Cybersecurity and Children: Ensuring Online Safety
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 33234
Cybersecurity and Children: Ensuring Online Safety

Authors: H. Brodeur, B. Ferdousi

Abstract:

As children gain access to the Internet at a younger age, it is essential for those working with children to know the dangers of the Internet and how to protect the children. This article explores the dangers of the Internet for children in addition to effective methods to combat child exploitation. There is also a call for specific institutions working with children to act to protect them, including schools, parental and guardian figures, and the government. This paper analyses the current dangers children face online, examines previously implemented practices from various institutions, and provides suggestions on how these practices can be improved for the modern era.

Keywords: Cybercrime, cybersecurity, cyberbullying, cyberstalking, security awareness.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 48

References:


[1] V., Chang, L., Golightly, Q. A., Xu, T., Boonmee, and B. S. Liu, “Cybersecurity for Children: An investigation into the application of social media,” Enterprise Information Systems, 17(11), pp. 1–31. 2023. https://doi.org/10.1080/17517575.2023.2188122
[2] A. A. Al Shamsi, “Effectiveness of cyber security awareness program for young children: A case study in UAE,” International Journal of Information Technology and Language Studies, 3(2). pp. 8-29, 2019.
[3] F., Quayyum, D. S., Cruzes, and L. Jaccheri, “Cybersecurity awareness for children: A systematic literature review,” International Journal of Child-Computer Interaction, 30, pp. 2–24, 2021. https://doi.org/10.1016/j.ijcci.2021.10034
[4] T. Milosevic, “Protecting children online?: Cyberbullying policies of social media companies (1st ed.)” The MIT Press, 2018, 2017, 2019. https://doi.org/10.7551/mitpress/11008.001.0001
[5] D., Finkelhor, H., Turner, and D. Colburn, “Which dynamics make online child sexual abuse and cyberstalking more emotionally impactful: Perpetrator identity and images?” Child Abuse & Neglect, 137, pp. 106020-106020, 2023. https://doi.org/10.1016/j.chiabu.2023.106020
[6] A. M. Smith, “Protection of children online: Federal and state laws addressing cyberstalking, cyber harassment, and cyberbullying,” Congressional Research Service, 1(35), 2009.
[7] J. A. Kloess, A. R. Beech, and L. Harkins, “Online child sexual exploitation: prevalence, process, and offender characteristics,” Trauma, Violence, & Abuse, 15(2), pp. 126–139, 2014. https://doi.org/10.1177/1524838013511543
[8] K. F. Durkin, “Misuse of the internet by pedophiles: implications for law enforcement and probation practice,” Current Perspectives of Sex Crimes, 2012. https://doi.org/10.4135/9781452229454
[9] E., Quayle, and M. Taylor, “Child pornography and the internet: perpetuating a cycle of abuse deviant behavior,” 23(4), pp. 331–361, 2010. https://doi.org/10.1080/01639620290086413
[10] Yuliana, “The importance of cybersecurity awareness for children,” Department of International Law, Faculty of Law, Universitas Lampung, Bandar Lampung, Indonesia, 4(1), January-June 2022: pp. 39-46. p-ISSN: 1978-5186 E-ISSN: 2723-2603. https://jurnal.fh.unila.ac.id/index.php/lajil
[11] R. B., Sağlam, V., Miller, and V. N. Franqueira, “A systematic literature review on cyber security education for children,” IEEE Transactions on Education, 66(3), pp. 274–286, 2023. https://doi.org/10.1109/te.2022.3231019
[12] A. R., Müller, M., Röder, and M. Fingerle, “Child sexual abuse prevention goes online: Introducing “cool and safe” and its effects,” Computers & Education, 78, pp. 60–65, 2014. https://doi.org/10.1016/j.compedu.2014.04.023
[13] A. AlShabibi, and M. Al-Suqri, (2021). “Cybersecurity awareness and its impact on protecting children in cyberspace,” in Proc. 22nd International Arab Conference on Information Technology (ACIT), 2021, pp. 1–6. https://doi.org/10.1109/acit53391.2021.9677117
[14] K. Muir, and A. Joinson, An exploratory study into the negotiation of cyber-security within the family home. Front. Psychol, 11(424), 2020. https://doi.org/10.3389/fpsyg.2020.00424
[15] United States Department of Justice. “Man arrested for producing, distributing, and possessing ai-generated images of minors engaged in sexually explicit conduct,” Office of Public Affairs, 2024, May 20. https://www.justice.gov/opa/pr/man-arrested-producing distributing-and-possessing-ai-generated-images-minors-engaged
[16] Z., Siddiqui, and N. Zeeshan, “A survey on cybersecurity challenges and awareness for children of all ages,” pp. 131–136, 2020. https://doi.org/978-1-7281-6330-7
[17] IntelligentHQ. “Top Tips by Cybersecurity Expert to Help Parents Prevent Their Children from Becoming Addicted to Video Games,” Newstex. 2023.
[18] M., Dorasamy, M., Kaliannan, M., Jambulingam, I., Ramadhan, and A. Sivaji, “Parents’ awareness on online predators: cyber grooming deterrence,” The Qualitative Report, 26(11), pp. 3685–3723, 2021. https://doi.org/10.46743/2160-3715/2021.4914
[19] K., Renaud, and S. Prior, “The “three M’s” countermeasures to children’s risky online behaviors: Mentor, mitigate and monitor,” Information & Computer Security, 29(3), pp.526-557, 2021.
[20] M. Eneman, “Internet Service Provider (ISP) Filtering of Child-Abusive Material: A Critical Reflection of its Effectiveness,” Journal of Sexual Aggression, 16(2), pp. 223–235, 2010. https://doi.org/10.1080/13552601003760014
[21] E. Quayle, “Prevention, disruption and deterrence of online child sexual exploitation and abuse,” ERA Forum, 21(3), pp. 429–447, 2020. https://doi.org/10.1007/s12027-020-00625-7
[22] C., Katz, S., Piller, T., Glucklich, and D. E. Matty, “Stop waking the dead”: Internet child sexual abuse and perspectives on its disclosure,” Journal of Interpersonal Violence, 36(9–10), pp. 5085–5104, 2018. https://doi.org/10.1177/0886260518796526
[23] C. Katz, “Internet-related child sexual abuse: What children tell us in their testimonies,” Children and Youth Services Review, 35(9), pp. 1536–1542, 2013. https://doi.org/10.1016/j.childyouth.2013.06.006
[24] M. M. Leonard, “I did what I was directed to do but he didn’t touch me”: The impact of being a victim of internet offending,” Journal of Sexual Aggression, 16(2), pp.249–256, 2010. https://doi.org/10.1080/13552601003690526
[25] J. Hunley, “Congressman adds emphasis on kids to cybersecurity bill,” McClatchy - Tribune Business News, 2010, Feb 05. http://ezproxy.emich.edu/login?url=https://www.proquest.com/wire-feeds/congressman adds-emphasis-on-kids-cybersecurity/docview/458755286/se-2
[26] J., Newman, A., Ritchie, and N. Jones, “Children’s Online Privacy Protection Rule (“coppa”),” Federal Trade Commission, 2023, February 3. https://www.ftc.gov/legallibrary/browse/rules/childrens-online-privacy-protection-rule-coppa
[27] Thorn, “The report act is now federal law – here’s what it means for child safety,” Thorn, 2024, May 8. https://www.thorn.org/blog/the-report-act-explained/
[28] Office of Juvenile Justice and Delinquency Prevention. (2024). Netsmartz National Center for Missing & Exploited Children. https://www.missingkids.org/netsmartz/home
[29] S. I. Observatory, “How to fix the Online Child Exploitation Reporting System,” Stanford Internet Observatory Cyber Policy Center, 2024, April 22. https://cyber.fsi.stanford.edu/io/news/cybertipline-report
[30] U.S. Department of Justice. Internet crimes against children (icac) task force program. 2023. https://www.icactaskforce.org/