메뉴 건너뛰기




Volumn , Issue , 2009, Pages 288-292

Under my pillow - Designing security for children's special things

Author keywords

Child computer interaction; Children; Personal data; Privacy; Security; Theory

Indexed keywords

COMPUTER PRIVACY; DATA PRIVACY;

EID: 84860441397     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.14236/ewic/hci2009.34     Document Type: Conference Paper
Times cited : (14)

References (8)
  • 1
    • 84900482702 scopus 로고    scopus 로고
    • Security in the Wild: User strategies for managing security as an everyday, practical problem
    • Dourish, P., Grinter, R.E., Delgado de la Flor, J., and Joseph, M., Security in the Wild: user strategies for managing security as an everyday, practical problem. Personal and Ubiquitous Computing, 82004). 391-401.
    • (2004) Personal and Ubiquitous Computing , vol.8 , pp. 391-401
    • Dourish, P.1    Grinter, R.E.2    De La Flor, D.J.3    Joseph, M.4
  • 2
    • 0032659483 scopus 로고    scopus 로고
    • Cooperative inquiry: Developing new technologies for children with children
    • ACM Press
    • Druin, A. Cooperative inquiry: Developing new technologies for children with children. in Proc CHI99. ACM Press.(1999), 592-599
    • (1999) Proc CHI99 , pp. 592-599
    • Druin, A.1
  • 3
    • 34250729756 scopus 로고    scopus 로고
    • Password management strategies for online accounts
    • ACM Press
    • Gaw, S. and Felten, E.W. Password Management Strategies for Online Accounts. in Proc SOUPS. ACM Press.(2006), 44-55
    • (2006) Proc SOUPS , pp. 44-55
    • Gaw, S.1    Felten, E.W.2
  • 4
    • 65449137148 scopus 로고    scopus 로고
    • Personal knowledge questions for fallback authentication: Security questions in the era of Facebook
    • ACM Press
    • Rabkin, A. Personal knowledge questions for fallback authentication: Security questions in the era of Facebook. in Proc SOUPS. ACM Press.(2008)
    • (2008) Proc SOUPS
    • Rabkin, A.1
  • 5
    • 85006247958 scopus 로고    scopus 로고
    • Requirements for the design of a handwriting recognition based writing interface for children
    • ACM Press
    • Read, J.C., MacFarlane, S.J., and Gregory, A.G. Requirements for the Design of a Handwriting Recognition Based Writing interface for Children. in Proc Interaction Design and Children 2004. ACM Press.(2004)
    • (2004) Proc Interaction Design and Children 2004
    • Read, J.C.1    MacFarlane, S.J.2    Gregory, A.G.3
  • 6
    • 0030674231 scopus 로고    scopus 로고
    • Designing for or designing with? informant design for interactive learning environments
    • ACM Press
    • Scaife, M., Rogers, Y., Aldrich, F., and Davies, M. Designing For or Designing With? Informant Design for Interactive Learning Environments. in Proc CHI '97. ACM Press.(1997), 343-350
    • (1997) Proc CHI '97 , pp. 343-350
    • Scaife, M.1    Rogers, Y.2    Aldrich, F.3    Davies, M.4
  • 7
    • 35348928239 scopus 로고    scopus 로고
    • Password sharing: Implications for security design nased on social practice
    • ACM Press
    • Singh, S., Cabraal, A., Demosthenous, C., Astbrink, G., and Furlong, M. Password Sharing: Implications for Security Design Nased on Social Practice. in Proc CHI 2007. ACM Press.(2007), 895-904
    • (2007) Proc CHI 2007 , pp. 895-904
    • Singh, S.1    Cabraal, A.2    Demosthenous, C.3    Astbrink, G.4    Furlong, M.5
  • 8
    • 35248853285 scopus 로고    scopus 로고
    • Passwords decay, words endure: Secure and re-usable multiple password mnemonics
    • ACM Press
    • Topkara, U. and Atallah, M.T., MJ. Passwords Decay, Words Endure: Secure and Re-Usable Multiple Password Mnemonics. in Proc SAC 2007. ACM Press.(2007), 292-299
    • (2007) Proc SAC 2007 , pp. 292-299
    • Topkara, U.1    Atallah, M.J.M.T.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.