scispace - formally typeset
Search or ask a question
Proceedings ArticleDOI

Protecting teenagers from potential internet security threats

01 Dec 2013-pp 143-152
TL;DR: The purpose of this research is to investigate and identify the various cyber security threats which may affect the teenagers and propose the countermeasures to support them and their parents on how to avoid or deal with the cyberSecurity threats.
Abstract: Latest advancement in technologies has impacted the modern day teenagers both positively and negatively. One of the major impacts is the addiction to internet. The purpose of this research is to investigate and identify the various cyber security threats which may affect the teenagers and propose the countermeasures to support them and their parents on how to avoid or deal with the cyber security threats. Qualitative and quantitative methods have been used to analyze the internet usage patterns of the Emirati teenagers, the awareness that the Emirati teenagers have on the various cyber security threats and ways to deal with them. Recommendations were made based on the findings.
Citations
More filters
Journal ArticleDOI
TL;DR: A systematic literature review on cybersecurity awareness for children is performed, analyzing 56 peer-reviewed studies that report in depth on various cybersecurity risks and awareness-raising approaches.

49 citations

Journal Article

7 citations

Book ChapterDOI
17 Jun 2020
TL;DR: In this article, the authors investigate and further develop new knowledge and tools that will be helpful and effective to teach the children about cyber security by performing various gamified actions in a playful, engaging and motivating manner.
Abstract: With the advancement of technology and the development of new tools, games, applications and social media sites, it is getting difficult every day to keep up with threats and vulnerabilities associated with these tools, apps or websites, especially for children. This paper provides an overview of the challenges in cyber security education for children. The goal of this research is to investigate and further develop new knowledge and tools that will be helpful and effective to teach the children about cyber security by performing various gamified actions in a playful, engaging and motivating manner. The methodology of this research would be both qualitative and quantitative, using interviews, questionnaires, focus group and observations. Initially, this project will define the theoretical and existing practices of cyber security awareness education for children. In the next phase, this research will design and implement interventions based on learning activities like workshops and collaborative tasks; followed by empirical test and evaluation of the proposed interventions.

5 citations

Proceedings ArticleDOI
21 Jun 2020
TL;DR: The goal of this research is to investigate and further develop new knowledge and tools that will be helpful and effective to teach the children about cyber security by performing various gamified actions in a playful, engaging and motivating manner.
Abstract: With the advancement of technology and the development of new tools, games, applications and social media sites, it is getting difficult every day to keep up with threats and vulnerabilities associated with these tools, apps or websites, especially for children. The goal of this research is to investigate and further develop new knowledge and tools that will be helpful and effective to teach the children about cyber security by performing various gamified actions in a playful, engaging and motivating manner. The methodology of this research would be both qualitative and quantitative, using interviews, questionnaires, focus group and observations. Initially, this project will define the theoretical and existing practices of cyber security awareness education for children. In the next phase, this research will design and implement interventions based on learning activities like workshops and collaborative tasks; followed by empirical test and evaluation of the proposed interventions.

1 citations


Cites background from "Protecting teenagers from potential..."

  • ...through search engines, online advertisements and social networking websites such as Facebook, Twitter and lots of other websites [1]....

    [...]

Posted Content
TL;DR: In this article, the authors investigate the quality aspects that are of interest for children, as quality is a crucial aspect in the development of any kind of software, especially for stakeholders like children, and propose effective ways in which children can be involved in software engineering activities as stakeholders.
Abstract: Background: A growing amount of software is available to children today. Children use both software that has been explicitly developed for them and software for general users. While they obtain clear benefits from software, such as access to creativity tools and learning resources, children are also exposed to several risks and disadvantages, such as privacy violation, inactivity, or safety risks that can even lead to death. The research and development community is addressing and investigating positive and negative impacts of software for children one by one, but no comprehensive model exists that relates software engineering and children as stakeholders in their own right. Aims: The final objective of this line of research is to propose effective ways in which children can be involved in Software Engineering activities as stakeholders. Specifically, in this paper, we investigate the quality aspects that are of interest for children, as quality is a crucial aspect in the development of any kind of software, especially for stakeholders like children. Method: Our contribution is based mainly on an analysis of studies at the intersection between Software Engineering (especially software quality) and Child Computer Interaction. Results: We identify a set of qualities and a preliminary set of guidelines that can be used by researchers and practitioners in understanding the complex interrelations between Software Engineering and children. Based on the qualities and the guidelines, researchers can design empirical investigations to obtain deeper insights into the phenomenon and propose new Software Engineering knowledge specific for this type of stakeholders. Conclusions: This conceptualization is a first step towards a framework to support children as stakeholders in software engineering.

1 citations

References
More filters
Book
01 Jun 1991
TL;DR: A new architecture for controlling mobile robots is described, building a robust and flexible robot control system that has been used to control a mobile robot wandering around unconstrained laboratory areas and computer machine rooms.
Abstract: A new architecture for controlling mobile robots is described. Layers of control system are built to let the robot operate at increasing levels of competence. Layers are made up of asynchronous modules that communicate over low-bandwidth channels. Each module is an instance of a fairly simple computational machine. Higher-level layers can subsume the roles of lower levels by suppressing their outputs. However, lower levels continue to function as higher levels are added. The result is a robust and flexible robot control system. The system has been used to control a mobile robot wandering around unconstrained laboratory areas and computer machine rooms. Eventually it is intended to control a robot that wanders the office areas of our laboratory, building maps of its surroundings using an onboard arm to perform simple tasks.

7,759 citations

Journal ArticleDOI
01 Mar 1986
TL;DR: In this paper, a new architecture for controlling mobile robots is described, which is made up of asynchronous modules that communicate over low-bandwidth channels, each module is an instance of a fairly simple computational machine.
Abstract: A new architecture for controlling mobile robots is described. Layers of control system are built to let the robot operate at increasing levels of competence. Layers are made up of asynchronous modules that communicate over low-bandwidth channels. Each module is an instance of a fairly simple computational machine. Higher-level layers can subsume the roles of lower levels by suppressing their outputs. However, lower levels continue to function as higher levels are added. The result is a robust and flexible robot control system. The system has been used to control a mobile robot wandering around unconstrained laboratory areas and computer machine rooms. Eventually it is intended to control a robot that wanders the office areas of our laboratory, building maps of its surroundings using an onboard arm to perform simple tasks.

7,291 citations

Book ChapterDOI
Pavel Berkhin1
01 Jan 2006
TL;DR: This survey concentrates on clustering algorithms from a data mining perspective as a data modeling technique that provides for concise summaries of the data.
Abstract: Clustering is the division of data into groups of similar objects. In clustering, some details are disregarded in exchange for data simplification. Clustering can be viewed as a data modeling technique that provides for concise summaries of the data. Clustering is therefore related to many disciplines and plays an important role in a broad range of applications. The applications of clustering usually deal with large datasets and data with many attributes. Exploration of such data is a subject of data mining. This survey concentrates on clustering algorithms from a data mining perspective.

3,047 citations

Journal ArticleDOI
TL;DR: This paper surveys the major Web data extraction approaches and compares them in three dimensions: the task domain, the automation degree, and the techniques used and believes these criteria provide qualitatively measures to evaluate various IE approaches.
Abstract: The Internet presents a huge amount of useful information which is usually formatted for its users, which makes it difficult to extract relevant data from various sources. Therefore, the availability of robust, flexible information extraction (IE) systems that transform the Web pages into program-friendly structures such as a relational database will become a great necessity. Although many approaches for data extraction from Web pages have been developed, there has been limited effort to compare such tools. Unfortunately, in only a few cases can the results generated by distinct tools be directly compared since the addressed extraction tasks are different. This paper surveys the major Web data extraction approaches and compares them in three dimensions: the task domain, the automation degree, and the techniques used. The criteria of the first dimension explain why an IE system fails to handle some Web sites of particular structures. The criteria of the second dimension classify IE systems based on the techniques used. The criteria of the third dimension measure the degree of automation for IE systems. We believe these criteria provide qualitatively measures to evaluate various IE approaches

855 citations

Book
01 Aug 2008
TL;DR: In this article, the authors focus on the way technology can facilitate or magnify bullying behavior, and provide information, guidelines, and resources to give students the protection they need from cyberbullying.
Abstract: "Cyberbullying is a significant concern for teens and tweens in the 21st century. This timely and informative book brings adults up to speed on how kids are using technology to harm their peers."-Tina Meier, Cyberbullying ActivistFounder, The Megan Meier Foundation"School leaders need information about cyberbullying and resources on how to protect children. This book provides timely research, best practices, and personal voices from students that will go a long way toward improving student safety."-Gail Connelly, Executive DirectorNational Association of Elementary School Principals"Hinduja and Patchin are two of the most respected researchers on cyberbullying. This book contains the best practices that principals can implement at their schools to prevent and respond to acts of cyberbullying."-Gerald N. Tirozzi, Executive DirectorNational Association of Secondary School PrincipalsIdentify the warning signs of cyberbullying and prevent inappropriate behaviors!Cyberbullying is the intentional and repeated act of causing harm to others through the use of computers, cell phones, and other electronic devices. The authors help educators understand the potential consequences of this deliberate behavior and present strategies for effective identification, prevention, and response.Focusing on the way technology can facilitate or magnify bullying behavior, this comprehensive resource offers information, guidelines, and resources to give students the protection they need. Written by leading experts, this groundbreaking book offers the voices of youth affected by or involved in real cyberbullying incidents and includes:Illustrations of what cyberbullying looks likeTips for identifying cyberbullies or targets"Breakout boxes" highlighting hundreds of anti-cyberbullying strategies A review of current research and legal rulingsStrategies for responsible social networking Follow-up reflection questions in each chapterGuidelines for working with parents and law enforcementBullying Beyond the Schoolyard helps educators confront technology-based aggression and ensure the safe and responsible use of computers and the Internet.

762 citations


"Protecting teenagers from potential..." refers background in this paper

  • ...According to (Erwin-Jones 2008; Hinduja and Patchin 2009) cyber bullying can take up various forms and they are as below:...

    [...]