Thanks to visit codestin.com
Credit goes to www.scribd.com

0% found this document useful (0 votes)
19 views2 pages

Report

Uploaded by

naazsaayma
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
19 views2 pages

Report

Uploaded by

naazsaayma
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 2

Plagiarism and AI Content Detection Report

New Scans 5:48 PM

Scan details

Scan Time: Total Pages: Total Words:


November 12th, 2024 at 17:48 UTC 2 392

Plagiarism Detection AI Content Detection

Types of plagiarism Words Text coverage Words

Identical 0% 0 AI text 0% 0
0% Minor Changes 0% 0 0% Human text 100% 392
Paraphrased 0% 0
Omitted Words 0% 0 Learn more

Plagiarism Results: No results found!

Certified by About this report copyleaks.com


help.copyleaks.com
Plagiarism match types: Identical Minor Changes Paraphrased Omitted Words Learn more

Plagiarism Report Content

INTRODUCTION

The internet is increasingly being accessed by children for several purposes, including education,
entertainment and social interactions. With this, the risks to their safety in the online environment have also
increased. Children can come across risks as they can get access to inappropriate content, get into
cyberbullying problems, communicate with online predators and also may get addicted to digital usage. To
counter these problems, many technological safeguards such as age verification systems and parental
controls have been introduced that try to reduce child’s exposure to harmful content and provide control
mechanisms to parents about their children’s activities in the online world respectively. Despite their wide use
there are still questions on how effective these tools are for child protection? This research will discuss the
roles of these technology based mechanisms in ensuring child safety along with their shortcomings and
recommendations for areas needing improvement.

HYPOTHESIS

The hypothesis for this study is that age verification and parental control technologies are capable of
providing protection to children online, but often do not due to technological limitations, user compliance and
non-use issues, and the evolving nature of threats online.

REVIEW OF LITERATURE

Various works have been done considering age prominence as well as monitoring and control technologies in
protecting children. In a survey conducted by the European Commission (2014), the authors noted the
importance of having strict age verification processes with an emphasis on banning the publication of
information to adults on certain sites, but mentioned that the current approaches – self-declaration – are
easily circumvented. Livingstone et al. (2017) developed and explored a number of parental first hand
computer control programs examining their adequacy on the screen time, type of content or contact children
may have on the internet. Still, the literature puts emphasis in many areas that concerns parental controls
being useful in blocking particular forms of access of contents, however they note the controls do not
mitigate other risks children face while they are online, specifically social network issues or bullying.
Furthermore, a study by McKenna et al. (2019) points to parental mediation as part of a larger paradigm that
includes technology as a determinative factor for safeguarding children online. In spite of these revelations,
there still lacks a purposeful assessment of how these technologies measure up to various online contexts
with particular reference to the users’ views and practical issues.

You might also like