From Nosy Little Brothers to Stranger-Danger: Children and Parents' Perception of Mobile Threats
暂无分享,去创建一个
Leah Zhang-Kennedy | Sonia Chiasson | Yomna Abdelaziz | Christine Mekhail | S. Chiasson | Christine Mekhail | L. Zhang-Kennedy | Y. Abdelaziz | Sonia Chiasson
[1] Cynthia J. Larose,et al. Children's Online Privacy Protection Act , 2015 .
[2] Sherri Jean Katz,et al. Predicting Parent-Child Differences in Perceptions of How Children Use the Internet for Help With Homework, Identity Development, and Health Information , 2015 .
[3] S. Livingstone,et al. UK children go online: surveying the experiences of young people and their parents , 2004 .
[4] Miriam J. Metzger,et al. Comparative Optimism in Online Credibility Evaluation Among Parents and Children , 2015 .
[5] Sonia Livingstone,et al. Children's Privacy Online: Experimenting with Boundaries Within and Beyond the Family , 2006, Computers, Phones, and the Internet.
[6] Paul Rayson,et al. Safeguarding Cyborg Childhoods: Incorporating the On/Offline Behaviour of Children into Everyday Social Work Practices , 2014 .
[7] Austin Henderson,et al. Interaction design: beyond human-computer interaction , 2002, UBIQ.
[8] Rick Wash,et al. Organization Interfaces—collaborative computing General Terms , 2022 .
[9] Yvonne Rogers,et al. Interaction Design: Beyond Human-Computer Interaction , 2002 .
[10] Mark W. Newman,et al. The Work to Make a Home Network Work , 2005, ECSCW.
[11] Mark Blythe,et al. Grounding experience: relating theory and method to evaluate the user experience of smartphones , 2005 .
[12] Yvonne Rogers,et al. New theoretical approaches for human-computer interaction , 2005, Annu. Rev. Inf. Sci. Technol..
[13] Anne Taylor. Young Canadians in a Wired World: How Canadian Kids Are Using the Internet. , 2001 .
[14] Tawfiq Ammari,et al. Managing Children's Online Identities: How Parents Decide what to Disclose about their Children Online , 2015, CHI.
[15] L. Jean Camp,et al. Mental models of privacy and security , 2009, IEEE Technology and Society Magazine.
[16] Henry Nicholls. A life online , 2006, Nature.
[17] Benjamin Shmueli,et al. Privacy for Children , 2011 .
[18] Leslie Haddon,et al. Comparing children’s online opportunities and risks across Europe: cross-national comparisons for EU Kids Online , 2008 .
[19] Randolph G. Bias,et al. Research Methods for Human-Computer Interaction , 2010, J. Assoc. Inf. Sci. Technol..
[20] K. R. Priya. Grounded Theory Methodology , 2013 .
[21] G. Marx,et al. From the Beginning: Children as Subjects and Agents of Surveillance , 2010 .
[22] Yvonne Rogers,et al. NEW THEORETICAL APPROACHES FOR HCI , 2004 .
[23] Trey Decker,et al. Children's Online Privacy Protection Act , 2015 .
[24] Constance Fleuriot,et al. Children and emerging wireless technologies: investigating the potential for spatial practice , 2005, CHI.
[25] Stuart E. Schechter. The User IS the Enemy, and (S)he Keeps Reaching for that Bright Shiny Power Button! , 2013 .
[26] Rick Wash,et al. Too Much Knowledge? Security Beliefs and Protective Behaviors Among United States Internet Users , 2015, SOUPS.
[27] L. Jean Camp,et al. Mental Models of Security Risks , 2007, Financial Cryptography.