Sunteți pe pagina 1din 103

PARENTAL CONTROL AND MONITORING SYSTEM

(PCaMS™)

MALAYSIAN INSTITUTE OF INFORMATION TECHNOLOGY

UNIVERSITI KUALA LUMPUR

YEAR 2011
PARENTAL CONTROL AND MONITORING SYSTEM

(PCaMS™)

KHAIRUL SYAZUWAN BIN M.AMAIR

Dissertation Submitted in Fulfillment of the Requirements

For the Bachelor of Engineering Technology (Hons) in Networking Systems

In the Malaysian Institute of Information Technology,

Universiti Kuala Lumpur

YEAR 2011
iii

COPYRIGHT PAGE

Declaration of Copyright and Affirmation of Fair Use of Unpublished Research


Work as stated below:

Copyright @ 2011 by

Khairul Syazuwan Bin M.Amair (52208108084)


and
Lily Nur Azura Bt Mohd Sani Ng (52208108079)

All rights reserved for Parental Control and Monitoring System


(PCaMS™)

No part of this unpublished research may be reproduced, stored in a retrieval


system, or transmitted, in any form or by any means, electronic, mechanical,
photocopying, recording or otherwise without the prior written permission of the
copyright holder except as provided below:
i. Any material contained in or derived from this unpublished research
may only be used by others in their writing with due acknowledgment.
ii. MIIT UniKL or its library will have the right to make and transmit
copies (print or electronic) for institutional and academic purpose
iii. The MIIT UniKL’s Library will have the right to make, store in a
retrieval system and supply copies of this unpublished research if
requested by other universities and research library.
 
iv

 
 
ACKNOWLEDGEMENT

All praises to the almighty god Allah S.W.T for blessing us until we have
successfully completed this final year project on April 2011. A million thanks to
Mr. Muhammad Ezra Bin Muhammad Ismail as our supervisor in this final year
project. He had showed a remarkable capability and gave us valuable
assistance and advice in order to pursuit of our goals. His expectations and faith
in our capabilities were driving forces to break through difficulties during the
implementation of this project. Again, thank you for your guidance and
assistance from the start until the end.

Our grateful thanks also go to Miss Hannah Binti Sofian as our co-supervisor for
taking the time to read this report, thank you for your guidance, criticism, advice
and supervision. Also thanks to our final year project coordinator, Madam Irma
Syarlina Binti Che Elias for the informative guidance and schedule.

Above all, we also would like to thanks to our loving family for their priceless
support, guidance, and love. Not to forget all beloved friends especially BNS
friends for your wonderful support and advices. Last but not least, we also
express our deepest grateful to our family especially our parent for being
unbelievably supportive.
v

TABLE OF CONTENTS

DECLARATION PAGE .............................................................................................. i
APPROVAL PAGE ................................................................................................... ii
COPYRIGHT PAGE  ................................................................................................ iii
ACKNOWLEDGEMENT  ......................................................................................... iv
TABLE OF CONTENTS  .......................................................................................... v
LIST OF TABLES  ................................................................................................... ix
LIST OF FIGURES  .................................................................................................. x
LIST OF ABBREVIATIONS  ................................................................................... xi
ABSTRACT  ............................................................................................................ xii

CHAPTER I: INTRODUCTION

1.1 Introduction  ...................................................................................................... 1


1.2 Purpose and objectives  .................................................................................. 2
1.3 Scope of project  ............................................................................................... 2
1.4 Problem statement  .......................................................................................... 2
1.5 Project rationale  ............................................................................................... 3
1.6 Limitation of project  ........................................................................................ 3

CHAPTER II: LITERATURE REVIEW

2.1 Social Networking Sites  .................................................................................. 4


2.1.1 Social Networking Sites as a Virtual Community  ................................ 4
2.1.2 Types of Social Networking Sites  .......................................................... 5
2.2 Statistical Analysis  .......................................................................................... 6
2.2.1 Social Networking Penetration ................................................................ 7
2.2.2 Facebook Assumes Top Position in Asia Pacific Markets  ................. 8
vi

2.3 Impacts of Social Networking Sites  .............................................................. 9


2.3.1 Threat of Children and Teenagers safety  ............................................. 9
2.3.2 Educational Application  ......................................................................... 10
2.3.3 Business Application  .............................................................................. 11
2.3.4 Interpersonal Communication  .............................................................. 12
2.4 Parental Control Software Resources ......................................................... 14
2.4.1 Organizations in The United States ...................................................... 16
2.4.2 Organizations in Malaysia  ..................................................................... 17
2.4.2.1 CyberSecurity Malaysia ......................................................... 17
2.4.2.2 Cyber999 Help Centre ............................................................ 17
2.4.3 Net Nanny Specifications  ...................................................................... 18 
2.4.3.1 Pictures, Forums and Blog ..................................................... 18
2.4.3.2 Keyword Blocking .................................................................... 18
2.4.3.3 Blocks Pornography and Protects Families ........................ 19
2.4.3.4 Remote Management .............................................................. 19
2.4.3.5 Instant Messaging Controls Screen ...................................... 20
2.4.3.6 Internet Use Time Controls ..................................................... 20
2.4.3.7 Integration with Popular Search Engines ............................. 20
2.4.3.8 Filter Alerts on Your Cell Phone ............................................. 21

CHAPTER III: METHODOLGY

3.1 Introduction  .................................................................................................... 22


3.2 Prototyping – based methodology  ............................................................. 22
3.2.1 Briefly on different Phases  .................................................................... 23 
3.2.1.1 Planning .................................................................................... 23
3.2.1.2 Analysis, Design and Implementation .................................. 23
vii

3.2.1.3 Design Prototype .................................................................... 24


3.2.1.3 Implementation ........................................................................ 24
3.2.1.4 System ...................................................................................... 24
3.3 Milestone and Timelines  ............................................................................... 24
3.4 Requirement specification  ........................................................................... 29
3.4.1 Hardware and software requirement  ................................................... 29
3.4.2 End user system requirement and compatibility  ............................... 29
3.5 Costing  ............................................................................................................ 30
3.5.1 Computer / Laptop: Hardware  .............................................................. 30
3.5.2 Computer / Laptop Software  ................................................................ 30
3.5.3 Total Costing  ........................................................................................... 30

CHAPTER IV: PROTOTYPE/PRODUCT DEVELOPMENT

4.1 Introduction ..................................................................................................... 31
4.2 Stages of development .................................................................................. 32
4.2.1 Software Installation ................................................................................ 32
4.2.2 Process of Developing and Coding ...................................................... 32
4.2.2.1 Creating the project ................................................................. 33
4.2.2.2 Contains of the PCaMs™ ....................................................... 34
4.3 Design a Graphical User Interface ............................................................... 35
4.4 Complete Prototype ........................................................................................ 42
4.4.1 Use-case diagram ................................................................................... 42
viii

CHAPTER V: TESTING AND RESULT

5.1 Stage of Testing  ............................................................................................. 43


5.2 Project Functionality Testing  ....................................................................... 43
5.2.1 Add website to block  .............................................................................. 44
5.2.2 Enable the blocked website  .................................................................. 45
5.2.3 IE History Viewer  .................................................................................... 46
5.2.4 Shutdown timer  ....................................................................................... 47
5.3 Usability Testing  ............................................................................................ 48
5.3.1 Usability Testing Implementation  ......................................................... 48
5.3.2 Questionnaire  .......................................................................................... 48
5.4 Usability Testing Result and Analysis  ....................................................... 49
5.4.1 Parent’s concern  .................................................................................... 49
5.4.2 Ease of Use  ............................................................................................. 50
5.4.3 The issues of PCaMS™  ........................................................................ 51

CHAPTER VI: CONCLUSION AND RECOMMENDATIONS

6.1 Project Accomplished and Implementation  .............................................. 52


6.2 Conclusion ....................................................................................................... 52
6.3 Suggestion and recommendation  ............................................................... 53 
 
REFERENCES  ....................................................................................................... 54
APPENDIX A: QUESTIONNAIRES  ..................................................................... 56
APPENDIX B: SOURCE CODES  ......................................................................... 61
APPENDIX C: BROCHURE  .................................................................................. 74
APPENDIX D: POSTER  ........................................................................................ 77
ix

LIST OF TABLES

Table 2.1: Average social networking reach in Asia Pacific  ....................................... 7


Table 2.2: Top social networking site reach in Asia Pacific ......................................... 8
Table 3.1: Milestones ............................................................................................................. 25
Table 3.3: Hardware list ........................................................................................................ 29
Table 3.4: Software list .......................................................................................................... 29
Table 3.5: Costing for implementation (Hardware)  ...................................................... 30
Table 3.6: Costing for implementation (Software)  ........................................................ 30
Table 3.7: Total Costing Hardware and Software ......................................................... 30
Table 4.1: Legends of PCaMS™ Main Interface ........................................................... 36
x

LIST OF FIGURES

Figure 3.0: Prototyping – based Methodology  ......................................................... 23


Figure 3.1: Project Research and Proposal Stage Gantt chart  ............................ 27
Figure 3.2: Project Development and Implementation Stage  ............................... 28
Figure 4.1: Create a new Windows Forms Application  .......................................... 33
Figure 4.2: Contain of PCaMs™  ................................................................................ 34
Figure 4.3: PCaMS™ Login Interface  ....................................................................... 35
Figure 4.4: PCaMS™ Main Interface  ........................................................................ 36
Figure 4.5: PCaMS™ AddHost Interface  ................................................................. 37
Figure 4.6: PCaMS™ DeleteHost Interface  ............................................................. 38
Figure 4.7: PCaMS™ Warning Message Box  ......................................................... 38
Figure 4.8: PCaMS™ Internet Explorer History Viewer  ......................................... 39
Figure 4.9: PCaMS™ Auto Shutdown Interface  ...................................................... 40
Figure 4.10: PCaMS™ Taskbar Notifier  ................................................................... 40
Figure 4.11: PCaMS™ Use-case diagram for admin (parents)  ............................ 42
Figure 5.1: Parts of testing  .......................................................................................... 43
Figure 5.2: Before add the website to PCaMS™  .................................................... 44
Figure 5.3: The result after add the website to block  ............................................. 44
Figure 5.4: Show the selected URL to delete.  ......................................................... 45
Figure 5.5: Setting to Log Off the PC in 1 minute.  .................................................. 47
Figure 5.6: Taskbar Notifier  ........................................................................................ 47
Figure 5.7: Chart show how parents concern about their children  ....................... 49
Figure 5.7: Chart show ease of use of PCaMS™  ................................................... 50
Figure 5.8: Chart show the respond from PCaMS™ issue  ................................... 51 
 
 
 
xi

LIST OF ABBREVIATIONS

Parental Control and Monitoring System PCaMS™


Uniform Resource Locator URL
Bachelor of Engineering in Networking System BNS
Universiti Kuala Lumpur UniKL
Graphical User Interface GUI
xii

ABSTRACT

This study was designed to focus on the parents who always wanted the best
from an organization to solve their problems. Due to major problem of Cyber-
bullying and harassment such as publicizing private instant messages or e-
mails, posting photos that will cause embarrassment. PCaMS™ is a monitoring
tool and control system that developed purposely to solve the current issue
among children age between 5-12 years old. It is to monitor the children online
behaviour and to block the desired websites. It also has an Auto-Shutdown
Timer that allows parents to set the desired time to shutdown and also shutdown
in countdown time mode. Other than shutdown, user also can select the
computer to Log Off, Reboot or Hibernate.

Results from the respondent had been proves that PCaMS™ is effective in
terms of monitoring and blocking websites, easy to use and all the testing is
implemented and tested in the actual situation.
xiii

ABSTRAK

Panyelidikan ini direkabentuk untuk difokuskan kepada ibu bapa yang sentiasa
mahukan sesuatu yang terbaik dari satu organisasi untuk menyelesaikan
masalah mereka. Merujuk kepada masalah utama iaitu Jenayah Siber serta
gangguan atas talian seperti mempamirkan pesanan ringkas peribadi atau emel,
mempamirkan gambar yang mengaibkan. PCaMS™ adalah satu system
kawalan dan pemantauan yang dihasilkan bertujuan untuk menyelesaikan
masalah semasa ini dikalangan kanak – kanak berumur dalam lingkungan 5 –
12 tahun. Ianya adalah untuk memantau aktiviti kanak – kanak semasa
menggunakan internet serta menghalang laman sesawang yang tidak
sepatutnya dicapai oleh kanak – kanak. Ia juga mempunyai system jangkamasa
penutupan automatic (Auto-Shutdown Timer) yang membolehkan ibu bapa
menetapkan untuk mematikan komputer dalam masa tertentu ataupun dalam
tempoh beberapa minit mahupun beberapa jam.

Keputusan dari kajian yang dijalankan keatas beberapan responden


membuktikan bahawa PCaMS™ sangat efektif untuk sistem kawalan dan
pemantauan, senang digunakan dan segala cubaan dilaksanakan dalam situasi
sebenar.
iii

COPYRIGHT PAGE

Declaration of Copyright and Affirmation of Fair Use of Unpublished Research


Work as stated below:

Copyright @ 2011 by

Khairul Syazuwan Bin M.Amair (52208108084)


and
Lily Nur Azura Bt Mohd Sani Ng (52208108079)

All rights reserved for Parental Control and Monitoring System


(PCaMS™)

No part of this unpublished research may be reproduced, stored in a retrieval


system, or transmitted, in any form or by any means, electronic, mechanical,
photocopying, recording or otherwise without the prior written permission of the
copyright holder except as provided below:
i. Any material contained in or derived from this unpublished research
may only be used by others in their writing with due acknowledgment.
ii. MIIT UniKL or its library will have the right to make and transmit
copies (print or electronic) for institutional and academic purpose
iii. The MIIT UniKL’s Library will have the right to make, store in a
retrieval system and supply copies of this unpublished research if
requested by other universities and research library.
 
iv

 
 
ACKNOWLEDGEMENT

All praises to the almighty god Allah S.W.T for blessing us until we have
successfully completed this final year project on April 2011. A million thanks to
Mr. Muhammad Ezra Bin Muhammad Ismail as our supervisor in this final year
project. He had showed a remarkable capability and gave us valuable
assistance and advice in order to pursuit of our goals. His expectations and faith
in our capabilities were driving forces to break through difficulties during the
implementation of this project. Again, thank you for your guidance and
assistance from the start until the end.

Our grateful thanks also go to Miss Hannah Binti Sofian as our co-supervisor for
taking the time to read this report, thank you for your guidance, criticism, advice
and supervision. Also thanks to our final year project coordinator, Madam Irma
Syarlina Binti Che Elias for the informative guidance and schedule.

Above all, we also would like to thanks to our loving family for their priceless
support, guidance, and love. Not to forget all beloved friends especially BNS
friends for your wonderful support and advices. Last but not least, we also
express our deepest grateful to our family especially our parent for being
unbelievably supportive.
v

TABLE OF CONTENTS

DECLARATION PAGE .............................................................................................. i
APPROVAL PAGE ................................................................................................... ii
COPYRIGHT PAGE  ................................................................................................ iii
ACKNOWLEDGEMENT  ......................................................................................... iv
TABLE OF CONTENTS  .......................................................................................... v
LIST OF TABLES  ................................................................................................... ix
LIST OF FIGURES  .................................................................................................. x
LIST OF ABBREVIATIONS  ................................................................................... xi
ABSTRACT  ............................................................................................................ xii

CHAPTER I: INTRODUCTION

1.1 Introduction  ...................................................................................................... 1


1.2 Purpose and objectives  .................................................................................. 2
1.3 Scope of project  ............................................................................................... 2
1.4 Problem statement  .......................................................................................... 2
1.5 Project rationale  ............................................................................................... 3
1.6 Limitation of project  ........................................................................................ 3

CHAPTER II: LITERATURE REVIEW

2.1 Social Networking Sites  .................................................................................. 4


2.1.1 Social Networking Sites as a Virtual Community  ................................ 4
2.1.2 Types of Social Networking Sites  .......................................................... 5
2.2 Statistical Analysis  .......................................................................................... 6
2.2.1 Social Networking Penetration ................................................................ 7
2.2.2 Facebook Assumes Top Position in Asia Pacific Markets  ................. 8
vi

2.3 Impacts of Social Networking Sites  .............................................................. 9


2.3.1 Threat of Children and Teenagers safety  ............................................. 9
2.3.2 Educational Application  ......................................................................... 10
2.3.3 Business Application  .............................................................................. 11
2.3.4 Interpersonal Communication  .............................................................. 12
2.4 Parental Control Software Resources ......................................................... 14
2.4.1 Organizations in The United States ...................................................... 16
2.4.2 Organizations in Malaysia  ..................................................................... 17
2.4.2.1 CyberSecurity Malaysia ......................................................... 17
2.4.2.2 Cyber999 Help Centre ............................................................ 17
2.4.3 Net Nanny Specifications  ...................................................................... 18 
2.4.3.1 Pictures, Forums and Blog ..................................................... 18
2.4.3.2 Keyword Blocking .................................................................... 18
2.4.3.3 Blocks Pornography and Protects Families ........................ 19
2.4.3.4 Remote Management .............................................................. 19
2.4.3.5 Instant Messaging Controls Screen ...................................... 20
2.4.3.6 Internet Use Time Controls ..................................................... 20
2.4.3.7 Integration with Popular Search Engines ............................. 20
2.4.3.8 Filter Alerts on Your Cell Phone ............................................. 21

CHAPTER III: METHODOLGY

3.1 Introduction  .................................................................................................... 22


3.2 Prototyping – based methodology  ............................................................. 22
3.2.1 Briefly on different Phases  .................................................................... 23 
3.2.1.1 Planning .................................................................................... 23
3.2.1.2 Analysis, Design and Implementation .................................. 23
vii

3.2.1.3 Design Prototype .................................................................... 24


3.2.1.3 Implementation ........................................................................ 24
3.2.1.4 System ...................................................................................... 24
3.3 Milestone and Timelines  ............................................................................... 24
3.4 Requirement specification  ........................................................................... 29
3.4.1 Hardware and software requirement  ................................................... 29
3.4.2 End user system requirement and compatibility  ............................... 29
3.5 Costing  ............................................................................................................ 30
3.5.1 Computer / Laptop: Hardware  .............................................................. 30
3.5.2 Computer / Laptop Software  ................................................................ 30
3.5.3 Total Costing  ........................................................................................... 30

CHAPTER IV: PROTOTYPE/PRODUCT DEVELOPMENT

4.1 Introduction ..................................................................................................... 31
4.2 Stages of development .................................................................................. 32
4.2.1 Software Installation ................................................................................ 32
4.2.2 Process of Developing and Coding ...................................................... 32
4.2.2.1 Creating the project ................................................................. 33
4.2.2.2 Contains of the PCaMs™ ....................................................... 34
4.3 Design a Graphical User Interface ............................................................... 35
4.4 Complete Prototype ........................................................................................ 42
4.4.1 Use-case diagram ................................................................................... 42
viii

CHAPTER V: TESTING AND RESULT

5.1 Stage of Testing  ............................................................................................. 43


5.2 Project Functionality Testing  ....................................................................... 43
5.2.1 Add website to block  .............................................................................. 44
5.2.2 Enable the blocked website  .................................................................. 45
5.2.3 IE History Viewer  .................................................................................... 46
5.2.4 Shutdown timer  ....................................................................................... 47
5.3 Usability Testing  ............................................................................................ 48
5.3.1 Usability Testing Implementation  ......................................................... 48
5.3.2 Questionnaire  .......................................................................................... 48
5.4 Usability Testing Result and Analysis  ....................................................... 49
5.4.1 Parent’s concern  .................................................................................... 49
5.4.2 Ease of Use  ............................................................................................. 50
5.4.3 The issues of PCaMS™  ........................................................................ 51

CHAPTER VI: CONCLUSION AND RECOMMENDATIONS

6.1 Project Accomplished and Implementation  .............................................. 52


6.2 Conclusion ....................................................................................................... 52
6.3 Suggestion and recommendation  ............................................................... 53 
 
REFERENCES  ....................................................................................................... 54
APPENDIX A: QUESTIONNAIRES  ..................................................................... 56
APPENDIX B: SOURCE CODES  ......................................................................... 61
APPENDIX C: BROCHURE  .................................................................................. 74
APPENDIX D: POSTER  ........................................................................................ 77
ix

LIST OF TABLES

Table 2.1: Average social networking reach in Asia Pacific  ....................................... 7


Table 2.2: Top social networking site reach in Asia Pacific ......................................... 8
Table 3.1: Milestones ............................................................................................................. 25
Table 3.3: Hardware list ........................................................................................................ 29
Table 3.4: Software list .......................................................................................................... 29
Table 3.5: Costing for implementation (Hardware)  ...................................................... 30
Table 3.6: Costing for implementation (Software)  ........................................................ 30
Table 3.7: Total Costing Hardware and Software ......................................................... 30
Table 4.1: Legends of PCaMS™ Main Interface ........................................................... 36
x

LIST OF FIGURES

Figure 3.0: Prototyping – based Methodology  ......................................................... 23


Figure 3.1: Project Research and Proposal Stage Gantt chart  ............................ 27
Figure 3.2: Project Development and Implementation Stage  ............................... 28
Figure 4.1: Create a new Windows Forms Application  .......................................... 33
Figure 4.2: Contain of PCaMs™  ................................................................................ 34
Figure 4.3: PCaMS™ Login Interface  ....................................................................... 35
Figure 4.4: PCaMS™ Main Interface  ........................................................................ 36
Figure 4.5: PCaMS™ AddHost Interface  ................................................................. 37
Figure 4.6: PCaMS™ DeleteHost Interface  ............................................................. 38
Figure 4.7: PCaMS™ Warning Message Box  ......................................................... 38
Figure 4.8: PCaMS™ Internet Explorer History Viewer  ......................................... 39
Figure 4.9: PCaMS™ Auto Shutdown Interface  ...................................................... 40
Figure 4.10: PCaMS™ Taskbar Notifier  ................................................................... 40
Figure 4.11: PCaMS™ Use-case diagram for admin (parents)  ............................ 42
Figure 5.1: Parts of testing  .......................................................................................... 43
Figure 5.2: Before add the website to PCaMS™  .................................................... 44
Figure 5.3: The result after add the website to block  ............................................. 44
Figure 5.4: Show the selected URL to delete.  ......................................................... 45
Figure 5.5: Setting to Log Off the PC in 1 minute.  .................................................. 47
Figure 5.6: Taskbar Notifier  ........................................................................................ 47
Figure 5.7: Chart show how parents concern about their children  ....................... 49
Figure 5.7: Chart show ease of use of PCaMS™  ................................................... 50
Figure 5.8: Chart show the respond from PCaMS™ issue  ................................... 51 
 
 
 
xi

LIST OF ABBREVIATIONS

Parental Control and Monitoring System PCaMS™


Uniform Resource Locator URL
Bachelor of Engineering in Networking System BNS
Universiti Kuala Lumpur UniKL
Graphical User Interface GUI
xii

ABSTRACT

This study was designed to focus on the parents who always wanted the best
from an organization to solve their problems. Due to major problem of Cyber-
bullying and harassment such as publicizing private instant messages or e-
mails, posting photos that will cause embarrassment. PCaMS™ is a monitoring
tool and control system that developed purposely to solve the current issue
among children age between 5-12 years old. It is to monitor the children online
behaviour and to block the desired websites. It also has an Auto-Shutdown
Timer that allows parents to set the desired time to shutdown and also shutdown
in countdown time mode. Other than shutdown, user also can select the
computer to Log Off, Reboot or Hibernate.

Results from the respondent had been proves that PCaMS™ is effective in
terms of monitoring and blocking websites, easy to use and all the testing is
implemented and tested in the actual situation.
xiii

ABSTRAK

Panyelidikan ini direkabentuk untuk difokuskan kepada ibu bapa yang sentiasa
mahukan sesuatu yang terbaik dari satu organisasi untuk menyelesaikan
masalah mereka. Merujuk kepada masalah utama iaitu Jenayah Siber serta
gangguan atas talian seperti mempamirkan pesanan ringkas peribadi atau emel,
mempamirkan gambar yang mengaibkan. PCaMS™ adalah satu system
kawalan dan pemantauan yang dihasilkan bertujuan untuk menyelesaikan
masalah semasa ini dikalangan kanak – kanak berumur dalam lingkungan 5 –
12 tahun. Ianya adalah untuk memantau aktiviti kanak – kanak semasa
menggunakan internet serta menghalang laman sesawang yang tidak
sepatutnya dicapai oleh kanak – kanak. Ia juga mempunyai system jangkamasa
penutupan automatic (Auto-Shutdown Timer) yang membolehkan ibu bapa
menetapkan untuk mematikan komputer dalam masa tertentu ataupun dalam
tempoh beberapa minit mahupun beberapa jam.

Keputusan dari kajian yang dijalankan keatas beberapan responden


membuktikan bahawa PCaMS™ sangat efektif untuk sistem kawalan dan
pemantauan, senang digunakan dan segala cubaan dilaksanakan dalam situasi
sebenar.
PARENTAL CONTROL AND MONITORING SYSTEM (PCaMS™) 1

CHAPTER I: INTRODUCTION

1.1 Introduction

There are many potential problems with social networking sites and the
teenagers that use them. Social networking online involves using Web sites to
share information with others and connect with them by creating a profile that
may include a personal Web page and a blog. It is also one of the most popular
Internet activities among teenagers. Teenagers communicating about their lives
and updating their activities for their friends have become central activities on
social networking sites.

Apart from the social benefits, most social networking sites are open to all,
especially Facebook & MySpace, which means that your teen could be exposed
to harassment, bullying or sexual advances. Most social networking sites have
privacy controls in place, but teens seldom or never use them. Another risk is
identity theft, which can occur when teens share too much information about
their name, date of birth and location.

Cyber-bullying and harassment are most often did by other teens and tend to
happen most to older girls and to teens of either gender who have a strong
online presence. It may take several forms:
• publicizing private instant messages, text messages or e-mails
• posting threatening messages
• posting photos that will cause embarrassment
• Spreading rumours

Online victimization of teenagers had increased and most of the parents are
worry and concern about their children online behaviour.

MALAYSIAN INSTITUTE OF INFORMATION TECHNOLOGY


UNIVERSITY KUALA LUMPUR
PARENTAL CONTROL AND MONITORING SYSTEM (PCaMS™) 2

1.2 Purpose and objectives

The purpose of Parental Control and Monitoring System (PCaMS™) is to


implement a prototype of monitoring system for parental control in order to
monitor the internet usage and attitudes of their children aged between 5 to 12
years old. Here, PCaMS™ will look for abnormal activities in the internet savvy
by detecting the list of websites.

1.3 Scope of project

PCaMS™ is developed to monitor internet activities at home especially children.


PCaMS™ will run on Windows based only as there are many home users run on
Windows based operating system. A user friendly interface for PCaMS™ to
allow non technical background person can effectively monitor their children
online behaviour.

1.4 Problem statement

Apart from the social benefits, social networking sites can be used to document
school research, promote artistic talents and experiment with other forms of
content creation. They provide a way to interact with others who share the same
interests and to get constructive feedback on ongoing projects.

Along with these benefits come some risks. Most social networking sites are
open to all, especially Facebook, MySpace and others which means that your
teen could be exposed to harassment, bullying or sexual advances. Cyber-
bullying and harassment are most often perpetrated by other teens and tend to

MALAYSIAN INSTITUTE OF INFORMATION TECHNOLOGY


UNIVERSITY KUALA LUMPUR
PARENTAL CONTROL AND MONITORING SYSTEM (PCaMS™) 3

happen most to older girls and to teens of either gender who have a strong
online presence.

1.5 Project rationale

This project is required as university purpose. PCaMS™ is developed as in


Malaysia has no parental control software has been founded yet in the current
year. The rationale of developing PCaMS™ is to allow parents to monitor their
children internet usage and activities. PCaMS™ will prevent the risk of exposing
the children to any non-benefits website.

1.6 Limitation of project

There are several limitations on developing the project:


1. The prototype is focused on Windows based operating system. It is
not compatible to other operating system.

2. PCaMS™ could not limit the time of user logged in.

3. Although PCaMS™ features are blocking user-defined websites, but it


is based on the student block list.

MALAYSIAN INSTITUTE OF INFORMATION TECHNOLOGY


UNIVERSITY KUALA LUMPUR
PARENTAL CONTROL AND MONITORING SYSTEM (PCaMS™) 4

CHAPTER II: LITERATURE REVIEW

This chapter focuses on the concept of PCaMS™ and types of parental control
software that available in the market to monitor the online behavior.
Furthermore, definition and concept of social networking sites and online
behavior that relates on social networking as a virtual community, types and
impact of social networking sites also are includes in this chapter.

2.1 Social Networking Sites

Social networking sites are defined as web-based services that allow individuals
to construct a public or semi-public profile within a bounded system. It show the
list of other users with whom they share a connection and view their list of
connections and those made by others within the system. These connections
may vary from site to site (Boyd & Ellison, 2007).

Other terms used to characterize such services are social digital technologies
(Palfrey & Gasser, 2008) and social media (Barnes, 2006) whereas the term
“social network” site seems to reflect the fact that these sites represent existing
social bonds, another term commonly used “social networking” shows that
people use these websites in order to form new networks.

2.1.1 Social Networking Sites as a Virtual Community

Most of the social networking sites are easy to use; many require little
knowledge of the Internet. Besides the easiness to use, social networking sites
are also easier to meet new people online. There are many internet users who
want to make new friends online, but can sometimes be difficult. Without social
networking sites, you will have come into contact with Internet users, often in

MALAYSIAN INSTITUTE OF INFORMATION TECHNOLOGY


UNIVERSITY KUALA LUMPUR
PARENTAL CONTROL AND MONITORING SYSTEM (PCaMS™) 5

chat rooms and learn about their interests before deciding to meet their “friends”.
It also allow user to learn about other internet user in advance before set them
as a friend (Love ToKnow Social Networking, 2009).

The social networking site is the 21st century “virtual community”, a group of
people who use the Internet to communicate with each other about anything and
everything. One can find dating sites, friendship sites, business sites and
hybrids that offer combination of these sites. Globally, hundreds of millions
people have joined one or more social networking site (Ellison, Steinfield &
Lampe, 2007).

2.1.2 Types of Social Networking Sites

Friendster is a website that allows people to explicitly articulate their social


network, present themselves through a Profile, post public testimonials about
one another and browse a network of people (Milgram, 1997).

A Friendster Profile consists of five primary elements:

1. Demographic information
2. Interest and self-description prose
3. Pictures
4. List of friends
5. Testimonials

While providing both the individual’s perspective of self as well as that of their
Friend is beneficial, the Profile is still a coarse representation of individual, which
provides a limited and often skewed perspective (Boyd, 2001).

Facebook came out in 2004 initially targeting college students, but nowadays it
welcoming everyone. Following Facebook was TagWorld and Tagged.

MALAYSIAN INSTITUTE OF INFORMATION TECHNOLOGY


UNIVERSITY KUALA LUMPUR
PARENTAL CONTROL AND MONITORING SYSTEM (PCaMS™) 6

TagWorld introduced tools for creating more personalized Web pages and
Tagged introduced the concept of building tag teams for teens with like interests
(The Free Dictionary, 2009).

Facebook is a social networking website that was originally designed for college
students, but it is now open to anyone from 13 years old or older. Facebook
users can create and customize their own profilers with photos, videos and
information about themselves. Friends can browsethe profiles of other friends
and wirte messages on their pages. Facecook profile has a “wall”, where friends
can post comments and basically it is a public conversation. Facebook allows
user to set a privacy settings which by default it is quite strict. However, user can
adjust the privacy settings to allow users within the network to view part or the
entire user’s profile (Ellison, Steinfield & Lampe, 2007).

As many teens involved online, they are potentially putting themselves in


danger. This is because it has no guarantee that the person on the other side is
being honest. Predators can approach especially teen girls, with little effort.
Teen may risk from sexual predators, they could meet someone who is abusive
and take advantage over them (Love To Know Social Networking, 2009).

2.2 Statistical Analysis

A leader in measuring the digital world - comScore, Inc., released its latest
report on social networking activity in the Asia-Pacific region (excluding China)
based on data from its World Metrix service. The study found that 50.8 percent
of the total online population in the Asia-Pacific region visited a social
networking site in February 2010, reaching a total of 240.3 million visitors.
Facebook.com ranked as the top social network across the majority of individual
markets in the region, while competing brands commanded the top position in
certain markets, including Orkut in India, Mixi.jp in Japan, CyWorld in South
Korea and Wretch.cc in Taiwan.

MALAYSIAN INSTITUTE OF INFORMATION TECHNOLOGY


UNIVERSITY KUALA LUMPUR
PARENTAL CONTROL AND MONITORING SYSTEM (PCaMS™) 7

2.2.1 Social Networking Penetration

In February 2010, Internet users in the Asia-Pacific region averaged 2.5 hours
on social networking sites during the month and visited the category an average
of 15 times. Across markets, the Philippines showed the highest penetration of
social networking usage with more than 90 percent of its entire Web population
visiting a social networking site during the month, followed by Australia (89.6
percent penetration) and Indonesia (88.6 percent penetration). Social
networkers in the Philippines also showed the highest level of engagement on
social networking sites averaging 5.5 hours per visitor in February, with visitors
frequenting the social networking category an average of 26 times during the
month. Strong engagement was also exhibited by Internet users in Indonesia
(5.4 hours per visitor and 22 visits per visitor), Australia (3.8 hours per visitor
and 20 visits per visitor) and Malaysia (nearly 3.8 hours per visitor and 22 visits
per visitor).

Social Networking Reach and Engagement in Asia Pacific Markets February 2010
Total Internet Audience, Age 15+ - Home & Work Locations
Social Networking
Average Minutes per Average Visits per
% Reach
Visitor Visitor
Asia Pacific 50.8 148.9 15.1
Philippines 90.3 332.2 26.3
Australia 89.6 228.0 20.9
Indonesia 88.6 324.4 22.6
Malaysia 84.7 226.0 22.3
Singapore 83.7 220.9 22.1
New Zealand 81.2 217.5 20.3
Taiwan 75.9 131.3 18.3
Hong Kong 75.4 223.3 25.4
India 68.5 130.1 13.0
South Korea 63.5 131.4 16.0
Vietnam 46.1 49.5 7.2
Japan 42.3 120.5 14.0

Table 2.1: Average social networking reach in Asia Pacific

MALAYSIAN INSTITUTE OF INFORMATION TECHNOLOGY


UNIVERSITY KUALA LUMPUR
PARENTAL CONTROL AND MONITORING SYSTEM (PCaMS™) 8

2.2.2 Facebook Assumes Top Position in Majority of Asia Pacific Markets

An analysis of social networks found that Facebook.com was the social


networking leader in eight of the markets – Philippines, Australia, Indonesia,
Malaysia, Singapore, New Zealand, Hong Kong and Vietnam – while in other
countries competing brands captured the top position. Local players led in Japan
(Mixi.jp) and South Korea (CyWorld), while Google-owned Orkut ranked as the
top social networking site in India and Yahoo!’s Wretch.cc led in Taiwan. Here,
Malaysia turned to be the fourth ranked in the position.

Top Social Network in Individual Asia Pacific Markets by Percent Reach of Web
Population February 2010
Total Internet Audience, Age 15+ - Home & Work Locations
Top Social Network in
% Reach of Web Population
Market
Asia Pacific Facebook.com 14.9%
Philippines Facebook.com 84.5%
Australia Facebook.com 69.4%
Indonesia Facebook.com 84.9%
Malaysia Facebook.com 77.5%
Singapore Facebook.com 72.1%
New Zealand Facebook.com 63.6%
Taiwan Wretch.cc 62.5%
Hong Kong Facebook.com 62.6%
India Orkut 46.8%
South Korea CyWorld 54.2%
Vietnam Facebook.com 18.4%
Japan Mixi.jp 18.9%

Table 2.2: Top social networking site reach in Asia Pacific

MALAYSIAN INSTITUTE OF INFORMATION TECHNOLOGY


UNIVERSITY KUALA LUMPUR
PARENTAL CONTROL AND MONITORING SYSTEM (PCaMS™) 9

2.3 Impacts of Social Networking Sites

The impact of social networking sites has been well-proven and documented.
Users of social networks have found romance, formed new businesses,
enhanced their existing businesses, sold merchandise, received assistance
when in trouble and made friends connected with old friends.

Some people believe that social networks are harmful to society and should be
banned. For the most part, these fears are based on the affects that social
networking sites have on children and teenagers. Some also worry about
Internet child stalker. Others are concerned about their children spending too
much time on the Internet without knowing what are they surfing (Love To Know
Social Networking, 2009).

2.3.1 Threat of Children and Teenagers safety

Parents have been concerned by a misuse of social network services,


particularly in relation to online sexual predators. In May 2010, a Child
pornography social networking site with hundreds of members was dismantle by
law enforcement. It was claimed the largest crimes against children case
brought anywhere by anyone.

A common misuse of social networking sites such as Facebook is that it is


occasionally used to emotionally abuse individuals. Such actions are often
referred to as trolling. It is not rare for confrontations in the real world to be
translated online. Online bullying or Cyber-bullying is a relatively common event
and it can often result in emotional trauma for the victim.

MALAYSIAN INSTITUTE OF INFORMATION TECHNOLOGY


UNIVERSITY KUALA LUMPUR
PARENTAL CONTROL AND MONITORING SYSTEM (PCaMS™) 10

Danah boyd, a researcher of social networks quotes a teenager in her article,


Why Youth (Heart) Social Network Sites. The teenager expresses frustration
towards networking sites like MySpace because it causes drama and too much
emotional stress. There are not many limitations as to what individuals can post
when online. Naturally individuals are given the power to post offensive remarks
or pictures that could potentially cause a great amount of emotional pain for
another individual.

2.3.2 Educational Application

Most of industry uses social networking sites as a medium of communication to


interact with people in order to fulfil number of purpose such as work and
personal matter which includes educational institution as well. Certain
academician in higher learning institution takes further steps by utilizing the
social networking sites for the teaching and learning.

Students and academicians uses social networking sites e.g. E-Learning in


order to share ideas, advertise any events and even doing online business.
Social networking sites works as a single spot to gather people around the
globe. Therefore any comments and feedbacks can be viewed by others within
seconds.

Based on National School Boards Association, many students who use social
networking talk about education topics online and, surprisingly, they talk
specifically about schoolwork. Yet the vast majority of school districts have strict
rules against nearly all forms of social networking during the school day even
though students and parents report few problem behaviors online.

MALAYSIAN INSTITUTE OF INFORMATION TECHNOLOGY


UNIVERSITY KUALA LUMPUR
PARENTAL CONTROL AND MONITORING SYSTEM (PCaMS™) 11

2.3.3 Business Application

The use of social network services in an enterprise context presents the


potential of having a major impact on the world of business and work. Social
networks connect people at low cost, this can be beneficial for entrepreneurs
and small businesses looking to expand their contact bases. These networks
often act as a customer relationship management tool for companies selling
products and services. Companies can also use social networks for advertising
in the form of banners and text ads. Since businesses operate globally, social
networks can make it easier to keep in touch with contacts around the world.
One example of social networking being used for business purposes is
LinkedIn.com, which aims to interconnect professionals. LinkedIn has over 40
million users in over 200 countries. Applications for social networking sites have
extended toward businesses and brands are creating their own, high functioning
sites, a sector known as brand networking. It is the idea a brand can build its
consumer relationship by connecting their consumers to the brand image on a
platform that provides them relative content, elements of participation, and a
ranking or score system. Brand networking is a new way to capitalize on social
trends as a marketing tool. (Fraser & Dutta 2008).

In Malaysia, the women Internet users have used information and


communications technology (ICT) to break through the barriers of gender
discrimination and disability and find jobs that allow them to work from home
(AdvocacyNet, 2006). The number of Malaysian Internet users has increased
over the years making Malaysian women a force to reckon with as far as
Internet use is concern.

MALAYSIAN INSTITUTE OF INFORMATION TECHNOLOGY


UNIVERSITY KUALA LUMPUR
PARENTAL CONTROL AND MONITORING SYSTEM (PCaMS™) 12

2.3.4 Interpersonal Communication

From a social perspective, interpersonal communication has been a growing


issue as more youth culture have turned to social networking as a means of
communication. Pendelton & Chatman (1998) describes information seeking can
be considered a socially normative process, a means by which individuals
identify and share values, ideas and relationship. Futher, many teens may be
harming their interpersonal communication by using sites such as Facebook.
Baroness Greenfield, an Oxford University Neuroscientist stated his fear that
these technologies are infantilizing the brain into the state of small children who
are attracted by buzzing noises and bright lights, who have a small attention
span and who live for the moment.

2.4 Parental Control Software Resources

Various web sites which offer tools or services to assist in parental control of
what our children have access to on the Internet. Each of the following
companies are involved in finding ways to keep the Internet safe for kids, and
free from government regulation. Many of them have demonstrations of software
in which you can download, and use on a trial basis.

Below are the parental control software titles and services and also
organizations that are available in the current market.

Software Title Services


BESS is a WWW page which allows access to the Internet using
BESS The Internet sophisticated filtering techniques. Web pages, sites, mail
Retriever
containing objectionable language or images are filtered out.
Designed to give parents complete control over their children's
Children's Internet Internet use, thereby allowing the child to safely explore and
Browser
benefit from the Net's educational content. Parent's password

MALAYSIAN INSTITUTE OF INFORMATION TECHNOLOGY


UNIVERSITY KUALA LUMPUR
PARENTAL CONTROL AND MONITORING SYSTEM (PCaMS™) 13

allows for management of allowable URLs in the encrypted


database. Simple to Manage and Simply Safe. Comes pre-
configured with Safe Sites. Free Safe Site Updates are provided
to Registered owners on an ongoing basis.
The Crayon Crawler is a web browser to protect children on-line.
Features include the first talking chat room for kids, automatic
blocking of vulgarity, animated characters that can actually read

Crayon Crawler to, and interact with the children, a "closed" email system that
eliminates Spam, pornographic solicitations, links and unwanted
emails, as well as instant messaging that allows children to know
if their community friends are on-line.
A free, server-based, comprehensive Web filtering, available for
set-up directly from the crosswalk.com Web site. CrossingGuard
CrossingGuard
claims to use the largest available database of rated Web sites
to filter out nearly 5 million of the 100 million pages on the Web.
Cyber Sentinel is easy to use total security solution for the both
business and the home user. It allows user not only to block
inappropriate material (web pages, e-mail, pictures, and word
processing documents) but also allows the owner to configure
Cyber Sentinel
the program to run in stealth mode (so the end user doesn't
know it is running). The owner can the run Cyber Sentinel later
and see screenshots of when the user was in inappropriate
material.
Cyber Sitter Solid Oak Software offers several versions of CyberSitter. You
may run it on a network or on a personal computer.

Allows parents to monitor what children are doing on the Internet


Disk Tracy without filtering or restricting access. It finds and displays text
and graphics files, hidden graphics and compressed files and a
listing of all web sites visited.
Recommended for children's rooms or schools where 100%
Ed View
effectiveness is required
Parents or teachers can easily access the computer at all times
with no restriction, assign and edit children's passwords, access
Enuff
a user log to see who has used the computer and when,
eliminate conflicts with other computer users in the family or

MALAYSIAN INSTITUTE OF INFORMATION TECHNOLOGY


UNIVERSITY KUALA LUMPUR
PARENTAL CONTROL AND MONITORING SYSTEM (PCaMS™) 14

classroom, by permitting any child to use the computer during


pre-determined days and times allow up to three daily or weekly
settings per child.
Fontrol is a new electronic device designed to solve the age-old
parent-teenager telephone hassle. It is a simple-to-install, easy-
Fontrol to-use switch that you plug into any phone extension or
dedicated phone line you wish to control. In less than five
minutes, you can program Fontrol to switch your phone OFF/ON
at whatever times of day or night you specify. Control phone use,
long distance calls and Internet access with Fontrol.
GuardiaNet is an Internet filtering software that provides families
GuardiaNet with hassle-free protection from inappropriate material on the
Internet. You set the standards. You decide what is appropriate,
and GuardiaNet carries out your wishes with no worry, no
hassle, and no downloading.
It requires user authentication, gives roaming users access to
bookmarks, history, and their customized access rights. Enables
I-Gear customizable list-based filtering with pre-filled categories such as
sex, crime, gambling, and make applicable to users, groups of
users. Provides ability to create "allow lists" to focus Internet
access on specific sites and make applicable to users, groups of
users, computers, or groups of computers.
The Internet Filter is a program that monitors, filters, analyzes,
The Internet Filter and logs internet access. This site has a free, limited feature
version, and allows you to purchase the full version.
Momma Bear automatically adapts for your system so you don't
need to worry about the Windows Operating System details. It
Momma Bear
lets you set up a list of allowed programs. If enabled, only a
program in this list will be able to run on the computer. You can
easily stop games and other unwanted programs by not adding
them to the allowed programs list.
This software allows the parent to control all access to the
Net Nanny computer, not only Internet resources, but offline computer
usage as well.

MALAYSIAN INSTITUTE OF INFORMATION TECHNOLOGY


UNIVERSITY KUALA LUMPUR
PARENTAL CONTROL AND MONITORING SYSTEM (PCaMS™) 15

NetProtector is the only hardware solution on the market for


NetProtector locking out the Internet. You can determine whether or not your
child has access to the Internet. NetProtector claims to be the
simplest way for parents to lock out the Internet. No software to
install or update and easy to use key locking system.
SentryCam does not block or filter but does follow the child onto
the Internet and takes screen shots at timed intervals set by the
parents. It provides for easy review by the parent who is able to
SentryCam see exactly what activities the child experienced while in a chat
room or any other area of the Internet.
SmartAlex SmartAlex ICU monitors computer activity all the time, not only
during Internet sessions. Also good for employers who want to
keep tabs on how company computer time is being spent.
Surf Monkey is the safe and easy way for kids to learn and have
fun on the Internet. A web browser and online service designed
Surf Monkey
exclusively for kids, this installable CD-ROM houses the Surf
Monkey animated, talking monkey host. He transports kids into
the world of Internet exploration while offering tips and tricks
designed to entertain and amuse them during their journey.
SurfPass makes it possible to limit the duration of Internet use by
means of an account for each user, and even to keep detailed
SurfPass
activity logs. The software also allows screening of addresses
with a list of authorized or prohibited sites. The user and the
administrator are identified by means of a name and a password,
or a smartcard in the case of the SurfPass card option.
Webkeys Prowler is a free browser plug-in that enables families,
schools, libraries and businesses to control what is viewed on
WebKeys Prowler
their computers. The program is a Virtual V-Chip that
automatically detects adult content. The program is a small plug-
in for Microsoft Internet Explorer and does not affect any other
program.
WinGuardian watches over users of Windows 95 in two ways. It
can keep a log file of user visited web sites and it can also lock
Win Guardian
Windows 95 so that a user can only run and access programs
that an administrator authorizes. Free download available.

MALAYSIAN INSTITUTE OF INFORMATION TECHNOLOGY


UNIVERSITY KUALA LUMPUR
PARENTAL CONTROL AND MONITORING SYSTEM (PCaMS™) 16

2.4.1 Organizations in The United States

Organizations Service Description


CyberAngels is an all-volunteer Internet patrol
and monitoring project started by senior
members of the world famous "International
Cyber Angels
Alliance of Guardian Angels", whose HQ is in
New York City, whose mission is to be a
Cyberspace "Neighborhood Watch".
The advent of the Internet has seen a
staggering growth in the potential for the
freedom of speech and expression to people
throughout the world. Sadly, in some quarters,
this same freedom is being abused and used
Green Ribbon Campaign irresponsibly as a smoke screen to
communicate in a vulgar, profane, violent, and
insulting manner. The true right of free speech
is accurately carried out when self-restraint is
responsibly exercised. This Green Ribbon for
Responsibility in Free Speech is displayed on
web sites that agree with these principles.
This organization is working to create an

Safe Surf Internet Rating Standard which will allow web


browsers to detect the content of web sites
before displaying. They've got lots of great
information and a bunch of cool links too!
This is a volunteer organization, concentrating
Voter's Telecommunications Watch on legislation as it relates to
telecommunications and civil liberties.

MALAYSIAN INSTITUTE OF INFORMATION TECHNOLOGY


UNIVERSITY KUALA LUMPUR
PARENTAL CONTROL AND MONITORING SYSTEM (PCaMS™) 17

2.4.2 Organizations in Malaysia

2.4.2.1 CyberSecurity Malaysia

CyberSecurity Malaysia is positioned as the national cyber security specialist


under the Ministry of Science, Technology and Innovation (MOSTI). It runs the
Cyber999 Help Centre for Malaysian Internet users. It provides safety tips,
advisories, and specialized services in the fields of cyber security such as Digital
Forensics and Wireless Security. While CyberSAFE, short for Cyber Security
Awareness For Everyone, is CyberSecurity Malaysia’s initiative to educate and
enhance the awareness of the general public on the technological and social
issues facing internet users, particularly on the dangers of getting online.

2.4.2.2 Cyber999 Help Centre

Cyber999 encourage organizations and individuals to consult us on cyber


security incidents such as harassment and malware infections on their
computers.

• Advising Internet users on how to cope with cyber threats and deal with
safety issues.

• Provide specialised services to support the growth of digital forensics,


security management & best practices and cyber security products
evaluation based on international standards.

• Providing an evaluation facility for third party validation on quality and


reliability of Malaysian-made security products. This is important as it
ensures that Malaysian products get accepted globally.

MALAYSIAN INSTITUTE OF INFORMATION TECHNOLOGY


UNIVERSITY KUALA LUMPUR
PARENTAL CONTROL AND MONITORING SYSTEM (PCaMS™) 18

• Education, training and creating awareness in the area of cyber security.

• Working towards increasing the number of cyber security professionals.


We run a training centre and examination centre for many international
certifications.
We also develop educational content on cyber security suitable for
Internet users from different age groups ranging from students, office
workers to home users. We provide these downloads for free on our
website www.cybersecurity.my or through an independent awareness
Website, www.cybersafe.my

2.4.3 Net Nanny Specifications

2.4.3.1 Pictures, Forums and Blog

Parents now have the flexibility to restrict personal information your kids may
otherwise post online. With Net Nanny 6.5 you can now block image uploads
and/or choose to block them from posting to forums and blogs.

2.4.3.2 Keyword Blocking

Net Nanny 6.5 allows you to create a customized “black” list of terms and
phrases you don’t want your kids to see while online. Keyword filtering lets
parents decide if kids should see pages that contain specific words. You can
even customize this list for each individual user, giving you the flexibility and
control over the internet content your family can view.

MALAYSIAN INSTITUTE OF INFORMATION TECHNOLOGY


UNIVERSITY KUALA LUMPUR
PARENTAL CONTROL AND MONITORING SYSTEM (PCaMS™) 19

2.4.3.3 Blocks Pornography and Protects Families and Children

Much more important than how it works, is that you know that Net Nanny does
work. You have the peace of mind of knowing that you are protecting your
children and family with the best internet safety tools available. Net Nanny can
block not only pornography, but hate sites, questionable chat rooms and other
dangers of the Internet. You can configure Net Nanny to block online game and
gambling sites, and even make it so your children can only install and play
computer games with parental ratings that you deem appropriate. Net Nanny
even offers a simple, easy to use set-up assistant to help parents determine
what online activities (Web sites, chat, gaming and social networks) are
appropriate based on your family member’s age.

2.4.3.4 Remote Management

Net Nanny has enhanced its internet safety administration tools. Powerful
Remote Management tools exist to help parents to manage and maintain
Internet safety policies from any Internet connection. Net Nanny has also been
enhanced to synchronize your settings almost instantly. Monitor web browsing
and instant messaging- from anywhere!

Having worked directly with the Entertainment Software Rating Board (ESRB),
Net Nanny is the first parental control software solution to set age-based gaming
restrictions using the ESRB rating system and the first to block desktop PC
games based on categories, including violence, sex, alcohol, drugs and more.

MALAYSIAN INSTITUTE OF INFORMATION TECHNOLOGY


UNIVERSITY KUALA LUMPUR
PARENTAL CONTROL AND MONITORING SYSTEM (PCaMS™) 20

2.4.3.5 Instant Messaging Controls Screen

Net Nanny’s improved internet safety Message Monitor feature examines the
content of instant messages (IM) and alerts parents via e-mail of potential online
predatory, cyberbully and other inappropriate behaviour or comments made
through popular IM programs. Including both application and web-based IM
protocols like Facebook, MySpace, MSN, and Yahoo, Internet predators don't
have a chance against parents armed with Net Nanny.

2.4.3.6 Internet Use Time Controls

Net Nanny's time controls will help you control when your children can and
cannot use the Internet. Parents can use Net Nanny to not only limit how long
your kids spend on the Internet, but also during what time periods they can
access the Internet.

2.4.3.7 Integration with Popular Search Engines

The new Net Nanny integrates seamlessly with "Safe Search" options found in
popular search engines such as Google, Yahoo, Dogpile, AltaVista, Lycos,
AllTheWeb, and MSN. This means your children can't search on a search
engine and even see links to blocked sites. This new internet safety feature
enables better protection against pornographic images when doing an "image
only" search. If a child attempts to turn off the safe search capability from the
search engine, Net Nanny will turn it back on in real-time as the search is
occurring.

MALAYSIAN INSTITUTE OF INFORMATION TECHNOLOGY


UNIVERSITY KUALA LUMPUR
PARENTAL CONTROL AND MONITORING SYSTEM (PCaMS™) 21

The only way to bypass the safe search is with your unique administrator
password, which only you as the parent know. Believe it or not, Net Nanny
actually blocks content in multiple languages to provide even more internet
safety for your family. Net Nanny Software is More than Just Web Protection
Did you know that there are many ways your children can access pornography
and questionable content on the Internet? Net Nanny provides full internet safety
on not just the World Wide Web, but also less known but equally dangerous
parts of the Internet like the Usenet, Peer-to-Peer downloading networks, Chat
Rooms, Instant Messages, FTP, Forums and email. If you have never heard of
some of those areas of the Internet, it is possible that your kids have. But don't
worry. Net Nanny knows about them, and protects your children from the bad
content on them.

2.4.3.8 Filter Alerts on Your Cell Phone

Net Nanny Users are often on the go and unable to check their emails every
couple minutes. An alert letting you know that your child is attempting to view an
inappropriate website can now be sent to your cell phone (in addition to your
email). Cell phone alerts can be sent in real time, giving you the opportunity to
get involved. We've enhanced your email notifications to give you control of how
often you receive alerts. You can receive notifications in real time, hourly, daily,
or even weekly. Get set to receive cell phone alerts in just 2 easy steps.
Net Nanny permits parents to create a customized list of unacceptable or
acceptable Web sites. For example, parents could set up a list (white list) of
friendly sites that are always allowed and/or set up a list (black list) of
objectionable sites that are always blocked.

MALAYSIAN INSTITUTE OF INFORMATION TECHNOLOGY


UNIVERSITY KUALA LUMPUR
PARENTAL CONTROL AND MONITORING SYSTEM (PCaMS™) 22

CHAPTER III: METHODOLGY

3.1 Introduction

The approach by designing a conceptual framework of PCaMS™ is considered


as the most significant part of the project development. The chosen
methodology to develop the project is Prototyping Methodology. Throughout the
whole duration of the research, we have gone through each and every phases in
order to develop a system that can be used and benefits the targeted users.

3.2 Prototyping – based methodology

The prototyping methodology used usually when the business process is likely
to be changed as the project proceeds or when the project sponsor has little
idea of what system to be built. The Analysis, Design, and Implementation
phases performed concurrently and on each cycle resulting in
a system prototype that will be reviewed by the project sponsor. The cycle
repeated continually based on the sponsor comments until the prototype
successfully meets the requirements. The last prototype will then be called the
system. Prototyping development needs only initial basic analysis and design,
but as the result important system functions may not be recognized until
somewhere in the middle of project timeline. Thus there is a possibility to alter
the initial design decision and start all over again from the beginning. It can
delivers system quickly to users, though it not exactly meets the requirements.

MALAYSIAN INSTITUTE OF INFORMATION TECHNOLOGY


UNIVERSITY KUALA LUMPUR
PARENTAL CONTROL AND MONITORING SYSTEM (PCaMS™) 23

PLANNING

ANALYSIS

DESIGN DESIGN
PROTOTYPE IMPLEMENTATION

IMPLEMENTATION

SYSTEM

Figure 3.0: Prototyping – based Methodology

3.2.1 Briefly on different Phases:

3.2.1.1 Planning

Planning phase focused on planning the tasks that involved in the project. It has
detailed out the work schedule, duration for each task and resources allocated
for the whole project.

3.2.1.2 Analysis, Design and Implementation

Analysis phase focused on reviewing the previous similar project done by other
researcher using similar technique and approach to get the picture and
guidelines. We have recognized the problems that can be derived as rules. We
also look into the current business process to get the requirements and
analyzed it before start designing and developing the system proposed in the
project.

MALAYSIAN INSTITUTE OF INFORMATION TECHNOLOGY


UNIVERSITY KUALA LUMPUR
PARENTAL CONTROL AND MONITORING SYSTEM (PCaMS™) 24

3.2.1.3 Design Prototype

Designing phase focused on the designing the system that will solve all the
problems based on the dynamic scheduling algorithm we have developed in the
research. The produced design in this phase is basically using the Rule Based
Technique. We have modeled the rules that identified during the requirement
analysis phase using the problems and current business rules including the
process. The design also translated the functions into the system components.

3.2.1.3 Implementation

In this phase, development or implementation of the system started during this


phase. We have translated the modules identified in design phase into the
programming codes.

3.2.1.4 System

All the testing works followed by maintenance work are in the last phase of
system development. In this case, system should be developed to allow
changes that could happen during the implementation period.

3.3 Milestone and Timelines

In implementing IDS for home user, a very precise and proper planning has to
be carried out to ensure that the project will be success. In implementing this
project, certain configuration of planning and scheduling has to identify. The task
allocation, appropriate planning tools, task delegation and project costing were a

MALAYSIAN INSTITUTE OF INFORMATION TECHNOLOGY


UNIVERSITY KUALA LUMPUR
PARENTAL CONTROL AND MONITORING SYSTEM (PCaMS™) 25

part of project planning and scheduling element which is important to be taken


into a consideration before this project are implemented.

Therefore, a clear Gantt chart will indicate the list of tasks to be performed,
person who responsible in doing each task and to trace how many percent of
the task already complete.

Timeline
No Milestone Name Description
(Week)
1 1. Finding project partner
Planning
2. Information related to
• Group formation
FYP is explained 1-4
• FYP briefing
3. Finding project title and
• Finalizing title and supervisor
supervisor
2 Project Initiation 1. Collecting information

• Literature review and identifying 2. Setting a project scope 5-6


project scope

3 Project Feasibility 1. Clarifying problem


• Problem statements, statements, objectives,
objectives, purpose and purpose and limitation.
limitations 2. Researching for project
7-11
• Requirement specification and requirement specification
budget and producing budget
• Distinguish the appropriate
methodology
4 1. Reviewing all
Seminar 1
deliverables and
• Finalizing interim report
preparing the report 12-13
• Seminar 1 presentation
2. Project proposal
• Submission of interim report
presentation
5 Development Phase 1 1. Preparing for source
• Analysis and Designing code 14-25
Graphical User Interface.

MALAYSIAN INSTITUTE OF INFORMATION TECHNOLOGY


UNIVERSITY KUALA LUMPUR
PARENTAL CONTROL AND MONITORING SYSTEM (PCaMS™) 26

6 Development Phase 2 1. Record all results


• Fully running the prototype 2. Analysis of captured
• Problem encounter and data.
26-32
countermeasure. 3. Face the problem and
take immediate action to
solve the problem.
7 Project Finalization
1. Produce document on
• Finalizing the PCaMS™ at 33-36
result and conclusion
home
8 Seminar 2 1. Project presentation and
• Seminar 2 presentation demonstration
37-40
• Final draft of dissertation 2. Finalizing dissertation

• Submission of dissertation

Table 3.1: Milestones

MALAYSIAN INSTITUTE OF INFORMATION TECHNOLOGY


UNIVERSITY KUALA LUMPUR
PARENTAL CONTROL AND MONITORING SYSTEM (PCaMS™) 27

Figure 3.1: Project Research and Proposal Stage Gantt chart

MALAYSIAN INSTITUTE OF INFORMATION TECHNOLOGY


UNIVERSITY KUALA LUMPUR
PARENTAL CONTROL AND MONITORING SYSTEM (PCaMS™) 28

Figure 3.2: Project Development and Implementation Stage Gantt chart

MALAYSIAN INSTITUTE OF INFORMATION TECHNOLOGY


UNIVERSITY KUALA LUMPUR
PARENTAL CONTROL AND MONITORING SYSTEM (PCaMS ™) 29

3.4 Requirement specification

3.4.1 Hardware and software requirement

Features Specification

Operating System Windows XP Pro SP 3 or higher 32-bit version

Processor 1GHz or higher


RAM 1GB or higher

Table 3.3: Hardware list

NO TYPE
1 Windows XP Pro SP 3 or higher 32-bit version

2 Visual Basic 2008 Professional Edition

Table 3.4: Software list

3.4.2 End user system requirement and compatibility

To run PCaMS™, Windows XP / Vista / 7 systems and an administrative


account is needed. There are no special hardware or software requirements.

MALAYSIAN INSTITUTE OF INFORMATION TECHNOLOGY


UNIVERSITY KUALA LUMPUR
PARENTAL CONTROL AND MONITORING SYSTEM (PCaMS ™) 30

3.5 Costing

In order to purchase all equipments planning have been done before start
purchasing. It helps avoid from over budget. There are procedures to purchase
those equipments that had been planned to purchase.

3.5.1 Computer / Laptop: Hardware

NO TYPE QUANTITY PRICE / UNIT TOTAL


1 Central Processing Unit (CPU) 1 RM500.00 RM500.00

2 LCD Monitor 1 RM 300.00 RM 300.00

3 Keyboard 1 RM80.00 RM80.00

4 Mouse 1 RM30.00 RM30.00


TOTAL RM 910.00

Table 3.5: Costing for implementation (Hardware)

3.5.2 Computer / Laptop Software


NO TYPE QUANTITY PRICE / UNIT TOTAL
1 Windows XP Pro SP3 1 RM 478.00 RM 478.00

Visual Basic 2008


2 1 Personal Personal
Professional Edition
TOTAL RM 478.00

Table 3.6: Costing for implementation (Software)

3.5.3 Total Costing


NO TYPE TOTAL
1 Hardware RM 910.00

2 Software RM 478.00
TOTAL RM 1388.00

Table 3.7: Total Costing Hardware and Software

MALAYSIAN INSTITUTE OF INFORMATION TECHNOLOGY


UNIVERSITY KUALA LUMPUR
PARENTAL CONTROL AND MONITORING SYSTEM (PCaMS ™) 31

CHAPTER IV: PROTOTYPE/PRODUCT DEVELOPMENT

4.1 Introduction

From the methodology explained in the prior chapter, it can be simplified that
there were many aspects or parameters need to be defined and considered
before moving to the development stage.

i. Prototype Based on Wikipedia Web Encyclopedia:


Prototyping is the process of quickly putting together a working model (a
prototype) in order to test various aspects of a design, illustrate ideas or features
and gather early user feedback. Prototyping is often treated as an integral part
of the system design process, where it is believed to reduce project risk and
cost.

ii. Software Prototype Based on Wikipedia Web Encyclopedia:


Software prototyping refers to the activity of creating prototypes of software
applications, i.e., incomplete versions of the software program being developed.
It is an activity that occurs during certain software development and is
comparable to prototyping as known from other fields, such as mechanical
engineering or manufacturing. A prototype typically simulates only a few aspects
of the features of the eventual program, and may be completely different from
the eventual implementation.

MALAYSIAN INSTITUTE OF INFORMATION TECHNOLOGY


UNIVERSITY KUALA LUMPUR
PARENTAL CONTROL AND MONITORING SYSTEM (PCaMS ™) 32

4.2 Stages of development

4.2.1 Software Installation

The development of this project started with the installation some software into
the computer. The students had installed Microsoft Visual Basic 2008
Professional Edition (VB.Net 2008) as the main software to develop the
PCaMS™ application. As mention in the previous chapter, student chose this
software because it makes use of Graphical User Interface for creating the
applications. The Graphical User Interface enables users to interact with the
application. This feature makes it easier to comprehend things in a quicker and
easier way.

4.2.2 Process of Developing and Coding

Begin with creating the main interface, and then continue to the development of
each module in PCaMs™. All figures below show the PCaMS™ GUI for each
module that has been developed. The student should explore and get close with
the function in Microsoft Visual Basic 2008 Professional Edition such as method
and class because both function will be used in the next stage of coding
development.

A method is a procedure built into the class. They are a series of statements that
are executed when called. Methods allow us to handle code in a simple and
organized fashion. There are two types of methods in VB.NET: those that return
a value (Functions) and those that do not return a value (Sub Procedures).

A class means collection of methods or functions. Method or function accepts


parameters; process set of codes which have written in the module or function
and returns the output to the caller.

MALAYSIAN INSTITUTE OF INFORMATION TECHNOLOGY


UNIVERSITY KUALA LUMPUR
PARENTAL CON
NTROL AND MO
ONITORING SY
YSTEM (PCaMS
S ™) 33

4
4.2.2.1 Cre
eating the project
p

Figure 4.1: Create


e a new Wind
dows Forms Application
A

ws forms application. So to deve


PCaMS™ is a window elop PCaMS
S™ we nee
ed to
s
start with create
c a windows
w forrms applica
ation in Miccrosoft Vissual Basic 2008
Professiona
al Edition.

MAL
LAYSIAN INSTIITUTE OF INFO
ORMATION TEC
CHNOLOGY
UNIVVERSITY KUALLA LUMPUR
PARENTAL CONTROL AND MONITORING SYSTEM (PCaMS ™) 34

4.2.2.2 Contains of the PCaMs™

Figure 4.2: Contains of PCaMs™

The project container has three main 3 main vb project PCaMS,


IEHistoryViewer, Shutdown Timer:

• PCaMS is the main vb project. In PCaMS there have 5 windows forms


application, addHost.vb, DeleteHost.vb, Login.vb, MainPCaMS.vb,
PCaMSmsgbox.vb. MainPCaMS.vb main interface of PCaMs™.

• IEHistoryViewer is one of the PCaMS™ feature. In IEHistoryViewer


there have an IEHistoryViewerUI.cs (windows forms Application) and
IEHistoryViewer.cs.

• Shutdown Timer is also the feature of PCaMs™. It contains main.vb as


its main interface.

MALAYSIAN INSTITUTE OF INFORMATION TECHNOLOGY


UNIVERSITY KUALA LUMPUR
PARENTAL CONTROL AND MONITORING SYSTEM (PCaMS ™) 35

4.3 Design a Graphical User Interface

Figure 4.3: PCaMS™ Login Interface

Figure 4.3 above shows the login interface of PCaMs™. It is the first interface
appears before main page. This is for security purpose. The username and
password was set by students. If anything problem or forgot your username and
password you need to contact PCaMS™ student.

MALAYSIAN INSTITUTE OF INFORMATION TECHNOLOGY


UNIVERSITY KUALA LUMPUR
PARENTAL CON
NTROL AND MO
ONITORING SY
YSTEM (PCaMS
S ™) 36

Figure 4.4: PCaMS™ Main Interfacce

Figure 4.4 shows the


e main inte
erface of PC
CaMs™. The
T main in
nterface co
ontain
button six different
d butttons used to call othe
er form.

HOM
ME ( PCaMS / MainPCaM
MS.vb )

ADD
D ( PCaMS / AddHost.vb)
A

DEL
LETE (PCaMS
S / DeleteHosst.vb )

HIST
TORY ( IEHisstoryViewer / IEHistoryView
werUI.cs )

TIMER ( Shutdow
wnTimer / Ma
ain.vb )

HEL
LP ( PCaMS™
™ v1.0 User Guide.pdf
G )

Ta
Table 4.1: Legends of PCaM
MS™ Main In
nterface

MAL
LAYSIAN INSTIITUTE OF INFO
ORMATION TEC
CHNOLOGY
UNIVVERSITY KUALLA LUMPUR
PARENTAL CONTROL AND MONITORING SYSTEM (PCaMS ™) 37

A textbox to add
website to block

Figure 4.5: PCaMS™ AddHost Interface

Figure 4.5 shows the interface of block unwanted website. Student creates a
textbox to help user easy to enter their unwanted website. The PCaMS™ use
hosts file technology to block the website.

i. From Wikipedia, the free encyclopedia


The hosts file is a computer file used in an operating system to map hostnames
to IP addresses. The hosts file is a plain-text file and is traditionally named
hosts.

MALAYSIAN INSTITUTE OF INFORMATION TECHNOLOGY


UNIVERSITY KUALA LUMPUR
PARENTAL CONTROL AND MONITORING SYSTEM (PCaMS ™) 38

List of Blocked
Website

Figure 4.6: PCaMS™ DeleteHost Interface

Figure 4.7: PCaMS™ Warning Message Box

Figure 4.6 shows the interface to delete the website. Student creates a textbox
to call the hosts file to show the list of blocked website. Example of blocked
website:
127.0.0.1 www.facebook.com
127.0.0.1 www.friendster.com
The warning will appear to remind the user to read the user guide first before
delete the website as shown as in figure 4.7.

MALAYSIAN INSTITUTE OF INFORMATION TECHNOLOGY


UNIVERSITY KUALA LUMPUR
PARENTAL CONTROL AND MONITORING SYSTEM (PCaMS ™) 39

List of
visited URL

Preview Box

Figure 4.8: PCaMS™ Internet Explorer History Viewer

In figure 4.8 shows the list of visited URL. In PCaMS™ it only captures the
history from Internet Explorer only. The visited URL viewed in the right side of
the interface. Student creates a small preview box to fast preview of the history.
You also can delete the history by push the Delete button at the interface. The
Refresh button is to refresh the URL list.

MALAYSIAN INSTITUTE OF INFORMATION TECHNOLOGY


UNIVERSITY KUALA LUMPUR
PARENTAL CONTROL AND MONITORING SYSTEM (PCaMS ™) 40

Figure 4.9: PCaMS™ Auto Shutdown Interface

Figure 4.10: PCaMS™ Taskbar Notifier

Figure 4.9 shows the interface to set the time to auto shutdown the pc. Student
creates a choice either you can shutdown the computer at a specific time or you
can shutdown the computer in countdown time mode.

MALAYSIAN INSTITUTE OF INFORMATION TECHNOLOGY


UNIVERSITY KUALA LUMPUR
PARENTAL CONTROL AND MONITORING SYSTEM (PCaMS ™) 41

In PCaMS™ it not only shutdown but student also creates another features such
as log off, reboot and hibernate. When the timer was running, the taskbar notifier
will appear on the right bottom side of your screen to alert the user to save their
work before the computer go to shutdown. Figure 4.10 shows the example of
taskbar notifier.

MALAYSIAN INSTITUTE OF INFORMATION TECHNOLOGY


UNIVERSITY KUALA LUMPUR
PARENTAL CONTROL AND MONITORING SYSTEM (PCaMS ™) 42

4.4 Complete Prototype

4.4.1 Use-case diagram

Use Case diagrams show the various activities the users can perform on the
PCaMS™. In this section use-case diagram consist of the general use-case
diagram.

Start Application

Login

View History
Admin
(Parents)
Delete History

Preview Thumbnails

Block Websites

Set Auto-Shutdown Timer

Exit Application

Figure 4.11: PCaMS™ Use-case diagram for admin (parents)

Above, Figure 4.0 is the general Use Case diagram of the PCaMS™. It shows
the interaction between user (parents) and the system. There are eight use
cases involved which are Start Application, Login, View History, Delete History,
Preview Thumbnails, Block Websites, Set Auto-Shutdown Timer and Exit
Application. When user wants to start the application, the user needs to Login.

MALAYSIAN INSTITUTE OF INFORMATION TECHNOLOGY


UNIVERSITY KUALA LUMPUR
PARENTAL CONTROL AND MONITORING SYSTEM (PCaMS ™) 43

CHAPTER V: TESTING AND RESULT

This chapter will represent the various testing where all compulsory and
applicable testing mechanism is applied on. The testing and results phase can
be initiated properly to test the project functionality. This testing is inevitable to
make sure that the application is error free and reaches the quality standard
required and also meet the objectives. This prototype later has been tested and
evaluated on its usage on personnel computer or PC.

5.1 Stage of Testing

Project Functionality Usability


Testing Testing

Figure 5.1: Parts of testing

Student divides testing into two parts. First to test the project functionality and
for the second part is usability testing. The objective of this stage is to ensure all
the systems are running successfully according to the objectives. Usability
testing is a technique used to evaluate a product by testing it on users. The aim
is to observe people using the product to discover errors and areas of
improvement.

5.2 Project Functionality Testing

Student need to test every single form before running the fully system. This is
because to avoid major error in the system.

MALAYSIAN INSTITUTE OF INFORMATION TECHNOLOGY


UNIVERSITY KUALA LUMPUR
PARENTAL CONTROL AND MONITORING SYSTEM (PCaMS ™) 44

5.2.1 Add website to block

When user enters a website in a textbox at PCaMS™ AddHost Interface it


should deny the access to reach the website. It is because the hosts file
converts the ip address of the website to the localhost ip address. The output
should show like in the figure below.

Figure 5.2: Before add the website to PCaMS™

Figure 5.3: The result after add the website to block

MALAYSIAN INSTITUTE OF INFORMATION TECHNOLOGY


UNIVERSITY KUALA LUMPUR
PARENTAL CONTROL AND MONITORING SYSTEM (PCaMS ™) 45

5.2.2 Enable the blocked website

When user adds a website at PCaMS™ AddHost Interface user cannot reach to
the website. To enable the blocked website, user needs to delete the URL that
they have entered before. The output should be as shown as in figure 5.4. After
select the URL to delete user need to hit the delete button at keyboard and click
save button at interface to enable the website back.

Figure 5.4: Show the selected URL to delete.

MALAYSIAN INSTITUTE OF INFORMATION TECHNOLOGY


UNIVERSITY KUALA LUMPUR
PARENTAL CONTROL AND MONITORING SYSTEM (PCaMS ™) 46

5.2.3 IE History Viewer

The PCaMS™ Internet History Viewer can show the visited URL from Internet
Explorer. In PCaMS™ Internet History Viewer interface there have four buttons.
Home, Refresh, Preview, Delete. The output will show the visited URL form
Internet Explorer history. During testing this part, student faces a problem. The
PCaMS™ interface not show the latest visited URL. Student fined a solution to
delete the Internet Explorer History. Then student creates the batch file to clear
all the cookies and history. This is the command to delete the cookies and
history.
RunDll32.exe InetCpl.cpl,ClearMyTracksByProcess 255

MALAYSIAN INSTITUTE OF INFORMATION TECHNOLOGY


UNIVERSITY KUALA LUMPUR
PARENTAL CONTROL AND MONITORING SYSTEM (PCaMS ™) 47

5.2.4 Shutdown timer

When testing on the PCaMS™ Auto Shutdown there no major problem that
student was faced. Student has tested the timer. For the testing purpose,
student set the time to Log Off the PC in 1 minute (countdown time mode).In
figure 5.5 show the setting.

Figure 5.5: Setting to Log Off the PC in 1 minute.

When the user start the timer by push the button OK, the timer will start and
taskbar notifier will popup to alert the user as shown in figure 5.6.

Figure 5.6: Taskbar Notifier

MALAYSIAN INSTITUTE OF INFORMATION TECHNOLOGY


UNIVERSITY KUALA LUMPUR
PARENTAL CONTROL AND MONITORING SYSTEM (PCaMS ™) 48

5.3 Usability Testing

Usability testing is a technique used to evaluate a product by testing it on users.


The aim is to observe people using the product to discover errors and areas of
improvement. To implement the usability testing student has chosen the target
respondent were parents at Selangor and Kuala Lumpur. The reason of
choosing these respondents is to get a different feedback from them and to test
whether this application can be used by any type of age, background and
profession.

5.3.1 Usability Testing Implementation

The student will give a short brief before the respondents before they sit for the
usability testing. The respondents were further informed about the aim of the
test and their rights. They have been told that the testing is done to test the
prototype usability.

The test was conduct on one-to-one basis. The respondent will perform
benchmark tasks by referring the questionnaire, it is important to clarify on the
general aspects of their basic knowledge on other parental control software, how
useful and easy to use the system will be for the respondents.

5.3.2 Questionnaire

The respondents need to answer the questionnaire. This technique is intended


to capture what the respondent’s option and how to improve it in the future
reference. The student need to seat a far from respondent to eliminate biases
during testing or answer the questionnaire.

MALAYSIAN INSTITUTE OF INFORMATION TECHNOLOGY


UNIVERSITY KUALA LUMPUR
PARENTAL CONTROL AND MONITORING SYSTEM (PCaMS ™) 49

5.4 Usability Testing Result and Analysis

The result of usability test is based from questionnaire. These will show the
parent’s concern about their children online behavior, ease of use of PCaMS™
and issues of PCaMS™.

5.4.1 Parent’s concern

Do you concern about your children online behavior?

Figure 5.7: Chart show how parents concern about their children online behavior

Based on figure 5.7, 84% of the respondents really concern about their children
online behavior. While another 12%, they not sure they really should know what
their children do while online.

MALAYSIAN INSTITUTE OF INFORMATION TECHNOLOGY


UNIVERSITY KUALA LUMPUR
PARENTAL CONTROL AND MONITORING SYSTEM (PCaMS ™) 50

5.4.2 Ease of Use

Do you think that PCaMS™ is easy to use?

Figure 5.7: Chart show ease of use of PCaMS™

Based on the graph in Figure 5.7, the student knows that the PCaMS™ is easy
to use and the level of difficulties of the system is near to the ground. It is proved
by the graph that almost 80% of the respondents agree.

MALAYSIAN INSTITUTE OF INFORMATION TECHNOLOGY


UNIVERSITY KUALA LUMPUR
PARENTAL CONTROL AND MONITORING SYSTEM (PCaMS ™) 51

5.4.3 The issues of PCaMS™

Do you think that PCaMS™ can help you to monitor your children online behaviour?

Figure 5.8: Chart show the respond from PCaMS™ issue 1

Refer from figure 5.8, 90% from the respondents agree that PCaMS™ can help
they in monitor their children online behavior. From these result student knows
that the PCaMS™ managed to achieve the objective to reduce the online
harassment and cyber-bullying the kids.

MALAYSIAN INSTITUTE OF INFORMATION TECHNOLOGY


UNIVERSITY KUALA LUMPUR
PARENTAL CONTROL AND MONITORING SYSTEM (PCaMS ™) 52

CHAPTER VI: CONCLUSION AND RECOMMENDATIONS

6.1 Project Accomplished and Implementation

PCaMS™ has meets the entire basic objectives; particularly for this project and
the components of the application have been implemented. In addition, most of
the requirements have reached the target objective.

The project has researched the field has utilized the findings from this research
to ensure the application is successful. Implementing this project has given an
insight into managing a complex software project that spans over many
components and different technologies.

6.2 Conclusion

On the whole, PCaMS™ has meets the objectives, particularly for this project
and the components of the application have been implemented. Hence, most of
the requirements have reached the target objective.

Implementing this project has given an insight into managing a complex


software project that spans over many components and different technologies.
Particular knowledge was gained in the areas of Microsoft Visual Basic 2008
Professional Edition while developing this project. The capabilities to assist
students by producing fine and user friendly GUI of the PCaMS™ features.

From the analysis, it can be concluded that the basic aim and objectives of this
project to develop PCaMS™ was success and accepted by the respondents as
a user. It allow user to monitor their children aged 5 to 12 years old online

MALAYSIAN INSTITUTE OF INFORMATION TECHNOLOGY


UNIVERSITY KUALA LUMPUR
PARENTAL CONTROL AND MONITORING SYSTEM (PCaMS ™) 53

behavior. This mean the friendly environment have been fulfill the base on user
requirement. Developing the project maybe the most difficult and different to
experience but in the same time fun environment to explore. But it will give a
chance to explore our own potential, and to learn how to conduct real system
with the proper way of documentation and how to communicate with all type of
partner and handle all sorts of situation. This application is one way of learning
to enhance the new life style. Therefore, the project as a whole can be
considered valuable and can be commercialized.

6.3 Suggestion and recommendation

Although this system is function as expected and reached the basic goal, there
still some improvement on the information purposes which is to be more
effective and real.

This product has the potential for future development and research and
examines some ways in which this application could be extended in the future.
Other than that:

1. The system can work with any other operating system other than
Windows XP.
2. The system is compatible with other internet browser.
3. The system can notify and alert the user or admin by using email or
message notification(phone gateway)
4. Game and application alert and blocking
5. Content web filtering

MALAYSIAN INSTITUTE OF INFORMATION TECHNOLOGY


UNIVERSITY KUALA LUMPUR
PARENTAL CONTROL AND MONITORING SYSTEM (PCaMS ™) 54

REFERENCES

1. Nick Randolph, David Gardner (July 2008). Professional Visual Studio 2008

2. Visual Basic .NET Tutorial Retrieved from http://www.cs.iusb.edu / internship

/ papers / pmichelbrink / VisualStack.pdf Paul Michelbrink Jan 15, 2004

3. Alan Dennis, Barbara Haley Wixom & David Tegarden (2005). System

Analysis and Design with UML Version 2.0

4. Internet-filter-review.com. Net Nanny Parental Controls Review. Retrieved

from http://internet-filter-review.toptenreviews.com/netnanny-review.html

5. King, R. (1985). A Database Design Methodology and Tools for Information

Systems. ACM transaction on Office Information Systems. Vol. 3 Issue. 1,

pp. 2 – 21, 18 April 2009

6. Michele L. Ybarra, Kimberly J. Mitchell. (2005). CyberPsychology &

Behavior. Volume 8, Issue 5.

7. The Dangers of Online Social Networking (2011, April 13) Retrieved from

http://ofmeadowsbooksandcakes.blogspot.com/2011/04/dangers-of-online-

social-networking.html

8. Robert E. Freeman-longo. (2000) Sexual Addiction & Compulsivity: The

Journal of Treatment & Prevention. Volume 7, Issue 1 & 2, Pages 75 – 90.

9. Wikipedia, 2011, Social Network, http://en.wikipedia.org/wiki/Social_network,


26 April 2011

MALAYSIAN INSTITUTE OF INFORMATION TECHNOLOGY


UNIVERSITY KUALA LUMPUR
PARENTAL CONTROL AND MONITORING SYSTEM (PCaMS ™) 55

APPENDIX A: QUESTIONNAIRES

MALAYSIAN INSTITUTE OF INFORMATION TECHNOLOGY


UNIVERSITY KUALA LUMPUR
PARENTAL CONTROL AND MONITORING SYSTEM (PCaMS ™) 56

PARENTAL CONTROL SOFTWARE SURVEY

1. Do you concern about your children online behaviour?

o Yes
o No
o Not Sure

2. Do you know what your kids do or browse when they're online?

o Social Networking Sites


eg: Facebook.com
o Online Games
o Blogs
o Browse Randomly

3. How long your children do stays online?

o Less than 1 hour


o 2 to 3 hours
o More than 5 hours
o I have no idea

4. How much do you concern about your children online behaviour?

Rate: 1 (Very concern) to 5 (Not concern at all)


□ Very Easy
□ Easy
□ Moderate
□ Hard
□ Very Hard

5. Have you heard of any parental control software or internet filter software
products before?

o Yes
o No
o I think so

MALAYSIAN INSTITUTE OF INFORMATION TECHNOLOGY


UNIVERSITY KUALA LUMPUR
PARENTAL CONTROL AND MONITORING SYSTEM (PCaMS ™) 57

6. Do you feel you should keep a closer eye on what they are doing online?

o Yes
o No
o Maybe

7. Do you know what the purpose of the parental control software is?

o Yes
o No
o Not so sure

8. Will you give a try on the usage of the parental control software?

o Yes
o No

9. Any other comments?

_________________________________________________________________
_________________________________________________________________
_________________________________________________________________

MALAYSIAN INSTITUTE OF INFORMATION TECHNOLOGY


UNIVERSITY KUALA LUMPUR
PARENTAL CONTROL AND MONITORING SYSTEM (PCaMS ™) 58

PARENTAL CONTROL AND MONITORING SYSTEMS (PCAMS™) SURVEY

1. Do you think that PCaMS™ is easy to use?

Rate 1(Very Easy) – 5 (Very Hard):

□ Very Easy
□ Easy
□ Moderate
□ Hard
□ Very Hard

2. Do you think that PCaMS™ can help you to monitor your children online
behaviour?

o Yes
o No

3. Do you think that PCaMS™ will help to reduce the online harassment, cyber-
bullying among the kids?

o Yes
o No
o Maybe

4. Do you think PCaMS™ or any other parental control software should be use by
parents?

o Yes
o No

5. Do you think that PCaMS™ should be publicizes in Malaysia?

o Yes,if freeware
o No
o Maybe
o Others

MALAYSIAN INSTITUTE OF INFORMATION TECHNOLOGY


UNIVERSITY KUALA LUMPUR
PARENTAL CONTROL AND MONITORING SYSTEM (PCaMS ™) 59

6. Do you think PCaMS™should add more features?

o Content control
o Receive email alerts
o Receive mobile alerts
o Schedule Internet access
o Others

7. May we use your responses to tell others about PCaMS™?

o Yes
o No

8. Any other comments on PCaMS™?

_________________________________________________________________
_________________________________________________________________
_________________________________________________________________

MALAYSIAN INSTITUTE OF INFORMATION TECHNOLOGY


UNIVERSITY KUALA LUMPUR
PARENTAL CONTROL AND MONITORING SYSTEM (PCaMS ™) 60

APPENDIX B: SOURCE CODES

MALAYSIAN INSTITUTE OF INFORMATION TECHNOLOGY


UNIVERSITY KUALA LUMPUR
PARENTAL CONTROL AND MONITORING SYSTEM (PCaMS ™) 61

Login.vb

Public Class Login

Private Sub btnOK_Click_1(ByVal sender As System.Object, ByVal e As


System.EventArgs) Handles btnOK.Click
'Checks if the password is correct, also defines the password
If username.Text = "admin" And password.Text = "123456" Then
'where password.text is whatever you named your textbox.text
MsgBox("Correct") 'Exactly as it says, replace this with
whatever you want it to do.
Me.Hide()
MainPCaMS.Show()

Else
MsgBox("Incorrect") 'Exactly as it says, replace this with
whatever you want it to do
End If
End Sub

Private Sub btnCancel_Click_1(ByVal sender As System.Object, ByVal


e As System.EventArgs) Handles btnCancel.Click
Application.Exit()
End Sub
End Class

MALAYSIAN INSTITUTE OF INFORMATION TECHNOLOGY


UNIVERSITY KUALA LUMPUR
PARENTAL CONTROL AND MONITORING SYSTEM (PCaMS ™) 62

MainPCaMS.vb

Public Class MainPCaMS

Private Sub PictureBox6_Click(ByVal sender As System.Object, ByVal


e As System.EventArgs) Handles PictureBox6.Click
Dim shutdownTimer As New ShutdownTimer.Main()
shutdownTimer.Show()
Me.Hide()
NotifyIcon1.Visible = True

End Sub

Private Sub NotifyIcon1_MouseDoubleClick(ByVal sender As


System.Object, ByVal e As System.Windows.Forms.MouseEventArgs) Handles
NotifyIcon1.MouseDoubleClick
Me.Show()
NotifyIcon1.Visible = False

End Sub

Private Sub btnHistory_Click(ByVal sender As System.Object, ByVal e


As System.EventArgs) Handles btnHistory.Click
Dim history As New IEHistoryViewer.IEHistoryViewerUI()
history.Show()

End Sub

Private Sub ExitToolStripMenuItem_Click(ByVal sender As


System.Object, ByVal e As System.EventArgs) Handles
ExitToolStripMenuItem.Click
Me.Close()

End Sub

Private Sub HideToolStripMenuItem_Click(ByVal sender As


System.Object, ByVal e As System.EventArgs) Handles
HideToolStripMenuItem.Click
Me.Hide()

End Sub

Private Sub ShowToolStripMenuItem_Click(ByVal sender As


System.Object, ByVal e As System.EventArgs) Handles
ShowToolStripMenuItem.Click
Me.Show()

End Sub

Private Sub PictureBox4_Click(ByVal sender As System.Object, ByVal


e As System.EventArgs) Handles PictureBox4.Click
Dim proc As New Process()

MALAYSIAN INSTITUTE OF INFORMATION TECHNOLOGY


UNIVERSITY KUALA LUMPUR
PARENTAL CONTROL AND MONITORING SYSTEM (PCaMS ™) 63

With proc.StartInfo
.Arguments = "H:\Documents and Settings\m e i k a t o\My
Documents\Visual Studio 2008\Projects\Final_PCaMS_26032011\PCaMS™ v1.0
User Guide.pdf"
.UseShellExecute = True
.WindowStyle = ProcessWindowStyle.Maximized
.WorkingDirectory = "H:\Program Files\Adobe\Reader
9.0\Reader" '<----- Set Acrobat Install Path
.FileName = "AcroRd32.exe" '<----- Set Acrobat Exe Name

End With

proc.Start()
proc.Close()
proc.Dispose()
End Sub
End Class

MALAYSIAN INSTITUTE OF INFORMATION TECHNOLOGY


UNIVERSITY KUALA LUMPUR
PARENTAL CONTROL AND MONITORING SYSTEM (PCaMS ™) 64

AddHost.vb

Public Class AddHost

Private Sub PictureBox1_Click(ByVal sender As System.Object, ByVal


e As System.EventArgs) Handles PictureBox1.Click
Const mfileName As String =
"H:\windows\system32\drivers\etc\hosts"
Dim file As System.IO.StreamWriter
file = My.Computer.FileSystem. _
OpenTextFileWriter(mfileName, True)
file.Write("127.0.0.1 ", TextBox1.Text)
file.WriteLine(TextBox1.Text)
file.WriteLine()
file.Close()
TextBox1.Text = ""

End Sub

Private Sub PictureBox4_Click(ByVal sender As System.Object, ByVal


e As System.EventArgs) Handles PictureBox4.Click
Me.Close()
MainPCaMS.Show()

End Sub

End Class

MALAYSIAN INSTITUTE OF INFORMATION TECHNOLOGY


UNIVERSITY KUALA LUMPUR
PARENTAL CONTROL AND MONITORING SYSTEM (PCaMS ™) 65

DeleteHost.vb

Imports System.IO
Public Class DeleteHost
Public Function GetFileContents(ByVal FullPath As String, _
Optional ByRef ErrInfo As String = "") As String

Dim strContents As String


Dim objReader As StreamReader
Try

objReader = New StreamReader(FullPath)


strContents = objReader.ReadToEnd()
objReader.Close()
Return strContents
Catch Ex As Exception
ErrInfo = Ex.Message
End Try
End Function

Public Function SaveTextToFile(ByVal strData As String, _


ByVal FullPath As String, _
Optional ByVal ErrInfo As String = "") As Boolean

Dim Contents As String


Dim bAns As Boolean = False
Dim objReader As StreamWriter
Try

objReader = New StreamWriter(FullPath)


objReader.Write(strData)
objReader.Close()
bAns = True
Catch Ex As Exception
ErrInfo = Ex.Message

End Try
Return bAns
End Function

Private Sub PictureBox2_Click(ByVal sender As System.Object, ByVal


e As System.EventArgs) Handles PictureBox2.Click
TextBox1.Text =
GetFileContents("H:\windows\system32\drivers\etc\hosts")
End Sub

Private Sub PictureBox1_Click(ByVal sender As System.Object, ByVal


e As System.EventArgs) Handles PictureBox1.Click
SaveTextToFile(TextBox1.Text,
"H:\windows\system32\drivers\etc\hosts")
End Sub End Class

MALAYSIAN INSTITUTE OF INFORMATION TECHNOLOGY


UNIVERSITY KUALA LUMPUR
PARENTAL CONTROL AND MONITORING SYSTEM (PCaMS ™) 66

Main.vb (Shutdown Timer)

Imports System.ServiceProcess
Imports System.Threading
Imports System
Imports System.Drawing
Imports System.Collections
Imports System.ComponentModel
Imports System.Windows.Forms

Public Class Main

Inherits System.Windows.Forms.Form

Dim PopHide As Boolean = False


Dim Notify As Boolean = False
Private WithEvents taskbarNotifier1 As TaskBarNotifier
Dim hours, mins, seconds As Integer
Dim setHours, setMins As Integer

Private Sub Form1_Load(ByVal sender As System.Object, ByVal e As


System.EventArgs) Handles MyBase.Load

End Sub

Private Sub Timer1_Tick(ByVal sender As System.Object, ByVal e As


System.EventArgs) Handles Timer1.Tick
Timer1.Start()
lblTime.Text = Now.Day.ToString + "/" + Now.Month.ToString +
"/" + Now.Year.ToString + " " + _
formatTo2Digits(Now.Hour) + ":" +
formatTo2Digits(Now.Minute) + ":" + formatTo2Digits(Now.Second)

If rbtnAt.Checked = True Then


ShutdownAt()
ElseIf rbtnIn.Checked = True Then
ShutdownIn()
End If
End Sub

Private Declare Auto Function PlaySound Lib "winmm.dll" (ByVal


SoundName As String, _
ByVal hModule As Integer, ByVal dwFlags As Integer) As
Integer

Private Sub PlayNow()


Dim fileName As String = String.Concat(Application.StartupPath
+ "\shutdown.wav")

MALAYSIAN INSTITUTE OF INFORMATION TECHNOLOGY


UNIVERSITY KUALA LUMPUR
PARENTAL CONTROL AND MONITORING SYSTEM (PCaMS ™) 67

Const SND_FILENAME As Integer = &H20000


PlaySound(fileName, 0, SND_FILENAME)
End Sub

Private Sub ShutdownIn()

If hours > 0 Or mins > 0 Or seconds > 0 Then


If mins = 0 AndAlso hours > 0 Then _
mins = 59 : hours = hours - 1

If seconds = 0 AndAlso mins > 0 Then _


seconds = 60 : mins = mins - 1

seconds = seconds - 1
End If

lblShutdownType.Text = cbSelect.Text + " in"


lblTimeTo.Text = formatTo2Digits(hours) + ":" +
formatTo2Digits(mins) + ":" + formatTo2Digits(seconds)

If hours = 0 AndAlso mins = 0 AndAlso seconds < 60 Then


Dim remain As Integer = seconds
If PopHide = False Then showPopup(cbSelect.Text, remain)

If Notify = False Then


PlayNow()
Notify = True
End If
End If

If hours = 0 AndAlso mins = 0 AndAlso seconds = 0 Then


Me.Show()
Timer1.Stop()
Select Case cbSelect.SelectedIndex
Case 0
Me.Close()

WindowsController.ExitWindows(RestartOptions.LogOff, True)
Case 1
Me.Close()

WindowsController.ExitWindows(RestartOptions.PowerOff, True)
Case 2
Me.Close()

WindowsController.ExitWindows(RestartOptions.Reboot, True)
Case 3
Me.Close()

WindowsController.ExitWindows(RestartOptions.ShutDown, True)
Case 4
Me.Close()

WindowsController.ExitWindows(RestartOptions.Suspend, True)

MALAYSIAN INSTITUTE OF INFORMATION TECHNOLOGY


UNIVERSITY KUALA LUMPUR
PARENTAL CONTROL AND MONITORING SYSTEM (PCaMS ™) 68

Case 5
Me.Close()

WindowsController.ExitWindows(RestartOptions.Hibernate, True)
End Select
End If
End Sub

Private Function formatTo2Digits(ByVal Val As Integer) As String


Dim newVal As String
Dim len As Integer = Val.ToString.Length

If len = 1 Then
newVal = "0" + Val.ToString
Return newVal
Else
Return Val.ToString
End If
End Function

Private Sub ShutdownAt()


lblShutdownType.Text = cbSelect.Text + " at"
lblTimeTo.Text = formatTo2Digits(nudHours1.Value) + ":" +
formatTo2Digits(nudMin1.Value) + ":" + formatTo2Digits(0)
'special case of set min = 0 and one less is 59
Dim warningTime As Integer
If nudMin1.Value = 0 Then
warningTime = 59
Else
warningTime = nudMin1.Value - 1
End If

If String.Compare(Now.Hour.ToString, nudHours1.Value.ToString)
= 0 Then
If String.Compare(Now.Minute.ToString,
warningTime.ToString) = 0 Then
Dim remain As Integer = 60 - Now.Second
If PopHide = False Then showPopup(cbSelect.Text,
remain)
If Notify = False Then
PlayNow()
Notify = True
End If
End If
End If

If String.Compare(Now.Hour.ToString, nudHours1.Value.ToString)
= 0 Then
If String.Compare(Now.Minute.ToString,
nudMin1.Value.ToString) = 0 Then
Me.Show()
Timer1.Stop()

MALAYSIAN INSTITUTE OF INFORMATION TECHNOLOGY


UNIVERSITY KUALA LUMPUR
PARENTAL CONTROL AND MONITORING SYSTEM (PCaMS ™) 69

Select Case cbSelect.SelectedIndex


Case 0
Me.Close()

WindowsController.ExitWindows(RestartOptions.LogOff, True)
Case 1
Me.Close()

WindowsController.ExitWindows(RestartOptions.PowerOff, True)
Case 2
Me.Close()

WindowsController.ExitWindows(RestartOptions.Reboot, True)
Case 3
Me.Close()

WindowsController.ExitWindows(RestartOptions.ShutDown, True)
Case 4
Me.Close()

WindowsController.ExitWindows(RestartOptions.Suspend, True)
Case 5
Me.Close()

WindowsController.ExitWindows(RestartOptions.Hibernate, True)
End Select
End If
End If
End Sub

Private Sub Notifier_CloseButtonClick(ByVal sender As Object, ByVal


e As System.EventArgs) Handles taskbarNotifier1.CloseButtonClick
taskbarNotifier1.Hide()
PopHide = True
End Sub

Private Sub Notifier_TitleClick(ByVal sender As Object, ByVal e As


System.EventArgs) Handles taskbarNotifier1.TitleClick
Timer1.Stop()
End Sub

Private Sub Notifier_TextClick(ByVal sender As Object, ByVal e As


System.EventArgs) Handles taskbarNotifier1.TextClick
Timer1.Stop()
End Sub

Private Sub showPopup(ByVal shutDownType As String, ByVal remain As


Integer)
With taskbarNotifier1
.CloseButtonClickEnabled = True
.TitleClickEnabled = False
.TextClickEnabled = True
.DrawTextFocusRect = False
.KeepVisibleOnMouseOver = True

MALAYSIAN INSTITUTE OF INFORMATION TECHNOLOGY


UNIVERSITY KUALA LUMPUR
PARENTAL CONTROL AND MONITORING SYSTEM (PCaMS ™) 70

.ReShowOnMouseOver = True
.Show("Auto Shutdown Notice", "System " + shutDownType + "
in " + remain.ToString + " Seconds " & _
"Click on the box to HALT the process", 500, 3000, 500)
End With
End Sub

Private Sub cbSelect_SelectedIndexChanged(ByVal sender As


System.Object, ByVal e As System.EventArgs) Handles
cbSelect.SelectedIndexChanged
Timer1.Stop()
btnOK.Enabled = True
End Sub

Private Sub nudHours_ValueChanged(ByVal sender As System.Object,


ByVal e As System.EventArgs) Handles nudHours1.ValueChanged
Timer1.Stop()
If nudHours1.Value = nudHours1.Maximum Then
nudHours1.UpButton()
nudHours1.Value = nudHours1.Minimum + 1
End If

If nudHours1.Value = nudHours1.Minimum Then


nudHours1.DownButton()
nudHours1.Value = nudHours1.Maximum - 1
End If
If Not String.Compare(cbSelect.Text, "") = 0 Then
btnOK.Enabled = True
End If

End Sub

Private Sub nudMin_ValueChanged(ByVal sender As System.Object,


ByVal e As System.EventArgs) Handles nudMin1.ValueChanged
Timer1.Stop()
If nudMin1.Value = nudMin1.Maximum Then
nudMin1.UpButton()
nudMin1.Value = nudMin1.Minimum + 1
End If

If nudMin1.Value = nudMin1.Minimum Then


nudMin1.DownButton()
nudMin1.Value = nudMin1.Maximum - 1
End If
If Not String.Compare(cbSelect.Text, "") = 0 Then
btnOK.Enabled = True
End If
End Sub

Private Sub MenuItem3_Click(ByVal sender As System.Object, ByVal e


As System.EventArgs) Handles MenuItem3.Click
Timer1.Stop()
Application.Exit()

MALAYSIAN INSTITUTE OF INFORMATION TECHNOLOGY


UNIVERSITY KUALA LUMPUR
PARENTAL CONTROL AND MONITORING SYSTEM (PCaMS ™) 71

End Sub

Private Sub MenuItem2_Click(ByVal sender As System.Object, ByVal e


As System.EventArgs) Handles MenuItem2.Click
Me.Show()
WindowState = FormWindowState.Normal
Timer1.Stop()
End Sub

Private Sub MenuItem1_Click(ByVal sender As System.Object, ByVal e


As System.EventArgs) Handles MenuItem1.Click
Me.Show()
WindowState = FormWindowState.Normal
End Sub

Private Sub NotifyIcon1_DoubleClick(ByVal sender As Object, ByVal e


As System.EventArgs) Handles NotifyIcon1.DoubleClick
Me.Show()
WindowState = FormWindowState.Normal
End Sub

Private Sub nudHours2_ValueChanged(ByVal sender As System.Object,


ByVal e As System.EventArgs) Handles nudHours2.ValueChanged
Timer1.Stop()
If nudHours2.Value = nudHours2.Maximum Then
nudHours2.UpButton()
nudHours2.Value = nudHours2.Minimum + 1
End If

If nudHours2.Value = nudHours2.Minimum Then


nudHours2.DownButton()
nudHours2.Value = nudHours2.Maximum - 1
End If
If Not String.Compare(cbSelect.Text, "") = 0 Then
btnOK.Enabled = True
End If
End Sub

Private Sub nudMin2_ValueChanged(ByVal sender As System.Object,


ByVal e As System.EventArgs) Handles nudMin2.ValueChanged
Timer1.Stop()
If nudMin2.Value = nudMin2.Maximum Then
nudMin2.UpButton()
nudMin2.Value = nudMin2.Minimum + 1
End If

If nudMin2.Value = nudMin2.Minimum Then


nudMin2.DownButton()
nudMin2.Value = nudMin2.Maximum - 1
End If
If Not String.Compare(cbSelect.Text, "") = 0 Then
btnOK.Enabled = True
End If

MALAYSIAN INSTITUTE OF INFORMATION TECHNOLOGY


UNIVERSITY KUALA LUMPUR
PARENTAL CONTROL AND MONITORING SYSTEM (PCaMS ™) 72

End Sub

Private Sub rbtnAt_CheckedChanged(ByVal sender As System.Object,


ByVal e As System.EventArgs) Handles rbtnAt.CheckedChanged
nudHours1.Enabled = True
nudMin1.Enabled = True
nudHours2.Enabled = False
nudMin2.Enabled = False
Timer1.Stop()
If Not String.Compare(cbSelect.Text, "") = 0 Then
btnOK.Enabled = True
End If
End Sub

Private Sub rbtnIn_CheckedChanged(ByVal sender As System.Object,


ByVal e As System.EventArgs) Handles rbtnIn.CheckedChanged
nudHours1.Enabled = False
nudMin1.Enabled = False
nudHours2.Enabled = True
nudMin2.Enabled = True
Timer1.Stop()
If Not String.Compare(cbSelect.Text, "") = 0 Then
btnOK.Enabled = True
End If
End Sub

Private Sub btnOK_Click(ByVal sender As System.Object, ByVal e As


System.EventArgs) Handles btnOK.Click
Timer1.Enabled = True
Timer1.Start()
Notify = False
lblTime.Visible = True
lblTime.Visible = True
setHours = nudHours2.Value
setMins = nudMin2.Value

hours = setHours
mins = setMins
If nudHours2.Value = 0 AndAlso nudMin2.Value = 0 Then
seconds = 60
Else
seconds = 0
End If
btnOK.Enabled = False
End Sub

Private Sub btnCancel_Click(ByVal sender As System.Object, ByVal e


As System.EventArgs) Handles btnCancel.Click
Timer1.Stop()
End Sub

Private Sub btnHide_Click(ByVal sender As System.Object, ByVal e As


System.EventArgs) Handles btnHide.Click
Me.Hide()

MALAYSIAN INSTITUTE OF INFORMATION TECHNOLOGY


UNIVERSITY KUALA LUMPUR
PARENTAL CONTROL AND MONITORING SYSTEM (PCaMS ™) 73

APPENDIX C: BROCHURE

MALAYSIAN INSTITUTE OF INFORMATION TECHNOLOGY


UNIVERSITY KUALA LUMPUR
PARENTAL CONTROL AND MONITORING SYSTEM (PCaMS ™) 74

MALAYSIAN INSTITUTE OF INFORMATION TECHNOLOGY


UNIVERSITY KUALA LUMPUR
PARENTAL CONTROL AND MONITORING SYSTEM (PCaMS ™) 75

MALAYSIAN INSTITUTE OF INFORMATION TECHNOLOGY


UNIVERSITY KUALA LUMPUR
PARENTAL CONTROL AND MONITORING SYSTEM (PCaMS ™) 76

APPENDIX D: POSTER

MALAYSIAN INSTITUTE OF INFORMATION TECHNOLOGY


UNIVERSITY KUALA LUMPUR
PARENTAL CONTROL AND MONITORING SYSTEM (PCaMS ™) 77

MALAYSIAN INSTITUTE OF INFORMATION TECHNOLOGY


UNIVERSITY KUALA LUMPUR

S-ar putea să vă placă și