Age-appropriate password "best practice" ontologies for early educators and parents

Abstract Many mobile apps are developed specifically for use by children. As a consequence, children become actors in world where they use passwords to authenticate themselves from a very young age. As such, there is a need for guidance to inform educators and parents about how to prepare children for responsible password practice. Very little attention has been paid to determining which password-related principles young children should know, and the age at which this information should be imparted. To address this deficiency, we commenced by deriving an ontology of “best practice” password principles from official sources. These password principles encode essential knowledge for password users of all ages and provide a benchmark that can be used to ground a set of age-appropriate ontologies. We compared this benchmark “good practice” ontology to the advice provided by a wide-ranging snapshot of password-related children’s books and parents’ online resources. We then consulted the research literature to identify the skills required to understand and apply each principle, and removed those that were unsuitable for young children. We then consulted parents of young children to help us to confirm the classification of the ontology’s principles in terms of age appropriateness. Parents also helped us to rephrase each principle to maximise accessibility and understandability for each age group. We conclude with our final set of three age-appropriate password best practice ontologies as a helpful resource for early education professionals and parents.

[1]  Hyuk-Chul Kwon,et al.  Cyber Forensics Ontology for Cyber Criminal Investigation , 2009, e-Forensics.

[2]  E. Burnstein,et al.  “I am not guilty” vs “I am innocent”: Successful negation may depend on the schema used for its encoding☆ , 2004 .

[3]  Porter E. Coggins Implications of What Children Know About Computer Passwords , 2013 .

[4]  B. Hodson,et al.  Variables that influence decoding and spelling in beginning readers , 2005 .

[5]  Marcus K. Rogers,et al.  A cyber forensics ontology: Creating a new approach to studying cyber forensics , 2006, Digit. Investig..

[6]  Robert F. Otondo,et al.  "This is the way 'I' create my passwords" ... does the endowment effect deter people from changing the way they create their passwords? , 2019, Comput. Secur..

[7]  J. Wilding,et al.  The nature of attentional differences between groups of children differentiated by teacher ratings of attention and hyperactivity. , 2001, British journal of psychology.

[8]  Sumbal Maqsood Children's Text Password Behaviors and Parental Advice , 2018 .

[9]  Wynne Harlen,et al.  Primary teachers' understanding in science and its impact in the classroom , 1997 .

[10]  Tamara L. Clegg,et al.  'No Telling Passcodes Out Because They're Private' , 2017, Proc. ACM Hum. Comput. Interact..

[11]  A Schlottmann,et al.  Children's probability intuitions: understanding the expected value of complex gambles. , 2001, Child development.

[12]  Janet C. Read,et al.  Investigating Children's Passwords using a Game-based Survey , 2017, IDC.

[13]  Suzanne E. Welcome,et al.  Longitudinal Mapping of Cortical Thickness and Brain Growth in Normal Children , 2022 .

[14]  Gordon A. Hale,et al.  THE DEVELOPMENT OF ATTENTION IN CHILDREN1 , 1973 .

[15]  L. Crockett,et al.  Developmental Stability and Change in Self-Regulation From Childhood to Adolescence , 2005, The Journal of genetic psychology.

[16]  H. Wellman The Child's Theory of Mind , 1990 .

[17]  Janet C. Read,et al.  Designing textual password systems for children , 2012, IDC '12.

[18]  Anneke M Metz,et al.  Teaching statistics in biology: using inquiry-based learning to strengthen understanding of statistical analysis in biology laboratory courses. , 2008, CBE life sciences education.

[19]  Kathleen Beullens,et al.  Parent–child conflict about children’s tablet use: The role of parental mediation , 2017, New Media Soc..

[20]  Sonia Chiasson,et al.  No passwords needed: the iterative design of a parent-child authentication mechanism , 2017, MobileHCI.

[21]  Bruce A. Murray,et al.  How do beginners learn to read irregular words as sight words? , 2018, Journal of Research in Reading.

[22]  Linnea C. Ehri,et al.  Phases of development in learning to read words by sight , 1995 .

[23]  J. Peskin,et al.  Representing the Mental World in Children's Social Behavior: Playing Hide‐and‐Seek and Keeping a Secret , 2003 .

[24]  Peter Nikken,et al.  Guiding Young Children’s Digital Media Use: SES-Differences in Mediation Concerns and Competence , 2018, Journal of child and family studies.

[25]  J. Beech Ehri's model of phases of learning to read: a brief critique , 2005 .

[26]  C. Pernet,et al.  Neural dissociation of phonological and visual attention span disorders in developmental dyslexia: FMRI evidence from two case reports , 2012, Brain and Language.

[27]  S. Gathercole Cognitive approaches to the development of short-term memory , 1999, Trends in Cognitive Sciences.

[28]  M. Terras,et al.  Family Digital Literacy Practices and Children’s Mobile Phone Use , 2016, Front. Psychol..

[29]  S. Larkin Metacognition in Young Children , 2009 .

[30]  Ellen Bialystok,et al.  The relationship between bilingualism and the development of cognitive processes in problem solving , 1998, Applied Psycholinguistics.

[31]  Jade Guan,et al.  Children in the digital age: exploring issues of cybersecurity , 2012, iConference '12.

[32]  Michael I. Norton,et al.  How actions create – not just reveal – preferences , 2008, Trends in Cognitive Sciences.

[33]  D. Ausubel The transition from concrete to abstract cognitive functioning: Theoretical issues and implications for education , 1964 .

[34]  Sonia Livingstone,et al.  How parents of young children manage digital devices at home: the role of income, education and parental style , 2015 .

[35]  L. Anagnostaki,et al.  Secrets and Disclosures: How Young Children Handle Secrets , 2013, The Journal of genetic psychology.

[36]  Edward Cutrell,et al.  What are you looking for?: an eye-tracking study of information usage in web search , 2007, CHI.

[37]  Yee-Yin Choong A Cognitive-Behavioral Framework of User Password Management Lifecycle , 2014, HCI.

[38]  Ken Appleton,et al.  How Do Beginning Primary School Teachers Cope with Science? Toward an Understanding of Science Teaching Practice , 2003 .