Open main menu
Home
Random
Recent changes
Special pages
Community portal
Preferences
About Wikipedia
Disclaimers
Incubator escapee wiki
Search
User menu
Talk
Dark mode
Contributions
Create account
Log in
Editing
Parental controls
Warning:
You are not logged in. Your IP address will be publicly visible if you make any edits. If you
log in
or
create an account
, your edits will be attributed to your username, along with other benefits.
Anti-spam check. Do
not
fill this in!
{{Short description|Software feature allowing content filtering}} {{About|parental controls in general|the software included with Windows Vista and Windows 7|Windows Parental Controls}} {{Use dmy dates|date=April 2024}} [[File:TimeKpr.png|TimeKpr, a [[Linux]] app controlling how long the computer can be used per day.|alt=TimeKpr|thumb]] '''Parental controls''' are features which may be included in [[digital television]] services, [[Video game|computers and video games]], [[mobile devices]] and [[software]] to assist [[parents]] in their ability to restrict certain content viewable by their [[children]].<ref>{{Cite web|url=https://www.techopedia.com/definition/4999/parental-control-software|title=What is Parental Control Software? - Definition from Techopedia|website=Techopedia.com|date=26 September 2012 |language=en|access-date=2019-10-08}}</ref> This may be content they deem inappropriate for their age, maturity level or feel is aimed more at an adult audience.<ref>{{Cite news |title=Inappropriate content: protecting your child {{!}} Internet Matters |language=en-GB |work=[[Internet Matters]] |url=https://www.internetmatters.org/issues/inappropriate-content/ |access-date=2017-09-03}}</ref> Parental controls fall into roughly four categories: ''[[Content-control software|content filters]]'', which limit access to [[age appropriate|age inappropriate]] content; ''usage controls'', which constrain the usage of these devices such as placing time-limits on usage or forbidding certain types of usage; ''computer usage management tools'', which enforces the use of certain software; and ''[[System monitoring|monitoring]]'', which can track location and activity when using the devices.<ref>{{cite web|first1=Diana|last1=Baumrind|title=Effects of authoritative parental control on child behavior|url=http://persweb.wabash.edu/facstaff/hortonr/articles%20for%20class/baumrind.pdf|publisher=University of California|access-date=7 November 2013|archive-url=https://web.archive.org/web/20161130144949/http://persweb.wabash.edu/facstaff/hortonr/articles%20for%20class/baumrind.pdf|archive-date=30 November 2016|url-status=dead}}</ref> <!-- (Commenting this out until someone can make it make sense. If that's you, thank you.) Another feature of parental controls is the ability to block rating.{{clarification needed|date=June 2018}} In the United States, its usage is known as [[Parental Advisory]], TV-MA for television, R and NC-17 for [[Motion Picture Association of America|MPAA]], and M and AO for [[Entertainment Software Rating Board|ESRB]]. --> Content filters were the first popular type of parental controls to limit access to [[Internet]] content. [[Television station]]s also began to introduce [[V-Chip]] technology to limit access to television content. Modern usage controls are able to restrict a range of explicit content such as explicit songs and movies. They are also able to turn devices off during specific times of the day, limiting the volume output of devices, and with [[GPS]] technology becoming affordable, it is now possible to easily locate devices such as mobile phones. UNICEF emphases the responsibility of parents and teachers in this role.<ref>[https://www.ohchr.org/en/documents/general-comments-and-recommendations/general-comment-no-25-2021-childrens-rights-relation2 General comment no:25 2021. Children's rights] ohchr.org {{Dead url|date=January 2024}}</ref> The demand for parental control methods that restrict content has increased over the decades due to the rising availability of the Internet. A 2014 ICM survey showed that almost a quarter of people under the age of 12 had been exposed to online pornography.<ref>{{cite web|title=BBC Three survey reveals one in four young people first view porn at age 12 or under|url=https://www.bbc.co.uk/mediacentre/latestnews/2014/porn-whats-the-harm|access-date=10 April 2014}}</ref> Restricting especially helps in cases when children are exposed to inappropriate content by accident. Monitoring may be effective for lessening acts of [[cyberbullying]] within the internet.<ref>{{Cite journal|date=2016|title=Cyberbullying|url=http://go.galegroup.com/ps/i.do?p=GPS&sw=w&v=2.1&id=GALE%7CEJ2181500172&it=r&asid=1121b85909784f1a65ba5f614b73391d|journal=Gale Student Resources in Context|via=Gale, Cengage Learning}}</ref><ref>{{Cite journal|last1=Malo-Cerrato|first1=Sara|last2=Martín-Perpiñá|first2=Maria-de-las-Mercedes|last3=Viñas-Poch|first3=Ferran|date=2018-07-01|title=Excessive use of social networks: Psychosocial profile of Spanish adolescents|journal=Comunicar|language=es|volume=26|issue=56|pages=101–110|doi=10.3916/c56-2018-10|issn=1134-3478|doi-access=free|hdl=10256/15553|hdl-access=free}}</ref> It is unclear whether parental controls will affect online harassment in children, as little is known about the role the family plays in protecting children from undesirable experiences online.<ref>Khurana, Atika, et al. "The Protective Effects of Parental Monitoring and Internet Restriction on Adolescents' Risk of Online Harassment." ''Journal of Youth and Adolescence'', vol. 44, no. 5, 2015, pp. 1039-1047.</ref> Psychologically, cyberbullying could be more harmful to the victim than traditional bullying.<ref>Dooley, J., Pyzalski, J., & Cross, D. (2009). Cyberbullying versus face-to-face bullying: A theoretical and conceptual review. Zeitschrift fiir Psychologie/Journal of Psychology, 217, 182–188. doi:10.1027/0044-3409.217.4.182.</ref> Studies done in the past have shown that about 75% of adolescents were subjected to cyberbullying.<ref>J. Juvonen, E.F. Gross Extending the school grounds?—Bullying experiences in cyberspace ''Journal of School Health'', 78 (9) (2008), pp. 496-505, 10.1111/j.1746-1561.2008.00335.x</ref><ref> Close C. Katzer, D. Fetchenhauer, F. Belschak Cyberbullying: Who are the victims?: A comparison of victimization in internet chatrooms and victimization in school ''Journal of Media Psychology: Theories, Methods, and Applications'', 21 (1) (2009), pp. 25-36, 10.1027/1864-1105.21.1.25</ref> A lack of parental controls in the household could enable kids to be a part of cyberbullying or be the victim of cyberbullying.<ref> Close D.L. Espelage, K. Bosworth, T.R. Simon Examining the social context of bullying behaviors in early adolescence Journal of Counseling & Development, 78 (3) (2000), pp. 326-333, 10.1002/j.1556-6676.2000.tb01914.x</ref><ref>J.S. Hong, D.L. Espelage. A review of research on bullying and peer victimization in school: An ecological system analysis ''Aggression and Violent Behavior'', 17 (4) (2012), pp. 311-322, 10.1016/j.avb.2012.03.003</ref> ==Overview== Behavioral control consists of controlling the amount of time a child spends online, or how much the child can view. Psychological control involves parents trying to influence children's behavior.<ref>{{Cite web|url=http://go.galegroup.com.ezproxy.pvc.maricopa.edu/ps/retrieve.do?tabID=T003&resultListType=RESULT_LIST&searchResultsType=SingleTab&searchType=BasicSearchForm¤tPosition=1&docId=GALE%7CCX2940400241&docType=Topic+overview&sort=RELEVANCE&contentSegment=&prodId=GVRL&contentSet=GALE%7CCX2940400241&searchId=R1&userGroupName=mcc_pv&inPS=true#|title=Parenting|last=Laible|first=D|date=2012|website=Gale Virtual Reference Library}}{{Dead link|date=September 2023 |bot=InternetArchiveBot |fix-attempted=yes }}</ref> Several techniques exist for creating parental controls for blocking websites. Add-on parental control software may monitor [[API]] in order to observe applications such as a web browser or Internet chat application and to intervene according to certain criteria, such as a match in a database of banned words. Virtually all parental control software includes a password or other form of [[authentication]] to prevent unauthorized users from disabling it. Techniques involving a [[proxy server]] are also used.<ref>{{cite web|last=Seltzer|first=Larry|title=Turn Your Windows Home Server Into A Proxy Server|url=http://securitywatch.pcmag.com/networking/284935-turn-your-windows-home-server-into-a-proxy-server|access-date=26 September 2008}}</ref> A [[web browser]] is set to send requests for web content to the proxy server rather than directly to the web server intended. The proxy server then fetches the web page from the server on the browser's behalf and passes on the content to the browser. Proxy servers can inspect the data being sent and received and intervene depending on various criteria relating to content of the page or the URL being requested, for example, using a [[database]] of banned words or banned URLs. The proxy method's major disadvantage is that it requires that the client application to be configured to utilize the proxy, and if it is possible for the user to reconfigure applications to access the Internet directly rather than going through the proxy, then this control is easily bypassed. Proxy servers themselves may be used to circumvent parental controls. There are other techniques used to bypass parental controls. The computer usage management method, unlike content filters, is focused on empowering the parents to balance the computing environment for children by regulating gaming. The main idea of these applications is to allow parents to introduce a learning component into the computing time of children, who must earn gaming time while working through educational contents. Network-based parental control devices have been develop which work as a firewall router using packet filtering, DNS [[Response policy zone|response policy zone]] (RPZ) and [[deep packet inspection]] (DPI) methods to block inappropriate web content. These methods have been used in commercial and governmental communication networks. Another form of these devices made for home networks has been developed. These devices plug into the home router and create a new wireless network, which is specifically designed for kids to connect to.<ref>"US interest in router box offering parental control." ''Australian'' [National, Australia], 24 Jan. 2017, p. 24. ''Global Issues In Context'', http://link.galegroup.com/apps/doc/A478654821/OVIC?u=mcc_pv&sid=OVIC&xid=5d6f1e1a Accessed 4 Apr. 2018.</ref> ==Parental controls on mobile devices== The increased use of mobile devices with fully featured web browsers and downloadable applications has created a demand for parental controls on these devices. Some examples of mobile devices that contain parental controls include cell phones, tablets, and e-readers. In November 2007, Verizon was the first carrier to offer age-appropriate content filters as well as the first to offer generic content filters, recognizing that mobile devices were used to access all manner of content from movies and music to short-code programs and websites. In June 2009, in [[iPhone OS 3.0]], Apple was the first company to provide a built-in mechanism on mobile devices to create age brackets for users that would block unwanted applications from being downloaded to the device. In the following years, the developers of all major operating systems have presented in-built tools for parental control, including Linux,<ref>{{cite web|title=Parental Content Control |url=https://help.ubuntu.com/community/ParentalControls |date=17 September 2017}}</ref> Android, Windows, and even the more business-oriented platform Blackberry.<ref>{{cite web|title=Parental Control on Smartphones: How to Choose the Right Application? |url=http://www.spyrix.com/parental-control-on-smartphones-how-to-choose-the-right-application.php |date=15 August 2016}}</ref> There are also applications that allow parents to monitor real-time conversations on their children's phone via access to text messages, browser history, and application history. An example of one of these is [[Trend Micro]]<ref>"Trend Micro Announces the Next Generation Mobile Security Solution for the Android Platform." ''Benzinga.com'' 15 Sept. 2011. ''Business Insights: Global''. Web. 27 Oct. 2018.</ref> which not only offers protection from viruses, but also offers parental controls to phones and tablets of almost all brands. Most of these offer the ability to add extra features to parental controls. These apps have the features mobile devices already have, but have additional features such as, being able to monitor and filter texts/calls, protection while surfing the web, and denied access to specific websites. Applications of this sort have created a rising competition in their market.<ref>{{Cite journal|last=Shamout|first=Omar|date=6 October 2014|title=Parental controls|url=http://www.labusinessjournal.com/|journal=Los Angeles Business Journal|volume=36|issue=40|pages=12}}</ref> Mobile device software enables parents to restrict which applications their child can access while also allowing parents to monitor text messages, phone logs, MMS pictures, and other transactions occurring on their child's mobile device; to enable parents to set a time limit on the usage of mobile devices; and to track the exact location of their children as well as monitor calls and the content of texts. This software also allows parents to monitor social media accounts. Parents are able to view posts, pictures, and any interactions in real time. Another function of this software is to keep track of [[bullying]].<ref>{{Cite book|chapter=Searcy, Philip Roy, (15 April 1914–5 Oct. 1983), Australian Consul-General, Los Angeles, 1971–75|date=2007-12-01|publisher=Oxford University Press|doi = 10.1093/ww/9780199540884.013.u168949|title = Who Was Who}}</ref> <!-- (Commenting this out because it doesn't make sense as written. If you can clarify, please reintroduce it into the text. Thanks.) Various dangers may arise from electronic communications. Numerous studies have shown that if caught early enough with parental intervention, could intervene cyberbullying.<ref>{{Cite book|title=Cyberbullying|last=Friedman|first=Lauri S.|publisher=Christine Nasso|year=2011|isbn=978-0-7377-5117-8|location=Detroit|pages=91}}</ref>--> Most internet service providers offer no-cost filtering options to limit internet browsing options and block unsuitable content. Implementing parental controls and discussing internet safety are useful steps to protect children from inappropriate information.<ref>{{Cite journal|last=Gonzales|first=Lisa|date=March 2017|title=Best practices around social media safety|url=http://go.galegroup.com/ps/i.do?p=AONE&sw=w&v=2.1&id=GALE%7CA488965839&it=r&asid=bc418b8d53bb2b1d8222a3713289b79d|journal=Technology & Learning|pages=29|via=Gale Academic OneFile}}</ref> Although parental controls can protect children, they also come with some negative factors. Children's anxiety may increase due to parental controls.<ref>{{Cite journal|pmid=18355216|year=2008|last1=Van Der Bruggen|first1=C. O.|title=Research review: The relation between child and parent anxiety and parental control: A meta-analytic review|journal=Journal of Child Psychology and Psychiatry, and Allied Disciplines|volume=49|issue=12|pages=1257–69|last2=Stams|first2=G. J.|last3=Bögels|first3=S. M.|doi=10.1111/j.1469-7610.2008.01898.x}}</ref> In extreme cases, a child may become so angry that they destroy their device, defeating the purpose of parental controls entirely. In that case, it might be a better idea to forgo installing parental controls. ==Bypassing parental controls== * If the filtering software is located locally within the computer, all Internet software can be easily bypassed by booting up the computer in question from alternative media, with an alternative operating system or (on [[Microsoft Windows|Windows]]) in [[Safe Mode]]. However, if the computer's [[BIOS]] is configured to disallow booting from removable media, and if changes to the BIOS are prohibited without proper authentication, then booting into an alternative operating system is not available without circumventing BIOS security by partially disassembling the computer and resetting BIOS configuration using a button or jumper, or removing and replacing the internal button cell battery.<ref>{{cite web|title=How to Bypass the Parental Control Time Limits in Windows 7/Vista/XP|url=http://www.zimbio.com/Password+Recovery+Software/articles/Xv5Q3c1x3wZ/How+Bypass+Parental+Control+Time+Limits+Windows|access-date=6 September 2012}}</ref> * Using external proxy servers or other servers. The user sends requests to the external server which retrieves content on the user's behalf. Filtering software may then never be able to know which URLs the user is accessing, as all communications are with the one external server and filtering software never sees any communications with the web servers from which content really originated. To counter this, filtering software may also block access to popular proxies. Additionally, filtering systems which only permit access to a set of allowed URLs (whitelisting) will not permit access anything outside this list, including proxy servers. * Resetting passwords using exploits * Modifying the software's files{{citation needed|date=June 2013}} * [[Brute-force attack]]s on software passwords<ref>{{Cite web|url = http://hackaday.com/2013/07/06/brute-force-attack-xbox-360-parental-controls/|title = Brute force attack Xbox 360 parental controls|date = 6 July 2014|access-date = 9 August 2014|website = Hack A Day|publisher = Hackaday|last = Szczys|first = Mike}}</ref> <!-- NOTE: Following is factual information, and does not endorse any single product. Pleased do not remove/censor on the basis of being a sales pitch. I had listed three directly competing references, that I have absolutely no association with. I now removed any specific reference to products that implement 'enforce safe search.' This is critically relevant and important information concerning a significant area of parental controls, that I carefully researched and am sincerely summarizing as a public service. Why is it ok to list commercial OS and video game systems that have parental controls, but not list routers that support 'enforce safe search'? --> * 'Incognito/InPrivate' modes with the 'image' tab: Users, parental control software, and parental control routers may use 'safe search' ([[SafeSearch]]) to enforce filtering at most major search engines. However, in most browsers a user may select 'Incognito' or 'InPrivate' browsing, enter search terms for content, and select the 'image' tab to effectively bypass 'safe search' and many parental control filters. See below for router based considerations and solutions. Filtering that occurs outside of the individuals computer (such as at the router) cannot be bypassed using the above methods (except for 'Incognito/InPrivate' modes). However, * The major search engines cache and serve content on their own servers. As a result, domain filters such as many third party DNS servers, also fail to filter the 'Incognito/InPrivate' with 'image' tab. * Most commercially available routers with parental controls do not enforce safe search at the router, and therefore do not filter the 'Incognito/InPrivate' with 'image' tab. == Criticism == While parental controls have been added to various electronic media and have increased in popularity, the question has been raised if they are enough to protect and deter children from exposure to inappropriate material. It has been speculated by researchers that the strict focus on control may hinder a child's ability to learn self-governing skills and restricting the growth of open communication between parent and child.<ref>{{Cite news|url=http://news.psu.edu/story/452954/2017/02/27/research/online-security-apps-focus-parental-control-not-teen-self|title=Online security apps focus on parental control, not teen self-regulation {{!}} Penn State University|access-date=2018-01-28}}</ref> ==Operating systems with parental controls== Below is a list of popular [[operating system]]s which currently have built-in parental control features: *[[Android operating system]]<ref>{{Cite web| last = Brewis| first = Marie| title = Get better control of what your kids can see on their tablet or smartphone| work = PC Advisor| access-date = 11 July 2016| url = http://www.pcadvisor.co.uk/how-to/google-android/parental-control-on-android-image-3461359/}}</ref> *[[iOS]]<ref>{{Cite web| title = Use Restrictions on your iPhone, iPad, and iPod touch| work = Apple Support| access-date = 11 July 2016| url = https://support.apple.com/en-us/HT201304}}</ref> (12 or later) *[[macOS]] (10.3 and later) *[[DoudouLinux]] (built-in web filter) *[[sabily]] (built-in web filter) *Ubuntu Christian edition (built-in web filter) *[[Windows]] (Vista, 7, 10 and later)<ref>{{cite web|url=http://windows.microsoft.com/en-US/windows-vista/Set-up-Parental-Controls |title=Set up Parental Controls |publisher=Windows.microsoft.com |access-date=17 September 2013}}</ref> *[[ChromeOS]] (65 or later) <!-- NOTE: This list here includes the operating systems which include built-in parental control features, however there are similar parental control features available for download by third-party web sites (organizations) which could operate on older operating systems which do not have the built-in parental control systems --> <!-- NOTE: Please do not undo/censor on the basis of sales pitch. This is factual information that I have researched. (this message was from the last guy to edit this) I have no association with any of these providers. This parallels the lists of commercial softwares and video game systems. It now also includes a longer list of routers with parental controls, and denotes which ones include the "enforce safe search" option that is described in my updates to the topic of parental controls. --> ==See also== * [[Adultism]] * [[David Burt (filtering advocate)|David Burt]] * [[Internet censorship]] * [[List of parental control software]] * [[Motion picture rating system]] * [[Television rating system]] * [[Videogame Rating Council]] * [[Retina-X Studios]] * [[Smart Sheriff]] * [[Restricted to Adults]] ==References== {{reflist}}<!--======================== {{No more links}} ============================ | PLEASE BE CAUTIOUS IN ADDING MORE LINKS TO THIS ARTICLE. Wikipedia | | is not a collection of links nor should it be used for advertising. | | | | Excessive or inappropriate links WILL BE DELETED. | | See [[Wikipedia:External links]] & [[Wikipedia:Spam]] for details. | | | | If there are already plentiful links, please propose additions or | | replacements on this article's discussion page, or submit your link | | to the relevant category at the Open Directory Project (dmoz.org) | | and link back to that category using the {{dmoz}} template. | ======================= {{No more links}} =============================--> {{DEFAULTSORT:Parental Controls}} [[Category:Internet safety]] [[Category:Parenting]] [[Category:Content-control software]]
Edit summary
(Briefly describe your changes)
By publishing changes, you agree to the
Terms of Use
, and you irrevocably agree to release your contribution under the
CC BY-SA 4.0 License
and the
GFDL
. You agree that a hyperlink or URL is sufficient attribution under the Creative Commons license.
Cancel
Editing help
(opens in new window)
Pages transcluded onto the current version of this page
(
help
)
:
Template:About
(
edit
)
Template:Citation needed
(
edit
)
Template:Cite book
(
edit
)
Template:Cite journal
(
edit
)
Template:Cite news
(
edit
)
Template:Cite web
(
edit
)
Template:Dead link
(
edit
)
Template:Dead url
(
edit
)
Template:Reflist
(
edit
)
Template:Short description
(
edit
)
Template:Use dmy dates
(
edit
)