Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/3311927.3325324acmconferencesArticle/Chapter ViewAbstractPublication PagesidcConference Proceedingsconference-collections
research-article

Anon what what?: Children's Understanding of the Language of Privacy

Published: 12 June 2019 Publication History

Abstract

Internet usage continues to increase among children ages 12 and younger. Because their digital interactions can be persistently stored, there is a need for building an understanding and foundational knowledge of privacy. We describe initial investigations into children's understanding of privacy from a Contextual Integrity (CI) perspective by conducting semi-structured interviews. We share results -- that echo what others have shown -- that indicate children have limited knowledge and understanding of CI principles. We also share an initial exploration of utilizing participatory design theater as a possible educational mechanism to help children develop a stronger understanding of important privacy principles.

References

[1]
Adam Barth, Anupam Datta, John C Mitchell, and Helen Nissenbaum. 2006. Privacy and contextual integrity: Framework and applications. (2006), 15--pp.
[2]
Kathy Charmaz and Linda L. Belgrave. 2012. Qualitative interviewing and grounded theory analysis. The SAGE Handbook of Interview Research: The Complexity of the Craft (Jan. 2012), 347--366.
[3]
John W. Creswell. 1998. Qualitative inquiry and research design: choosing among five traditions. Sage Publications. Google-Books-ID: bjO2AAAAIAAJ.
[4]
Priya Kumar, Shalmali Milind Naik, Utkarsha Ramesh Devkar, Marshini Chetty, Tamara L. Clegg, and Jessica Vitak. 2017. 'No Telling Passcodes Out Because They're Private': Understanding Children's Mental Models of Privacy and Security Online. Proceedings of the ACM on Human-Computer Interaction 1, CSCW (Dec. 2017), 1--21.
[5]
Priya Kumar, Jessica Vitak, Marshini Chetty, Tamara L Clegg, Jonathan Yang, Brenna McNally, and Elizabeth Bonsignore. 2018. Co-designing online privacy-related games and stories with children. In Proceedings of the 17th ACM Conference on Interaction Design and Children. ACM, 67--79.
[6]
Helen Nissenbaum. 2009. Privacy in context: Technology, policy, and the integrity of social life. Stanford University Press.
[7]
Janet C Read and Russell Beale. 2009. Under my pillow: designing security for children's special things. (2009), 5.
[8]
Leah Zhang-Kennedy, Yomna Abdelaziz, and Sonia Chiasson. 2017. Cyberheroes: The design and evaluation of an interactive ebook to educate children about online privacy. International Journal of Child-Computer Interaction 13 (2017), 10--18.
[9]
Jun Zhao, Ge Wang, Carys Dally, Petr Slovak, Julian Childs, Max Van Klee, and Nigel Shadbolt. 2019. I make up a silly name': Understanding Children's Perception of Privacy Risks Online. arXiv preprint arXiv:1901.10245 (2019).

Cited By

View all
  • (2023)Youth understandings of online privacy and securityProceedings of the Nineteenth USENIX Conference on Usable Privacy and Security10.5555/3632186.3632208(399-416)Online publication date: 7-Aug-2023
  • (2023)Understanding Research Related to Designing for Children's Privacy and Security: A Document AnalysisProceedings of the 22nd Annual ACM Interaction Design and Children Conference10.1145/3585088.3589375(335-354)Online publication date: 19-Jun-2023
  • (2022)All the World is our StageNordic Human-Computer Interaction Conference10.1145/3546155.3546705(1-15)Online publication date: 8-Oct-2022

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
IDC '19: Proceedings of the 18th ACM International Conference on Interaction Design and Children
June 2019
787 pages
ISBN:9781450366908
DOI:10.1145/3311927
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 12 June 2019

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. children
  2. contextual integrity
  3. participatory design
  4. privacy
  5. security

Qualifiers

  • Research-article
  • Research
  • Refereed limited

Conference

IDC '19
Sponsor:
IDC '19: Interaction Design and Children
June 12 - 15, 2019
ID, Boise, USA

Acceptance Rates

IDC '19 Paper Acceptance Rate 41 of 124 submissions, 33%;
Overall Acceptance Rate 172 of 578 submissions, 30%

Upcoming Conference

IDC '25
Interaction Design and Children
June 23 - 26, 2025
Reykjavik , Iceland

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)29
  • Downloads (Last 6 weeks)3
Reflects downloads up to 25 Feb 2025

Other Metrics

Citations

Cited By

View all
  • (2023)Youth understandings of online privacy and securityProceedings of the Nineteenth USENIX Conference on Usable Privacy and Security10.5555/3632186.3632208(399-416)Online publication date: 7-Aug-2023
  • (2023)Understanding Research Related to Designing for Children's Privacy and Security: A Document AnalysisProceedings of the 22nd Annual ACM Interaction Design and Children Conference10.1145/3585088.3589375(335-354)Online publication date: 19-Jun-2023
  • (2022)All the World is our StageNordic Human-Computer Interaction Conference10.1145/3546155.3546705(1-15)Online publication date: 8-Oct-2022

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media