International Journal of Information Technology and Computer Science(IJITCS)

ISSN: 2074-9007 (Print), ISSN: 2074-9015 (Online)

Published By: MECS Press

IJITCS Vol.5, No.12, Nov. 2013

Controlling Citizen’s Cyber Viewing Using Enhanced Internet Content Filters

Full Text (PDF, 458KB), PP.56-63

Views:76   Downloads:0


Shafi’í Muhammad ABDULHAMID, Fasilat Folagbayo IBRAHIM

Index Terms

Web Content, Content Filter, Firewalls, Servers, Web 2.0, Hacker


Information passing through internet is generally unrestricted and uncontrollable and a good web content filter acts very much like a sieve. This paper looks at how citizens’ internet viewing can be controlled using content filters to prevent access to illegal sites and malicious contents in Nigeria. Primary data were obtained by administering 100 questionnaires. The data was analyzed by a software package called Statistical Package for Social Sciences (SPSS). The result of the study shows that 66.4% of the respondents agreed that the internet is been abused and the abuse can be controlled by the use of content filters. The PHP, MySQL and Apache were used to design a content filter program. It was recommended that a lot still need to be done by public organizations, academic institutions, government and its agencies especially the Economic and Financial Crime Commission (EFCC) in Nigeria to control the internet abuse by the under aged and criminals.

Cite This Paper

Shafi’í Muhammad ABDULHAMID, Fasilat Folagbayo IBRAHIM,"Controlling Citizen’s Cyber Viewing Using Enhanced Internet Content Filters", International Journal of Information Technology and Computer Science(IJITCS), vol.5, no.12, pp.56-63, 2013. DOI: 10.5815/ijitcs.2013.12.07


[1] . (Accessed on 20 August, 2012).

[2]Haruna C., Abdulhamid M. S., Abdulsalam Y. G., Ali M. U., Timothy U. M. Academic Community Cyber cafes - A Perpetration Point for Cyber Crimes in Nigeria, International Journal of Information Science and Computer Engineering (IJISCE), 2011, 2(2): 6-13.

[3]Abdulhamid M. S., Chiroma, H. and Abubakar, A. Cybercrimes and the Nigerian academic institutions networks, the IUP Journal of Information Technology, 2011, VII(1): 47– 57. 

[4]Satterfield, B. "Understanding Content Filtering: An FAQ for Nonprofits". 2007. 

[5]Katherine H. M. and Piercy, F. P. Therapists' Assessment And Treatment Of Internet Infidelity Journal of Marital and Family Therapy. 2006, 34(4): 481-497.

[6]Barbara, S. M., Daniel, B., Wesley H. C. & Binka, P. The Changing Nature of Adolescence in the Kassena-Nankana District of Northern Ghana. Studies in Family Planning. 1999, 30(2): 95-111.

[7]Fafunwa, A. B. History of Education in Nigeria. London: George Allen and Union Ltd. 1974.

[8]Longe, F. A. (2004). The Design of An Information-Society Based Model For the Analysis of Risks and Stresses Associated Risks Associated with Information Technology Applications. Unpublished M. Tech. Thesis, FUT, Akure, Nigeria.

[9]Longe O. B. and Longe F. A., “The Nigerian Web Content: Combating Pornography using Content Filters”, Journal of Information Technology Impact. 2005. 5(2), 59-64.

[10]Patrick C. "In the Shadows of the Net" (ISBN 978-1-59285-478-3) Hazelden.

[11]McKenzie, J. Big Brother Comes to School: Telling Teachers What to Read and What to Believe. 2005. Retrieved March 22, 2013, from

[12]Phillips, L. Do Internet Filters Abridge Free Speech? 2007. freedom-speech/do-internet-filters-abridge-free (Accessed on 20 August, 2012).

[13]Parti, K. and L. Marin, Ensuring Freedoms and Protecting Rights in the Governance of the Internet: A Comparative Analysis on Blocking Measures and Internet Providers’ Removal of Illegal Internet Content. Journal of Contemporary European Research, 2013. 9(1): 138-159.

[14]Warf, B., Global Internet Censorship, in Global Geographies of the Internet. 2013, Springer. 45-75.

[15]Kizza, J.M., Virus and Content Filtering, in Guide to Computer Network Security. 2013, Springer. 323-341.

[16]Iranmanesh, S.A., H. Sengar, and H. Wang, A Voice Spam Filter to Clean Subscribers’ Mailbox, in Security and Privacy in Communication Networks. 2013, Springer. p. 349-367.

[17]Biswas, Soumak, Sripati Jha, and Ramayan Singh. "A Fuzzy Preference Relation Based Method for Face Recognition by Gabor Filters." International Journal of Information Technology and Computer Science (IJITCS). 2012. 4(6): 18-23.

[18]Wurtenberger, A.M., C.S. Hyde, and C.D. Halferty, Restricting mature content, 2013, US Patent 8,359,642.

[19]Santos, I., et al. Adult Content Filtering through Compression-Based Text Classification. in International Joint Conference CISIS’12-ICEUTE´ 12-SOCO´ 12 Special Sessions. 2013. Springer.

[20]Gupta, N. and S. Hilal, Algorithm to Filter & Redirect the Web Content for Kids’. International Journal of Engineering and Technology, 2013. 5.

[21]Victor, O. W., Okongwu, N. O., Audu, I., Olawale, S. A, Abdulhamid, M. S., Cyber Crimes Analysis Based-On Open Source Digital Foresics Tools. International Journal of Computer Science and Information Security (IJCSIS), 2013. 10(1): p. 30 - 43.

[22]Abdulhamid, M. S., et al., Privacy and National Security Issues in Social Networks: The Challenges. International journal of the computer, the internet and management, 2011. 19(3): p. 14-20.