Professional Documents
Culture Documents
This is to certify that the Dissertation Part-I report entitled “Parents and Older
Adults Awareness and Readiness for Smart Devices Cybersecurity” is being
submitted by Ritika Prabhat Mishra (0126CS22MT12) in partial fulfillment of
the requirement for the award of Master of Technology in Computer Science and
Engineering at Oriental College of Technology, Bhopal (M.P.) is a record of bona
fide work done by him under our guidance.
Date:
Place: Bhopal
APPROVAL CERTIFICATE
conclusion drawn therein, but approve the dissertation only for the purpose
CANDIDATE DECLARATION
Technology, Bhopal (M.P), hereby declare that the work presented in this
work, is bona fide and correct to the best of my knowledge and this work has
been carried out taking care of engineering ethics. The work presented does
not infringe any patented work and has not been submitted to any other
university or anywhere else for the award of any degree or any professional
diploma.
Ritika P. Mishra
(0126CS22MT12)
ORIENTAL COLLEGE OF TECHNOLOGY, BHOPAL
Approved by AICTE New Delhi & Govt. of M.P. & Affiliated to
Rajiv Gandhi Proudyogiki Vishwavidyalaya, Bhopal (M.P.)
DECLARATION
I hereby declare that the Dissertation Part-I report entitled “Parents and
Older Adults Awarenessand Readiness for Smart Devices Cybersecurity”
is being submitted on the partial fulfillment for the award of the degree of
Master of Technology in “Computer Science and Engineering”. The work
has been carried out in the departmentof “Computer Science and Engineering”
at Oriental College of Technology, Bhopal is an authentic record of my own
work carried under theguidance of Mr. Rajesh Tiwari, Assistant Professor. I
have not submitted the matterembodied in this report for award of any degree.
I also declare that a check for plagiarism has been carried out on the thesis /
project / dissertation and is found within the acceptable limit and report of
which is enclosed herewith.
Approved By
PLAGIARISM CERTIFICATE
Content of this dissertation work has been checked for plagiarism with the
plagiarism.
Ritika P. Mishra
(0126CS22MT12)
ORIENTAL COLLEGE OF TECHNOLOGY, BHOPAL
Approved by AICTE New Delhi & Govt. of M.P. & Affiliated to
Rajiv Gandhi Proudyogiki Vishwavidyalaya, Bhopal (M.P.)
ACKNOWLEDGEMENT
It is the constant supervision, moral support, and proper guidance of our respected Director
Dr. Amita Mahor, that kept us motivated throughout.
I have a deep sense of gratitude and respect for my learned guide Mr. Rajesh Tiwari,
Assistant Professor, Computer Science & Engineering Department. Without his
enthusiasm and encouragement this dissertation would not have been completed. His
valuable knowledge and innovative ideas helped me to take the work to the final stage. I
am grateful and thankful to him for his timely advice.
Constant help, moral and financial support of my loving parents motivated me to complete
the work. I express my heartily thanks to all my family members for their cooperation.
I really admire the fond support of my classmates for their cooperation and constant help.
It gives immense pleasure to acknowledge the encouragement and support extended by
them. Last but not the least I am extremely thankful to all who have directly or indirectly
helped me for the completion of my work.
Ritika P. Mishra
(0126CS22MT12)
ABSTRACT
CHAPTER 3 OBJECTIVE 6
CHAPTER 5 METHODOLOGY 8
CHAPTER 6 CONCLUSION 9
REFERENCES 10
INTRODUCTION
In the 1970s, Atari Inc. introduced the first commercially widespread video
gaming console. Back in that time parents did not have cybersecurity
concerns when they allowed their children to access these gaming devices,
knowing that the contents of these devices are lines and dots moving in one
colored background.
The study Investigates the about the main threats that face children in
cyberspace using exploratory surveying method to measure the awareness
and readiness of parents with children aged six and older adult’s awareness
and readiness about cybersecurity in Bhopal
Usage of smart devices became widespread and with this spreading, more
cybersecurity challenges encountered. One high important challenge is
children cybersecurity protection. In a smart world, children may face many
cyber safety issues including privacy, exposure to inappropriate content,
cyberbullying, cyber stalking, misusage of smart gadgets and other issues
[2].
This study aims to provide an insight into one of the most vulnerable groups
of cybercrimes and this thesis is about cyber security of computer and
system science.
Older adults are the fastest growing population among computer and
internet users and use technology for a number of reasons; from
convenience activities such as banking shopping maintaining
communication through to facilitating self-care and health management.
Older adults recognize the benefits that technology provides for staying
independent for longer, and many are keen to continue using technology
well into older age.
Like all users, older adults are at risk of cyber-attacks; however, they are
specifically sought out by cyber criminals.
The study was motivated from the high importance of the topic of children
protection from smart devices technologies and to contribute to the limited
information and the non-existence of knowledge about children aged six or
below and older adults in the literature.
Parents are playing a major role to handle these safety issues. If the parents are not aware
or not ready to deal with them, many complications might be raised affecting the children
safety and psychological life. While parents are trying their best to protect children from
smart devices cyber threats, there is a need for an evaluation of the current awareness and
readiness of parents to deal with today’s protection challenges. Parents' Awareness and
Readiness for Smart Devices' Cybersecurity Ahmed E. Al-Naser, Aisha Bushager, Hessa
Al-Junaid.
Some parents will unintentionally expose their children to security challenges introduced
by smart technologies because of the lack of awareness for the capability of these
technologies and their risks. In the investigation study, Plowman et al [7] discussed parents’
lack of experience in technology during their childhood which leads to a lack of experience
in dealing with their children technology usage. In their interviews, they found more than
half of parents who put rules for watching television but only a few of them set rules for
using computers for their children. Smart technologies are not only computers and phones
anymore. Big contributors to smart technologies are devices using “Internet of Things”
(IoT). Karakaya et al [8] explained how the smartwatch is being considered an IoT device
while listing the types of sensors they may have.
The investigation into the security of the smartwatch done revealed that although the
smartwatches are popular and their computational capabilities are growing, the
smartwatches manufacturers are not giving priority to their security. The study found that
smartwatches can be used as a backdoor for the smartphones they connect with and if
application developers do not implement security correctly, then this may lead to more
security breaches to smartwatch owner information. Younger people adapt more to
technology. A study [9] surveyed teen usage of smartphones found that 23% of teens
between 12-17 years old own a smartphone.
Challenges of Online Security for Senior Citizens - A systematic review of challenges faced
by senior citizens on online security. Sinthujan Sivagumaran Due to the rapid advancement
in internet services, people use cyberspace extensively for their day-to-day activities. With
the increase in usage and exposure to the online space, it is observed that many cybercrime
activities exist in today’s world. Cybercrime has many forms, and the impact of such crimes
has been incredibly significant in both financial and societal terms. Hence, cyber security
has become a prime concern to protect the users’ being a victim of a cybercrime.
SCSAM-Elderly: A New Synergistic Cyber Security Model for the Elderly for IR4.0
Readiness in Malaysia existing cybersecurity awareness models were analyzed.
Finally, a cyber security awareness model was mapped to the learning styles of the
elderly, contents of the current cyber-attack issues related to the elderly, questionnaire
and technicality. The learning styles of the elderly were studied based on the types of
disabilities and impairments. Based on the mapping results, a cyber security awareness
model has been proposed for the elderly based on the Security Awareness Model and
an Information Security Awareness Program (ISAPM) General Model.
OBJECTIVE
Conduct surveys and interviews to gauge the existing cybersecurity awareness levels
among older adults in relation to smart devices. Identify common misconceptions,
concerns, and areas of vulnerability specific to this demographic. Analyze the types of
smart devices commonly used by older adults and their frequency of use. Investigate the
challenges faced by older adults in securing and managing smart devices, considering
factors such as usability and technological complexity. Develop guidelines for safe and
responsible social media engagement tailored to older adults. Conduct awareness
campaigns emphasizing the importance of securing personal information and recognizing
potential social engineering threats on popular platforms.
Conduct surveys and interviews to evaluate the current level of cybersecurity awareness
among the parents regarding smart device usage within the family. Identify common
challenges, concerns, and misconceptions related to cybersecurity. Organize interactive
workshops and webinars to provide parents with hands-on training on cybersecurity best
practices. Cover topics such as setting up parental controls, managing screen time, and
recognizing and mitigating potential online threats to children.
Develop guidelines and resources specifically addressing safe social media practices
within family settings. Encourage open communication between parents and children
about responsible social media usage and potential risks.
PROBLEM FORMULATION
One of the most vulnerable groups to cyber victimization is found to be children, teens and
older adults throughout the world. Since the global elderly population is on rise, the
incidents of cyber victimization have also significantly risen over the recent past causing
enormous detrimental financial and societal impacts.
As technology becomes integral to daily life, ensuring that older adults are digitally
included is crucial. This research can contribute to bridging the digital divide by
empowering older adults to navigate smart devices securely and participate in the digital
world.
METHODOLOGY
This study is an investigation about the main threats that face children in the cyberspace
using exploratory surveying method to measure the awareness and readiness of parents
with children aged six years or below and older adult’s awareness and readiness about
cybersecurity in Bhopal.
To answer the research question, it is required to collect the current knowledge on the
challenges faced by senior citizens on online security and the possible remedial actions.
Accordingly, documentary research strategy is adopted for this study and the data was
collected using Systematic Literature Review (SLR) method. Suitable keywords and
synonyms are generated, and the search was conducted on Google Scholar, IEEEXplore,
Pubmed, ScienceDirect and Proquest databases. The results were screened using a pre-
approved screening protocol. The data was extracted after a quality assessment check on
the appropriateness of the review article to the research question.
The questions in the questionnaire are designed as closed type questions with
predetermined answers. The questionnaires consist of four parts. The first part of the
questionnaire intended to establish a validation for the participant to ensure only the
targeted population is participating. Moreover, questions in this part were used as internal
checks for the questionnaire. The second part includes questions designed based on the
survey's first objective which is to measure the current exposure of children to the available
smart technologies. The third part of the questionnaire contains questions to measure the
study's second objective which is to measure the awareness of the parent for their children
level of exposure to smart technologies cybersecurity challenges. The final part of the
questionnaire contains questions based on the study's third objective which is to measure
the readiness of parents to deal with cybersecurity challenges for the protection of their
children.
"Data collecting tools" refers to the tools/devices used to gather data, such as a paper
questionnaire or a system for computer-assisted interviews. Tools used to gather data
include case studies, checklists, interviews, occasionally observation, surveys, and
questionnaires. Data collection is the process of collecting and analyzing information on
relevant variables in a predetermined, methodical way so that one can respond to specific
research questions, test hypotheses, and assess results. Data collection can be either
qualitative or quantitative. Example: A company collects customer feedback through online
surveys and social media monitoring to improve their products and services.
CONCLUSION
Secure online environment for their children. As primary influencers, parents are
instrumental in instilling responsible digital behaviors, setting boundaries, and guiding
children through the intricacies of the digital landscape.
The study sheds light on the complexities of social media engagement for older adults.
Safely navigating social platforms involves understanding privacy settings, recognizing
potential scams, and fostering responsible online behavior. Empowering older individuals
with these skills is crucial for a secure digital social presence.
REFERENCES
Z. Siddiqui and N. Zeeshan, "A Survey on Cybersecurity Challenges and Awareness for
Children of all Ages," 2020 International Conference on Computing, Electronics &
Communications Engineering (iCCECE), Southend, UK, 2020, pp. 131-136, doi:
10.1109/iCCECE49321.2020.9231229.