Skip to main content

Using a Distributed Sensor Network to Educate Children About IoT Leakage of Sensitive Information

  • Conference paper
  • First Online:
Proceedings of the International Conference on Ubiquitous Computing & Ambient Intelligence (UCAmI 2022) (UCAmI 2022)

Part of the book series: Lecture Notes in Networks and Systems ((LNNS,volume 594))

  • 889 Accesses

Abstract

The vast majority of Australian children own a smartphone. High rates of smartphone ownership are associated with high rates of leakage of sensitive information. A child’s time and location patterns are enough to enable someone to build an accurate profile of the child. But children think that their devices already ensure that their sensitive information is secure. The aim of this study was to use off-the-shelf computing devices to educate school age children about leakage of sensitive information from IoT devices. A Distributed Sensor Network (DSN) was assembled and installed around a high school campus in Australia to measure leakage from IoT devices. Children were then informed of the results of the DSN monitoring, during an online safety lesson, which trained them on how to change common default device settings to reduce data leakage. The DSN then again measured the amount of leakage from IoT devices to see if children modified their device settings to reduce leakage of sensitive information. The results of the study revealed that the amount of data leaked from smartphones after the intervention was significantly less than the traffic captured before the intervention, thus confirming the intervention must have had an effect on changing children’s behaviour. It is recommended that this evidence-based program be expanded to other high schools in Australia to empower children to secure their sensitive information.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  • Albahar, M.A., Haataja, K., Toivanen, P.: Bluetooth MITM vulnerabilities: a literature review, novel attack scenarios, novel countermeasures, and lessons learned. Int. J. Inf. Technol. Secur. 8(4), 25–49 (2016)

    Google Scholar 

  • Al-Saggaf, Y.: An exploratory study of attitudes towards privacy in social media and the threat of blackmail: the views of a group of Saudi women. Electron. J. Inf. Syst. Developing Countries 75(7), 1–16 (2016)

    Google Scholar 

  • Al-Saggaf, Y., Islam, Z.: Data mining and privacy of social network sites’ users: implications of the data mining problem. Sci. Eng. Ethics 21(4), 941–966 (2015)

    Article  Google Scholar 

  • Al-Saggaf, Y., Islam, Z.: Privacy in social network sites (SNS): the threats from data mining. Ethical Space Int. J. Commun. Ethics 9(4), 32–40 (2012)

    Google Scholar 

  • Chutikulrungsee, T.: A phenomenological study of other-generated disclosure in online social networks. PhD Thesis, Charles Sturt University (2020)

    Google Scholar 

  • De Montjoye, Y.-A., Hidalgo, C.A., Verleysen, M., Blondel, V.D.: Unique in the crowd: the privacy bounds of human mobility. Sci. Rep. 3(1), 1–5 (2013)

    Article  Google Scholar 

  • Doherty, M.: Sexual activity: what qualifies under 18 USC § 2422? Boston Coll. Law Rev. 63(9), E-Supp II.-130 (2022)

    Google Scholar 

  • Gerber, N., Gerber, P., Volkamer, M.: Explaining the privacy paradox: a systematic review of literature investigating privacy attitude and behavior. Comput. Secur. 77, 226–261 (2018)

    Article  Google Scholar 

  • Goel, D., Jain, A.K.: Mobile phishing attacks and defence mechanisms: state of art and open research challenges. Comput. Secur. 73, 519–544 (2018)

    Article  Google Scholar 

  • Hull, G.: Successful failure: what Foucault can teach us about privacy self-management in a world of Facebook and big data. Ethics Inf. Technol. 17(2), 89–101 (2015). https://doi.org/10.1007/s10676-015-9363-z

    Article  MathSciNet  Google Scholar 

  • Ibbett, A.: An examination of real-world data leakage from IoT devices. Doctor of Information Technology Thesis (in Progress)

    Google Scholar 

  • Jan, A., Mehsud, M.I., Adnan, M.: Facebook mania of youth and satisfaction of their needs in Pakistan: a uses and gratification analysis. Global Sociol. Rev. V(III), 41–47 (2020)

    Article  Google Scholar 

  • Kindberg, T., Jones, T.: Merolyn the phone: a study of bluetooth naming practices. In: International Conference on Ubiquitous Computing (2007)

    Google Scholar 

  • Lauters, M.: Bordeaux: a digital urban exploration (2016). https://github.com/mehdilauters/wifiScanMap/blob/master/Results.md. Accessed 25 Jul 2022

  • Moor, J.: Towards a theory of privacy in the information age. Comput. Soc. 27, 27–32 (1997)

    Article  Google Scholar 

  • Porter, J.: rpi-128x64-oled-menusystem (2017). https://github.com/jpuk/rpi-128x64-oled-menusystem

  • Tavani, H.T.: Ethics and technology: Controversies, Questions, and Strategies for Ethical Computing, 3rd edn. John Wiley, Hoboken, N.J. (2012)

    Google Scholar 

  • Sar, R.K., Al-Saggaf, Y.: Propagation of unintentionally shared information and online tracking. First Monday 18(6) (2013). https://doi.org/10.5210/fm.v18i6.4349

  • Svirsky, D.: Why do people avoid information about privacy? J. Law Innov. 2(1), 2 (2021)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Yeslam Al-Saggaf .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2023 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Ibbett, A., Al-Saggaf, Y. (2023). Using a Distributed Sensor Network to Educate Children About IoT Leakage of Sensitive Information. In: Bravo, J., Ochoa, S., Favela, J. (eds) Proceedings of the International Conference on Ubiquitous Computing & Ambient Intelligence (UCAmI 2022). UCAmI 2022. Lecture Notes in Networks and Systems, vol 594. Springer, Cham. https://doi.org/10.1007/978-3-031-21333-5_50

Download citation

Publish with us

Policies and ethics