Under my pillow: designing security for children's special things
نویسندگان
چکیده
This paper describes a novel design activity that was used to gather insights into security requirements for a mobile application for children. The general aim of the study was to understand how to design for security in an application for children rather than to specifically generate design solutions. To gather this information, a novel design activity, referred to here as Participatory Analogy, was devised. The study is described and design solutions that emerged following analysis of the children’s contributions are presented. Author
منابع مشابه
Role and Application of RFID Technology in Internet of Things: Communication, Authentication, Risk, and Security Concerns
The Internet of Things (IoT) is a very encouraging and fast-growing area that brings together the benefits of wireless systems, sensor networks, actuators, etc.A wide range of IoT applications have been targeted and several aspects of this field have been identified to address specific issues, as well as technologies and standards developed in various domains such as in radio frequency id...
متن کاملخورجین و گونههای مختلف آن در استان چهارمحال و بختیاری
During collecting information regarding “kilims” in Chaharmahal-va-Bakhtiari province, it was understood that whatever we recognize under the general term of “Khorjin” can be divided into three categories: small, normal and big ones as described below. (1) Small Khorjins (50×25 cm) which are weaved in both parts of province, i.e. Chaharmahal & also Bakhtiari. They ...
متن کاملA Mutual Authentication Method for Internet of Things
Today, we are witnessing the expansion of various Internet of Things (IoT) applications and services such as surveillance and health. These services are delivered to users via smart devices anywhere and anytime. Forecasts show that the IoT, which is controlled online in the user environment, will reach 25 billion devices worldwide by 2020. Data security is one of the main concerns in the IoT. ...
متن کاملA Survey of Anomaly Detection Approaches in Internet of Things
Internet of Things is an ever-growing network of heterogeneous and constraint nodes which are connected to each other and the Internet. Security plays an important role in such networks. Experience has proved that encryption and authentication are not enough for the security of networks and an Intrusion Detection System is required to detect and to prevent attacks from malicious nodes. In this ...
متن کاملSecurity and AAA Architectures in an IoT Marketplace
Security and AAA Architectures in an IoT Marketplace Alberto Blázquez Rodríguez Nowadays, the concept of Internet of Things has revolutionized the industry, making possible the existence of billions of devices worldwide that constantly produce vast amounts of data. This valuable information may only be processed and filtered by complex applications that will eventually sell the information as p...
متن کامل