Know and understand risks of using the internet including inappropriate and criminal material, restricting data through parental, educational and ISP control

Published by Patrick Mutisya · 14 days ago

Topic 10 – Communication

Objective

Know and understand the risks of using the Internet, including exposure to inappropriate and criminal material, and the ways data can be restricted through parental, educational and ISP controls.

1. Risks of Using the Internet

  • Inappropriate Content

    • Violent or graphic material
    • Adult/sexual content
    • Extremist or hate‑speech material

  • Criminal Activity

    • Online fraud and scams (e.g., phishing, fake shopping sites)
    • Identity theft and data harvesting
    • Hacking, malware distribution and ransomware
    • Cyber‑bullying and harassment

  • Privacy Risks

    • Unintended sharing of personal information
    • Tracking through cookies and third‑party services
    • Location data exposure

  • Technical Risks

    • Viruses, worms and trojan horses
    • Denial‑of‑service attacks (DoS) affecting services
    • Unreliable or insecure Wi‑Fi networks

2. Impact of Risks

  1. Legal consequences for individuals and organisations.
  2. Financial loss through fraud, ransomware payments or data breach remediation.
  3. Emotional and psychological harm, especially for young users.
  4. Damage to reputation and loss of trust.

3. Controlling Access to Internet Content

3.1 Parental Controls

  • Software filters installed on home computers or mobile devices.
  • Router‑level blocking of categories (e.g., adult, gambling).
  • Time‑based access restrictions (e.g., no internet after 9 pm).
  • Monitoring tools that log visited sites and usage duration.

3.2 Educational Controls (Schools & Colleges)

  • Network firewalls with content‑filtering policies.
  • Whitelist/blacklist of URLs relevant to the curriculum.
  • Safe browsing settings on browsers (e.g., Google SafeSearch).
  • Acceptable Use Policies (AUP) signed by students and parents.
  • Regular digital‑citizenship lessons and awareness campaigns.

3.3 ISP Controls

  • Default safe‑search and content‑blocking for under‑18 accounts.
  • Age‑verification gateways for adult‑content sites.
  • National or regional filtering schemes (e.g., UK’s “Family Filter”).
  • Provision of parental‑control tools as part of the service package.

4. Summary Table – Risks vs. Controls

Risk CategoryTypical ExamplesControl MethodResponsible Party
Inappropriate ContentAdult sites, violent videos, extremist propagandaContent‑filtering software, DNS blocking, age‑verificationParents, Schools, ISP
Online Fraud & PhishingFake bank emails, counterfeit online storesEmail spam filters, anti‑phishing toolbars, user educationUsers, Educational staff, ISP security services
Malware & RansomwareTrojan downloads, malicious attachmentsAntivirus programs, regular updates, restricted admin rightsParents, School IT department, ISP (network monitoring)
Privacy BreachesData harvesting via cookies, location trackingBrowser privacy settings, VPN use, cookie consent managementUsers, Educational policy makers, ISP (transparent data policies)
Cyber‑bullyingHarassing messages, social‑media abuseMonitoring tools, reporting mechanisms, digital‑citizenship lessonsParents, School staff, Platform providers

5. Legal and Ethical Frameworks (Brief Overview)

  • UK: Digital Economy Act 2017 – age‑verification for adult content.
  • USA: Children’s Online Privacy Protection Act (COPPA) – parental consent for data collection.
  • International: General Data Protection Regulation (GDPR) – rights to data access and erasure.
  • School policies often reference the UN Convention on the Rights of the Child regarding safe online environments.

6. Practical Activities for Learners

  1. Research and present a short report on a recent high‑profile cyber‑crime case.
  2. Set up a parental‑control filter on a home router and document the steps.
  3. Create an “Acceptable Use Policy” draft for a school computer lab.
  4. Simulate a phishing email and discuss how to identify red flags.

Suggested diagram: Flowchart showing how parental, educational and ISP controls interact to filter internet content.