skip to main content
10.1145/2132176.2132266acmotherconferencesArticle/Chapter ViewAbstractPublication PagesiconferenceConference Proceedingsconference-collections
research-article

Children in the digital age: exploring issues of cybersecurity

Published:07 February 2012Publication History

ABSTRACT

As technology races forward, adults seem to be at a loss as to how to comprehend the deepening relationship between children and technology. Compounded by media reports of online dangers, we investigate what the current research suggests the realities are with regard to children and online behavior. Knowing that this field of research is still in its infancy, we aim to review the empirical research that has been done thus far.

Our poster reports on our cybersecurity literature review. The main goals were to:

• Explore the main perspectives on issues from different disciplines relating to children's online security and behaviour.

• Discover conflicting areas within or between disciplines.

• Highlight gaps in research.

Through our review, we aimed to assemble a clearer picture of the research done, to uncover future research avenues, and to provide a resource for those who wish to further pursue investigations into children and cybersecurity.

References

  1. Yan, Z. 2005. Age differences in children's understanding of the complexity of the Internet. Applied Developmental Psychology, 26, 385--296.Google ScholarGoogle ScholarCross RefCross Ref
  2. Berson, I. R., and Berson, M. J. 2006. Children and their Digital Dossiers: Lessons in Privacy Rights in the Digital Age. Journal of Social Education, 21 (1), 142.Google ScholarGoogle Scholar
  3. Ibid.Google ScholarGoogle Scholar
  4. Livingstone, S., and Brake, D. R. 2010. On the Rapid Rise of Social Networking Sites: New Findings and Policy Implementation. Children and Society, 24, 79.Google ScholarGoogle ScholarCross RefCross Ref

Index Terms

  1. Children in the digital age: exploring issues of cybersecurity

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader