Nothing Special   »   [go: up one dir, main page]

skip to main content
10.1145/3313831.3376747acmconferencesArticle/Chapter ViewAbstractPublication PageschiConference Proceedingsconference-collections
research-article

Circle of Trust: A New Approach to Mobile Online Safety for Families

Published: 23 April 2020 Publication History

Abstract

Traditional parental control applications designed to protect children and teens from online risks do so through parental restrictions and privacy-invasive monitoring. We propose a new approach to adolescent online safety that aims to strike a balance between a teen's privacy and their online safety through active communication and fostering trust between parents and children. We designed and developed an Android "app" called Circle of Trust and conducted a mixed methods user study of 17 parent-child pairs to understand their perceptions about the app. Using a within-subjects experimental design, we found that parents and children significantly preferred our new app design over existing parental control apps in terms of perceived usefulness, ease of use, and behavioral intent to use. By applying a lens of Value Sensitive Design to our interview data, we uncovered that parents and children who valued privacy, trust, freedom, and balance of power preferred our app over traditional apps. However, those who valued transparency and control preferred the status quo. Overall, we found that our app was better suited for teens than for younger children.

Supplementary Material

ZIP File (pn8366aux.zip)
Newly Developed Constructs.pdf: Table 3 includes new constructs for evaluating TOSS related outcomes
SBV File (paper618pvc.sbv)
Preview video captions
MP4 File (paper618pv.mp4)
Preview video
MP4 File (a618-ghosh-presentation.mp4)

References

[1]
Monica Anderson and Jingjing Jiang. 2018. Teens, Social Media & Technology 2018. Pew Research Center: Internet, Science & Tech. Retrieved September 10, 2018 from http://www.pewinternet.org/2018/05/31/teens-socialmedia-technology-2018/
[2]
Karla Badillo-Urquiola, Yaxing Yao, Oshrat Ayalon, Bart Knijnenurg, Xinru Page, Eran Toch, Yang Wang, and Pamela J. Wisniewski. 2018. Privacy in Context: Critically Engaging with Theory to Guide Privacy Research and Design. In Companion of the 2018 ACM Conference on Computer Supported Cooperative Work and Social Computing (CSCW '18), 425--431. https://doi.org/10.1145/3272973.3273012
[3]
Albert Bandura. 1991. Social Cognitive Theory of Self-Regulation. Organizational Behavior and Human Decision Processes 50, 2: 248--287. https://doi.org/10.1016/0749--5978(91)90022-L
[4]
Diana Baumrind. 1987. A developmental perspective on adolescent risk taking in contemporary America. New directions for child development, 37: 93--125.
[5]
Diana Baumrind. 2005. Patterns of parental authority and adolescent autonomy. New Directions for Child and Adolescent Development 2005, 108: 61--69. https://doi.org/10.1002/cd.128
[6]
Antoine Bechara. 2005. Decision making, impulse control and loss of willpower to resist drugs: a neurocognitive perspective. Nature Neuroscience 8, 11: 1458--1463. https://doi.org/10.1038/nn1584
[7]
Lindsay Blackwell, Emma Gardiner, and Sarita Schoenebeck. 2016. Managing Expectations: Technology Tensions Among Parents and Teens. In Proceedings of the 19th ACM Conference on Computer-Supported Cooperative Work & Social Computing (CSCW '16), 1390--1401.
[8]
Julie Boesen, Jennifer A. Rode, and Clara Mancini. 2010. The Domestic Panopticon: Location Tracking in Families. In Proceedings of the 12th ACM International Conference on Ubiquitous Computing, 65--74.
[9]
Elaine A. Borawski, Carolyn E. Ievers-Landis, Loren D. Lovegreen, and Erika S. Trapl. 2003. Parental monitoring, negotiated unsupervised time, and parental trust: the role of perceived parenting practices in adolescent health risk behaviors. The Journal of Adolescent Health: Official Publication of the Society for Adolescent Medicine 33, 2: 60--70.
[10]
danah boyd. 2014. It's Complicated: The Social Lives of Networked Teens. Yale University Press, New Haven.
[11]
William M. Bukowski, Betsy Hoza, and Michel Boivin. 1994. Measuring Friendship Quality During Pre- and Early Adolescence: The Development and Psychometric Properties of the Friendship Qualities Scale. Journal of Social and Personal Relationships 11, 3: 471--484. https://doi.org/10.1177/0265407594113011
[12]
Kathleen Carley. 1993. Coding Choices for Textual Analysis: A Comparison of Content Analysis and Map Analysis. Sociological Methodology 23: 75-- 126. https://doi.org/10.2307/271007
[13]
Brian X. Chen. 2017. Google's New Parental Control App Has a Flaw: Puberty. The New York Times. Retrieved July 18, 2018 from https://www.nytimes.com/2017/07/26/technology/personaltech/android-parental-controls-family-link.html
[14]
Anne Collier. 2014. Less parental control, more support of kids' self-regulation: Study. ConnectSafely. Retrieved July 18, 2017 from http://www.connectsafely.org/less-parental-controlmore-support-of-kids-self-regulation-study/
[15]
Lorrie Faith Cranor, Adam L. Durity, Abigail Marsh, and Blase Ur. 2014. Parents' and Teens' Perspectives on Privacy In a Technology-Filled World. In Proceedings of the Tenth Symposium On Usable Privacy and Security. Retrieved April 26, 2017 from https://www.usenix.org/conference/soups2014/procee dings/presentation/cranor
[16]
Alexei Czeskis, Ivayla Dermendjieva, Hussein Yapit, Alan Borning, Batya Friedman, Brian Gill, and Tadayoshi Kohno. 2010. Parenting from the pocket: value tensions and technical directions for secure and private parent-teen mobile safety. 1. https://doi.org/10.1145/1837110.1837130
[17]
Fred D. Davis. 1989. Perceived Usefulness, Perceived Ease of Use, and User Acceptance of Information Technology. MIS Quarterly 13: 319. https://doi.org/10.2307/249008
[18]
Katie Davis, Anja Dinhopl, and Alexis Hiniker. 2019. "Everything's the Phone": Understanding the Phone's Supercharged Role in Parent-Teen Relationships. In Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems (CHI '19), 227:1--227:14. https://doi.org/10.1145/3290605.3300457
[19]
Katie Davis and Carrie James. 2013. Tweens' conceptions of privacy online: implications for educators. Learning, Media and Technology 38, 1: 4-- 25. https://doi.org/10.1080/17439884.2012.658404
[20]
Nicola Dell, Vidya Vaidyanathan, Indrani Medhi, Edward Cutrell, and William Thies. 2012. "Yours is Better!": Participant Response Bias in HCI. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (CHI '12), 1321-- 1330. https://doi.org/10.1145/2207676.2208589
[21]
Melanie M. Domenech Rodríguez, Melissa R. Donovick, and Susan L. Crowley. 2009. Parenting Styles in a Cultural Context: Observations of "Protective Parenting" in First-Generation Latinos. Family Process 48, 2: 195--210. https://doi.org/10.1111/j.1545--5300.2009.01277.x
[22]
Sarah E. Domoff, Jenny S. Radesky, Kristen Harrison, Hurley Riley, Julie C. Lumeng, and Alison L. Miller. 2019. A Naturalistic Study of Child and Family Screen Media and Mobile Device Use. Journal of Child and Family Studies 28, 2: 401--410. https://doi.org/10.1007/s10826-018--1275--1
[23]
Matthew S. Eastin, Bradley S. Greenberg, and Linda Hofschire. 2006. Parenting the Internet. Journal of Communication 56, 3: 486--504. https://doi.org/10.1111/j.1460--2466.2006.00297.x
[24]
Jenna Wharff Ed.M. Teaching Stranger Safety to Kids with Autism. Retrieved April 2, 2019 from http://blog.stageslearning.com/blog/teaching-autismstranger-safety
[25]
Lee B. Erickson, Pamela Wisniewski, Heng Xu, John M. Carroll, Mary Beth Rosson, and Daniel F. Perkins. 2016. The boundaries between: Parental involvement in a teen's online world. Journal of the Association for Information Science and Technology 67, 6: 1384--1403.
[26]
Jieqiong Fan and Li-fang Zhang. 2014. The role of perceived parenting styles in thinking styles. Learning and Individual Differences 32, Supplement C: 204--211. https://doi.org/10.1016/j.lindif.2014.03.004
[27]
Franz Faul, Edgar Erdfelder, Albert-Georg Lang, and Axel Buchner. 2007. G*Power 3: A flexible statistical power analysis program for the social, behavioral, and biomedical sciences. Behavior Research Methods 39, 2: 175--191. https://doi.org/10.3758/BF03193146
[28]
Michela Ferron, Chiara Leonardi, Paolo Massa, Gianluca Schiavo, Amy L. Murphy, and Elisabetta Farella. 2019. A Walk on the Child Side: Investigating Parents' and Children's Experience and Perspective on Mobile Technology for Outdoor Child Independent Mobility. In Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems (CHI '19), 597:1--597:12. https://doi.org/10.1145/3290605.3300827
[29]
Karen L. Fingerman, Jacqui Smith, and Cynthia Berg. 2010. Coping and Self-Regulation across the Life Span. In Handbook of Life-Span Development. Springer Publishing Company.
[30]
Batya Friedman, Peter H. Kahn Jr, Alan Borning, and Alina Huldtgren. 2013. Value Sensitive Design and Information Systems. In Early engagement and new technologies: Opening up the laboratory, Neelke Doorn, Daan Schuurbiers, Ibo Poel and Michael E. Gorman (eds.). Springer Netherlands, 55--95. Retrieved May 22, 2016 from http://link.springer.com/chapter/10.1007/978--94-0077844--3_4
[31]
Batya Friedman, Peter H. Kahn, and Alan Borning. 2002. Value Sensitive Design: Theory and Methods. Retrieved from http://faculty.washington.edu/pkahn/articles/vsdtheory-methods-tr.pdf
[32]
Manuel Gámez-Guadix, Carmen Almendros, Erika Borrajo, and Esther Calvete. 2015. Prevalence and Association of Sexting and Online Sexual Victimization Among Spanish Adults. Sexuality Research and Social Policy 12, 2: 145--154. https://doi.org/10.1007/s13178-015-0186--9
[33]
Arup Kumar Ghosh, Karla Badillo-Urquiola, Shion Guha, Joseph LaViola Jr., and Pamela Wisniewski. 2018. Safety vs. Surveillance: What Children Have to Say about Mobile Apps for Parental Control. In Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems (CHI '18).
[34]
Arup Kumar Ghosh, Karla Badillo-Urquiola, Mary Beth Rosson, Heng Xu, Jack Carroll, and Pamela Wisniewski. 2018. A Matter of Control or Safety? Examining Parental Use of Technical Monitoring Apps on Teens' Mobile Devices. In Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems (CHI '18).
[35]
Zhiwei Guan, Shirley Lee, Elisabeth Cuddihy, and Judith Ramey. 2006. The Validity of the Stimulated Retrospective Think-aloud Method As Measured by Eye Tracking. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (CHI '06), 1253--1262. https://doi.org/10.1145/1124772.1124961
[36]
Richard HR Harper. 2014. Trust, computing, and society. Cambridge University Press.
[37]
Heidi Hartikainen, Netta Iivari, and Marianne Kinnula. 2016. Should We Design for Control, Trust or Involvement?: A Discourses Survey About Children's Online Safety. In Proceedings of the The 15th International Conference on Interaction Design and Children (IDC '16), 367--378. https://doi.org/10.1145/2930674.2930680
[38]
Yasmeen Hashish, Andrea Bunt, and James E. Young. 2014. Involving Children in Content Control: A Collaborative and Education-oriented Content Filtering Approach. In Proceedings of the 32Nd Annual ACM Conference on Human Factors in Computing Systems (CHI '14), 1797--1806. https://doi.org/10.1145/2556288.2557128
[39]
C. Herodotou. 2018. Young children and tablets: A systematic review of effects on learning and development. Journal of Computer Assisted Learning 34, 1: 1--9. https://doi.org/10.1111/jcal.12220
[40]
Alexis Hiniker, Sarita Y. Schoenebeck, and Julie A. Kientz. 2016. Not at the Dinner Table: Parents' and Children's Perspectives on Family Technology Rules. In Proceedings of the 19th ACM Conference on Computer-Supported Cooperative Work & Social Computing (CSCW '16), 1376--1389.
[41]
Saigeetha Jambunathan and Kenneth Counselman. 2002. Parenting Attitudes of Asian Indian Mothers Living in the United States and in India. Early Child Development and Care 172, 6: 657--662. https://doi.org/10.1080/03004430215102
[42]
Carrie James, Emily Weinstein, and Kelly Mendoza. 2019. Teaching Digital Citizens in Today's World: Research and Insights Behind the Common Sense K-- 12 Digital Citizenship Curriculum. Common Sense Media.
[43]
MARGARET Kerr, HÅKAN Stattin, and KARI Trost. 1999. To know you is to trust you: parents' trust is rooted in child disclosure of information. Journal of Adolescence 22, 6: 737--752. https://doi.org/10.1006/jado.1999.0266
[44]
Minsam Ko, Seungwoo Choi, Subin Yang, Joonwon Lee, and Uichin Lee. 2015. FamiLync: Facilitating Participatory Parental Mediation of Adolescents' Smartphone Use. In Proceedings of the 2015 ACM International Joint Conference on Pervasive and Ubiquitous Computing (UbiComp '15), 867--878.
[45]
Claire B. Kopp. 1982. Antecedents of self-regulation: A developmental perspective. Developmental Psychology 18, 2: 199--214. https://doi.org/10.1037/0012--1649.18.2.199
[46]
Jocelyn Lachance. 2019. Parental surveillance of teens in the digital era: the "ritual of confession" to the "ritual of repentance." International Journal of Adolescence and Youth 0, 0: 1--9. https://doi.org/10.1080/02673843.2019.1651351
[47]
Susie D. Lamborn, Nina S. Mounts, Laurence Steinberg, and Sanford M. Dornbusch. 1991. Patterns of Competence and Adjustment among Adolescents from Authoritative, Authoritarian, Indulgent, and Neglectful Families. Child Development 62, 5: 1049-- 1065. https://doi.org/10.1111/j.14678624.1991.tb01588.x
[48]
Simone Lanette, Phoebe K. Chua, Gillian Hayes, and Melissa Mazmanian. 2018. How Much is "Too Much"?: The Role of a Smartphone Addiction Narrative in Individuals' Experience of Use. Proc. ACM Hum.-Comput. Interact. 2, CSCW: 101:1-- 101:22. https://doi.org/10.1145/3274370
[49]
Richard S. Lazarus. 2000. Toward better research on stress and coping. The American Psychologist 55, 6: 665--673.
[50]
Sonia Livingstone, Leslie Haddon, Anke Görzig, and Kjartan Ólafsson. 2011. Risks and safety on the internet: The perspective of European children. EU Kids Online. Retrieved from http://eprints.lse.ac.uk/33731/
[51]
Sheri Madigan, Anh Ly, Christina L. Rash, Joris Van Ouytsel, and Jeff R. Temple. 2018. Prevalence of Multiple Forms of Sexting Behavior Among Youth: A Systematic Review and Meta-analysis. JAMA Pediatrics 172, 4: 327--335. https://doi.org/10.1001/jamapediatrics.2017.5314
[52]
Monica Anderson. 2016. Parents, Teens and Digital Monitoring. Pew Research Center: Internet, Science & Tech. Retrieved September 10, 2018 from http://www.pewinternet.org/2016/01/07/parentsteens-and-digital-monitoring/
[53]
Marije Nouwen, Nassim Jafarinaimi, and Bieke Zaman. 2017. Parental controls: reimagining technologies for parent-child interaction. https://doi.org/10.18420/ecscw2017--28
[54]
Antti Oulasvirta, Aurora Pihlajamaa, Jukka Perkiö, Debarshi Ray, Taneli Vähäkangas, Tero Hasu, Niklas Vainio, and Petri Myllymäki. 2012. Long-term Effects of Ubiquitous Surveillance in the Home. In Proceedings of the 2012 ACM Conference on Ubiquitous Computing (UbiComp '12), 41--50. https://doi.org/10.1145/2370216.2370224
[55]
R. Pain. 2006. Paranoid parenting? Rematerializing risk and fear for children. Social & cultural geography. 7, 2: 221--243.
[56]
Sandra Petronio. 2015. Communication Privacy Management Theory. In The International Encyclopedia of Interpersonal Communication. American Cancer Society, 1--9. https://doi.org/10.1002/9781118540190.wbeic132
[57]
Beate Rossler. 2018. The value of privacy. John Wiley & Sons.
[58]
Diane J. Schiano and Christine Burg. 2017. Parental Controls: Oxymoron and Design Opportunity. In HCI International 2017 -- Posters' Extended Abstracts (Communications in Computer and Information Science), 645--652. https://doi.org/10.1007/978--3319--58753-0_91
[59]
Daniel T. L. Shek. 2010. Parent-Adolescent Trust and Parent-Adolescent Relationships in Chinese Families in Hong Kong: Implications for Parent Education and Family Therapy. The American Journal of Family Therapy 38, 3: 251--265. https://doi.org/10.1080/01926180902945855
[60]
Peter K. Smith, Jess Mahdavi, Manuel Carvalho, Sonja Fisher, Shanette Russell, and Neil Tippett. 2008. Cyberbullying: Its nature and impact in secondary school pupils. Journal of Child Psychology and Psychiatry and Allied Disciplines 49, 4: 376-- 385. https://doi.org/10.1111/j.14697610.2007.01846.x
[61]
H. Stattin and M. Kerr. 2000. Parental monitoring: a reinterpretation. Child Development 71, 4: 1072-- 1085.
[62]
Laurence Steinberg, Susie D. Lamborn, Sanford M. Dornbusch, and Nancy Darling. 1992. Impact of Parenting Practices on Adolescent Achievement: Authoritative Parenting, School Involvement, and Encouragement to Succeed. Child Development 63, 5: 1266--1281. https://doi.org/10.1111/j.14678624.1992.tb01694.x
[63]
Blase Ur, Jaeyeon Jung, and Stuart Schechter. 2014. Intruders Versus Intrusiveness: Teens' and Parents' Perspectives on Home-entryway Surveillance. In Proceedings of the 2014 ACM International Joint Conference on Pervasive and Ubiquitous Computing (UbiComp '14), 129--139. https://doi.org/10.1145/2632048.2632107
[64]
Pieter E. Vermaas, Yao-Hua Tan, Jeroen van den Hoven, Brigitte Burgemeestre, and Joris Hulstijn. 2010. Designing for Trust: A Case of Value-Sensitive Design. Knowledge, Technology & Policy 23, 3: 491--505. https://doi.org/10.1007/s12130-010--9130--8
[65]
Angie Williams. 2003. Adolescents' Relationships With Parents. Journal of Language and Social Psychology 22, 1: 58--65. https://doi.org/10.1177/0261927X02250056
[66]
Pamela Wisniewski, Arup Kumar Ghosh, Mary Beth Rosson, Heng Xu, and John M. Carroll. 2017. Parental Control vs. Teen Self-Regulation: Is there a middle ground for mobile online safety? In Proceedings of the 20th ACM Conference on Computer Supported Cooperative Work & Social Computing.
[67]
Pamela Wisniewski, Haiyan Jia, Na Wang, Saijing Zheng, Heng Xu, Mary Beth Rosson, and John M. Carroll. 2015. Resilience Mitigates the Negative Effects of Adolescent Internet Addiction and Online Risk Exposure. In Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems (CHI '15), 4029--4038. https://doi.org/10.1145/2702123.2702240
[68]
Pamela Wisniewski, Haiyan Jia, Heng Xu, Mary Beth Rosson, and John M. Carroll. 2015. "Preventative" vs. "Reactive": How Parental Mediation Influences Teens' Social Media Privacy Behaviors. In Proceedings of the 18th ACM Conference on Computer Supported Cooperative Work & Social Computing (CSCW '15), 302--316. https://doi.org/10.1145/2675133.2675293
[69]
Pamela Wisniewski, Heng Xu, Mary Beth Rosson, Daniel F. Perkins, and John M. Carroll. 2016. Dear Diary: Teens Reflect on Their Weekly Online Risk Experiences. In Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems (CHI '16), 3919--3930. https://doi.org/10.1145/2858036.2858317
[70]
Jacob Wobbrock and Julie Kientz. 2016. Research Contributions in Human-Computer Interaction. INTERACTIONS 23, 38--44.
[71]
Sarita Yardi. 2012. Social media at the boundaries: supporting parents in managing youth's social media use. Georgia Institute of Technology.
[72]
Sarita Yardi and Amy Bruckman. 2011. Social and Technical Challenges in Parenting Teens' Social Media Use. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (CHI '11), 3237--3246. https://doi.org/10.1145/1978942.1979422
[73]
2018. It's Time to Do Something: Mitigating the Negative Impacts of Computing Through a Change to the Peer Review Process. ACM FCA. Retrieved January 6, 2020 from https://acmfca.org/2018/03/29/negativeimpacts/
[74]
Effects of Mobile Phones on Children's and Adolescents' Health: A Commentary - Hardell - 2018 - Child Development - Wiley Online Library. Retrieved September 20, 2019 from https://srcd.onlinelibrary.wiley.com/doi/full/10.1111/ cdev.12831
[75]
NSF Award Search: Award#1618153 - TWC SBE: Small: Helping Teens and Parents Negotiate Online Privacy and Safety. Retrieved January 6, 2020 from https://www.nsf.gov/awardsearch/showAward?AWD _ID=1618153&HistoricalAwards=false
[76]
Kids want parental help with online risk, but fear parental freak outs. ScienceDaily. Retrieved September 18, 2018 from https://www.sciencedaily.com/releases/2017/02/1702 28084230.htm
[77]
Amazon Rekognition -- Video and Image - AWS. Retrieved June 10, 2018 from https://aws.amazon.com/rekognition/
[78]
Client--server model - Wikipedia. Retrieved November 28, 2017 from https://en.wikipedia.org/wiki/Client%E2%80%93serv er_model
[79]
Amazon Comprehend - Natural Language Processing (NLP) and Machine Learning (ML). Amazon Web Services, Inc. Retrieved June 10, 2018 from https://aws.amazon.com/comprehend/
[80]
IBM SPSS Statistics 24 Documentation - United States. Retrieved June 18, 2017 from http://www01.ibm.com/support/docview.wss?uid=swg27047033

Cited By

View all
  • (2024)Is My Child Safe Online? - On Requirements for Parental Control Tools in Apps used by ChildrenJournal on Interactive Systems10.5753/jis.2024.424015:1(823-838)Online publication date: 8-Aug-2024
  • (2024)Exploring A Design Space for Digital Interventions Facilitating Early Adolescents’ Tech Disengagement: A Parent-Child PerspectiveProceedings of the 13th Nordic Conference on Human-Computer Interaction10.1145/3679318.3685382(1-17)Online publication date: 13-Oct-2024
  • (2024)Safe Digital Teens: an App to Address Technology-Related Risks for AdolescentsProceedings of the 2024 International Conference on Information Technology for Social Good10.1145/3677525.3678679(333-341)Online publication date: 4-Sep-2024
  • Show More Cited By

Index Terms

  1. Circle of Trust: A New Approach to Mobile Online Safety for Families

    Recommendations

    Comments

    Please enable JavaScript to view thecomments powered by Disqus.

    Information & Contributors

    Information

    Published In

    cover image ACM Conferences
    CHI '20: Proceedings of the 2020 CHI Conference on Human Factors in Computing Systems
    April 2020
    10688 pages
    ISBN:9781450367080
    DOI:10.1145/3313831
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Sponsors

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 23 April 2020

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. adolescent online safety
    2. mobile smart phones
    3. parental mediation
    4. technical monitoring

    Qualifiers

    • Research-article

    Funding Sources

    • The U.S. National Science Foundation

    Conference

    CHI '20
    Sponsor:

    Acceptance Rates

    Overall Acceptance Rate 6,199 of 26,314 submissions, 24%

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)248
    • Downloads (Last 6 weeks)41
    Reflects downloads up to 01 Nov 2024

    Other Metrics

    Citations

    Cited By

    View all
    • (2024)Is My Child Safe Online? - On Requirements for Parental Control Tools in Apps used by ChildrenJournal on Interactive Systems10.5753/jis.2024.424015:1(823-838)Online publication date: 8-Aug-2024
    • (2024)Exploring A Design Space for Digital Interventions Facilitating Early Adolescents’ Tech Disengagement: A Parent-Child PerspectiveProceedings of the 13th Nordic Conference on Human-Computer Interaction10.1145/3679318.3685382(1-17)Online publication date: 13-Oct-2024
    • (2024)Safe Digital Teens: an App to Address Technology-Related Risks for AdolescentsProceedings of the 2024 International Conference on Information Technology for Social Good10.1145/3677525.3678679(333-341)Online publication date: 4-Sep-2024
    • (2024)"It's hard for him to make choices sometimes and he needs guidance": Re-orienting Parental Control for ChildrenProceedings of the ACM on Human-Computer Interaction10.1145/36373598:CSCW1(1-51)Online publication date: 26-Apr-2024
    • (2024)“It's like educating us older people...”: Unveiling Needs and Expectations Regarding Educational Features within Parental Control ToolsExtended Abstracts of the CHI Conference on Human Factors in Computing Systems10.1145/3613905.3651113(1-8)Online publication date: 11-May-2024
    • (2024)“I feel like he’s looking in the computer world to be social, but I can’t trust his judgement”: Reimagining Parental Control for Children with ASDProceedings of the 2024 CHI Conference on Human Factors in Computing Systems10.1145/3613904.3642696(1-25)Online publication date: 11-May-2024
    • (2024)"I'm gonna KMS": From Imminent Risk to Youth Joking about Suicide and Self-Harm via Social MediaProceedings of the 2024 CHI Conference on Human Factors in Computing Systems10.1145/3613904.3642489(1-18)Online publication date: 11-May-2024
    • (2024)Creating Safe Places: Understanding the Lived Experiences of Families Managing Cystic Fibrosis in Young ChildrenProceedings of the 2024 CHI Conference on Human Factors in Computing Systems10.1145/3613904.3642334(1-18)Online publication date: 11-May-2024
    • (2024)CHAITok: A Proof-of-Concept System Supporting Children's Sense of Data Autonomy on Social MediaProceedings of the 2024 CHI Conference on Human Factors in Computing Systems10.1145/3613904.3642294(1-19)Online publication date: 11-May-2024
    • (2024)KOALA Hero Toolkit: A New Approach to Inform Families of Mobile Datafication RisksProceedings of the 2024 CHI Conference on Human Factors in Computing Systems10.1145/3613904.3642283(1-18)Online publication date: 11-May-2024
    • Show More Cited By

    View Options

    Get Access

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    HTML Format

    View this article in HTML Format.

    HTML Format

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media