SlideShare une entreprise Scribd logo
1  sur  23
Télécharger pour lire hors ligne
Protection Against Predators
By
Lee Anderson, Michael Jardine, Ethan Thomson,
Daniel McDonald and Colvin Morrison
Who?
The Children
What?
Protection
Where?
At home
Why?
To protect the kids
Problem?
Yes, the problem is there is a growing number of
young children gaining access to the internet
and are being put at risk against Cyber bullies or
predators.
How can we protect the
youth on the internet?
We can protect the youth on the internet by
having a fail safe system in place that can alert
parents their children are in danger and allow
them to take further action!
We are students from Fife College and Our idea is based around
the fact that more and more children have access to the internet
via all the new devices whether it is smart phones or tablets or
even the good old fashioned PC. With all this new flood of internet
accessible devices parents can be placed into a position of worry
about whom their kids are talking too exactly. There are growing
numbers of children who are at risk of internet predators and or
cyber bullying; both are topics that are hard to bring up with their
parents. Our app is going to ensure that parents can at least get
some form of peace of mind. When a child is targeted whether it
be a predator or cyber bully our app will recognise key words and
phrases mentioned and automatically take a snap shot of the
screen then send it to the parents phone.
Our potential users all agreed on the benefits of this
app, they gave slightly different feedback on the app
with some saying it should be an additional feature
provided by your network and some saying it should
be optional download from an apps store.
Mobile Spy is the most
similar app we could
find. This app is
expensive and based on
a subscription fee
putting allot of potential
buyers off. This app is
also marketed around
being a spy app which
is an invasion of privacy
and potentially illegal.
The core feature of this app is going to be the ability to recognise key
words and phrases with the key logger and determine if they pose a
threat to the user.
MENU
The technical feasibility will be reliant on a key logging
technology that is available. The data this app will generate
will be from the users logs of potentially harmful
conversations.
The business model is based off building an app which its number one
priority is the protection of young venerable internet users. We got 13
customer pledges from people who were interested in seeing this app
being made.
We done an online survey highlighting the
the needs and expectations of the
potential users. The best market strategy
for the selling of this app would be to have
a high add campaign to raise awareness
of this app.
[Marketing Strategy]
We asked what people
would be willing to pay
for this app and most
people agree on the
£0.69 to £1.99 price
range making the app
affordable for all parents
83.33% of people
we asked agree
that this app is
about the
protection of
venerable
children
App Design Mock-up

Contenu connexe

Tendances

Mobile in shopping in MENA, September 2014
Mobile in shopping in MENA, September 2014Mobile in shopping in MENA, September 2014
Mobile in shopping in MENA, September 2014On Device Research
 
Are you caught on the web
Are you caught on the webAre you caught on the web
Are you caught on the webNicole William
 
MEF Global Consumer Trust Report
MEF Global Consumer Trust ReportMEF Global Consumer Trust Report
MEF Global Consumer Trust ReportAVG Technologies
 
Looking Forward and Looking Back: Lookout's Cybersecurity Predictions
Looking Forward and Looking Back: Lookout's Cybersecurity PredictionsLooking Forward and Looking Back: Lookout's Cybersecurity Predictions
Looking Forward and Looking Back: Lookout's Cybersecurity PredictionsLookout
 
Moving brand tracking successfully to the mobile world
Moving brand tracking successfully to the mobile worldMoving brand tracking successfully to the mobile world
Moving brand tracking successfully to the mobile worldOn Device Research
 
App Developers Urged to Take Greater Care in Accessing Data
App Developers Urged to Take Greater Care in Accessing DataApp Developers Urged to Take Greater Care in Accessing Data
App Developers Urged to Take Greater Care in Accessing DataJohn Davis
 
ADP1003 Smart phones friend or fou
ADP1003 Smart phones friend or fouADP1003 Smart phones friend or fou
ADP1003 Smart phones friend or fouNdivhuho Mulaudzi
 
5 Ways to Protect your Mobile Security
5 Ways to Protect your Mobile Security5 Ways to Protect your Mobile Security
5 Ways to Protect your Mobile SecurityLookout
 
Insights into the App Economy in MENA
Insights into the App Economy in MENAInsights into the App Economy in MENA
Insights into the App Economy in MENAOn Device Research
 
BSmith Presentation Samples 0713
BSmith Presentation Samples 0713BSmith Presentation Samples 0713
BSmith Presentation Samples 0713Brian Smith
 
MEF Mobile Apps Privacy Policy Research 2013
MEF Mobile Apps Privacy Policy Research 2013MEF Mobile Apps Privacy Policy Research 2013
MEF Mobile Apps Privacy Policy Research 2013MEFContentandCommerce
 
Mobile Marketing & Commerce
Mobile Marketing & CommerceMobile Marketing & Commerce
Mobile Marketing & Commercepsiewe
 
Spying Cameras & Spying Phones
Spying Cameras & Spying PhonesSpying Cameras & Spying Phones
Spying Cameras & Spying PhonesTrading Atlas
 
2015 Cybersecurity Predictions
2015 Cybersecurity Predictions2015 Cybersecurity Predictions
2015 Cybersecurity PredictionsLookout
 
Infographic: Mobile At Work
Infographic: Mobile At WorkInfographic: Mobile At Work
Infographic: Mobile At WorkBlueboxer2014
 
Visualizing Privacy
Visualizing PrivacyVisualizing Privacy
Visualizing PrivacyLookout
 
Using Mobile Technology for Patient Recruitment Webinar
Using Mobile Technology for Patient Recruitment WebinarUsing Mobile Technology for Patient Recruitment Webinar
Using Mobile Technology for Patient Recruitment WebinarPatientWise
 

Tendances (20)

Mobile in shopping in MENA, September 2014
Mobile in shopping in MENA, September 2014Mobile in shopping in MENA, September 2014
Mobile in shopping in MENA, September 2014
 
Are you caught on the web
Are you caught on the webAre you caught on the web
Are you caught on the web
 
MEF Global Consumer Trust Report
MEF Global Consumer Trust ReportMEF Global Consumer Trust Report
MEF Global Consumer Trust Report
 
Looking Forward and Looking Back: Lookout's Cybersecurity Predictions
Looking Forward and Looking Back: Lookout's Cybersecurity PredictionsLooking Forward and Looking Back: Lookout's Cybersecurity Predictions
Looking Forward and Looking Back: Lookout's Cybersecurity Predictions
 
Moving brand tracking successfully to the mobile world
Moving brand tracking successfully to the mobile worldMoving brand tracking successfully to the mobile world
Moving brand tracking successfully to the mobile world
 
App Developers Urged to Take Greater Care in Accessing Data
App Developers Urged to Take Greater Care in Accessing DataApp Developers Urged to Take Greater Care in Accessing Data
App Developers Urged to Take Greater Care in Accessing Data
 
ADP1003 Smart phones friend or fou
ADP1003 Smart phones friend or fouADP1003 Smart phones friend or fou
ADP1003 Smart phones friend or fou
 
5 Ways to Protect your Mobile Security
5 Ways to Protect your Mobile Security5 Ways to Protect your Mobile Security
5 Ways to Protect your Mobile Security
 
Insights into the App Economy in MENA
Insights into the App Economy in MENAInsights into the App Economy in MENA
Insights into the App Economy in MENA
 
App Spy
App SpyApp Spy
App Spy
 
BSmith Presentation Samples 0713
BSmith Presentation Samples 0713BSmith Presentation Samples 0713
BSmith Presentation Samples 0713
 
MEF Mobile Apps Privacy Policy Research 2013
MEF Mobile Apps Privacy Policy Research 2013MEF Mobile Apps Privacy Policy Research 2013
MEF Mobile Apps Privacy Policy Research 2013
 
Mobile Marketing & Commerce
Mobile Marketing & CommerceMobile Marketing & Commerce
Mobile Marketing & Commerce
 
Mobilize
MobilizeMobilize
Mobilize
 
Smartphone pros and cons
Smartphone pros and consSmartphone pros and cons
Smartphone pros and cons
 
Spying Cameras & Spying Phones
Spying Cameras & Spying PhonesSpying Cameras & Spying Phones
Spying Cameras & Spying Phones
 
2015 Cybersecurity Predictions
2015 Cybersecurity Predictions2015 Cybersecurity Predictions
2015 Cybersecurity Predictions
 
Infographic: Mobile At Work
Infographic: Mobile At WorkInfographic: Mobile At Work
Infographic: Mobile At Work
 
Visualizing Privacy
Visualizing PrivacyVisualizing Privacy
Visualizing Privacy
 
Using Mobile Technology for Patient Recruitment Webinar
Using Mobile Technology for Patient Recruitment WebinarUsing Mobile Technology for Patient Recruitment Webinar
Using Mobile Technology for Patient Recruitment Webinar
 

En vedette

Zeus Presentation Pitch 2014
Zeus Presentation Pitch 2014Zeus Presentation Pitch 2014
Zeus Presentation Pitch 2014FifeCollege
 
5 alive competition presentation
5 alive competition presentation5 alive competition presentation
5 alive competition presentationFifeCollege
 
Sonic shockwave presentation
Sonic shockwave presentationSonic shockwave presentation
Sonic shockwave presentationFifeCollege
 
Us beegees competiton presentation
Us beegees competiton presentationUs beegees competiton presentation
Us beegees competiton presentationFifeCollege
 
CULTURA, CIUDAD, ACCIÓN COLECTIVA
CULTURA, CIUDAD, ACCIÓN COLECTIVACULTURA, CIUDAD, ACCIÓN COLECTIVA
CULTURA, CIUDAD, ACCIÓN COLECTIVAOswaldo Vlsqz Moreno
 
Men's Spring Summer Trends.
Men's Spring Summer Trends.Men's Spring Summer Trends.
Men's Spring Summer Trends.Jenna Thomas
 
Apps For U Presentation Pitch
Apps For U Presentation PitchApps For U Presentation Pitch
Apps For U Presentation PitchFifeCollege
 
Fife College, Namjar, Apps for Good Presentation
Fife College, Namjar, Apps for Good PresentationFife College, Namjar, Apps for Good Presentation
Fife College, Namjar, Apps for Good PresentationFifeCollege
 
Agri implements
Agri implementsAgri implements
Agri implementsanitakhan
 
инженерия психики
инженерия психикиинженерия психики
инженерия психикиAnatoly Tkachev
 
vector application
vector applicationvector application
vector applicationrajat shukla
 

En vedette (17)

Zeus Presentation Pitch 2014
Zeus Presentation Pitch 2014Zeus Presentation Pitch 2014
Zeus Presentation Pitch 2014
 
Sunummm
SunummmSunummm
Sunummm
 
5 alive competition presentation
5 alive competition presentation5 alive competition presentation
5 alive competition presentation
 
Sonic shockwave presentation
Sonic shockwave presentationSonic shockwave presentation
Sonic shockwave presentation
 
Us beegees competiton presentation
Us beegees competiton presentationUs beegees competiton presentation
Us beegees competiton presentation
 
CULTURA, CIUDAD, ACCIÓN COLECTIVA
CULTURA, CIUDAD, ACCIÓN COLECTIVACULTURA, CIUDAD, ACCIÓN COLECTIVA
CULTURA, CIUDAD, ACCIÓN COLECTIVA
 
QA-2014-Tibet-SD-PPT
QA-2014-Tibet-SD-PPTQA-2014-Tibet-SD-PPT
QA-2014-Tibet-SD-PPT
 
Ashapura industries
Ashapura industriesAshapura industries
Ashapura industries
 
Men's Spring Summer Trends.
Men's Spring Summer Trends.Men's Spring Summer Trends.
Men's Spring Summer Trends.
 
Apps For U Presentation Pitch
Apps For U Presentation PitchApps For U Presentation Pitch
Apps For U Presentation Pitch
 
Fife College, Namjar, Apps for Good Presentation
Fife College, Namjar, Apps for Good PresentationFife College, Namjar, Apps for Good Presentation
Fife College, Namjar, Apps for Good Presentation
 
Sifat termal-bahan
Sifat termal-bahanSifat termal-bahan
Sifat termal-bahan
 
Agri implements
Agri implementsAgri implements
Agri implements
 
инженерия психики
инженерия психикиинженерия психики
инженерия психики
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
vector application
vector applicationvector application
vector application
 

Similaire à Fife College, French Toast Mafia, Apps for Good Presentation

Privacy and protection of children in relation raudhat
Privacy and protection of children in relation raudhatPrivacy and protection of children in relation raudhat
Privacy and protection of children in relation raudhatRaudhat-Rahma Shittu-Agbetola
 
Blue Coat 2013 Systems Mobile Malware Report
Blue Coat 2013 Systems Mobile Malware ReportBlue Coat 2013 Systems Mobile Malware Report
Blue Coat 2013 Systems Mobile Malware ReportContent Rules, Inc.
 
How your data can be used against you #DataScienceWeek presentation by Leigh-...
How your data can be used against you #DataScienceWeek presentation by Leigh-...How your data can be used against you #DataScienceWeek presentation by Leigh-...
How your data can be used against you #DataScienceWeek presentation by Leigh-...Leigh-Chantelle
 
FDMK 320 C3P4 Marketing Breif
FDMK 320 C3P4 Marketing BreifFDMK 320 C3P4 Marketing Breif
FDMK 320 C3P4 Marketing BreifJennifer Dunbar
 
Safety Net: A Parent's Guide (Infographic)
Safety Net: A Parent's Guide (Infographic)Safety Net: A Parent's Guide (Infographic)
Safety Net: A Parent's Guide (Infographic)uKnow.com
 
Fingerpay
FingerpayFingerpay
FingerpayAnand B
 
Mobile computing application risks in Zimbabwe
Mobile computing application risks in ZimbabweMobile computing application risks in Zimbabwe
Mobile computing application risks in ZimbabweIOSR Journals
 
Digital Footprint in our world
Digital Footprint in our worldDigital Footprint in our world
Digital Footprint in our worldJustino Lourenço
 
ET 509 Portfolio Assignment Internet Safety PPT Presentation for Staff Profes...
ET 509 Portfolio Assignment Internet Safety PPT Presentation for Staff Profes...ET 509 Portfolio Assignment Internet Safety PPT Presentation for Staff Profes...
ET 509 Portfolio Assignment Internet Safety PPT Presentation for Staff Profes...mulingoh
 
Gemalto Building Trust in Mobile Apps The Consumer Perspecti.docx
Gemalto Building Trust in  Mobile Apps The Consumer Perspecti.docxGemalto Building Trust in  Mobile Apps The Consumer Perspecti.docx
Gemalto Building Trust in Mobile Apps The Consumer Perspecti.docxhanneloremccaffery
 
Digital footprint@wse march13
Digital footprint@wse march13Digital footprint@wse march13
Digital footprint@wse march13Justino Lourenço
 
Mobile Marketing Automation
Mobile Marketing AutomationMobile Marketing Automation
Mobile Marketing Automationsalesmanago
 
9.2 Group 1 Apps for Good Competition Entry 2015
9.2 Group 1 Apps for Good Competition Entry 20159.2 Group 1 Apps for Good Competition Entry 2015
9.2 Group 1 Apps for Good Competition Entry 2015scorkery
 
11 Reasons Why Your Company Could Be In Danger
11 Reasons Why Your Company Could Be In Danger11 Reasons Why Your Company Could Be In Danger
11 Reasons Why Your Company Could Be In DangerCopper Mobile, Inc.
 
The ABCs of Mobile App Fraud
The ABCs of Mobile App FraudThe ABCs of Mobile App Fraud
The ABCs of Mobile App FraudJames Nichols
 

Similaire à Fife College, French Toast Mafia, Apps for Good Presentation (20)

Privacy and protection of children in relation raudhat
Privacy and protection of children in relation raudhatPrivacy and protection of children in relation raudhat
Privacy and protection of children in relation raudhat
 
Blue Coat 2013 Systems Mobile Malware Report
Blue Coat 2013 Systems Mobile Malware ReportBlue Coat 2013 Systems Mobile Malware Report
Blue Coat 2013 Systems Mobile Malware Report
 
How your data can be used against you #DataScienceWeek presentation by Leigh-...
How your data can be used against you #DataScienceWeek presentation by Leigh-...How your data can be used against you #DataScienceWeek presentation by Leigh-...
How your data can be used against you #DataScienceWeek presentation by Leigh-...
 
FDMK 320 C3P4 Marketing Breif
FDMK 320 C3P4 Marketing BreifFDMK 320 C3P4 Marketing Breif
FDMK 320 C3P4 Marketing Breif
 
Safety Net: A Parent's Guide (Infographic)
Safety Net: A Parent's Guide (Infographic)Safety Net: A Parent's Guide (Infographic)
Safety Net: A Parent's Guide (Infographic)
 
Fingerpay
FingerpayFingerpay
Fingerpay
 
Mobile computing application risks in Zimbabwe
Mobile computing application risks in ZimbabweMobile computing application risks in Zimbabwe
Mobile computing application risks in Zimbabwe
 
Digital Footprint in our world
Digital Footprint in our worldDigital Footprint in our world
Digital Footprint in our world
 
ET 509 Portfolio Assignment Internet Safety PPT Presentation for Staff Profes...
ET 509 Portfolio Assignment Internet Safety PPT Presentation for Staff Profes...ET 509 Portfolio Assignment Internet Safety PPT Presentation for Staff Profes...
ET 509 Portfolio Assignment Internet Safety PPT Presentation for Staff Profes...
 
Gemalto Building Trust in Mobile Apps The Consumer Perspecti.docx
Gemalto Building Trust in  Mobile Apps The Consumer Perspecti.docxGemalto Building Trust in  Mobile Apps The Consumer Perspecti.docx
Gemalto Building Trust in Mobile Apps The Consumer Perspecti.docx
 
Digital footprint@wse march13
Digital footprint@wse march13Digital footprint@wse march13
Digital footprint@wse march13
 
Mobile Marketing Automation
Mobile Marketing AutomationMobile Marketing Automation
Mobile Marketing Automation
 
Designing for Privacy
Designing for PrivacyDesigning for Privacy
Designing for Privacy
 
Designing for Privacy
Designing for PrivacyDesigning for Privacy
Designing for Privacy
 
9.2 Group 1 Apps for Good Competition Entry 2015
9.2 Group 1 Apps for Good Competition Entry 20159.2 Group 1 Apps for Good Competition Entry 2015
9.2 Group 1 Apps for Good Competition Entry 2015
 
11 Reasons Why Your Company Could Be In Danger
11 Reasons Why Your Company Could Be In Danger11 Reasons Why Your Company Could Be In Danger
11 Reasons Why Your Company Could Be In Danger
 
Cybersafey
Cybersafey Cybersafey
Cybersafey
 
Pace IT - Secure Mobile Devices
Pace IT - Secure Mobile DevicesPace IT - Secure Mobile Devices
Pace IT - Secure Mobile Devices
 
Cyber ethics
Cyber ethicsCyber ethics
Cyber ethics
 
The ABCs of Mobile App Fraud
The ABCs of Mobile App FraudThe ABCs of Mobile App Fraud
The ABCs of Mobile App Fraud
 

Plus de FifeCollege

The Sprites 2014 Presetation Pitch
The Sprites 2014 Presetation PitchThe Sprites 2014 Presetation Pitch
The Sprites 2014 Presetation PitchFifeCollege
 
Sonic shockwave presentation
Sonic shockwave presentationSonic shockwave presentation
Sonic shockwave presentationFifeCollege
 
Citrus apps competition presentation
Citrus apps competition presentationCitrus apps competition presentation
Citrus apps competition presentationFifeCollege
 
Fife College - The Cats Meow - Apps for Good presentation
Fife College - The Cats Meow - Apps for Good presentation Fife College - The Cats Meow - Apps for Good presentation
Fife College - The Cats Meow - Apps for Good presentation FifeCollege
 
A team competition presentation
A team competition presentationA team competition presentation
A team competition presentationFifeCollege
 
The Dark Fire Stars Pitch Presentation
The Dark Fire Stars Pitch Presentation The Dark Fire Stars Pitch Presentation
The Dark Fire Stars Pitch Presentation FifeCollege
 
Ict journal layout
Ict journal layoutIct journal layout
Ict journal layoutFifeCollege
 

Plus de FifeCollege (7)

The Sprites 2014 Presetation Pitch
The Sprites 2014 Presetation PitchThe Sprites 2014 Presetation Pitch
The Sprites 2014 Presetation Pitch
 
Sonic shockwave presentation
Sonic shockwave presentationSonic shockwave presentation
Sonic shockwave presentation
 
Citrus apps competition presentation
Citrus apps competition presentationCitrus apps competition presentation
Citrus apps competition presentation
 
Fife College - The Cats Meow - Apps for Good presentation
Fife College - The Cats Meow - Apps for Good presentation Fife College - The Cats Meow - Apps for Good presentation
Fife College - The Cats Meow - Apps for Good presentation
 
A team competition presentation
A team competition presentationA team competition presentation
A team competition presentation
 
The Dark Fire Stars Pitch Presentation
The Dark Fire Stars Pitch Presentation The Dark Fire Stars Pitch Presentation
The Dark Fire Stars Pitch Presentation
 
Ict journal layout
Ict journal layoutIct journal layout
Ict journal layout
 

Dernier

How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesThousandEyes
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfIngrid Airi González
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfMounikaPolabathina
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsRavi Sanghani
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch TuesdayIvanti
 
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...panagenda
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPathCommunity
 
Data governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationData governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationKnoldus Inc.
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterMydbops
 
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...AliaaTarek5
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demoHarshalMandlekar2
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersNicole Novielli
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentPim van der Noll
 
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...Scott Andery
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsNathaniel Shimoni
 

Dernier (20)

How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdf
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdf
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and Insights
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch Tuesday
 
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to Hero
 
Data governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationData governance with Unity Catalog Presentation
Data governance with Unity Catalog Presentation
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL Router
 
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demo
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software Developers
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
 
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directions
 

Fife College, French Toast Mafia, Apps for Good Presentation

  • 1. Protection Against Predators By Lee Anderson, Michael Jardine, Ethan Thomson, Daniel McDonald and Colvin Morrison
  • 3. Problem? Yes, the problem is there is a growing number of young children gaining access to the internet and are being put at risk against Cyber bullies or predators.
  • 4. How can we protect the youth on the internet?
  • 5. We can protect the youth on the internet by having a fail safe system in place that can alert parents their children are in danger and allow them to take further action!
  • 6. We are students from Fife College and Our idea is based around the fact that more and more children have access to the internet via all the new devices whether it is smart phones or tablets or even the good old fashioned PC. With all this new flood of internet accessible devices parents can be placed into a position of worry about whom their kids are talking too exactly. There are growing numbers of children who are at risk of internet predators and or cyber bullying; both are topics that are hard to bring up with their parents. Our app is going to ensure that parents can at least get some form of peace of mind. When a child is targeted whether it be a predator or cyber bully our app will recognise key words and phrases mentioned and automatically take a snap shot of the screen then send it to the parents phone.
  • 7. Our potential users all agreed on the benefits of this app, they gave slightly different feedback on the app with some saying it should be an additional feature provided by your network and some saying it should be optional download from an apps store.
  • 8. Mobile Spy is the most similar app we could find. This app is expensive and based on a subscription fee putting allot of potential buyers off. This app is also marketed around being a spy app which is an invasion of privacy and potentially illegal.
  • 9. The core feature of this app is going to be the ability to recognise key words and phrases with the key logger and determine if they pose a threat to the user.
  • 10.
  • 11.
  • 12. MENU
  • 13.
  • 14.
  • 15.
  • 16.
  • 17. The technical feasibility will be reliant on a key logging technology that is available. The data this app will generate will be from the users logs of potentially harmful conversations.
  • 18. The business model is based off building an app which its number one priority is the protection of young venerable internet users. We got 13 customer pledges from people who were interested in seeing this app being made.
  • 19. We done an online survey highlighting the the needs and expectations of the potential users. The best market strategy for the selling of this app would be to have a high add campaign to raise awareness of this app.
  • 21. We asked what people would be willing to pay for this app and most people agree on the £0.69 to £1.99 price range making the app affordable for all parents
  • 22. 83.33% of people we asked agree that this app is about the protection of venerable children