Conceptual Model of National Intellectucal System for Children Safety in Internet Environment

Full Text (PDF, 360KB), PP.40-47

Views: 0 Downloads: 0

Author(s)

Rasim Alguliyev 1,* Sabira Ojagverdieva 1

1. Information Technologies Institute of ANAS, Baku, Azerbaijan

* Corresponding author.

DOI: https://doi.org/10.5815/ijcnis.2019.03.06

Received: 18 Jan. 2019 / Revised: 5 Feb. 2019 / Accepted: 19 Feb. 2019 / Published: 8 Mar. 2019

Index Terms

Children safety in Internet, data sanitization, conceptual model, harmful content, Internet addiction of children, intellectual system

Abstract

The article presents a conceptual model for the national intellectual system aiming the safety provision of the children in Internet environment. The structucal components and work principles of the proposed model are explained. This model employs web-analytics, data sanitization (cleaning) technology, expert systems, text mining, clustering and classification methods, content filtering and etc. to protect children from harmful information in virtual environment. By using data sanitization methods, the study presents a conceptual model for obtaining more important, useful and age-corresponding information from internet resources and preventing harmful information.

Cite This Paper

Rasim Alguliyev, Sabira Ojagverdieva, "Conceptual Model of National Intellectucal System for Children Safety in Internet Environment", International Journal of Computer Network and Information Security(IJCNIS), Vol.11, No.3, pp.40-47, 2019. DOI:10.5815/ijcnis.2019.03.06

Reference

[1]David J. G. The Wireless Internet: Promises and Challenges/Computer, Volume: 33, Issue 7 , Jul 2000. pp. 36-41.
[2]C.L. Philip Chen, Chun-Yang Zhang. Data-intensive applications, challenges, techniques and technologies: A survey on Big Data/ Information Sciences, Volume 275, 10 August 2014, Pages 314-347.
[3]Hick S., Halpin E. Children’s Rights and the Internet. The ANNALS of the American Academy of Political and Social Science, 2001, 575(1), 56–70.
[4]Sindhu K. K., Meshram B. B. Digital Forensic Investigation Tools and Procedures/I. J. Computer Network and Information Security, 2012, 4, 39-48 Published Online May 2012 in MECS (http://www.mecs-press.org/) DOI: 10.5815/ijcnis.2012.04.05
[5]Ojagverdiyeva S.S. Ensuring child safety in internet environment/ Journal of Problems of ?nformation Society, - 2018. - N: 1. pp. 99-107.
[6]Mitchell K., Finkelhor D., Wolak, J. Youth internet users at risk for the most serious online sexual solicitations. American Journal of Preventive Medicine, 32, 532–537.
[7]Wolak J., Finkelhor D., Kimberly J. M., Michele L. Y. Online “Predators” and Their Victims/ American Psychologist, 2008, Vol. 63, No. 2, pp.111–128.
[8]Psychologist in the Educational System: His Role in the Prevention of Addiction and Deviance/ International journal of environmental & science education 2016, vol. 11, NO. 4, 9891-9901.
[9]MacFarlane K., Holmes V. Multi-agent System for Safeguarding Children Online// Proceedings of sai intelligent systems conference (intellisys) 2016, Springer, vol. 2. pp. 228-242.
[10]Milda M., Kosta E. Consent for processing children’s personal data in the EU: following in US footsteps?/ Information & Communications Technology Law , Volume 26, 2017 - Issue 2, pp. 146-197.
[11]Best Parental Control Software Featured in This Roundup: online: https://www.pcmag.com/article2/0,2817,2346997,00.asp
[12]Qustodio parental control. online:http://www.appscanlab.com/apps/productview/77/Qustidio-parental-Control-Your-children-s-smartphone-are-not-out-of-your-control
[13]Internet Filtering Products from Net Nanny. Online: https://www.netnanny.com/products/
[14]Norton Family Premier. Online: https://family.norton.com/web/?pid=1011&siteName=BE
[15]Problem a con Kaspersky Safe-Kid. Online: https://forum.kaspersky.com/index.php?/topic/402919-problema-con-kaspersky-safe-kid-moved/
[16]Clean router. online: https://cleanrouter.com/features/
[17]Yakovlev A., Dovzhikov A., Web-analytics. Essentials, secrets, tricks. “БХВ” – St. Petersburg, 2010, 272 p.
[18]Kaur K., Singh H. Analysis of Website using Click Analytics/ International Journal of Computer Science Engineering & Technology. Jun 2015, Vol. 5 Issue 6, pp. 185-189.
[19]Padma Jyothi U., Sridevi B., Prasanthi B.V., A Study on Raise of Web Analytics and its Benefits/ International Journal of Computer Sciences and Engineering, Volume -5, Issue -10, pp. 59-64.
[20]Melikhov D., Sarmatov I., Web-analytics: a step to perfection. Kiev, 2010, 112 p.
[21]Amor L., Thabet S. "Forensics Investigation of Web Application Security Attacks", IJCNIS, vol.7, no.3, pp.10-17, 2015. DOI: 10.5815/ijcnis.2015.03.02
[22]Vasudevan V., John A. A Review on Text Sanitization // International Journal of Computer Applications, 2014, vol. 95, no.25, pp. 14-17.
[23]Shamir A. How to share a secret // Communications of the ACM, 1979, vol. 22, no.11, pp. 612–613.
[24]Alguliev R.M., Imamverdiyev Y.N., Yusifov F.F. Some conceptual views on information security of the society / Problems of Information society, №2 (4), 2011, 3-9.
[25]“On the protection of children against harmful information” Law of the Republic of Azerbaijan, Online: http://modern.az/az/news/168389#gsc.tab=0
[26]Zheng L.W. Visual separator detection in web pages
using code, 2010, analysis, Online: https://www.google.com/patents/US20130124684
[27]Alguliev R.M., Aliguliyev R.M., Alekperova I.Ya. Cluster approach to the efficient use of multimedia resources in information warfare in Wikimedia // Automatic Control and Computer Sciences, 2014, vol. 48, no. 2, pp. 97-108.
[28]Perevozchikova M.S., Sapegin A.H. Control methods over the access of pupils to computer resources // “Концепт”, 2010, № 10, pp. 56-60.
[29]Jyoti M., Dhiraj G. Reference Threshold Calculation for Biometric Authentication/ I.J. Image, Graphics and Signal Processing, 2014, 2, 46-53.
[30]A. K. Jain, A. Ross, and S. Pankanti, "Biometrics: A Tool for Information Security," IEEE Trans on 52 Reference Threshold Calculation for Biometric Authentication Copyright /Image, Graphics and Signal Processing, 2014, 2, 46-53 Information Forensics and Security, vol. 1, no. 2, pp. 125-143, 2006
[31]Mridul Gh, Debotosh Bh. An Efficient characterization of Gait for Human Identification/ I.J. Image, Graphics and Signal Processing, 2014, 7, 19-27
[32]Alguliyev R., Imamverdiyev Y., Musayev V. Biometric technologies. Baku: “Information technologies”, 2009, 376 p.
[33]Rajinder S., Shakti K. Comparisonog various biometrik methods. International Journal of Emerging Technologies in Computational and Applied Sciences, 9(3), June-August, 2014, pp. 256-261.
[34]Adamek, M., Matysek M., Neumann P. Security of Biometric Systems/ Procedia Engineering, volume 100, 2015, pp.169-176.
[35]Lazarev V.N. Management decisions – Ulyanovsk: USTU, 2011, 56 p.