{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,9]],"date-time":"2026-01-09T13:18:22Z","timestamp":1767964702227,"version":"3.49.0"},"publisher-location":"Cham","reference-count":82,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783030856090","type":"print"},{"value":"9783030856106","type":"electronic"}],"license":[{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021]]},"DOI":"10.1007\/978-3-030-85610-6_39","type":"book-chapter","created":{"date-parts":[[2021,8,25]],"date-time":"2021-08-25T06:03:15Z","timestamp":1629871395000},"page":"676-700","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":12,"title":["Designing Parental Monitoring and Control Technology: A Systematic Review"],"prefix":"10.1007","author":[{"given":"Zainab","family":"Iftikhar","sequence":"first","affiliation":[]},{"given":"Qutaiba Rohan ul","family":"Haq","sequence":"additional","affiliation":[]},{"given":"Osama","family":"Younus","sequence":"additional","affiliation":[]},{"given":"Taha","family":"Sardar","sequence":"additional","affiliation":[]},{"given":"Hammad","family":"Arif","sequence":"additional","affiliation":[]},{"given":"Mobin","family":"Javed","sequence":"additional","affiliation":[]},{"given":"Suleman","family":"Shahid","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,8,26]]},"reference":[{"key":"39_CR1","unstructured":"Cyberbullying statistics. https:\/\/internetsafety101.org\/cyberbullyingstatistics"},{"key":"39_CR2","unstructured":"Ict facts and figures (2017). https:\/\/www.itu.int\/en\/ITU-D\/Statistics\/Documents\/facts\/ICTFactsFigures2017.pdf"},{"key":"39_CR3","unstructured":"Measuring digital development facts and figures (2019). https:\/\/www.itu.int\/en\/ITU-D\/Statistics\/Documents\/facts\/FactsFigures2019.pdf"},{"key":"39_CR4","unstructured":"The state of the world\u2019s children 2017 children in a digital world. https:\/\/www.unicef.org\/media\/48601\/file"},{"key":"39_CR5","unstructured":"Children and parents: Media use and attitudes report, November 2017"},{"key":"39_CR6","unstructured":"Extent of cellphone usage by children and teens worldwide, November 2017. https:\/\/www.tnuda.org.il\/en\/populations-risk\/children-adolescents---introduction\/extent-cellphone-usage-children-and-teens"},{"key":"39_CR7","unstructured":"out 10 teens want parents to use parental controls, February 2018. https:\/\/www.internetmatters.org\/hub\/esafety-news\/revealed-7-10-teens-want-parents-set-filters-protect-online\/"},{"key":"39_CR8","unstructured":"A decade of digital dependency, May 2019. https:\/\/www.ofcom.org.uk\/about-ofcom\/latest\/features-and-news\/decade-of-digital-dependency"},{"key":"39_CR9","unstructured":"Done right, internet use among children can increase learning opportunities and build digital skills (2019). https:\/\/www.unicef.org\/press-releases\/done-right-internet-use-among-children-can-increase-learning-opportunities-and-build"},{"key":"39_CR10","unstructured":"Children at increased risk of harm online during global covid-19 pandemic, September 2020. https:\/\/www.unicef.org\/press-releases\/children-increased-risk-harm-online-during-global-covid-19-pandemic"},{"key":"39_CR11","doi-asserted-by":"crossref","unstructured":"Al Mugni, A., Herdiansah, M.F., Andhika, M.G., Ridwan, M.: DNSBL for internet content filtering utilizing pfsense as the next generation of opensource firewall. In: 2019 6th International Conference on Electrical Engineering, Computer Science and Informatics (EECSI), pp. 117\u2013121 (2019)","DOI":"10.23919\/EECSI48112.2019.8977017"},{"key":"39_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1007\/978-3-030-21905-5_1","volume-title":"Social Computing and Social Media. Communication and Social Communities","author":"T Alelyani","year":"2019","unstructured":"Alelyani, T., Ghosh, A.K., Moralez, L., Guha, S., Wisniewski, P.: Examining parent versus child reviews of parental control apps on Google Play. In: Meiselwitz, G. (ed.) HCII 2019. LNCS, vol. 11579, pp. 3\u201321. Springer, Cham (2019). https:\/\/doi.org\/10.1007\/978-3-030-21905-5_1"},{"key":"39_CR13","doi-asserted-by":"crossref","unstructured":"Alqahtani, N., Furnell, S., Atkinson, S., Stengel, I.: Internet risks for children: Parents\u2019 perceptions and attitudes: an investigative study of the Saudi context. In: 2017 Internet Technologies and Applications (ITA), pp. 98\u2013103 (2017)","DOI":"10.1109\/ITECHA.2017.8101918"},{"key":"39_CR14","doi-asserted-by":"crossref","unstructured":"Altarturi, H.H., Saadoon, M., Anuar, N.B.: Cyber parental control: a bibliometric study. Child. Youth Serv. Rev. 116, 105134 (2020)","DOI":"10.1016\/j.childyouth.2020.105134"},{"key":"39_CR15","unstructured":"Anderson, M.: Parents, teens and digital monitoring, January 2016. https:\/\/www.pewresearch.org\/internet\/2016\/01\/07\/parents-teens-and-digital-monitoring\/"},{"key":"39_CR16","unstructured":"Anderson, M.: A majority of teens have experienced some form of cyberbullying, September 2018. https:\/\/www.pewresearch.org\/internet\/2018\/09\/27\/a-majority-of-teens-have-experienced-some-form-of-cyberbullying\/"},{"key":"39_CR17","unstructured":"Anderson, M., Jiang, J.: Teens, social media and technology 2018, May 2018. https:\/\/www.pewresearch.org\/internet\/2018\/05\/31\/teens-social-media-technology-2018\/"},{"key":"39_CR18","doi-asserted-by":"crossref","unstructured":"Badillo-Urquiola, K., Page, X., Wisniewski, P.J.: Risk vs. restriction: the tension between providing a sense of normalcy and keeping foster teens safe online. In: Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems, pp. 1\u201314. CHI 2019. ACM, New York (2019)","DOI":"10.1145\/3290605.3300497"},{"key":"39_CR19","doi-asserted-by":"crossref","unstructured":"Badillo-Urquiola, K., Smriti, D., McNally, B., Golub, E., Bonsignore, E., Wisniewski, P.J.: Stranger danger! social media app features co-designed with children to keep them safe online. In: Proceedings of the 18th ACM International Conference on Interaction Design and Children, pp. 394\u2013406. IDC 2019. ACM, New York (2019)","DOI":"10.1145\/3311927.3323133"},{"key":"39_CR20","doi-asserted-by":"publisher","first-page":"2187","DOI":"10.3389\/fpsyg.2018.02187","volume":"9","author":"X Bi","year":"2018","unstructured":"Bi, X., Yang, Y., Li, H., Wang, M., Zhang, W., Deater-Deckard, K.: Parenting styles and parent-adolescent relationships: the mediating roles of behavioral autonomy and parental authority. Front. Psychol. 9, 2187 (2018)","journal-title":"Front. Psychol."},{"key":"39_CR21","series-title":"IFIP Advances in Information and Communication Technology","doi-asserted-by":"publisher","first-page":"253","DOI":"10.1007\/978-3-030-19115-3_21","volume-title":"Information and Communication Technologies for Development. Strengthening Southern-Driven Cooperation as a Catalyst for ICT4D","author":"J van Biljon","year":"2019","unstructured":"van Biljon, J., Renaud, K.: Human-computer interaction for development (HCI4D): the Southern African landscape. In: Nielsen, P., Kimaro, H.C. (eds.) ICT4D 2019. IAICT, vol. 552, pp. 253\u2013266. Springer, Cham (2019). https:\/\/doi.org\/10.1007\/978-3-030-19115-3_21"},{"key":"39_CR22","doi-asserted-by":"crossref","unstructured":"Blackwell, L., Gardiner, E., Schoenebeck, S.: Managing expectations: technology tensions among parents and teens. In: Proceedings of the 19th ACM Conference on Computer-Supported Cooperative Work and Social Computing, pp. 1390\u20131401. CSCW 2016. ACM, New York (2016)","DOI":"10.1145\/2818048.2819928"},{"key":"39_CR23","unstructured":"Bray, R.: Young people online: encounters with inappropriate content, May 2017. http:\/\/eprints.lse.ac.uk\/79155\/"},{"key":"39_CR24","doi-asserted-by":"publisher","first-page":"142","DOI":"10.1016\/j.chb.2016.05.017","volume":"63","author":"FL Broekman","year":"2016","unstructured":"Broekman, F.L., Piotrowski, J.T., Beentjes, H.W., Valkenburg, P.M.: A parental perspective on apps for young children. Comput. Hum. Behav. 63, 142\u2013151 (2016)","journal-title":"Comput. Hum. Behav."},{"key":"39_CR25","doi-asserted-by":"crossref","unstructured":"Buzzi, M.: Children and Youtube: access to safe content. In: Proceedings of the 9th ACM SIGCHI Italian Chapter International Conference on Computer-Human Interaction: Facing Complexity, pp. 125\u2013131. CHItaly. ACM, New York (2011)","DOI":"10.1145\/2037296.2037328"},{"key":"39_CR26","doi-asserted-by":"crossref","unstructured":"B\u00e9langer, F., Crossler, R.E., Hiller, J.S., Park, J.M., Hsiao, M.S.: Pocket: a tool for protecting children\u2019s privacy online. Decision Support Syst. 54(2), 1161\u20131173 (2013)","DOI":"10.1016\/j.dss.2012.11.010"},{"issue":"1","key":"39_CR27","doi-asserted-by":"publisher","first-page":"98","DOI":"10.1177\/0002716203260102","volume":"591","author":"RF Catalano","year":"2004","unstructured":"Catalano, R.F., Berglund, M.L., Ryan, J.A.M., Lonczak, H.S., Hawkins, J.D.: Positive youth development in the United States: research findings on evaluations of positive youth development programs. ANNALS Am. Acad. Polit. Soc. Sci. 591(1), 98\u2013124 (2004)","journal-title":"ANNALS Am. Acad. Polit. Soc. Sci."},{"key":"39_CR28","unstructured":"Cherry, K.: What is authoritarian parenting? (2021). https:\/\/www.verywellmind.com\/what-is-authoritarian-parenting-2794955"},{"key":"39_CR29","doi-asserted-by":"crossref","unstructured":"Chiu, C., Yang, C.: A defense tool to prevent inappropriate website on Internet. In: 2019 International Conference on Intelligent Computing and its Emerging Applications (ICEA), pp. 51\u201354 (2019)","DOI":"10.1109\/ICEA.2019.8858308"},{"key":"39_CR30","unstructured":"Clement, J.: Digital users worldwide 2020, July 2020. https:\/\/www.statista.com\/statistics\/617136\/digital-population-worldwide\/"},{"key":"39_CR31","unstructured":"Clement, J.: Most used social media platform, August 2020. https:\/\/www.statista.com\/statistics\/272014\/global-social-networks-ranked-by-number-of-users\/"},{"key":"39_CR32","unstructured":"Cohen, J.: Online communication platforms see record rise since quarantine began, April 2020. https:\/\/www.pcmag.com\/news\/online-communication-platforms-see-record-rise-since-quarantine-began"},{"key":"39_CR33","unstructured":"Cranor, L.F., Durity, A.L., Marsh, A., Ur, B.: Parents\u2019 and teens\u2019 perspectives on privacy in a technology-filled world. In: Proceedings of the Tenth USENIX Conference on Usable Privacy and Security, pp. 19\u201335. SOUPS 2014, USENIX Association, USA (2014)"},{"key":"39_CR34","doi-asserted-by":"crossref","unstructured":"Fahrnberger, G., Nayak, D., Martha, V.S., Ramaswamy, S.: Safechat: A tool to shield children\u2019s communication from explicit messages. In: 2014 14th International Conference on Innovations for Community Services (I4CS), pp. 80\u201386 (2014)","DOI":"10.1109\/I4CS.2014.6860557"},{"key":"39_CR35","unstructured":"Friedman, B., Kahn, P., Borning, A.: Value sensitive design: theory and methods. University of Washington technical report (2-12) (2002)"},{"key":"39_CR36","doi-asserted-by":"crossref","unstructured":"Fuertes, W., Quimbiulco, K., Gal\u00e1rraga, F., Garc\u00eda-Dorado, J.L.: On the development of advanced parental control tools. In: 2015 1st International Conference on Software Security and Assurance (ICSSA), pp. 1\u20136 (2015)","DOI":"10.1109\/ICSSA.2015.011"},{"key":"39_CR37","unstructured":"GDN: Developing nations face illiteracy crisis, warns UNESCO, February 2014. https:\/\/www.scmp.com\/lifestyle\/family-education\/article\/1423008\/developing-nations-face-illiteracy-crisis-warns-unesco"},{"key":"39_CR38","doi-asserted-by":"crossref","unstructured":"Ghosh, A.K., Badillo-Urquiola, K., Guha, S., LaViola Jr, J.J., Wisniewski, P.J.: Safety vs. surveillance: what children have to say about mobile apps for parental control. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1\u201314. CHI 2018. ACM, New York (2018)","DOI":"10.1145\/3173574.3173698"},{"key":"39_CR39","doi-asserted-by":"crossref","unstructured":"Ghosh, A.K., Badillo-Urquiola, K., Rosson, M.B., Xu, H., Carroll, J.M., Wisniewski, P.J.: A matter of control or safety? Examining parental use of technical monitoring apps on teens\u2019 mobile devices. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1\u201314. CHI 2018. ACM, New York (2018)","DOI":"10.1145\/3173574.3173768"},{"key":"39_CR40","doi-asserted-by":"crossref","unstructured":"Ghosh, A.K., Badillo-Urquiola, K.A., Xu, H., Rosson, M.B., Carroll, J.M., Wisniewski, P.: Examining parents\u2019 technical mediation of teens\u2019 mobile devices. In: Companion of the 2017 ACM Conference on Computer Supported Cooperative Work and Social Computing, pp. 179\u2013182. CSCW 2017 Companion. ACM, New York (2017)","DOI":"10.1145\/3022198.3026306"},{"key":"39_CR41","doi-asserted-by":"crossref","unstructured":"Ghosh, A.K., Hughes, C.E., Wisniewski, P.J.: Circle of trust: a new approach to mobile online safety for families. In: Proceedings of the 2020 CHI Conference on Human Factors in Computing Systems, pp. 1\u201314. CHI 2020. ACM, New York (2020)","DOI":"10.1145\/3313831.3376747"},{"key":"39_CR42","doi-asserted-by":"crossref","unstructured":"Ghosh, A.K., Wisniewski, P.: In: Understanding user reviews of adolescent mobile safety apps: a thematic analysis, pp. 417\u2013420. GROUP 2016. ACM, New York (2016)","DOI":"10.1145\/2957276.2996283"},{"key":"39_CR43","unstructured":"Griffith, E.: Almost two-thirds of us workforce must work from home, many with crap Internet, April 2020. https:\/\/www.pcmag.com\/news\/almost-two-thirds-of-us-workforce-must-work-from-home-many-with-crap-internet"},{"key":"39_CR44","doi-asserted-by":"crossref","unstructured":"Guerrero, M.J.C., Forment, M.A.: Coping with and addressing the risks of children tv and online devices usage: a review and proposal of guidelines for parents. In: Proceedings of the Seventh International Conference on Technological Ecosystems for Enhancing Multiculturality, pp. 891\u2013898. TEEM 2019. ACM, New York (2019)","DOI":"10.1145\/3362789.3362882"},{"key":"39_CR45","doi-asserted-by":"crossref","unstructured":"G\u00f3mez, P., Harris, S.K., Barreiro, C., Isorna, M., Rial, A.: Profiles of internet use and parental involvement, and rates of online risks and problematic internet use among Spanish adolescents. Comput. Hum. Behav. 75, 826\u2013833 (2017)","DOI":"10.1016\/j.chb.2017.06.027"},{"key":"39_CR46","doi-asserted-by":"crossref","unstructured":"Hamade, S.N.: Parental awareness and mediation of children\u2019s Internet use in Kuwait. In: 2015 12th International Conference on Information Technology - New Generations, pp. 640\u2013645 (2015)","DOI":"10.1109\/ITNG.2015.107"},{"key":"39_CR47","doi-asserted-by":"crossref","unstructured":"Hartikainen, H., Iivari, N., Kinnula, M.: Should we design for control, trust or involvement? A discourses survey about children\u2019s online safety. In: Proceedings of the The 15th International Conference on Interaction Design and Children, pp. 367\u2013378. IDC 2016. ACM, New York (2016)","DOI":"10.1145\/2930674.2930680"},{"key":"39_CR48","doi-asserted-by":"crossref","unstructured":"Hashish, Y., Bunt, A., Young, J.E.: Involving children in content control: a collaborative and education-oriented content filtering approach. In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, pp. 1797\u20131806. CHI 2014. ACM, New York (2014)","DOI":"10.1145\/2556288.2557128"},{"key":"39_CR49","doi-asserted-by":"crossref","unstructured":"Hundlani, K., Chiasson, S., Hamid, L.: No passwords needed: the iterative design of a parent-child authentication mechanism. In: Proceedings of the 19th International Conference on Human-Computer Interaction with Mobile Devices and Services. MobileHCI 2017. ACM, New York (2017)","DOI":"10.1145\/3098279.3098550"},{"key":"39_CR50","doi-asserted-by":"crossref","unstructured":"Isola, S., Fails, J.A.: Family and design in the idc and chi communities. In: Proceedings of the 11th International Conference on Interaction Design and Children, pp. 40\u201349. IDC 2012. ACM, New York (2012)","DOI":"10.1145\/2307096.2307102"},{"key":"39_CR51","unstructured":"Jackson, K.: A brief history of the smartphone, July 2018. https:\/\/sciencenode.org\/feature\/Howdidsmartphonesevolve.php"},{"issue":"5","key":"39_CR52","doi-asserted-by":"publisher","first-page":"1039","DOI":"10.1007\/s10964-014-0242-4","volume":"44","author":"A Khurana","year":"2015","unstructured":"Khurana, A., Bleakley, A., Jordan, A.B., Romer, D.: The protective effects of parental monitoring and internet restriction on adolescents\u2019 risk of online harassment. J. Youth Adolescence 44(5), 1039\u20131047 (2015)","journal-title":"J. Youth Adolescence"},{"key":"39_CR53","doi-asserted-by":"crossref","unstructured":"Ko, M., Choi, S., Yang, S., Lee, J., Lee, U.: Familync: Facilitating participatory parental mediation of adolescents\u2019 smartphone use. In: Proceedings of the 2015 ACM International Joint Conference on Pervasive and Ubiquitous Computing, pp. 867\u2013878. UbiComp 2015. ACM, New York (2015)","DOI":"10.1145\/2750858.2804283"},{"key":"39_CR54","doi-asserted-by":"crossref","unstructured":"Kumar, M.S., Kumar, P.N., Deepa, R.: Protection against pornography. In: 2016 IEEE International Conference on Engineering and Technology (ICETECH), pp. 837\u2013839 (2016)","DOI":"10.1109\/ICETECH.2016.7569365"},{"key":"39_CR55","doi-asserted-by":"crossref","unstructured":"Kumar, P., Naik, S.M., Devkar, U.R., Chetty, M., Clegg, T.L., Vitak, J.: \u2019no telling passcodes out because they\u2019re private\u2019: understanding children\u2019s mental models of privacy and security online. Proceedings ACM Human-Computer Interaction 1(CSCW), December 2017","DOI":"10.1145\/3134699"},{"key":"39_CR56","doi-asserted-by":"crossref","unstructured":"Kuzminykh, A., Lank, E.: How much is too much? Understanding the information needs of parents of young children. Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies, vol. 3, no.2, June 2019","DOI":"10.1145\/3328923"},{"key":"39_CR57","doi-asserted-by":"crossref","unstructured":"Lee, J., Jude, A., Shirazipour, M., Forgeat, J.: \u201c I don\u2019t need to see that\u201d seeking, avoiding, and attempting to control video content. In: Extended Abstracts of the 2018 CHI Conference on Human Factors in Computing Systems, pp.\u00a01\u20136 (2018)","DOI":"10.1145\/3170427.3188488"},{"key":"39_CR58","unstructured":"Lenhart, A.: Teens, technology and friendships, August 2015. https:\/\/www.pewresearch.org\/internet\/2015\/08\/06\/chapter-4-social-media-and-friendships\/"},{"key":"39_CR59","doi-asserted-by":"crossref","unstructured":"Majchrowicz, M., Kapusta, P., Faustryjak, D., Jackowska-Strumillo, L.: System for remote parental control and management of rooted smart TVs. In: 2018 International Interdisciplinary PhD Workshop (IIPhDW), pp. 357\u2013360 (2018)","DOI":"10.1109\/IIPHDW.2018.8388390"},{"key":"39_CR60","doi-asserted-by":"crossref","unstructured":"McNally, B., et al.: Co-designing mobile online safety applications with children. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1\u20139. CHI 2018. ACM, New York (2018)","DOI":"10.1145\/3173574.3174097"},{"key":"39_CR61","unstructured":"Md Noor, R., Noor Sahila Syed Jamal, S., Zakaria, K.H.: Parental mobile control system for children\u2019s internet use. In: International Conference on Information Society (i-Society 2012), pp. 511\u2013513 (2012)"},{"key":"39_CR62","doi-asserted-by":"crossref","unstructured":"Nouwen, M., Van Mechelen, M., Zaman, B.: A value sensitive design approach to parental software for young children. In: Proceedings of the 14th International Conference on Interaction Design and Children, pp. 363\u2013366. IDC 2015. ACM, New York (2015)","DOI":"10.1145\/2771839.2771917"},{"key":"39_CR63","doi-asserted-by":"publisher","first-page":"22","DOI":"10.1016\/j.ijcci.2018.06.001","volume":"18","author":"M Nouwen","year":"2018","unstructured":"Nouwen, M., Zaman, B.: Redefining the role of parents in young children\u2019s online interactions. a value-sensitive design case study. Int. J. Child-Comput. Interact.Interaction 18, 22\u201326 (2018)","journal-title":"Int. J. Child-Comput. Interact.Interaction"},{"key":"39_CR64","doi-asserted-by":"crossref","unstructured":"Padilla-Walker, L.M., Coyne, S.M.: \u201cTurn that thing off!\u201d parent and adolescent predictors of proactive media monitoring. J. Adolescence 34(4), 705\u2013715 (2011)","DOI":"10.1016\/j.adolescence.2010.09.002"},{"issue":"5","key":"39_CR65","doi-asserted-by":"publisher","first-page":"1153","DOI":"10.1016\/j.adolescence.2012.03.005","volume":"35","author":"LM Padilla-Walker","year":"2012","unstructured":"Padilla-Walker, L.M., Coyne, S.M., Fraser, A.M., Dyer, W.J., Yorgason, J.B.: Parents and adolescents growing up in the digital age: latent growth curve analysis of proactive media monitoring. J. Adolescence 35(5), 1153\u20131165 (2012)","journal-title":"J. Adolescence"},{"key":"39_CR66","doi-asserted-by":"crossref","unstructured":"Pinter, A.T., Wisniewski, P.J., Xu, H., Rosson, M.B., Caroll, J.M.: Adolescent online safety: Moving beyond formative evaluations to designing solutions for the future. In: Proceedings of the 2017 Conference on Interaction Design and Children, pp. 352\u2013357. IDC 2017. ACM, New York (2017)","DOI":"10.1145\/3078072.3079722"},{"key":"39_CR67","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"176","DOI":"10.1007\/978-3-030-22351-9_12","volume-title":"HCI for Cybersecurity, Privacy and Trust","author":"A Prasad","year":"2019","unstructured":"Prasad, A., Ruiz, R., Stablein, T.: Understanding parents\u2019 concerns with smart device usage in the home. In: Moallem, A. (ed.) HCII 2019. LNCS, vol. 11594, pp. 176\u2013190. Springer, Cham (2019). https:\/\/doi.org\/10.1007\/978-3-030-22351-9_12"},{"key":"39_CR68","doi-asserted-by":"crossref","unstructured":"Ringland, K.E., Wolf, C.T., Dombrowski, L., Hayes, G.R.: Making \u201csafe\": Community-centered practices in a virtual world dedicated to children with autism. In: Proceedings of the 18th ACM Conference on Computer Supported Cooperative Work and Social Computing, pp. 1788\u20131800. CSCW 2015. ACM, New York (2015)","DOI":"10.1145\/2675133.2675216"},{"key":"39_CR69","doi-asserted-by":"crossref","unstructured":"Santisarun, P., Boonkrong, S.: Social network monitoring application for parents with children under thirteen. In: 2015 7th International Conference on Knowledge and Smart Technology (KST), pp. 75\u201380 (2015)","DOI":"10.1109\/KST.2015.7051456"},{"key":"39_CR70","series-title":"Communications in Computer and Information Science","doi-asserted-by":"publisher","first-page":"645","DOI":"10.1007\/978-3-319-58753-0_91","volume-title":"HCI International 2017 \u2013 Posters\u2019 Extended Abstracts","author":"DJ Schiano","year":"2017","unstructured":"Schiano, D.J., Burg, C.: Parental controls: oxymoron and design opportunity. In: Stephanidis, C. (ed.) HCI 2017. CCIS, vol. 714, pp. 645\u2013652. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-58753-0_91"},{"key":"39_CR71","unstructured":"Silver, L.: Smartphone ownership is growing rapidly around the world, but not always equally, August 2020. https:\/\/www.pewresearch.org\/global\/2019\/02\/05\/smartphone-ownership-is-growing-rapidly-around-the-world-but-not-always-equally\/"},{"key":"39_CR72","unstructured":"Srl, C., Networks, D.G.f.C., Srl, I., Chancen, S.D., Angeletti, Croll, Vulcano: Benchmarking of parental control tools for the online protection of children : final report, May 2018. https:\/\/op.europa.eu\/en\/publication-detail\/-\/publication\/cbbf9543-58b7-11e8-ab41-01aa75ed71a1\/language-en"},{"key":"39_CR73","doi-asserted-by":"crossref","unstructured":"Suchaad, S.A., Mashiko, K., Ismail, N.B., Abidin, M.H.Z.: Blockchain use in home automation for children incentives in parental control. In: Proceedings of the 2018 International Conference on Machine Learning and Machine Intelligence, pp. 50\u201353. MLMI2018. ACM, New York (2018)","DOI":"10.1145\/3278312.3278326"},{"key":"39_CR74","doi-asserted-by":"publisher","first-page":"423","DOI":"10.1016\/j.chb.2017.04.004","volume":"73","author":"K Symons","year":"2017","unstructured":"Symons, K., Ponnet, K., Walrave, M., Heirman, W.: A qualitative study into parental mediation of adolescents\u2019 Internet use. Comput. Hum. Behav. 73, 423\u2013432 (2017)","journal-title":"Comput. Hum. Behav."},{"key":"39_CR75","doi-asserted-by":"crossref","unstructured":"W. L. Goh, W., Bay, S., Chen, V.H.H.: Young school children\u2019s use of digital devices and parental rules. Telematics Inform. 32(4), 787\u2013795 (2015)","DOI":"10.1016\/j.tele.2015.04.002"},{"key":"39_CR76","unstructured":"Webster, J., Watson, R.T.: Analyzing the past to prepare for the future: writing a literature review. MIS Q. 26(2), xiii\u2013xxiii (2002)"},{"key":"39_CR77","doi-asserted-by":"crossref","unstructured":"Wisniewski, P., Ghosh, A.K., Xu, H., Rosson, M.B., Carroll, J.M.: Parental control vs. teen self-regulation: is there a middle ground for mobile online safety? In: Proceedings of the 2017 ACM Conference on Computer Supported Cooperative Work and Social Computing, pp. 51\u201369. CSCW 2017. ACM, New York (2017)","DOI":"10.1145\/2998181.2998352"},{"key":"39_CR78","doi-asserted-by":"crossref","unstructured":"Wisniewski, P., Jia, H., Xu, H., Rosson, M.B., Carroll, J.M.: \u201cPreventative\" vs. \u201creactive\": How parental mediation influences teens\u2019 social media privacy behaviors. In: Proceedings of the 18th ACM Conference on Computer Supported Cooperative Work and Social Computing, pp. 302\u2013316. CSCW 2015. ACM, New York (2015)","DOI":"10.1145\/2675133.2675293"},{"key":"39_CR79","doi-asserted-by":"crossref","unstructured":"Wisniewski, P.J., Xu, H., Rosson, M.B., Carroll, J.M.: Adolescent online safety: the \u201cmoral\" of the story. In: Proceedings of the 17th ACM Conference on Computer Supported Cooperative Work and Social Computing, pp. 1258\u20131271. CSCW 2014. ACM, New York (2014)","DOI":"10.1145\/2531602.2531696"},{"key":"39_CR80","doi-asserted-by":"crossref","unstructured":"Yardi, S., Bruckman, A.: Social and technical challenges in parenting teens\u2019 social media use. In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, pp. 3237\u20133246. CHI 2011. ACM, New York (2011)","DOI":"10.1145\/1978942.1979422"},{"key":"39_CR81","doi-asserted-by":"crossref","unstructured":"Zhang-Kennedy, L., Mekhail, C., Abdelaziz, Y., Chiasson, S.: From nosy little brothers to stranger-danger: children and parents\u2019 perception of mobile threats. In: Proceedings of the 15th International Conference on Interaction Design and Children, pp. 388\u2013399. IDC 2016. ACM, New York (2016)","DOI":"10.1145\/2930674.2930716"},{"key":"39_CR82","series-title":"Communications in Computer and Information Science","doi-asserted-by":"publisher","first-page":"313","DOI":"10.1007\/978-3-030-23525-3_41","volume-title":"HCI International 2019 - Posters","author":"F Zimmer","year":"2019","unstructured":"Zimmer, F., Scheibe, K., Henkel, M.: How parents guide the digital media usage of kindergarten children in early childhood. In: Stephanidis, C. (ed.) HCII 2019. CCIS, vol. 1034, pp. 313\u2013320. Springer, Cham (2019). https:\/\/doi.org\/10.1007\/978-3-030-23525-3_41"}],"container-title":["Lecture Notes in Computer Science","Human-Computer Interaction \u2013 INTERACT 2021"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-85610-6_39","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,12,3]],"date-time":"2021-12-03T22:17:12Z","timestamp":1638569832000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-85610-6_39"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021]]},"ISBN":["9783030856090","9783030856106"],"references-count":82,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-85610-6_39","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021]]},"assertion":[{"value":"26 August 2021","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"INTERACT","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"IFIP Conference on Human-Computer Interaction","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Bari","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Italy","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2021","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"30 August 2021","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"3 September 2021","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"18","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"interact2021","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.interact2021.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"PCS","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"680","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"105","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"72","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"15% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}