Designing for or designing with? Informant design for interactive learning environments
Proceedings of the ACM SIGCHI Conference on Human factors in computing systems
Cooperative inquiry: developing new technologies for children with children
Proceedings of the SIGCHI conference on Human Factors in Computing Systems
Requirements for the design of a handwriting recognition based writing interface for children
Proceedings of the 2004 conference on Interaction design and children: building a community
Security in the wild: user strategies for managing security as an everyday, practical problem
Personal and Ubiquitous Computing
Password management strategies for online accounts
SOUPS '06 Proceedings of the second symposium on Usable privacy and security
Password sharing: implications for security design based on social practice
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Passwords decay, words endure: secure and re-usable multiple password mnemonics
Proceedings of the 2007 ACM symposium on Applied computing
Personal knowledge questions for fallback authentication: security questions in the era of Facebook
Proceedings of the 4th symposium on Usable privacy and security
Enriching Archaeological Parks with Contextual Sounds and Mobile Technology
ACM Transactions on Computer-Human Interaction (TOCHI)
An EUD Approach to the Design of Educational Games
International Journal of Distance Education Technologies
Hi-index | 0.01 |
This paper describes a novel design activity that was used to gather insights into security requirements for a mobile application for children. The general aim of the study was to understand how to design for security in an application for children rather than to specifically generate design solutions. To gather this information, a novel design activity, referred to here as Participatory Analogy, was devised. The study is described and design solutions that emerged following analysis of the children's contributions are presented.