Abstract
The vast majority of Australian children own a smartphone. High rates of smartphone ownership are associated with high rates of leakage of sensitive information. A child’s time and location patterns are enough to enable someone to build an accurate profile of the child. But children think that their devices already ensure that their sensitive information is secure. The aim of this study was to use off-the-shelf computing devices to educate school age children about leakage of sensitive information from IoT devices. A Distributed Sensor Network (DSN) was assembled and installed around a high school campus in Australia to measure leakage from IoT devices. Children were then informed of the results of the DSN monitoring, during an online safety lesson, which trained them on how to change common default device settings to reduce data leakage. The DSN then again measured the amount of leakage from IoT devices to see if children modified their device settings to reduce leakage of sensitive information. The results of the study revealed that the amount of data leaked from smartphones after the intervention was significantly less than the traffic captured before the intervention, thus confirming the intervention must have had an effect on changing children’s behaviour. It is recommended that this evidence-based program be expanded to other high schools in Australia to empower children to secure their sensitive information.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Albahar, M.A., Haataja, K., Toivanen, P.: Bluetooth MITM vulnerabilities: a literature review, novel attack scenarios, novel countermeasures, and lessons learned. Int. J. Inf. Technol. Secur. 8(4), 25–49 (2016)
Al-Saggaf, Y.: An exploratory study of attitudes towards privacy in social media and the threat of blackmail: the views of a group of Saudi women. Electron. J. Inf. Syst. Developing Countries 75(7), 1–16 (2016)
Al-Saggaf, Y., Islam, Z.: Data mining and privacy of social network sites’ users: implications of the data mining problem. Sci. Eng. Ethics 21(4), 941–966 (2015)
Al-Saggaf, Y., Islam, Z.: Privacy in social network sites (SNS): the threats from data mining. Ethical Space Int. J. Commun. Ethics 9(4), 32–40 (2012)
Chutikulrungsee, T.: A phenomenological study of other-generated disclosure in online social networks. PhD Thesis, Charles Sturt University (2020)
De Montjoye, Y.-A., Hidalgo, C.A., Verleysen, M., Blondel, V.D.: Unique in the crowd: the privacy bounds of human mobility. Sci. Rep. 3(1), 1–5 (2013)
Doherty, M.: Sexual activity: what qualifies under 18 USC § 2422? Boston Coll. Law Rev. 63(9), E-Supp II.-130 (2022)
Gerber, N., Gerber, P., Volkamer, M.: Explaining the privacy paradox: a systematic review of literature investigating privacy attitude and behavior. Comput. Secur. 77, 226–261 (2018)
Goel, D., Jain, A.K.: Mobile phishing attacks and defence mechanisms: state of art and open research challenges. Comput. Secur. 73, 519–544 (2018)
Hull, G.: Successful failure: what Foucault can teach us about privacy self-management in a world of Facebook and big data. Ethics Inf. Technol. 17(2), 89–101 (2015). https://doi.org/10.1007/s10676-015-9363-z
Ibbett, A.: An examination of real-world data leakage from IoT devices. Doctor of Information Technology Thesis (in Progress)
Jan, A., Mehsud, M.I., Adnan, M.: Facebook mania of youth and satisfaction of their needs in Pakistan: a uses and gratification analysis. Global Sociol. Rev. V(III), 41–47 (2020)
Kindberg, T., Jones, T.: Merolyn the phone: a study of bluetooth naming practices. In: International Conference on Ubiquitous Computing (2007)
Lauters, M.: Bordeaux: a digital urban exploration (2016). https://github.com/mehdilauters/wifiScanMap/blob/master/Results.md. Accessed 25 Jul 2022
Moor, J.: Towards a theory of privacy in the information age. Comput. Soc. 27, 27–32 (1997)
Porter, J.: rpi-128x64-oled-menusystem (2017). https://github.com/jpuk/rpi-128x64-oled-menusystem
Tavani, H.T.: Ethics and technology: Controversies, Questions, and Strategies for Ethical Computing, 3rd edn. John Wiley, Hoboken, N.J. (2012)
Sar, R.K., Al-Saggaf, Y.: Propagation of unintentionally shared information and online tracking. First Monday 18(6) (2013). https://doi.org/10.5210/fm.v18i6.4349
Svirsky, D.: Why do people avoid information about privacy? J. Law Innov. 2(1), 2 (2021)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2023 The Author(s), under exclusive license to Springer Nature Switzerland AG
About this paper
Cite this paper
Ibbett, A., Al-Saggaf, Y. (2023). Using a Distributed Sensor Network to Educate Children About IoT Leakage of Sensitive Information. In: Bravo, J., Ochoa, S., Favela, J. (eds) Proceedings of the International Conference on Ubiquitous Computing & Ambient Intelligence (UCAmI 2022). UCAmI 2022. Lecture Notes in Networks and Systems, vol 594. Springer, Cham. https://doi.org/10.1007/978-3-031-21333-5_50
Download citation
DOI: https://doi.org/10.1007/978-3-031-21333-5_50
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-031-21332-8
Online ISBN: 978-3-031-21333-5
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)