From Nosy Little Brothers to Stranger-Danger: Children and Parents' Perception of Mobile Threats

The rise in mobile media use by children has heightened parents' concerns for their online safety. Through semi-structured interviews of parent-child dyads, we explore the perceived privacy and security threats faced by children aged seven to eleven along with the protection mechanisms employed. We identified four models of privacy held by children. Furthermore, we found that children's concerns fit into four child-adversary threat models: child-peers, child-media, child-strangers, and child-parents. Their concerns differed from the five threat models held by the parents: child-peers, child-media, child-strangers, child-technology, and child-self. Parents used a variety of protection strategies to minimize children's exposure to external threats. In reality, however, our results suggest that security and privacy risks from an internal family member or a friend are far more common than harm from outsiders.

[1]  Cynthia J. Larose,et al.  Children's Online Privacy Protection Act , 2015 .

[2]  Sherri Jean Katz,et al.  Predicting Parent-Child Differences in Perceptions of How Children Use the Internet for Help With Homework, Identity Development, and Health Information , 2015 .

[3]  S. Livingstone,et al.  UK children go online: surveying the experiences of young people and their parents , 2004 .

[4]  Miriam J. Metzger,et al.  Comparative Optimism in Online Credibility Evaluation Among Parents and Children , 2015 .

[5]  Sonia Livingstone,et al.  Children's Privacy Online: Experimenting with Boundaries Within and Beyond the Family , 2006, Computers, Phones, and the Internet.

[6]  Paul Rayson,et al.  Safeguarding Cyborg Childhoods: Incorporating the On/Offline Behaviour of Children into Everyday Social Work Practices , 2014 .

[7]  Austin Henderson,et al.  Interaction design: beyond human-computer interaction , 2002, UBIQ.

[8]  Rick Wash,et al.  Organization Interfaces—collaborative computing General Terms , 2022 .

[9]  Yvonne Rogers,et al.  Interaction Design: Beyond Human-Computer Interaction , 2002 .

[10]  Mark W. Newman,et al.  The Work to Make a Home Network Work , 2005, ECSCW.

[11]  Mark Blythe,et al.  Grounding experience: relating theory and method to evaluate the user experience of smartphones , 2005 .

[12]  Yvonne Rogers,et al.  New theoretical approaches for human-computer interaction , 2005, Annu. Rev. Inf. Sci. Technol..

[13]  Anne Taylor Young Canadians in a Wired World: How Canadian Kids Are Using the Internet. , 2001 .

[14]  Tawfiq Ammari,et al.  Managing Children's Online Identities: How Parents Decide what to Disclose about their Children Online , 2015, CHI.

[15]  L. Jean Camp,et al.  Mental models of privacy and security , 2009, IEEE Technology and Society Magazine.

[16]  Henry Nicholls A life online , 2006, Nature.

[17]  Benjamin Shmueli,et al.  Privacy for Children , 2011 .

[18]  Leslie Haddon,et al.  Comparing children’s online opportunities and risks across Europe: cross-national comparisons for EU Kids Online , 2008 .

[19]  Randolph G. Bias,et al.  Research Methods for Human-Computer Interaction , 2010, J. Assoc. Inf. Sci. Technol..

[20]  K. R. Priya Grounded Theory Methodology , 2013 .

[21]  G. Marx,et al.  From the Beginning: Children as Subjects and Agents of Surveillance , 2010 .

[22]  Yvonne Rogers,et al.  NEW THEORETICAL APPROACHES FOR HCI , 2004 .

[23]  Trey Decker,et al.  Children's Online Privacy Protection Act , 2015 .

[24]  Constance Fleuriot,et al.  Children and emerging wireless technologies: investigating the potential for spatial practice , 2005, CHI.

[25]  Stuart E. Schechter The User IS the Enemy, and (S)he Keeps Reaching for that Bright Shiny Power Button! , 2013 .

[26]  Rick Wash,et al.  Too Much Knowledge? Security Beliefs and Protective Behaviors Among United States Internet Users , 2015, SOUPS.

[27]  L. Jean Camp,et al.  Mental Models of Security Risks , 2007, Financial Cryptography.