-demographic and
obesity measures in European adults?. Genes & nutrition, 10(5), p.28.
Craig, L., 2016. Contemporary motherhood: The impact of children on adult time. Routledge.
Craun, S.W., Bourke, M.L. and Coulson, F.N., 2015. The impact of internet crimes against
children work on relationships with families and friends: an exploratory study. Journal of
Family Violence, 30(3), pp.393-402.
Edwards, D. and Olding, L., 2015, October. Lack of awareness contributes to delayed
diagnosis and inappropriate management in men with low testosterone: findings from a UK
study of men diagnosed with hypogonadism. In Society for Endocrinology BES 2015 (Vol.
38). BioScientifica.
References
Batalla, J.M. ed., 2017. Beyond the Internet of Things. Switzerland: Springer.
Brooks, S., Longstreet, P. and Califf, C., 2017. Social media induced technostress and its
impact on internet addiction: A distraction-conflict theory perspective. AIS Transactions on
Human-Computer Interaction, 9(2), pp.99-122.
Brosch, A., 2016. When the child is born into the Internet: Sharenting as a growing trend
among parents on Facebook.
Brunton, L., Hall, S., Passingham, A., Wulff, J. and Delitala, R., 2016. The prevalence,
location, severity, and daily impact of pain reported by youth and young adults with cerebral
palsy. Journal of pediatric rehabilitation medicine, 9(3), pp.177-183.
Celis-Morales, C., Livingstone, K.M., Woolhead, C., Forster, H., O’Donovan, C.B.,
Macready, A.L., Fallaize, R., Marsaux, C.F., Tsirigoti, L., Efstathopoulou, E. and Moschonis,
G., 2015. How reliable is internet-based self-reported identity, socio-demographic and
obesity measures in European adults?. Genes & nutrition, 10(5), p.28.
Craig, L., 2016. Contemporary motherhood: The impact of children on adult time. Routledge.
Craun, S.W., Bourke, M.L. and Coulson, F.N., 2015. The impact of internet crimes against
children work on relationships with families and friends: an exploratory study. Journal of
Family Violence, 30(3), pp.393-402.
Edwards, D. and Olding, L., 2015, October. Lack of awareness contributes to delayed
diagnosis and inappropriate management in men with low testosterone: findings from a UK
study of men diagnosed with hypogonadism. In Society for Endocrinology BES 2015 (Vol.
38). BioScientifica.
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

19CHILD PROTECTION ON INTERNET
Festl, R. and Quandt, T., 2016. The role of online communication in long-term cyberbullying
involvement among girls and boys. Journal of youth and adolescence, 45(9), pp.1931-1945.
Fink, A., 2019. Conducting research literature reviews: From the internet to paper. Sage
publications.
González, A., Ramírez, M.P. and Viadel, V., 2015. ICT learning by older adults and their
attitudes toward computer use. Current gerontology and geriatrics research, 2015.
Graham, M. and Dutton, W.H. eds., 2019. Society and the internet: How networks of
information and communication are changing our lives. Oxford University Press.
Guedes, E., Sancassiani, F., Carta, M.G., Campos, C., Machado, S., King, A.L.S. and Nardi,
A.E., 2016. Internet addiction and excessive social networks use: what about Facebook?.
Clinical practice and epidemiology in mental health: CP & EMH, 12, p.43.
Hasan, B., 2016. Perceived irritation in online shopping: The impact of website design
characteristics. Computers in Human Behavior, 54, pp.224-230.
Hayn, J.A., Kaplan, J.S. and Clemmons, K.R., 2016. Teaching young adult literature today:
Insights, considerations, and perspectives for the classroom teacher. Rowman & Littlefield.
Jain, V., Tripathi, S., Ganesh, B.E. and Sheth, J.N., 2018, May. Internet Addiction and Its
Impact on Consumer’s Buying Behaviour: A Conceptual Framework: An Abstract. In
Academy of Marketing Science Annual Conference (pp. 393-394). Springer, Cham.
Lupien, N., Grandhi, S.A., Plotnick, L. and Hiltz, S.R., 2017, February. Wait, Did You Say
No Internet?: An Exploratory Study of the Perceived Impact of Internet Outage. In
Companion of the 2017 ACM Conference on Computer Supported Cooperative Work and
Social Computing (pp. 231-234). ACM.
Festl, R. and Quandt, T., 2016. The role of online communication in long-term cyberbullying
involvement among girls and boys. Journal of youth and adolescence, 45(9), pp.1931-1945.
Fink, A., 2019. Conducting research literature reviews: From the internet to paper. Sage
publications.
González, A., Ramírez, M.P. and Viadel, V., 2015. ICT learning by older adults and their
attitudes toward computer use. Current gerontology and geriatrics research, 2015.
Graham, M. and Dutton, W.H. eds., 2019. Society and the internet: How networks of
information and communication are changing our lives. Oxford University Press.
Guedes, E., Sancassiani, F., Carta, M.G., Campos, C., Machado, S., King, A.L.S. and Nardi,
A.E., 2016. Internet addiction and excessive social networks use: what about Facebook?.
Clinical practice and epidemiology in mental health: CP & EMH, 12, p.43.
Hasan, B., 2016. Perceived irritation in online shopping: The impact of website design
characteristics. Computers in Human Behavior, 54, pp.224-230.
Hayn, J.A., Kaplan, J.S. and Clemmons, K.R., 2016. Teaching young adult literature today:
Insights, considerations, and perspectives for the classroom teacher. Rowman & Littlefield.
Jain, V., Tripathi, S., Ganesh, B.E. and Sheth, J.N., 2018, May. Internet Addiction and Its
Impact on Consumer’s Buying Behaviour: A Conceptual Framework: An Abstract. In
Academy of Marketing Science Annual Conference (pp. 393-394). Springer, Cham.
Lupien, N., Grandhi, S.A., Plotnick, L. and Hiltz, S.R., 2017, February. Wait, Did You Say
No Internet?: An Exploratory Study of the Perceived Impact of Internet Outage. In
Companion of the 2017 ACM Conference on Computer Supported Cooperative Work and
Social Computing (pp. 231-234). ACM.

20CHILD PROTECTION ON INTERNET
Mitzner, T.L., Rogers, W.A., Fisk, A.D., Boot, W.R., Charness, N., Czaja, S.J. and Sharit, J.,
2016. Predicting older adults’ perceptions about a computer system designed for seniors.
Universal Access in the Information Society, 15(2), pp.271-280.
Molin, M., Sorbring, E. and Löfgren-Mårtenson, L., 2015. Teachers’ and parents’ views on
the Internet and social media usage by pupils with intellectual disabilities. Journal of
Intellectual Disabilities, 19(1), pp.22-33.
Moore, R.C., 2017. Childhood's domain: Play and place in child development. Routledge.
Mosca, I. and Barrett, A., 2016. The impact of adult child emigration on the mental health of
older parents. Journal of Population Economics, 29(3), pp.687-719.
Müller, K.W., Dreier, M., Beutel, M.E., Duven, E., Giralt, S. and Wölfling, K., 2016. A
hidden type of internet addiction? Intense and addictive use of social networking sites in
adolescents. Computers in Human Behavior, 55, pp.172-177.
Oates, B.J., 2005. Researching information systems and computing. Sage.
Olanrewaju, O. and Soetan, A., 2018. Assessing Internet Activities and Its Derived Benefits
for Learning Among Secondary School Students in Ilorin South, Kwara State, Nigeria.
differences, 9(12).
Phelan, S., Hagobian, T., Brannen, A., Hatley, K.E., Schaffner, A., Muñoz-Christian, K. and
Tate, D.F., 2017. Effect of an internet-based program on weight loss for low-income
postpartum women: a randomized clinical trial. Jama, 317(23), pp.2381-2391.
Pimentel, M.G., da Cunha, B.C., Antonelli, H.L., Rodrigues, S.S., Neto, O.J.M., Rocha, A.C.,
Melo, E., Costa, A.R., Uscamayta, O.M., Rodrigues, K.R. and Zaine, I., 2016, December.
Enhancing older adults connectivity by introducing mobile devices communication tools. In
Mitzner, T.L., Rogers, W.A., Fisk, A.D., Boot, W.R., Charness, N., Czaja, S.J. and Sharit, J.,
2016. Predicting older adults’ perceptions about a computer system designed for seniors.
Universal Access in the Information Society, 15(2), pp.271-280.
Molin, M., Sorbring, E. and Löfgren-Mårtenson, L., 2015. Teachers’ and parents’ views on
the Internet and social media usage by pupils with intellectual disabilities. Journal of
Intellectual Disabilities, 19(1), pp.22-33.
Moore, R.C., 2017. Childhood's domain: Play and place in child development. Routledge.
Mosca, I. and Barrett, A., 2016. The impact of adult child emigration on the mental health of
older parents. Journal of Population Economics, 29(3), pp.687-719.
Müller, K.W., Dreier, M., Beutel, M.E., Duven, E., Giralt, S. and Wölfling, K., 2016. A
hidden type of internet addiction? Intense and addictive use of social networking sites in
adolescents. Computers in Human Behavior, 55, pp.172-177.
Oates, B.J., 2005. Researching information systems and computing. Sage.
Olanrewaju, O. and Soetan, A., 2018. Assessing Internet Activities and Its Derived Benefits
for Learning Among Secondary School Students in Ilorin South, Kwara State, Nigeria.
differences, 9(12).
Phelan, S., Hagobian, T., Brannen, A., Hatley, K.E., Schaffner, A., Muñoz-Christian, K. and
Tate, D.F., 2017. Effect of an internet-based program on weight loss for low-income
postpartum women: a randomized clinical trial. Jama, 317(23), pp.2381-2391.
Pimentel, M.G., da Cunha, B.C., Antonelli, H.L., Rodrigues, S.S., Neto, O.J.M., Rocha, A.C.,
Melo, E., Costa, A.R., Uscamayta, O.M., Rodrigues, K.R. and Zaine, I., 2016, December.
Enhancing older adults connectivity by introducing mobile devices communication tools. In

21CHILD PROTECTION ON INTERNET
Proceedings of the 7th International Conference on Software Development and Technologies
for Enhancing Accessibility and Fighting Info-exclusion (pp. 353-361). ACM.
Poushter, J., 2016. Smartphone ownership and internet usage continues to climb in emerging
economies. Pew Research Center, 22, pp.1-44.
Rossi, A.S. and Rossi, P.H., 2018. Of human bonding: Parent-child relations across the life
course. Routledge.
Schröder, J., Berger, T., Westermann, S., Klein, J.P. and Moritz, S., 2016. Internet
interventions for depression: new developments. Dialogues in clinical neuroscience, 18(2),
p.203.
Shin, W., 2015. Parental socialization of children’s Internet use: A qualitative approach. New
media & society, 17(5), pp.649-665.
Short, M.B., Kasper, T.E. and Wetterneck, C.T., 2015. The relationship between religiosity
and internet pornography use. Journal of Religion and Health, 54(2), pp.571-583.
Songluck, F., 2018. Legal Problems on the Injunction of Inappropriate Contents Pursuant to
the Computer-Related Crime Act BE 2550 (2007). Thammasat Business Law Journal, 8,
pp.65-73.
Stead, H. and Bibby, P.A., 2017. Personality, fear of missing out and problematic internet use
and their relationship to subjective well-being. Computers in Human Behavior, 76, pp.534-
540.
Svantesson, D.J.B., 2016. Private international law and the internet. Kluwer Law
International BV.
Proceedings of the 7th International Conference on Software Development and Technologies
for Enhancing Accessibility and Fighting Info-exclusion (pp. 353-361). ACM.
Poushter, J., 2016. Smartphone ownership and internet usage continues to climb in emerging
economies. Pew Research Center, 22, pp.1-44.
Rossi, A.S. and Rossi, P.H., 2018. Of human bonding: Parent-child relations across the life
course. Routledge.
Schröder, J., Berger, T., Westermann, S., Klein, J.P. and Moritz, S., 2016. Internet
interventions for depression: new developments. Dialogues in clinical neuroscience, 18(2),
p.203.
Shin, W., 2015. Parental socialization of children’s Internet use: A qualitative approach. New
media & society, 17(5), pp.649-665.
Short, M.B., Kasper, T.E. and Wetterneck, C.T., 2015. The relationship between religiosity
and internet pornography use. Journal of Religion and Health, 54(2), pp.571-583.
Songluck, F., 2018. Legal Problems on the Injunction of Inappropriate Contents Pursuant to
the Computer-Related Crime Act BE 2550 (2007). Thammasat Business Law Journal, 8,
pp.65-73.
Stead, H. and Bibby, P.A., 2017. Personality, fear of missing out and problematic internet use
and their relationship to subjective well-being. Computers in Human Behavior, 76, pp.534-
540.
Svantesson, D.J.B., 2016. Private international law and the internet. Kluwer Law
International BV.
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.

22CHILD PROTECTION ON INTERNET
Takeuchi, H., Taki, Y., Asano, K., Asano, M., Sassa, Y., Yokota, S., Kotozaki, Y., Nouchi,
R. and Kawashima, R., 2018. Impact of frequency of internet use on development of brain
structures and verbal intelligence: longitudinal analyses. Human brain mapping, 39(11),
pp.4471-4479.
Tan, S.S.L. and Goonawardene, N., 2017. Internet health information seeking and the patient-
physician relationship: a systematic review. Journal of medical Internet research, 19(1), p.e9.
Wang, B.Q., Yao, N.Q., Zhou, X., Liu, J. and Lv, Z.T., 2017. The association between
attention deficit/hyperactivity disorder and internet addiction: a systematic review and meta-
analysis. BMC psychiatry, 17(1), p.260.
Wisniewski, P., Jia, H., Wang, N., Zheng, S., Xu, H., Rosson, M.B. and Carroll, J.M., 2015,
April. Resilience mitigates the negative effects of adolescent internet addiction and online
risk exposure. In Proceedings of the 33rd Annual ACM Conference on Human Factors in
Computing Systems (pp. 4029-4038). ACM.
Takeuchi, H., Taki, Y., Asano, K., Asano, M., Sassa, Y., Yokota, S., Kotozaki, Y., Nouchi,
R. and Kawashima, R., 2018. Impact of frequency of internet use on development of brain
structures and verbal intelligence: longitudinal analyses. Human brain mapping, 39(11),
pp.4471-4479.
Tan, S.S.L. and Goonawardene, N., 2017. Internet health information seeking and the patient-
physician relationship: a systematic review. Journal of medical Internet research, 19(1), p.e9.
Wang, B.Q., Yao, N.Q., Zhou, X., Liu, J. and Lv, Z.T., 2017. The association between
attention deficit/hyperactivity disorder and internet addiction: a systematic review and meta-
analysis. BMC psychiatry, 17(1), p.260.
Wisniewski, P., Jia, H., Wang, N., Zheng, S., Xu, H., Rosson, M.B. and Carroll, J.M., 2015,
April. Resilience mitigates the negative effects of adolescent internet addiction and online
risk exposure. In Proceedings of the 33rd Annual ACM Conference on Human Factors in
Computing Systems (pp. 4029-4038). ACM.

23CHILD PROTECTION ON INTERNET
Appendix
Secondary Data collection plan of this proposal are listed below:
Identification of the major topics and sub topics.
Selection of latest peer reviewed journals.
Identification of the exact data required in this proposal.
Aligning the data with the selected topic of this proposal.
Analysis of the collected secondary data.
Sampling of the data.
Identify the findings of the proposal after the completion of data sampling.
Ethical considerations
Prime ethical concerns of the proposal
(Created by the author)
1 Protection of secondary data
2 Credit to the authors of secondary
data sources
Appendix
Secondary Data collection plan of this proposal are listed below:
Identification of the major topics and sub topics.
Selection of latest peer reviewed journals.
Identification of the exact data required in this proposal.
Aligning the data with the selected topic of this proposal.
Analysis of the collected secondary data.
Sampling of the data.
Identify the findings of the proposal after the completion of data sampling.
Ethical considerations
Prime ethical concerns of the proposal
(Created by the author)
1 Protection of secondary data
2 Credit to the authors of secondary
data sources
1 out of 24
Related Documents

Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
© 2024 | Zucol Services PVT LTD | All rights reserved.