2020
DOI: 10.1007/s10643-020-01067-z
|View full text |Cite
|
Sign up to set email alerts
|

Children’s Password-Related Books: Efficacious, Vexatious and Incongruous

Abstract: Software is developed specifically for children and this often requires them to authenticate themselves, usually by entering a password. Password hygiene is important for children, because the principles they learn in early life will often endure across their life span. Children learn from their parents, siblings, teachers, and peers. They also learn from educational resources, such as children's books. We carried out a content analysis of a range of children's books that aims to educate children about passwor… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
2
2

Relationship

2
2

Authors

Journals

citations
Cited by 4 publications
(4 citation statements)
references
References 36 publications
0
4
0
Order By: Relevance
“…Such interventions need to be designed with the target educational environments in mind (Verma and Verma, 1994 ; McKay et al, 1978 ). Cybersecurity books have been found to frequently contain outdated or incorrect information (Renaud & Prior, 2021a ). While there are several high quality online password education resources available e.g.…”
Section: Discussion and Reflectionmentioning
confidence: 99%
See 1 more Smart Citation
“…Such interventions need to be designed with the target educational environments in mind (Verma and Verma, 1994 ; McKay et al, 1978 ). Cybersecurity books have been found to frequently contain outdated or incorrect information (Renaud & Prior, 2021a ). While there are several high quality online password education resources available e.g.…”
Section: Discussion and Reflectionmentioning
confidence: 99%
“…Much online advice related to password “best practice” is outdated (Renaud and Prior, 2021b ; Prior & Renaud, 2020 ). The relatively poor knowledge demonstrated (Section 4.1 ) is likely to have been impacted by the fact that much of the population has not yet caught up with the latest guidelines.…”
Section: Discussion and Reflectionmentioning
confidence: 99%
“…A variety of cybersecurity resources are freely available [45]. However, there are issues with many of these, in particular books, which have often been found to contain out-of-date or incorrect guidance [46]. In addition, even when children are able to engage independently with the many online resources [38], they still require input from adults to explain how to apply the principles.…”
Section: Children's Cybersecurity Educationmentioning
confidence: 99%
“…Queen Camilla and the Princess of Wales promote the reading of books to children [61]. However, children's books do not provide up-to-date cyber security principles [46]. This is unsurprising since the advice responds to dynamic and ever-changing cyber threats, and books, in print format, cannot possibly change as quickly.…”
Section: Children's Books As Sourcementioning
confidence: 99%