SikkerhetsLøypa - Knowledge Toward Sustainable and Secure Paths of Creative and Critical Digital Skills

  • Letizia JaccheriEmail author
  • Deepti MishraEmail author
  • Siv Hilde Houmb
  • Aida Omerovic
  • Sofia Papavlasopoulou
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 10507)


Children spend numerous hours on the Internet daily. While online, they meet a great number of opportunities as well as risks. Of these risks, cyber bullying and privacy violations are of major concern, in addition to exploitation and child pornography. Our hypothesis is that the solution is not to keep children and teens away from the Internet, but to ensure that young citizens are empowered with the necessary knowledge and skill set to become critical consumers and creators of new secure and sustainable digital services and products. Our objective is to develop a knowledge and skill set base and offer learning through playful solutions for empowering children and young people with creative and critical digital skills, in an engaging and motivating way. The aim is to build on the method and lessons learns of Kodeløypa, one of the scientific offerings for children at the Norwegian University of Science and Technology (NTNU), and the related scientific efforts made to empower a new generation of online users to avoid risks in the modern digital society. The project, SikkerhetsLøypa, is highly inter-disciplinary and spans across the fields of information security, user experience, software engineering, and computer science education. The scientific results of this project aims at strengthen education methods and practices in secure and privacy-aware behavior in the digital world.


Digital society Online behavior Video games Security Gender 


  1. 1.
    Staksrud, E., Livingstone, S.: Children and online risk. Inf. Commun. Soc. 12(3), 364–387 (2009). doi: 10.1080/13691180802635455 CrossRefGoogle Scholar
  2. 2.
    Teimouri, M., Hassan, M.S., Griffiths, M., Benrazavi, S.R., Bolong, J., Daud, A., Adzharuddin, N.A.: Assessing the validity of western measurement of online risks to children in an Asian context. Child Indic. Res. (2015)Google Scholar
  3. 3.
    Cybersecurity Strategic Research Agenda – SRA, Produced by the European Network and Information Security (NIS) Platform.
  4. 4.
    Reid, R., Van Niekerk, J.: Back to basics: information security education for the youth via gameplay. In: Dodge, R.C., Futcher, L. (eds.) WISE 2009. IAICT, vol. 406, pp. 1–10. Springer, Heidelberg (2013). doi: 10.1007/978-3-642-39377-8_1 CrossRefGoogle Scholar
  5. 5.
    Stanescu, I.A., Stefan, A., Baalsrud Hauge, J.M.: Using gamification mechanisms and digital games in structured and unstructured learning contexts. In: Wallner, G., Kriglstein, S., Hlavacs, H., Malaka, R., Lugmayr, A., Yang, H.-S. (eds.) ICEC 2016. LNCS, vol. 9926, pp. 3–14. Springer, Cham (2016). doi: 10.1007/978-3-319-46100-7_1 CrossRefGoogle Scholar
  6. 6.
    Hussain, Z., Griffiths, M.D., Baguley, T.: Online gaming addiction : classification, prediction and associated risk factors. Inf. Healthc. 6359 (2012)Google Scholar
  7. 7.
    Livingstone, S., Haddon, L.: Comparing children’s online opportunities and risks across Europe (2009)Google Scholar
  8. 8.
    Lenhart, A.: Teens and sexting: how and why minor teens are sending sexually suggestive nude or nearly nude images via text messaging. Specialist 4, 2010 (2009)Google Scholar
  9. 9.
    Livingstone, S., Mascheroni, G., Ólafsson, K.: Children’s online risks and opportunities: comparative findings from EU Kids Online and Net Children Go Mobile Executive summary (2014)Google Scholar
  10. 10.
    Hasebrink, U., Görzig, A., Haddon, L., Kalmus, V., Livingstone, S.: Patterns of Risk and Safety Online. LSD, EU Kids Online Network, London (2011)Google Scholar
  11. 11.
    Lorenz, B., Kikkas, K., Laanpere, M., Laugasson, E.: A model to evaluate digital safety concerns in school environment. In: Zaphiris, P., Ioannou, A. (eds.) LCT 2016. LNCS, vol. 9753, pp. 707–721. Springer, Cham (2016). doi: 10.1007/978-3-319-39483-1_64 CrossRefGoogle Scholar
  12. 12.
    Ofcom: Children Believe Everything they Read Online (2015)Google Scholar
  13. 13.
    Ashcroft, M., Kaati, L., Meyer, M.: A step towards detecting online grooming – identifying adults pretending to be children. In: Proceedings of the 2015 European Intelligence and Security Informatics Conference, EISIC 2015, pp. 98–104. IEEE Computer Society, Washington, DC (2015)Google Scholar
  14. 14.
    Tsirtsis, A., Tsapatsoulis, N., Stamatelatos, M., Papadamou, K., Sirivianos, M.: Cyber security risks for minors: a taxonomy and a software architecture. In: 2016 11th International Workshop on Semantic and Social Media Adaptation and Personalization (SMAP), Thessaloniki, pp. 93–99 (2016)Google Scholar
  15. 15.
    Implementing the Children’s Online Privacy Protection Act: A Report to Congress, FTC, February 2007.
  16. 16.
    Marwick, A., Murgia-Diaz, D., Palfrey, J.: Youth, privacy and reputations. Berkman Center Research, Technical report 2010-5 (2010).
  17. 17.
    Ktoridou, D., Eteokleous, N., Zahariadou, A.: Exploring parents’ and children’s awareness on internet threats in relation to internet safety. Campus Wide Inf. Syst. 29(3), 133–143 (2012)CrossRefGoogle Scholar
  18. 18.
    Gentile, D.A., Choo, H., Liau, A., Sim, T., Li, D., Fung, D., Khoo, A.: Pathological video game use amongst youths: a two-year longitudinal study. Pediatrics 127, 319–329 (2011)CrossRefGoogle Scholar
  19. 19.
    Huang, X., Zhang, H., Li, M., Wang, J., Zhang, Y., Tao, R.: Mental health, personality, and parental rearing styles of adolescents with internet addiction disorder. Cyber Psychol. Behav. Soc. Netw. 13(4), 401–406 (2010)CrossRefGoogle Scholar
  20. 20.
    Kwisook, C., Hyunsook, S., Myunghee, P., Jinkyu, H., Kitai, K., Byungkoo, L., Hyesun, G.: Internet overuse and excessive daytime sleepiness in adolescents. Psychiatry Clin. Neurosci. 63(4), 455–462 (2009)CrossRefGoogle Scholar
  21. 21.
    Lemmens, J.S., Valkenburg, P.M., Peter, J.: Development and validation of a game addiction scale for adolescents. Media Psychol. 12, 77–95 (2009)CrossRefGoogle Scholar
  22. 22.
    Van Rooij, A.J., Schoenmakers, T.M., Vermulst, A.A., Van Den Eijnden, R.J.J.M., Van De Mheen, D.: Online video game addiction: identification of addicted adolescent gamers. Addiction 106, 205–212 (2011)CrossRefGoogle Scholar
  23. 23.
    Kafai, Y.B., Richard, G.T., Brendesha, M. (eds.) Diversifying Barbie and Mortal Kombat, Intersectional Perspectives and Inclusive Designs in Gaming. ETC Press (2016)Google Scholar
  24. 24.
    Gorriz, C.M., Medina, C.: Engaging girls with computers through software games. Commun. ACM 43(1), 42–49 (2000)CrossRefGoogle Scholar
  25. 25.
    Fron, J., Fullerton, T., Morie, J., Pearce, C.: The hegemony of play. In: Baba, A. (ed.) Situated Play: Proceedings of the Digital Games Research Association Conference, Tokyo, pp. 309–318, 24–28 September 2007Google Scholar
  26. 26.
    Bryce, J.O., Rutter, J.: Gender dynamics and the social and spatial organization of computer gaming. Leis. Stud. 22(1), 1–15 (2003). Routledge, LondonCrossRefGoogle Scholar
  27. 27.
    Giannakos, M.N., Jaccheri, L., Leftheriotis, I.: Happy girls engaging with technology: assessing emotions and engagement related to programming activities. In: Zaphiris, P., Ioannou, A. (eds.) LCT 2014. LNCS, vol. 8523, pp. 398–409. Springer, Cham (2014). doi: 10.1007/978-3-319-07482-5_38 CrossRefGoogle Scholar
  28. 28.
    Giannakos, M.N., Jaccheri, L.: What motivates children to become creators of digital enriched artifacts? In: Proceedings of the 9th ACM Conference on Creativity & Cognition. ACM (2013)Google Scholar
  29. 29.
    Papavlasopoulou, S., Giannakos, M.N., Jaccheri, L.: Creative programming experiences for teenagers: attitudes, performance and gender differences. In: Proceedings of the 15th International Conference on Interaction Design and Children, IDC 2016, pp. 565–570. ACM, New York (2016)Google Scholar
  30. 30.
    Exploiting Ubiquitous Computing, Mobile Computing and the Internet of Things to promote Science Education.

Copyright information

© IFIP International Federation for Information Processing 2017

Authors and Affiliations

  1. 1.Department of Computer ScienceNorwegian University of Science and Technology (NTNU)TrondheimNorway
  2. 2.Department of Computer ScienceNorwegian University of Science and Technology (NTNU)GjøvikNorway
  3. 3.Department of Information Security and Communication TechnologyNorwegian University of Science and Technology (NTNU)GjøvikNorway
  4. 4.Secure-NOK ASStavangerNorway
  5. 5.SINTEF DigitalOsloNorway

Personalised recommendations