SlideShare a Scribd company logo
1 of 359
Why Cryptosystems Fail
ryptography is used by governments, banks, and other or-
ganizatiom to keep
messages secret and to protect electronic transactions from
modification. It
is basically an engineering discipline, but differs in a rather
striking way
from, for example, aeronautical engineering: there is almost no
public feed-
back about how cryptographic systems fail.
Commercial airline crashes are extremely public events.
Investigators
rush to the scene, and their inquiries involve experts from a
wide range of
interestsfrom the carrier, through the manufacturer, to the
pilots’ union.
Their findings are examined byjournalisrs and politicians,
discussed on elec-
tronic bulletin boards and in pilots’ messes, and passed on by
flying instruc-
tors. This learning mechanism is the main reawn why, despite
the inherent
hazards of flying, the risk of an individual being killed on a
scheduled air
journey is only about one in a million.
Cryptographers rarely get this kind of feedback, and indeed the
history of
the subject shows the same mistakes being made over and over
again. For
example, Norway’s rapid fall in the Second World War was
largely due to the
Germans’ success in solving British naval codesusing exactly
the same tech-
niques that the Royal Navy’s own “Room 40” had used against
Germany in
the previous war [ 161.
Altbough we now have a reasonable history of cryptology up to
the end
of World War II, a curtain of silence has descended on
government-sector
use of this technology since then. Although this is not
particularly surpris
ing, it does leave a large experience deficit, especially as the
introduction of.
computers since 1945 has changed the situation considerably. It
is as ifacci-
dent reports were only published for pistonengined aircraft,
while the caw
es of all jet-aircraft crashes were kept a state secret.
This secrecy is no longer appropriate, a~ military messaging
networ!~ now
make up only about 1% of the world’s crptography, whether we
measure
this by the number of users or by the number of terminals.
There are some
civilian applications for secure messaging, such as interbank
money transfer
and burglar alarm signaling; but the great majority of fielded
cryptographic
systems are in applications such as bank cards, pay-TV, road
tolls, office
building and computer access tokens, lottery termmals, and
prepayment
electricity meters. Their job is basically to make petty crime,
such as card
forgery, slightly more difficult.
Cryptography was introduced to the commercial world from the
military
by designers of automatic teller machine (ATM) systems in the
early 1970s.
Since then, ATM security techniques have inspired many of the
other sys
ternsespecially those where customers initiate low-value
transactions for
which we want to account. One might therefore expect the ATM
experience
to give a good first-order threat model for cryptographic
systems in general.
Automatic Teller Machine Disputes
In SCIIIK countries, banks are responsible for the risks
associated with new
technology In 1980, a New York court believed a bank
customer’s word that
she had n”t made a withdrawal, rarhcl
than the word of the bank’s exper,
that she must have done so 1151; the
Federal Reserve then passed regula-
dons that require U.S. banks to refund
all disputed electronic transactions
unless they can prove fraud by the cus-
tamer. Since then, many U.S. ATM
cash dispensers have had video carr-
eras installed.
In Britain, the courts have not yrt
been so demanding; despite a parha-
mentary commission that found thar
the personal identification numbe
(PIN) system was insrcurr [14], bank-
crs simply deny that their systems ca”
ever be at fault. Customers who c”m
plain about “phantom withdrawals”
are told that they must be lying, 01
mistaken, or that they must have
been defrauded by their friends or
relatives. This has led t” a string of
court cases in the U.K.:
l A teenage girl in Ashton was COIL-
victed in 1985 of stealing f40 from
her father. She pleaded guilty on
the advice of her lawyers that shy
had no defense, and then disap-
peared; it later turned “ut that
there had nevrr been a theft, but a
clerical rrr”r by the bank, which
tried to cover it up.
. A She&Id police sergeant wa>
charged with theft in N”vembe,
1988 after a phantom withdrawal
took place on a card he had confia-
cated from a suspect. He was lucky:
his colleagues located the person
who made the transaction after the
disputed one, and her testimony
cleared him
l Charges of theft against an el-
derly w”man in Plymouth were
dropped after our inquiries showed
the bank’s computer security sys-
terns were a shambles. The same
happened in a case against a taxi
driver in Great Yarmouth.
l After a police constable c”m
plained he had not madr six AIM
withdrawals that appeared on his
bank statement, the bank had him
prosecuted and convicted for at-
tempting to obtain money by decrp-
don. Their technical evidence was
highly suspect; there was an outcry
in the press, and an appeal is
under way.
l Customers are suing banks in the
civil courts in both England and
&otlar~d, dnd n C~LC ,,,a? lbe
launched shol-tly in Norwa) a well
Wr have been involved i” prow-
ing expcrr advice in many of thrse
cases, which produced a vasr quantity
of evidence. In addition m this, and
“the,- information discovered
through the legal p,-ocess, we haw
intcrvirwed former bank rmployeeb
and criminals, srarching the banking,
legal, and trchnical literatures, and
drawn on experirnce gainrd dcsign-
ing cryptographic equipment. One
outcome of all this activity has been
the first unclassified study ofhow and
why cryptosystcms fail.
The Three COmmOfl Problems
with ATM Security
Automatic teller- machine systems ue
rncryption t” protect customers
PINs. The details vary from one bank
m another, but many use variants ofa
system originally drvclopcd by IBM
[21], in which the PIN is derived from
the account number by encryption. Ir
is also rncryptrd while being sent
Srom the ATM to thr bank for vrrifi-
cat;on.
When the crypt” know-how was
“riginally imported from the dcfenae
sector, a threat model came with it.
This model presumed that attacks on
the system would be technically so-
phisticated, and might in,olve crypr-
analysis or the manipulation of trans-
acti”ns at s”mr point in the path
between the ATM and the bank that
issued the card.
Indeed, there are many ways i”
which a skilled attacker could pene-
tratr thr world’s ATM networks [3].
Some networks do not cncrypt PINS
properly, or at all; many banks, espc-
cially in the U.S., do encryption in
software rather than hardware, with
the rrsult that the keys are known t”
programmers; somr older ATMs and
encryption devices have known wcak-
nesses; and even those systems that
use approved encryption hardware
can be vulnerable, as the Data En-
cryption Standard algorithm is be-
coming increasingly “pen t” attack
[24]. All these facts are used by en-
cryption equipment sales staff in thei!
efforts t” persuade bankrrs to buy the
latest products.
Of the hundreds of documented
failures of ATM security, however,
“nl) IMO rnwlwd ruch attack*: in
one, a telephone engineer in Japan
recorded customer Cal-d data and
PIN5 from a phone line; in the other,
technicians programmed a communi-
cations px-ocessol- to send only posit
tive authorirati”ns t” an ATM where
accomplices were waiting. None of
the other thefts and frauds wrre due
t” skilled attack, but were rather
made possible by errors in the desig”
or operation of the ATM system itself
The three main causes of phantom
withdrawals did not involve cryptol-
ogy at all: they w.e,vz pr”gram buga,
postal interception OS cards, and
thefts by bank staff.
First, there is a “background
noise” of transacti”ns that turn out t”
be wrongly processed (e.g., posted t”
the wong account,. It is well known
that it is difficult to get an error rate
below about 1 in 10,000 on largr, he
rrogcnrous transaction pl-“casing
systems such as ATM networks [IO],
yet, bef”re the British litigation
started, the government minister rc-
sponsiblc for Britain’5 banking indus-
try was claiming an rrr”r rate of 1 in
1.5 million! Under prcsaurr from
lawyers, this claim was trimmed to I
in 250,000, then 1 in 100,000, and
most recently to I in 34,000. Eveo
this last figure would still mean thal
about 30,000 phantom withdrawals a
year in Britain (and “vrr 200,000 in
the United States) are caused by pro-
cessing errors.
Second, problems with the posul
service are also well known and can
be particularly acute in university
towns. In Cambridge, for example,
approximately 4,000 pcoplc “pen
bank accounts every October; thei,
ATM cards and PINS are delivered t”
college pigeonholes, which are wide
open t” thieves. Yet this author’5
bank was unable t” arrange for a card
to be sent by recorded delivery; ita
systrm designers had not anticipated
the requirement.
The third big problem is theft by
bank stall. British banks dismiss
about I% of their staff every year for
disciplinary reasons, and many of
these firings are for petty thefts in
which ATMs can easily bc involved.
There is a mwal hazard here: staff
know that many ATM-related theft5
g” undetected because of the p”licy
the pwblem (and it did not occur
to anyone t” check).
. One of the largest Londrm hanks
had written the encrypted PIN on
the card’s magnetic strip. The crirw
inal fraternity found by trial and
error that you could changr the
arcount number on your own card’s
magnetic strip to that of y”ur tdr-
get, and then use it with your “WI>
PIN to toot the targeted acc”unt. A
document about this tectmique cir-
culated in the British prison systenl,
and tw” men were recently chargrd
at Bristol Crown c”wt “f conspiring
to steal money by altering cards in
this way. They produced an em-
nrnt banking industry expert who
testified that what they had planned
was impossible; but after a leading
newspaper demonstrated otherwise,
they changed their plea to guilty[8].
l Some banks have schemes that
enable PINS to be checked by “ff-
line ATMs withnut giving them the
master encryption key needed t”
derive PINS from account numbezra.
For example, customers of one Brit-
ish bank got a credit-card PIN with
digit-one plus digit-four equal t”
digit-two plus digit-thrcr, and a
debit-card PIN with one plus three
equals tw” plus four. Villains even-
tually discovered that they could
use stolen cards in off-line devicea
by entering a PIN such as 4455.
l Even without such weaknesses,
the use of store-and-forward pro-
cessing is problematic. Anyone can
“pen an account, get a card and
PIN, make several copies of the
card, and get accomplices to draw
cash from a number of different
ATMs at the samr time. This was a
favorite modus operandi in Britain
in the mid-19ROs, and is still a
problem in Italy, where ATMs arc
generally off-line over the weekend.
l Any security technology can be
defeated by gross negligence. In
August 1993, my wife went into a
branch of our bank and told them
that she had forgotten hrr PIN;
they helpfully printed a replace-
ment PIN mailer from a PC behind
the counter. This was not the
branch at which her acc”unt is
kept; no “ne knew her, and the
only identification she produced
was her bank card and checkbook.
By thnt tm,e, bank5 II, Bntam hnd
endured some 18 months of bad
publicity about pwr ATM sccuriry,
and this parrirutar bank had been 4
press target since April of that year.
Tllis might Icad IIS to ak what the
future might bold. M’ill all magnrtic
cards br replaced with smartcards, as
is already happrning in countrirs
from Francr t” Guatemala and from
Norway t” South Africa [Z]? One “I
the smartcard vrndors strongest ar-
guments is that card forgery keeps on
rising, and that the fastest growin!:
modus “prrandi is to use hdac trm&
nals to collrct customer card and PIN
data.
Artarks “1 this kind were lirsr ICI-
ported from the United Stares in
198X; more recently, an enterprising
gang b”ughtATMa and an ATM aoft-
ware dcvrtopmrnt kit (on credit),
pwgrammed a machine t” capturr
PINS, and rented space f”l, it in a
shopping mall in Connecticut. A
Dutch gas station attrndant used a
tapped pr,int-of-sale terminal t” har-
vest card data in 1993; and in March
1994, villains constructed an entire
bogus bank branch in the East Lnd of
London and made off with f250,OOO
($375,000). Thcrr srems to be no de-
fense against this kind of attack, short
of moving fwm magnetic cards to
payment tokens, which are more dil-
ficult to forge.
But trusting technology to” much
can be dangerous. Norwegian banks
aprnt millions “n smartcards, and arc
now as publicly certain about theit
computer security as their British c”I-
leagues. Yet despite the huge iwest-
ment, there have been a number of
cases in Trondheim, Norway, where
stolen cards have been used without
the PIN having been lraked by the
user. The hanks‘ refusal to pay up will
probably lead t” litigation, as in Brit-
ain, with the same risk to both bal-
ance sheets and reputations.
Where transaction processing sys-
tems are used directly by the public,
there are really two separate issues.
The first is the public-interest issue of
whether the burden of proof (and
thus the risk) falls on the customer or
on the system operator. If the cus-
mmer carries the risk, the operator
will have little short-term incentive to
rn~p~ovc security; but 111 the lorlg:cl
term, when innocent people are prose
ccutrd because of disputed transa-
ti~ns, the public interest becomea
acute.
If, “1, thr other hand, thr system
operator carrirs the risk, as in the
United States, then the public-intcr-
est isuc disappcara, and security be-
comes a straightfwward engineering
pwblrm fix the hank (and its insur-
e1.s and equipment suppliers). WC
wnsider how this problem can br
tackled in the following sections.
Organizational Aspects
First, a caveat: our reseat& sbowcd
that the organizational problems “I
building and managing srcure sys-
tems arc so ~rvrrr that they will frus-
trate any purely technical solution.
Many organizations have no corn
puter security team at all, and the rep,
have tenuous arrangements. The irr-
ternal audit dcpartmcnt, fw rxam-
plr, will resist bring givrn any line
management tasks, while the pro-
gramming staftdislike anyone whose
role seems m be making their .j”b
more difficult. Security teams thus
tend to be “rrorganizrd” rrgulxly,
lading t” a toss of continuity; a re-
cent study shows, for example, that
the average job tenure of compurel
security managers in U.S. govern-
ment departments is only seven
months [13].
It should not br surprising that
many firms get outside consultants t”
do their security policy-making and
review tasks. However, this can be
dangerous, especially if firms pick
these suppliers for an “air ofcertainty
and quality” rather than for theit
technical credentials. For example,
there was a network “fover 40 hanks
in &a that encrypted their PINS in a
completely insecure manner (using a
Caesar cipher) for five years, yet in all
this time not one of their auditors or
consultants raised the alarm. It is in-
teresting to notr that, following a
wave of litigation, accountancy firma
are rewriting their audit contracts to
shift all responslbthty for fraud con-
trol to their clients; but it remains to
be seen what effect this wilt have on
their security consulting business.
Much of the management debate,
however, is not about the consultancy
The Problems with Securitv
Products
know that most hkel) fkuhs, ,n<t, as a
poor batch of steel, contaminated
concrete, or uneven weathering, have
the effect of slightly reducing the
breaking strain of the structure; so
thr usual rule is to design a bridge so
that its theoretical breaking strain
with optimal materials is six times
what is required, and to proof tat
samples of the actual materials used
to three times the ncrdcd strength.
Aircraft rngincers, on the other
hand, know that many accidents are
causrd by the failure of critical com-
ponents, and make extensive use of
redundancy; with very critical func-
tions, this may rxtrnd to design di-
versity. Whrn flying in clouds, pilots
need to know which way is up, and so
a modern airliner typically has two
attitude indicators driven by elcctri-
tally powered gyro platforms. If these
both fail at once, there is a 1950s-rra
technology artificial horizon with
pneumatically driven gyros, and a
1920s vintage turn-and-slip indicator
driven by a battery.
But neither overdcsign nur redun-
dancy is adequate for secure compu-
tational systems. Just doing more
rounds of a bad encryption algo-
rithm, or using a number of weak al-
gorithms one after another, will not
necessarily produce a strong one; and
unthinking use of redundancy in
computer systems can be dangerous,
as resilience can mask faults that
would otherwise be found and fixed.
Our work on ATM systems thcre-
fore inspired us to look for an orga-
nizing principle for robustness prop-
erties in computer security systems.
The kry insights came from the high-
tech end of the business-from
studying authentication protocols
and the ways in which cryptographic
algorithms interact (see the sidebar
“No Silver Bullet”).
These results suggest that explicit-
ness should be the organizing princi-
ple for security robustness. Crypto-
graphic algorithms interact in ways
that break security when their de-
signers do not specify the required
properties explicitly; and protocol
failures occur because naming, fresh-
ness, and chaining properties are as-
sumed implicitly to hold between two
parties.
The importance of explicitness is
confirmed m tbr field of oprtamg
systems security by a recent report
that shows implicit information proh-
lems were one of the main causes of
failure there, and that most of thr
others were due to obGous require-
ments not being explicitly checked [ 171.
However, just saying that every
sccul(ty property must be made ex-
plicit is not a solution to the practical
problem of building robust systems.
The more aspects of any system are
made explicit, the more information
its designer has to deal with; and this
applies not only to designing systems,
hut to evaluating them as well. Can
our explicitness principle ever
amount to more than a warning that
all a system’s assumptions must be
examined very carefully?
There are two possible ways for-
ward. The first is to look for ways in
which a system that has a certain set
ofrelationships checked explicitly can
be shown using formal methods to
possess some desirable security prop-
erty. This may be a good way to deal
with compact subsystems such as au-
thentication protocols; and lists of the
relevant relationships have been pro-
posed [I].
The othrr, and more general, ap-
proach is to try to integrate security
with software engineering. Data-
dependency analysis is already start-
ing to be used in the security world:
l A typical difftcult problem is iden-
tifying which objects in a system
have security significance. As we
saw previously, frauds have taken
place because banks failed to realix
that an address change was a secu-
rity event; and evaluating thr signif-
icance of all the objects in a distrib-
uted operating system is a
Herculean task, which involves trac-
ing dependencies explicitly. Auto-
mated tools are now being con-
structed to do this [l I];
l Another difficult problem is that
of verifying whether an authentica-
tion protocol is correct. This prob-
lem can he tackled by formal meth-
ods; the best-known technique
involves tracing an object’s dcpen-
dencies on crypto keys and fresh-
ness information [9], and has been
used to verify transaction processing
applications as well [2].
However, we cannot expect to find
a “sdvr, bullrr” brtr crrbrr ‘1 t,,i 1s
bccaux many of the m,,re subtle and
difftcult mistakes occur whew ash
sumptioos ahoul security proper&b
fail at the interfacr between different
levels (e.g., algorithm-prot~j,col or
protocol-operating system) [6]. Thus
when WC decompose our system into
mod&s, we must be very careful to
ensure that all our assumptions about
possible interactions have been made
explicit and conzidrrcd carefully.
Explicitness and Software
Engineering
Robustness as rxplicitnesb lita m well
with the general principles of soft-
ware engineering but may require
some changes in its practice. A recent
study shows that for many years the
techniques used by system builders tu
manage security requirements, as-
sumptions, and drpendencies have
lagged a grneration behind the state
of the art [5].
An even more elementary problem
concerns the mechanisms by which
security goals are established. Many
software engineering methodologies
since the waterfall model have dis-
pensed with the traditional requirc-
ment that a plain-language “concept
of operations” should be agreed
upon before any detailed specifica-
tion work is undertaken. This is illus-
trated by our work on ATMs.
ATM security involves several cow
flicring goals, including controlling
internal and external fraud, and arbi-
trating disputes fairly. This was not
understood in the 1970s; people built
systems with the security technology
they had available, rather than from
any clear idea of what they were try-
ing to do. In some countries they ig-
nored the need for arbitration alto-
gether, with expensive consequences.
This underlines the particular impor-
tance of making security goals ex-
plicit, where a concept of operations
can be a great help; it might have fo-
cused ATM designers’ attention on
the practicalities of dispute resolution.
Finally, it may be helpful to com-
pare secure systems with safety criti-
cal systems. They are known to be re-
lated: while the former must do at
most X, the latter must do at /~_YI X,
and there is a growing realization
that many of the techniques and even
wrnponcnr~ horn one disclplmc can
be reused in the other. Let us extend
this relationship to the methodologi-
cal level and have a look at good de-
sign practice. A leading software
safety expert has summed this up in
four principles [Xl]:
l The specification should list all
possible failure modes of the sys-
tan. This should include every hub-
stantially new accidrnt or incident
that has ever been reported and
that is relevant to the equipment
being specified.
l It should explain what swateg)
has been adopted to prevent each
of these failure modes, or at least
make them acceptably unlikely.
l It should then spell out how each
of these strategies is implemented,
including the consequences when
each single component fails. This
explanation must cover not only
technical factors, but training and
management issues too. If the pro-
cedure when an engine fails is to
continue flying with the other en-
gine, then what skills does a pilot
need to do this, and what are the
procedures whereby these skills are
acquired, kept current, and tested?
l The certification program must
include a review by independent
experts, and test whether the equip-
ment can in fact be operated by
people with the stated level of skill
and experience. It must also in-
clude a monitoring program
whereby all incidents are reported
to both the equipment manufac-
turer and the certification body.
This structure ties in neatly with
our findings, and gives us a practical
paradigm for producing a robust,
explicit security design in a real proj-
ect. It also shows that the TCSEC
program has a long way to go. As we
mentioned earlier, so far no one
seems to have attempted even the
first stage of the safety engineering
process for cryptographic systems.
We hope that this article will contrib-
ute to closing the gap, and to bring-
ing security engineering up to the
standards already achieved by the
safety-critical systems community.
concIustons
Designers of cryptographic systrms
have suttered from a lack <,I feedback
about how their products fail in prac-
tice, as opposed to how they might
fail in theory. This has led to a false
thrrat model being accrpted; design-
e,n focused on what could possibly go
wrong, rather than on what was likely
to, and many of their products ended
up being so complex and tricky to
use, they caused implrmentation
blunders that Icd to security failures.
Almost all security failures are in
fact due to implementation and man-
agement errors. one specific conse-
quence has been a spare of ATM
fraud, which has not only caused fi-
nancial losses, but has also caused sev-
era1 wrongful prosecutions and at
least one miscarriage ofjustice. There
have also been military consequences,
which have now been admitted (al-
though the dewI, remain classitird).
Our work also shows that compo-
nent-level certification, as embodied
in the TCSEC program, is unlikely to
achiew its stated goals. This, too, has
been admitted indirectly by the rnili~
tary; and we would recommend thal
future security standards take much
more account of the environments in
which the components are to be used,
and rspecially the system and human
factors.
Most interesting of all, however, is
the lesson that the bulk of the com-
puter security research and develop-
ment budget is expended on activities
that are of marginal relevance to real
needs. The real problem is how to
build robust security systems, and a
number of recent research ideas arc
providing insights into how this can
No Silver 6ullt?t
Mach of these ProPosats only addresses Part of the Problem.
and none of
them 15 adequate on Its own: ProtPcot fatlures are knOwI which
W$“ttkO”J
the lack of name, or of heshnesr. or M context tnformatton
wtfhtn the s.?C”rth/
envek,Pe 111. But Putting them together and tnststtng on at1
Me% “artabtes
being made exPttCtt t” each me55age aPPears to sot”e the
global rObuStWSI
Problem--af least for StmPte PrOtOCOtS.
This COmbined aPProach had act”att” been adopted in 1991 for
a banttng
aPP,,cat,on 121, In which attact on the Payment Protocots are
Prevented by
making each message stiTt wt+_h the sender’s name. and then
enCr’,Pttng If
under a key that contains a “ash of the Previous message. These
techntdWS
were not Wed as an exPertmenf In robuStne5s. but to factlltate
format Wrtflcatlon.
4nother reason to believe that exPttcitneSS Should be the
organlztng Prlnct-
Pte for robust sec”rtN comer from st”dyt”g how CWPtOgraPhtC
atgortthms
Interact. Researchers have aSLed. for examPte. what sort of
PrOPertIeS We
need from a hash function In order to use It With a given
StgnatUre scheme.
and a number of “ece55ar” CPndtftonS have been found. Thts
ted US tO ask
whether there Is any stngte ProPetT, that IS S”MCte”f to
Prwenf at, dangerous
interactions. We recen#y showed that fhe anrwer is Probably no
141.
What this mexx 16 that in CrfPtotog”. a5 In sG+euare
engtneertng. we cannot
exPect to Rnd a “s,,“er bullet” 171; there can be no general
PrPPei-b, that Pre-
“entS NV0 algorithms frOm t”teWXt”g and Mat 15 tltW tO be
Of any PrWUCat
use. In most real sttuattons. however. we Can eYPtlCltly
SPeCtfY the PTODeTtteS
we need: tyPIcal ProPertIes mlghf be that a function fts
Corretatton-free Iwe
can’t find x and Y such that flxt and WI agree tn too manv blt51
or IIIUtflPtt~
don-free Iwe Can’t find X. y, and L Such fhaf flx)f,“, = ftZtl.
3
the
whole child
development
guide
edition I
Dec. 2004
LEGO®
©2004 The LEGO Group. All Rights Reserved.
The content is made available for individual use and shall not
be reproduced or edited without permission from The LEGO
Group.
The Whole Child Development Guide is grounded in recent
research findings and has been developed by the LEGO
Learning Institute in partnership with experts in the field.
Author: Prof. Edith Ackermann, Contributors: Dr. Dorothy
Singer (The Learning Relevance Grid and The Complete
Discovery System) and Dr. Aaron Falbel.
www.lego.com/parents
141
Part 4.:
Early School Years
Ages 4 - 8 Years
©2004 The LEGO Group. All Rights Reserved.
The content is made available for individual use and shall not
be reproduced or edited without permission from The LEGO
Group.
The Whole Child Development Guide is grounded in recent
research findings and has been developed by the LEGO
Learning Institute in partnership with experts in the field.
Author: Prof. Edith Ackermann, Contributors: Dr. Dorothy
Singer (The Learning Relevance Grid and The Complete
Discovery System) and Dr. Aaron Falbel.
www.lego.com/parents
143
Part 4.:
Overview of Early School Years
Ages 4-8 Years
Me – Being Me
ME - USING MY BODY
Whereas the child’s physical-motor development during early
childhood
is marked by large growth spurts, during the early school years
it is rather
gradual and constant. This being said, between the ages of four
and eight, a
child’s improvement in coordination and skill is still amazing.
So is the child’s
perceptuo-motor integration, or ability to synchronize her body
movements
to the movements she sees, or hears, others performing, (so-
called eye-hand
coordination is a part of perceptuo-motor integration, and
begins when
children eyes can be guided to follow movements of their
hands).
The period between ages 4 and 8 is a time of expanded vigour
and energy. It
is also a time when the child learns to master her otherwise wild
exuberance,
and put it at the service of things he likes to do.
As they enter their fi fth’s year, most children have enough
mastery over their
gross motor skills to be able to balance, hop, skip, run, and
jump. And they
have perfected the use of fi ne motor skills well enough to be
able to reach,
grasp, and manipulate objects. A four-year-old can eat and dress
by herself.
She combs her hair, washes her hands and brushes her teeth.
She opens
closets and drawers, and manipulates remote controls. She
scribbles, cuts,
and glues. In sum, four-year-olds have a fairly good dynamic
balance when
running and climbing, as well as a static balance, which allows
them to
stand on one foot. They have learned to project themselves
accurately when
jumping and hopping, or throwing and catching
During the early school years, between the ages of 4 and 8, the
child perfects
both his agility and dexterity to gain a solid grip and better
control over his
body movements in space and time, and above all, in relation to
others.
By the time they reach their eighth birthday, most children
readily engage
in activities such as sawing, sewing, painting, or knitting.
Seven-year-olds
can use adult tools, such as hammers, saws, rakes, and shovels.
They now
©2004 The LEGO Group. All Rights Reserved.
The content is made available for individual use and shall not
be reproduced or edited without permission from The LEGO
Group.
The Whole Child Development Guide is grounded in recent
research findings and has been developed by the LEGO
Learning Institute in partnership with experts in the field.
Author: Prof. Edith Ackermann, Contributors: Dr. Dorothy
Singer (The Learning Relevance Grid and The Complete
Discovery System) and Dr. Aaron Falbel.
www.lego.com/parents
144
manoeuvre a two-wheeled bike, and they are ready to skate, ski,
or swim.
They engage in many group activities, from soccer to
gymnastics, from
hockey to ballet, and they have become competent team players.
In the later section, we shall look at how children, between the
ages of 4 and
8, progressively refi ne their physical-motor abilities, which, in
turn, opens
the way to many new activities, fosters a growing sense of
freedom and
control, and new forms of relating to the world, self, and others.
ACKNOWLEDGEMENTS
The main sources for Me in this Part are:
Anselmo, S, Franz, W. (1995). Early Childhood Development:
Prenatal
Through Age Eight. (2nd ed.). Englewood Cliffs, NJ: Prentice-
Hall [First
edition was published in 1985. New York: Merill / Macmillan].
Sanford, A.R.
and Zelman, J.G. (1981) Learning accomplishment profi le.
Winston Salem,
NC: Kaplan.
ME – KNOWING MYSELF
The roots of a child’s a self-concept lies in infancy, and evolves
through the
many interactions the child has with her social environment. By
their fourth
birthday, most children have acquired a fairly good sense of
themselves
as distinct from others. They also have a budding sense of
identity or self-
invariance: the idea that some core aspects of self remain
unchanged over
time.
One of the big breakthroughs, as children enter their preschool
years, is the
passage from a merely physical- and action-centric self-concept
to a more
psychological one. In other words, children develop a sense of
self-worth,
or self-esteem: the emotional, affective, moral, and intellectual
facets of a
child’s early self-concept. This, in turn, requires an
understanding that the self
is unique (distinct from other), stable (identity over time), and
worth one’s
own, and other people’s, consideration, and love. Self-esteem
or self-worth
emerges as the child learns to distinguish between an inner-me,
or “agent,”
that drives her actions, and an outer-me: a person’s physical
attributes and
/or actions.
By developing a positive and accurate body image/self-concept,
children
build a reliable frame of reference—themselves—to help them
act and move
in space, as well as among other people. Body image, like self-
awareness,
provides an internal compass to help children orient and situate
themselves
in relation to others.
©2004 The LEGO Group. All Rights Reserved.
The content is made available for individual use and shall not
be reproduced or edited without permission from The LEGO
Group.
The Whole Child Development Guide is grounded in recent
research findings and has been developed by the LEGO
Learning Institute in partnership with experts in the field.
Author: Prof. Edith Ackermann, Contributors: Dr. Dorothy
Singer (The Learning Relevance Grid and The Complete
Discovery System) and Dr. Aaron Falbel.
www.lego.com/parents
145
Awareness of self-defi ning bodily functions includes sexual
and gender
awareness, as well as a sense of what’s inside the body, and
what it means to
be sick or in good health, sad or happy. Awareness of self, as a
worthwhile,
competent, and good person, includes both moral judgements
and meta-
cognitive skills, i.e. an increasing ability to gauge one’s own
mental abilities,
both cognitively and affectively.
In this Part, we shall look at how 4–8-year-old children’s sexual
and gender
awareness, sense of self-worth, and views of their own
competences, or
meta-cognitive skills, evolve during early school years.
Again, each child grows at his own pace, so that development
stages and ages
are no more than indicative of general trends. What’s more,
self-development
is not a neutral area! Children live with people who hold their
own views on
what a good person, or a true self, should be. This makes for
great variability in
ideals, which in turn informs how adults support and constrain
their children.
Us – Growing Together
US - RELATING TO OTHERS
Early school years mark huge progress in a child’s abilities to
understand,
communicate, and refl ect upon matters that govern and
motivate social
relations. Children gain greater control over their emotions, an
increased
self-awareness, and they learn to put their feelings, intentions,
desires,
and beliefs at work to consolidate their social ties, while
preserving their
identity.
Between the ages of 4-8, a child’s ways of relating expand and
become
more fl exible. They change according to whom the child deals
with,
when the interaction takes place, and under which
circumstances. So, for
example, a 5-year-old may want to boss around a younger
sibling, whine
with Grandma, and argue with her teacher. Yet, as she becomes
aware that
moods can change over time, and that ambiences come with
their particular
sets of constraints and permissions, she may choose to give a
hug to her little
brother, cajole Grandma, and tease the teacher. By the end of
this period,
around age 8, most children have become competent and
reliable partners,
and collaborators. They have learned to master some of the
trade-offs that
growing in connection involve. More important, they have
learned that even
failed attempts at relating can be repaired, or compensated for:
one could
call this “conservation of relations.”
©2004 The LEGO Group. All Rights Reserved.
The content is made available for individual use and shall not
be reproduced or edited without permission from The LEGO
Group.
The Whole Child Development Guide is grounded in recent
research findings and has been developed by the LEGO
Learning Institute in partnership with experts in the field.
Author: Prof. Edith Ackermann, Contributors: Dr. Dorothy
Singer (The Learning Relevance Grid and The Complete
Discovery System) and Dr. Aaron Falbel.
www.lego.com/parents
146
A person’s emotions play a key role in how he relates to others.
Emotions
are like internal signals that prepare a person to cope with
situations that, to
him, are associated with fear, joy, or sadness. The problem with
emotions,
however, is that they take over, at least initially, forcing us to
act in certain
ways. Progressively however, the child learns to recognize and
describe his
own (and other people’s) emotions and starts to understand the
behavioural
consequences of certain emotional states. That’s when his initial
urge to
act out whatever he feels turns into a more mediated and fl
exible palette of
possible responses that the child then taps into as a means to
relate better
with others. In other words, as the child becomes aware of his
feelings and
intentions (and those of others), he increases his ability to
negotiate and co-
operate. He monitors and communicates what he feels, intends,
desires, and
believes, to regulate his exchanges and dealings with others.
According to Erikson, a fi rst developmental breakthrough
occurs during the “play
age”: from about 3 1⁄2 to age 5. During it, the growing child
learns: (1) to imagine
and to broaden her skills through active play of all sorts,
including fantasy (2) to
co-operate with others (3) to lead as well as to follow. That’s
when the child enters
a new phase of psycho-social development called initiative.
Initiative adds to
autonomy a quality of following through on tasks for the sake of
“getting to know
more.” While bringing about obvious benefi ts, initiative also
comes with its share
of new challenges. Following through on things can be risky
and solitary. It is
thus not by chance that initiative coincides with the emergence
of the “play age.”
Pretend and role play, both of which peak at this stage, offer
safe ground to explore
some of the consequences that taking initiative entail. In other
words, when the
child is ready, developmentally speaking, to take the risks of
initiative, she fi rst
wants to explore those risks through joint make-believe
activities.
Later during the school years, 6- to 8-year-old children become
ready to
embark on yet another of Erikson’s stages of psycho-social
development:
They become industrious, which has a decisive effect on school
life and
on the later entrance into the world of work. Without industry,
according to
Erikson, children may suffer from a sentiment of inferiority.
Children at this
age become excited by projects such as building forts, sewing,
and cooking,
and…the harder the better!
Let’s now look at how children, between the ages of 3 1/2 and
5, deal
with the trade-offs that building initiative entail e.g., how do
they face the
risks of taking initiative while maintaining the benefi ts of
being connected
through consensual agreement? And as they become more
involved in
various endeavours and interests, let’s see how 6- to 8-year-olds
become
©2004 The LEGO Group. All Rights Reserved.
The content is made available for individual use and shall not
be reproduced or edited without permission from The LEGO
Group.
The Whole Child Development Guide is grounded in recent
research findings and has been developed by the LEGO
Learning Institute in partnership with experts in the field.
Author: Prof. Edith Ackermann, Contributors: Dr. Dorothy
Singer (The Learning Relevance Grid and The Complete
Discovery System) and Dr. Aaron Falbel.
www.lego.com/parents
147
industrious, how they keep their creative spark and playful
spontaneity while
following through on their self-set tasks in order to succeed.
The Feeling Peeling Game. To help children become aware of
their feelings
and, by the same token, understand how others feel, Smith’s
“feeling
peeling” game (fi ve years up) remain a good inspiration.
Again, the game
can be played in dyads, or in groups (Smith 1982). As in the
previous stage,
the idea is to ask questions that encourage children to think
about the causes
and consequences of various emotions. Emotions to be “peeled”
at this age
include: happy, angry, affection, afraid, and sad, and also
embarrassed,
ashamed, guilty. Questions that can be asked include:
- What would you do when you are X? [e.g. afraid].
- What would you like to do when you are X…..
- What would you like other people to do for you when you are
X….
- What are some of the things that give you an afraid feeling?
- How do you feel when someone is afraid of you?
- What feeling is diffi cult to tell other people about?
Note. This list is only a beginning of a large series of questions
that may
encourage children to explore their emotions and understand
those of
others. Imagine role-play scenarios in which can enact and play
out some of
the questions, taking on different roles. Put the same child in
the role of the
agent and the recipient.
In role playing games, always respect a child’s desire not to
disclose how
she or he feels, and make sure the children understand that there
is nothing
wrong with having “negative” feelings, or even wanting to act
them out.
Help them understand, beyond fi rst impressions or reactions,
some of the
benefi ts of using one’s mind and heart to control initial drives.
US - UNDERSTANDING OTHERS
Early on, children tune into other people’s intentions, attitudes,
and emotions,
and as they grow older, they become increasingly aware of how
they and
others feel, act and think. They learn to understand and
empathise with
others, and to look at the world, including themselves, through
their eyes.
They learn to express, and refl ect on different people’s inner
feelings and
mental states. In other words, children build their own theories
of other
people’s, and creatures’, minds: from what they feel and think
to what
they are capable of and driven by. (Astington, J., Harris, P., and
Olson, D.,
1988).
©2004 The LEGO Group. All Rights Reserved.
The content is made available for individual use and shall not
be reproduced or edited without permission from The LEGO
Group.
The Whole Child Development Guide is grounded in recent
research findings and has been developed by the LEGO
Learning Institute in partnership with experts in the field.
Author: Prof. Edith Ackermann, Contributors: Dr. Dorothy
Singer (The Learning Relevance Grid and The Complete
Discovery System) and Dr. Aaron Falbel.
www.lego.com/parents
148
A child’s journey toward getting to know others, to understand
what they
want, feel, believe, and intend, is a lengthy one, which involves
a two-fold
ability: 1. to “de-centre,” or move away from oneself, and 2. to
“re-centre,”
or take on another’s view. The focus here is on how children,
between the
ages of 4 to 8, operate this shift away from themselves to build
a sense of
other (Schantz, 1975). It is worth noting that the apparently
contradictory
movements of getting to know oneself and moving away from
self, toward
other, are intricately related. Without self-control and self-
awareness there
can be no respect and understanding of others. Both
competencies emerge
and evolve together.
Early school years are marked by a growing ability to
understand not just
that other people may think and feel differently, but what it is
they may
feel and think! During these years, children become able to
empathize and
adopt different perspectives. They learn to negotiate, and make
sense of,
other people’s expectations and intentions. The seventh year
also marks the
beginnings of Piaget’s stage of concrete operations. The child is
now able to
think about events that were previously performed through
physical actions,
and mentally reverse the direction of action and thought. She
also understands
that thoughts are different from actions, and appearances
different from reality.
A child’s ability to put herself in other people’s shoes or to feel
what they feel,
has deep repercussions in how she relates to, and understands,
others.
World – Making Sense of it All
WORLD – EXPLORING AND INVESTIGATING
Early school years are marked by a child’s expanding curiosity
and mindful
investigation. During this period, the child’s physical energy
and intellectual
vigour are at a peak and his natural exuberance is being
channelled in the
pursuit of many exciting, long lasting, and challenging projects.
From a
wonderer, one may say, the child becomes an explorer and
experimenter.
This, in turn, allows for many new wonders to pop-up, and be
further
explored. In this process, the child learns a great deal about
himself and
about the world in which she lives and grows.
Children between the ages of 4 and 8 face a multitude of new
experiences
outside the confi nes of their homes. Provided the passage
happens felicitously,
the child’s curiosity and eagerness to learn develops even
further. Not surprisingly,
this is also a time when children like to take charge. They
become true experts at
fi guring things for themselves, and they excel at learning-by-
doing.
©2004 The LEGO Group. All Rights Reserved.
The content is made available for individual use and shall not
be reproduced or edited without permission from The LEGO
Group.
The Whole Child Development Guide is grounded in recent
research findings and has been developed by the LEGO
Learning Institute in partnership with experts in the field.
Author: Prof. Edith Ackermann, Contributors: Dr. Dorothy
Singer (The Learning Relevance Grid and The Complete
Discovery System) and Dr. Aaron Falbel.
www.lego.com/parents
149
Needless to say, there are differences between the manners of
inquiry
and worldviews of a four and an eight-year-old. Typically, four-
year-olds
base their judgements on direct action and perception. They
proceed by
intelligent trial and error, often focusing on one variable at a
time when trying
to get a handle on a complex situation. A four-year-old’s
worldview remains
essentially “egocentric,” and their thinking is magical and
animistic. Eight-
year-olds, in contrast, engage in directed and systematic
experimentation,
and are able to compose with multiple variables when making
decisions.
Eight-year-olds’ thinking is reversible (i.e., they can mentally
reverse the
direction of thought, and action), which, in turn, impacts the
ways they
conceive of such categories as time, space, and causation. Their
take on
things has become more “objective,” less egocentric.
The seventh year marks the big breakthrough with the
beginnings of Piaget’s
stage of concrete operations. The child now anticipates events
that were
previously acted out, and draws conclusions in her head.
Besides reversibility,
a benchmark of concrete operations is conservation: the
understanding that
objects or quantities remain the same—or invariant—despite a
change in
their physical appearance.
In the later section, we shall look at how children between the
ages of 4
and 8 examine, understand, and refl ect upon their actions, thus
becoming
increasingly good investigators and experimenters. Let us also
look at how
their worldviews evolve as they relentlessly try to fi gure out
how things work
through their hands-on exploration. More specifi cally, we shall
look at
children’s notion of time, causation, and space, as well as their
abilities to
conserve substance and quantities.
WORLD - SEEKING LOGIC
At fi rst, a child’s logic is a logic-in-action, and the fi rst
categories that
children establish are based on how objects, including people,
resist or yield
to their explorations. This section addresses how a child’s
logical thinking,
or “logico-mathematical” capabilities, evolves during his early
school years.
In other words, how does a 4- to 8-year-old child use what he
has learned
“in action” to bring some order and coherence into a world too
bewildering
and complex to be grasped? What forms of reasoning does he
privilege at
different ages?
As in the previous section, there are striking differences
between the forms
of reasoning, or logic, of most four-year-olds and those of most
eight-year-
olds. Typically, a four-year-old’s thinking is pre-operational
(Piaget 1960a,
©2004 The LEGO Group. All Rights Reserved.
The content is made available for individual use and shall not
be reproduced or edited without permission from The LEGO
Group.
The Whole Child Development Guide is grounded in recent
research findings and has been developed by the LEGO
Learning Institute in partnership with experts in the field.
Author: Prof. Edith Ackermann, Contributors: Dr. Dorothy
Singer (The Learning Relevance Grid and The Complete
Discovery System) and Dr. Aaron Falbel.
www.lego.com/parents
150
1960b, 1964), whereas eight-year-olds have acquired the ability
to reason
“logically.” They have reached the stage of what Piaget refers
to as concrete
operations (Piaget 1960a, 1960b, 1964). One of the
characteristics of
concrete operations, most relevant in this section, is
reversibility: the ability
to mentally reverse the direction of thought and action. So, for
example, a
6-year-old will fi nd it obvious (a “logical necessity,” in
Piaget’s words) that
if a number can be added to another it can also be subtracted, or
that if an
object moves from point A to B to C, then it should be able to
return from
C to B to A.
As the child begins to reason in ways that are reversible a whole
structure
of interrelated logico-mathematical capabilities, or operations,
appears: The
child now understands such relations as transitivity, inclusion,
and identity,
and she uses her newly acquired logico-mathematical power to
infer many
otherwise invisible patterns and rules, and to make logical
deductions.
The transition from pre-operational thinking to concrete
operational thinking
occurs between the ages of six and seven, and is usually
completed by the
time the child is eight years old.
In the later section, we shall look into the lengthy journey that
brings a
child from pre-logical to logical thinking. We shall focus on
how 4–8-year-
olds come to understand basic mathematical ideas, such as
quantifi cation,
elementary number theory, and their handling of logical
operations, such as
classifi cations and seriatims.
To explain the development of logic in the early school years,
we refer
mainly to Piaget, whose ideas about children’s thinking during
early school
years have revolutionized the fi eld of psychology and
education. To this
day, Piaget’s contribution to how children think is unique and
unsurpassed
(Piaget 1960a, 1960b, 1964, Piaget and Inhelder, 1969).
Creations – Realising Visions
CREATIONS – IMAGINING
More than logic itself, imagination is one of the highest mental
achievements
of homo sapiens. It allows the emergence of new ideas and
fosters innovation.
To imagine something new requires that one grab a hold of what
could be
instead of merely representing what is. It requires that one
picture what’s
not.
©2004 The LEGO Group. All Rights Reserved.
The content is made available for individual use and shall not
be reproduced or edited without permission from The LEGO
Group.
The Whole Child Development Guide is grounded in recent
research findings and has been developed by the LEGO
Learning Institute in partnership with experts in the field.
Author: Prof. Edith Ackermann, Contributors: Dr. Dorothy
Singer (The Learning Relevance Grid and The Complete
Discovery System) and Dr. Aaron Falbel.
www.lego.com/parents
151
Not surprisingly, then, it takes the emergence of what
psychologists call “the
symbolic function,” around the age of 2 for children to be able
to imagine
alternatives in their heads. Only then, coinciding with the
emergence of
speech and thinking, will children start to evoke and revisit past
experiences
or events and, more to the point, add a new twist or change the
ending
in some way. Imagination proper sets in when, beyond merely
creating
variations in the absence of a model, the child starts to produce
fi ctional
scenes and invents scenarios that don’t exist.
Early manifestations of human imagination can be seen in a
child’s fantasy
or pretend play, as well as in her willingness to invent and
converse with
imaginary companions. They appear in her budding sense of
humour and
abilities to tease and joke. Humour can be thought of as a subset
of make-
believe and play (McGhee, 1984): an intellectual play with
ideas or words,
based upon appreciation of logical displacements and
incongruities. What
characterizes all of the above activities is suspension of
disbelief rather than
a quest for truth
At the beginning of early school years (between the ages of 4
and 6), a child’s
imagination tends to run wild, while, at the same time,
becoming ever more
sophisticated as she perfects her abilities to incorporate other
people in his
pretend play, sharpens his sense of humour, and cultivates his
ways of teasing.
Towards the end of the period (between the ages of 6 and 8), the
child’s
imagination adapts itself to fi t the purpose of specifi c
endeavours. Many
factors contribute to this “domestication” of early childhood
imagination,
not the least of which is children’s own desire, as they grow
older, to put
their wildest thoughts at the service of realisable undertakings.
School too
often contributes to the trimming of imagination if children’s
creative impulse
is downplayed to the benefi t of her rational mind.
As they reach their eighth birthday, most children now use fi
ction, pretence,
and jokes to acquaint themselves with otherwise hidden
thoughts, and to
release emotional tensions without hurting the feelings of
others. The child’s
imagination is now more directed and ruled: Her abilities to
fantasize and
pretend become more “civilized,” her mental exuberance
contained, and
her abilities to play with words and incongruities less
idiosyncratic. This
being said, her capacity to imagine will prevail throughout adult
life.
In the next section, we shall look into the development of a 4-
to 8-year-old
child’s creative thinking through the lens of her pretend play as
well as her ability
to produce and appreciate jokes, word puns, and other poetic
”incongruities.”
©2004 The LEGO Group. All Rights Reserved.
The content is made available for individual use and shall not
be reproduced or edited without permission from The LEGO
Group.
The Whole Child Development Guide is grounded in recent
research findings and has been developed by the LEGO
Learning Institute in partnership with experts in the field.
Author: Prof. Edith Ackermann, Contributors: Dr. Dorothy
Singer (The Learning Relevance Grid and The Complete
Discovery System) and Dr. Aaron Falbel.
www.lego.com/parents
152
ACKNOWLEDGEMENTS
The main sources for Creations in this Part are:
Anselmo, S, Franz, W. (1995). Early Childhood Development:
Prenatal
Through Age Eight. (2nd Ed.). Englewood Cliffs, NJ: Prentice-
Hall [First
edition was published in 1985. New York: Merill/Macmillan].
McGhee, P. (1979) Humor: its origin and development. San
Francisco:
Freeman & Company.
CREATIONS – ENACTING AND CREATING
Children not only make up things in their heads, or fantasize;
they also make
things, or give form, or expression, to their inner most feelings
and ideas. In
other words, children bring to life their fantasies to make their
dreams come
true! Children speak their minds in many ways, and they use a
variety of
media: children speak in gestures and in voice, in pictures and
in words,
picking whichever medium conveys their ideas the best.
Children also
combine several media within a single production.
Through their personal and collective creations, children, like
artists, bring
imagination into being…and they do so by design! Unlike
scientists, a
child’s creative expression is less about building models and
representations
of existing realities, so-called objective truths, than it is about
exploring
possibilities, often possibilities within i.e., re-digesting or
reverberating
deeply felt human experience. While both the artist and the
scientist seek to
capture deep hidden truths, the fi rst uses language to inspire
and evoke, and
the second to analyze and validate. In other words, creative
expression is
the visible face of imagination at work!
This section speaks to the importance of creative expression as
a source of
a child’s personal and intellectual growth. Of particular interest
here is the
exciting and lengthy path that brings early school-age children
to becoming
literate in the sense of becoming acquainted with, and fl uent in,
the usage
of available cultural tools as means of self-expression. We
purposely defi ne
literacy in the broadest possible sense to mean the ability to
make and derive
meaning in any symbolic, expressive, or artistic medium.
Children are born into a world of signs, symbols and human-
made artefacts.
Before long they appropriate these tools and they start making
their own
original contributions. From speech to writing, from drawing to
playing the
fl ute, from taking a picture to building a sand castle, children
learn to say it,
to freeze it, and to refi ne and edit their expressions. They do so
across media
and within the constraints proper to each medium. Most
important, children
©2004 The LEGO Group. All Rights Reserved.
The content is made available for individual use and shall not
be reproduced or edited without permission from The LEGO
Group.
The Whole Child Development Guide is grounded in recent
research findings and has been developed by the LEGO
Learning Institute in partnership with experts in the field.
Author: Prof. Edith Ackermann, Contributors: Dr. Dorothy
Singer (The Learning Relevance Grid and The Complete
Discovery System) and Dr. Aaron Falbel.
www.lego.com/parents
153
know how to use the progress they make in one language as a
lever to enrich
their expressiveness in other languages or media.
As they reach their fourth birthday, children usually speak,
gesture, and they
learn to draw and write. At this age, children also start to
“read,” i.e. make
sense of other people’s traces and scribbles. Again, as soon as
they talk, they
become interested in writing and reading. As they sing and
listen to music,
they like to record rhythms and sounds, and to “draw” the
noises and rhythms
they hear on a sheet of paper. Later in their lives, our creative
youngsters
will continue express themselves creatively through drama,
poetry, painting,
literature, design, and music, to name just a few possibilities.
Let us look at how early school-age children learn to express
themselves
creatively, using “a hundred languages” (Malaguzzi, 1987), and
how they
become literate in the broad sense defi ned above. The ages
below are
indicative of general developmental trends. Especially when it
comes to
literacy, the ages at which children are expected to master the
conventions
of written language vary a great deal, not only among
individuals but among
different countries or cultures as well.
©2004 The LEGO Group. All Rights Reserved.
The content is made available for individual use and shall not
be reproduced or edited without permission from The LEGO
Group.
The Whole Child Development Guide is grounded in recent
research findings and has been developed by the LEGO
Learning Institute in partnership with experts in the field.
Author: Prof. Edith Ackermann, Contributors: Dr. Dorothy
Singer (The Learning Relevance Grid and The Complete
Discovery System) and Dr. Aaron Falbel.
www.lego.com/parents
©2004 The LEGO Group. All Rights Reserved.
The content is made available for individual use and shall not
be reproduced or edited without permission from The LEGO
Group.
The Whole Child Development Guide is grounded in recent
research findings and has been developed by the LEGO
Learning Institute in partnership with experts in the field.
Author: Prof. Edith Ackermann, Contributors: Dr. Dorothy
Singer (The Learning Relevance Grid and The Complete
Discovery System) and Dr. Aaron Falbel.
www.lego.com/parents
155
Part 4.:
Early School Years by Age Year
4-5 Years
Me – Being Me
ME - USING MY BODY
Kick the Ball & Keep the Beat! Four- to fi ve-year-olds are
vigorous and energetic:
They love to play and, when given a chance, they become
exuberant and “go
wild.” At the same time, children of this age also spend hours
channelling their
energy—i.e., perfecting their physical-motoric abilities—by
getting a better
handle on all kinds of objects, such as balls, bikes, swings, or
seesaws. Like
their younger counterparts, 4–5-year-olds still spend hours on
the playground,
using swings, slides, and climbing-structures. Yet, unlike
younger children,
they have become amazingly skilled and autonomous users.
Four- to fi ve-year-olds like to keep in the fl ow (and in the
beat) of things,
through dance and rhythm, and they learn to synchronize their
body
movements and positions with that of others, using visual clues.
They
march at a drumbeat, and play musical chairs, or “statues” (a
person takes
a position, and other imitate). When playing ball, they work
hard at refi ning
their kicking and catching techniques, and they become truly
expert tricycle
riders.
As mentioned before, activities like kicking a ball or riding a
bike are not just
a matter of gross-motor skills. They also involve a great deal of
dexterity, a
strong, secure grip, a focused attention, and body awareness, as
well as a
good sense of rhythm and balance.
COMPETENCIES:
What does the 4-5 year-old naturally strive to learn?
The main areas of change, between the ages of 4 and 5 are an
improved sense
of balance (both static and dynamic), as well as an increased
perceptual-motor
integration i.e. being able to produce or imitate a gesture one
sees someone
else doing (sometimes referred to as eye-hand coordination), a
greater body
awareness (i.e. body concept, laterality or right-left
discrimination, and
©2004 The LEGO Group. All Rights Reserved.
The content is made available for individual use and shall not
be reproduced or edited without permission from The LEGO
Group.
The Whole Child Development Guide is grounded in recent
research findings and has been developed by the LEGO
Learning Institute in partnership with experts in the field.
Author: Prof. Edith Ackermann, Contributors: Dr. Dorothy
Singer (The Learning Relevance Grid and The Complete
Discovery System) and Dr. Aaron Falbel.
www.lego.com/parents
156
directionality), and temporal-perceptual awareness, or sense of
time and
rhythm.
All these areas come into play as the child exercises, and refi ne
his skills.
All contribute to optimize the performances. As an example,
when playing
ball, 4-5 years become quite adept at throwing and catching,
and when
throwing, they turn the non-dominant shoulder toward the target
and steps
with opposition as they throw. They catch the ball away from
the body, in
the hands with palms facing each other (Anselmo and Franz,
1995. p. 384).
And when playing inside the house, 4–5-year-olds like to
scribble, draw, cut,
and glue. They still use broad movements with their fi ngers,
arms, and hands.
Yet, they produce recognizable shapes in their drawings, which
they love to
present as gifts to family members.
MANIFESTATION:
What actions will the child do to attain the competencies?
Four- to fi ve-year-olds can walk heel-to-toe for four or more
steps along a
line and stand on one foot for fi ve seconds. On the playground,
they can get
themselves started on swings, walk on a beam, climb ladders
and slide down
slides, without assistance. And since moms and dads are less
needed on the
playground, they spend more time playing with other children.
At this age, children also become eager and skilled tricycle
riders. Their hopping,
jumping, and kicking skills improve. Walking downstairs is now
mastered,
without the help of an adult. Four- to fi ve-year-olds eat much
more neatly than
3-year-olds. They start using a fork, spoon, and, if allowed, a
knife. They can
carry a cup fi lled with water from the kitchen sink to the table,
without spilling.
As they approach their 5th birthday, most children are able to
dress themselves.
They put on their socks, and open and close buttons and zippers.
In kindergarten, 4–5-year-olds like to engage in all kinds of
arts-and-crafts
activities: They cut and fold paper; glue pieces together,
hammer pegs into
holes, draw and scribble, and assemble puzzles. They also like
to bake,
to make clay fi gures, and to build sand castles. All these
activities greatly
facilitate a child’s eye-hand coordination.
Four year-old children learn about the left and right sides of
their bodies
(laterality), and about the body’s position and heading
(directionality and
orientation). Yet, many children of this age still have diffi
culties with tasks
that require left-right discriminations.
©2004 The LEGO Group. All Rights Reserved.
The content is made available for individual use and shall not
be reproduced or edited without permission from The LEGO
Group.
The Whole Child Development Guide is grounded in recent
research findings and has been developed by the LEGO
Learning Institute in partnership with experts in the field.
Author: Prof. Edith Ackermann, Contributors: Dr. Dorothy
Singer (The Learning Relevance Grid and The Complete
Discovery System) and Dr. Aaron Falbel.
www.lego.com/parents
157
SUPPORT:
What can care-givers do to support this natural development?
Let your kid play, and play with her. Play ball: You can now
use smaller light
soccer-sized balls. Draw and paint: Finger paints are great at
this age. Dance
with her. She loves to march in a parade. Play music, she enjoy
beats and
rhythms. Go for walks, to the pool, to the playground. Indoors,
let your child
play with age-appropriate puzzles, and offer her a big box of
blocks with
which to build models and castles.
If you are an educator, don’t drill! Movement, balance, and
rhythm can be explored
through play. Invite children to discover for themselves the
ways they want to
move and stretch, and how far they want to “push” themselves.
Remember: “our
bodies move in space, in time, with force, and with fl ow (…)
There is never a
wrong move, but certain moves feel better” (Gilliom, 1970. p.
6).
Educators may imagine activities to broaden the palette of
movements
made available to the children (Gilliom, 1970. p. 6). Gilliom
proposes four
dimensions to be considered by parents and educators.
1. Where to move (space), which involves an understanding of
self-space.
2. What to move (body awareness), which requires awareness
of body parts
and relations between body / objects to be manoeuvred / space.
3. How to move? (force, balance). Involves creating / absorbing
force (gravity),
transferring force (rocking, rolling, sliding) and transferring
weight (step on
beams).
4. How to move in a smoother way (time, fl ow). Involves
changing rhythm,
speed, pulse, and beat, and feel what it does.
For each dimension, many fun activities can be imagined (for
inspiration,
see movement chart in Gilliom, 1970. p.8., and Anselmo and
Franz, 1995.
p. 388). In all these activities, care-givers assume a role as play
partners. If
done in a joyful way, this will lay the foundation for a child’s
positive self-
concept and pleasant feelings toward such activities.
ME – KNOWING MYSELF
Introspective Fours: Building an Inner Sense of Self. The fi fth
year marks a
new phase in a child’s growing sense of self. Three main areas
of progress
include: a budding sense of self-esteem, or self-worth; an early
form of
meta-cognitive awareness, or self-knowledge; and the ability to
distinguish
between mind and body, when speaking about self and others.
©2004 The LEGO Group. All Rights Reserved.
The content is made available for individual use and shall not
be reproduced or edited without permission from The LEGO
Group.
The Whole Child Development Guide is grounded in recent
research findings and has been developed by the LEGO
Learning Institute in partnership with experts in the field.
Author: Prof. Edith Ackermann, Contributors: Dr. Dorothy
Singer (The Learning Relevance Grid and The Complete
Discovery System) and Dr. Aaron Falbel.
www.lego.com/parents
158
Four year-olds develop an early sense of self beyond mere
physical attributes,
observable acts, and concrete events. In other words, they
overcome earlier
forms of “trivial behaviourism” by disentangling some of the
intricacies
between what a person does, shows, or says in terms of her
behaviour or
appearance, and what she thinks, feels, or intends. This, not
surprisingly, leads
to new forms self-evaluation and self-knowledge, as well as new
forms of moral
“judgements”. While paying closer attention to the “hidden”
aspects of self,
4-5 years old children still have problems with egocentrism, and
they do not
always recognize that a person’s inner states, thoughts,
intentions or feelings,
can or should be different from their outer expression (Selman,
1980).
Four- to fi ve-year-old children’s body awareness and self-
concept are partly
expressed in, and informed by, their understanding of sexuality,
gender, as
well as by their views of what’s inside their body, and what
makes a person
ill or well, sad or happy, and bad or good.
As they reach their 5th birthday, most children have developed
a fairly
accurate sense of who they are and what they think they are able
(or unable)
to do. This type of self-knowledge includes what are commonly
called meta-
cognitive skills — an important component of more advanced
refl ection,
learning, and introspection.
COMPETENCIES:
What does the 4-5-year-old naturally strive to learn?
Like the “curious threes”, 4-5-year-old children still wonder:
‘Who am I?
Where do I come from? Where do I go?’ They also still puzzle
over how babies
are made, what’s in their bodies, why people die, and what will
become of
them after death. Yet, as they try to make sense of these
questions, 4-5-year-
olds develop their own views and attitudes about their origins,
well-being or
health, and their strengths and weaknesses as persons, and as
learners.
Most signifi cant at this age, a person’s self begins to be seen as
a mix of
action and intents, involving both body and mind. So, for
example, 4-5-year-
old children not only understand themselves as being a boy or a
girl, tall or
short, or blond or brown, but they begin to develop a sense who
they are, as
persons, beyond being gendered, sized, or coloured.
A 4-5-year-old’s grasp of what happens inside her body and
what it means to
be healthy or sick are still rather mechanical and animistic. So
for example,
children can tell you where their brain, heart or stomach are
located, yet
©2004 The LEGO Group. All Rights Reserved.
The content is made available for individual use and shall not
be reproduced or edited without permission from The LEGO
Group.
The Whole Child Development Guide is grounded in recent
research findings and has been developed by the LEGO
Learning Institute in partnership with experts in the field.
Author: Prof. Edith Ackermann, Contributors: Dr. Dorothy
Singer (The Learning Relevance Grid and The Complete
Discovery System) and Dr. Aaron Falbel.
www.lego.com/parents
159
each organ still has a single function, and the inter-relations
between them
remain unclear. A nice example by Selman shows that, at this
age, children
“often report that their mouths tell their hand what to do or that
their ideas
come from their tongues” (Selman, 1980. p.176).
When sick, 4–5-year-olds tend to blame either outside events
(external
causes), or themselves, i.e. their bad behaviour (immanent
justice). Their
views of how they came to be remain animistic or mechanical:
either babies
are made, like dolls on an assembly line, or, if told that babies
grow in mom’s
belly, 4-5-year-olds will assign human-like qualities to the
sperm/or egg
(Bernstein and Cowan, 1981). They will imagine all those tiny
little people
inside mom’s belly, helping to make the baby and bring it out.
MANIFESTATION:
What actions will the child do to attain these competencies?
Four- to fi ve-year old children’s awareness of self transcends
physical
appearances (pretty, small, girl, boy) to include “mindsets”
(witty, nice, girly,
boyish), and the child starts to distinguish between feelings and
actions.
He understands that while certain emotional reactions may be
unwanted
and hard to control, our actions in reaction to inner emotions
can, and
maybe should, be controlled. He doesn’t always understand why
controlling
impulses may be a good thing beyond “Mom won’t like it” or “it
could make
things worse”. But, that’s a start!
Four-year-olds’ conceptions of sickness, contagion, and causes
of death are
still “magico- phenomenist”, to use Piaget’s term. While many
four-year-olds
understand that sickness occurs through contagion, and
contagion through
proximity, proximity itself remains this magical thing…some
mystical, bad
infl uence.
Four- to fi ve-year-olds begin to develop a sense of fair play
and are aware
of rules, although at this age, they may change them. They like
board games
where there are rules. They like to be challenged, but at this
age, they do not
always handle competition well.
SUPPORT:
What can caregivers do to support this natural development?
Help your child distinguish between feelings and actions, as
well as between
actions and consequences. If your child is angry, or wants to hit
her little
©2004 The LEGO Group. All Rights Reserved.
The content is made available for individual use and shall not
be reproduced or edited without permission from The LEGO
Group.
The Whole Child Development Guide is grounded in recent
research findings and has been developed by the LEGO
Learning Institute in partnership with experts in the field.
Author: Prof. Edith Ackermann, Contributors: Dr. Dorothy
Singer (The Learning Relevance Grid and The Complete
Discovery System) and Dr. Aaron Falbel.
www.lego.com/parents
160
brother, encourage her to tell what’s wrong. Help her work out
unspeakable
feelings through play. Soon enough, she will understand that
getting upset
and acting impulsively can be separated and that sometimes it is
worth
doing so.
Help your child accept his physical characteristics as well as his
similarities
to, and differences from, others. In this regard, games like “me
and my
shadow” and “body drawings” are still relevant at this age
(projection of kids’
shadows against a wall, and asking kids to draw contours of
their bodies on
big sheets of paper). Yet, at this age, expand the game by telling
stories about
different people’s ways of being, or better, have the children
tell their stories,
as a way to focus on psychological diversity, and moral issues.
While acknowledging diversity in ways of being, and of
relating, avoid
gender or racial stereotyping. Help your child understand that
people come
in many shades and shapes, that diversity is rich, and that good
and bad are
colour blind.
A four-year-old’s sex education comes in response to questions
about
how babies are born, and where she was before she was born.
While
straightforward answers are welcome, there is no need to go
into any more
anatomical details than the child asks for.
Us – Growing Together
US - RELATING TO OTHERS
Play and Initiative - Learning to do… and let do! According to
Erikson, as soon
as basic trust is established, a child becomes ready and eager to
discover the
thrills and threats of autonomy. And as autonomy sets in, most
3–4-year-
olds become very energetic, curious, and eager to participate in
virtually any
activity. This is when pre-schoolers start to ask a hundred
questions. This is
also when they embark on Erikson’s next socio-psychological
stage, which
he referred to as building initiative.
Erikson’s theory of psycho-social development states that,
starting at age 3 1/2
and up to age 5, children are faced with a new challenge. In his
words, they
learn to take initiative, or they will suffer the effects of guilt!
As mentioned
before, initiative adds to autonomy a quality of taking on tasks
for the mere
pleasure of “following through on things” and “seeing where it
takes us” that,
in Erikson’s eyes, needs to be nurtured.
©2004 The LEGO Group. All Rights Reserved.
The content is made available for individual use and shall not
be reproduced or edited without permission from The LEGO
Group.
The Whole Child Development Guide is grounded in recent
research findings and has been developed by the LEGO
Learning Institute in partnership with experts in the field.
Author: Prof. Edith Ackermann, Contributors: Dr. Dorothy
Singer (The Learning Relevance Grid and The Complete
Discovery System) and Dr. Aaron Falbel.
www.lego.com/parents
161
Children’s sense of initiative is validated when adults respect
and encourage
their interests, and when they genuinely respond to, and
encourage, the
child to pursue their frequent questions, and try things out for
themselves.
If initiative is not encouraged, children may ultimately lose
their willingness
and ability to do what it takes to realise their own dreams. They
shy off from
the healthy quest for achievement, or realisation, in future
endeavours.
COMPETENCIES:
What does the 4-year-old naturally strive to learn?
Four-year-olds are vigorous, imaginative, and playful. They are
eager to learn,
play, and work with others. They listen to their teachers, and
they participate
in conversations. They are curious and easily engaged in the
excitements of
new undertakings. Their initiative extends to include social
relations with
adults outside the family and with other children.
Four-year-olds have become pretty good at controlling their
emotions, and
are increasingly aware of basic human feelings, such as sadness
and anger.
They can recognize and describe feelings associated with liking,
surprise,
disgust, boredom, loneliness, and curiosity. Children, at this
age, also start
to understand the connections between emotions and social
behaviour, and
inner thoughts, feelings or intents, their expression, and
consequences on
others.
Four-year-olds like to engage in pretend play with peers. They
participate
in group play, and they form privileged relations with
individual friends.
They become better at sharing, at losing in competitive
situations, and at
negotiating interactions with others. They show less frustration
around play
equipment and toys, and they are more patient when they have
to wait their
turn. This being said, the lengthy path that leads a child to
gracefully manage
her emotions and feelings in social transactions is only starts at
this age.
MANIFESTATION:
What actions will the child do to attain these competencies?
Four-year-olds are usually very sociable, both in play situations
and in
everyday activities: They like to please and are friendly to
adults and peers.
They begin to show empathy, and talk about their feelings.
Four-year-olds
participate in conversations and care to be listened to. They like
to be taken
seriously. They become better at negotiating peer-confl icts and
can follow
simple rules.
©2004 The LEGO Group. All Rights Reserved.
The content is made available for individual use and shall not
be reproduced or edited without permission from The LEGO
Group.
The Whole Child Development Guide is grounded in recent
research findings and has been developed by the LEGO
Learning Institute in partnership with experts in the field.
Author: Prof. Edith Ackermann, Contributors: Dr. Dorothy
Singer (The Learning Relevance Grid and The Complete
Discovery System) and Dr. Aaron Falbel.
www.lego.com/parents
162
Four-year-olds have a wide range of “ways of being” at their
disposal, which
they use according to circumstances: They cajole and cuddle,
but they also
tease and persuade. In their play, they negotiate ever more
complicated
plots, and they cooperate and help each other. This being said,
they may
still boss around younger siblings, or try to get their way
through whining
and screaming.
Many children of this age begin to enjoy “follow the leader”
games. They
play catch with each other, and some start collecting items and
sharing those
items, or swapping them. They begin to play board games, in
which they
learn to take turns and cooperate.
SUPPORT:
What can caregivers do to support this natural development?
Four-year-olds are full of life. Yet, unbridled energy and
exuberance can
sometime result in negative feelings, destructive acts, and
manipulation.
That’s when adults can come in handy to help them channel
their surplus of
energy in positive ways. And the best ways to help is to do so
non-intrusively.
So if your 4-year-old withdraws, fears something that can’t
possibly harm
him, or goes overboard and starts harming others, make sure
you guide him
in ways that do not squash his initiative but rather channel it in
more positive
ways. Don’t just say “No.” Say, “If you wish to do that, here
is a way you
can do it safely or non-destructively.”
For example, if your child climbs on the dinner table, which
genuinely annoys
you, don’t hesitate to tell her, “This place is for eating, not for
climbing.”
Offer her alternatives: “You can either sit here and draw or have
a snack, or
you go climb outside in the yard.” You can also give your child
time for a
graceful closure: “You may climb down from the table
yourself. Take your
time. But no climbing up again, after that!”
Four-year-olds like to be taken seriously. Create scenarios
around cooking,
or fi xing things, where the child can play with these objects
and pretend to
be the competent person who saves the day! Children love to be
helpful,
and if they can’t always participate and help out in real
activities, fantasy
activities may be almost as thrilling and fulfi lling.
Object-mediated turn-taking games, such as playing ball, as
well as symbolic
(or fantasy) turn taking, such as role-play, “follow the leader”
games (in
which the roles get switched) are much appreciated at this age.
Through
©2004 The LEGO Group. All Rights Reserved.
The content is made available for individual use and shall not
be reproduced or edited without permission from The LEGO
Group.
The Whole Child Development Guide is grounded in recent
research findings and has been developed by the LEGO
Learning Institute in partnership with experts in the field.
Author: Prof. Edith Ackermann, Contributors: Dr. Dorothy
Singer (The Learning Relevance Grid and The Complete
Discovery System) and Dr. Aaron Falbel.
www.lego.com/parents
163
playing ball, children learn the benefi ts of sharing, and taking
turns. Through
role and pretend play, children explore how it feels to be
another character,
and learn how to negotiate rules to play “fair” in many
intriguing social
scenarios.
US - UNDERSTANDING OTHERS
Putting on Different Hats. In their fi fth year, children begin to
understand that
other people may feel and think differently than they do, and
they become
able, at least in concrete situations, such as joint pretend and
role play, to
shift position, in their mind, between their own and other
people’s views, or
perspectives. “The ability to imagine being another person with
intentions
and feelings that are different from one’s own is surely
important evidence
for children’s growing understanding of others—evidence that
parallels the
signs of children’s abilities to deceive” (Dunn, 1991, p. 105).
At this age, children “do not (just) understand an emotional
state, such
as sadness or shame, simply by focussing on the way that the
emotion is
expressed, nor by noting the diverse situations that provoke an
emotions.
Rather, they identify the mental perspective that someone
adopts with
respect to those various situations (Harris, 1989. p 81). The
child interprets
another person’s ways of being as a coherent set of feelings,
intentions,
desires, beliefs, and thoughts that transcend specifi c contexts.
COMPETENCIES:
What does the 4-year-old naturally strive to learn?
As they reach their fourth birthday, most children pretty much
know what
other people expect from them, and they can communicate what
they want.
Starting in the middle of the fourth year, however, a whole new
range of
abilities emerges. Children learn to infl uence others using
persuasion,
deception, or humour. They can take on multiple roles or
voices, at least in
their play, and they learn that a person’s interests, beliefs, and
intentions can
change over time and according to circumstances, while, at the
same time,
maintaining a consistency or integrity over time.
“From three years onwards, the child can attribute to others
thoughts and
feelings that are different to her own. This is an important
intellectual and
conceptual leap.” (Karmiloff-Smith 1994, p. 224). And starting
at age 4, there
is yet another leap, which Astington qualifi es as a true
watershed leading to
a whole new range of abilities (Astington, 1991, p. 159). So, for
example,
when speaking of themselves, and others, 4-5 year-old
spontaneously refer
©2004 The LEGO Group. All Rights Reserved.
The content is made available for individual use and shall not
be reproduced or edited without permission from The LEGO
Group.
The Whole Child Development Guide is grounded in recent
research findings and has been developed by the LEGO
Learning Institute in partnership with experts in the field.
Author: Prof. Edith Ackermann, Contributors: Dr. Dorothy
Singer (The Learning Relevance Grid and The Complete
Discovery System) and Dr. Aaron Falbel.
www.lego.com/parents
164
to a whole array of inner feelings, such as sadness, happiness,
pride, guilt
and shame, and they evoke mental states and capabilities, such
as believing,
knowing, remembering, and forgetting.
In Astington’s view, there are many experimental tasks that 3-
year-olds
cannot do and that 4 and 5-year-olds can do (Astington, 1991, p.
159). The
tasks Astington refers to involve the understanding of another
person’s false
beliefs, and the ability to distinguish between appearance and
reality.
While many researchers in the theories of mind tradition claim a
major
breakthrough takes place at the age of 4, many 4-year-olds still
have
diffi culties in attributing false beliefs to others, and/or to
distinguish between
appearance and reality. In the light of this, the so-called “false
belief”
experiments are discussed in the next section (5-6 years).
MANIFESTATION:
What actions will the child do to attain the competencies?
In their pretend play, 4-year-olds engage in elaborate talk about
who’s being/
doing what, and how each player should act, and what they
should say and
do, in order to respect the personal traits of the character, or
part. Children
also invent many complex scenarios. Multiple characters are
used. More
feelings are expressed in their play.
Four-year-olds begin to recognize the nuances of complex social
emotions,
like sadness, joy, loneliness, embarrassment, shame, or guilt.
So, for example,
a 4-year-old may describe sadness as “there are tears in your
heart”. In
their narratives, children begin to address the social or personal
causes
and behavioural consequences of a person’s inner feelings
(Dunn, Brown,
Beardsall, 1990). More impressive, as they reach their fi fth
birthday, many
children begin to grasp that people may have mixed feeling
about things
(Harris, 1989). They now show genuine remorse when they hurt
or offend
others, entailing again that they can feel what others are feeling.
In general, at this age, children become better at sharing,
cooperating, and
helping each other. They play follow-the-leader types of games.
They begin
to play board games where they need to take turns and
cooperate. All this
requires an accurate understanding of other people’s mindsets.
SUPPORT:
What can caregivers do to support this natural development?
©2004 The LEGO Group. All Rights Reserved.
The content is made available for individual use and shall not
be reproduced or edited without permission from The LEGO
Group.
The Whole Child Development Guide is grounded in recent
research findings and has been developed by the LEGO
Learning Institute in partnership with experts in the field.
Author: Prof. Edith Ackermann, Contributors: Dr. Dorothy
Singer (The Learning Relevance Grid and The Complete
Discovery System) and Dr. Aaron Falbel.
www.lego.com/parents
165
Show empathy for your child, and he will learn to empathise
with you and
others. You may encourage a 4-year-old to help care for pets, or
even take
care of a younger sibling, with supervision, of course. Four-
year-olds love
being trusted to care for others after they have shown they know
how to be
gentle.
Let your child to play with other children. And, every now and
then, be a
part in your child’s pretend and role-playing activity (if invited
to do so!).
This will help her feel how different people, of different ages
and walks of
life, negotiate play. Help her express her feelings through play,
and imagine
scenarios in which the child is encouraged to take on multiple
roles and
voices, i.e. switch role, say from mama to baby, from big bad
bully to poor
little puppy. This is important to help a child “feel for” what
others may feel.
Pretend play offers a safe terrain for such explorations.
Four-year-olds love to listen to stories and they start to pretend-
read and
write. Show them, tell them and let them show-and-tell. Play
verbal variants
of peek-a-boo, ‘Ride-a-Cock-Horse’, ‘This-is-the-Way-the-
Ladies-Ride’. If
your child shows interest, try board games, where he learns to
take turns and
cooperate. Help him be a good loser and respect players who
may do better
than him. In short, encourage any activities that help your child
de-centre
(i.e. see his partner’s point of view) while not giving up his
stance. Both are
needed to understand other.
World – Making Sense of it All
WORLD – EXPLORING AND INVESTIGATING
From Wonders to Inquiries. Four-year-olds are curious about
how things
work and about how people act and behave. They wonder about
the
passage of time and about how things change over time. They
puzzle about
how the trajectories of moving objects are coordinated in time
and space.
Four year-olds hold their own views of how things come about
and impact
one another, and of why things look/act the way they do. They
develop their
own intuitions about how people differ from things, and how
people and
things originate, grow, age or erode, and dissipate.
Children at this age like to discover things for themselves and
to fi gure things
out through hands-on experimentation. Some children will
spend hours
taking objects apart and putting them back together. Others may
hesitate
to break things apart but will vary their ways of interacting with
things as a
©2004 The LEGO Group. All Rights Reserved.
The content is made available for individual use and shall not
be reproduced or edited without permission from The LEGO
Group.
The Whole Child Development Guide is grounded in recent
research findings and has been developed by the LEGO
Learning Institute in partnership with experts in the field.
Author: Prof. Edith Ackermann, Contributors: Dr. Dorothy
Singer (The Learning Relevance Grid and The Complete
Discovery System) and Dr. Aaron Falbel.
www.lego.com/parents
166
way to discover how they react. Others like to re-confi gure a
same object,
or collection of objects, so that it serves many purposes. In all
cases, initial
forms of trial and error (messing about) lead the way to more
directed forms
of exploration (fi nding out).
In this process, the child learns a great deal about the world.
Four-year-olds
have their own views of what causes things to happen, in which
order, and
why. They develop their own intuitions about how things, or
people, evolve
over time (also called “diachronic thinking”) and how they
move about in
and confi gure space (referred to in the literature as topological
and geometric
relations). These views, we shall see, remain essentially
“egocentric.”
COMPETENCIES:
What does a 4-year-old naturally strive to learn?
Four-year-olds like to take on tough tasks, and they now pursue
their interests,
even when interrupted, over fairly long periods of time. They
like to be taken
seriously in their attempts. This striving for initiative is
synonymous with
going at things hands on and heads in, which serves them well
in many
respects. Four-year-olds excel in the art of intelligent “messing
about,” which
is none other than their own privileged means to fi guring out
how things
work.
A child’s understanding of causality increases a great deal
during this period,
as she now predicts outcomes of actions before they occur. At
the same
time, her conceptions of how things come about and impact one
another
are still animistic. The child endows many things, especially
things that move
funnily, with people-like qualities, and her outlook is more
“magical” than
“logical.” So, for example, four-year-olds may explain the
origin of lakes as
being caused by a giant who made big holes with his footsteps,
which were
then fi lled by the rain.
MANIFESTATION:
What actions will the child do to attain these competencies?
Four-year-old children are curious and eager to learn: They ask
a hundred
questions that leave many adults perplexed: “Where does the
sun go at
night? Where does the moon go during the day? What makes
the rain?
How do airplanes fl y?” More than 3-year-olds, children of this
age like to
fi nd their own answers to why things work the way they do.
Their favoured
technique to achieve this is directed exploration.
©2004 The LEGO Group. All Rights Reserved.
The content is made available for individual use and shall not
be reproduced or edited without permission from The LEGO
Group.
The Whole Child Development Guide is grounded in recent
research findings and has been developed by the LEGO
Learning Institute in partnership with experts in the field.
Author: Prof. Edith Ackermann, Contributors: Dr. Dorothy
Singer (The Learning Relevance Grid and The Complete
Discovery System) and Dr. Aaron Falbel.
www.lego.com/parents
167
Four-year-olds are pretty aware of the present time and they can
tell you
about the past. The future is still hard to comprehend. Most 4-
year-olds
have trouble gauging how long an incident lasts. They tend
either to over- or
underestimate time.
While most 4-year-olds have a fairly good sense of size
relationships, many
still think that the tallest person in a group ought to be the
oldest or, more
impressive, the taller the older.
Probably because they still ‘animate” things in their minds,
many 4-year-
olds still have “irrational” fears, such as fear of the dark, of
monsters, and of
masks, even if they know the monsters don’t exist and the
masks hide mom’s
face. Such fears lessen as children enter the elementary school
years (Bauer,
1976).
SUPPORT:
What can caregivers do to support this natural development?
It is important, at this age, to take your child’s hundred
questions seriously,
no matter how diffi cult the answers! Even more important is to
encourage
his initiative. Enjoy your child’s eagerness to experiment and
try out things,
and appreciate his ability to come up with many clever
explanations to the
most obscure philosophical queries.
Three rules of thumb at this age are: 1) Respond to your child’s
questions,
yet don’t impose your adult take on things, 2) Don’t get caught
up in
drilling your child to become ready for school. At this age, the
best way to
prepare a child for school, and life, is to support her initiative.
3) ‘Teach
her that it’s worth taking the time, and making the detours,
needed to
pursue her interests. So, for example, if the child gets
discouraged or
repeatedly avoids obstacles, renew her interest by suggesting an
exciting
next step, or surprise her by taking an unusual stance on things
that
intrigue her.
WORLD - SEEKING LOGIC
“One, Two, Three … A Lot”. Four-year-olds draw many
lessons from their
experience. Some are about the world, others are about the
“logic” that
drives the world, and still others about people’s actions on the
world.
Children detect regularities and they make inferences. They
generalize and
they schematize. They infer laws and they establish rules. While
acting in
the world, in other words, children soon transcend both action
and object
©2004 The LEGO Group. All Rights Reserved.
The content is made available for individual use and shall not
be reproduced or edited without permission from The LEGO
Group.
The Whole Child Development Guide is grounded in recent
research findings and has been developed by the LEGO
Learning Institute in partnership with experts in the field.
Author: Prof. Edith Ackermann, Contributors: Dr. Dorothy
Singer (The Learning Relevance Grid and The Complete
Discovery System) and Dr. Aaron Falbel.
www.lego.com/parents
168
to focus on their underlying relations. What matters are the
“invisible”
relations, patterns and gestalts, and the forms, both static and
dynamic, that
keep singular elements in a certain relation.
Four-year-old children build their own mental model, or
knowledge structure
that brings order and coherence to their understanding of things.
This being
said, the pre-operational categories that 4-year-old children
establish are still
empirical rather than logical, i.e. based on how objects,
including people,
resist or yield to their solicitations.
COMPETENCIES:
Why Cryptosystems Fail ryptography is used by governments,.docx
Why Cryptosystems Fail ryptography is used by governments,.docx
Why Cryptosystems Fail ryptography is used by governments,.docx
Why Cryptosystems Fail ryptography is used by governments,.docx
Why Cryptosystems Fail ryptography is used by governments,.docx
Why Cryptosystems Fail ryptography is used by governments,.docx
Why Cryptosystems Fail ryptography is used by governments,.docx
Why Cryptosystems Fail ryptography is used by governments,.docx
Why Cryptosystems Fail ryptography is used by governments,.docx
Why Cryptosystems Fail ryptography is used by governments,.docx
Why Cryptosystems Fail ryptography is used by governments,.docx
Why Cryptosystems Fail ryptography is used by governments,.docx
Why Cryptosystems Fail ryptography is used by governments,.docx
Why Cryptosystems Fail ryptography is used by governments,.docx
Why Cryptosystems Fail ryptography is used by governments,.docx
Why Cryptosystems Fail ryptography is used by governments,.docx
Why Cryptosystems Fail ryptography is used by governments,.docx
Why Cryptosystems Fail ryptography is used by governments,.docx
Why Cryptosystems Fail ryptography is used by governments,.docx
Why Cryptosystems Fail ryptography is used by governments,.docx
Why Cryptosystems Fail ryptography is used by governments,.docx
Why Cryptosystems Fail ryptography is used by governments,.docx
Why Cryptosystems Fail ryptography is used by governments,.docx
Why Cryptosystems Fail ryptography is used by governments,.docx
Why Cryptosystems Fail ryptography is used by governments,.docx
Why Cryptosystems Fail ryptography is used by governments,.docx
Why Cryptosystems Fail ryptography is used by governments,.docx
Why Cryptosystems Fail ryptography is used by governments,.docx
Why Cryptosystems Fail ryptography is used by governments,.docx
Why Cryptosystems Fail ryptography is used by governments,.docx
Why Cryptosystems Fail ryptography is used by governments,.docx
Why Cryptosystems Fail ryptography is used by governments,.docx
Why Cryptosystems Fail ryptography is used by governments,.docx
Why Cryptosystems Fail ryptography is used by governments,.docx
Why Cryptosystems Fail ryptography is used by governments,.docx
Why Cryptosystems Fail ryptography is used by governments,.docx
Why Cryptosystems Fail ryptography is used by governments,.docx
Why Cryptosystems Fail ryptography is used by governments,.docx
Why Cryptosystems Fail ryptography is used by governments,.docx
Why Cryptosystems Fail ryptography is used by governments,.docx
Why Cryptosystems Fail ryptography is used by governments,.docx
Why Cryptosystems Fail ryptography is used by governments,.docx
Why Cryptosystems Fail ryptography is used by governments,.docx
Why Cryptosystems Fail ryptography is used by governments,.docx
Why Cryptosystems Fail ryptography is used by governments,.docx
Why Cryptosystems Fail ryptography is used by governments,.docx
Why Cryptosystems Fail ryptography is used by governments,.docx
Why Cryptosystems Fail ryptography is used by governments,.docx
Why Cryptosystems Fail ryptography is used by governments,.docx
Why Cryptosystems Fail ryptography is used by governments,.docx
Why Cryptosystems Fail ryptography is used by governments,.docx
Why Cryptosystems Fail ryptography is used by governments,.docx
Why Cryptosystems Fail ryptography is used by governments,.docx
Why Cryptosystems Fail ryptography is used by governments,.docx
Why Cryptosystems Fail ryptography is used by governments,.docx
Why Cryptosystems Fail ryptography is used by governments,.docx
Why Cryptosystems Fail ryptography is used by governments,.docx
Why Cryptosystems Fail ryptography is used by governments,.docx
Why Cryptosystems Fail ryptography is used by governments,.docx
Why Cryptosystems Fail ryptography is used by governments,.docx
Why Cryptosystems Fail ryptography is used by governments,.docx
Why Cryptosystems Fail ryptography is used by governments,.docx
Why Cryptosystems Fail ryptography is used by governments,.docx
Why Cryptosystems Fail ryptography is used by governments,.docx
Why Cryptosystems Fail ryptography is used by governments,.docx
Why Cryptosystems Fail ryptography is used by governments,.docx
Why Cryptosystems Fail ryptography is used by governments,.docx
Why Cryptosystems Fail ryptography is used by governments,.docx
Why Cryptosystems Fail ryptography is used by governments,.docx
Why Cryptosystems Fail ryptography is used by governments,.docx
Why Cryptosystems Fail ryptography is used by governments,.docx
Why Cryptosystems Fail ryptography is used by governments,.docx
Why Cryptosystems Fail ryptography is used by governments,.docx
Why Cryptosystems Fail ryptography is used by governments,.docx
Why Cryptosystems Fail ryptography is used by governments,.docx
Why Cryptosystems Fail ryptography is used by governments,.docx
Why Cryptosystems Fail ryptography is used by governments,.docx
Why Cryptosystems Fail ryptography is used by governments,.docx
Why Cryptosystems Fail ryptography is used by governments,.docx
Why Cryptosystems Fail ryptography is used by governments,.docx
Why Cryptosystems Fail ryptography is used by governments,.docx
Why Cryptosystems Fail ryptography is used by governments,.docx
Why Cryptosystems Fail ryptography is used by governments,.docx
Why Cryptosystems Fail ryptography is used by governments,.docx
Why Cryptosystems Fail ryptography is used by governments,.docx
Why Cryptosystems Fail ryptography is used by governments,.docx
Why Cryptosystems Fail ryptography is used by governments,.docx
Why Cryptosystems Fail ryptography is used by governments,.docx
Why Cryptosystems Fail ryptography is used by governments,.docx
Why Cryptosystems Fail ryptography is used by governments,.docx
Why Cryptosystems Fail ryptography is used by governments,.docx
Why Cryptosystems Fail ryptography is used by governments,.docx
Why Cryptosystems Fail ryptography is used by governments,.docx
Why Cryptosystems Fail ryptography is used by governments,.docx
Why Cryptosystems Fail ryptography is used by governments,.docx
Why Cryptosystems Fail ryptography is used by governments,.docx
Why Cryptosystems Fail ryptography is used by governments,.docx
Why Cryptosystems Fail ryptography is used by governments,.docx
Why Cryptosystems Fail ryptography is used by governments,.docx
Why Cryptosystems Fail ryptography is used by governments,.docx
Why Cryptosystems Fail ryptography is used by governments,.docx
Why Cryptosystems Fail ryptography is used by governments,.docx
Why Cryptosystems Fail ryptography is used by governments,.docx
Why Cryptosystems Fail ryptography is used by governments,.docx
Why Cryptosystems Fail ryptography is used by governments,.docx
Why Cryptosystems Fail ryptography is used by governments,.docx
Why Cryptosystems Fail ryptography is used by governments,.docx
Why Cryptosystems Fail ryptography is used by governments,.docx
Why Cryptosystems Fail ryptography is used by governments,.docx
Why Cryptosystems Fail ryptography is used by governments,.docx
Why Cryptosystems Fail ryptography is used by governments,.docx
Why Cryptosystems Fail ryptography is used by governments,.docx
Why Cryptosystems Fail ryptography is used by governments,.docx
Why Cryptosystems Fail ryptography is used by governments,.docx
Why Cryptosystems Fail ryptography is used by governments,.docx
Why Cryptosystems Fail ryptography is used by governments,.docx
Why Cryptosystems Fail ryptography is used by governments,.docx
Why Cryptosystems Fail ryptography is used by governments,.docx
Why Cryptosystems Fail ryptography is used by governments,.docx
Why Cryptosystems Fail ryptography is used by governments,.docx
Why Cryptosystems Fail ryptography is used by governments,.docx
Why Cryptosystems Fail ryptography is used by governments,.docx
Why Cryptosystems Fail ryptography is used by governments,.docx
Why Cryptosystems Fail ryptography is used by governments,.docx
Why Cryptosystems Fail ryptography is used by governments,.docx
Why Cryptosystems Fail ryptography is used by governments,.docx
Why Cryptosystems Fail ryptography is used by governments,.docx
Why Cryptosystems Fail ryptography is used by governments,.docx
Why Cryptosystems Fail ryptography is used by governments,.docx
Why Cryptosystems Fail ryptography is used by governments,.docx
Why Cryptosystems Fail ryptography is used by governments,.docx
Why Cryptosystems Fail ryptography is used by governments,.docx
Why Cryptosystems Fail ryptography is used by governments,.docx
Why Cryptosystems Fail ryptography is used by governments,.docx
Why Cryptosystems Fail ryptography is used by governments,.docx
Why Cryptosystems Fail ryptography is used by governments,.docx
Why Cryptosystems Fail ryptography is used by governments,.docx
Why Cryptosystems Fail ryptography is used by governments,.docx
Why Cryptosystems Fail ryptography is used by governments,.docx
Why Cryptosystems Fail ryptography is used by governments,.docx
Why Cryptosystems Fail ryptography is used by governments,.docx
Why Cryptosystems Fail ryptography is used by governments,.docx
Why Cryptosystems Fail ryptography is used by governments,.docx
Why Cryptosystems Fail ryptography is used by governments,.docx
Why Cryptosystems Fail ryptography is used by governments,.docx
Why Cryptosystems Fail ryptography is used by governments,.docx
Why Cryptosystems Fail ryptography is used by governments,.docx
Why Cryptosystems Fail ryptography is used by governments,.docx
Why Cryptosystems Fail ryptography is used by governments,.docx
Why Cryptosystems Fail ryptography is used by governments,.docx
Why Cryptosystems Fail ryptography is used by governments,.docx
Why Cryptosystems Fail ryptography is used by governments,.docx
Why Cryptosystems Fail ryptography is used by governments,.docx
Why Cryptosystems Fail ryptography is used by governments,.docx
Why Cryptosystems Fail ryptography is used by governments,.docx
Why Cryptosystems Fail ryptography is used by governments,.docx
Why Cryptosystems Fail ryptography is used by governments,.docx
Why Cryptosystems Fail ryptography is used by governments,.docx
Why Cryptosystems Fail ryptography is used by governments,.docx
Why Cryptosystems Fail ryptography is used by governments,.docx
Why Cryptosystems Fail ryptography is used by governments,.docx
Why Cryptosystems Fail ryptography is used by governments,.docx
Why Cryptosystems Fail ryptography is used by governments,.docx
Why Cryptosystems Fail ryptography is used by governments,.docx
Why Cryptosystems Fail ryptography is used by governments,.docx
Why Cryptosystems Fail ryptography is used by governments,.docx
Why Cryptosystems Fail ryptography is used by governments,.docx
Why Cryptosystems Fail ryptography is used by governments,.docx
Why Cryptosystems Fail ryptography is used by governments,.docx
Why Cryptosystems Fail ryptography is used by governments,.docx
Why Cryptosystems Fail ryptography is used by governments,.docx
Why Cryptosystems Fail ryptography is used by governments,.docx
Why Cryptosystems Fail ryptography is used by governments,.docx
Why Cryptosystems Fail ryptography is used by governments,.docx
Why Cryptosystems Fail ryptography is used by governments,.docx
Why Cryptosystems Fail ryptography is used by governments,.docx
Why Cryptosystems Fail ryptography is used by governments,.docx
Why Cryptosystems Fail ryptography is used by governments,.docx
Why Cryptosystems Fail ryptography is used by governments,.docx
Why Cryptosystems Fail ryptography is used by governments,.docx
Why Cryptosystems Fail ryptography is used by governments,.docx
Why Cryptosystems Fail ryptography is used by governments,.docx
Why Cryptosystems Fail ryptography is used by governments,.docx
Why Cryptosystems Fail ryptography is used by governments,.docx
Why Cryptosystems Fail ryptography is used by governments,.docx
Why Cryptosystems Fail ryptography is used by governments,.docx
Why Cryptosystems Fail ryptography is used by governments,.docx
Why Cryptosystems Fail ryptography is used by governments,.docx
Why Cryptosystems Fail ryptography is used by governments,.docx
Why Cryptosystems Fail ryptography is used by governments,.docx
Why Cryptosystems Fail ryptography is used by governments,.docx
Why Cryptosystems Fail ryptography is used by governments,.docx
Why Cryptosystems Fail ryptography is used by governments,.docx
Why Cryptosystems Fail ryptography is used by governments,.docx
Why Cryptosystems Fail ryptography is used by governments,.docx
Why Cryptosystems Fail ryptography is used by governments,.docx
Why Cryptosystems Fail ryptography is used by governments,.docx
Why Cryptosystems Fail ryptography is used by governments,.docx
Why Cryptosystems Fail ryptography is used by governments,.docx
Why Cryptosystems Fail ryptography is used by governments,.docx
Why Cryptosystems Fail ryptography is used by governments,.docx
Why Cryptosystems Fail ryptography is used by governments,.docx
Why Cryptosystems Fail ryptography is used by governments,.docx
Why Cryptosystems Fail ryptography is used by governments,.docx
Why Cryptosystems Fail ryptography is used by governments,.docx
Why Cryptosystems Fail ryptography is used by governments,.docx
Why Cryptosystems Fail ryptography is used by governments,.docx
Why Cryptosystems Fail ryptography is used by governments,.docx
Why Cryptosystems Fail ryptography is used by governments,.docx
Why Cryptosystems Fail ryptography is used by governments,.docx
Why Cryptosystems Fail ryptography is used by governments,.docx
Why Cryptosystems Fail ryptography is used by governments,.docx
Why Cryptosystems Fail ryptography is used by governments,.docx
Why Cryptosystems Fail ryptography is used by governments,.docx
Why Cryptosystems Fail ryptography is used by governments,.docx
Why Cryptosystems Fail ryptography is used by governments,.docx
Why Cryptosystems Fail ryptography is used by governments,.docx
Why Cryptosystems Fail ryptography is used by governments,.docx
Why Cryptosystems Fail ryptography is used by governments,.docx
Why Cryptosystems Fail ryptography is used by governments,.docx
Why Cryptosystems Fail ryptography is used by governments,.docx
Why Cryptosystems Fail ryptography is used by governments,.docx
Why Cryptosystems Fail ryptography is used by governments,.docx
Why Cryptosystems Fail ryptography is used by governments,.docx
Why Cryptosystems Fail ryptography is used by governments,.docx
Why Cryptosystems Fail ryptography is used by governments,.docx
Why Cryptosystems Fail ryptography is used by governments,.docx
Why Cryptosystems Fail ryptography is used by governments,.docx
Why Cryptosystems Fail ryptography is used by governments,.docx
Why Cryptosystems Fail ryptography is used by governments,.docx
Why Cryptosystems Fail ryptography is used by governments,.docx
Why Cryptosystems Fail ryptography is used by governments,.docx
Why Cryptosystems Fail ryptography is used by governments,.docx
Why Cryptosystems Fail ryptography is used by governments,.docx
Why Cryptosystems Fail ryptography is used by governments,.docx
Why Cryptosystems Fail ryptography is used by governments,.docx
Why Cryptosystems Fail ryptography is used by governments,.docx
Why Cryptosystems Fail ryptography is used by governments,.docx
Why Cryptosystems Fail ryptography is used by governments,.docx
Why Cryptosystems Fail ryptography is used by governments,.docx
Why Cryptosystems Fail ryptography is used by governments,.docx
Why Cryptosystems Fail ryptography is used by governments,.docx
Why Cryptosystems Fail ryptography is used by governments,.docx
Why Cryptosystems Fail ryptography is used by governments,.docx
Why Cryptosystems Fail ryptography is used by governments,.docx
Why Cryptosystems Fail ryptography is used by governments,.docx
Why Cryptosystems Fail ryptography is used by governments,.docx
Why Cryptosystems Fail ryptography is used by governments,.docx
Why Cryptosystems Fail ryptography is used by governments,.docx
Why Cryptosystems Fail ryptography is used by governments,.docx
Why Cryptosystems Fail ryptography is used by governments,.docx
Why Cryptosystems Fail ryptography is used by governments,.docx
Why Cryptosystems Fail ryptography is used by governments,.docx
Why Cryptosystems Fail ryptography is used by governments,.docx
Why Cryptosystems Fail ryptography is used by governments,.docx
Why Cryptosystems Fail ryptography is used by governments,.docx
Why Cryptosystems Fail ryptography is used by governments,.docx
Why Cryptosystems Fail ryptography is used by governments,.docx
Why Cryptosystems Fail ryptography is used by governments,.docx
Why Cryptosystems Fail ryptography is used by governments,.docx
Why Cryptosystems Fail ryptography is used by governments,.docx
Why Cryptosystems Fail ryptography is used by governments,.docx
Why Cryptosystems Fail ryptography is used by governments,.docx
Why Cryptosystems Fail ryptography is used by governments,.docx
Why Cryptosystems Fail ryptography is used by governments,.docx
Why Cryptosystems Fail ryptography is used by governments,.docx
Why Cryptosystems Fail ryptography is used by governments,.docx
Why Cryptosystems Fail ryptography is used by governments,.docx
Why Cryptosystems Fail ryptography is used by governments,.docx
Why Cryptosystems Fail ryptography is used by governments,.docx
Why Cryptosystems Fail ryptography is used by governments,.docx
Why Cryptosystems Fail ryptography is used by governments,.docx
Why Cryptosystems Fail ryptography is used by governments,.docx

More Related Content

Similar to Why Cryptosystems Fail ryptography is used by governments,.docx

FINAL DRAFT_DEVANSHI GOYAL
FINAL DRAFT_DEVANSHI GOYALFINAL DRAFT_DEVANSHI GOYAL
FINAL DRAFT_DEVANSHI GOYALDevanshi Goyal
 
Review on Fraud Detection in Electronic Payment Gateway
Review on Fraud Detection in Electronic Payment GatewayReview on Fraud Detection in Electronic Payment Gateway
Review on Fraud Detection in Electronic Payment GatewayIRJET Journal
 
An Enhanced Automated Teller Machine Security Prototype using Fingerprint Bio...
An Enhanced Automated Teller Machine Security Prototype using Fingerprint Bio...An Enhanced Automated Teller Machine Security Prototype using Fingerprint Bio...
An Enhanced Automated Teller Machine Security Prototype using Fingerprint Bio...Eswar Publications
 
Cybercrime, Digital Investigation and Public Private Partnership by Francesca...
Cybercrime, Digital Investigation and Public Private Partnership by Francesca...Cybercrime, Digital Investigation and Public Private Partnership by Francesca...
Cybercrime, Digital Investigation and Public Private Partnership by Francesca...Tech and Law Center
 
Ict forensics and audit bb
Ict forensics and  audit bbIct forensics and  audit bb
Ict forensics and audit bbmarukanda
 
Ijcsi 9-4-2-457-462
Ijcsi 9-4-2-457-462Ijcsi 9-4-2-457-462
Ijcsi 9-4-2-457-462Hai Nguyen
 
Computer crime
Computer crimeComputer crime
Computer crimeUc Man
 
E-commerce and fraud
E-commerce and fraudE-commerce and fraud
E-commerce and fraudblogzilla
 
Man in-the-middle-defence
Man in-the-middle-defenceMan in-the-middle-defence
Man in-the-middle-defenceHai Nguyen
 
001-MAVIS - Criminal acts in the telecom field
001-MAVIS - Criminal acts in the telecom field001-MAVIS - Criminal acts in the telecom field
001-MAVIS - Criminal acts in the telecom fieldMichalis Mavis, MSc, MSc
 
Mr SIM Swap Gone Phishing
Mr SIM Swap Gone PhishingMr SIM Swap Gone Phishing
Mr SIM Swap Gone PhishingJacqueline Fick
 
2009 10 21 Rajgoel Trends In Financial Crimes
2009 10 21 Rajgoel Trends In Financial Crimes2009 10 21 Rajgoel Trends In Financial Crimes
2009 10 21 Rajgoel Trends In Financial CrimesRaj Goel
 
TECH CYBER CRIME Homegrown menace Contents1. Regional trouble.docx
TECH CYBER CRIME Homegrown menace Contents1. Regional trouble.docxTECH CYBER CRIME Homegrown menace Contents1. Regional trouble.docx
TECH CYBER CRIME Homegrown menace Contents1. Regional trouble.docxerlindaw
 
Ce hv6 module 58 credit card frauds
Ce hv6 module 58 credit card fraudsCe hv6 module 58 credit card frauds
Ce hv6 module 58 credit card fraudsVi Tính Hoàng Nam
 
Cataleya-Security-Feature_SAWC_April2016page-20-23
Cataleya-Security-Feature_SAWC_April2016page-20-23Cataleya-Security-Feature_SAWC_April2016page-20-23
Cataleya-Security-Feature_SAWC_April2016page-20-23Jacqueline Fick
 

Similar to Why Cryptosystems Fail ryptography is used by governments,.docx (20)

Cybercriminality
CybercriminalityCybercriminality
Cybercriminality
 
FINAL DRAFT_DEVANSHI GOYAL
FINAL DRAFT_DEVANSHI GOYALFINAL DRAFT_DEVANSHI GOYAL
FINAL DRAFT_DEVANSHI GOYAL
 
Review on Fraud Detection in Electronic Payment Gateway
Review on Fraud Detection in Electronic Payment GatewayReview on Fraud Detection in Electronic Payment Gateway
Review on Fraud Detection in Electronic Payment Gateway
 
An Enhanced Automated Teller Machine Security Prototype using Fingerprint Bio...
An Enhanced Automated Teller Machine Security Prototype using Fingerprint Bio...An Enhanced Automated Teller Machine Security Prototype using Fingerprint Bio...
An Enhanced Automated Teller Machine Security Prototype using Fingerprint Bio...
 
ATM
ATMATM
ATM
 
Cybercrime, Digital Investigation and Public Private Partnership by Francesca...
Cybercrime, Digital Investigation and Public Private Partnership by Francesca...Cybercrime, Digital Investigation and Public Private Partnership by Francesca...
Cybercrime, Digital Investigation and Public Private Partnership by Francesca...
 
Ict forensics and audit bb
Ict forensics and  audit bbIct forensics and  audit bb
Ict forensics and audit bb
 
Ijcsi 9-4-2-457-462
Ijcsi 9-4-2-457-462Ijcsi 9-4-2-457-462
Ijcsi 9-4-2-457-462
 
Computer crime
Computer crimeComputer crime
Computer crime
 
E-commerce and fraud
E-commerce and fraudE-commerce and fraud
E-commerce and fraud
 
Man in-the-middle-defence
Man in-the-middle-defenceMan in-the-middle-defence
Man in-the-middle-defence
 
History of computer crime
History of computer crimeHistory of computer crime
History of computer crime
 
001-MAVIS - Criminal acts in the telecom field
001-MAVIS - Criminal acts in the telecom field001-MAVIS - Criminal acts in the telecom field
001-MAVIS - Criminal acts in the telecom field
 
Mr SIM Swap Gone Phishing
Mr SIM Swap Gone PhishingMr SIM Swap Gone Phishing
Mr SIM Swap Gone Phishing
 
Ecommerce1
Ecommerce1Ecommerce1
Ecommerce1
 
2009 10 21 Rajgoel Trends In Financial Crimes
2009 10 21 Rajgoel Trends In Financial Crimes2009 10 21 Rajgoel Trends In Financial Crimes
2009 10 21 Rajgoel Trends In Financial Crimes
 
TECH CYBER CRIME Homegrown menace Contents1. Regional trouble.docx
TECH CYBER CRIME Homegrown menace Contents1. Regional trouble.docxTECH CYBER CRIME Homegrown menace Contents1. Regional trouble.docx
TECH CYBER CRIME Homegrown menace Contents1. Regional trouble.docx
 
Ce hv6 module 58 credit card frauds
Ce hv6 module 58 credit card fraudsCe hv6 module 58 credit card frauds
Ce hv6 module 58 credit card frauds
 
File000146
File000146File000146
File000146
 
Cataleya-Security-Feature_SAWC_April2016page-20-23
Cataleya-Security-Feature_SAWC_April2016page-20-23Cataleya-Security-Feature_SAWC_April2016page-20-23
Cataleya-Security-Feature_SAWC_April2016page-20-23
 

More from alanfhall8953

With regards to this article, I agree and disagree on certain leve.docx
With regards to this article, I agree and disagree on certain leve.docxWith regards to this article, I agree and disagree on certain leve.docx
With regards to this article, I agree and disagree on certain leve.docxalanfhall8953
 
WIT Financial Accounting Test Ch.docx
WIT                   Financial Accounting Test                 Ch.docxWIT                   Financial Accounting Test                 Ch.docx
WIT Financial Accounting Test Ch.docxalanfhall8953
 
Windows Server Deployment ProposalOverviewEach student will .docx
Windows Server Deployment ProposalOverviewEach student will .docxWindows Server Deployment ProposalOverviewEach student will .docx
Windows Server Deployment ProposalOverviewEach student will .docxalanfhall8953
 
Wireshark Lab TCP v6.0 Supplement to Computer Networking.docx
Wireshark Lab TCP v6.0  Supplement to Computer Networking.docxWireshark Lab TCP v6.0  Supplement to Computer Networking.docx
Wireshark Lab TCP v6.0 Supplement to Computer Networking.docxalanfhall8953
 
Wireshark Lab IP v6.0Supplement to Computer Networking A Top-D.docx
Wireshark Lab IP v6.0Supplement to Computer Networking A Top-D.docxWireshark Lab IP v6.0Supplement to Computer Networking A Top-D.docx
Wireshark Lab IP v6.0Supplement to Computer Networking A Top-D.docxalanfhall8953
 
Wireshark Lab IP v6.0 Supplement to Computer Networking.docx
Wireshark Lab IP v6.0  Supplement to Computer Networking.docxWireshark Lab IP v6.0  Supplement to Computer Networking.docx
Wireshark Lab IP v6.0 Supplement to Computer Networking.docxalanfhall8953
 
Willowbrook SchoolBackgroundWillowbrook School is a small, pri.docx
Willowbrook SchoolBackgroundWillowbrook School is a small, pri.docxWillowbrook SchoolBackgroundWillowbrook School is a small, pri.docx
Willowbrook SchoolBackgroundWillowbrook School is a small, pri.docxalanfhall8953
 
Wind PowerUsed For Millennia Variations in alb.docx
Wind PowerUsed For Millennia Variations in alb.docxWind PowerUsed For Millennia Variations in alb.docx
Wind PowerUsed For Millennia Variations in alb.docxalanfhall8953
 
winter 2013 235 CREATE A CONTRACTInstructionsI will giv.docx
winter 2013 235 CREATE A CONTRACTInstructionsI will giv.docxwinter 2013 235 CREATE A CONTRACTInstructionsI will giv.docx
winter 2013 235 CREATE A CONTRACTInstructionsI will giv.docxalanfhall8953
 
WinEst As 1. Es2. Tassignment stInfo (Esti.docx
WinEst As 1. Es2. Tassignment stInfo (Esti.docxWinEst As 1. Es2. Tassignment stInfo (Esti.docx
WinEst As 1. Es2. Tassignment stInfo (Esti.docxalanfhall8953
 
Wiley Plus Brief Exercise 6 –Accounting 100Brief Exercise 6-1B.docx
Wiley Plus Brief Exercise 6 –Accounting 100Brief Exercise 6-1B.docxWiley Plus Brief Exercise 6 –Accounting 100Brief Exercise 6-1B.docx
Wiley Plus Brief Exercise 6 –Accounting 100Brief Exercise 6-1B.docxalanfhall8953
 
Winter 2011 • Morality in Education 35Workplace Bullying .docx
Winter 2011 • Morality in Education 35Workplace Bullying .docxWinter 2011 • Morality in Education 35Workplace Bullying .docx
Winter 2011 • Morality in Education 35Workplace Bullying .docxalanfhall8953
 
With the competitive advantage that Crocs’ supply chain holds, the.docx
With the competitive advantage that Crocs’ supply chain holds, the.docxWith the competitive advantage that Crocs’ supply chain holds, the.docx
With the competitive advantage that Crocs’ supply chain holds, the.docxalanfhall8953
 
Windows Server 2012 R2 Essentials Windows Server 2012.docx
Windows Server 2012 R2 Essentials  Windows Server 2012.docxWindows Server 2012 R2 Essentials  Windows Server 2012.docx
Windows Server 2012 R2 Essentials Windows Server 2012.docxalanfhall8953
 
Wind power resources on the eastern U.S. continental shelf are est.docx
Wind power resources on the eastern U.S. continental shelf are est.docxWind power resources on the eastern U.S. continental shelf are est.docx
Wind power resources on the eastern U.S. continental shelf are est.docxalanfhall8953
 
WilliamStearman_Java301build.xml Builds, tests, and ru.docx
WilliamStearman_Java301build.xml      Builds, tests, and ru.docxWilliamStearman_Java301build.xml      Builds, tests, and ru.docx
WilliamStearman_Java301build.xml Builds, tests, and ru.docxalanfhall8953
 
Wilco Corporation has the following account balances at December 3.docx
Wilco Corporation has the following account balances at December 3.docxWilco Corporation has the following account balances at December 3.docx
Wilco Corporation has the following account balances at December 3.docxalanfhall8953
 
Wilson Majee Technology Diffusion, S-Curve, and Innovation.docx
Wilson Majee Technology Diffusion, S-Curve, and Innovation.docxWilson Majee Technology Diffusion, S-Curve, and Innovation.docx
Wilson Majee Technology Diffusion, S-Curve, and Innovation.docxalanfhall8953
 
WinARM - Simulating Advanced RISC Machine Architecture .docx
WinARM - Simulating Advanced RISC Machine Architecture   .docxWinARM - Simulating Advanced RISC Machine Architecture   .docx
WinARM - Simulating Advanced RISC Machine Architecture .docxalanfhall8953
 
William PennWhat religion was William PennWilliam Pen was fr.docx
William PennWhat religion was William PennWilliam Pen was fr.docxWilliam PennWhat religion was William PennWilliam Pen was fr.docx
William PennWhat religion was William PennWilliam Pen was fr.docxalanfhall8953
 

More from alanfhall8953 (20)

With regards to this article, I agree and disagree on certain leve.docx
With regards to this article, I agree and disagree on certain leve.docxWith regards to this article, I agree and disagree on certain leve.docx
With regards to this article, I agree and disagree on certain leve.docx
 
WIT Financial Accounting Test Ch.docx
WIT                   Financial Accounting Test                 Ch.docxWIT                   Financial Accounting Test                 Ch.docx
WIT Financial Accounting Test Ch.docx
 
Windows Server Deployment ProposalOverviewEach student will .docx
Windows Server Deployment ProposalOverviewEach student will .docxWindows Server Deployment ProposalOverviewEach student will .docx
Windows Server Deployment ProposalOverviewEach student will .docx
 
Wireshark Lab TCP v6.0 Supplement to Computer Networking.docx
Wireshark Lab TCP v6.0  Supplement to Computer Networking.docxWireshark Lab TCP v6.0  Supplement to Computer Networking.docx
Wireshark Lab TCP v6.0 Supplement to Computer Networking.docx
 
Wireshark Lab IP v6.0Supplement to Computer Networking A Top-D.docx
Wireshark Lab IP v6.0Supplement to Computer Networking A Top-D.docxWireshark Lab IP v6.0Supplement to Computer Networking A Top-D.docx
Wireshark Lab IP v6.0Supplement to Computer Networking A Top-D.docx
 
Wireshark Lab IP v6.0 Supplement to Computer Networking.docx
Wireshark Lab IP v6.0  Supplement to Computer Networking.docxWireshark Lab IP v6.0  Supplement to Computer Networking.docx
Wireshark Lab IP v6.0 Supplement to Computer Networking.docx
 
Willowbrook SchoolBackgroundWillowbrook School is a small, pri.docx
Willowbrook SchoolBackgroundWillowbrook School is a small, pri.docxWillowbrook SchoolBackgroundWillowbrook School is a small, pri.docx
Willowbrook SchoolBackgroundWillowbrook School is a small, pri.docx
 
Wind PowerUsed For Millennia Variations in alb.docx
Wind PowerUsed For Millennia Variations in alb.docxWind PowerUsed For Millennia Variations in alb.docx
Wind PowerUsed For Millennia Variations in alb.docx
 
winter 2013 235 CREATE A CONTRACTInstructionsI will giv.docx
winter 2013 235 CREATE A CONTRACTInstructionsI will giv.docxwinter 2013 235 CREATE A CONTRACTInstructionsI will giv.docx
winter 2013 235 CREATE A CONTRACTInstructionsI will giv.docx
 
WinEst As 1. Es2. Tassignment stInfo (Esti.docx
WinEst As 1. Es2. Tassignment stInfo (Esti.docxWinEst As 1. Es2. Tassignment stInfo (Esti.docx
WinEst As 1. Es2. Tassignment stInfo (Esti.docx
 
Wiley Plus Brief Exercise 6 –Accounting 100Brief Exercise 6-1B.docx
Wiley Plus Brief Exercise 6 –Accounting 100Brief Exercise 6-1B.docxWiley Plus Brief Exercise 6 –Accounting 100Brief Exercise 6-1B.docx
Wiley Plus Brief Exercise 6 –Accounting 100Brief Exercise 6-1B.docx
 
Winter 2011 • Morality in Education 35Workplace Bullying .docx
Winter 2011 • Morality in Education 35Workplace Bullying .docxWinter 2011 • Morality in Education 35Workplace Bullying .docx
Winter 2011 • Morality in Education 35Workplace Bullying .docx
 
With the competitive advantage that Crocs’ supply chain holds, the.docx
With the competitive advantage that Crocs’ supply chain holds, the.docxWith the competitive advantage that Crocs’ supply chain holds, the.docx
With the competitive advantage that Crocs’ supply chain holds, the.docx
 
Windows Server 2012 R2 Essentials Windows Server 2012.docx
Windows Server 2012 R2 Essentials  Windows Server 2012.docxWindows Server 2012 R2 Essentials  Windows Server 2012.docx
Windows Server 2012 R2 Essentials Windows Server 2012.docx
 
Wind power resources on the eastern U.S. continental shelf are est.docx
Wind power resources on the eastern U.S. continental shelf are est.docxWind power resources on the eastern U.S. continental shelf are est.docx
Wind power resources on the eastern U.S. continental shelf are est.docx
 
WilliamStearman_Java301build.xml Builds, tests, and ru.docx
WilliamStearman_Java301build.xml      Builds, tests, and ru.docxWilliamStearman_Java301build.xml      Builds, tests, and ru.docx
WilliamStearman_Java301build.xml Builds, tests, and ru.docx
 
Wilco Corporation has the following account balances at December 3.docx
Wilco Corporation has the following account balances at December 3.docxWilco Corporation has the following account balances at December 3.docx
Wilco Corporation has the following account balances at December 3.docx
 
Wilson Majee Technology Diffusion, S-Curve, and Innovation.docx
Wilson Majee Technology Diffusion, S-Curve, and Innovation.docxWilson Majee Technology Diffusion, S-Curve, and Innovation.docx
Wilson Majee Technology Diffusion, S-Curve, and Innovation.docx
 
WinARM - Simulating Advanced RISC Machine Architecture .docx
WinARM - Simulating Advanced RISC Machine Architecture   .docxWinARM - Simulating Advanced RISC Machine Architecture   .docx
WinARM - Simulating Advanced RISC Machine Architecture .docx
 
William PennWhat religion was William PennWilliam Pen was fr.docx
William PennWhat religion was William PennWilliam Pen was fr.docxWilliam PennWhat religion was William PennWilliam Pen was fr.docx
William PennWhat religion was William PennWilliam Pen was fr.docx
 

Recently uploaded

Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991RKavithamani
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3JemimahLaneBuaron
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Celine George
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactPECB
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfJayanti Pande
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxRoyAbrique
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docxPoojaSen20
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...RKavithamani
 

Recently uploaded (20)

Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
Staff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSDStaff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSD
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docx
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...
 

Why Cryptosystems Fail ryptography is used by governments,.docx

  • 1. Why Cryptosystems Fail ryptography is used by governments, banks, and other or- ganizatiom to keep messages secret and to protect electronic transactions from modification. It is basically an engineering discipline, but differs in a rather striking way from, for example, aeronautical engineering: there is almost no public feed- back about how cryptographic systems fail. Commercial airline crashes are extremely public events. Investigators rush to the scene, and their inquiries involve experts from a wide range of interestsfrom the carrier, through the manufacturer, to the pilots’ union. Their findings are examined byjournalisrs and politicians, discussed on elec- tronic bulletin boards and in pilots’ messes, and passed on by flying instruc- tors. This learning mechanism is the main reawn why, despite the inherent hazards of flying, the risk of an individual being killed on a scheduled air journey is only about one in a million. Cryptographers rarely get this kind of feedback, and indeed the history of the subject shows the same mistakes being made over and over again. For
  • 2. example, Norway’s rapid fall in the Second World War was largely due to the Germans’ success in solving British naval codesusing exactly the same tech- niques that the Royal Navy’s own “Room 40” had used against Germany in the previous war [ 161. Altbough we now have a reasonable history of cryptology up to the end of World War II, a curtain of silence has descended on government-sector use of this technology since then. Although this is not particularly surpris ing, it does leave a large experience deficit, especially as the introduction of. computers since 1945 has changed the situation considerably. It is as ifacci- dent reports were only published for pistonengined aircraft, while the caw es of all jet-aircraft crashes were kept a state secret. This secrecy is no longer appropriate, a~ military messaging networ!~ now make up only about 1% of the world’s crptography, whether we measure this by the number of users or by the number of terminals. There are some civilian applications for secure messaging, such as interbank money transfer and burglar alarm signaling; but the great majority of fielded cryptographic systems are in applications such as bank cards, pay-TV, road tolls, office building and computer access tokens, lottery termmals, and prepayment
  • 3. electricity meters. Their job is basically to make petty crime, such as card forgery, slightly more difficult. Cryptography was introduced to the commercial world from the military by designers of automatic teller machine (ATM) systems in the early 1970s. Since then, ATM security techniques have inspired many of the other sys ternsespecially those where customers initiate low-value transactions for which we want to account. One might therefore expect the ATM experience to give a good first-order threat model for cryptographic systems in general. Automatic Teller Machine Disputes In SCIIIK countries, banks are responsible for the risks associated with new technology In 1980, a New York court believed a bank customer’s word that she had n”t made a withdrawal, rarhcl than the word of the bank’s exper, that she must have done so 1151; the Federal Reserve then passed regula- dons that require U.S. banks to refund all disputed electronic transactions unless they can prove fraud by the cus-
  • 4. tamer. Since then, many U.S. ATM cash dispensers have had video carr- eras installed. In Britain, the courts have not yrt been so demanding; despite a parha- mentary commission that found thar the personal identification numbe (PIN) system was insrcurr [14], bank- crs simply deny that their systems ca” ever be at fault. Customers who c”m plain about “phantom withdrawals” are told that they must be lying, 01 mistaken, or that they must have been defrauded by their friends or relatives. This has led t” a string of court cases in the U.K.: l A teenage girl in Ashton was COIL- victed in 1985 of stealing f40 from her father. She pleaded guilty on the advice of her lawyers that shy had no defense, and then disap- peared; it later turned “ut that there had nevrr been a theft, but a clerical rrr”r by the bank, which tried to cover it up. . A She&Id police sergeant wa> charged with theft in N”vembe, 1988 after a phantom withdrawal took place on a card he had confia- cated from a suspect. He was lucky: his colleagues located the person who made the transaction after the
  • 5. disputed one, and her testimony cleared him l Charges of theft against an el- derly w”man in Plymouth were dropped after our inquiries showed the bank’s computer security sys- terns were a shambles. The same happened in a case against a taxi driver in Great Yarmouth. l After a police constable c”m plained he had not madr six AIM withdrawals that appeared on his bank statement, the bank had him prosecuted and convicted for at- tempting to obtain money by decrp- don. Their technical evidence was highly suspect; there was an outcry in the press, and an appeal is under way. l Customers are suing banks in the civil courts in both England and &otlar~d, dnd n C~LC ,,,a? lbe launched shol-tly in Norwa) a well Wr have been involved i” prow- ing expcrr advice in many of thrse cases, which produced a vasr quantity of evidence. In addition m this, and “the,- information discovered through the legal p,-ocess, we haw intcrvirwed former bank rmployeeb and criminals, srarching the banking,
  • 6. legal, and trchnical literatures, and drawn on experirnce gainrd dcsign- ing cryptographic equipment. One outcome of all this activity has been the first unclassified study ofhow and why cryptosystcms fail. The Three COmmOfl Problems with ATM Security Automatic teller- machine systems ue rncryption t” protect customers PINs. The details vary from one bank m another, but many use variants ofa system originally drvclopcd by IBM [21], in which the PIN is derived from the account number by encryption. Ir is also rncryptrd while being sent Srom the ATM to thr bank for vrrifi- cat;on. When the crypt” know-how was “riginally imported from the dcfenae sector, a threat model came with it. This model presumed that attacks on the system would be technically so- phisticated, and might in,olve crypr- analysis or the manipulation of trans- acti”ns at s”mr point in the path between the ATM and the bank that issued the card. Indeed, there are many ways i” which a skilled attacker could pene- tratr thr world’s ATM networks [3]. Some networks do not cncrypt PINS
  • 7. properly, or at all; many banks, espc- cially in the U.S., do encryption in software rather than hardware, with the rrsult that the keys are known t” programmers; somr older ATMs and encryption devices have known wcak- nesses; and even those systems that use approved encryption hardware can be vulnerable, as the Data En- cryption Standard algorithm is be- coming increasingly “pen t” attack [24]. All these facts are used by en- cryption equipment sales staff in thei! efforts t” persuade bankrrs to buy the latest products. Of the hundreds of documented failures of ATM security, however, “nl) IMO rnwlwd ruch attack*: in one, a telephone engineer in Japan recorded customer Cal-d data and PIN5 from a phone line; in the other, technicians programmed a communi- cations px-ocessol- to send only posit tive authorirati”ns t” an ATM where accomplices were waiting. None of the other thefts and frauds wrre due t” skilled attack, but were rather made possible by errors in the desig” or operation of the ATM system itself The three main causes of phantom
  • 8. withdrawals did not involve cryptol- ogy at all: they w.e,vz pr”gram buga, postal interception OS cards, and thefts by bank staff. First, there is a “background noise” of transacti”ns that turn out t” be wrongly processed (e.g., posted t” the wong account,. It is well known that it is difficult to get an error rate below about 1 in 10,000 on largr, he rrogcnrous transaction pl-“casing systems such as ATM networks [IO], yet, bef”re the British litigation started, the government minister rc- sponsiblc for Britain’5 banking indus- try was claiming an rrr”r rate of 1 in 1.5 million! Under prcsaurr from lawyers, this claim was trimmed to I in 250,000, then 1 in 100,000, and most recently to I in 34,000. Eveo this last figure would still mean thal about 30,000 phantom withdrawals a year in Britain (and “vrr 200,000 in the United States) are caused by pro- cessing errors. Second, problems with the posul service are also well known and can be particularly acute in university towns. In Cambridge, for example, approximately 4,000 pcoplc “pen bank accounts every October; thei, ATM cards and PINS are delivered t”
  • 9. college pigeonholes, which are wide open t” thieves. Yet this author’5 bank was unable t” arrange for a card to be sent by recorded delivery; ita systrm designers had not anticipated the requirement. The third big problem is theft by bank stall. British banks dismiss about I% of their staff every year for disciplinary reasons, and many of these firings are for petty thefts in which ATMs can easily bc involved. There is a mwal hazard here: staff know that many ATM-related theft5 g” undetected because of the p”licy the pwblem (and it did not occur to anyone t” check). . One of the largest Londrm hanks had written the encrypted PIN on the card’s magnetic strip. The crirw inal fraternity found by trial and error that you could changr the arcount number on your own card’s magnetic strip to that of y”ur tdr- get, and then use it with your “WI> PIN to toot the targeted acc”unt. A document about this tectmique cir-
  • 10. culated in the British prison systenl, and tw” men were recently chargrd at Bristol Crown c”wt “f conspiring to steal money by altering cards in this way. They produced an em- nrnt banking industry expert who testified that what they had planned was impossible; but after a leading newspaper demonstrated otherwise, they changed their plea to guilty[8]. l Some banks have schemes that enable PINS to be checked by “ff- line ATMs withnut giving them the master encryption key needed t” derive PINS from account numbezra. For example, customers of one Brit- ish bank got a credit-card PIN with digit-one plus digit-four equal t” digit-two plus digit-thrcr, and a debit-card PIN with one plus three equals tw” plus four. Villains even- tually discovered that they could use stolen cards in off-line devicea by entering a PIN such as 4455. l Even without such weaknesses, the use of store-and-forward pro- cessing is problematic. Anyone can “pen an account, get a card and PIN, make several copies of the card, and get accomplices to draw cash from a number of different ATMs at the samr time. This was a favorite modus operandi in Britain
  • 11. in the mid-19ROs, and is still a problem in Italy, where ATMs arc generally off-line over the weekend. l Any security technology can be defeated by gross negligence. In August 1993, my wife went into a branch of our bank and told them that she had forgotten hrr PIN; they helpfully printed a replace- ment PIN mailer from a PC behind the counter. This was not the branch at which her acc”unt is kept; no “ne knew her, and the only identification she produced was her bank card and checkbook. By thnt tm,e, bank5 II, Bntam hnd endured some 18 months of bad publicity about pwr ATM sccuriry, and this parrirutar bank had been 4 press target since April of that year. Tllis might Icad IIS to ak what the future might bold. M’ill all magnrtic cards br replaced with smartcards, as is already happrning in countrirs from Francr t” Guatemala and from Norway t” South Africa [Z]? One “I the smartcard vrndors strongest ar- guments is that card forgery keeps on rising, and that the fastest growin!: modus “prrandi is to use hdac trm& nals to collrct customer card and PIN
  • 12. data. Artarks “1 this kind were lirsr ICI- ported from the United Stares in 198X; more recently, an enterprising gang b”ughtATMa and an ATM aoft- ware dcvrtopmrnt kit (on credit), pwgrammed a machine t” capturr PINS, and rented space f”l, it in a shopping mall in Connecticut. A Dutch gas station attrndant used a tapped pr,int-of-sale terminal t” har- vest card data in 1993; and in March 1994, villains constructed an entire bogus bank branch in the East Lnd of London and made off with f250,OOO ($375,000). Thcrr srems to be no de- fense against this kind of attack, short of moving fwm magnetic cards to payment tokens, which are more dil- ficult to forge. But trusting technology to” much can be dangerous. Norwegian banks aprnt millions “n smartcards, and arc now as publicly certain about theit computer security as their British c”I- leagues. Yet despite the huge iwest- ment, there have been a number of cases in Trondheim, Norway, where stolen cards have been used without the PIN having been lraked by the user. The hanks‘ refusal to pay up will
  • 13. probably lead t” litigation, as in Brit- ain, with the same risk to both bal- ance sheets and reputations. Where transaction processing sys- tems are used directly by the public, there are really two separate issues. The first is the public-interest issue of whether the burden of proof (and thus the risk) falls on the customer or on the system operator. If the cus- mmer carries the risk, the operator will have little short-term incentive to rn~p~ovc security; but 111 the lorlg:cl term, when innocent people are prose ccutrd because of disputed transa- ti~ns, the public interest becomea acute. If, “1, thr other hand, thr system operator carrirs the risk, as in the United States, then the public-intcr- est isuc disappcara, and security be- comes a straightfwward engineering pwblrm fix the hank (and its insur- e1.s and equipment suppliers). WC wnsider how this problem can br tackled in the following sections. Organizational Aspects First, a caveat: our reseat& sbowcd
  • 14. that the organizational problems “I building and managing srcure sys- tems arc so ~rvrrr that they will frus- trate any purely technical solution. Many organizations have no corn puter security team at all, and the rep, have tenuous arrangements. The irr- ternal audit dcpartmcnt, fw rxam- plr, will resist bring givrn any line management tasks, while the pro- gramming staftdislike anyone whose role seems m be making their .j”b more difficult. Security teams thus tend to be “rrorganizrd” rrgulxly, lading t” a toss of continuity; a re- cent study shows, for example, that the average job tenure of compurel security managers in U.S. govern- ment departments is only seven months [13]. It should not br surprising that many firms get outside consultants t” do their security policy-making and review tasks. However, this can be dangerous, especially if firms pick these suppliers for an “air ofcertainty and quality” rather than for theit technical credentials. For example, there was a network “fover 40 hanks in &a that encrypted their PINS in a completely insecure manner (using a
  • 15. Caesar cipher) for five years, yet in all this time not one of their auditors or consultants raised the alarm. It is in- teresting to notr that, following a wave of litigation, accountancy firma are rewriting their audit contracts to shift all responslbthty for fraud con- trol to their clients; but it remains to be seen what effect this wilt have on their security consulting business. Much of the management debate, however, is not about the consultancy The Problems with Securitv Products know that most hkel) fkuhs, ,n<t, as a poor batch of steel, contaminated concrete, or uneven weathering, have the effect of slightly reducing the breaking strain of the structure; so thr usual rule is to design a bridge so that its theoretical breaking strain with optimal materials is six times what is required, and to proof tat samples of the actual materials used to three times the ncrdcd strength.
  • 16. Aircraft rngincers, on the other hand, know that many accidents are causrd by the failure of critical com- ponents, and make extensive use of redundancy; with very critical func- tions, this may rxtrnd to design di- versity. Whrn flying in clouds, pilots need to know which way is up, and so a modern airliner typically has two attitude indicators driven by elcctri- tally powered gyro platforms. If these both fail at once, there is a 1950s-rra technology artificial horizon with pneumatically driven gyros, and a 1920s vintage turn-and-slip indicator driven by a battery. But neither overdcsign nur redun- dancy is adequate for secure compu- tational systems. Just doing more rounds of a bad encryption algo- rithm, or using a number of weak al- gorithms one after another, will not necessarily produce a strong one; and unthinking use of redundancy in computer systems can be dangerous, as resilience can mask faults that would otherwise be found and fixed. Our work on ATM systems thcre- fore inspired us to look for an orga- nizing principle for robustness prop- erties in computer security systems. The kry insights came from the high-
  • 17. tech end of the business-from studying authentication protocols and the ways in which cryptographic algorithms interact (see the sidebar “No Silver Bullet”). These results suggest that explicit- ness should be the organizing princi- ple for security robustness. Crypto- graphic algorithms interact in ways that break security when their de- signers do not specify the required properties explicitly; and protocol failures occur because naming, fresh- ness, and chaining properties are as- sumed implicitly to hold between two parties. The importance of explicitness is confirmed m tbr field of oprtamg systems security by a recent report that shows implicit information proh- lems were one of the main causes of failure there, and that most of thr others were due to obGous require- ments not being explicitly checked [ 171. However, just saying that every sccul(ty property must be made ex- plicit is not a solution to the practical problem of building robust systems. The more aspects of any system are made explicit, the more information
  • 18. its designer has to deal with; and this applies not only to designing systems, hut to evaluating them as well. Can our explicitness principle ever amount to more than a warning that all a system’s assumptions must be examined very carefully? There are two possible ways for- ward. The first is to look for ways in which a system that has a certain set ofrelationships checked explicitly can be shown using formal methods to possess some desirable security prop- erty. This may be a good way to deal with compact subsystems such as au- thentication protocols; and lists of the relevant relationships have been pro- posed [I]. The othrr, and more general, ap- proach is to try to integrate security with software engineering. Data- dependency analysis is already start- ing to be used in the security world: l A typical difftcult problem is iden- tifying which objects in a system have security significance. As we saw previously, frauds have taken place because banks failed to realix that an address change was a secu-
  • 19. rity event; and evaluating thr signif- icance of all the objects in a distrib- uted operating system is a Herculean task, which involves trac- ing dependencies explicitly. Auto- mated tools are now being con- structed to do this [l I]; l Another difficult problem is that of verifying whether an authentica- tion protocol is correct. This prob- lem can he tackled by formal meth- ods; the best-known technique involves tracing an object’s dcpen- dencies on crypto keys and fresh- ness information [9], and has been used to verify transaction processing applications as well [2]. However, we cannot expect to find a “sdvr, bullrr” brtr crrbrr ‘1 t,,i 1s bccaux many of the m,,re subtle and difftcult mistakes occur whew ash sumptioos ahoul security proper&b fail at the interfacr between different levels (e.g., algorithm-prot~j,col or protocol-operating system) [6]. Thus when WC decompose our system into mod&s, we must be very careful to ensure that all our assumptions about possible interactions have been made explicit and conzidrrcd carefully. Explicitness and Software
  • 20. Engineering Robustness as rxplicitnesb lita m well with the general principles of soft- ware engineering but may require some changes in its practice. A recent study shows that for many years the techniques used by system builders tu manage security requirements, as- sumptions, and drpendencies have lagged a grneration behind the state of the art [5]. An even more elementary problem concerns the mechanisms by which security goals are established. Many software engineering methodologies since the waterfall model have dis- pensed with the traditional requirc- ment that a plain-language “concept of operations” should be agreed upon before any detailed specifica- tion work is undertaken. This is illus- trated by our work on ATMs. ATM security involves several cow flicring goals, including controlling internal and external fraud, and arbi- trating disputes fairly. This was not understood in the 1970s; people built systems with the security technology they had available, rather than from any clear idea of what they were try-
  • 21. ing to do. In some countries they ig- nored the need for arbitration alto- gether, with expensive consequences. This underlines the particular impor- tance of making security goals ex- plicit, where a concept of operations can be a great help; it might have fo- cused ATM designers’ attention on the practicalities of dispute resolution. Finally, it may be helpful to com- pare secure systems with safety criti- cal systems. They are known to be re- lated: while the former must do at most X, the latter must do at /~_YI X, and there is a growing realization that many of the techniques and even wrnponcnr~ horn one disclplmc can be reused in the other. Let us extend this relationship to the methodologi- cal level and have a look at good de- sign practice. A leading software safety expert has summed this up in four principles [Xl]: l The specification should list all possible failure modes of the sys- tan. This should include every hub- stantially new accidrnt or incident that has ever been reported and that is relevant to the equipment being specified.
  • 22. l It should explain what swateg) has been adopted to prevent each of these failure modes, or at least make them acceptably unlikely. l It should then spell out how each of these strategies is implemented, including the consequences when each single component fails. This explanation must cover not only technical factors, but training and management issues too. If the pro- cedure when an engine fails is to continue flying with the other en- gine, then what skills does a pilot need to do this, and what are the procedures whereby these skills are acquired, kept current, and tested? l The certification program must include a review by independent experts, and test whether the equip- ment can in fact be operated by people with the stated level of skill and experience. It must also in- clude a monitoring program whereby all incidents are reported to both the equipment manufac- turer and the certification body. This structure ties in neatly with our findings, and gives us a practical paradigm for producing a robust, explicit security design in a real proj- ect. It also shows that the TCSEC program has a long way to go. As we
  • 23. mentioned earlier, so far no one seems to have attempted even the first stage of the safety engineering process for cryptographic systems. We hope that this article will contrib- ute to closing the gap, and to bring- ing security engineering up to the standards already achieved by the safety-critical systems community. concIustons Designers of cryptographic systrms have suttered from a lack <,I feedback about how their products fail in prac- tice, as opposed to how they might fail in theory. This has led to a false thrrat model being accrpted; design- e,n focused on what could possibly go wrong, rather than on what was likely to, and many of their products ended up being so complex and tricky to use, they caused implrmentation blunders that Icd to security failures. Almost all security failures are in fact due to implementation and man- agement errors. one specific conse- quence has been a spare of ATM fraud, which has not only caused fi- nancial losses, but has also caused sev- era1 wrongful prosecutions and at least one miscarriage ofjustice. There have also been military consequences,
  • 24. which have now been admitted (al- though the dewI, remain classitird). Our work also shows that compo- nent-level certification, as embodied in the TCSEC program, is unlikely to achiew its stated goals. This, too, has been admitted indirectly by the rnili~ tary; and we would recommend thal future security standards take much more account of the environments in which the components are to be used, and rspecially the system and human factors. Most interesting of all, however, is the lesson that the bulk of the com- puter security research and develop- ment budget is expended on activities that are of marginal relevance to real needs. The real problem is how to build robust security systems, and a number of recent research ideas arc providing insights into how this can No Silver 6ullt?t Mach of these ProPosats only addresses Part of the Problem. and none of them 15 adequate on Its own: ProtPcot fatlures are knOwI which W$“ttkO”J the lack of name, or of heshnesr. or M context tnformatton wtfhtn the s.?C”rth/ envek,Pe 111. But Putting them together and tnststtng on at1
  • 25. Me% “artabtes being made exPttCtt t” each me55age aPPears to sot”e the global rObuStWSI Problem--af least for StmPte PrOtOCOtS. This COmbined aPProach had act”att” been adopted in 1991 for a banttng aPP,,cat,on 121, In which attact on the Payment Protocots are Prevented by making each message stiTt wt+_h the sender’s name. and then enCr’,Pttng If under a key that contains a “ash of the Previous message. These techntdWS were not Wed as an exPertmenf In robuStne5s. but to factlltate format Wrtflcatlon. 4nother reason to believe that exPttcitneSS Should be the organlztng Prlnct- Pte for robust sec”rtN comer from st”dyt”g how CWPtOgraPhtC atgortthms Interact. Researchers have aSLed. for examPte. what sort of PrOPertIeS We need from a hash function In order to use It With a given StgnatUre scheme. and a number of “ece55ar” CPndtftonS have been found. Thts ted US tO ask whether there Is any stngte ProPetT, that IS S”MCte”f to Prwenf at, dangerous interactions. We recen#y showed that fhe anrwer is Probably no 141. What this mexx 16 that in CrfPtotog”. a5 In sG+euare engtneertng. we cannot exPect to Rnd a “s,,“er bullet” 171; there can be no general PrPPei-b, that Pre- “entS NV0 algorithms frOm t”teWXt”g and Mat 15 tltW tO be
  • 26. Of any PrWUCat use. In most real sttuattons. however. we Can eYPtlCltly SPeCtfY the PTODeTtteS we need: tyPIcal ProPertIes mlghf be that a function fts Corretatton-free Iwe can’t find x and Y such that flxt and WI agree tn too manv blt51 or IIIUtflPtt~ don-free Iwe Can’t find X. y, and L Such fhaf flx)f,“, = ftZtl. 3 the whole child development guide edition I Dec. 2004 LEGO® ©2004 The LEGO Group. All Rights Reserved. The content is made available for individual use and shall not be reproduced or edited without permission from The LEGO Group. The Whole Child Development Guide is grounded in recent research findings and has been developed by the LEGO Learning Institute in partnership with experts in the field.
  • 27. Author: Prof. Edith Ackermann, Contributors: Dr. Dorothy Singer (The Learning Relevance Grid and The Complete Discovery System) and Dr. Aaron Falbel. www.lego.com/parents 141 Part 4.: Early School Years Ages 4 - 8 Years ©2004 The LEGO Group. All Rights Reserved. The content is made available for individual use and shall not be reproduced or edited without permission from The LEGO Group. The Whole Child Development Guide is grounded in recent research findings and has been developed by the LEGO Learning Institute in partnership with experts in the field. Author: Prof. Edith Ackermann, Contributors: Dr. Dorothy Singer (The Learning Relevance Grid and The Complete Discovery System) and Dr. Aaron Falbel. www.lego.com/parents 143 Part 4.:
  • 28. Overview of Early School Years Ages 4-8 Years Me – Being Me ME - USING MY BODY Whereas the child’s physical-motor development during early childhood is marked by large growth spurts, during the early school years it is rather gradual and constant. This being said, between the ages of four and eight, a child’s improvement in coordination and skill is still amazing. So is the child’s perceptuo-motor integration, or ability to synchronize her body movements to the movements she sees, or hears, others performing, (so- called eye-hand coordination is a part of perceptuo-motor integration, and begins when children eyes can be guided to follow movements of their hands). The period between ages 4 and 8 is a time of expanded vigour and energy. It is also a time when the child learns to master her otherwise wild exuberance, and put it at the service of things he likes to do. As they enter their fi fth’s year, most children have enough mastery over their gross motor skills to be able to balance, hop, skip, run, and jump. And they have perfected the use of fi ne motor skills well enough to be able to reach,
  • 29. grasp, and manipulate objects. A four-year-old can eat and dress by herself. She combs her hair, washes her hands and brushes her teeth. She opens closets and drawers, and manipulates remote controls. She scribbles, cuts, and glues. In sum, four-year-olds have a fairly good dynamic balance when running and climbing, as well as a static balance, which allows them to stand on one foot. They have learned to project themselves accurately when jumping and hopping, or throwing and catching During the early school years, between the ages of 4 and 8, the child perfects both his agility and dexterity to gain a solid grip and better control over his body movements in space and time, and above all, in relation to others. By the time they reach their eighth birthday, most children readily engage in activities such as sawing, sewing, painting, or knitting. Seven-year-olds can use adult tools, such as hammers, saws, rakes, and shovels. They now ©2004 The LEGO Group. All Rights Reserved. The content is made available for individual use and shall not be reproduced or edited without permission from The LEGO Group. The Whole Child Development Guide is grounded in recent research findings and has been developed by the LEGO Learning Institute in partnership with experts in the field.
  • 30. Author: Prof. Edith Ackermann, Contributors: Dr. Dorothy Singer (The Learning Relevance Grid and The Complete Discovery System) and Dr. Aaron Falbel. www.lego.com/parents 144 manoeuvre a two-wheeled bike, and they are ready to skate, ski, or swim. They engage in many group activities, from soccer to gymnastics, from hockey to ballet, and they have become competent team players. In the later section, we shall look at how children, between the ages of 4 and 8, progressively refi ne their physical-motor abilities, which, in turn, opens the way to many new activities, fosters a growing sense of freedom and control, and new forms of relating to the world, self, and others. ACKNOWLEDGEMENTS The main sources for Me in this Part are: Anselmo, S, Franz, W. (1995). Early Childhood Development: Prenatal Through Age Eight. (2nd ed.). Englewood Cliffs, NJ: Prentice- Hall [First edition was published in 1985. New York: Merill / Macmillan]. Sanford, A.R. and Zelman, J.G. (1981) Learning accomplishment profi le. Winston Salem, NC: Kaplan.
  • 31. ME – KNOWING MYSELF The roots of a child’s a self-concept lies in infancy, and evolves through the many interactions the child has with her social environment. By their fourth birthday, most children have acquired a fairly good sense of themselves as distinct from others. They also have a budding sense of identity or self- invariance: the idea that some core aspects of self remain unchanged over time. One of the big breakthroughs, as children enter their preschool years, is the passage from a merely physical- and action-centric self-concept to a more psychological one. In other words, children develop a sense of self-worth, or self-esteem: the emotional, affective, moral, and intellectual facets of a child’s early self-concept. This, in turn, requires an understanding that the self is unique (distinct from other), stable (identity over time), and worth one’s own, and other people’s, consideration, and love. Self-esteem or self-worth emerges as the child learns to distinguish between an inner-me, or “agent,” that drives her actions, and an outer-me: a person’s physical attributes and /or actions. By developing a positive and accurate body image/self-concept, children build a reliable frame of reference—themselves—to help them
  • 32. act and move in space, as well as among other people. Body image, like self- awareness, provides an internal compass to help children orient and situate themselves in relation to others. ©2004 The LEGO Group. All Rights Reserved. The content is made available for individual use and shall not be reproduced or edited without permission from The LEGO Group. The Whole Child Development Guide is grounded in recent research findings and has been developed by the LEGO Learning Institute in partnership with experts in the field. Author: Prof. Edith Ackermann, Contributors: Dr. Dorothy Singer (The Learning Relevance Grid and The Complete Discovery System) and Dr. Aaron Falbel. www.lego.com/parents 145 Awareness of self-defi ning bodily functions includes sexual and gender awareness, as well as a sense of what’s inside the body, and what it means to be sick or in good health, sad or happy. Awareness of self, as a worthwhile, competent, and good person, includes both moral judgements and meta- cognitive skills, i.e. an increasing ability to gauge one’s own mental abilities,
  • 33. both cognitively and affectively. In this Part, we shall look at how 4–8-year-old children’s sexual and gender awareness, sense of self-worth, and views of their own competences, or meta-cognitive skills, evolve during early school years. Again, each child grows at his own pace, so that development stages and ages are no more than indicative of general trends. What’s more, self-development is not a neutral area! Children live with people who hold their own views on what a good person, or a true self, should be. This makes for great variability in ideals, which in turn informs how adults support and constrain their children. Us – Growing Together US - RELATING TO OTHERS Early school years mark huge progress in a child’s abilities to understand, communicate, and refl ect upon matters that govern and motivate social relations. Children gain greater control over their emotions, an increased self-awareness, and they learn to put their feelings, intentions, desires, and beliefs at work to consolidate their social ties, while preserving their identity. Between the ages of 4-8, a child’s ways of relating expand and become
  • 34. more fl exible. They change according to whom the child deals with, when the interaction takes place, and under which circumstances. So, for example, a 5-year-old may want to boss around a younger sibling, whine with Grandma, and argue with her teacher. Yet, as she becomes aware that moods can change over time, and that ambiences come with their particular sets of constraints and permissions, she may choose to give a hug to her little brother, cajole Grandma, and tease the teacher. By the end of this period, around age 8, most children have become competent and reliable partners, and collaborators. They have learned to master some of the trade-offs that growing in connection involve. More important, they have learned that even failed attempts at relating can be repaired, or compensated for: one could call this “conservation of relations.” ©2004 The LEGO Group. All Rights Reserved. The content is made available for individual use and shall not be reproduced or edited without permission from The LEGO Group. The Whole Child Development Guide is grounded in recent research findings and has been developed by the LEGO Learning Institute in partnership with experts in the field. Author: Prof. Edith Ackermann, Contributors: Dr. Dorothy Singer (The Learning Relevance Grid and The Complete
  • 35. Discovery System) and Dr. Aaron Falbel. www.lego.com/parents 146 A person’s emotions play a key role in how he relates to others. Emotions are like internal signals that prepare a person to cope with situations that, to him, are associated with fear, joy, or sadness. The problem with emotions, however, is that they take over, at least initially, forcing us to act in certain ways. Progressively however, the child learns to recognize and describe his own (and other people’s) emotions and starts to understand the behavioural consequences of certain emotional states. That’s when his initial urge to act out whatever he feels turns into a more mediated and fl exible palette of possible responses that the child then taps into as a means to relate better with others. In other words, as the child becomes aware of his feelings and intentions (and those of others), he increases his ability to negotiate and co- operate. He monitors and communicates what he feels, intends, desires, and believes, to regulate his exchanges and dealings with others. According to Erikson, a fi rst developmental breakthrough occurs during the “play age”: from about 3 1⁄2 to age 5. During it, the growing child
  • 36. learns: (1) to imagine and to broaden her skills through active play of all sorts, including fantasy (2) to co-operate with others (3) to lead as well as to follow. That’s when the child enters a new phase of psycho-social development called initiative. Initiative adds to autonomy a quality of following through on tasks for the sake of “getting to know more.” While bringing about obvious benefi ts, initiative also comes with its share of new challenges. Following through on things can be risky and solitary. It is thus not by chance that initiative coincides with the emergence of the “play age.” Pretend and role play, both of which peak at this stage, offer safe ground to explore some of the consequences that taking initiative entail. In other words, when the child is ready, developmentally speaking, to take the risks of initiative, she fi rst wants to explore those risks through joint make-believe activities. Later during the school years, 6- to 8-year-old children become ready to embark on yet another of Erikson’s stages of psycho-social development: They become industrious, which has a decisive effect on school life and on the later entrance into the world of work. Without industry, according to Erikson, children may suffer from a sentiment of inferiority. Children at this age become excited by projects such as building forts, sewing, and cooking,
  • 37. and…the harder the better! Let’s now look at how children, between the ages of 3 1/2 and 5, deal with the trade-offs that building initiative entail e.g., how do they face the risks of taking initiative while maintaining the benefi ts of being connected through consensual agreement? And as they become more involved in various endeavours and interests, let’s see how 6- to 8-year-olds become ©2004 The LEGO Group. All Rights Reserved. The content is made available for individual use and shall not be reproduced or edited without permission from The LEGO Group. The Whole Child Development Guide is grounded in recent research findings and has been developed by the LEGO Learning Institute in partnership with experts in the field. Author: Prof. Edith Ackermann, Contributors: Dr. Dorothy Singer (The Learning Relevance Grid and The Complete Discovery System) and Dr. Aaron Falbel. www.lego.com/parents 147 industrious, how they keep their creative spark and playful spontaneity while following through on their self-set tasks in order to succeed.
  • 38. The Feeling Peeling Game. To help children become aware of their feelings and, by the same token, understand how others feel, Smith’s “feeling peeling” game (fi ve years up) remain a good inspiration. Again, the game can be played in dyads, or in groups (Smith 1982). As in the previous stage, the idea is to ask questions that encourage children to think about the causes and consequences of various emotions. Emotions to be “peeled” at this age include: happy, angry, affection, afraid, and sad, and also embarrassed, ashamed, guilty. Questions that can be asked include: - What would you do when you are X? [e.g. afraid]. - What would you like to do when you are X….. - What would you like other people to do for you when you are X…. - What are some of the things that give you an afraid feeling? - How do you feel when someone is afraid of you? - What feeling is diffi cult to tell other people about? Note. This list is only a beginning of a large series of questions that may encourage children to explore their emotions and understand those of others. Imagine role-play scenarios in which can enact and play out some of the questions, taking on different roles. Put the same child in the role of the agent and the recipient. In role playing games, always respect a child’s desire not to disclose how
  • 39. she or he feels, and make sure the children understand that there is nothing wrong with having “negative” feelings, or even wanting to act them out. Help them understand, beyond fi rst impressions or reactions, some of the benefi ts of using one’s mind and heart to control initial drives. US - UNDERSTANDING OTHERS Early on, children tune into other people’s intentions, attitudes, and emotions, and as they grow older, they become increasingly aware of how they and others feel, act and think. They learn to understand and empathise with others, and to look at the world, including themselves, through their eyes. They learn to express, and refl ect on different people’s inner feelings and mental states. In other words, children build their own theories of other people’s, and creatures’, minds: from what they feel and think to what they are capable of and driven by. (Astington, J., Harris, P., and Olson, D., 1988). ©2004 The LEGO Group. All Rights Reserved. The content is made available for individual use and shall not be reproduced or edited without permission from The LEGO Group. The Whole Child Development Guide is grounded in recent research findings and has been developed by the LEGO Learning Institute in partnership with experts in the field.
  • 40. Author: Prof. Edith Ackermann, Contributors: Dr. Dorothy Singer (The Learning Relevance Grid and The Complete Discovery System) and Dr. Aaron Falbel. www.lego.com/parents 148 A child’s journey toward getting to know others, to understand what they want, feel, believe, and intend, is a lengthy one, which involves a two-fold ability: 1. to “de-centre,” or move away from oneself, and 2. to “re-centre,” or take on another’s view. The focus here is on how children, between the ages of 4 to 8, operate this shift away from themselves to build a sense of other (Schantz, 1975). It is worth noting that the apparently contradictory movements of getting to know oneself and moving away from self, toward other, are intricately related. Without self-control and self- awareness there can be no respect and understanding of others. Both competencies emerge and evolve together. Early school years are marked by a growing ability to understand not just that other people may think and feel differently, but what it is they may feel and think! During these years, children become able to empathize and
  • 41. adopt different perspectives. They learn to negotiate, and make sense of, other people’s expectations and intentions. The seventh year also marks the beginnings of Piaget’s stage of concrete operations. The child is now able to think about events that were previously performed through physical actions, and mentally reverse the direction of action and thought. She also understands that thoughts are different from actions, and appearances different from reality. A child’s ability to put herself in other people’s shoes or to feel what they feel, has deep repercussions in how she relates to, and understands, others. World – Making Sense of it All WORLD – EXPLORING AND INVESTIGATING Early school years are marked by a child’s expanding curiosity and mindful investigation. During this period, the child’s physical energy and intellectual vigour are at a peak and his natural exuberance is being channelled in the pursuit of many exciting, long lasting, and challenging projects. From a wonderer, one may say, the child becomes an explorer and experimenter. This, in turn, allows for many new wonders to pop-up, and be further explored. In this process, the child learns a great deal about himself and about the world in which she lives and grows.
  • 42. Children between the ages of 4 and 8 face a multitude of new experiences outside the confi nes of their homes. Provided the passage happens felicitously, the child’s curiosity and eagerness to learn develops even further. Not surprisingly, this is also a time when children like to take charge. They become true experts at fi guring things for themselves, and they excel at learning-by- doing. ©2004 The LEGO Group. All Rights Reserved. The content is made available for individual use and shall not be reproduced or edited without permission from The LEGO Group. The Whole Child Development Guide is grounded in recent research findings and has been developed by the LEGO Learning Institute in partnership with experts in the field. Author: Prof. Edith Ackermann, Contributors: Dr. Dorothy Singer (The Learning Relevance Grid and The Complete Discovery System) and Dr. Aaron Falbel. www.lego.com/parents 149 Needless to say, there are differences between the manners of inquiry and worldviews of a four and an eight-year-old. Typically, four- year-olds base their judgements on direct action and perception. They proceed by
  • 43. intelligent trial and error, often focusing on one variable at a time when trying to get a handle on a complex situation. A four-year-old’s worldview remains essentially “egocentric,” and their thinking is magical and animistic. Eight- year-olds, in contrast, engage in directed and systematic experimentation, and are able to compose with multiple variables when making decisions. Eight-year-olds’ thinking is reversible (i.e., they can mentally reverse the direction of thought, and action), which, in turn, impacts the ways they conceive of such categories as time, space, and causation. Their take on things has become more “objective,” less egocentric. The seventh year marks the big breakthrough with the beginnings of Piaget’s stage of concrete operations. The child now anticipates events that were previously acted out, and draws conclusions in her head. Besides reversibility, a benchmark of concrete operations is conservation: the understanding that objects or quantities remain the same—or invariant—despite a change in their physical appearance. In the later section, we shall look at how children between the ages of 4 and 8 examine, understand, and refl ect upon their actions, thus becoming increasingly good investigators and experimenters. Let us also look at how
  • 44. their worldviews evolve as they relentlessly try to fi gure out how things work through their hands-on exploration. More specifi cally, we shall look at children’s notion of time, causation, and space, as well as their abilities to conserve substance and quantities. WORLD - SEEKING LOGIC At fi rst, a child’s logic is a logic-in-action, and the fi rst categories that children establish are based on how objects, including people, resist or yield to their explorations. This section addresses how a child’s logical thinking, or “logico-mathematical” capabilities, evolves during his early school years. In other words, how does a 4- to 8-year-old child use what he has learned “in action” to bring some order and coherence into a world too bewildering and complex to be grasped? What forms of reasoning does he privilege at different ages? As in the previous section, there are striking differences between the forms of reasoning, or logic, of most four-year-olds and those of most eight-year- olds. Typically, a four-year-old’s thinking is pre-operational (Piaget 1960a, ©2004 The LEGO Group. All Rights Reserved. The content is made available for individual use and shall not
  • 45. be reproduced or edited without permission from The LEGO Group. The Whole Child Development Guide is grounded in recent research findings and has been developed by the LEGO Learning Institute in partnership with experts in the field. Author: Prof. Edith Ackermann, Contributors: Dr. Dorothy Singer (The Learning Relevance Grid and The Complete Discovery System) and Dr. Aaron Falbel. www.lego.com/parents 150 1960b, 1964), whereas eight-year-olds have acquired the ability to reason “logically.” They have reached the stage of what Piaget refers to as concrete operations (Piaget 1960a, 1960b, 1964). One of the characteristics of concrete operations, most relevant in this section, is reversibility: the ability to mentally reverse the direction of thought and action. So, for example, a 6-year-old will fi nd it obvious (a “logical necessity,” in Piaget’s words) that if a number can be added to another it can also be subtracted, or that if an object moves from point A to B to C, then it should be able to return from C to B to A. As the child begins to reason in ways that are reversible a whole structure of interrelated logico-mathematical capabilities, or operations,
  • 46. appears: The child now understands such relations as transitivity, inclusion, and identity, and she uses her newly acquired logico-mathematical power to infer many otherwise invisible patterns and rules, and to make logical deductions. The transition from pre-operational thinking to concrete operational thinking occurs between the ages of six and seven, and is usually completed by the time the child is eight years old. In the later section, we shall look into the lengthy journey that brings a child from pre-logical to logical thinking. We shall focus on how 4–8-year- olds come to understand basic mathematical ideas, such as quantifi cation, elementary number theory, and their handling of logical operations, such as classifi cations and seriatims. To explain the development of logic in the early school years, we refer mainly to Piaget, whose ideas about children’s thinking during early school years have revolutionized the fi eld of psychology and education. To this day, Piaget’s contribution to how children think is unique and unsurpassed (Piaget 1960a, 1960b, 1964, Piaget and Inhelder, 1969). Creations – Realising Visions
  • 47. CREATIONS – IMAGINING More than logic itself, imagination is one of the highest mental achievements of homo sapiens. It allows the emergence of new ideas and fosters innovation. To imagine something new requires that one grab a hold of what could be instead of merely representing what is. It requires that one picture what’s not. ©2004 The LEGO Group. All Rights Reserved. The content is made available for individual use and shall not be reproduced or edited without permission from The LEGO Group. The Whole Child Development Guide is grounded in recent research findings and has been developed by the LEGO Learning Institute in partnership with experts in the field. Author: Prof. Edith Ackermann, Contributors: Dr. Dorothy Singer (The Learning Relevance Grid and The Complete Discovery System) and Dr. Aaron Falbel. www.lego.com/parents 151 Not surprisingly, then, it takes the emergence of what psychologists call “the symbolic function,” around the age of 2 for children to be able to imagine alternatives in their heads. Only then, coinciding with the emergence of
  • 48. speech and thinking, will children start to evoke and revisit past experiences or events and, more to the point, add a new twist or change the ending in some way. Imagination proper sets in when, beyond merely creating variations in the absence of a model, the child starts to produce fi ctional scenes and invents scenarios that don’t exist. Early manifestations of human imagination can be seen in a child’s fantasy or pretend play, as well as in her willingness to invent and converse with imaginary companions. They appear in her budding sense of humour and abilities to tease and joke. Humour can be thought of as a subset of make- believe and play (McGhee, 1984): an intellectual play with ideas or words, based upon appreciation of logical displacements and incongruities. What characterizes all of the above activities is suspension of disbelief rather than a quest for truth At the beginning of early school years (between the ages of 4 and 6), a child’s imagination tends to run wild, while, at the same time, becoming ever more sophisticated as she perfects her abilities to incorporate other people in his pretend play, sharpens his sense of humour, and cultivates his ways of teasing. Towards the end of the period (between the ages of 6 and 8), the child’s
  • 49. imagination adapts itself to fi t the purpose of specifi c endeavours. Many factors contribute to this “domestication” of early childhood imagination, not the least of which is children’s own desire, as they grow older, to put their wildest thoughts at the service of realisable undertakings. School too often contributes to the trimming of imagination if children’s creative impulse is downplayed to the benefi t of her rational mind. As they reach their eighth birthday, most children now use fi ction, pretence, and jokes to acquaint themselves with otherwise hidden thoughts, and to release emotional tensions without hurting the feelings of others. The child’s imagination is now more directed and ruled: Her abilities to fantasize and pretend become more “civilized,” her mental exuberance contained, and her abilities to play with words and incongruities less idiosyncratic. This being said, her capacity to imagine will prevail throughout adult life. In the next section, we shall look into the development of a 4- to 8-year-old child’s creative thinking through the lens of her pretend play as well as her ability to produce and appreciate jokes, word puns, and other poetic ”incongruities.” ©2004 The LEGO Group. All Rights Reserved.
  • 50. The content is made available for individual use and shall not be reproduced or edited without permission from The LEGO Group. The Whole Child Development Guide is grounded in recent research findings and has been developed by the LEGO Learning Institute in partnership with experts in the field. Author: Prof. Edith Ackermann, Contributors: Dr. Dorothy Singer (The Learning Relevance Grid and The Complete Discovery System) and Dr. Aaron Falbel. www.lego.com/parents 152 ACKNOWLEDGEMENTS The main sources for Creations in this Part are: Anselmo, S, Franz, W. (1995). Early Childhood Development: Prenatal Through Age Eight. (2nd Ed.). Englewood Cliffs, NJ: Prentice- Hall [First edition was published in 1985. New York: Merill/Macmillan]. McGhee, P. (1979) Humor: its origin and development. San Francisco: Freeman & Company. CREATIONS – ENACTING AND CREATING Children not only make up things in their heads, or fantasize; they also make things, or give form, or expression, to their inner most feelings and ideas. In other words, children bring to life their fantasies to make their dreams come true! Children speak their minds in many ways, and they use a
  • 51. variety of media: children speak in gestures and in voice, in pictures and in words, picking whichever medium conveys their ideas the best. Children also combine several media within a single production. Through their personal and collective creations, children, like artists, bring imagination into being…and they do so by design! Unlike scientists, a child’s creative expression is less about building models and representations of existing realities, so-called objective truths, than it is about exploring possibilities, often possibilities within i.e., re-digesting or reverberating deeply felt human experience. While both the artist and the scientist seek to capture deep hidden truths, the fi rst uses language to inspire and evoke, and the second to analyze and validate. In other words, creative expression is the visible face of imagination at work! This section speaks to the importance of creative expression as a source of a child’s personal and intellectual growth. Of particular interest here is the exciting and lengthy path that brings early school-age children to becoming literate in the sense of becoming acquainted with, and fl uent in, the usage of available cultural tools as means of self-expression. We purposely defi ne literacy in the broadest possible sense to mean the ability to
  • 52. make and derive meaning in any symbolic, expressive, or artistic medium. Children are born into a world of signs, symbols and human- made artefacts. Before long they appropriate these tools and they start making their own original contributions. From speech to writing, from drawing to playing the fl ute, from taking a picture to building a sand castle, children learn to say it, to freeze it, and to refi ne and edit their expressions. They do so across media and within the constraints proper to each medium. Most important, children ©2004 The LEGO Group. All Rights Reserved. The content is made available for individual use and shall not be reproduced or edited without permission from The LEGO Group. The Whole Child Development Guide is grounded in recent research findings and has been developed by the LEGO Learning Institute in partnership with experts in the field. Author: Prof. Edith Ackermann, Contributors: Dr. Dorothy Singer (The Learning Relevance Grid and The Complete Discovery System) and Dr. Aaron Falbel. www.lego.com/parents 153 know how to use the progress they make in one language as a
  • 53. lever to enrich their expressiveness in other languages or media. As they reach their fourth birthday, children usually speak, gesture, and they learn to draw and write. At this age, children also start to “read,” i.e. make sense of other people’s traces and scribbles. Again, as soon as they talk, they become interested in writing and reading. As they sing and listen to music, they like to record rhythms and sounds, and to “draw” the noises and rhythms they hear on a sheet of paper. Later in their lives, our creative youngsters will continue express themselves creatively through drama, poetry, painting, literature, design, and music, to name just a few possibilities. Let us look at how early school-age children learn to express themselves creatively, using “a hundred languages” (Malaguzzi, 1987), and how they become literate in the broad sense defi ned above. The ages below are indicative of general developmental trends. Especially when it comes to literacy, the ages at which children are expected to master the conventions of written language vary a great deal, not only among individuals but among different countries or cultures as well. ©2004 The LEGO Group. All Rights Reserved.
  • 54. The content is made available for individual use and shall not be reproduced or edited without permission from The LEGO Group. The Whole Child Development Guide is grounded in recent research findings and has been developed by the LEGO Learning Institute in partnership with experts in the field. Author: Prof. Edith Ackermann, Contributors: Dr. Dorothy Singer (The Learning Relevance Grid and The Complete Discovery System) and Dr. Aaron Falbel. www.lego.com/parents ©2004 The LEGO Group. All Rights Reserved. The content is made available for individual use and shall not be reproduced or edited without permission from The LEGO Group. The Whole Child Development Guide is grounded in recent research findings and has been developed by the LEGO Learning Institute in partnership with experts in the field. Author: Prof. Edith Ackermann, Contributors: Dr. Dorothy Singer (The Learning Relevance Grid and The Complete Discovery System) and Dr. Aaron Falbel. www.lego.com/parents 155 Part 4.: Early School Years by Age Year
  • 55. 4-5 Years Me – Being Me ME - USING MY BODY Kick the Ball & Keep the Beat! Four- to fi ve-year-olds are vigorous and energetic: They love to play and, when given a chance, they become exuberant and “go wild.” At the same time, children of this age also spend hours channelling their energy—i.e., perfecting their physical-motoric abilities—by getting a better handle on all kinds of objects, such as balls, bikes, swings, or seesaws. Like their younger counterparts, 4–5-year-olds still spend hours on the playground, using swings, slides, and climbing-structures. Yet, unlike younger children, they have become amazingly skilled and autonomous users. Four- to fi ve-year-olds like to keep in the fl ow (and in the beat) of things, through dance and rhythm, and they learn to synchronize their body movements and positions with that of others, using visual clues. They march at a drumbeat, and play musical chairs, or “statues” (a person takes a position, and other imitate). When playing ball, they work hard at refi ning their kicking and catching techniques, and they become truly expert tricycle riders. As mentioned before, activities like kicking a ball or riding a
  • 56. bike are not just a matter of gross-motor skills. They also involve a great deal of dexterity, a strong, secure grip, a focused attention, and body awareness, as well as a good sense of rhythm and balance. COMPETENCIES: What does the 4-5 year-old naturally strive to learn? The main areas of change, between the ages of 4 and 5 are an improved sense of balance (both static and dynamic), as well as an increased perceptual-motor integration i.e. being able to produce or imitate a gesture one sees someone else doing (sometimes referred to as eye-hand coordination), a greater body awareness (i.e. body concept, laterality or right-left discrimination, and ©2004 The LEGO Group. All Rights Reserved. The content is made available for individual use and shall not be reproduced or edited without permission from The LEGO Group. The Whole Child Development Guide is grounded in recent research findings and has been developed by the LEGO Learning Institute in partnership with experts in the field. Author: Prof. Edith Ackermann, Contributors: Dr. Dorothy Singer (The Learning Relevance Grid and The Complete Discovery System) and Dr. Aaron Falbel. www.lego.com/parents
  • 57. 156 directionality), and temporal-perceptual awareness, or sense of time and rhythm. All these areas come into play as the child exercises, and refi ne his skills. All contribute to optimize the performances. As an example, when playing ball, 4-5 years become quite adept at throwing and catching, and when throwing, they turn the non-dominant shoulder toward the target and steps with opposition as they throw. They catch the ball away from the body, in the hands with palms facing each other (Anselmo and Franz, 1995. p. 384). And when playing inside the house, 4–5-year-olds like to scribble, draw, cut, and glue. They still use broad movements with their fi ngers, arms, and hands. Yet, they produce recognizable shapes in their drawings, which they love to present as gifts to family members. MANIFESTATION: What actions will the child do to attain the competencies? Four- to fi ve-year-olds can walk heel-to-toe for four or more steps along a line and stand on one foot for fi ve seconds. On the playground, they can get themselves started on swings, walk on a beam, climb ladders
  • 58. and slide down slides, without assistance. And since moms and dads are less needed on the playground, they spend more time playing with other children. At this age, children also become eager and skilled tricycle riders. Their hopping, jumping, and kicking skills improve. Walking downstairs is now mastered, without the help of an adult. Four- to fi ve-year-olds eat much more neatly than 3-year-olds. They start using a fork, spoon, and, if allowed, a knife. They can carry a cup fi lled with water from the kitchen sink to the table, without spilling. As they approach their 5th birthday, most children are able to dress themselves. They put on their socks, and open and close buttons and zippers. In kindergarten, 4–5-year-olds like to engage in all kinds of arts-and-crafts activities: They cut and fold paper; glue pieces together, hammer pegs into holes, draw and scribble, and assemble puzzles. They also like to bake, to make clay fi gures, and to build sand castles. All these activities greatly facilitate a child’s eye-hand coordination. Four year-old children learn about the left and right sides of their bodies (laterality), and about the body’s position and heading (directionality and orientation). Yet, many children of this age still have diffi culties with tasks that require left-right discriminations.
  • 59. ©2004 The LEGO Group. All Rights Reserved. The content is made available for individual use and shall not be reproduced or edited without permission from The LEGO Group. The Whole Child Development Guide is grounded in recent research findings and has been developed by the LEGO Learning Institute in partnership with experts in the field. Author: Prof. Edith Ackermann, Contributors: Dr. Dorothy Singer (The Learning Relevance Grid and The Complete Discovery System) and Dr. Aaron Falbel. www.lego.com/parents 157 SUPPORT: What can care-givers do to support this natural development? Let your kid play, and play with her. Play ball: You can now use smaller light soccer-sized balls. Draw and paint: Finger paints are great at this age. Dance with her. She loves to march in a parade. Play music, she enjoy beats and rhythms. Go for walks, to the pool, to the playground. Indoors, let your child play with age-appropriate puzzles, and offer her a big box of blocks with which to build models and castles. If you are an educator, don’t drill! Movement, balance, and
  • 60. rhythm can be explored through play. Invite children to discover for themselves the ways they want to move and stretch, and how far they want to “push” themselves. Remember: “our bodies move in space, in time, with force, and with fl ow (…) There is never a wrong move, but certain moves feel better” (Gilliom, 1970. p. 6). Educators may imagine activities to broaden the palette of movements made available to the children (Gilliom, 1970. p. 6). Gilliom proposes four dimensions to be considered by parents and educators. 1. Where to move (space), which involves an understanding of self-space. 2. What to move (body awareness), which requires awareness of body parts and relations between body / objects to be manoeuvred / space. 3. How to move? (force, balance). Involves creating / absorbing force (gravity), transferring force (rocking, rolling, sliding) and transferring weight (step on beams). 4. How to move in a smoother way (time, fl ow). Involves changing rhythm, speed, pulse, and beat, and feel what it does. For each dimension, many fun activities can be imagined (for inspiration, see movement chart in Gilliom, 1970. p.8., and Anselmo and
  • 61. Franz, 1995. p. 388). In all these activities, care-givers assume a role as play partners. If done in a joyful way, this will lay the foundation for a child’s positive self- concept and pleasant feelings toward such activities. ME – KNOWING MYSELF Introspective Fours: Building an Inner Sense of Self. The fi fth year marks a new phase in a child’s growing sense of self. Three main areas of progress include: a budding sense of self-esteem, or self-worth; an early form of meta-cognitive awareness, or self-knowledge; and the ability to distinguish between mind and body, when speaking about self and others. ©2004 The LEGO Group. All Rights Reserved. The content is made available for individual use and shall not be reproduced or edited without permission from The LEGO Group. The Whole Child Development Guide is grounded in recent research findings and has been developed by the LEGO Learning Institute in partnership with experts in the field. Author: Prof. Edith Ackermann, Contributors: Dr. Dorothy Singer (The Learning Relevance Grid and The Complete Discovery System) and Dr. Aaron Falbel. www.lego.com/parents 158
  • 62. Four year-olds develop an early sense of self beyond mere physical attributes, observable acts, and concrete events. In other words, they overcome earlier forms of “trivial behaviourism” by disentangling some of the intricacies between what a person does, shows, or says in terms of her behaviour or appearance, and what she thinks, feels, or intends. This, not surprisingly, leads to new forms self-evaluation and self-knowledge, as well as new forms of moral “judgements”. While paying closer attention to the “hidden” aspects of self, 4-5 years old children still have problems with egocentrism, and they do not always recognize that a person’s inner states, thoughts, intentions or feelings, can or should be different from their outer expression (Selman, 1980). Four- to fi ve-year-old children’s body awareness and self- concept are partly expressed in, and informed by, their understanding of sexuality, gender, as well as by their views of what’s inside their body, and what makes a person ill or well, sad or happy, and bad or good. As they reach their 5th birthday, most children have developed a fairly accurate sense of who they are and what they think they are able (or unable) to do. This type of self-knowledge includes what are commonly called meta-
  • 63. cognitive skills — an important component of more advanced refl ection, learning, and introspection. COMPETENCIES: What does the 4-5-year-old naturally strive to learn? Like the “curious threes”, 4-5-year-old children still wonder: ‘Who am I? Where do I come from? Where do I go?’ They also still puzzle over how babies are made, what’s in their bodies, why people die, and what will become of them after death. Yet, as they try to make sense of these questions, 4-5-year- olds develop their own views and attitudes about their origins, well-being or health, and their strengths and weaknesses as persons, and as learners. Most signifi cant at this age, a person’s self begins to be seen as a mix of action and intents, involving both body and mind. So, for example, 4-5-year- old children not only understand themselves as being a boy or a girl, tall or short, or blond or brown, but they begin to develop a sense who they are, as persons, beyond being gendered, sized, or coloured. A 4-5-year-old’s grasp of what happens inside her body and what it means to be healthy or sick are still rather mechanical and animistic. So for example, children can tell you where their brain, heart or stomach are located, yet
  • 64. ©2004 The LEGO Group. All Rights Reserved. The content is made available for individual use and shall not be reproduced or edited without permission from The LEGO Group. The Whole Child Development Guide is grounded in recent research findings and has been developed by the LEGO Learning Institute in partnership with experts in the field. Author: Prof. Edith Ackermann, Contributors: Dr. Dorothy Singer (The Learning Relevance Grid and The Complete Discovery System) and Dr. Aaron Falbel. www.lego.com/parents 159 each organ still has a single function, and the inter-relations between them remain unclear. A nice example by Selman shows that, at this age, children “often report that their mouths tell their hand what to do or that their ideas come from their tongues” (Selman, 1980. p.176). When sick, 4–5-year-olds tend to blame either outside events (external causes), or themselves, i.e. their bad behaviour (immanent justice). Their views of how they came to be remain animistic or mechanical: either babies are made, like dolls on an assembly line, or, if told that babies grow in mom’s
  • 65. belly, 4-5-year-olds will assign human-like qualities to the sperm/or egg (Bernstein and Cowan, 1981). They will imagine all those tiny little people inside mom’s belly, helping to make the baby and bring it out. MANIFESTATION: What actions will the child do to attain these competencies? Four- to fi ve-year old children’s awareness of self transcends physical appearances (pretty, small, girl, boy) to include “mindsets” (witty, nice, girly, boyish), and the child starts to distinguish between feelings and actions. He understands that while certain emotional reactions may be unwanted and hard to control, our actions in reaction to inner emotions can, and maybe should, be controlled. He doesn’t always understand why controlling impulses may be a good thing beyond “Mom won’t like it” or “it could make things worse”. But, that’s a start! Four-year-olds’ conceptions of sickness, contagion, and causes of death are still “magico- phenomenist”, to use Piaget’s term. While many four-year-olds understand that sickness occurs through contagion, and contagion through proximity, proximity itself remains this magical thing…some mystical, bad infl uence. Four- to fi ve-year-olds begin to develop a sense of fair play
  • 66. and are aware of rules, although at this age, they may change them. They like board games where there are rules. They like to be challenged, but at this age, they do not always handle competition well. SUPPORT: What can caregivers do to support this natural development? Help your child distinguish between feelings and actions, as well as between actions and consequences. If your child is angry, or wants to hit her little ©2004 The LEGO Group. All Rights Reserved. The content is made available for individual use and shall not be reproduced or edited without permission from The LEGO Group. The Whole Child Development Guide is grounded in recent research findings and has been developed by the LEGO Learning Institute in partnership with experts in the field. Author: Prof. Edith Ackermann, Contributors: Dr. Dorothy Singer (The Learning Relevance Grid and The Complete Discovery System) and Dr. Aaron Falbel. www.lego.com/parents 160 brother, encourage her to tell what’s wrong. Help her work out unspeakable
  • 67. feelings through play. Soon enough, she will understand that getting upset and acting impulsively can be separated and that sometimes it is worth doing so. Help your child accept his physical characteristics as well as his similarities to, and differences from, others. In this regard, games like “me and my shadow” and “body drawings” are still relevant at this age (projection of kids’ shadows against a wall, and asking kids to draw contours of their bodies on big sheets of paper). Yet, at this age, expand the game by telling stories about different people’s ways of being, or better, have the children tell their stories, as a way to focus on psychological diversity, and moral issues. While acknowledging diversity in ways of being, and of relating, avoid gender or racial stereotyping. Help your child understand that people come in many shades and shapes, that diversity is rich, and that good and bad are colour blind. A four-year-old’s sex education comes in response to questions about how babies are born, and where she was before she was born. While straightforward answers are welcome, there is no need to go into any more anatomical details than the child asks for.
  • 68. Us – Growing Together US - RELATING TO OTHERS Play and Initiative - Learning to do… and let do! According to Erikson, as soon as basic trust is established, a child becomes ready and eager to discover the thrills and threats of autonomy. And as autonomy sets in, most 3–4-year- olds become very energetic, curious, and eager to participate in virtually any activity. This is when pre-schoolers start to ask a hundred questions. This is also when they embark on Erikson’s next socio-psychological stage, which he referred to as building initiative. Erikson’s theory of psycho-social development states that, starting at age 3 1/2 and up to age 5, children are faced with a new challenge. In his words, they learn to take initiative, or they will suffer the effects of guilt! As mentioned before, initiative adds to autonomy a quality of taking on tasks for the mere pleasure of “following through on things” and “seeing where it takes us” that, in Erikson’s eyes, needs to be nurtured. ©2004 The LEGO Group. All Rights Reserved. The content is made available for individual use and shall not be reproduced or edited without permission from The LEGO Group. The Whole Child Development Guide is grounded in recent
  • 69. research findings and has been developed by the LEGO Learning Institute in partnership with experts in the field. Author: Prof. Edith Ackermann, Contributors: Dr. Dorothy Singer (The Learning Relevance Grid and The Complete Discovery System) and Dr. Aaron Falbel. www.lego.com/parents 161 Children’s sense of initiative is validated when adults respect and encourage their interests, and when they genuinely respond to, and encourage, the child to pursue their frequent questions, and try things out for themselves. If initiative is not encouraged, children may ultimately lose their willingness and ability to do what it takes to realise their own dreams. They shy off from the healthy quest for achievement, or realisation, in future endeavours. COMPETENCIES: What does the 4-year-old naturally strive to learn? Four-year-olds are vigorous, imaginative, and playful. They are eager to learn, play, and work with others. They listen to their teachers, and they participate in conversations. They are curious and easily engaged in the excitements of new undertakings. Their initiative extends to include social relations with
  • 70. adults outside the family and with other children. Four-year-olds have become pretty good at controlling their emotions, and are increasingly aware of basic human feelings, such as sadness and anger. They can recognize and describe feelings associated with liking, surprise, disgust, boredom, loneliness, and curiosity. Children, at this age, also start to understand the connections between emotions and social behaviour, and inner thoughts, feelings or intents, their expression, and consequences on others. Four-year-olds like to engage in pretend play with peers. They participate in group play, and they form privileged relations with individual friends. They become better at sharing, at losing in competitive situations, and at negotiating interactions with others. They show less frustration around play equipment and toys, and they are more patient when they have to wait their turn. This being said, the lengthy path that leads a child to gracefully manage her emotions and feelings in social transactions is only starts at this age. MANIFESTATION: What actions will the child do to attain these competencies? Four-year-olds are usually very sociable, both in play situations and in
  • 71. everyday activities: They like to please and are friendly to adults and peers. They begin to show empathy, and talk about their feelings. Four-year-olds participate in conversations and care to be listened to. They like to be taken seriously. They become better at negotiating peer-confl icts and can follow simple rules. ©2004 The LEGO Group. All Rights Reserved. The content is made available for individual use and shall not be reproduced or edited without permission from The LEGO Group. The Whole Child Development Guide is grounded in recent research findings and has been developed by the LEGO Learning Institute in partnership with experts in the field. Author: Prof. Edith Ackermann, Contributors: Dr. Dorothy Singer (The Learning Relevance Grid and The Complete Discovery System) and Dr. Aaron Falbel. www.lego.com/parents 162 Four-year-olds have a wide range of “ways of being” at their disposal, which they use according to circumstances: They cajole and cuddle, but they also tease and persuade. In their play, they negotiate ever more complicated plots, and they cooperate and help each other. This being said,
  • 72. they may still boss around younger siblings, or try to get their way through whining and screaming. Many children of this age begin to enjoy “follow the leader” games. They play catch with each other, and some start collecting items and sharing those items, or swapping them. They begin to play board games, in which they learn to take turns and cooperate. SUPPORT: What can caregivers do to support this natural development? Four-year-olds are full of life. Yet, unbridled energy and exuberance can sometime result in negative feelings, destructive acts, and manipulation. That’s when adults can come in handy to help them channel their surplus of energy in positive ways. And the best ways to help is to do so non-intrusively. So if your 4-year-old withdraws, fears something that can’t possibly harm him, or goes overboard and starts harming others, make sure you guide him in ways that do not squash his initiative but rather channel it in more positive ways. Don’t just say “No.” Say, “If you wish to do that, here is a way you can do it safely or non-destructively.” For example, if your child climbs on the dinner table, which genuinely annoys
  • 73. you, don’t hesitate to tell her, “This place is for eating, not for climbing.” Offer her alternatives: “You can either sit here and draw or have a snack, or you go climb outside in the yard.” You can also give your child time for a graceful closure: “You may climb down from the table yourself. Take your time. But no climbing up again, after that!” Four-year-olds like to be taken seriously. Create scenarios around cooking, or fi xing things, where the child can play with these objects and pretend to be the competent person who saves the day! Children love to be helpful, and if they can’t always participate and help out in real activities, fantasy activities may be almost as thrilling and fulfi lling. Object-mediated turn-taking games, such as playing ball, as well as symbolic (or fantasy) turn taking, such as role-play, “follow the leader” games (in which the roles get switched) are much appreciated at this age. Through ©2004 The LEGO Group. All Rights Reserved. The content is made available for individual use and shall not be reproduced or edited without permission from The LEGO Group. The Whole Child Development Guide is grounded in recent research findings and has been developed by the LEGO Learning Institute in partnership with experts in the field.
  • 74. Author: Prof. Edith Ackermann, Contributors: Dr. Dorothy Singer (The Learning Relevance Grid and The Complete Discovery System) and Dr. Aaron Falbel. www.lego.com/parents 163 playing ball, children learn the benefi ts of sharing, and taking turns. Through role and pretend play, children explore how it feels to be another character, and learn how to negotiate rules to play “fair” in many intriguing social scenarios. US - UNDERSTANDING OTHERS Putting on Different Hats. In their fi fth year, children begin to understand that other people may feel and think differently than they do, and they become able, at least in concrete situations, such as joint pretend and role play, to shift position, in their mind, between their own and other people’s views, or perspectives. “The ability to imagine being another person with intentions and feelings that are different from one’s own is surely important evidence for children’s growing understanding of others—evidence that parallels the signs of children’s abilities to deceive” (Dunn, 1991, p. 105). At this age, children “do not (just) understand an emotional
  • 75. state, such as sadness or shame, simply by focussing on the way that the emotion is expressed, nor by noting the diverse situations that provoke an emotions. Rather, they identify the mental perspective that someone adopts with respect to those various situations (Harris, 1989. p 81). The child interprets another person’s ways of being as a coherent set of feelings, intentions, desires, beliefs, and thoughts that transcend specifi c contexts. COMPETENCIES: What does the 4-year-old naturally strive to learn? As they reach their fourth birthday, most children pretty much know what other people expect from them, and they can communicate what they want. Starting in the middle of the fourth year, however, a whole new range of abilities emerges. Children learn to infl uence others using persuasion, deception, or humour. They can take on multiple roles or voices, at least in their play, and they learn that a person’s interests, beliefs, and intentions can change over time and according to circumstances, while, at the same time, maintaining a consistency or integrity over time. “From three years onwards, the child can attribute to others thoughts and feelings that are different to her own. This is an important intellectual and
  • 76. conceptual leap.” (Karmiloff-Smith 1994, p. 224). And starting at age 4, there is yet another leap, which Astington qualifi es as a true watershed leading to a whole new range of abilities (Astington, 1991, p. 159). So, for example, when speaking of themselves, and others, 4-5 year-old spontaneously refer ©2004 The LEGO Group. All Rights Reserved. The content is made available for individual use and shall not be reproduced or edited without permission from The LEGO Group. The Whole Child Development Guide is grounded in recent research findings and has been developed by the LEGO Learning Institute in partnership with experts in the field. Author: Prof. Edith Ackermann, Contributors: Dr. Dorothy Singer (The Learning Relevance Grid and The Complete Discovery System) and Dr. Aaron Falbel. www.lego.com/parents 164 to a whole array of inner feelings, such as sadness, happiness, pride, guilt and shame, and they evoke mental states and capabilities, such as believing, knowing, remembering, and forgetting. In Astington’s view, there are many experimental tasks that 3- year-olds
  • 77. cannot do and that 4 and 5-year-olds can do (Astington, 1991, p. 159). The tasks Astington refers to involve the understanding of another person’s false beliefs, and the ability to distinguish between appearance and reality. While many researchers in the theories of mind tradition claim a major breakthrough takes place at the age of 4, many 4-year-olds still have diffi culties in attributing false beliefs to others, and/or to distinguish between appearance and reality. In the light of this, the so-called “false belief” experiments are discussed in the next section (5-6 years). MANIFESTATION: What actions will the child do to attain the competencies? In their pretend play, 4-year-olds engage in elaborate talk about who’s being/ doing what, and how each player should act, and what they should say and do, in order to respect the personal traits of the character, or part. Children also invent many complex scenarios. Multiple characters are used. More feelings are expressed in their play. Four-year-olds begin to recognize the nuances of complex social emotions, like sadness, joy, loneliness, embarrassment, shame, or guilt. So, for example, a 4-year-old may describe sadness as “there are tears in your heart”. In
  • 78. their narratives, children begin to address the social or personal causes and behavioural consequences of a person’s inner feelings (Dunn, Brown, Beardsall, 1990). More impressive, as they reach their fi fth birthday, many children begin to grasp that people may have mixed feeling about things (Harris, 1989). They now show genuine remorse when they hurt or offend others, entailing again that they can feel what others are feeling. In general, at this age, children become better at sharing, cooperating, and helping each other. They play follow-the-leader types of games. They begin to play board games where they need to take turns and cooperate. All this requires an accurate understanding of other people’s mindsets. SUPPORT: What can caregivers do to support this natural development? ©2004 The LEGO Group. All Rights Reserved. The content is made available for individual use and shall not be reproduced or edited without permission from The LEGO Group. The Whole Child Development Guide is grounded in recent research findings and has been developed by the LEGO Learning Institute in partnership with experts in the field. Author: Prof. Edith Ackermann, Contributors: Dr. Dorothy Singer (The Learning Relevance Grid and The Complete Discovery System) and Dr. Aaron Falbel.
  • 79. www.lego.com/parents 165 Show empathy for your child, and he will learn to empathise with you and others. You may encourage a 4-year-old to help care for pets, or even take care of a younger sibling, with supervision, of course. Four- year-olds love being trusted to care for others after they have shown they know how to be gentle. Let your child to play with other children. And, every now and then, be a part in your child’s pretend and role-playing activity (if invited to do so!). This will help her feel how different people, of different ages and walks of life, negotiate play. Help her express her feelings through play, and imagine scenarios in which the child is encouraged to take on multiple roles and voices, i.e. switch role, say from mama to baby, from big bad bully to poor little puppy. This is important to help a child “feel for” what others may feel. Pretend play offers a safe terrain for such explorations. Four-year-olds love to listen to stories and they start to pretend- read and write. Show them, tell them and let them show-and-tell. Play verbal variants
  • 80. of peek-a-boo, ‘Ride-a-Cock-Horse’, ‘This-is-the-Way-the- Ladies-Ride’. If your child shows interest, try board games, where he learns to take turns and cooperate. Help him be a good loser and respect players who may do better than him. In short, encourage any activities that help your child de-centre (i.e. see his partner’s point of view) while not giving up his stance. Both are needed to understand other. World – Making Sense of it All WORLD – EXPLORING AND INVESTIGATING From Wonders to Inquiries. Four-year-olds are curious about how things work and about how people act and behave. They wonder about the passage of time and about how things change over time. They puzzle about how the trajectories of moving objects are coordinated in time and space. Four year-olds hold their own views of how things come about and impact one another, and of why things look/act the way they do. They develop their own intuitions about how people differ from things, and how people and things originate, grow, age or erode, and dissipate. Children at this age like to discover things for themselves and to fi gure things out through hands-on experimentation. Some children will spend hours taking objects apart and putting them back together. Others may
  • 81. hesitate to break things apart but will vary their ways of interacting with things as a ©2004 The LEGO Group. All Rights Reserved. The content is made available for individual use and shall not be reproduced or edited without permission from The LEGO Group. The Whole Child Development Guide is grounded in recent research findings and has been developed by the LEGO Learning Institute in partnership with experts in the field. Author: Prof. Edith Ackermann, Contributors: Dr. Dorothy Singer (The Learning Relevance Grid and The Complete Discovery System) and Dr. Aaron Falbel. www.lego.com/parents 166 way to discover how they react. Others like to re-confi gure a same object, or collection of objects, so that it serves many purposes. In all cases, initial forms of trial and error (messing about) lead the way to more directed forms of exploration (fi nding out). In this process, the child learns a great deal about the world. Four-year-olds have their own views of what causes things to happen, in which order, and why. They develop their own intuitions about how things, or
  • 82. people, evolve over time (also called “diachronic thinking”) and how they move about in and confi gure space (referred to in the literature as topological and geometric relations). These views, we shall see, remain essentially “egocentric.” COMPETENCIES: What does a 4-year-old naturally strive to learn? Four-year-olds like to take on tough tasks, and they now pursue their interests, even when interrupted, over fairly long periods of time. They like to be taken seriously in their attempts. This striving for initiative is synonymous with going at things hands on and heads in, which serves them well in many respects. Four-year-olds excel in the art of intelligent “messing about,” which is none other than their own privileged means to fi guring out how things work. A child’s understanding of causality increases a great deal during this period, as she now predicts outcomes of actions before they occur. At the same time, her conceptions of how things come about and impact one another are still animistic. The child endows many things, especially things that move funnily, with people-like qualities, and her outlook is more “magical” than “logical.” So, for example, four-year-olds may explain the
  • 83. origin of lakes as being caused by a giant who made big holes with his footsteps, which were then fi lled by the rain. MANIFESTATION: What actions will the child do to attain these competencies? Four-year-old children are curious and eager to learn: They ask a hundred questions that leave many adults perplexed: “Where does the sun go at night? Where does the moon go during the day? What makes the rain? How do airplanes fl y?” More than 3-year-olds, children of this age like to fi nd their own answers to why things work the way they do. Their favoured technique to achieve this is directed exploration. ©2004 The LEGO Group. All Rights Reserved. The content is made available for individual use and shall not be reproduced or edited without permission from The LEGO Group. The Whole Child Development Guide is grounded in recent research findings and has been developed by the LEGO Learning Institute in partnership with experts in the field. Author: Prof. Edith Ackermann, Contributors: Dr. Dorothy Singer (The Learning Relevance Grid and The Complete Discovery System) and Dr. Aaron Falbel. www.lego.com/parents
  • 84. 167 Four-year-olds are pretty aware of the present time and they can tell you about the past. The future is still hard to comprehend. Most 4- year-olds have trouble gauging how long an incident lasts. They tend either to over- or underestimate time. While most 4-year-olds have a fairly good sense of size relationships, many still think that the tallest person in a group ought to be the oldest or, more impressive, the taller the older. Probably because they still ‘animate” things in their minds, many 4-year- olds still have “irrational” fears, such as fear of the dark, of monsters, and of masks, even if they know the monsters don’t exist and the masks hide mom’s face. Such fears lessen as children enter the elementary school years (Bauer, 1976). SUPPORT: What can caregivers do to support this natural development? It is important, at this age, to take your child’s hundred questions seriously, no matter how diffi cult the answers! Even more important is to encourage his initiative. Enjoy your child’s eagerness to experiment and try out things,
  • 85. and appreciate his ability to come up with many clever explanations to the most obscure philosophical queries. Three rules of thumb at this age are: 1) Respond to your child’s questions, yet don’t impose your adult take on things, 2) Don’t get caught up in drilling your child to become ready for school. At this age, the best way to prepare a child for school, and life, is to support her initiative. 3) ‘Teach her that it’s worth taking the time, and making the detours, needed to pursue her interests. So, for example, if the child gets discouraged or repeatedly avoids obstacles, renew her interest by suggesting an exciting next step, or surprise her by taking an unusual stance on things that intrigue her. WORLD - SEEKING LOGIC “One, Two, Three … A Lot”. Four-year-olds draw many lessons from their experience. Some are about the world, others are about the “logic” that drives the world, and still others about people’s actions on the world. Children detect regularities and they make inferences. They generalize and they schematize. They infer laws and they establish rules. While acting in the world, in other words, children soon transcend both action and object
  • 86. ©2004 The LEGO Group. All Rights Reserved. The content is made available for individual use and shall not be reproduced or edited without permission from The LEGO Group. The Whole Child Development Guide is grounded in recent research findings and has been developed by the LEGO Learning Institute in partnership with experts in the field. Author: Prof. Edith Ackermann, Contributors: Dr. Dorothy Singer (The Learning Relevance Grid and The Complete Discovery System) and Dr. Aaron Falbel. www.lego.com/parents 168 to focus on their underlying relations. What matters are the “invisible” relations, patterns and gestalts, and the forms, both static and dynamic, that keep singular elements in a certain relation. Four-year-old children build their own mental model, or knowledge structure that brings order and coherence to their understanding of things. This being said, the pre-operational categories that 4-year-old children establish are still empirical rather than logical, i.e. based on how objects, including people, resist or yield to their solicitations. COMPETENCIES: