+1 Recommend
1 collections

      Celebrating 65 years of The Computer Journal - free-to-read perspectives - bcs.org/tcj65

      • Record: found
      • Abstract: found
      • Conference Proceedings: found
      Is Open Access

      Child-Centered Security

      1 , 1 , 1
      Proceedings of the 30th International BCS Human Computer Interaction Conference (HCI)
      11 - 15 July 2016
      Child-centered security, child-centred security, computer security, child computer interaction


            Children are spending more time online through the use of digital toys, games and the internet. These activities make children potentially vulnerable to security threats. This position paper puts forward an argument for and against creating a new research discipline in child-centered security, as a fusion of user-centered security and child computer interaction.


            Author and article information

            July 2016
            July 2016
            : 1-3
            [0001]University of Central Lancashire

            Preston, UK
            © Dempsey et al. Published by BCS Learning and Development Ltd. Proceedings of British HCI 2016 Conference Fusion, Bournemouth, UK

            This work is licensed under a Creative Commons Attribution 4.0 Unported License. To view a copy of this license, visit http://creativecommons.org/licenses/by/4.0/

            Proceedings of the 30th International BCS Human Computer Interaction Conference
            Bournemouth University, Poole, UK
            11 - 15 July 2016
            Electronic Workshops in Computing (eWiC)

            1477-9358 BCS Learning & Development

            Self URI (article page): https://www.scienceopen.com/hosted-document?doi=10.14236/ewic/HCI2016.59
            Self URI (journal page): https://ewic.bcs.org/
            Electronic Workshops in Computing

            Applied computer science,Computer science,Security & Cryptology,Graphics & Multimedia design,General computer science,Human-computer-interaction
            Child-centered security,child-centred security,computer security,child computer interaction


            1. British Standards Institution 2010 BS EN ISO 9241-210-2010 Ergonomics of human-system interaction. Part 210: Human-centered design for interactive systems London BSI

            2. Department for Education 2013 National curriculum in England: computing programmes of study Available from https://www.gov.uk/government/publications/national-curriculum-in-england-computing-programmes-of-study/national-curriculum-in-england-computing-programmes-of-study 31 January 2016

            3. 2012 Protecting against data breaches; living with mistakes Communications of the ACM 55 6

            4. 2011 PLU-E: a proposed framework for planning and conducting evaluation studies with children BCS-HCI ’11: Proceedings of the 25th BCS Conference on Human-Computer Interaction

            5. Office for National Statistics. 2015 The impact of e-commerce on the UK economy Available from http://www.ons.gov.uk/ons/rel/rdit2/e-commerce-and-internet-use/analysis-at-uk-level/sty-the-impact-of-e-commerce-on-the-uk-economy-.html 31 January 2016

            6. Organisation for Economic Cooperation and Development (OECD) 2012 The Protection of Children Online: Report on risks faced by children online and policies to protect them Available from http://www.oecd.org/sti/ieconomy/childrenonline_with_cover.pdf 10thFebruary 2016

            7. 2005 The ABC of CCI (Child Computer Interaction) Interfaces 62 8 9

            8. 2009 Under my pillow: designing security for children’s special things BCS-HCI ’09: Proceedings of the 23rd British HCI Group Annual Conference on People and Computers: Celebrating People and Technology

            9. 2011 The nature of child computer interaction BCS-HCI ’11: Proceedings of the 25th BCS Conference on Human-Computer Interaction

            10. 2012 Designing Textual Password Systems for Children IDC ’12: Proceedings of the 11th International Conference on Interaction Design and Children

            11. 2013 The User IS the Enemy, and (S)he Keeps Reaching for that Bright Shiny Power Button! The Security and Privacy Impacts of Children and Childhood on Technology for the Home Workshop on Home Usable Privacy and Security

            12. 2005 User-Centered Security: Stepping Up to the Grand Challenge ACSAC ’05: Proceedings of the 21st Annual Computer Security Applications Conference

            13. 1996 User-Centered Security NSPW ’96: Proceedings of the 1996 workshop on New security paradigms


            Comment on this article