Blog
About

168
views
0
recommends
+1 Recommend
1 collections
    4
    shares
      • Record: found
      • Abstract: found
      • Conference Proceedings: found
      Is Open Access

      Child-Centered Security

      1 , 1 , 1

      Proceedings of the 30th International BCS Human Computer Interaction Conference (HCI)

      Fusion

      11 - 15 July 2016

      Child-centered security, child-centred security, computer security, child computer interaction

      Read this article at

      Bookmark
          There is no author summary for this article yet. Authors can add summaries to their articles on ScienceOpen to make them more accessible to a non-specialist audience.

          Abstract

          Children are spending more time online through the use of digital toys, games and the internet. These activities make children potentially vulnerable to security threats. This position paper puts forward an argument for and against creating a new research discipline in child-centered security, as a fusion of user-centered security and child computer interaction.

          Related collections

          Most cited references 10

          • Record: found
          • Abstract: not found
          • Conference Proceedings: not found

          User-centered security

            Bookmark
            • Record: found
            • Abstract: not found
            • Conference Proceedings: not found

            User-Centered Security: Stepping Up to the Grand Challenge

             M.E. Zurko (2005)
              Bookmark
              • Record: found
              • Abstract: not found
              • Article: not found

              Under my Pillow – Designing Security for Children‟s Special Things

               J. Read,  R Beale,  J. READ (2009)
                Bookmark

                Author and article information

                Contributors
                Conference
                July 2016
                July 2016
                : 1-3
                Affiliations
                University of Central Lancashire

                Preston, UK
                Article
                10.14236/ewic/HCI2016.59
                © Dempsey et al. Published by BCS Learning and Development Ltd. Proceedings of British HCI 2016 Conference Fusion, Bournemouth, UK

                This work is licensed under a Creative Commons Attribution 4.0 Unported License. To view a copy of this license, visit http://creativecommons.org/licenses/by/4.0/

                Proceedings of the 30th International BCS Human Computer Interaction Conference
                HCI
                30
                Bournemouth University, Poole, UK
                11 - 15 July 2016
                Electronic Workshops in Computing (eWiC)
                Fusion
                Product
                Product Information: 1477-9358BCS Learning & Development
                Self URI (journal page): https://ewic.bcs.org/
                Categories
                Electronic Workshops in Computing

                Comments

                Comment on this article