Process Flow of Easy-Clicks


Current Process Flow

Curr_ProcessFlow


Solution Process Flow

ProcessFlow


Major Functional Component Diagram

Major Functional Component Diagram


    Account Setup Notes


    The are two account options for this extension:
    Guardian(s) - A user in charge of managing content on a user's homepage and what pages are accessible by the user.
    Protected User(s) - The person in need of monitoring, restrictions, and easy navigation.
    After the two accounts have been made, the Guardian is then responsible for linking the accounts using an account access code.
    The Guardian will also be given the choice to set up a contact list of trusted users for the protected user.

    Guardian Control Options


    To ensure the safety of the protected user(s) Easy-Clicks will not permit the protected user(s) to access any links that are not
    added to the allowlist either by Guardian permission or recommendation of Easy-Clicks.

    Guardians have two options of permitting styles to suit their ideal monitoring preferences: Manual permitting and Automatic permitting.

    Additional features to help the Guardian protect and teach linked users include malware scans of site not already on the allowlist,
    notifications of activity and trend reports for blocked malicious sites and Guardian added blocklist sites.

    Automatic Permitting


    Automatic Permitting is a tradeoff between safety and convenience.

    This feature is for moments when the Guardian wants a more hands off approach. Automatic Permitting allows the
    protected user(s) to access any page that is not deemed malicious at anypoint while still notifying the Guardian of what was accessed.

    Compared to Manual Permitting this option does not give the Guardian a chance to assess if a site or action is suspicious.

    Manual Permitting


    The recommended option for this extension is the Manual Permitting setting.

    The advantage provided by Manual Permitting is that the Guardian can curate what sites the protected user can access.
    Not only for personal interests, but also defending from attacks that use tools that are not malicious.

    Picture this: You are a Guardian and you receive a notification that the account you are monitoring wants access to anydesk.com,
    perhaps you have no clue what this could be for so that prompts you to investigate and discover that it is a remote desktop software.
    Such an opportunity could then give you the chance to check on the protected user and investigate why they need such a software. The result
    being that this could potentially prevent attacks or scams from occurring.