Children and Networks Suha Hajyahia Tareza Haddad.

Slides:



Advertisements
Similar presentations
FI-WARE – Future Internet Core Platform FI-WARE Security July 2011 High-level Description.
Advertisements

Social Building social capital for the children? Do children need social media? How can mobile media enhance social interaction in family? How do children.
ICT Exam Techniques This is a guide on how to achieve the maximum marks on the ICT Unit 1 Examination Paper.
CHAPTER 4 Marketing Information and Research: Analyzing the Business Environment Off-line and Online M A R K E T I N G.
MIS – 3030 Business Technologies Social Media & Conversation Big Data.
School of Computing. The Information Security Awareness Research Group.
Mobile Usage Patterns and Privacy Implications Michael Mitchell March 27, 2015 Ratnesh Patidar, Manik Saini, Parteek Singh, An-I Wang Florida State University.
Cloud Computing Project By:Jessica, Fadiah, and Bill.
Interpersonal Privacy Nudge for Promoting Privacy Protective Behaviors on Social Network Sites Haiyan Jia & Heng Xu College of Information Sciences and.
October 21, 2008 Jennifer Q.; Loriane M., Michelle E., Charles H. Internet Safety.
A Cyber Security Curriculum for Southern African Schools By Mariska de Lange and Prof Rossouw von Solms.
Grove Primary School. What is E-Safety? E-Safety is a term which means not only the internet but other ways in which young people communicate using electronic.
Talking to your kids about online safety. Children see parents/people use different types of technology at an early age. Once children reach the age to.
By: Dr. Mohammed Alojail College of Computer Sciences & Information Technology 1.
HART RESEARCH ASSOTESCIA Key findings from telephone survey of parents of children who access the Internet, conducted for Who Needs Parental Controls?
Internet of Things. Creating Our Future Together.
KASPERSKY INTERNET SECURITY multi-device  Average number of devices in households: 4.5  Consumer device diversity will continue to expand.
The IT Industry The Online World Building and Installing Know the components of computer systems Understand and practically apply appropriate connectivity.
Raising Digitally Literate Citizens Curbar Primary School March 2016.
Surf smart training.
Social Media LCBMS Guidance Staff.
E-Safety Parents Evening
Facebook privacy policy
Ani Mkrtchyan ISOC Armenia
Aaron Moh Ong Wan Soon Sun Si Yang Lim Teng Han Cao Yu
Cyber and Internet Safety (Parents’ Night)
Security in Internet of Things Begins with the Data
Digital Safety City of Edinburgh Council Digital Learning Team.
MGMT 452 Corporate Social Responsibility
Transforming learning through analytics
System Design Basics IB Computer Science.
Objectives Overview Explain why computer literacy is vital to success in today’s world Define the term, computer, and describe the relationship between.
Living with technology Helping you and your family to stay in control
E-Safety Briefing
“Internet of Things” – The new age drivers of Power Distribution Automation Speaker: Jayant Sinha Date of session: 2 Oct, 2015.
The Cost of Free Lesson 4-4.
PhoneSheriff – Best Parental Control Software For Mobiles and Tablets
Mobile Application Development
Prepared by: Celeste Ng Updated: May, 2017.
Shavonne Henry, Nikia Clarke, David Heymann, Brandon Knight
January 25, 2017 The Bromfield School
Trends in my profession, Information Technology
Protecting your personal information and privacy
Teaching Internet Safety
Chapter 29 Emerging Technologies and the Generation of Knowledge
Video: Digital citizenship is defined as the norms of appropriate,
ECE 311 Innovative Education-- snaptutorial.com
By Madison Daugherty edu
Key 2: Parental Expectations About Behavior
seeing content that is inappropriate
Smart Learning concepts to enhance SMART Universities in Africa
What kids are really doing online
Badgemore’s Parent Forum On Internet Safety
IT Megatrends that shape the Digital Future…
4 Contents Chapter Families Changing in the World
Enjoy using technology together
Managing our Children’s Technology and Social Media Use
Trends in Internet Usage & its Social Effects in Saudi Arabia
Knowledge of parenting & child development
Brian O’Neill Dublin Institute of Technology 9/10 May Florence
PREPARED BY: NABIRA BT MANSOR NUR SOLEHAH BT HANAFIAH
Welcome to the E Safety Workshop
Enjoy using technology together
Online Safety: Rights and Responsibilities
Student User Agreement and Policy 2022
E-Safety.
Child Safety Online.
In the attack index…what number is your Company?
Seminar-2019 CONDUCTED BY:- Gayatri institute of computer management TOPIC:-INFORMATION IS WEAlTH UNDER THE GUIDANCE OF:- BIBEK SIR PRESENTED BY:- SHAIK.
Chapter 14 INTRODUCING EVALUATION
Presentation transcript:

Children and Networks Suha Hajyahia Tareza Haddad

What Are We Going to Talk About Today?! Overview Children awareness of online privacy risks Internet of things children’s toys Privacy concerns parents have and how can they stay sharp In conclusion

How big do you think is network use nowadays??

How about amongst children?

Rights and Ethics in a Big Data World

It’s a technological phenomenon, in so far as it can be described as: BIG DATA It’s a technological phenomenon, in so far as it can be described as: Data sets that are so large or complex that traditional data processing applications are inadequate to deal with them. The term ‘big data’ often refers simply to the use of predictive analytics, user behavior analytics, or certain other advanced data analytics methods that attempt to extract value from data, (Canavillas et al., 2016)

But, what is so special about children in particular? collecting personal details from children can be very harmful, they may grow up to find themselves harmed as adults by information collected about them before they understood the long term significance.  Other research has shown that besides children, people in their 20s and early 30s (the age of most app developers) have the least understanding of how these issues can cause long-term harm.

Digital identities and impacts over the life course Constant evolving representation of self online networks hold significant power over these identities Use of digital identity for economic purposes

Children’s understanding

Security and privacy analyses of Internet of things children’s toys

The internet of things (IoT) is the extension of internet connectivity into physical devices and everyday objects. Embedded with electronics, internet connectivity, and other forms of hardware (such as sensors), these devices can communicate and interact with others over the Internet, and they can be remotely monitored and controlled

What privacy concerns do parents have about children’s mobile apps?

Survey Questions: How well do parents know about existing privacy safeguarding tools on mobile devices, such as kids app stores or privacy permission settings? Do they find them effective? How are mobile apps installed on children’s or families’ mobile devices? What kind of technical restriction mechanisms or processes are set up by parents to protect children? What kind of privacy concerns do parents have when choosing apps for their children? How do they impact on parents’ actual choice of apps for children?

Key findings: Children’s access to apps are largely under parents’ control. Parents expressed a high level of privacy concerns, but content was still king. Children’s favorite apps are not always appropriate for their age. Parents’ level of concern increased when told about potential implications. Parents know little about kids/family app store provided by leading app markets. Parents show a good knowledge of privacy permission controls. Parents struggle with managing children’s emotions when removing inappropriate apps.

1. Children’s access to apps are largely under parents’ control

2. Parents expressed a high level of privacy concerns, but content was still king

3. Children’s favorite apps are not always appropriate for their age

4. Parents’ level of concern increased when told about potential implications

5. Parents know little about kids/family app store provided by leading app markets

6. Parents show a good knowledge of privacy permission controls

7. Parents struggle with managing children’s emotions when removing inappropriate apps

How can parents keep a eye?

Are children fully aware of online privacy risks, and how can we improve their coping ability?

Methodology Eliciting children’s responses to a collection of hypothetical scenarios that reflect different types of explicit and implicit threats to children’s qonline personal data privacy

Key findings: Children care about online privacy risks Children still need help with certain privacy risks Children’s ability to describe risks depends on their actual understanding of risks Children struggle to comprehend the implications of risks

CONCLUSION

“Children and the Data Cycle: Rights and Ethics in a Big Data World ” Gabrielle Berman & Kerry Albright. “Kid on The Phone! Toward Automatic Detection of Children on Mobile Devices ” Toan Nguyen, Aditi Roy & Nasir Memon “KOALA Project Repost 1” Jun Zhao, Ulrik Lyngs, Nigel Shadbolt Department of Computer Science University of Oxford Feb 28, 2018 REFERENCES.

“KOALA Project Report 2” Jun Zhao Department of Computer Science University of Oxford April 28, 2018 “KOALA Project Report 3” Ge Wang, Jun Zhao, Nigel Shadbolt Department of Computer Science University of Oxford January 15, 2019 Security and Privacy Analyses of Internet of Things Children’s Toys Gordon Chu, Noah Apthorpe, and Nick Feamster REFERENCES.

Thanks! Any questions?