1,277
views
0
recommends
+1 Recommend
1 collections
    0
    shares

      Celebrating 65 years of The Computer Journal - free-to-read perspectives - bcs.org/tcj65

      scite_
       
      • Record: found
      • Abstract: found
      • Conference Proceedings: found
      Is Open Access

      Approaches and Technologies to Support Home Users’ Engagement with Cyber Security

      proceedings-article
      Proceedings of the 33rd International BCS Human Computer Interaction Conference (BCS HCI 2020)
      Human Computer Interaction
      6 July 2020
      Internet of Things, Parents, Children, Privacy, Cyber security, Cyber awareness schemes, Multi-use
      Bookmark

            Abstract

            “Approaches and Technologies to Support Home Users’ Engagement with Cyber Security” analyses the way in which UK families engage with cyber security when using home Internet of Things (IoT) devices. By determining the prevalence of devices in the home, how different family members use those devices, and what knowledge of cyber security those individuals have, it aims to expose specific needs in the improvement of device design, marketing or support; more targeted governmental policy, or regulation, where devices are used by both adults and children; and how best to address the need for further education, both for adults and children.

            Content

            Author and article information

            Contributors
            Conference
            July 2020
            July 2020
            : 58-61
            Affiliations
            [0001]School of Computing

            University of Kent

            Canterbury, UK
            Article
            10.14236/ewic/HCI20DC.14
            1f780aa7-6b29-42e7-8850-30df8d76538d
            © Turner. Published by BCS Learning & Development. Proceedings of the BCS HCI Doctoral Consortium 2020. Keele University, UK

            This work is licensed under a Creative Commons Attribution 4.0 Unported License. To view a copy of this license, visit http://creativecommons.org/licenses/by/4.0/

            Proceedings of the 33rd International BCS Human Computer Interaction Conference
            BCS HCI 2020
            33
            Keele University, UK
            6 July 2020
            Electronic Workshops in Computing (eWiC)
            Human Computer Interaction
            History
            Product

            1477-9358 BCS Learning & Development

            Self URI (article page): https://www.scienceopen.com/hosted-document?doi=10.14236/ewic/HCI20DC.14
            Self URI (journal page): https://ewic.bcs.org/
            Categories
            Electronic Workshops in Computing

            Applied computer science,Computer science,Security & Cryptology,Graphics & Multimedia design,General computer science,Human-computer-interaction
            Privacy,Internet of Things,Cyber security,Multi-use,Cyber awareness schemes,Children,Parents

            REFERENCES

            1. 2019 More than smart speakers: Security and privacy perceptions of smart home personal assistants Proceedings of the Fifteenth USENIX Conference on Usable Privacy and Security 451 466

            2. 2018 Discovering Smart Home Internet of Things Privacy Norms Using Contextual Integrity Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies 2 2 59 1 59 23 https://doi.org/10.1145/3214262

            3. 2015 Cyber Security Awareness Campaigns: Why do they fail to change behaviour? International Conference on Cyber Security for Sustainable Society 118 131

            4. 2020 Internet of things (IoT) platform competition: Consumer switching versus provider multihoming. Technovation, 90–91 102101 https://doi.org/10.1016/j.technovation.2019.102101

            5. 2019 What security features and crime prevention advice is communicated in consumer IoT device manuals and support pages? Journal of Cybersecurity 5 1 https://doi.org/10.1093/cybsec/tyz005

            6. 2018 The Spyware Used in Intimate Partner Violence 2018 IEEE Symposium on Security and Privacy (SP) 441 458 https://doi.org/10.1109/SP.2018.00061

            7. 2014 Parents’ and teens’ perspectives on privacy in a technology-filled world Proceedings of the Tenth USENIX Conference on Usable Privacy and Security 19 35

            8. Department for Digital, Culture, Media and Sport 2018 Code of Practice for Consumer IoT Security 24

            9. Department for Digital, Culture, Media and Sport 2020 July 16 Proposals for regulating consumer smart product cyber security—Call for views GOV.UK

            10. 2019 Exploring How Privacy and Security Factor into IoT Device Purchase Behavior Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems 1 12 https://doi.org/10.1145/3290605.3300764

            11. 2019 Media convergence, risk and harm to children online Doxa Comunicacion 28 179 199 https://doi.org/10.31921/doxacom.n28a10

            12. 2019 Who’s In Control? Interactions In Multi-User Smart Homes Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems 1 13 https://doi.org/10.1145/3290605.3300498

            13. 2018 Safety vs. Surveillance: What children have to say about mobile apps for parental control Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems https://doi.org/10.1145/3173574.3173698

            14. Information Commissioner’s Office. (n.d.). Age appropriate design: A code of practice for online services Retrieved 22 July 2020 from https://ico.org.uk/for-organisations/guide-to-data-protection/key-data-protection-themes/age-appropriate-design-a-code-of-practice-for-online-services/

            15. 2017 Enabling multi-user controls in smart home devices Proceedings of the 2017 Workshop on Internet of Things Security and Privacy 49 54 https://doi.org/10.1145/3139937.3139941

            16. 2019 IoT Technology and Smart Devices in the Home

            17. 2017 Maximizing Opportunities and Minimizing Risks for Children Online: The Role of Digital Skills in Emerging Strategies of Parental Mediation: Maximizing Opportunities and Minimizing Risks Journal of Communication 67 1 82 105 https://doi.org/10.1111/jcom.12277

            18. 2019 Technology and Family Violence in the Context of Post -Separated Parenting Australian and New Zealand Journal of Family Therapy 40 1 143 162 https://doi.org/10.1002/anzf.1350

            19. 2016 ‘She’ll just grab any device that’s closer’: A Study of Everyday Device & Account Sharing in Households. Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems 5921 5932 https://doi.org/10.1145/2858036.2858051

            20. 2017 Toys that Listen: A Study of Parents, Children, and Internet-Connected Toys Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems 5197 5207 https://doi.org/10.1145/3025453.3025735

            21. 2016 Technology at the Table: Attitudes about Mobile Phone Use at Mealtimes Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems 1881 1892 https://doi.org/10.1145/2858036.2858357

            22. 2020 An Exploratory Study Into the Negotiation of Cyber-Security Within the Family Home Frontiers in Psychology 11 424 https://doi.org/10.3389/fpsyg.2020.00424

            23. National Cyber Security Centre 2019 Smart devices: Using them safely in your home

            24. 2019 Protection, Productivity and Pleasure in the Smart Home: Emerging Expectations and Gendered Insights from Australian Early Adopters Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems 1 13 https://doi.org/10.1145/3290605.3300875

            25. 2020 Smart home beyond the home: A case for community-based access control Proceedings of the 2020 CHI Conference on Human Factors in Computing Systems 1 12 https://doi.org/10.1145/3313831.3376255

            26. 2018 Emerging risks in the IoT ecosystem: Who’s afraid of the big bad smart fridge? Living in the Internet of Things: Cybersecurity of the IoT - 2018 1 9 https://doi.org/10.1049/cp.2018.0033

            27. 2016 “This has to be the cats”: Personal Data Legibility in Networked Sensing Systems. Proceedings of the 19th ACM Conference on Computer-Supported Cooperative Work & Social Computing 491 502 https://doi.org/10.1145/2818048.2819992

            28. 2014 Intruders versus intrusiveness: Teens’ and parents’ perspectives on home-entryway surveillance Proceedings of the 2014 ACM International Joint Conference on Pervasive and Ubiquitous Computing 129 139 https://doi.org/10.1145/2632048.2632107

            29. 2020 “We hold each other accountable”: Unpacking how social groups approach cybersecurity and privacy together. Proceedings of the 2020 CHI Conference on Human Factors in Computing Systems 1 12 https://doi.org/10.1145/3313831.3376605

            30. 2017 Privacy is the Boring Bit: User Perceptions and Behaviour in the Internet-of-Things 2017 15th Annual Conference on Privacy, Security and Trust (PST) 181 18109 https://doi.org/10.1109/PST.2017.00029

            31. 2016 The Perfect Storm: The Privacy Paradox and the Internet-of-Things 2016 11th International Conference on Availability, Reliability and Security (ARES) 644 652 https://doi.org/10.1109/ARES.2016.25

            32. 2017 Parents Just Don’t Understand: Why Teens Don’t Talk to Parents about Their Online Risk Experiences Proceedings of the 2017 ACM Conference on Computer Supported Cooperative Work and Social Computing - CSCW ’17 523 540 https://doi.org/10.1145/2998181.2998236

            33. 2017 End user security and privacy concerns with smart homes Thirteenth Symposium on Usable Privacy and Security (SOUPS 2017) 65 80

            34. 2016 From Nosy Little Brothers to Stranger-Danger: Children and Parents’ Perception of Mobile Threats Proceedings of the the 15th International Conference on Interaction Design and Children 388 399 https://doi.org/10.1145/2930674.2930716

            35. 2019 `I make up a silly name’: Understanding Children’s Perception of Privacy Risks Online Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems, 1–13 https://doi.org/10.1145/3290605.3300336

            Comments

            Comment on this article