{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,13]],"date-time":"2026-05-13T00:23:14Z","timestamp":1778631794341,"version":"3.51.4"},"publisher-location":"Cham","reference-count":37,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783031055621","type":"print"},{"value":"9783031055638","type":"electronic"}],"license":[{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022]]},"DOI":"10.1007\/978-3-031-05563-8_4","type":"book-chapter","created":{"date-parts":[[2022,5,13]],"date-time":"2022-05-13T16:08:55Z","timestamp":1652458135000},"page":"42-61","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":6,"title":["Mental Models of\u00a0the\u00a0Internet and\u00a0Its Online Risks: Children and\u00a0Their Parent(s)"],"prefix":"10.1007","author":[{"given":"Alexandra","family":"Mai","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Leonard","family":"Guelmino","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Katharina","family":"Pfeffer","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Edgar","family":"Weippl","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Katharina","family":"Krombholz","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2022,6,16]]},"reference":[{"key":"4_CR1","unstructured":"Brandom, R.: Inside elsagate, the conspiracy-fueled war on creepy Youtube kids videos. https:\/\/www.theverge.com\/2017\/12\/8\/16751206\/elsagate-youtube-kids-creepy-conspiracy-theory. Accessed 17 Nov 2020"},{"issue":"4","key":"4_CR2","doi-asserted-by":"publisher","first-page":"495","DOI":"10.1002\/hbe2.281","volume":"3","author":"JE Brodsky","year":"2021","unstructured":"Brodsky, J.E., Lodhi, A.K., Powers, K.L., Blumberg, F.C., Brooks, P.J.: \u201cIt\u2019s just everywhere now\u2019\u2019: middle-school and college students\u2019 mental models of the internet. Human Behav. Emerg. Technol. 3(4), 495\u2013511 (2021)","journal-title":"Human Behav. Emerg. Technol."},{"key":"4_CR3","doi-asserted-by":"publisher","first-page":"1947","DOI":"10.1007\/978-94-007-0753-5_3470","volume-title":"Encyclopedia of Critical Psychology","author":"V Clarke","year":"2014","unstructured":"Clarke, V., Braun, V.: Thematic analysis. In: Michalos, M.C. (ed.) Encyclopedia of Critical Psychology, pp. 1947\u20131952. Springer, Heidelberg (2014). https:\/\/doi.org\/10.1007\/978-94-007-0753-5_3470"},{"issue":"1","key":"4_CR4","doi-asserted-by":"publisher","first-page":"37","DOI":"10.1177\/001316446002000104","volume":"20","author":"J Cohen","year":"1960","unstructured":"Cohen, J.: A coefficient of agreement for nominal scales. Educ. Psychol. Measur. 20(1), 37\u201346 (1960)","journal-title":"Educ. Psychol. Measur."},{"key":"4_CR5","unstructured":"Consulting, I.: General Data Protection Regulation GDPR. https:\/\/gdpr-info.eu\/. Accessed 14 Jan 2021"},{"key":"4_CR6","unstructured":"Cranor, L.F., Durity, A.L., Marsh, A., Ur, B.: \u2018Parents\u2019 and \u2018teens\u2019 perspectives on privacy in a technology-filled world. In: 10th Symposium On Usable Privacy and Security (SOUPS\u2019 14), pp. 19\u201335 (2014)"},{"key":"4_CR7","volume-title":"Handbook of Child Psychology, Cognition, Perception, and Language","author":"W Damon","year":"2006","unstructured":"Damon, W., Lerner, R.M., Kuhn, D., Siegler, R.S.: Handbook of Child Psychology, Cognition, Perception, and Language. Wiley, Hoboken (2006)"},{"key":"4_CR8","unstructured":"Dell\u2019Antonia, K.: When should a child get an e-mail account? https:\/\/parenting.blogs.nytimes.com\/2013\/01\/11\/when-should-a-child-get-an-e-mail-account\/. Accessed 08 Feb 2021"},{"key":"4_CR9","doi-asserted-by":"crossref","unstructured":"Diethelm, I., Wilken, H., Zumbr\u00e4gel, S.: An investigation of secondary school students\u2019 conceptions on how the internet works. In: Proceedings of the 12th Koli Calling International Conference on Computing Education Research, pp. 67\u201373 (2012)","DOI":"10.1145\/2401796.2401804"},{"issue":"1","key":"4_CR10","doi-asserted-by":"publisher","first-page":"45","DOI":"10.1111\/bjet.12529","volume":"49","author":"S Edwards","year":"2018","unstructured":"Edwards, S., Nolan, A., Henderson, M., Mantilla, A., Plowman, L., Skouteris, H.: Young children\u2019s everyday concepts of the internet: a platform for cyber-safety education in the early years. Br. J. Educ. Technol. 49(1), 45\u201355 (2018)","journal-title":"Br. J. Educ. Technol."},{"key":"4_CR11","doi-asserted-by":"crossref","unstructured":"Eskel\u00e4-Haapanen, S., Kiili, C.: \u2018It goes around the world\u2019-children\u2019s understanding of the internet. Nordic J. Digit. Literacy 14(3\u201304), 175\u2013187 (2019)","DOI":"10.18261\/issn.1891-943x-2019-03-04-07"},{"issue":"1","key":"4_CR12","doi-asserted-by":"publisher","first-page":"53","DOI":"10.1177\/1476718X10367471","volume":"9","author":"LA Ey","year":"2011","unstructured":"Ey, L.A., Glenn Cupit, C.: Exploring young children\u2019s understanding of risks associated with internet usage and their concepts of management strategies. J. Early Childhood Res. 9(1), 53\u201365 (2011)","journal-title":"J. Early Childhood Res."},{"key":"4_CR13","unstructured":"Fripp, C.: Check this list: 3.2 billion leaked usernames and passwords. https:\/\/www.komando.com\/security-privacy\/3-billion-leaked-passwords\/777661\/. Accessed 10 Feb 2021"},{"key":"4_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"162","DOI":"10.1007\/978-3-642-40779-6_14","volume-title":"Communications and Multimedia Security","author":"J Fruth","year":"2013","unstructured":"Fruth, J., Schulze, C., Rohde, M., Dittmann, J.: E-learning of IT security threats: a game prototype for children. In: De Decker, B., Dittmann, J., Kraetzer, C., Vielhauer, C. (eds.) CMS 2013. LNCS, vol. 8099, pp. 162\u2013172. Springer, Heidelberg (2013). https:\/\/doi.org\/10.1007\/978-3-642-40779-6_14"},{"issue":"1","key":"4_CR15","doi-asserted-by":"publisher","first-page":"17","DOI":"10.1111\/cdev.12826","volume":"89","author":"SA Gelman","year":"2018","unstructured":"Gelman, S.A., Martinez, M., Davidson, N.S., Noles, N.S.: Developing digital privacy: children\u2019s moral judgments concerning mobile GPS devices. Child Dev. 89(1), 17\u201326 (2018)","journal-title":"Child Dev."},{"key":"4_CR16","unstructured":"Holloway, D., Green, L., Livingstone, S.: Zero to eight: young children and their internet use (2013)"},{"key":"4_CR17","doi-asserted-by":"crossref","unstructured":"Ishikawa, A., Bollis, E., Avila, S.: Combating the Elsagate phenomenon: deep learning architectures for disturbing cartoons. arXiv preprint arXiv:1904.08910 (2019)","DOI":"10.1109\/IWBF.2019.8739202"},{"key":"4_CR18","unstructured":"Johnson, J.: Global digital population as of October 2020. https:\/\/www.statista.com\/statistics\/617136\/digital-population-worldwide\/. Accessed 08 Jan 2021"},{"issue":"5","key":"4_CR19","doi-asserted-by":"publisher","first-page":"579","DOI":"10.1177\/0013916597295001","volume":"29","author":"AR Kearney","year":"1997","unstructured":"Kearney, A.R., Kaplan, S.: Toward a methodology for the measurement of knowledge structures of ordinary people: the conceptual content cognitive map (3CM). Environ. Behav. 29(5), 579\u2013617 (1997)","journal-title":"Environ. Behav."},{"key":"4_CR20","doi-asserted-by":"crossref","unstructured":"Krombholz, K., Busse, K., Pfeffer, K., Smith, M., von Zezschwitz, E.: \u201cif https were secure, i wouldn\u2019t need 2FA\u201d-end user and administrator mental models of https. In: 2019 IEEE Symposium on Security and Privacy (S&P\u201919), pp. 246\u2013263. IEEE (2019)","DOI":"10.1109\/SP.2019.00060"},{"key":"4_CR21","doi-asserted-by":"crossref","unstructured":"Kumar, P., Naik, S.M., Devkar, U.R., Chetty, M., Clegg, T.L., Vitak, J.: \u2018No telling passcodes out because they\u2019re private\u2019 understanding children\u2019s mental models of privacy and security online. In: Proceedings of the ACM on Human-Computer Interaction 1(CSCW), pp. 1\u201321 (2017)","DOI":"10.1145\/3134699"},{"key":"4_CR22","unstructured":"Livingstone, S.: Children\u2019s privacy online: experimenting with boundaries within and beyond the family (2006)"},{"key":"4_CR23","unstructured":"Mai, A., Pfeffer, K., Gusenbauer, M., Weippl, E., Krombholz, K.: User mental models of cryptocurrency systems-a grounded theory approach. In: Sixteenth Symposium on Usable Privacy and Security (SOUPS\u2019 20), pp. 341\u2013358 (2020)"},{"key":"4_CR24","doi-asserted-by":"crossref","unstructured":"McReynolds, E., Hubbard, S., Lau, T., Saraf, A., Cakmak, M., Roesner, F.: Toys that listen: a study of parents, children, and internet-connected toys. In: Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems, pp. 5197\u20135207 (2017)","DOI":"10.1145\/3025453.3025735"},{"key":"4_CR25","unstructured":"Oy, H.R.: Hello Ruby Books Series. http:\/\/www.helloruby.com\/books. Accessed 12 Dec 2021"},{"key":"4_CR26","doi-asserted-by":"crossref","unstructured":"Papadamou, K., et al.: Disturbed Youtube for kids: characterizing and detecting inappropriate videos targeting young children. In: Proceedings of the International AAAI Conference on Web and Social Media, vol. 14, pp. 522\u2013533 (2020)","DOI":"10.1609\/icwsm.v14i1.7320"},{"issue":"4","key":"4_CR27","doi-asserted-by":"publisher","first-page":"341","DOI":"10.1007\/s10639-005-3431-7","volume":"10","author":"M Papastergiou","year":"2005","unstructured":"Papastergiou, M.: Students\u2019 mental models of the internet and their didactical exploitation in informatics education. Educ. Inf. Technol. 10(4), 341\u2013360 (2005)","journal-title":"Educ. Inf. Technol."},{"key":"4_CR28","doi-asserted-by":"crossref","unstructured":"Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1\u201317 (2012)","DOI":"10.1145\/2335356.2335364"},{"issue":"4","key":"4_CR29","doi-asserted-by":"publisher","first-page":"25","DOI":"10.1007\/BF02300489","volume":"43","author":"DL Sharp","year":"1995","unstructured":"Sharp, D.L., Bransford, J.D., Goldman, S.R., Risko, V.J., Kinzer, C.K., Vye, N.J.: Dynamic visual support for story comprehension and mental model building by young, at-risk children. Educ. Technol. Res. Dev. 43(4), 25\u201342 (1995). https:\/\/doi.org\/10.1007\/BF02300489","journal-title":"Educ. Technol. Res. Dev."},{"issue":"4\u20135","key":"4_CR30","doi-asserted-by":"publisher","first-page":"299","DOI":"10.1016\/S0169-8141(97)00081-4","volume":"22","author":"A Thatcher","year":"1998","unstructured":"Thatcher, A., Greyling, M.: Mental models of the internet. Int. J. Ind. Ergon. 22(4\u20135), 299\u2013305 (1998)","journal-title":"Int. J. Ind. Ergon."},{"key":"4_CR31","volume-title":"The Collected Works of LS Vygotsky: Problems of the Theory and History of Psychology","author":"LS Vygotsky","year":"1997","unstructured":"Vygotsky, L.S.: The Collected Works of LS Vygotsky: Problems of the Theory and History of Psychology, vol. 3. Springer, Heidelberg (1997)"},{"key":"4_CR32","doi-asserted-by":"publisher","first-page":"175","DOI":"10.1007\/978-1-4684-3405-7_6","volume-title":"Children and the Environment","author":"M Wolfe","year":"1978","unstructured":"Wolfe, M.: Childhood and privacy. In: Altman, I., Wohlwill, J.F. (eds.) Children and the Environment, pp. 175\u2013222. Springer, Boston (1978). https:\/\/doi.org\/10.1007\/978-1-4684-3405-7_6"},{"issue":"4","key":"4_CR33","doi-asserted-by":"publisher","first-page":"385","DOI":"10.1016\/j.appdev.2005.04.001","volume":"26","author":"Z Yan","year":"2005","unstructured":"Yan, Z.: Age differences in children\u2019s understanding of the complexity of the internet. J. Appl. Dev. Psychol. 26(4), 385\u2013396 (2005)","journal-title":"J. Appl. Dev. Psychol."},{"issue":"3","key":"4_CR34","doi-asserted-by":"publisher","first-page":"418","DOI":"10.1037\/0012-1649.42.3.418","volume":"42","author":"Z Yan","year":"2006","unstructured":"Yan, Z.: What influences children\u2019s and adolescents\u2019 understanding of the complexity of the internet? Dev. Psychol. 42(3), 418 (2006)","journal-title":"Dev. Psychol."},{"issue":"2","key":"4_CR35","doi-asserted-by":"publisher","first-page":"103","DOI":"10.1016\/j.appdev.2008.10.012","volume":"30","author":"Z Yan","year":"2009","unstructured":"Yan, Z.: Limited knowledge and limited resources: children\u2019s and adolescents\u2019 understanding of the internet. J. Appl. Dev. Psychol. 30(2), 103\u2013115 (2009)","journal-title":"J. Appl. Dev. Psychol."},{"key":"4_CR36","unstructured":"Zeng, E., Mare, S., Roesner, F.: End user security & privacy concerns with smart homes. In: Symposium on Usable Privacy and Security (SOUPS\u201917) (2017)"},{"key":"4_CR37","doi-asserted-by":"crossref","unstructured":"Zhang-Kennedy, L., Mekhail, C., Abdelaziz, Y., Chiasson, S.: From nosy little brothers to stranger-danger: children and parents\u2019 perception of mobile threats. In: Proceedings of the The 15th International Conference on Interaction Design and Children, pp. 388\u2013399 (2016)","DOI":"10.1145\/2930674.2930716"}],"container-title":["Lecture Notes in Computer Science","HCI for Cybersecurity, Privacy and Trust"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-05563-8_4","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,5,13]],"date-time":"2026-05-13T00:03:44Z","timestamp":1778630624000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-05563-8_4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022]]},"ISBN":["9783031055621","9783031055638"],"references-count":37,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-05563-8_4","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022]]},"assertion":[{"value":"16 June 2022","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"HCII","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Human-Computer Interaction","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2022","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"26 June 2022","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"1 July 2022","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"24","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"hcii2022","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/2022.hci.international\/index.html","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"This content has been made available to all.","name":"free","label":"Free to read"}]}}