Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/3290605.3300336acmconferencesArticle/Chapter ViewAbstractPublication PageschiConference Proceedingsconference-collections
research-article

`I make up a silly name': Understanding Children's Perception of Privacy Risks Online

Published: 02 May 2019 Publication History

Abstract

Children under 11 are often regarded as too young to comprehend the implications of online privacy. Perhaps as a result, little research has focused on younger kids' risk recognition and coping. Such knowledge is, however, critical for designing efficient safeguarding mechanisms for this age group. Through 12 focus group studies with 29 children aged 6-10 from UK schools, we examined how children described privacy risks related to their use of tablet computers and what information was used by them to identify threats. We found that children could identify and articulate certain privacy risks well, such as information oversharing or revealing real identities online; however, they had less awareness with respect to other risks, such as online tracking or game promotions. Our findings offer promising directions for supporting children's awareness of cyber risks and the ability to protect themselves online.

Supplementary Material

ZIP File (paper106pvc.zip)
Preview video captions
MP4 File (paper106p.mp4)
Preview video

References

[1]
2013. Zero to Eight: Children's Media Use in America 2013. Technical Report. Common Sense Media. https://www.commonsensemedia.org/ research/zero-to-eight-childrens-media-use-in-america-2013
[2]
2018. Call for evidence - Age Appropriate Design Code. https://ico.org.uk/about-the-ico/ico-and-stakeholder-consultations/ call-for-evidence-age-appropriate-design-code/. Accessed: 2018-09.
[3]
2018. Children and the GDPR. https://ico.org.uk/for-organisations/ guide-to-the-general-data-protection-regulation-gdpr/childrenand-the-gdpr/. Accessed: 2018-08.
[4]
2018. Children's rights and the GDPR -- are the new consultations creating light or further confusion? http://blogs.lse.ac.uk/ mediapolicyproject/2017/05/11/childrens-rights-and-the-gdprare-the-new-consultations-creating-light-or-further-confusion/. Accessed: 2018-08.
[5]
2018. Instagram Help Center. https://help.instagram.com/ 116024195217477. Accessed: 2018-08.
[6]
2019. Must Have Apps for Kids Under Five. https:// www.lifewire.com/great-apps-for-kids-5-and-under-4152990. Accessed: 2019-02
[7]
Alessandro Acquisti, Laura Brandimarte, and George Loewenstein. 2015. Privacy and human behavior in the age of information. Science 347, 6221 (2015), 509--514.
[8]
Alessandro Acquisti, Curtis R Taylor, and Liad Wagman. 2016. The economics of privacy. Journal of Economic Literature 52, 2 (2016).
[9]
Birch Ann. 2000. The Developmental Psychology-from infancy to adulthood. Bucharest: The Technical Publishing House (2000).
[10]
Louise Barkhuus. 2012. The mismeasurement of privacy: using contextual integrity to reconsider privacy in HCI. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems. ACM, 367--376.
[11]
Susanne Barth and Menno DT De Jong. 2017. The privacy paradox-- Investigating discrepancies between expressed privacy concerns and actual online behavior--A systematic literature review. Telematics and Informatics 34, 7 (2017), 1038--1058.
[12]
Sebastian Benthall, Seda Gürses, Helen Nissenbaum, Cornell Tech, and NYU Steinhardt MCC. 2017. Contextual Integrity through the Lens of Computer Science. Foundations and Trends in Privacy and Security 2 (2017), 1--69.
[13]
Reuben Binns, Ulrik Lyngs, Max van Kleek, Jun Zhao, Timothy Libert, and Nigel Shadbolt. 2018. Third party tracking in the mobile ecosystem. Proceedings of the 10th International ACM Web Science Conference 2018 (2018).
[14]
Laura Brandimarte, Alessandro Acquisti, and George Loewenstein. 2013. Misplaced confidences privacy and the control paradox. Social Psychological and Personality Science 4, 3 (2013), 340--347.
[15]
Tanya Byron. 2010. Do we have safer children in a digital world? A review of progress since the 2008 Byron Review. (2010).
[16]
Seth Chaiklin. 2003. The zone of proximal development in Vygotsky's analysis of learning and instruction. Vygotsky's educational theory in cultural context 1 (2003), 39--64.
[17]
Michael Chandler, Anna S Fritz, and Suzanne Hala. 1989. Small-scale deceit: Deception as a marker of two-, three-, and four-year-olds' early theories of mind. Child development (1989), 1263--1277.
[18]
Cecilia Sin-Sze Cheung and Eva M Pomerantz. 2011. Parents' involvement in children's learning in the United States and China: Implications for children's academic and emotional adjustment. Child development 82, 3 (2011), 932--950.
[19]
Malinda J Colwell, Kimberly Corson, Anuradha Sastry, and Holly Wright. 2016. Secret keepers: children's theory of mind and their conception of secrecy. Early Child Development and Care 186, 3 (2016), 369--381.
[20]
Federal Trade Commission et al. 2015. Kids' Apps Disclosures Revisited.
[21]
Natalia Criado and Jose M Such. 2015. Implicit contextual integrity in online social networks. Information Sciences 325 (2015), 48--69.
[22]
Harry Daniels. 2005. An introduction to Vygotsky. Psychology Press.
[23]
Allison Druin. 1999. The Role of Children in the Design Technology. Technical Report.
[24]
Jill Dunn, Colette Gray, Pamela Moffett, and Denise Mitchell. 2018. 'It's more funner than doing work': children's perspectives on using tablet computers in the early years of school. Early Child Development and Care 188, 6 (2018), 819--831.
[25]
Catherine D'Ignazio and Rahul Bhargava. 2015. Approaches to building big data literacy. In Proceedings of the Bloomberg Data for Good Exchange Conference.
[26]
Lesley-Anne Ey and C Glenn Cupit. 2011. Exploring young children's understanding of risks associated with Internet usage and their concepts of management strategies. Journal of Early Childhood Research 9, 1 (2011), 53--65.
[27]
Jennifer Fane, Colin MacDougall, Jessie Jovanovic, Gerry Redmond, and Lisa Gibbs. 2018. Exploring the use of emoji as a visual research method for eliciting young children's voices in childhood research. Early Child Development and Care 188, 3 (2018), 359--374.
[28]
Joseph L Fleiss. 1971. Measuring nominal scale agreement among many raters. Psychological bulletin 76, 5 (1971), 378.
[29]
Melissa Freeman and Sandra Mathison. 2008. Researching children's experiences. The Guilford Press.
[30]
Arup Kumar Ghosh, Karla Badillo-Urquiola, Shion Guha, Joseph J. LaViola Jr, and Pamela J. Wisniewski. 2018. Safety vs. Surveillance: What Children Have to Say About Mobile Apps for Parental Control. In Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems (CHI '18). ACM, New York, NY, USA, Article 124, 14 pages.
[31]
Faith Gibson. 2007. Conducting focus groups with children and young people: strategies for success. Journal of research in nursing 12, 5 (2007), 473--483.
[32]
Sheila Greene and Diane Hogan. 2005. Researching children's experience: Approaches and methods. Sage.
[33]
Nancy G Guerra, Kirk R Williams, and Shelly Sadek. 2011. Understanding bullying and victimization during childhood and adolescence: A mixed methods study. Child development 82, 1 (2011), 295--310.
[34]
Yasmeen Hashish, Andrea Bunt, and James E Young. 2014. Involving children in content control: a collaborative and education-oriented content filtering approach. In Proceedings of the 32nd annual ACM conference on Human factors in computing systems. ACM, 1797--1806.
[35]
Samantha Hautea, Sayamindu Dasgupta, and Benjamin Mako Hill. 2017. Youth perspectives on critical data literacies. In Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems. ACM, 919--930.
[36]
Alexis Hiniker, Hyewon Suh, Sabina Cao, and Julie A Kientz. 2016. Screen time tantrums: how families manage screen media experiences for toddlers and preschoolers. In Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems. ACM, 648--660.
[37]
Haiyan Jia, Pamela J. Wisniewski, Heng Xu, Mary Beth Rosson, and John M. Carroll. 2015. Risk-taking As a Learning Process for Shaping Teen's Online Information Privacy Behaviors. In Proceedings of the 18th ACM Conference on Computer Supported Cooperative Work & Social Computing (CSCW '15). ACM, New York, NY, USA, 583--599.
[38]
Steve Jones, Camille Johnson-Yale, Sarah Millermaier, and Francisco Seoane Pérez. 2009. US college students' Internet use: Race, gender and digital divides. Journal of Computer-Mediated Communication 14, 2 (2009), 244--264.
[39]
Sharon Judge, Kimberly Floyd, and Tara Jeffs. 2015. Using mobile media devices and apps to promote young children's learning. In Young Children and Families in the information age. Springer, 117--131.
[40]
Beeban Kidron, Anghrarad Rudkin, Miranda Wolpert, Joanna R. Adler, Andrew K. Przybylski, Elvira Perez Vallejos, Henrietta Bowden-Jones, Joshua J. Chauvin, Kathryn L. Mills, Marina Jirotka, and Julian Childs. 2017. Digital Childhood: Addressing Childhood Development Milestones in the Digital Environment. Technical Report. 5Rights.
[41]
Priya Kumar, Shalmali Milind naik, Utkarsha Ramesh Devkar, Marshini Chetty, Tamara L. Clegg, and Jessica Vitak. 2018. No Telling Passcodes Out Because They're Private?: Understanding Children's Mental Models of Privacy and Security Online. In Proceedings of ACM HumanComputer Interaction (CSCW '18 Online First). ACM.
[42]
Priya Kumar, Jessica Vitak, Marshini Chetty, Tamara L Clegg, Jonathan Yang, Brenna McNally, and Elizabeth Bonsignore. 2018. Co-designing online privacy-related games and stories with children. In Proceedings of the 17th Annual ACM Conference on Interaction Design and Children (IDC'18). doi, Vol. 10.
[43]
Michael E Kummer and Patrick Schulte. 2016. When private information settles the bill: Money and privacy in Google's market for smartphone applications. ZEW-Centre for European Economic Research Discussion Paper 16-031 (2016).
[44]
Sonia Livingstone. 2006. Children's privacy online: experimenting with boundaries within and beyond the family. (2006).
[45]
Sonia Livingstone. 2018. Children: a special case for privacy? Intermedia 46, 2 (2018), 18--23.
[46]
Sonia Livingstone, Alicia Blum-Ross, Jennifer Pavlick, and Kjartan Olafsson. 2018. In the digital home, how do parents support their children and who supports them? Technical Report. LSE.
[47]
Sonia Livingstone, Alicia Blum-Ross, and Dongmiao Zhang. 2018. What do parents think, and do, about their children's online privacy? Technical Report. LSE.
[48]
Sonia Livingstone, Julia Davidson, Joanne Bryce, Saqba Batool, Ciaran Haughton, and Anulekha Nandi. 2017. Children's online activities, risks and safety: a literature review by the UKCCIS evidence group. Technical Report. UKCCIS evidence group.
[49]
Sonia Livingstone and Kjartan Olafsson. 2018. When do parents think their child is ready to use the internet independently? Technical Report. LSE.
[50]
Sonia Livingstone, Mariya Stoilova, and Rishita Nandagiri. 2018. Conceptualising privacy online: what do, and what should, children understand? Parenting for a Digital Future (2018), 1--4.
[51]
May O Lwin, Andrea JS Stanaland, and Anthony D Miyazaki. 2008. Protecting children's privacy online: How parental mediation strategies affect website safeguard effectiveness. Journal of Retailing 84, 2 (2008), 205--217.
[52]
Sana Maqsood, Christine Mekhail, and Sonia Chiasson. 2018. A Day in the Life of Jos: A Web-based Game to Increase Children's Digital Literacy. In Proceedings of the 17th ACM Conference on Interaction Design and Children. ACM, 241--252.
[53]
Brenna McNally, Priya Kumar, Chelsea Hordatt, Matthew Louis Mauriello, Shalmali Naik, Leyla Norooz, Alazandra Shorter, Evan Golub, and Allison Druin. 2018. Co-designing Mobile Online Safety Applications with Children. In Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems. ACM, 523.
[54]
Emily McReynolds, Sarah Hubbard, Timothy Lau, Aditya Saraf, Maya Cakmak, and Franziska Roesner. 2017. Toys that Listen: A Study of Parents, Children, and Internet-Connected Toys. In Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems. ACM, 5197--5207.
[55]
Linda Miller and Linda Pound. 2010. Theories and approaches to learning in the early years. Sage.
[56]
Faye Mishna, Michael Saini, and Steven Solomon. 2009. Ongoing and online: Children and youth's perceptions of cyber bullying. Children and Youth Services Review 31, 12 (2009), 1222--1228.
[57]
Myfanwy Morgan, Sara Gibbs, Krista Maxwell, and Nicky Britten. 2002. Hearing children's voices: methodological issues in conducting focus groups with children aged 7--11 years. Qualitative research 2, 1 (2002), 5--20.
[58]
Michelle M Neumann and David L Neumann. 2014. Touch screen tablets and emergent literacy. Early Childhood Education Journal 42, 4 (2014), 231--239.
[59]
Helen Nissenbaum. 2004. Privacy as contextual integrity. Wash. L. Rev. 79 (2004), 119.
[60]
ofcom.org. 2017. Children and parents: media use and attitude report. https://www.ofcom.org.uk/ data/assets/pdf_file/0020/108182/children-parents-media-useattitudes-2017.pdf
[61]
Kieron OHara. 2016. The Seven Veils of Privacy. IEEE Internet Computing 20, 2 (2016), 86--91.
[62]
Luci Pangrazio and Neil Selwyn. 2017. 'My Data, My Bad ...': Young People's Personal Data Understandings and (Counter)Practices. In Proceedings of the 8th International Conference on Social Media & Society (#SMSociety17). ACM, New York, NY, USA, Article 52, 5 pages.
[63]
Stamatis Papadakis, Michail Kalogiannakis, and Nicholas Zaranis. 2016. Comparing tablets and PCs in teaching mathematics: an attempt to improve mathematics competence in early childhood education. Preschool Prim. Educ 4, 2 (2016), 241--253.
[64]
Chris Quintana, Brian J Reiser, Elizabeth A Davis, Joseph Krajcik, Eric Fretz, Ravit Golan Duncan, Eleni Kyza, Daniel Edelson, and Elliot Soloway. 2004. A scaffolding design framework for software to support science inquiry. The journal of the learning sciences 13, 3 (2004), 337-- 386.
[65]
Irwin Reyes, Primal Wiesekera, Abbas Razaghpanah, Joel Reardon, Narseo Vallina-Rodriguez, Serge Egelman, and Christian Kreibich. 2017. "Is Our Children's Apps Learning?" Automatically Detecting COPPA Violations. In Workshop on Technology and Consumer Protection (ConPro 2017), in conjunction with the 38th IEEE Symposium on Security and Privacy.
[66]
Irwin Reyes, Primal Wijesekera, Joel Reardon, Amit Elazari Bar On, Abbas Razaghpanah, Narseo Vallina-Rodriguez, and Serge Egelman. 2018. "Won't Somebody Think of the Children?" Examining COPPA Compliance at Scale. Proceedings on Privacy Enhancing Technologies 2018, 3 (2018), 63--83.
[67]
John Schacter and Booil Jo. 2016. Improving low-income preschoolers mathematics achievement with Math Shelf, a preschool tablet computer curriculum. Computers in Human Behavior 55 (2016), 223--229.
[68]
Cristiana S. Silva, Glívia A.R. Barbosa, Ismael S. Silva, Tatiane S. Silva, Fernando Mourão, and Flávio Coutinho. 2017. Privacy for Children and Teenagers on Social Networks from a Usability Perspective: A Case Study on Facebook. In Proceedings of the 2017 ACM on Web Science Conference (WebSci '17). ACM, New York, NY, USA, 63--71.
[69]
Daniel J Solove. 2008. Understanding privacy. (2008).
[70]
David W Stewart and Prem N Shamdasani. 2014. Focus groups: Theory and practice. Vol. 20. Sage publications.
[71]
Matt Tierney and Lakshminarayanan Subramanian. 2014. Realizing privacy by definition in social networks. In Proceedings of 5th AsiaPacific Workshop on Systems. ACM, 6.
[72]
Max Van Kleek, Reuben Binns, Jun Zhao, and Nigel Shadbolt. {n. d.}. XRay Refine: Supporting the Exploration and Refinement of Information Exposure Resulting from Smartphone Apps. In Proceedings of 2018 CHI Conference on Human Factors in Computing Systems. to appear.
[73]
Rick Wash. 2010. Folk Models of Home Computer Security. In SOUPS. 1--16.
[74]
Margy Whalley. 2017. Involving Parents in Their Children's Learning: A Knowledge-Sharing Approach. Sage.
[75]
Primal Wijesekera, Arjun Baokar, Ashkan Hosseini, Serge Egelman, David Wagner, and Konstantin Beznosov. 2015. Android Permissions Remystified: A Field Study on Contextual Integrity. In USENIX Security Symposium. 499--514.
[76]
Pamela Wisniewski. 2018. The Privacy Paradox of Adolescent Online Safety: A Matter of Risk Prevention or Risk Resilience? IEEE Security & Privacy 16, 2 (2018), 86--90.
[77]
Pamela Wisniewski, Arup Kumar Ghosh, Heng Xu, Mary Beth Rosson, and John M Carroll. 2017. Parental Control vs. Teen Self-Regulation: Is there a middle ground for mobile online safety?. In Proceedings of the 2017 ACM Conference on Computer Supported Cooperative Work and Social Computing. ACM, 51--69.
[78]
Pamela J Wisniewski, Heng Xu, Mary Beth Rosson, and John M Carroll. 2017. Parents Just Don't Understand: Why Teens Don't Talk to Parents about Their Online Risk Experiences. In CSCW. 523--540.
[79]
Yaxing Yao, Davide Lo Re, and Yang Wang. 2017. Folk Models of Online Behavioral Advertising. In CSCW. 1957--1969.
[80]
Frances Zhang, Fuming Shih, and Daniel Weitzner. 2013. No surprises: measuring intrusiveness of smartphone applications by detecting objective context deviations. In Proceedings of the 12th ACM workshop on Workshop on privacy in the electronic society. ACM, 291--296.
[81]
Leah Zhang-Kennedy, Yomna Abdelaziz, and Sonia Chiasson. 2017. Cyberheroes: The design and evaluation of an interactive ebook to educate children about online privacy. International Journal of ChildComputer Interaction (2017).
[82]
Leah Zhang-Kennedy and Sonia Chiasson. 2016. Teaching with an Interactive E-book to Improve Children's Online Privacy Knowledge. In Proceedings of the The 15th International Conference on Interaction Design and Children (IDC '16). ACM, New York, NY, USA, 506--511.
[83]
Leah Zhang-Kennedy, Christine Mekhail, Yomna Abdelaziz, and Sonia Chiasson. 2016. From Nosy Little Brothers to Stranger-Danger: Children and Parents' Perception of Mobile Threats. In Proceedings of the The 15th International Conference on Interaction Design and Children. ACM, 388--399.

Cited By

View all
  • (2025)CyberFamily: A collaborative family game to increase children’s cybersecurity awarenessEntertainment Computing10.1016/j.entcom.2024.10082652(100826)Online publication date: Jan-2025
  • (2025)Co-designing cybersecurity-related stories with children: Perceptions on cybersecurity risks and parental involvementEntertainment Computing10.1016/j.entcom.2024.10075352(100753)Online publication date: Jan-2025
  • (2024)Analysis of Saudi Arabia's Legislative Reforms to Strengthen Compliance with The Convention on the Rights of the Child and SDGS: Enhancing Online Protection for Future GenerationsJournal of Lifestyle and SDGs Review10.47172/2965-730X.SDGsReview.v4.n03.pe023744:3(e02374)Online publication date: 26-Sep-2024
  • Show More Cited By

Index Terms

  1. `I make up a silly name': Understanding Children's Perception of Privacy Risks Online

      Recommendations

      Comments

      Information & Contributors

      Information

      Published In

      cover image ACM Conferences
      CHI '19: Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems
      May 2019
      9077 pages
      ISBN:9781450359702
      DOI:10.1145/3290605
      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

      Sponsors

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      Published: 02 May 2019

      Permissions

      Request permissions for this article.

      Check for updates

      Author Tags

      1. children
      2. family technologies
      3. privacy
      4. scaffolding
      5. tablet computers

      Qualifiers

      • Research-article

      Funding Sources

      • EPSRC

      Conference

      CHI '19
      Sponsor:

      Acceptance Rates

      CHI '19 Paper Acceptance Rate 703 of 2,958 submissions, 24%;
      Overall Acceptance Rate 6,199 of 26,314 submissions, 24%

      Upcoming Conference

      CHI 2025
      ACM CHI Conference on Human Factors in Computing Systems
      April 26 - May 1, 2025
      Yokohama , Japan

      Contributors

      Other Metrics

      Bibliometrics & Citations

      Bibliometrics

      Article Metrics

      • Downloads (Last 12 months)329
      • Downloads (Last 6 weeks)32
      Reflects downloads up to 15 Feb 2025

      Other Metrics

      Citations

      Cited By

      View all
      • (2025)CyberFamily: A collaborative family game to increase children’s cybersecurity awarenessEntertainment Computing10.1016/j.entcom.2024.10082652(100826)Online publication date: Jan-2025
      • (2025)Co-designing cybersecurity-related stories with children: Perceptions on cybersecurity risks and parental involvementEntertainment Computing10.1016/j.entcom.2024.10075352(100753)Online publication date: Jan-2025
      • (2024)Analysis of Saudi Arabia's Legislative Reforms to Strengthen Compliance with The Convention on the Rights of the Child and SDGS: Enhancing Online Protection for Future GenerationsJournal of Lifestyle and SDGs Review10.47172/2965-730X.SDGsReview.v4.n03.pe023744:3(e02374)Online publication date: 26-Sep-2024
      • (2024)Improving the Cybersecurity Awareness of Young Adults through a Game-Based Informal Learning StrategyInformation10.3390/info1510060715:10(607)Online publication date: 3-Oct-2024
      • (2024)Exploring Determinants of Parental Engagement in Online Privacy Protection: A Qualitative ApproachProceedings of the 2024 European Symposium on Usable Security10.1145/3688459.3688476(94-111)Online publication date: 30-Sep-2024
      • (2024)Growing Up With Dark Patterns: How Children Perceive Malicious User Interface DesignsProceedings of the 13th Nordic Conference on Human-Computer Interaction10.1145/3679318.3685358(1-17)Online publication date: 13-Oct-2024
      • (2024)DiffAudit: Auditing Privacy Practices of Online Services for Children and AdolescentsProceedings of the 2024 ACM on Internet Measurement Conference10.1145/3646547.3688416(488-504)Online publication date: 4-Nov-2024
      • (2024)Labeling in the Dark: Exploring Content Creators’ and Consumers’ Experiences with Content Classification for Child Safety on YouTubeProceedings of the 2024 ACM Designing Interactive Systems Conference10.1145/3643834.3661565(1518-1532)Online publication date: 1-Jul-2024
      • (2024)Evaluating the Use of Hypothetical 'Would You Rather' Scenarios to Discuss Privacy and Security Concepts with ChildrenProceedings of the ACM on Human-Computer Interaction10.1145/36410048:CSCW1(1-32)Online publication date: 26-Apr-2024
      • (2024)"It's hard for him to make choices sometimes and he needs guidance": Re-orienting Parental Control for ChildrenProceedings of the ACM on Human-Computer Interaction10.1145/36373598:CSCW1(1-51)Online publication date: 26-Apr-2024
      • Show More Cited By

      View Options

      Login options

      View options

      PDF

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader

      HTML Format

      View this article in HTML Format.

      HTML Format

      Figures

      Tables

      Media

      Share

      Share

      Share this Publication link

      Share on social media