Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/2998181.2998352acmconferencesArticle/Chapter ViewAbstractPublication PagescscwConference Proceedingsconference-collections
research-article
Public Access

Parental Control vs. Teen Self-Regulation: Is there a middle ground for mobile online safety?

Published: 25 February 2017 Publication History

Abstract

We conducted a structured, qualitative feature analysis of 75 Android mobile apps designed for the purpose of promoting adolescent online safety. Through this analysis we identified 42 unique features that mapped to a theoretically derived conceptual framework of teen online safety strategies balanced between parental control strategies (through monitoring, restriction, and active mediation) and teen self-regulation strategies (through self-monitoring, impulse control, and risk-coping). We found that the apps strongly favored features that promote parental control through monitoring and restricting teens' online behaviors over teen self-regulation or more communicative and collaborative practices between parents and teens. We use the lens of value sensitive design to discuss the implications of our results and identify opportunities for designing mobile apps for online safety that embed more positive family values.

References

[1]
Jonathan Ackley. 2007. Cell phone parental control. Retrieved May 22, 2016 from http://www.google.com/patents/US7302272
[2]
Giuseppe Amato, Paolo Bolettieri, Gabriele Costa, Francesco la Torre, and Fabio Martinelli. 2009. Detection of Images with Adult Content for Parental Control on Mobile Devices? Proceedings of the 6th International Conference on Mobile Technology, Application & Systems, ACM, 35:1--35:5.
[3]
Morgan G. Ames, Janet Go, Joseph "Jofish" Kaye, and Mirjana Spasojevic. 2011. Understanding Technology Choices and Values Through Social Class. Proceedings of the ACM 2011 Conference on Computer Supported Cooperative Work, ACM, 55--64.
[4]
Monica Anderson. 2016. Parents, Teens and Digital Monitoring. Pew Research Center: Internet, Science & Tech. Retrieved May 22, 2016 from http://www.pewinternet.org/2016/01/07/parents-teensand-digital-monitoring/
[5]
Zahra Ashktorab and Jessica Vitak. 2016. Designing Cyberbullying Mitigation and Prevention Solutions Through Participatory Design With Teenagers. Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems, ACM, 3895--3905.
[6]
Albert Bandura. 1991. Theories of Cognitive SelfRegulationSocial cognitive theory of self-regulation. Organizational Behavior and Human Decision Processes 50, 2: 248--287.
[7]
Roy F. Baumeister and Todd F. Heatherton. 1996. SelfRegulation Failure: An Overview. Psychological Inquiry 7, 1: 1--15.
[8]
Diana Baumrind. 1987. A developmental perspective on adolescent risk taking in contemporary America. New directions for child development, 37: 93--125.
[9]
Diana Baumrind. 2005. Patterns of parental authority and adolescent autonomy. New Directions for Child and Adolescent Development 2005, 108: 61--69.
[10]
Antoine Bechara. 2005. Decision making, impulse control and loss of willpower to resist drugs: a neurocognitive perspective. Nature Neuroscience 8, 11: 1458--1463.
[11]
Samantha Biegler and danah boyd. 2010. behaviors and online safety: A 2010 literature review. Retrieved from http://www.zephoria.org/files/2010SafetyLitReview.pdf
[12]
Lindsay Blackwell, Emma Gardiner, and Sarita Schoenebeck. 2016. Managing Expectations: Technology Tensions Among Parents and Teens. Proceedings of the 19th ACM Conference on Computer-Supported Cooperative Work & Social Computing, ACM, 1390--1401.
[13]
Ross Bott. 2013. Parental control of mobile content on a mobile device. Retrieved May 22, 2016 from http://www.google.com/patents/US20130031601
[14]
danah boyd. 2014. It's Complicated: the social lives of networked teens. Yale University Press.
[15]
Paul Carpenter and Allen East. 2007. Methods, devices, and computer program products for providing parental control over access to media content using a mobile terminal. Retrieved May 22, 2016 from http://www.google.com/patents/US20070150918
[16]
B.J. Casey, Rebecca M. Jones, and Todd A. Hare. 2008. The Adolescent Brain. Annals of the New York Academy of Sciences 1124, 1: 111--126.
[17]
E. Mark Cummings, Kathleen N. Bergman, and Kelly A. Kuznicki. 2014. Emerging Methods for Studying Families as Systems. In Emerging Methods in Family Research, Susan M. McHale, Paul Amato and Alan Booth (eds.). Springer International Publishing, 95--108. Retrieved May 25, 2016 from http://link.springer.com/chapter/10.1007/978--3--31901562-0_6
[18]
Alexei Czeskis, Ivayla Dermendjieva, Hussein Yapit, et al. 2010. Parenting from the pocket: value tensions and technical directions for secure and private parent-teen mobile safety. ACM Press, 1.
[19]
L. D'Haenens, S. Vandonink, and V. Donoso. 2013. How to cope and build resilience. EU Kids Online. Retrieved from http://eprints.lse.ac.uk/48115/1/How%20to%20cope%2 0and%20build%20online%20resilience%20%28lsero% 29.pdf
[20]
A. Duerager and S. Livingstone. 2012. How can parents support children's internet safety? Retrieved from http://www.lse.ac.uk/media@lse/research/EUKidsOnlin e/EU%20Kids%20III/Reports/ParentalMediation.pdf
[21]
M. Dumont & Provost, M. A. 1999. Resilience in adolescents: Protective role of social support, coping strategies, self-esteem, and social activities on experience of stress and depression. Journal of youth and adolescence 28, 3: 343--363.
[22]
Matthew S. Eastin, Bradley S. Greenberg, and Linda Hofschire. 2006. Parenting the Internet. Journal of Communication 56, 3: 486--504.
[23]
Lee B. Erickson, Pamela Wisniewski, Heng Xu, John M. Carroll, Mary Beth Rosson, and Daniel F. Perkins. 2015. The boundaries between: Parental involvement in a teen's online world. Journal of the Association for Information Science and Technology: n/a-n/a.
[24]
Karen L. Fingerman, Jacqui Smith, and Cynthia Berg. 2010. Coping and Self-Regulation across the Life Span. In Handbook of Life-Span Development. Springer Publishing Company.
[25]
Batya Friedman, Peter H. Kahn Jr, Alan Borning, and Alina Huldtgren. 2013. Value Sensitive Design and Information Systems. In Early engagement and new technologies: Opening up the laboratory, Neelke Doorn, Daan Schuurbiers, Ibo van de Poel and Michael E. Gorman (eds.). Springer Netherlands, 55--95. Retrieved May 22, 2016 from http://link.springer.com/chapter/10.1007/978--94-0077844--3_4
[26]
Batya Friedman, Peter H. Kahn, and Alan Borning. 2002. Value Sensitive Design: Theory and Methods. Retrieved from http://faculty.washington.edu/pkahn/articles/vsd-theorymethods-tr.pdf
[27]
Batya Friedman, Peter H. Kahn, and Alan Borning. 2006. Value Sensitive Design and Information Systems. Human-Computer Interaction and Management Information Systems: Foundations. M.E. Sharpe, 348--372.
[28]
Gardner TW, Dishion TJ, and Connell AM. 2008. Adolescent self-regulation as resilience: resistance to antisocial behavior within the deviant peer context. Journal of abnormal child psychology 36, 2: 273--284.
[29]
Kilem L. Gwet. 2010. Handbook of Inter-Rater Reliability, 4th Edition: The Definitive Guide to Measuring The Extent of Agreement Among Raters. Advanced Analytics, LLC, Gaithersburg, MD.
[30]
Yasmeen Hashish, Andrea Bunt, and James E. Young. 2014. Involving Children in Content Control: A Collaborative and Education-oriented Content Filtering Approach. Proceedings of the 32Nd Annual ACM Conference on Human Factors in Computing Systems, ACM, 1797--1806.
[31]
Alexis Hiniker, Sarita Y. Schoenebeck, and Julie A. Kientz. 2016. Not at the Dinner Table: Parents' and Children's Perspectives on Family Technology Rules. Proceedings of the 19th ACM Conference on ComputerSupported Cooperative Work & Social Computing, ACM, 1376--1389.
[32]
ISTTF. 2008. Enhancing Child Safety and Online Technologies. Harvard University's Berkman Center for Internet and Society. Retrieved from http://cyber.law.harvard.edu/sites/cyber.law.harvard.edu /files/ISTTF_Final_Report.pdf
[33]
Gill Jagger and Caroline Wright. 1999. Changing Family Values. Taylor & Francis.
[34]
Haiyan Jia, Pamela J. Wisniewski, Heng Xu, Mary Beth Rosson, and John M. Carroll. 2015. Risk-taking As a Learning Process for Shaping Teen's Online Information Privacy Behaviors. Proceedings of the 18th ACM Conference on Computer Supported Cooperative Work & Social Computing, ACM, 583--599.
[35]
Lisa M. Jones, Kimberly J. Mitchell, and David Finkelhor. 2012. Trends in Youth Internet Victimization: Findings From Three Youth Internet Safety Surveys 2000-2010. Journal of Adolescent Health 50, 2: 179--186.
[36]
Atika Khurana, Amy Bleakley, Amy B. Jordan, and Daniel Romer. 2015. The protective effects of parental monitoring and internet restriction on adolescents' risk of online harassment. Journal of Youth and Adolescence 44, 5: 1039--1047.
[37]
Minsam Ko, Seungwoo Choi, Subin Yang, Joonwon Lee, and Uichin Lee. 2015. FamiLync: Facilitating Participatory Parental Mediation of Adolescents' Smartphone Use. Proceedings of the 2015 ACM International Joint Conference on Pervasive and Ubiquitous Computing, ACM, 867--878.
[38]
Claire B. Kopp. 1982. Antecedents of self-regulation: A developmental perspective. Developmental Psychology 18, 2: 199--214.
[39]
Richard S. Lazarus. 2000. Toward better research on stress and coping. The American Psychologist 55, 6: 665--673.
[40]
Sook-Jung Lee and Young-Gil Chae. 2012. Balancing participation and risks in children's Internet use: the role of internet literacy and parental mediation. Cyberpsychology, Behavior and Social Networking 15, 5: 257--262.
[41]
Amanda Lenhart. 2015. Mobile Access Shifts Social Media Use and Other Online Activities. Pew Research Center: Internet, Science & Tech. Retrieved May 14, 2016 from http://www.pewinternet.org/2015/04/09/mobile-accessshifts-social-media-use-and-other-online-activities/
[42]
Sonia Livingstone, Leslie Haddon, Anke Görzig, and Kjartan Ólafsson. 2011. Risks and safety on the internet: The perspective of European children. EU Kids Online. Retrieved from http://eprints.lse.ac.uk/33731/
[43]
Sonia Livingstone and Ellen J. Helsper. 2008. Parental Mediation of Children's Internet Use. Journal of Broadcasting & Electronic Media 52, 4: 581--599.
[44]
Thomas Mazerski, Randy Moore, Joseph Taylor, Martin Gotlieb, and Marilyn Meyerson. 2006. System and method for secure web-based mobile phone parental controls. Retrieved May 22, 2016 from http://www.google.com/patents/US20060293057
[45]
Gustavo S. Mesch. 2009. Parental Mediation, Online Activities, and Cyberbullying. CyberPsychology & Behavior 12, 4: 387--393.
[46]
Kimberly Mitchell, Lisa Jones, David Finkelhor, and Janis Wolak. 2014. Trends in Unwanted Online Experiences and Sexting?: Final Report. Crimes Against Children Research Center. Retrieved from http://scholars.unh.edu/ccrc/49
[47]
Kristin L.1 Moilanen, Katie E.1 Rasmussen, and Laura M.2 Padilla-Walker. 2015. Bidirectional Associations Between Self-Regulation and Parenting Styles in Early Adolescence. Journal of Research on Adolescence (Wiley-Blackwell) 25, 2: 246--262.
[48]
S. Petronio. 2010. Communication privacy management theory: What do we know about family privacy regulation? Journal of Family Theory & Review 2, 3: 175--196.
[49]
Sandra Petronio. 1994. Privacy binds in family interactions: The case of parental privacy invasion. In The dark side of interpersonal communication, W. R. Cupach B. H. Spitzberg (ed.). Lawrence Erlbaum Associates, Inc, Hillsdale, NJ, England, 241--257.
[50]
Erika S. Poole and Tamara Peyton. 2013. Interaction Design Research with Adolescents: Methodological Challenges and Best Practices. Proceedings of the 12th International Conference on Interaction Design and Children, ACM, 211--217.
[51]
I. Seiffge-Krenke. 1995. Stress, coping, and relationships in adolescence. Lawrence Erlbaum, Mahwah, NJ.
[52]
Wonsun Shin and Nurzali Ismail. 2014. Exploring the role of parents and peers in young adolescents' risk taking on social networking sites. Cyberpsychology, Behavior and Social Networking 17, 9: 578--583.
[53]
L. Steinberg. 2004. Risk taking in adolescence: what changes, and why? Annals of the New York Academy of Sciences 1021, 1: 51--58.
[54]
L. Steinberg. 2008. A social neuroscience perspective on adolescent risk-taking. Developmental review 28, 1: 78--106.
[55]
L. Steinberg, S.D. Lamborn, S.M. Dornbusch, and N. Darling. 1992. Impact of parenting practices on adolescent achievement: Authoritative parenting, school involvement, and encouragement to succeed. Child Development 63.
[56]
A.L. Strauss and J.M. Corbin. 1998. Basics of qualitative research: techniques and procedures for developing grounded theory. Sage Publications. Retrieved from http://books.google.com/books?id=wTwYUnHYsmMC
[57]
Patti M. Valkenburg, Marina Krcmar, Allerd L. Peeters, and Nies M. Marseille. 1999. Developing A Scale to Assess Three Styles of Television Mediation: "Instructive Mediation," "Restrictive Mediation," and "Social Coviewing." Journal of Broadcasting & Electronic Media 43, 1: 52--66.
[58]
Pamela J. Wisniewski, Heng Xu, Mary Beth Rosson, and John M. Carroll. 2014. Adolescent Online Safety: The "Moral" of the Story. Proceedings of the 17th ACM Conference on Computer Supported Cooperative Work & Social Computing, ACM, 1258--1271.
[59]
Pamela Wisniewski, Haiyan Jia, Na Wang, et al. 2015. Resilience Mitigates the Negative Effects of Adolescent Internet Addiction and Online Risk Exposure. Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems, ACM, 4029--4038.
[60]
Pamela Wisniewski, Haiyan Jia, Heng Xu, Mary Beth Rosson, and John M. Carroll. 2015. "Preventative" vs. "Reactive": How Parental Mediation Influences Teens' Social Media Privacy Behaviors. Proceedings of the 18th ACM Conference on Computer Supported Cooperative Work & Social Computing, ACM, 302--316.
[61]
Pamela Wisniewski, Heng Xu, Jack Carroll, and Mary Beth Rosson. 2013. Grand Challenges of Researching Adolescent Online Safety: A Family Systems Approach. Retrieved May 25, 2016 from http://aisel.aisnet.org/amcis2013/SocialTechnicalIssues/ GeneralPresentations/10
[62]
Pamela Wisniewski, Heng Xu, Mary Beth Rosson, Daniel F. Perkins, and John M. Carroll. 2016. Dear Diary: Teens Reflect on Their Weekly Online Risk Experiences. Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems, ACM, 3919--3930.
[63]
Sarita Yardi and Amy Bruckman. 2012. Income, Race, and Class: Exploring Socioeconomic Differences in Family Technology Use. Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, ACM, 3041--3050.
[64]
Michele L. Ybarra, David Finkelhor, Kimberly J. Mitchell, and Janis Wolak. 2009. Associations between blocking, monitoring, and filtering software on the home computer and youth-reported unwanted exposure to sexual material online. Child Abuse & Neglect 33, 12: 857--869.
[65]
2014. Parents: A guide to Snapchat. Webwise. Retrieved July 23, 2016 from http://www.webwise.ie/parents/parents-a-guide-tosnapchat/
[66]
2015. ReThink before the damage is done. Retrieved September 22, 2015 from http://www.rethinkwords.com/
[67]
Kik messaging app scrutinized in wake of Va. teen's murder. USA TODAY. Retrieved May 26, 2016 from http://www.usatoday.com/story/news/nation/2016/02/04/kik-messaging-app-scrutinized-wake-va-teensmurder/79826224/
[68]
Campus uproar over Yik Yak app after sex harassment, murder - May. 7, 2015. Retrieved May 26, 2016 from http://money.cnn.com/2015/05/07/technology/yik-yakuniversity-of-mary-washington/
[69]
Parents Who Fight. Facebook. Retrieved May 26, 2016 from https://www.facebook.com/ParentsWhoFight/
[70]
Best Choice for Teens' Cyber Safety -- Parental Control App! Retrieved May 26, 2016 from https://www.hackread.com/teens-cyber-safetyprotection-parental-control-app/
[71]
Using your Values to Raise your Children. The Center for Parenting Education. Retrieved May 27, 2016 from http://centerforparentingeducation.org/library-ofarticles/indulgence-values/values-matter-using-yourvalues-to-raise-caring-responsible-resilient-childrenwhat-are-values/
[72]
IDC: Smartphone OS Market Share. www.idc.com. Retrieved May 27, 2016 from http://www.idc.com/prodserv/smartphone-os-marketshare.jsp
[73]
Nexus 5X. Retrieved July 19, 2016 from https://www.google.com/nexus/5x/
[74]
Marshmallow. Retrieved July 19, 2016 from https://www.android.com/versions/marshmallow-6-0/
[75]
Child Safety Online. Retrieved from https://play.google.com/store/apps/details?id=com.Child .Safety.App
[76]
TeenSafe Child - Android Apps on Google Play. Retrieved May 27, 2016 from https://play.google.com/store/apps/details?id=com.syste mcdms.com
[77]
iOS vs Android. Parent Tech Guide. Retrieved July 19, 2016 from http://parenttechguide.com/ios-vs-android/

Cited By

View all
  • (2025)It Takes a Village: Youth Online Safety Research Highlights Need for Interdisciplinary, Multistakeholder SolutionsJournal of Advances in Information Technology10.12720/jait.16.1.121-12916:1(121-129)Online publication date: 2025
  • (2025)Safeguarding Children in Generative AI: Risk Frameworks and Parental Control ToolsCompanion Proceedings of the 2025 ACM International Conference on Supporting Group Work10.1145/3688828.3699656(121-123)Online publication date: 12-Jan-2025
  • (2024)Is My Child Safe Online? - On Requirements for Parental Control Tools in Apps used by ChildrenJournal on Interactive Systems10.5753/jis.2024.424015:1(823-838)Online publication date: 8-Aug-2024
  • Show More Cited By

Index Terms

  1. Parental Control vs. Teen Self-Regulation: Is there a middle ground for mobile online safety?

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Conferences
    CSCW '17: Proceedings of the 2017 ACM Conference on Computer Supported Cooperative Work and Social Computing
    February 2017
    2556 pages
    ISBN:9781450343350
    DOI:10.1145/2998181
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Sponsors

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 25 February 2017

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. adolescent online safety
    2. mobile apps
    3. parental control
    4. teen self-regulation

    Qualifiers

    • Research-article

    Funding Sources

    Conference

    CSCW '17
    Sponsor:
    CSCW '17: Computer Supported Cooperative Work and Social Computing
    February 25 - March 1, 2017
    Oregon, Portland, USA

    Acceptance Rates

    CSCW '17 Paper Acceptance Rate 183 of 530 submissions, 35%;
    Overall Acceptance Rate 2,235 of 8,521 submissions, 26%

    Upcoming Conference

    CSCW '25

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)1,289
    • Downloads (Last 6 weeks)150
    Reflects downloads up to 11 Feb 2025

    Other Metrics

    Citations

    Cited By

    View all
    • (2025)It Takes a Village: Youth Online Safety Research Highlights Need for Interdisciplinary, Multistakeholder SolutionsJournal of Advances in Information Technology10.12720/jait.16.1.121-12916:1(121-129)Online publication date: 2025
    • (2025)Safeguarding Children in Generative AI: Risk Frameworks and Parental Control ToolsCompanion Proceedings of the 2025 ACM International Conference on Supporting Group Work10.1145/3688828.3699656(121-123)Online publication date: 12-Jan-2025
    • (2024)Is My Child Safe Online? - On Requirements for Parental Control Tools in Apps used by ChildrenJournal on Interactive Systems10.5753/jis.2024.424015:1(823-838)Online publication date: 8-Aug-2024
    • (2024)Are Children With Autism Safe Online?Students' Online Risk Behaviors10.4018/979-8-3693-4191-9.ch002(21-44)Online publication date: 27-Dec-2024
    • (2024)Teen Talk: The Good, the Bad, and the Neutral of Adolescent Social Media UseProceedings of the ACM on Human-Computer Interaction10.1145/36869618:CSCW2(1-35)Online publication date: 8-Nov-2024
    • (2024)From Viral Content to Real-Life Cuisine and Beyond: Examining Teenagers' Interactions with TikTok Food Videos and the Influence on their Food PracticesProceedings of the ACM on Human-Computer Interaction10.1145/36869288:CSCW2(1-30)Online publication date: 8-Nov-2024
    • (2024)Exploring A Design Space for Digital Interventions Facilitating Early Adolescents’ Tech Disengagement: A Parent-Child PerspectiveProceedings of the 13th Nordic Conference on Human-Computer Interaction10.1145/3679318.3685382(1-17)Online publication date: 13-Oct-2024
    • (2024)Reflecting on the Relational: Youth-Centered Approaches to Living with TechnologyCompanion Publication of the 2024 Conference on Computer-Supported Cooperative Work and Social Computing10.1145/3678884.3682047(27-30)Online publication date: 11-Nov-2024
    • (2024)Safe Digital Teens: an App to Address Technology-Related Risks for AdolescentsProceedings of the 2024 International Conference on Information Technology for Social Good10.1145/3677525.3678679(333-341)Online publication date: 4-Sep-2024
    • (2024)Helpful or Harmful? Exploring the Efficacy of Large Language Models for Online Grooming PreventionProceedings of the 2024 European Interdisciplinary Cybersecurity Conference10.1145/3655693.3655694(1-10)Online publication date: 5-Jun-2024
    • Show More Cited By

    View Options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Login options

    Figures

    Tables

    Media

    Share

    Share

    Share this Publication link

    Share on social media