Original Research

The Family Digital Safety Framework

A four-component methodology for protecting children online: structured education, behavioral training, community deployment, and child-initiated safety tools. Developed by Mark Kihu, MS Cybersecurity, MMEC Solutions LLC.

Most child safety tools do one of two things. This framework does something different.

Existing approaches to child online safety split into two camps. Surveillance tools (Bark, Circle, Qustodio) monitor children's communications and report to parents. Awareness programs (school assemblies, one-off workshops) teach children about risks in a classroom and then send them home. Neither camp addresses what actually happens at the point of vulnerability: a child in a conversation that is slowly becoming coercive, trying to decide if something is wrong, with no immediate tool to help them think it through.

The Family Digital Safety Framework is built around a different premise: that lasting protection comes from education, behavioral practice, family participation, and a child's own ability to recognize and respond to coercive patterns. Not from monitoring their communications after the fact. Each component of the framework is designed to work independently and reinforce the others when deployed together.

The framework is grounded in research on sextortion patterns in youth digital communications and in field deployment through school and community partnerships across West Michigan.

The Framework

Four components. One integrated approach.

Each component targets a different layer of the problem: knowledge, habit, crisis response, and institutional reach.

01
Structured Education

Online courses for every family member

Age-specific courses delivered free through the CyMMEC platform. Teens learn to recognize manipulation, grooming, and sextortion tactics. Parents learn what their children are actually facing. Seniors learn to identify and avoid the scams targeting them most. All courses use plain language and are designed for people without a technical background.

What this delivers

Foundational knowledge of online manipulation tactics
Age-appropriate language for every family member
Progress tracking and quiz-based reinforcement
Live: Cyber Navigators (Ages 11–13)
02
Institutional Toolkit

Offline materials for schools and community programs

A set of facilitator-ready resources (workshop guides, printable activity sheets, structured conversation prompts, and lesson plans) designed for educators, school counselors, after-school program staff, and parent group facilitators. These materials allow the framework to reach children in institutional settings without requiring technology or internet access.

What this delivers

Facilitator guides and printable workshop materials
Structured discussion prompts for classroom use
No technology required. Fully deployable offline.
In development. Field testing at partner schools.
03
Family Assessment

Family safety checkup and guidance system

A structured assessment tool that helps families identify their specific vulnerabilities and receive a personalized action plan. Families answer questions about their devices, habits, and communication patterns. The system returns targeted, prioritized guidance specific to their household. Not a generic checklist. No surveillance, no account required, no data stored.

What this delivers

Personalized risk profile based on household specifics
Prioritized guidance matched to each family's situation
No account, no monitoring, no data collection
04
Child-Initiated Tool

On-device support tool, child-initiated, no monitoring

A tool that helps children recognize coercive patterns in their online interactions in real time, without monitoring their communications. The child brings a conversation or situation to the tool and receives a structured analysis of whether coercive tactics are present: secrecy demands, urgency pressure, isolation from trusted adults, and threat-based escalation. The child decides what to do next. No data is transmitted. No parent receives a report unless the child chooses to share one.

What this delivers

Pattern recognition for grooming and sextortion tactics
Child-controlled. No surveillance, no parent reporting.
Structured guidance on next steps, including how to involve a trusted adult
In development. Design specification in progress.

Design Philosophy

What makes this approach different from what already exists

The framework is built around four principles that separate it from surveillance-based tools and one-off awareness programs.

Child empowerment over surveillance

The framework's tools are designed to be used by the child, not deployed on the child. Monitoring communications builds distrust and is evaded. Empowering children with pattern recognition builds a skill that persists across every platform and device they will ever use.

Family participation at every layer

Protection that only reaches the child misses half the equation. The framework includes components for parents and caregivers. Not as monitors, but as informed participants who understand the threats their children face and know how to have the conversations that matter.

School-deployable without technology

Schools cannot guarantee device access, bandwidth, or parental consent for digital tools. Component 2 of the framework is designed to be fully deployable in a classroom with nothing but printed materials and a facilitator. This is how the framework reaches the children who need it most.

Behavioral training, not just awareness

Knowing that grooming exists does not protect a child who is in the middle of it. The framework includes scenario-based practice so that recognizing a coercive pattern becomes a trained response, not a knowledge exercise. Awareness fades. Behavioral training stays.

Free to access, always

Child safety should not require a subscription. Every course, tool, and resource in this framework is free to use, with no account required. The families who need this most are often the ones least able to pay for it. The framework is funded through voluntary support, not access fees.

Evidence-based and field-tested

The framework is grounded in graduate research on sextortion patterns in youth digital communications and is being tested in partnership with middle school and after-school programs in West Michigan. It is not a theoretical model. It is a working deployment that improves through real-world feedback.

Current Deployment

Active in West Michigan schools and after-school programs

The framework is currently being deployed through Stemming Ideas, a nonprofit delivering weekly CS and STEM education to students in grades 5–12 across partner schools in the Kentwood and Godwin Heights districts.

4
Partner Schools
5–12
Grade Range
2
Districts

Research Foundation

Built on graduate research and a decade of community-scale deployment experience

The framework's design is informed by graduate research on sextortion patterns in youth digital communications, conducted as part of an MS in Cybersecurity at Grand Valley State University. That research examined the specific tactical patterns (secrecy framing, urgency escalation, isolation from trusted adults, and threat-based coercion) that characterize online sexual exploitation targeting minors. Component 4 of the framework is a direct application of those findings to a child-facing tool.

The community deployment model draws on over a decade of experience building and scaling behavior-change programs in underserved communities. That work (growing a national home internet education and retention system from near zero to wide reach across Kenya) established the operational model for how this framework is structured: community-embedded, relationship-based, and designed for the people who need it most, not the people who can already afford protection.

A peer-reviewed paper on sextortion patterns and community intervention frameworks is in preparation with a co-author from the Graduate School of Computing and Information Systems at Grand Valley State University.

Graduate Research

MS Cybersecurity, Grand Valley State University

Master's project focused on sextortion patterns in youth digital communications. April 2025. Provides the evidence base for Component 4 of this framework.

School Deployment

Stemming Ideas, Godwin Heights & Kentwood Districts

Weekly CS and STEM education across Godwin Heights Middle School and Kentwood ARCH after-school programs (Valleywood, Pinewood, and Crestwood Middle Schools). Grades 5–12.

Operational Background

Safaricom PLC, Home Internet Retention Program

Built the home internet retention function from the ground up. Grew product revenue from $87K to $17.4M annually. Scaled team to 25 specialists. Sustained 80%+ retention rates. 2013–2022.

In Preparation

Peer-reviewed paper on sextortion and community intervention

Co-authored with faculty from the GVSU School of Computing and Information Systems. Addresses community-level intervention gaps and the design of family-facing safety frameworks.

Start with your family

Find out which parts of the framework your family needs most.

The free family checkup takes five minutes and gives you a personalized action plan based on your household's specific situation.

Start Free Checkup