Original Research
A four-component methodology for protecting children online: structured education, behavioral training, community deployment, and child-initiated safety tools. Developed by Mark Kihu, MS Cybersecurity, MMEC Solutions LLC.
Existing approaches to child online safety split into two camps. Surveillance tools (Bark, Circle, Qustodio) monitor children's communications and report to parents. Awareness programs (school assemblies, one-off workshops) teach children about risks in a classroom and then send them home. Neither camp addresses what actually happens at the point of vulnerability: a child in a conversation that is slowly becoming coercive, trying to decide if something is wrong, with no immediate tool to help them think it through.
The Family Digital Safety Framework is built around a different premise: that lasting protection comes from education, behavioral practice, family participation, and a child's own ability to recognize and respond to coercive patterns. Not from monitoring their communications after the fact. Each component of the framework is designed to work independently and reinforce the others when deployed together.
The framework is grounded in research on sextortion patterns in youth digital communications and in field deployment through school and community partnerships across West Michigan.
The Framework
Each component targets a different layer of the problem: knowledge, habit, crisis response, and institutional reach.
Age-specific courses delivered free through the CyMMEC platform. Teens learn to recognize manipulation, grooming, and sextortion tactics. Parents learn what their children are actually facing. Seniors learn to identify and avoid the scams targeting them most. All courses use plain language and are designed for people without a technical background.
What this delivers
A set of facilitator-ready resources (workshop guides, printable activity sheets, structured conversation prompts, and lesson plans) designed for educators, school counselors, after-school program staff, and parent group facilitators. These materials allow the framework to reach children in institutional settings without requiring technology or internet access.
What this delivers
A structured assessment tool that helps families identify their specific vulnerabilities and receive a personalized action plan. Families answer questions about their devices, habits, and communication patterns. The system returns targeted, prioritized guidance specific to their household. Not a generic checklist. No surveillance, no account required, no data stored.
What this delivers
A tool that helps children recognize coercive patterns in their online interactions in real time, without monitoring their communications. The child brings a conversation or situation to the tool and receives a structured analysis of whether coercive tactics are present: secrecy demands, urgency pressure, isolation from trusted adults, and threat-based escalation. The child decides what to do next. No data is transmitted. No parent receives a report unless the child chooses to share one.
What this delivers
Design Philosophy
The framework is built around four principles that separate it from surveillance-based tools and one-off awareness programs.
The framework's tools are designed to be used by the child, not deployed on the child. Monitoring communications builds distrust and is evaded. Empowering children with pattern recognition builds a skill that persists across every platform and device they will ever use.
Protection that only reaches the child misses half the equation. The framework includes components for parents and caregivers. Not as monitors, but as informed participants who understand the threats their children face and know how to have the conversations that matter.
Schools cannot guarantee device access, bandwidth, or parental consent for digital tools. Component 2 of the framework is designed to be fully deployable in a classroom with nothing but printed materials and a facilitator. This is how the framework reaches the children who need it most.
Knowing that grooming exists does not protect a child who is in the middle of it. The framework includes scenario-based practice so that recognizing a coercive pattern becomes a trained response, not a knowledge exercise. Awareness fades. Behavioral training stays.
Child safety should not require a subscription. Every course, tool, and resource in this framework is free to use, with no account required. The families who need this most are often the ones least able to pay for it. The framework is funded through voluntary support, not access fees.
The framework is grounded in graduate research on sextortion patterns in youth digital communications and is being tested in partnership with middle school and after-school programs in West Michigan. It is not a theoretical model. It is a working deployment that improves through real-world feedback.
Current Deployment
The framework is currently being deployed through Stemming Ideas, a nonprofit delivering weekly CS and STEM education to students in grades 5–12 across partner schools in the Kentwood and Godwin Heights districts.
Research Foundation
The framework's design is informed by graduate research on sextortion patterns in youth digital communications, conducted as part of an MS in Cybersecurity at Grand Valley State University. That research examined the specific tactical patterns (secrecy framing, urgency escalation, isolation from trusted adults, and threat-based coercion) that characterize online sexual exploitation targeting minors. Component 4 of the framework is a direct application of those findings to a child-facing tool.
The community deployment model draws on over a decade of experience building and scaling behavior-change programs in underserved communities. That work (growing a national home internet education and retention system from near zero to wide reach across Kenya) established the operational model for how this framework is structured: community-embedded, relationship-based, and designed for the people who need it most, not the people who can already afford protection.
A peer-reviewed paper on sextortion patterns and community intervention frameworks is in preparation with a co-author from the Graduate School of Computing and Information Systems at Grand Valley State University.
Graduate Research
MS Cybersecurity, Grand Valley State University
School Deployment
Stemming Ideas, Godwin Heights & Kentwood Districts
Operational Background
Safaricom PLC, Home Internet Retention Program
In Preparation
Peer-reviewed paper on sextortion and community intervention
Start with your family
The free family checkup takes five minutes and gives you a personalized action plan based on your household's specific situation.
Start Free Checkup