Evaluating the Use of Hypothetical 'Would You Rather' Scenarios to Discuss Privacy and Security Concepts with Children
Abstract
References
Index Terms
- Evaluating the Use of Hypothetical 'Would You Rather' Scenarios to Discuss Privacy and Security Concepts with Children
Recommendations
Understanding Research Related to Designing for Children's Privacy and Security: A Document Analysis
IDC '23: Proceedings of the 22nd Annual ACM Interaction Design and Children ConferenceMany children are growing up in a “digital-by-default” world, where technologies mediate many of their interactions. There is emerging consensus that those who design technology must support children's privacy and security. However, privacy and security ...
The use of mobile phones to support children's literacy learning
PERSUASIVE'07: Proceedings of the 2nd international conference on Persuasive technologyThe goal of this study was to develop a mobile-phone based intervention that would encourage parents to engage their children in daily literacy-learning activities. The intervention content included text messages for parents, audio messages for parents ...
"We picked community over privacy": Privacy and Security Concerns Emerging from Remote Learning Sociotechnical Infrastructure During COVID-19
CSCWWith the rapid shift to remote learning in the early days of the COVID-19 pandemic, parents, teachers, and students had to quickly adapt to what scholars have called "emergency remote learning" (ERL). This transition required increased reliance on ...
Comments
Information & Contributors
Information
Published In
Publisher
Association for Computing Machinery
New York, NY, United States
Publication History
Check for updates
Author Tags
Qualifiers
- Research-article
Funding Sources
- National Science Foundation
- National Science Foundation
Contributors
Other Metrics
Bibliometrics & Citations
Bibliometrics
Article Metrics
- 0Total Citations
- 167Total Downloads
- Downloads (Last 12 months)167
- Downloads (Last 6 weeks)50
Other Metrics
Citations
View Options
Get Access
Login options
Check if you have access through your login credentials or your institution to get full access on this article.
Sign in