2011 IEEE Third Int'l Conference on Privacy, Security, Risk and Trust and 2011 IEEE Third Int'l Conference on Social Computing 2011
DOI: 10.1109/passat/socialcom.2011.194
|View full text |Cite
|
Sign up to set email alerts
|

Risk Mitigation Strategies for Mobile Wi-Fi Robot Toys from Online Pedophiles

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
9
0

Year Published

2017
2017
2020
2020

Publication Types

Select...
4
4

Relationship

0
8

Authors

Journals

citations
Cited by 15 publications
(9 citation statements)
references
References 2 publications
0
9
0
Order By: Relevance
“…Previous efforts have studied COPPA and children's apps from various perspectives. Several researchers have analyzed a range of threats to minors in online social media platforms [56,85], websites [10,14], and smart toys [58,90,91], as well as the appropriateness of inapp ads targeting children [17]. Previous work also examined risks posed by third-party components bundled in children's apps, with a focus on targeted advertisements [11,53].…”
Section: Children's Applicationsmentioning
confidence: 99%
“…Previous efforts have studied COPPA and children's apps from various perspectives. Several researchers have analyzed a range of threats to minors in online social media platforms [56,85], websites [10,14], and smart toys [58,90,91], as well as the appropriateness of inapp ads targeting children [17]. Previous work also examined risks posed by third-party components bundled in children's apps, with a focus on targeted advertisements [11,53].…”
Section: Children's Applicationsmentioning
confidence: 99%
“…By deinition, robots are equipped with the ability to sense, process, and record the world around them. These concerns about privacy problems can go as far as making robotic toys tools for pedophiles: "Because of their built-in cameras, microphones, speakers, and mobile capabilities, all of which can be controlled remotely, mobile Wi-Fi robot toys can pose a risk to families with children when used remotely, an atribute that can be exploited by online pedophiles who want to exploit young children online" [16]. This is not a distant disturbing possibility, it is happening right now.…”
Section: Privacy Risks Characterizationmentioning
confidence: 99%
“…Recent high-profile hacks of smart toys [1], [5], have drawn considerable press attention to the privacy and security risks of Internet-connected devices for children [6], [7]. The academic community has responded to consumer concern with studies auditing smart toys [3], [8]- [10], analyzing children's and parents' interactions with smart toys [11], [12], and proposing technical and legal frameworks or requirements for improving smart toy security and privacy [13]- [17]. This work fits into the general methodological framework of previous toy security audits in that it systematically explores vulnerabilities in consumer smart toys, provides proof-of-concept exploits, and suggests remediation techniques.…”
Section: Related Workmentioning
confidence: 99%