In the “Arkangel” episode of the popular series Black Mirror, an overprotective mother decides to implant a chip in her daughter’s brain so she can use her tablet and an app to monitor everything her little girl sees and feels. This system, originally designed as a parental control app, allows the mom not only to see what her child sees, but also monitor her emotions and moods, and even “filter” images that could harm her, so the girl sees them as pixelated.
We don’t need to go to the extreme of implanting a chip, as happens in the series, to analyse just how far these activities can be considered monitoring and at what point they turn into an invasion of the child’s privacy, says Carey van Vlaanderen, CEO at ESET South Africa.
Right now, we already have apps for monitoring geolocation, apps for controlling what content children can see on the internet and on TV, apps giving access to the microphone, so parents can listen to the sounds taking place where they are, and even apps that record everything that happens on the screen through video capture.
While these tools may seem like a great solution to all the problems the parent of a digital native could have, one thing is certain: Not all parental control apps work the same or have the same features. This is why it is essential to analyse them and choose those which best fit your family’s values.
Not only that, but a lot of tools which at first glance seem very useful to parents can turn out to be invasive for their kids, and this ends up provoking a different reaction to what the parent expected. Instead of feeling protected and contained, the child may feel trapped and start to seek ways to escape these controls.
The key is not about which control you choose, but rather in the conversation around it, and in accompanying the child in the digital world, just as we do in the physical world. It is about teaching them, through dialog and with the support of digital tools, what the dangers and risks of the internet are. What their responsibilities are, what they should and shouldn’t do, and how they can protect themselves.
Parental control apps can be really useful with younger children, when they first start to use a computer or get their first cell phone. However, as they enter early adolescence, these controls will become increasingly difficult to introduce or keep using. This means the key is to start removing the controls and gradually passing the responsibilities on as they grow older and learn how to behave in the digital world.
The goal should be for the child to enter adolescence fully empowered, understanding what risks exist on the internet and how to protect themselves, above all feeling confident and calm in the knowledge they can talk to their parents if anything worries them or makes them feel uncomfortable. To achieve this, the dialog and accompaniment need to start long before the child reaches this age, right when they are first entering the digital world.
What is the best way to install a parental control app?
The key to making parental control a tool that is useful both to parents and to their children lies in it being a form of care and not a form of imposed control. Once you have chosen the app that best fits your family’s values, it is best to install it and configure it together with your child. Before doing so, you need to decide on the basic rules for your child’s digital consumption, as well as their responsibilities. Explain to them that the parental control app is a way for mom and dad to look after them in the digital world and that you are going to install it together.
Here are some of the core features which are very useful for parental control and which help protect children without invading their privacy:
App control: Age-based filters are applied to manage which apps the child can access and use.
Web access control: These block inappropriate websites according to the child’s age, both individually and by category.
Time limits for fun and games: These set a maximum number of hours during which the child can play on their device. They also manage the times of day when it is used, for example, blocking access to games and apps during school hours or at bedtime.
Geolocation: These allow you to check the device’s current location at any given moment.
Reports: The purpose of reports is to be informed about the child’s general behaviour on the internet, so you can decide when the time comes to remove the controls. They include metrics which inform you about how the child uses the device, such as how long they spend on certain apps, time periods, and so on.
Lastly, these reports also can be very useful for knowing which apps your child uses most, or which are their favourites. Knowing their tastes and interests is a good starting point for conversations about taking care while online.
Remember, your child might have a better understanding than you of how an app works or may be more adept at using the device in general, but you know more about what risks and dangers could be lying in wait for them. So, what could be better than using the technology together, and being able to enjoy it safely?
The future of the book… and of reading
Many fear that the days of the printed book are numbered. In truth, it is not so much the book that is evolving, but the very act of reading, argues ARTHUR GOLDSTUCK.
Let’s talk about a revolutionary technology. One that has already changed the course of civilisation. It is also a dangerous technology, one that is spreading previously hidden knowledge among people who may misuse and abuse the technology in ways we cannot imagine.
Every one reading this is a link in a chain of this dangerous and subversive technology.
I’m talking, of course, about the printed book.
To understand how the book has changed society, though, we must also understand how the book has changed reading. That, in turn, will help us understand the future of the book.
Because the future of the book is in fact the future of reading.
Let’s go back to a time some may remember as their carefree youth. The year 400.
(Go back in history with the links below.)
Wearables enter enterprise
Regardless of whether wearables lack the mobility or security capabilities to fully support the ways in which we now work – organisations remain keen and willing to unlock the potential such devices have, says RONALD RAVEL, Director B2B South Africa, Toshiba South Africa.
The idea of integrating wearable technology into enterprise IT infrastructure is one which, while being mooted for several years now, has yet to take-off in earnest. The reasons behind previous false dawns vary. However, what is evident is that – regardless of whether wearables to date have lacked the mobility or security capabilities to fully support the ways in which we now work – organisations remain keen and willing to unlock the potential such devices have. According to ABI Research, global wearable device shipments will reach 154 million by 2021 – a significant jump from approximately 34 million in 2016.
This projected increase demonstrates a confidence amongst CIOs which perhaps betrays the lack of success in the market to date, but at the same time reflects a ripening of conditions which could make 2018 the year in which wearables finally take off in the enterprise. A maturing IoT market, advances in the development of Augmented Reality (AR), and the impending arrival of 5G – which is estimated to have a subscription base of half a billion by 2022 – are contributing factors which will drive the capabilities of wearable devices.
Perhaps the most significant catalyst behind wearables is the rise of Edge Computing. As the IoT market continues to thrive, so too must IT managers be able to securely and efficiently address the vast amounts of data generated by it. Edge Computing helps organisations to resolve this challenge, while at the same time enabling new methods of gathering, analysing and redistributing data and derived intelligence. Processing data at the edge reduces strain on the cloud so users can be more selective of the data they send to the network core. Such an approach also makes it easier for cyber-attacks to be identified at an early stage and restricted to a device at the edge. Data can then be scanned and encrypted before it is sent to the core.
As more and more wearable devices and applications are developed with business efficiency and enablement in mind, Edge Computing’s role will become increasingly valuable – helping organisations to achieve $2 trillion in extra benefits over the next five years, according to Equinix and IDC research.
Where will wearables have an impact?
At the same time as these technological developments are aiding the rise of wearables, so too are CIOs across various sectors recognising how they can best use these devices to enhance mobile productivity within their organisation – another factor which is helping to solidify the market. In particular it is industries with a heavy reliance on frontline and field workers – such as logistics, manufacturing, warehousing and healthcare – which are adopting solutions like AR smart glasses. The use case for each is specific to the sector, or even the organisation itself, but this flexibility is often what makes such devices so appealing. While wearables for the more traditional office worker may offer a different but no more efficient way for workers to conduct every day tasks such as checking emails and answering phone calls, for frontline and field workers they are being tailored to meet their unique demands and enhance their ability to perform specific tasks.
Take for example boiler engineers conducting an annual service, who could potentially use AR smart glasses to overlay the schematics of the boiler to enable a hands-free view of service procedures – meaning that when a fault becomes a barrier to repair, the engineer is able to use collaboration software to call for assistance from a remote expert. Elsewhere, in the healthcare sector smart eyewear may support clinicians with hands-free identification of patient records, medical procedures and information on medicines and results.
Such examples demonstrate the immediate and diverse potential of wearables across different verticals. With enterprise IT infrastructure now in the position to embrace such technologies, it is this ability to deliver bespoke functionality to mobile workers which will be the catalyst for continued uptake throughout 2018 and beyond.