8 research outputs found

    SOK:young children’s cybersecurity knowledge, skills & practice: a systematic literature review

    Get PDF
    The rise in children’s use of digital technology highlights the need for them to learn to act securely online. Cybersecurity skills require mature cognitive abilities which children only acquire after they start using technology. As such, this paper explores the guidance and current curriculum expectations on cybersecurity aspects in Scotland. Additionally, a systematic review was undertaken of the literature pertaining to cybersecurity education for children on a wider scale including papers from around the world, with 27 peer reviewed papers included in the final review. We discovered that most research focused on assessing children’s knowledge or investigating the efficacy of interventions to improve cybersecurity knowledge and practice. Very few investigated the skills required to carry out the expected cybersecurity actions. For example, high levels of literacy, mature short- and long-term memory, attention, and established meta cognition are all pre-requisites to be able to carry out cybersecurity activities. Our main finding is that empirical research is required to explore the ages at which children have developed essential cognitive abilities and thereby the potential to master cybersecurity skills

    Children's data and privacy online: growing up in a digital age: an evidence review

    Get PDF
    Children’s autonomy and dignity as actors in the world depends on both their freedom to engage and their freedom from undue persuasion or influence. In a digital age in which many everyday actions generate data – whether given by digital actors, observable from digital traces, or inferred by others, whether human or algorithmic – the relation between privacy and data online is becoming highly complex. This in turn sets a significant media literacy challenge for children (and their parents and teachers) as they try to understand and engage critically with the digital environment. With growing concerns over children’s privacy and the commercial uses of their data, it is vital that children’s understandings of the digital environment, their digital skills and their capacity to consent are taken into account in designing services, regulation and policy. Using systematic evidence mapping, we reviewed the existing knowledge on children’s data and privacy online, identified research gaps and outlined areas of potential policy and practice developmen

    Mitigating School Violence Through the Lens of School Officials in Southern States

    Get PDF
    The purpose of this qualitative phenomenological study was to understand the threats of school violence to children and school personnel employed in the South Central and Southeastern part of the United States and to identify strategies to mitigate these threats. The theory that guided this study was Clarke’s (2019) Situational Crime Prevention as it aims to improve the understanding of violence and the impact of potential strategies for the prevention of violence. Data for the thematic analysis were obtained directly from school personnel. The information from the findings could aid in understanding the process of threat assessment to determine if improvements are needed and if they do what could be done to accomplish that endeavor. Parents, school personnel, and students may also better understand the threat assessment process and how those policies are enacted to provide a safe school climate for students to be educated and instructors to teach. The findings revealed four themes. Theme 1 was about violence prevention and mitigation through risk assessment and crisis management planning. Theme 2 was about how prevention of unauthorized entry contributed to violence mitigation. Theme 3 concerned the need of school personnel to received active shooter training. Theme 4 consisted of most participants reporting a need for additional safety measures

    Mapping the evolving landscape of child-computer interaction research: structures and processes of knowledge (re)production

    Get PDF
    Implementing an iterative sequential mixed methods design (Quantitative → Qualitative → Quantitative) framed within a sociology of knowledge approach to discourse, this study offers an account of the structure of the field of Child-Computer Interaction (CCI), its development over time, and the practices through which researchers have (re)structured knowledge comprising the field. Thematic structure of knowledge within the field, and its evolution over time, is quantified through implementation of a Correlated Topic Model (CTM), an automated inductive content analysis method, in analysing 4,771 CCI research papers published between 2003 and 2021. Detailed understanding of practices through which researchers (re)structure knowledge within the field, including factors influencing these practices, is obtained through thematic analysis of online workshops involving prominent contributors to the field (n=7). Strategic practices utilised by researchers in negotiating tensions impeding integration of novel concepts in the field are investigated through analysis of semantic features of retrieved papers using linear and negative binomial regression models. Contributing an extensive mapping, results portray the field of CCI as a varied research landscape, comprising 48 major themes of study, which has evolved dynamically over time. Research priorities throughout the field have been subject to influence from a range of endogenous and exogenous factors which researchers actively negotiate through research and publication practices. Tacitly structuring research practices, these factors have broadly sustained a technology-driven, novelty-dominated paradigm throughout the field which has failed to substantively progress cumulative knowledge. Through strategic negotiation of persistent tensions arising as consequence of these factors, researchers have nonetheless affected structural change within the field, contributing to a shift towards a user needs-driven agenda and progression of knowledge therein. Findings demonstrate that the field of CCI is proceeding through an intermediary phase in maturation, forming an increasingly distinct disciplinary shape and identity through the cumulative structuring effect of community members’ continued negotiation of tensions

    Integrating a usable security protocol for user authentication into the requirements and design process

    Get PDF
    L'utilisabilité et la sécurité sont des éléments cruciaux dans le processus d'authentification des utilisateurs. L'un des défis majeurs auquel font face les organisations aujourd'hui est d'offrir des systèmes d'accès aux ressources logiques (par exemple, une application informatique) et physiques (par exemple, un bâtiment) qui soient à la fois sécurisées et utilisables. Afin d'atteindre ces objectifs, il faut d'abord mettre en œuvre les trois composantes indispensables que sont l'identification (c.-à-d., définir l'identité d'un utilisateur), l'authentification (c.-à-d., vérifier l'identité d'un utilisateur) et l'autorisation (c.-à-d., accorder des droits d'accès à un utilisateur). Plus particulièrement, la recherche en authentification de l'utilisateur est essentielle. Sans authentification, par exemple, des systèmes informatiques ne sont pas capables de vérifier si un utilisateur demandant l'accès à une ressource possède les droits de le faire. Bien que plusieurs travaux de recherche aient porté sur divers mécanismes de sécurité, très peu de recherches jusqu'à présent ont porté sur l'utilisabilité et la sécurité des méthodes d'authentification des utilisateurs. Pour cette raison, il nous paraît nécessaire de développer un protocole d'utilisabilité et de sécurité pour concevoir les méthodes d'authentification des utilisateurs. La thèse centrale de ce travail de recherche soutient qu'il y a un conflit intrinsèque entre la création de systèmes qui soient sécurisés et celle de systèmes qui soient facile d'utilisation. Cependant, l'utilisabilité et la sécurité peuvent être construites de manière synergique en utilisant des outils d'analyse et de conception qui incluent des principes d'utilisabilité et de sécurité dès l'étape d'Analyse et de Conception de la méthode d'authentification. Dans certaines situations il est possible d'améliorer simultanément l'utilisabilité et la sécurité en revisitant les décisions de conception prises dans le passé. Dans d'autres cas, il est plus avantageux d'aligner l'utilisabilité et la sécurité en changeant l'environnement régulateur dans lequel les ordinateurs opèrent. Pour cette raison, cette thèse a comme objectif principal non pas d'adresser l'utilisabilité et la sécurité postérieurement à la fabrication du produit final, mais de faire de la sécurité un résultat naturel de l'étape d'Analyse et de Conception du cycle de vie de la méthode d'authentification. \ud ______________________________________________________________________________ \ud MOTS-CLÉS DE L’AUTEUR : authentification de l'utilisateur, utilisabilité, sécurité informatique, contrôle d'accès

    Use of linguistic markers in the identification and analysis of chief executives’ hubris

    Get PDF
    This research seeks to provide an insight into the identification and understanding of linguistic markers of Chief Executive Officer (CEO) hubris. It analyses spoken and written discourse samples of CEOs deemed to be hubristic and benchmarks the results against those of a sample of non-hubristic CEOs. In doing so it explores the hypothesis that the linguistic utterances of hubristic CEOs show consistent differences from the language produced by CEOs who have not been identified as possessing hubristic tendencies. This thesis presents a review of academic literatures pertaining to personality, hubris and natural language use. The review of these three domains leads to the conclusion that certain personality traits are antecedents to hubris and can be identified in one’s language use. The word count strategies are reviewed in depth as a framework for measuring hubris at-a-distance through the assessment of CEO’s linguistic utterances. In addition to word count strategies, this thesis also proposes a new approach – applying machine learning techniques to the analysis of language - for identifying CEO hubris. The research consists of a Pilot Study and three main studies (Study 1, Study 2, Study 3 (comprising two sub-studies, 3a and 3b)). It describes in detail the process, methods and materials used, summarises findings and explains the implications of the results obtained for further research into linguistic markers of hubris. For the purpose of this research, Hubris Syndrome is conceptualised as proposed by Owen and Davidson (2009), including all 14 proposed symptoms for Hubris Syndrome (Owen & Davidson, 2009). This research focuses explicitly on leaders who occupy or have occupied the position of CEO for a significant amount of time and were identified by other researchers, subject matter experts and media as having exhibited the features of Hubris Syndrome during their time in office. This research proposes several innovative techniques to identify the differences between hubristic and non-hubristic language, and documents subtle differences identified. Findings from this doctoral study suggest that the high use of impersonal pronouns, the total count of pronouns, auxiliary verbs, common verbs and tentative tone indicate CEO hubris. All in all, exploring if and how hubris’ symptoms manifests in CEO language use and what are characteristic features of hubristic discourse, contributes to wider research regarding the diagnosis and prevention of this phenomenon. This study seeks to mitigate the risk of potentially destructive CEO behaviour for the organisation and prevent organisational failures induced or aggravated by Hubris Syndrome

    8th annual reality CLE

    Get PDF
    Meeting proceedings of a seminar by the same name, held October 29-30, 2020

    Texas Law Review

    Get PDF
    Journal containing articles, notes, book reviews, and other analyses of law and legal cases
    corecore