A survey on cybersecurity challenges and awareness for children of all ages

Zeeshan Siddiqui, Nida Zeeshan

Research output: Chapter in Book/Report/Conference proceedingConference contribution

4 Citations (Scopus)
109 Downloads (Pure)


Children are considered an easy prey to many cybersecurity threats. This is due to the lack of awareness of such threats while using smart devices, like smartphones. In most of the cases, not only children but their parents are also unaware of these security threats. Therefore, in this research, we have performed a comprehensive survey on various aspects of cybersecurity threats and its awareness among children. Such as, online safety and security for children, security control challenges and cybersecurity challenges for children and parents. We have also performed a security test to demonstrate the effectiveness of built-in security and privacy settings of such devices. For this purpose, we have used the built-in security and privacy settings of an iPhone 11 and performed various usage tests on unrestricted and restricted mode. The tests and observations have proved that the built-in security and privacy controls, such as Screen Time or Parental Controls, are the most effective way to safeguard children from various Cybersecurity threats they may face during their use of such devices and lack of cybersecurity awareness.
Original languageEnglish
Title of host publicationProceedings 2020 International Conference on Computing, Electronics & Communications Engineering (iCCECE)
EditorsMahdi H. Miraz, Peter S. Excell, Andrew Ware, Safeeullah Soomro, Maaruf Ali
Place of PublicationPiscataway, NJ
Number of pages6
ISBN (Electronic)9781728163307, 9781728163291
ISBN (Print)9781728163314
Publication statusPublished - 23 Oct 2020


  • information security
  • cyber security
  • security awareness
  • online safety
  • security and privacy
  • parental security controls


Dive into the research topics of 'A survey on cybersecurity challenges and awareness for children of all ages'. Together they form a unique fingerprint.

Cite this