{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T07:12:42Z","timestamp":1729667562852,"version":"3.28.0"},"reference-count":26,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015,7]]},"DOI":"10.1109\/icssa.2015.011","type":"proceedings-article","created":{"date-parts":[[2017,1,16]],"date-time":"2017-01-16T23:08:33Z","timestamp":1484608113000},"page":"1-6","source":"Crossref","is-referenced-by-count":10,"title":["On the Development of Advanced Parental Control Tools"],"prefix":"10.1109","author":[{"given":"Walter","family":"Fuertes","sequence":"first","affiliation":[]},{"given":"Karina","family":"Quimbiulco","sequence":"additional","affiliation":[]},{"given":"Fernando","family":"Galarraga","sequence":"additional","affiliation":[]},{"given":"Jose Luis","family":"Garcia-Dorado","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"crossref","first-page":"177","DOI":"10.1016\/j.cose.2013.12.004","article-title":"GARS: Real-time system for identification, assessment and control of cyber grooming attacks","volume":"42","author":"dimitrios","year":"2014","journal-title":"Computers & Security"},{"key":"ref11","article-title":"Self-Reported Emotional and Behavioral Problems, Family Functioning and Parental Bonding Among Psychiatric Outpatient Adolescent Offspring of Croatian Male Veterans with Partial PTSD","author":"bori?evi? mar\u0161ani?","year":"2015","journal-title":"Child & Youth Care Forum"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1111\/j.1750-8606.2009.00099.x"},{"article-title":"Children's perception of the parental mediation of the risks of the Internet","year":"2015","author":"iglesias jim\u00e9nez","key":"ref13"},{"key":"ref14","article-title":"Parental Control and Teenagers Television Involvement in a Developing Country","author":"rahman","year":"2010","journal-title":"Doing More With Less Proceedings of the Australian and New Zealand Marketing Academy (ANZMAC) Annual Conference"},{"article-title":"Parental Control of Pre-School Children's viewing of Programmes in Electronic Media","year":"0","author":"knapik","key":"ref15"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1111\/fcre.12137"},{"key":"ref17","article-title":"Parental Controls","volume":"312","author":"yuhas","year":"2015","journal-title":"Scientific American"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1111\/j.1467-8624.2006.00934.x"},{"key":"ref19","article-title":"Child Abuse: How to Protect Your Children From Being Bullied and Cyber bullying: Bullying Prevention and Intervention","author":"aaron","year":"2015","journal-title":"Comet Content Providers"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1080\/08838150802437396"},{"article-title":"In their own words: What bothers children online? With the EU Kids Online Network","year":"2013","author":"livingstone","key":"ref3"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1007\/978-94-6265-005-3_12"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/2556288.2557128"},{"year":"2014","author":"ivorra","key":"ref8"},{"journal-title":"Benchmarking of parental control tools for the online protection of children","year":"0","key":"ref7"},{"key":"ref2","first-page":"40","article-title":"Influence of Internet Websites on Children Study","volume":"10","author":"chhachhar","year":"2014","journal-title":"Journal of American Science"},{"key":"ref9","doi-asserted-by":"crossref","first-page":"161","DOI":"10.1007\/978-3-642-41674-3_24","article-title":"Adult contests Analysis and Remote Management framework For Parental Control Based on Android Platform","volume":"279","author":"jae-deok","year":"2014","journal-title":"Advanced in Computer Science and Its Applications"},{"key":"ref1","article-title":"Meaning of online problematic situations for children","author":"smahel","year":"2014","journal-title":"Results of qualitative cross-cultural investigation in nine European countries"},{"year":"0","key":"ref20"},{"key":"ref22","first-page":"1210","article-title":"Cyber Warfare: A Multidisciplinary Analysis","volume":"57","author":"hodges","year":"2013","journal-title":"Pattern Analysis and Machine Intelligence IEEE Transactions on"},{"journal-title":"Cybernetics and Systems' 86 Proceedings of the Eighth European Meeting on Cybernetics and Systems Research","year":"1986","author":"robert","key":"ref21"},{"key":"ref24","article-title":"Systematic hypermedia application design with OOHDM","author":"daniel","year":"1996","journal-title":"Proceedings of the the seventh ACM conference on Hypertext"},{"key":"ref23","doi-asserted-by":"crossref","first-page":"18","DOI":"10.1109\/TSE.2011.122","article-title":"Empirical principles and an industrial case study in retrieving equivalent requirements via natural language processing techniques","volume":"39","author":"davide","year":"2013","journal-title":"Software Engineering IEEE Transactions on"},{"journal-title":"Geo-referential Information on education","year":"0","key":"ref26"},{"key":"ref25","article-title":"Multi-player Educational Video Game over Cloud to Stimulate Logical Reasoning of Children","author":"villac\u00eds","year":"2014","journal-title":"Proc of the Int Symposium on Distributed Simulation and Real-Time Applications"}],"event":{"name":"2015 1st International Conference on Software Security and Assurance (ICSSA)","start":{"date-parts":[[2015,7,27]]},"location":"Suwon, South Korea","end":{"date-parts":[[2015,7,27]]}},"container-title":["2015 1st International Conference on Software Security and Assurance (ICSSA)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7811894\/7812928\/07812938.pdf?arnumber=7812938","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,25]],"date-time":"2017-06-25T04:23:12Z","timestamp":1498364592000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7812938\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,7]]},"references-count":26,"URL":"https:\/\/doi.org\/10.1109\/icssa.2015.011","relation":{},"subject":[],"published":{"date-parts":[[2015,7]]}}}