PITO: A Children-Friendly Interface for Security Tools

نویسنده

  • Luigi Catuogno
چکیده

Current Operating Systems and user applications provide several security tools that are designed to automatically handle a set of well-known events and threats, whereas they inform the user that something potentially dangerous is happening an ask her to take a decision. Since we believe that this learning process could have a relevant educational value for children, we present, in this paper, an interface for Security tools featured by operating systems, user applications or third party security suites. The interface, that has been designed as “Pito”: a digital pet , is purposed to allow children that use computer to be softly introduced in security issues that usually occur when navigating the Internet. Alerts notified by the underlying security tools are mapped as some simple events into the Pito’s world. These events change the state of Pito and, according to the current state, the young user is asked to do some action in order to keep Pito’s sane and happy, that is to keep safe the

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Context-Aware Recommender Systems: A Review of the Structure Research

 Recommender systems are a branch of retrieval systems and information matching, which through identifying the interests and requires of the user, help the users achieve the desired information or service through a massive selection of choices. In recent years, the recommender systems apply describing information in the terms of the user, such as location, time, and task, in order to produce re...

متن کامل

Analyzing Tools and Algorithms for Privacy Protection and Data Security in Social Networks

The purpose of this research, is to study factors influencing privacy concerns about data security and protection on social network sites and its’ influence on self-disclosure. 100 articles about privacy protection, data security, information disclosure and Information leakage on social networks were studied. Models and algorithms types and their repetition in articles have been distinguished a...

متن کامل

SEER: A Security Experimentation EnviRonment for DETER

Configuring a security experiment can be tedious, involving many low level and repetitive configuration tasks. In order to make DETER’s capabilites accessible to users at all skill levels, we have designed and implemented a Security Experimentation EnviRonment (SEER) that provides security researchers the ability to create, plan, and iterate through a large range of experimental scenarios with ...

متن کامل

An Authoring Framework for Security Policies: A Use-Case within the Healthcare Domain

Traditionally, the definition and the maintenance of security and access control policies has been the exclusive task of system administrators or security officers. In modern distributed and heterogeneous systems, there exist the need to allow different stakeholders to create and edit their security and access control preferences. In order to solve this problem two main challenges need to be me...

متن کامل

Gesture Friendly Interfaces for Classroom Teaching with Thinking Tools

Thinking tools are typically designed for students working on their own computers. When used from the front of a classroom, the complex graphical user interfaces of these tools can interfere with an instructor's ability to lecture effectively and to use natural gestures. A thinking tool for the grade 9 mathematics topic of "relationships" has been developed with a more gesture-friendly interfac...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2008