Documente Academic
Documente Profesional
Documente Cultură
(PCaMS™)
YEAR 2011
PARENTAL CONTROL AND MONITORING SYSTEM
(PCaMS™)
YEAR 2011
iii
COPYRIGHT PAGE
Copyright @ 2011 by
ACKNOWLEDGEMENT
All praises to the almighty god Allah S.W.T for blessing us until we have
successfully completed this final year project on April 2011. A million thanks to
Mr. Muhammad Ezra Bin Muhammad Ismail as our supervisor in this final year
project. He had showed a remarkable capability and gave us valuable
assistance and advice in order to pursuit of our goals. His expectations and faith
in our capabilities were driving forces to break through difficulties during the
implementation of this project. Again, thank you for your guidance and
assistance from the start until the end.
Our grateful thanks also go to Miss Hannah Binti Sofian as our co-supervisor for
taking the time to read this report, thank you for your guidance, criticism, advice
and supervision. Also thanks to our final year project coordinator, Madam Irma
Syarlina Binti Che Elias for the informative guidance and schedule.
Above all, we also would like to thanks to our loving family for their priceless
support, guidance, and love. Not to forget all beloved friends especially BNS
friends for your wonderful support and advices. Last but not least, we also
express our deepest grateful to our family especially our parent for being
unbelievably supportive.
v
TABLE OF CONTENTS
DECLARATION PAGE .............................................................................................. i
APPROVAL PAGE ................................................................................................... ii
COPYRIGHT PAGE ................................................................................................ iii
ACKNOWLEDGEMENT ......................................................................................... iv
TABLE OF CONTENTS .......................................................................................... v
LIST OF TABLES ................................................................................................... ix
LIST OF FIGURES .................................................................................................. x
LIST OF ABBREVIATIONS ................................................................................... xi
ABSTRACT ............................................................................................................ xii
CHAPTER I: INTRODUCTION
4.1 Introduction ..................................................................................................... 31
4.2 Stages of development .................................................................................. 32
4.2.1 Software Installation ................................................................................ 32
4.2.2 Process of Developing and Coding ...................................................... 32
4.2.2.1 Creating the project ................................................................. 33
4.2.2.2 Contains of the PCaMs™ ....................................................... 34
4.3 Design a Graphical User Interface ............................................................... 35
4.4 Complete Prototype ........................................................................................ 42
4.4.1 Use-case diagram ................................................................................... 42
viii
LIST OF TABLES
LIST OF FIGURES
LIST OF ABBREVIATIONS
ABSTRACT
This study was designed to focus on the parents who always wanted the best
from an organization to solve their problems. Due to major problem of Cyber-
bullying and harassment such as publicizing private instant messages or e-
mails, posting photos that will cause embarrassment. PCaMS™ is a monitoring
tool and control system that developed purposely to solve the current issue
among children age between 5-12 years old. It is to monitor the children online
behaviour and to block the desired websites. It also has an Auto-Shutdown
Timer that allows parents to set the desired time to shutdown and also shutdown
in countdown time mode. Other than shutdown, user also can select the
computer to Log Off, Reboot or Hibernate.
Results from the respondent had been proves that PCaMS™ is effective in
terms of monitoring and blocking websites, easy to use and all the testing is
implemented and tested in the actual situation.
xiii
ABSTRAK
Panyelidikan ini direkabentuk untuk difokuskan kepada ibu bapa yang sentiasa
mahukan sesuatu yang terbaik dari satu organisasi untuk menyelesaikan
masalah mereka. Merujuk kepada masalah utama iaitu Jenayah Siber serta
gangguan atas talian seperti mempamirkan pesanan ringkas peribadi atau emel,
mempamirkan gambar yang mengaibkan. PCaMS™ adalah satu system
kawalan dan pemantauan yang dihasilkan bertujuan untuk menyelesaikan
masalah semasa ini dikalangan kanak – kanak berumur dalam lingkungan 5 –
12 tahun. Ianya adalah untuk memantau aktiviti kanak – kanak semasa
menggunakan internet serta menghalang laman sesawang yang tidak
sepatutnya dicapai oleh kanak – kanak. Ia juga mempunyai system jangkamasa
penutupan automatic (Auto-Shutdown Timer) yang membolehkan ibu bapa
menetapkan untuk mematikan komputer dalam masa tertentu ataupun dalam
tempoh beberapa minit mahupun beberapa jam.
COPYRIGHT PAGE
Copyright @ 2011 by
ACKNOWLEDGEMENT
All praises to the almighty god Allah S.W.T for blessing us until we have
successfully completed this final year project on April 2011. A million thanks to
Mr. Muhammad Ezra Bin Muhammad Ismail as our supervisor in this final year
project. He had showed a remarkable capability and gave us valuable
assistance and advice in order to pursuit of our goals. His expectations and faith
in our capabilities were driving forces to break through difficulties during the
implementation of this project. Again, thank you for your guidance and
assistance from the start until the end.
Our grateful thanks also go to Miss Hannah Binti Sofian as our co-supervisor for
taking the time to read this report, thank you for your guidance, criticism, advice
and supervision. Also thanks to our final year project coordinator, Madam Irma
Syarlina Binti Che Elias for the informative guidance and schedule.
Above all, we also would like to thanks to our loving family for their priceless
support, guidance, and love. Not to forget all beloved friends especially BNS
friends for your wonderful support and advices. Last but not least, we also
express our deepest grateful to our family especially our parent for being
unbelievably supportive.
v
TABLE OF CONTENTS
DECLARATION PAGE .............................................................................................. i
APPROVAL PAGE ................................................................................................... ii
COPYRIGHT PAGE ................................................................................................ iii
ACKNOWLEDGEMENT ......................................................................................... iv
TABLE OF CONTENTS .......................................................................................... v
LIST OF TABLES ................................................................................................... ix
LIST OF FIGURES .................................................................................................. x
LIST OF ABBREVIATIONS ................................................................................... xi
ABSTRACT ............................................................................................................ xii
CHAPTER I: INTRODUCTION
4.1 Introduction ..................................................................................................... 31
4.2 Stages of development .................................................................................. 32
4.2.1 Software Installation ................................................................................ 32
4.2.2 Process of Developing and Coding ...................................................... 32
4.2.2.1 Creating the project ................................................................. 33
4.2.2.2 Contains of the PCaMs™ ....................................................... 34
4.3 Design a Graphical User Interface ............................................................... 35
4.4 Complete Prototype ........................................................................................ 42
4.4.1 Use-case diagram ................................................................................... 42
viii
LIST OF TABLES
LIST OF FIGURES
LIST OF ABBREVIATIONS
ABSTRACT
This study was designed to focus on the parents who always wanted the best
from an organization to solve their problems. Due to major problem of Cyber-
bullying and harassment such as publicizing private instant messages or e-
mails, posting photos that will cause embarrassment. PCaMS™ is a monitoring
tool and control system that developed purposely to solve the current issue
among children age between 5-12 years old. It is to monitor the children online
behaviour and to block the desired websites. It also has an Auto-Shutdown
Timer that allows parents to set the desired time to shutdown and also shutdown
in countdown time mode. Other than shutdown, user also can select the
computer to Log Off, Reboot or Hibernate.
Results from the respondent had been proves that PCaMS™ is effective in
terms of monitoring and blocking websites, easy to use and all the testing is
implemented and tested in the actual situation.
xiii
ABSTRAK
Panyelidikan ini direkabentuk untuk difokuskan kepada ibu bapa yang sentiasa
mahukan sesuatu yang terbaik dari satu organisasi untuk menyelesaikan
masalah mereka. Merujuk kepada masalah utama iaitu Jenayah Siber serta
gangguan atas talian seperti mempamirkan pesanan ringkas peribadi atau emel,
mempamirkan gambar yang mengaibkan. PCaMS™ adalah satu system
kawalan dan pemantauan yang dihasilkan bertujuan untuk menyelesaikan
masalah semasa ini dikalangan kanak – kanak berumur dalam lingkungan 5 –
12 tahun. Ianya adalah untuk memantau aktiviti kanak – kanak semasa
menggunakan internet serta menghalang laman sesawang yang tidak
sepatutnya dicapai oleh kanak – kanak. Ia juga mempunyai system jangkamasa
penutupan automatic (Auto-Shutdown Timer) yang membolehkan ibu bapa
menetapkan untuk mematikan komputer dalam masa tertentu ataupun dalam
tempoh beberapa minit mahupun beberapa jam.
CHAPTER I: INTRODUCTION
1.1 Introduction
There are many potential problems with social networking sites and the
teenagers that use them. Social networking online involves using Web sites to
share information with others and connect with them by creating a profile that
may include a personal Web page and a blog. It is also one of the most popular
Internet activities among teenagers. Teenagers communicating about their lives
and updating their activities for their friends have become central activities on
social networking sites.
Apart from the social benefits, most social networking sites are open to all,
especially Facebook & MySpace, which means that your teen could be exposed
to harassment, bullying or sexual advances. Most social networking sites have
privacy controls in place, but teens seldom or never use them. Another risk is
identity theft, which can occur when teens share too much information about
their name, date of birth and location.
Cyber-bullying and harassment are most often did by other teens and tend to
happen most to older girls and to teens of either gender who have a strong
online presence. It may take several forms:
• publicizing private instant messages, text messages or e-mails
• posting threatening messages
• posting photos that will cause embarrassment
• Spreading rumours
Online victimization of teenagers had increased and most of the parents are
worry and concern about their children online behaviour.
Apart from the social benefits, social networking sites can be used to document
school research, promote artistic talents and experiment with other forms of
content creation. They provide a way to interact with others who share the same
interests and to get constructive feedback on ongoing projects.
Along with these benefits come some risks. Most social networking sites are
open to all, especially Facebook, MySpace and others which means that your
teen could be exposed to harassment, bullying or sexual advances. Cyber-
bullying and harassment are most often perpetrated by other teens and tend to
happen most to older girls and to teens of either gender who have a strong
online presence.
This chapter focuses on the concept of PCaMS™ and types of parental control
software that available in the market to monitor the online behavior.
Furthermore, definition and concept of social networking sites and online
behavior that relates on social networking as a virtual community, types and
impact of social networking sites also are includes in this chapter.
Social networking sites are defined as web-based services that allow individuals
to construct a public or semi-public profile within a bounded system. It show the
list of other users with whom they share a connection and view their list of
connections and those made by others within the system. These connections
may vary from site to site (Boyd & Ellison, 2007).
Other terms used to characterize such services are social digital technologies
(Palfrey & Gasser, 2008) and social media (Barnes, 2006) whereas the term
“social network” site seems to reflect the fact that these sites represent existing
social bonds, another term commonly used “social networking” shows that
people use these websites in order to form new networks.
Most of the social networking sites are easy to use; many require little
knowledge of the Internet. Besides the easiness to use, social networking sites
are also easier to meet new people online. There are many internet users who
want to make new friends online, but can sometimes be difficult. Without social
networking sites, you will have come into contact with Internet users, often in
chat rooms and learn about their interests before deciding to meet their “friends”.
It also allow user to learn about other internet user in advance before set them
as a friend (Love ToKnow Social Networking, 2009).
The social networking site is the 21st century “virtual community”, a group of
people who use the Internet to communicate with each other about anything and
everything. One can find dating sites, friendship sites, business sites and
hybrids that offer combination of these sites. Globally, hundreds of millions
people have joined one or more social networking site (Ellison, Steinfield &
Lampe, 2007).
1. Demographic information
2. Interest and self-description prose
3. Pictures
4. List of friends
5. Testimonials
While providing both the individual’s perspective of self as well as that of their
Friend is beneficial, the Profile is still a coarse representation of individual, which
provides a limited and often skewed perspective (Boyd, 2001).
Facebook came out in 2004 initially targeting college students, but nowadays it
welcoming everyone. Following Facebook was TagWorld and Tagged.
TagWorld introduced tools for creating more personalized Web pages and
Tagged introduced the concept of building tag teams for teens with like interests
(The Free Dictionary, 2009).
Facebook is a social networking website that was originally designed for college
students, but it is now open to anyone from 13 years old or older. Facebook
users can create and customize their own profilers with photos, videos and
information about themselves. Friends can browsethe profiles of other friends
and wirte messages on their pages. Facecook profile has a “wall”, where friends
can post comments and basically it is a public conversation. Facebook allows
user to set a privacy settings which by default it is quite strict. However, user can
adjust the privacy settings to allow users within the network to view part or the
entire user’s profile (Ellison, Steinfield & Lampe, 2007).
A leader in measuring the digital world - comScore, Inc., released its latest
report on social networking activity in the Asia-Pacific region (excluding China)
based on data from its World Metrix service. The study found that 50.8 percent
of the total online population in the Asia-Pacific region visited a social
networking site in February 2010, reaching a total of 240.3 million visitors.
Facebook.com ranked as the top social network across the majority of individual
markets in the region, while competing brands commanded the top position in
certain markets, including Orkut in India, Mixi.jp in Japan, CyWorld in South
Korea and Wretch.cc in Taiwan.
In February 2010, Internet users in the Asia-Pacific region averaged 2.5 hours
on social networking sites during the month and visited the category an average
of 15 times. Across markets, the Philippines showed the highest penetration of
social networking usage with more than 90 percent of its entire Web population
visiting a social networking site during the month, followed by Australia (89.6
percent penetration) and Indonesia (88.6 percent penetration). Social
networkers in the Philippines also showed the highest level of engagement on
social networking sites averaging 5.5 hours per visitor in February, with visitors
frequenting the social networking category an average of 26 times during the
month. Strong engagement was also exhibited by Internet users in Indonesia
(5.4 hours per visitor and 22 visits per visitor), Australia (3.8 hours per visitor
and 20 visits per visitor) and Malaysia (nearly 3.8 hours per visitor and 22 visits
per visitor).
Social Networking Reach and Engagement in Asia Pacific Markets February 2010
Total Internet Audience, Age 15+ - Home & Work Locations
Social Networking
Average Minutes per Average Visits per
% Reach
Visitor Visitor
Asia Pacific 50.8 148.9 15.1
Philippines 90.3 332.2 26.3
Australia 89.6 228.0 20.9
Indonesia 88.6 324.4 22.6
Malaysia 84.7 226.0 22.3
Singapore 83.7 220.9 22.1
New Zealand 81.2 217.5 20.3
Taiwan 75.9 131.3 18.3
Hong Kong 75.4 223.3 25.4
India 68.5 130.1 13.0
South Korea 63.5 131.4 16.0
Vietnam 46.1 49.5 7.2
Japan 42.3 120.5 14.0
Top Social Network in Individual Asia Pacific Markets by Percent Reach of Web
Population February 2010
Total Internet Audience, Age 15+ - Home & Work Locations
Top Social Network in
% Reach of Web Population
Market
Asia Pacific Facebook.com 14.9%
Philippines Facebook.com 84.5%
Australia Facebook.com 69.4%
Indonesia Facebook.com 84.9%
Malaysia Facebook.com 77.5%
Singapore Facebook.com 72.1%
New Zealand Facebook.com 63.6%
Taiwan Wretch.cc 62.5%
Hong Kong Facebook.com 62.6%
India Orkut 46.8%
South Korea CyWorld 54.2%
Vietnam Facebook.com 18.4%
Japan Mixi.jp 18.9%
The impact of social networking sites has been well-proven and documented.
Users of social networks have found romance, formed new businesses,
enhanced their existing businesses, sold merchandise, received assistance
when in trouble and made friends connected with old friends.
Some people believe that social networks are harmful to society and should be
banned. For the most part, these fears are based on the affects that social
networking sites have on children and teenagers. Some also worry about
Internet child stalker. Others are concerned about their children spending too
much time on the Internet without knowing what are they surfing (Love To Know
Social Networking, 2009).
Based on National School Boards Association, many students who use social
networking talk about education topics online and, surprisingly, they talk
specifically about schoolwork. Yet the vast majority of school districts have strict
rules against nearly all forms of social networking during the school day even
though students and parents report few problem behaviors online.
Various web sites which offer tools or services to assist in parental control of
what our children have access to on the Internet. Each of the following
companies are involved in finding ways to keep the Internet safe for kids, and
free from government regulation. Many of them have demonstrations of software
in which you can download, and use on a trial basis.
Below are the parental control software titles and services and also
organizations that are available in the current market.
Crayon Crawler to, and interact with the children, a "closed" email system that
eliminates Spam, pornographic solicitations, links and unwanted
emails, as well as instant messaging that allows children to know
if their community friends are on-line.
A free, server-based, comprehensive Web filtering, available for
set-up directly from the crosswalk.com Web site. CrossingGuard
CrossingGuard
claims to use the largest available database of rated Web sites
to filter out nearly 5 million of the 100 million pages on the Web.
Cyber Sentinel is easy to use total security solution for the both
business and the home user. It allows user not only to block
inappropriate material (web pages, e-mail, pictures, and word
processing documents) but also allows the owner to configure
Cyber Sentinel
the program to run in stealth mode (so the end user doesn't
know it is running). The owner can the run Cyber Sentinel later
and see screenshots of when the user was in inappropriate
material.
Cyber Sitter Solid Oak Software offers several versions of CyberSitter. You
may run it on a network or on a personal computer.
• Advising Internet users on how to cope with cyber threats and deal with
safety issues.
Parents now have the flexibility to restrict personal information your kids may
otherwise post online. With Net Nanny 6.5 you can now block image uploads
and/or choose to block them from posting to forums and blogs.
Net Nanny 6.5 allows you to create a customized “black” list of terms and
phrases you don’t want your kids to see while online. Keyword filtering lets
parents decide if kids should see pages that contain specific words. You can
even customize this list for each individual user, giving you the flexibility and
control over the internet content your family can view.
Much more important than how it works, is that you know that Net Nanny does
work. You have the peace of mind of knowing that you are protecting your
children and family with the best internet safety tools available. Net Nanny can
block not only pornography, but hate sites, questionable chat rooms and other
dangers of the Internet. You can configure Net Nanny to block online game and
gambling sites, and even make it so your children can only install and play
computer games with parental ratings that you deem appropriate. Net Nanny
even offers a simple, easy to use set-up assistant to help parents determine
what online activities (Web sites, chat, gaming and social networks) are
appropriate based on your family member’s age.
Net Nanny has enhanced its internet safety administration tools. Powerful
Remote Management tools exist to help parents to manage and maintain
Internet safety policies from any Internet connection. Net Nanny has also been
enhanced to synchronize your settings almost instantly. Monitor web browsing
and instant messaging- from anywhere!
Having worked directly with the Entertainment Software Rating Board (ESRB),
Net Nanny is the first parental control software solution to set age-based gaming
restrictions using the ESRB rating system and the first to block desktop PC
games based on categories, including violence, sex, alcohol, drugs and more.
Net Nanny’s improved internet safety Message Monitor feature examines the
content of instant messages (IM) and alerts parents via e-mail of potential online
predatory, cyberbully and other inappropriate behaviour or comments made
through popular IM programs. Including both application and web-based IM
protocols like Facebook, MySpace, MSN, and Yahoo, Internet predators don't
have a chance against parents armed with Net Nanny.
Net Nanny's time controls will help you control when your children can and
cannot use the Internet. Parents can use Net Nanny to not only limit how long
your kids spend on the Internet, but also during what time periods they can
access the Internet.
The new Net Nanny integrates seamlessly with "Safe Search" options found in
popular search engines such as Google, Yahoo, Dogpile, AltaVista, Lycos,
AllTheWeb, and MSN. This means your children can't search on a search
engine and even see links to blocked sites. This new internet safety feature
enables better protection against pornographic images when doing an "image
only" search. If a child attempts to turn off the safe search capability from the
search engine, Net Nanny will turn it back on in real-time as the search is
occurring.
The only way to bypass the safe search is with your unique administrator
password, which only you as the parent know. Believe it or not, Net Nanny
actually blocks content in multiple languages to provide even more internet
safety for your family. Net Nanny Software is More than Just Web Protection
Did you know that there are many ways your children can access pornography
and questionable content on the Internet? Net Nanny provides full internet safety
on not just the World Wide Web, but also less known but equally dangerous
parts of the Internet like the Usenet, Peer-to-Peer downloading networks, Chat
Rooms, Instant Messages, FTP, Forums and email. If you have never heard of
some of those areas of the Internet, it is possible that your kids have. But don't
worry. Net Nanny knows about them, and protects your children from the bad
content on them.
Net Nanny Users are often on the go and unable to check their emails every
couple minutes. An alert letting you know that your child is attempting to view an
inappropriate website can now be sent to your cell phone (in addition to your
email). Cell phone alerts can be sent in real time, giving you the opportunity to
get involved. We've enhanced your email notifications to give you control of how
often you receive alerts. You can receive notifications in real time, hourly, daily,
or even weekly. Get set to receive cell phone alerts in just 2 easy steps.
Net Nanny permits parents to create a customized list of unacceptable or
acceptable Web sites. For example, parents could set up a list (white list) of
friendly sites that are always allowed and/or set up a list (black list) of
objectionable sites that are always blocked.
3.1 Introduction
The prototyping methodology used usually when the business process is likely
to be changed as the project proceeds or when the project sponsor has little
idea of what system to be built. The Analysis, Design, and Implementation
phases performed concurrently and on each cycle resulting in
a system prototype that will be reviewed by the project sponsor. The cycle
repeated continually based on the sponsor comments until the prototype
successfully meets the requirements. The last prototype will then be called the
system. Prototyping development needs only initial basic analysis and design,
but as the result important system functions may not be recognized until
somewhere in the middle of project timeline. Thus there is a possibility to alter
the initial design decision and start all over again from the beginning. It can
delivers system quickly to users, though it not exactly meets the requirements.
PLANNING
ANALYSIS
DESIGN DESIGN
PROTOTYPE IMPLEMENTATION
IMPLEMENTATION
SYSTEM
3.2.1.1 Planning
Planning phase focused on planning the tasks that involved in the project. It has
detailed out the work schedule, duration for each task and resources allocated
for the whole project.
Analysis phase focused on reviewing the previous similar project done by other
researcher using similar technique and approach to get the picture and
guidelines. We have recognized the problems that can be derived as rules. We
also look into the current business process to get the requirements and
analyzed it before start designing and developing the system proposed in the
project.
Designing phase focused on the designing the system that will solve all the
problems based on the dynamic scheduling algorithm we have developed in the
research. The produced design in this phase is basically using the Rule Based
Technique. We have modeled the rules that identified during the requirement
analysis phase using the problems and current business rules including the
process. The design also translated the functions into the system components.
3.2.1.3 Implementation
3.2.1.4 System
All the testing works followed by maintenance work are in the last phase of
system development. In this case, system should be developed to allow
changes that could happen during the implementation period.
In implementing IDS for home user, a very precise and proper planning has to
be carried out to ensure that the project will be success. In implementing this
project, certain configuration of planning and scheduling has to identify. The task
allocation, appropriate planning tools, task delegation and project costing were a
Therefore, a clear Gantt chart will indicate the list of tasks to be performed,
person who responsible in doing each task and to trace how many percent of
the task already complete.
Timeline
No Milestone Name Description
(Week)
1 1. Finding project partner
Planning
2. Information related to
• Group formation
FYP is explained 1-4
• FYP briefing
3. Finding project title and
• Finalizing title and supervisor
supervisor
2 Project Initiation 1. Collecting information
• Submission of dissertation
Features Specification
NO TYPE
1 Windows XP Pro SP 3 or higher 32-bit version
3.5 Costing
In order to purchase all equipments planning have been done before start
purchasing. It helps avoid from over budget. There are procedures to purchase
those equipments that had been planned to purchase.
2 Software RM 478.00
TOTAL RM 1388.00
4.1 Introduction
From the methodology explained in the prior chapter, it can be simplified that
there were many aspects or parameters need to be defined and considered
before moving to the development stage.
The development of this project started with the installation some software into
the computer. The students had installed Microsoft Visual Basic 2008
Professional Edition (VB.Net 2008) as the main software to develop the
PCaMS™ application. As mention in the previous chapter, student chose this
software because it makes use of Graphical User Interface for creating the
applications. The Graphical User Interface enables users to interact with the
application. This feature makes it easier to comprehend things in a quicker and
easier way.
Begin with creating the main interface, and then continue to the development of
each module in PCaMs™. All figures below show the PCaMS™ GUI for each
module that has been developed. The student should explore and get close with
the function in Microsoft Visual Basic 2008 Professional Edition such as method
and class because both function will be used in the next stage of coding
development.
A method is a procedure built into the class. They are a series of statements that
are executed when called. Methods allow us to handle code in a simple and
organized fashion. There are two types of methods in VB.NET: those that return
a value (Functions) and those that do not return a value (Sub Procedures).
4
4.2.2.1 Cre
eating the project
p
MAL
LAYSIAN INSTIITUTE OF INFO
ORMATION TEC
CHNOLOGY
UNIVVERSITY KUALLA LUMPUR
PARENTAL CONTROL AND MONITORING SYSTEM (PCaMS ™) 34
Figure 4.3 above shows the login interface of PCaMs™. It is the first interface
appears before main page. This is for security purpose. The username and
password was set by students. If anything problem or forgot your username and
password you need to contact PCaMS™ student.
HOM
ME ( PCaMS / MainPCaM
MS.vb )
ADD
D ( PCaMS / AddHost.vb)
A
DEL
LETE (PCaMS
S / DeleteHosst.vb )
HIST
TORY ( IEHisstoryViewer / IEHistoryView
werUI.cs )
TIMER ( Shutdow
wnTimer / Ma
ain.vb )
HEL
LP ( PCaMS™
™ v1.0 User Guide.pdf
G )
Ta
Table 4.1: Legends of PCaM
MS™ Main In
nterface
MAL
LAYSIAN INSTIITUTE OF INFO
ORMATION TEC
CHNOLOGY
UNIVVERSITY KUALLA LUMPUR
PARENTAL CONTROL AND MONITORING SYSTEM (PCaMS ™) 37
A textbox to add
website to block
Figure 4.5 shows the interface of block unwanted website. Student creates a
textbox to help user easy to enter their unwanted website. The PCaMS™ use
hosts file technology to block the website.
List of Blocked
Website
Figure 4.6 shows the interface to delete the website. Student creates a textbox
to call the hosts file to show the list of blocked website. Example of blocked
website:
127.0.0.1 www.facebook.com
127.0.0.1 www.friendster.com
The warning will appear to remind the user to read the user guide first before
delete the website as shown as in figure 4.7.
List of
visited URL
Preview Box
In figure 4.8 shows the list of visited URL. In PCaMS™ it only captures the
history from Internet Explorer only. The visited URL viewed in the right side of
the interface. Student creates a small preview box to fast preview of the history.
You also can delete the history by push the Delete button at the interface. The
Refresh button is to refresh the URL list.
Figure 4.9 shows the interface to set the time to auto shutdown the pc. Student
creates a choice either you can shutdown the computer at a specific time or you
can shutdown the computer in countdown time mode.
In PCaMS™ it not only shutdown but student also creates another features such
as log off, reboot and hibernate. When the timer was running, the taskbar notifier
will appear on the right bottom side of your screen to alert the user to save their
work before the computer go to shutdown. Figure 4.10 shows the example of
taskbar notifier.
Use Case diagrams show the various activities the users can perform on the
PCaMS™. In this section use-case diagram consist of the general use-case
diagram.
Start Application
Login
View History
Admin
(Parents)
Delete History
Preview Thumbnails
Block Websites
Exit Application
Above, Figure 4.0 is the general Use Case diagram of the PCaMS™. It shows
the interaction between user (parents) and the system. There are eight use
cases involved which are Start Application, Login, View History, Delete History,
Preview Thumbnails, Block Websites, Set Auto-Shutdown Timer and Exit
Application. When user wants to start the application, the user needs to Login.
This chapter will represent the various testing where all compulsory and
applicable testing mechanism is applied on. The testing and results phase can
be initiated properly to test the project functionality. This testing is inevitable to
make sure that the application is error free and reaches the quality standard
required and also meet the objectives. This prototype later has been tested and
evaluated on its usage on personnel computer or PC.
Student divides testing into two parts. First to test the project functionality and
for the second part is usability testing. The objective of this stage is to ensure all
the systems are running successfully according to the objectives. Usability
testing is a technique used to evaluate a product by testing it on users. The aim
is to observe people using the product to discover errors and areas of
improvement.
Student need to test every single form before running the fully system. This is
because to avoid major error in the system.
When user adds a website at PCaMS™ AddHost Interface user cannot reach to
the website. To enable the blocked website, user needs to delete the URL that
they have entered before. The output should be as shown as in figure 5.4. After
select the URL to delete user need to hit the delete button at keyboard and click
save button at interface to enable the website back.
The PCaMS™ Internet History Viewer can show the visited URL from Internet
Explorer. In PCaMS™ Internet History Viewer interface there have four buttons.
Home, Refresh, Preview, Delete. The output will show the visited URL form
Internet Explorer history. During testing this part, student faces a problem. The
PCaMS™ interface not show the latest visited URL. Student fined a solution to
delete the Internet Explorer History. Then student creates the batch file to clear
all the cookies and history. This is the command to delete the cookies and
history.
RunDll32.exe InetCpl.cpl,ClearMyTracksByProcess 255
When testing on the PCaMS™ Auto Shutdown there no major problem that
student was faced. Student has tested the timer. For the testing purpose,
student set the time to Log Off the PC in 1 minute (countdown time mode).In
figure 5.5 show the setting.
When the user start the timer by push the button OK, the timer will start and
taskbar notifier will popup to alert the user as shown in figure 5.6.
The student will give a short brief before the respondents before they sit for the
usability testing. The respondents were further informed about the aim of the
test and their rights. They have been told that the testing is done to test the
prototype usability.
The test was conduct on one-to-one basis. The respondent will perform
benchmark tasks by referring the questionnaire, it is important to clarify on the
general aspects of their basic knowledge on other parental control software, how
useful and easy to use the system will be for the respondents.
5.3.2 Questionnaire
The result of usability test is based from questionnaire. These will show the
parent’s concern about their children online behavior, ease of use of PCaMS™
and issues of PCaMS™.
Figure 5.7: Chart show how parents concern about their children online behavior
Based on figure 5.7, 84% of the respondents really concern about their children
online behavior. While another 12%, they not sure they really should know what
their children do while online.
Based on the graph in Figure 5.7, the student knows that the PCaMS™ is easy
to use and the level of difficulties of the system is near to the ground. It is proved
by the graph that almost 80% of the respondents agree.
Do you think that PCaMS™ can help you to monitor your children online behaviour?
Refer from figure 5.8, 90% from the respondents agree that PCaMS™ can help
they in monitor their children online behavior. From these result student knows
that the PCaMS™ managed to achieve the objective to reduce the online
harassment and cyber-bullying the kids.
PCaMS™ has meets the entire basic objectives; particularly for this project and
the components of the application have been implemented. In addition, most of
the requirements have reached the target objective.
The project has researched the field has utilized the findings from this research
to ensure the application is successful. Implementing this project has given an
insight into managing a complex software project that spans over many
components and different technologies.
6.2 Conclusion
On the whole, PCaMS™ has meets the objectives, particularly for this project
and the components of the application have been implemented. Hence, most of
the requirements have reached the target objective.
From the analysis, it can be concluded that the basic aim and objectives of this
project to develop PCaMS™ was success and accepted by the respondents as
a user. It allow user to monitor their children aged 5 to 12 years old online
behavior. This mean the friendly environment have been fulfill the base on user
requirement. Developing the project maybe the most difficult and different to
experience but in the same time fun environment to explore. But it will give a
chance to explore our own potential, and to learn how to conduct real system
with the proper way of documentation and how to communicate with all type of
partner and handle all sorts of situation. This application is one way of learning
to enhance the new life style. Therefore, the project as a whole can be
considered valuable and can be commercialized.
Although this system is function as expected and reached the basic goal, there
still some improvement on the information purposes which is to be more
effective and real.
This product has the potential for future development and research and
examines some ways in which this application could be extended in the future.
Other than that:
1. The system can work with any other operating system other than
Windows XP.
2. The system is compatible with other internet browser.
3. The system can notify and alert the user or admin by using email or
message notification(phone gateway)
4. Game and application alert and blocking
5. Content web filtering
REFERENCES
1. Nick Randolph, David Gardner (July 2008). Professional Visual Studio 2008
3. Alan Dennis, Barbara Haley Wixom & David Tegarden (2005). System
from http://internet-filter-review.toptenreviews.com/netnanny-review.html
7. The Dangers of Online Social Networking (2011, April 13) Retrieved from
http://ofmeadowsbooksandcakes.blogspot.com/2011/04/dangers-of-online-
social-networking.html
APPENDIX A: QUESTIONNAIRES
o Yes
o No
o Not Sure
5. Have you heard of any parental control software or internet filter software
products before?
o Yes
o No
o I think so
6. Do you feel you should keep a closer eye on what they are doing online?
o Yes
o No
o Maybe
7. Do you know what the purpose of the parental control software is?
o Yes
o No
o Not so sure
8. Will you give a try on the usage of the parental control software?
o Yes
o No
_________________________________________________________________
_________________________________________________________________
_________________________________________________________________
□ Very Easy
□ Easy
□ Moderate
□ Hard
□ Very Hard
2. Do you think that PCaMS™ can help you to monitor your children online
behaviour?
o Yes
o No
3. Do you think that PCaMS™ will help to reduce the online harassment, cyber-
bullying among the kids?
o Yes
o No
o Maybe
4. Do you think PCaMS™ or any other parental control software should be use by
parents?
o Yes
o No
o Yes,if freeware
o No
o Maybe
o Others
o Content control
o Receive email alerts
o Receive mobile alerts
o Schedule Internet access
o Others
o Yes
o No
_________________________________________________________________
_________________________________________________________________
_________________________________________________________________
Login.vb
Else
MsgBox("Incorrect") 'Exactly as it says, replace this with
whatever you want it to do
End If
End Sub
MainPCaMS.vb
End Sub
End Sub
End Sub
End Sub
End Sub
End Sub
With proc.StartInfo
.Arguments = "H:\Documents and Settings\m e i k a t o\My
Documents\Visual Studio 2008\Projects\Final_PCaMS_26032011\PCaMS™ v1.0
User Guide.pdf"
.UseShellExecute = True
.WindowStyle = ProcessWindowStyle.Maximized
.WorkingDirectory = "H:\Program Files\Adobe\Reader
9.0\Reader" '<----- Set Acrobat Install Path
.FileName = "AcroRd32.exe" '<----- Set Acrobat Exe Name
End With
proc.Start()
proc.Close()
proc.Dispose()
End Sub
End Class
AddHost.vb
End Sub
End Sub
End Class
DeleteHost.vb
Imports System.IO
Public Class DeleteHost
Public Function GetFileContents(ByVal FullPath As String, _
Optional ByRef ErrInfo As String = "") As String
End Try
Return bAns
End Function
Imports System.ServiceProcess
Imports System.Threading
Imports System
Imports System.Drawing
Imports System.Collections
Imports System.ComponentModel
Imports System.Windows.Forms
Inherits System.Windows.Forms.Form
End Sub
seconds = seconds - 1
End If
WindowsController.ExitWindows(RestartOptions.LogOff, True)
Case 1
Me.Close()
WindowsController.ExitWindows(RestartOptions.PowerOff, True)
Case 2
Me.Close()
WindowsController.ExitWindows(RestartOptions.Reboot, True)
Case 3
Me.Close()
WindowsController.ExitWindows(RestartOptions.ShutDown, True)
Case 4
Me.Close()
WindowsController.ExitWindows(RestartOptions.Suspend, True)
Case 5
Me.Close()
WindowsController.ExitWindows(RestartOptions.Hibernate, True)
End Select
End If
End Sub
If len = 1 Then
newVal = "0" + Val.ToString
Return newVal
Else
Return Val.ToString
End If
End Function
If String.Compare(Now.Hour.ToString, nudHours1.Value.ToString)
= 0 Then
If String.Compare(Now.Minute.ToString,
warningTime.ToString) = 0 Then
Dim remain As Integer = 60 - Now.Second
If PopHide = False Then showPopup(cbSelect.Text,
remain)
If Notify = False Then
PlayNow()
Notify = True
End If
End If
End If
If String.Compare(Now.Hour.ToString, nudHours1.Value.ToString)
= 0 Then
If String.Compare(Now.Minute.ToString,
nudMin1.Value.ToString) = 0 Then
Me.Show()
Timer1.Stop()
WindowsController.ExitWindows(RestartOptions.LogOff, True)
Case 1
Me.Close()
WindowsController.ExitWindows(RestartOptions.PowerOff, True)
Case 2
Me.Close()
WindowsController.ExitWindows(RestartOptions.Reboot, True)
Case 3
Me.Close()
WindowsController.ExitWindows(RestartOptions.ShutDown, True)
Case 4
Me.Close()
WindowsController.ExitWindows(RestartOptions.Suspend, True)
Case 5
Me.Close()
WindowsController.ExitWindows(RestartOptions.Hibernate, True)
End Select
End If
End If
End Sub
.ReShowOnMouseOver = True
.Show("Auto Shutdown Notice", "System " + shutDownType + "
in " + remain.ToString + " Seconds " & _
"Click on the box to HALT the process", 500, 3000, 500)
End With
End Sub
End Sub
End Sub
End Sub
hours = setHours
mins = setMins
If nudHours2.Value = 0 AndAlso nudMin2.Value = 0 Then
seconds = 60
Else
seconds = 0
End If
btnOK.Enabled = False
End Sub
APPENDIX C: BROCHURE
APPENDIX D: POSTER