Under my pillow: designing security for children's special things

نویسندگان

  • Janet C. Read
  • Russell Beale
چکیده

This paper describes a novel design activity that was used to gather insights into security requirements for a mobile application for children. The general aim of the study was to understand how to design for security in an application for children rather than to specifically generate design solutions. To gather this information, a novel design activity, referred to here as Participatory Analogy, was devised. The study is described and design solutions that emerged following analysis of the children’s contributions are presented. Author

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Role and Application of RFID Technology in Internet of Things: Communication, Authentication, Risk, and Security Concerns

The Internet of Things (IoT) is a very encouraging and fast-growing area that brings together the benefits of wireless systems, sensor networks, actuators, etc.A wide range of IoT applications have been targeted and several aspects of this field have been identified to address specific issues, as well as technologies and standards developed in various domains such as in radio frequency id...

متن کامل

خورجین و گونه‌های مختلف آن در استان چهارمحال و بختیاری

During collecting information regarding “kilims” in Chaharmahal-va-Bakhtiari province, it was understood that whatever we recognize under the general term of “Khorjin” can be divided into three categories: small, normal and big ones as described below. (1) Small Khorjins (50×25 cm) which are weaved in both parts of province, i.e. Chaharmahal & also Bakhtiari. They ...

متن کامل

A Mutual Authentication Method for Internet of Things

Today, we are witnessing the expansion of various Internet of Things (IoT) applications and services such as surveillance and health. These services are delivered to users via smart devices anywhere and anytime. Forecasts show that the IoT, which is controlled online in the user environment, will reach 25 billion devices worldwide by 2020. Data security is one of the main concerns in the IoT. ...

متن کامل

A Survey of Anomaly Detection Approaches in Internet of Things

Internet of Things is an ever-growing network of heterogeneous and constraint nodes which are connected to each other and the Internet. Security plays an important role in such networks. Experience has proved that encryption and authentication are not enough for the security of networks and an Intrusion Detection System is required to detect and to prevent attacks from malicious nodes. In this ...

متن کامل

Security and AAA Architectures in an IoT Marketplace

Security and AAA Architectures in an IoT Marketplace Alberto Blázquez Rodríguez Nowadays, the concept of Internet of Things has revolutionized the industry, making possible the existence of billions of devices worldwide that constantly produce vast amounts of data. This valuable information may only be processed and filtered by complex applications that will eventually sell the information as p...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2009