{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,4]],"date-time":"2025-06-04T04:10:11Z","timestamp":1749010211020,"version":"3.41.0"},"publisher-location":"Cham","reference-count":75,"publisher":"Springer Nature Switzerland","isbn-type":[{"value":"9783031938634","type":"print"},{"value":"9783031938641","type":"electronic"}],"license":[{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025]]},"DOI":"10.1007\/978-3-031-93864-1_19","type":"book-chapter","created":{"date-parts":[[2025,6,3]],"date-time":"2025-06-03T09:15:13Z","timestamp":1748942113000},"page":"277-296","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["A First Look Into Parental Strategies, and\u00a0Challenges Around Children\u2019s Device Usage in\u00a0Urban Nepal"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-3840-9015","authenticated-orcid":false,"given":"Rizu","family":"Paudel","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6326-5810","authenticated-orcid":false,"given":"Prakriti","family":"Dumaru","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9012-6146","authenticated-orcid":false,"given":"Ankit","family":"Shrestha","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5764-2253","authenticated-orcid":false,"given":"Mahdi Nasrullah","family":"Al-Ameen","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,6,4]]},"reference":[{"key":"19_CR1","doi-asserted-by":"crossref","unstructured":"Agha, Z., Badillo-Urquiola, K., Wisniewski, P.J.: \u201cStrike at the root\u201d: co-designing real-time social media interventions for adolescent online risk prevention. Proc. ACM Hum.-Comput. Interact. 7(CSCW1), 1\u201332 (2023)","DOI":"10.1145\/3579625"},{"key":"19_CR2","doi-asserted-by":"crossref","unstructured":"Al-Ameen, M.N., Kocabas, H., Nandy, S., Tamanna, T.: \u201cWe, three brothers have always known everything of each other\u201d: a cross-cultural study of sharing digital devices and online accounts. Proc. Priv. Enhancing Technol. 2021(4), 203\u2013224 (2021)","DOI":"10.2478\/popets-2021-0067"},{"key":"19_CR3","doi-asserted-by":"crossref","unstructured":"Aldwin, C.M., Skinner, E.A., Zimmer-Gembeck, M.J., Taylor, A.L.: Coping and self-regulation across the life span (2011)","DOI":"10.1002\/9780470880166.hlsd002009"},{"key":"19_CR4","unstructured":"Anderson, M.: Parents, teens and digital monitoring (2016)"},{"issue":"1","key":"19_CR5","doi-asserted-by":"publisher","first-page":"147","DOI":"10.1177\/0743558419884692","volume":"35","author":"K Badillo-Urquiola","year":"2020","unstructured":"Badillo-Urquiola, K., Chouhan, C., Chancellor, S., De Choudhary, M., Wisniewski, P.: Beyond parental control: designing adolescent online safety apps using value sensitive design. J. Adolesc. Res. 35(1), 147\u2013175 (2020)","journal-title":"J. Adolesc. Res."},{"issue":"2","key":"19_CR6","first-page":"135","volume":"4","author":"A Bandura","year":"1976","unstructured":"Bandura, A.: Self-reinforcement: theoretical and methodological considerations. Behaviorism 4(2), 135\u2013155 (1976)","journal-title":"Behaviorism"},{"key":"19_CR7","doi-asserted-by":"crossref","unstructured":"Barron, C.M.: \u2018I had no credit to ring you back\u2019: children\u2019s strategies of negotiation and resistance to parental surveillance via mobile phones. Surveill. Soc. 12(3), 401\u2013413 (2014)","DOI":"10.24908\/ss.v12i3.4966"},{"key":"19_CR8","volume-title":"Understanding Your Users: A Practical Guide to User Research Methods","author":"K Baxter","year":"2015","unstructured":"Baxter, K., Courage, C., Caine, K.: Understanding Your Users: A Practical Guide to User Research Methods, 2nd edn. Morgan Kaufmann Publishers Inc., San Francisco, CA, USA (2015)","edition":"2"},{"key":"19_CR9","doi-asserted-by":"crossref","unstructured":"Blackwell, L., Gardiner, E., Schoenebeck, S.: Managing expectations: technology tensions among parents and teens. In: Proceedings of the 19th ACM Conference on Conference on Computer Supported Cooperative Work & Social Computing, pp. 1390\u20131401 (2016)","DOI":"10.1145\/2818048.2819928"},{"key":"19_CR10","unstructured":"Blum-Ross, A., Livingstone, S.: Families and screen time: current advice and emerging research (2016)"},{"key":"19_CR11","unstructured":"Boyatzis, R.E.: Transforming Qualitative Information: Thematic Analysis and Code Development. Sage, Thousand Oaks, CA, USA (1998)"},{"issue":"2","key":"19_CR12","doi-asserted-by":"publisher","first-page":"77","DOI":"10.1191\/1478088706qp063oa","volume":"3","author":"V Braun","year":"2006","unstructured":"Braun, V., Clarke, V.: Using thematic analysis in psychology. Qual. Res. Psychol. 3(2), 77\u2013101 (2006)","journal-title":"Qual. Res. Psychol."},{"issue":"3","key":"19_CR13","doi-asserted-by":"publisher","first-page":"328","DOI":"10.1080\/14780887.2020.1769238","volume":"18","author":"V Braun","year":"2021","unstructured":"Braun, V., Clarke, V.: One size fits all? What counts as quality practice in (reflexive) thematic analysis? Qual. Res. Psychol. 18(3), 328\u2013352 (2021)","journal-title":"Qual. Res. Psychol."},{"key":"19_CR14","doi-asserted-by":"crossref","unstructured":"Cabello-Hutt, T., Cabello, P., Claro, M.: Online opportunities and risks for children and adolescents: the role of digital skills, age, gender and parental mediation in Brazil. New Media Soc. 20(7), 2411\u20132431 (2018)","DOI":"10.1177\/1461444817724168"},{"issue":"4","key":"19_CR15","doi-asserted-by":"publisher","first-page":"488","DOI":"10.1207\/s15506878jobem4904_8","volume":"49","author":"CH Cho","year":"2005","unstructured":"Cho, C.H., Cheon, H.J.: Children\u2019s exposure to negative internet content: effects of family context. J. Broadcast. Electron. Media 49(4), 488\u2013509 (2005)","journal-title":"J. Broadcast. Electron. Media"},{"key":"19_CR16","doi-asserted-by":"publisher","DOI":"10.1016\/j.ypmed.2023.107452","volume":"169","author":"J Chu","year":"2023","unstructured":"Chu, J., et al.: Screen time and suicidal behaviors among us children 9\u201311 years old: a prospective cohort study. Prev. Med. 169, 107452 (2023)","journal-title":"Prev. Med."},{"key":"19_CR17","unstructured":"Chuah, S.F.: When mobile phone use becomes problematic: the influence of self, parents and peers on adolescents\u2019 mobile phone behavior in Singapore and Malaysia. Ph.D. thesis (2018)"},{"issue":"5","key":"19_CR18","doi-asserted-by":"publisher","first-page":"798","DOI":"10.1037\/dev0000108","volume":"52","author":"KM Collier","year":"2016","unstructured":"Collier, K.M., et al.: Does parental mediation of media influence child outcomes? A meta-analysis on media time, aggression, substance use, and sexual behavior. Dev. Psychol. 52(5), 798 (2016)","journal-title":"Dev. Psychol."},{"key":"19_CR19","unstructured":"Cordes, C., Miller, E.: Fool\u2019s gold: a critical look at computers in childhood (2000)"},{"key":"19_CR20","doi-asserted-by":"crossref","unstructured":"Dawadi, S., Giri, R.A., Simkhada, P.: Impact of covid-19 on the education sector in Nepal: challenges and coping strategies. Online Submission (2020)","DOI":"10.31124\/advance.12344336.v1"},{"key":"19_CR21","unstructured":"Duerager, A., Livingstone, S.: How can parents support children\u2019s internet safety? (2012)"},{"key":"19_CR22","doi-asserted-by":"crossref","unstructured":"Dumaru, P., Al-Ameen, M.N.: \u201cAfter she fell asleep, it went to my next podcast, which was about a serial killer\u201d: unveiling needs and expectations regarding parental control within digital assistant. In: Companion Publication of the 2023 Conference on Computer Supported Cooperative Work and Social Computing, pp. 17\u201321 (2023)","DOI":"10.1145\/3584931.3607019"},{"key":"19_CR23","doi-asserted-by":"crossref","unstructured":"Dumaru, P., Al-Ameen, M.N.: \u201cIt\u2019s like educating us older people...\u201d: unveiling needs and expectations regarding educational features within parental control tools. In: Extended Abstracts of the CHI Conference on Human Factors in Computing Systems, pp.\u00a01\u20138 (2024)","DOI":"10.1145\/3613905.3651113"},{"key":"19_CR24","doi-asserted-by":"crossref","unstructured":"Dumaru, P., Hackler, B.D., Flood, A., Al-Ameen, M.N.: \u201cI feel like he\u2019s looking in the computer world to be social, but I can\u2019t trust his judgement\u201d: reimagining parental control for children with ASD. In: Proceedings of the CHI Conference on Human Factors in Computing Systems, pp. 1\u201325 (2024)","DOI":"10.1145\/3613904.3642696"},{"key":"19_CR25","doi-asserted-by":"crossref","unstructured":"Dumaru, P., Shrestha, A., Paudel, R., Haverkamp, C., McClain, M.B., Al-Ameen, M.N.: \u201c... I have my dad, sister, brother, and mom\u2019s password\u201d: unveiling users\u2019 mental models of security and privacy-preserving tools. Inf. Comput. Secur. 32(3), 282\u2013303 (2024)","DOI":"10.1108\/ICS-04-2023-0047"},{"issue":"3","key":"19_CR26","doi-asserted-by":"publisher","first-page":"486","DOI":"10.1111\/j.1460-2466.2006.00297.x","volume":"56","author":"MS Eastin","year":"2006","unstructured":"Eastin, M.S., Greenberg, B.S., Hofschire, L.: Parenting the internet. J. Commun. 56(3), 486\u2013504 (2006)","journal-title":"J. Commun."},{"key":"19_CR27","doi-asserted-by":"crossref","unstructured":"Feal, \u00c1., Calciati, P., Vallina-Rodriguez, N., Troncoso, C., Gorla, A., et\u00a0al.: Angel or devil? A privacy study of mobile parental control apps. Proc. Privacy Enhancing Technol. (PoPETS) 2020 (2020)","DOI":"10.2478\/popets-2020-0029"},{"issue":"5","key":"19_CR28","doi-asserted-by":"publisher","first-page":"1417","DOI":"10.1111\/apa.15714","volume":"110","author":"L Fischer-Grote","year":"2021","unstructured":"Fischer-Grote, L., Kothgassner, O.D., Felnhofer, A.: The impact of problematic smartphone use on children\u2019s and adolescents\u2019 quality of life: a systematic review. Acta Paediatr. 110(5), 1417\u20131424 (2021)","journal-title":"Acta Paediatr."},{"key":"19_CR29","doi-asserted-by":"crossref","unstructured":"Ghosh, A.K., Badillo-Urquiola, K., Guha, S., LaViola\u00a0Jr., J.J., Wisniewski, P.J.: Safety vs. surveillance: what children have to say about mobile apps for parental control. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1\u201314 (2018)","DOI":"10.1145\/3173574.3173698"},{"key":"19_CR30","doi-asserted-by":"crossref","unstructured":"Ghosh, A.K., Hughes, C.E., Wisniewski, P.J.: Circle of trust: a new approach to mobile online safety for families. In: Proceedings of the 2020 CHI Conference on Human Factors in Computing Systems, pp. 1\u201314 (2020)","DOI":"10.1145\/3313831.3376747"},{"key":"19_CR31","unstructured":"Giorgetti, C.: The role of nongovernmental organizations in the climate change negotiations. Colo. J. Int\u2019l Envtl. L. Pol\u2019y 9, 115 (1998)"},{"issue":"2","key":"19_CR32","doi-asserted-by":"publisher","first-page":"181","DOI":"10.13109\/prkk.2018.67.2.181","volume":"67","author":"M Gluer","year":"2018","unstructured":"Gluer, M., Lohaus, A.: Parents\u2019 and children\u2019s perspectives of parental mediation strategies in association with children\u2019s internet skills\/elterliche und kindliche einschatzung von elterlichen medienerziehungsstrategien und deren zusammenhang mit der kindlichen internetnutzungskompetenz. Prax. Kinderpsychol. Kinderpsychiatr. 67(2), 181\u2013204 (2018)","journal-title":"Prax. Kinderpsychol. Kinderpsychiatr."},{"key":"19_CR33","doi-asserted-by":"crossref","unstructured":"Hashish, Y., Bunt, A., Young, J.E.: Involving children in content control: a collaborative and education-oriented content filtering approach. In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (2014)","DOI":"10.1145\/2556288.2557128"},{"key":"19_CR34","doi-asserted-by":"publisher","first-page":"205520762110486","DOI":"10.1177\/20552076211048638","volume":"7","author":"B Hiebert","year":"2021","unstructured":"Hiebert, B., Hall, J., Donelle, L., Facca, D., Jackson, K., Stoyanovich, E.: \u201cLet me know when I\u2019m needed\u2019\u2019: exploring the gendered nature of digital technology use for health information seeking during the transition to parenting. Digital Health 7, 20552076211048640 (2021)","journal-title":"Digital Health"},{"key":"19_CR35","doi-asserted-by":"crossref","unstructured":"Ibtasam, S., Razaq, L., Ayub, M., Webster, J.R., Ahmed, S.I., Anderson, R.: \u201cMy cousin bought the phone for me. I never go to mobile shops.\u201d The role of family in women\u2019s technological inclusion in Islamic culture. Proc. ACM Hum.-Comput. Interact. 3(CSCW), 1\u201333 (2019)","DOI":"10.1145\/3359148"},{"issue":"4","key":"19_CR36","doi-asserted-by":"publisher","first-page":"545","DOI":"10.1108\/MEDAR-02-2016-0041","volume":"24","author":"H Khlif","year":"2016","unstructured":"Khlif, H.: Hofstede\u2019s cultural dimensions in accounting research: a review. Meditari Accountancy Res. 24(4), 545\u2013573 (2016)","journal-title":"Meditari Accountancy Res."},{"key":"19_CR37","doi-asserted-by":"crossref","unstructured":"Ko, M., Choi, S., Yang, S., Lee, J., Lee, U.: FamiLync: facilitating participatory parental mediation of adolescents\u2019 smartphone use. In: Proceedings of the 2015 ACM International Joint Conference on Pervasive and Ubiquitous Computing, pp. 867\u2013878 (2015)","DOI":"10.1145\/2750858.2804283"},{"issue":"2","key":"19_CR38","doi-asserted-by":"publisher","first-page":"199","DOI":"10.1037\/0012-1649.18.2.199","volume":"18","author":"CB Kopp","year":"1982","unstructured":"Kopp, C.B.: Antecedents of self-regulation: a developmental perspective. Dev. Psychol. 18(2), 199 (1982)","journal-title":"Dev. Psychol."},{"issue":"4","key":"19_CR39","doi-asserted-by":"publisher","first-page":"466","DOI":"10.1177\/1461444812452412","volume":"15","author":"SJ Lee","year":"2013","unstructured":"Lee, S.J.: Parental restrictive mediation of children\u2019s internet use: effective for what and for whom? New Media Soc. 15(4), 466\u2013481 (2013)","journal-title":"New Media Soc."},{"key":"19_CR40","unstructured":"Lenhart, A., Lewis, O., Rainie, L.: Teenage life online (2001)"},{"issue":"4","key":"19_CR41","doi-asserted-by":"publisher","first-page":"483","DOI":"10.1177\/14614440122226209","volume":"3","author":"L Leung","year":"2001","unstructured":"Leung, L.: College student motives for chatting on ICQ. New Media Soc. 3(4), 483\u2013500 (2001)","journal-title":"New Media Soc."},{"issue":"9","key":"19_CR42","doi-asserted-by":"publisher","first-page":"1126","DOI":"10.3390\/brainsci11091126","volume":"11","author":"P Limone","year":"2021","unstructured":"Limone, P., Toto, G.A.: Psychological and emotional effects of digital technology on children in covid-19 pandemic. Brain Sci. 11(9), 1126 (2021)","journal-title":"Brain Sci."},{"issue":"4","key":"19_CR43","doi-asserted-by":"publisher","first-page":"581","DOI":"10.1080\/08838150802437396","volume":"52","author":"S Livingstone","year":"2008","unstructured":"Livingstone, S., Helsper, E.J.: Parental mediation of children\u2019s internet use. J. Broadcast. Electron. Media 52(4), 581\u2013599 (2008)","journal-title":"J. Broadcast. Electron. Media"},{"key":"19_CR44","doi-asserted-by":"crossref","unstructured":"Lupton, D.: \u2018It just gives me a bit of peace of mind\u2019: Australian women\u2019s use of digital media for pregnancy and early motherhood. Societies 7(3), 25 (2017)","DOI":"10.3390\/soc7030025"},{"issue":"4","key":"19_CR45","doi-asserted-by":"publisher","first-page":"306","DOI":"10.1080\/15267431.2021.1979555","volume":"21","author":"MO Lwin","year":"2021","unstructured":"Lwin, M.O., Panchapakesan, C., Teresa, J., Cayabyab, Y.M., Shin, W.: Are parents doing it right? Parent and child perspectives on parental mediation in Singapore. J. Fam. Commun. 21(4), 306\u2013321 (2021)","journal-title":"J. Fam. Commun."},{"key":"19_CR46","unstructured":"Mazzarella, S.R.: Girl Wide Web: Girls, the Internet, and the Negotiation of Identity, vol.\u00a011. Peter Lang (2005)"},{"key":"19_CR47","doi-asserted-by":"crossref","unstructured":"McNally, B., et al.: Co-designing mobile online safety applications with children. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp.\u00a01\u20139 (2018)","DOI":"10.1145\/3173574.3174097"},{"issue":"2","key":"19_CR48","doi-asserted-by":"publisher","first-page":"246","DOI":"10.1111\/jora.12125","volume":"25","author":"KL Moilanen","year":"2015","unstructured":"Moilanen, K.L., Rasmussen, K.E., Padilla-Walker, L.M.: Bidirectional associations between self-regulation and parenting styles in early adolescence. J. Res. Adolesc. 25(2), 246\u2013262 (2015)","journal-title":"J. Res. Adolesc."},{"key":"19_CR49","doi-asserted-by":"crossref","unstructured":"Mulkey, S.B., Bearer, C.F., Molloy, E.J.: Indirect effects of the covid-19 pandemic on children relate to the child\u2019s age and experience. Pediatr. Res., 1\u20132 (2023)","DOI":"10.1038\/s41390-023-02681-4"},{"key":"19_CR50","doi-asserted-by":"crossref","unstructured":"Mustafao\u011flu, R., Zirek, E., Yasac\u0131, Z., \u00d6zdin\u00e7ler, A.R.: The negative effects of digital technology usage on children\u2019s development and health. Addicta Turkish J. Addictions 5(2), 13\u201321 (2018)","DOI":"10.15805\/addicta.2018.5.2.0051"},{"key":"19_CR51","doi-asserted-by":"crossref","unstructured":"Nathanson, A.I.: Parental mediation strategies. In: The International Encyclopedia of Communication (2008)","DOI":"10.1002\/9781405186407.wbiecp007"},{"key":"19_CR52","doi-asserted-by":"crossref","unstructured":"Nepal, K., Kc, S.K.: Teachers\u2019 perception of the students\u2019 readiness for self-regulated learning during the covid-19 pandemic. J. NELTA 25(1-2), 167\u2013178 (2020)","DOI":"10.3126\/nelta.v25i1-2.49739"},{"key":"19_CR53","doi-asserted-by":"crossref","unstructured":"Nomaguchi, K., Milkie, M.A.: Sociological perspectives on parenting stress: how social structure and culture shape parental strain and the well-being of parents and children. In: Parental Stress and Early Child Development: Adaptive and Maladaptive Outcomes, pp. 47\u201373. Springer (2017)","DOI":"10.1007\/978-3-319-55376-4_3"},{"key":"19_CR54","unstructured":"Palmer, S.: Toxic Childhood: How the Modern World is Damaging Our Children and What We Can Do About It, Orion (2015)"},{"issue":"CSCW1","key":"19_CR55","first-page":"1","volume":"7","author":"R Paudel","year":"2023","unstructured":"Paudel, R., Dumaru, P., Shrestha, A., Kocabas, H., Al-Ameen, M.N.: A deep dive into user\u2019s preferences and behavior around mobile phone sharing. Proc. ACM Hum.-Comput. Interact. 7(CSCW1), 1\u201322 (2023)","journal-title":"Proc. ACM Hum.-Comput. Interact."},{"key":"19_CR56","doi-asserted-by":"crossref","unstructured":"Paudel, R., Shrestha, A., Dumaru, P., Al-Ameen, M.N.: \u201cIt doesn\u2019t just feel like something a lawyer slapped together.\u201d Mental-model-based privacy policy for third-party applications on Facebook. In: Companion Publication of the 2023 Conference on Computer Supported Cooperative Work and Social Computing, pp. 298\u2013306 (2023)","DOI":"10.1145\/3584931.3606962"},{"issue":"1","key":"19_CR57","doi-asserted-by":"publisher","first-page":"77","DOI":"10.1177\/1557988309360819","volume":"4","author":"M Pujazon-Zazik","year":"2010","unstructured":"Pujazon-Zazik, M., Park, M.J.: To tweet, or not to tweet: gender differences and potential positive and negative health outcomes of adolescents\u2019 social internet use. Am. J. Mens Health 4(1), 77\u201385 (2010)","journal-title":"Am. J. Mens Health"},{"key":"19_CR58","doi-asserted-by":"crossref","unstructured":"Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1\u201317 (2012)","DOI":"10.1145\/2335356.2335364"},{"key":"19_CR59","doi-asserted-by":"crossref","unstructured":"Radhakrishnan, K., et al.: Learning in the time of covid-19 (2021)","DOI":"10.1596\/35384"},{"key":"19_CR60","doi-asserted-by":"crossref","unstructured":"Rathbone, A., Prescott, J.: \u201cI feel like a neurotic mother at times\u201d-a mixed methods study exploring online health information seeking behaviour in new parents. Mhealth 5 (2019)","DOI":"10.21037\/mhealth.2019.05.02"},{"issue":"12","key":"19_CR61","doi-asserted-by":"publisher","first-page":"1152","DOI":"10.1111\/jpc.13023","volume":"51","author":"D Richards","year":"2015","unstructured":"Richards, D., Caldwell, P.H., Go, H.: Impact of social media on the health of children and young people. J. Paediatr. Child Health 51(12), 1152\u20131157 (2015)","journal-title":"J. Paediatr. Child Health"},{"key":"19_CR62","unstructured":"Sambasivan, N., et al.: \u201cPrivacy is not for me, it\u2019s for those rich women\u201d: performative privacy practices on mobile phones by women in South Asia. In: Fourteenth Symposium on Usable Privacy and Security (SOUPS 2018), pp. 127\u2013142. USENIX Association, Baltimore, MD, August 2018. https:\/\/www.usenix.org\/conference\/soups2018\/presentation\/sambasivan"},{"issue":"2","key":"19_CR63","doi-asserted-by":"publisher","first-page":"20","DOI":"10.26480\/esmy.02.2018.20.24","volume":"2","author":"A Shrestha","year":"2018","unstructured":"Shrestha, A., Baral, S., et al.: Socioeconomic factors affecting awareness and adaption of climate change: a case study of Banke district Nepal. Earth Sci. Malaysia 2(2), 20\u201324 (2018)","journal-title":"Earth Sci. Malaysia"},{"key":"19_CR64","doi-asserted-by":"publisher","unstructured":"Shrestha, A., Dumaru, P., Paudel, R., Al-Ameen, M.N.: Understanding the challenges in academia to prepare nursing students for digital technology use at workplace. In: Companion Publication of the 2023 Conference on Computer Supported Cooperative Work and Social Computing, pp. 96\u2013100 (2023). https:\/\/doi.org\/10.1145\/3584931.3607002","DOI":"10.1145\/3584931.3607002"},{"key":"19_CR65","doi-asserted-by":"publisher","unstructured":"Shrestha, A., Graham, D.M., Dumaru, P., Paudel, R., Searle, K.A., Al-Ameen, M.N.: Understanding the behavior, challenges, and privacy risks in digital technology use by nursing professionals. Proc. ACM Hum.-Comput. Interact. 6(CSCW2), 1\u201322 (2022). https:\/\/doi.org\/10.1145\/3555763","DOI":"10.1145\/3555763"},{"key":"19_CR66","doi-asserted-by":"crossref","unstructured":"Srinahyanti, S., Wau, Y., Manurung, I., Arjani, N.: Influence of gadget: a positive and negative impact of smartphone usage for early child. In: Proceedings of the 2nd Annual Conference of Engineering and Implementation on Vocational Education (ACEIVE 2018), 3rd November 2018, North Sumatra, Indonesia (2019)","DOI":"10.4108\/eai.3-11-2018.2285692"},{"key":"19_CR67","doi-asserted-by":"crossref","unstructured":"Valkenburg, P.M., Krcmar, M., Peeters, A.L., Marseille, N.M.: Developing a scale to assess three styles of television mediation: \u201cinstructive mediation,\u201d \u201crestrictive mediation,\u201d and \u201csocial coviewing\u201d. J. Broadcast. Electron. Media 43(1), 52\u201366 (1999)","DOI":"10.1080\/08838159909364474"},{"key":"19_CR68","doi-asserted-by":"publisher","first-page":"1379","DOI":"10.1007\/s10826-019-01368-x","volume":"28","author":"S Van Petegem","year":"2019","unstructured":"Van Petegem, S., de Ferrerre, E., Soenens, B., van Rooij, A.J., Van Looy, J.: Parents\u2019 degree and style of restrictive mediation of young children\u2019s digital gaming: associations with parental attitudes and perceived child adjustment. J. Child Fam. Stud. 28, 1379\u20131391 (2019)","journal-title":"J. Child Fam. Stud."},{"issue":"CSCW2","key":"19_CR69","first-page":"1","volume":"5","author":"G Wang","year":"2021","unstructured":"Wang, G., Zhao, J., Van Kleek, M., Shadbolt, N.: Protection or punishment? Relating the design space of parental control apps and perceptions about them to support parenting for online safety. Proc. ACM Hum.-Comput. Interact. 5(CSCW2), 1\u201326 (2021)","journal-title":"Proc. ACM Hum.-Comput. Interact."},{"issue":"1","key":"19_CR70","doi-asserted-by":"publisher","first-page":"18","DOI":"10.1108\/LHTN-08-2017-0057","volume":"35","author":"I Widyatri","year":"2018","unstructured":"Widyatri, I., Salman, A.G., Kanigoro, B.: Parental control application on android platform. Libr. Hi Tech News 35(1), 18\u201324 (2018)","journal-title":"Libr. Hi Tech News"},{"key":"19_CR71","doi-asserted-by":"crossref","unstructured":"Wisniewski, P., Ghosh, A.K., Xu, H., Rosson, M.B., Carroll, J.M.: Parental control vs. teen self-regulation: is there a middle ground for mobile online safety? In: Proceedings of the 2017 ACM Conference on Computer Supported Cooperative Work and Social Computing, pp. 51\u201369 (2017)","DOI":"10.1145\/2998181.2998352"},{"key":"19_CR72","doi-asserted-by":"crossref","unstructured":"Wisniewski, P., et al.: Resilience mitigates the negative effects of adolescent internet addiction and online risk exposure. In: Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems, pp. 4029\u20134038 (2015)","DOI":"10.1145\/2702123.2702240"},{"issue":"3","key":"19_CR73","doi-asserted-by":"publisher","first-page":"573","DOI":"10.1007\/s10209-021-00807-1","volume":"21","author":"S Yadav","year":"2022","unstructured":"Yadav, S., Chakraborty, P.: Child-smartphone interaction: relevance and positive and negative implications. Univ. Access Inf. Soc. 21(3), 573\u2013586 (2022)","journal-title":"Univ. Access Inf. Soc."},{"issue":"12","key":"19_CR74","doi-asserted-by":"publisher","first-page":"857","DOI":"10.1016\/j.chiabu.2008.09.015","volume":"33","author":"ML Ybarra","year":"2009","unstructured":"Ybarra, M.L., Finkelhor, D., Mitchell, K.J., Wolak, J.: Associations between blocking, monitoring, and filtering software on the home computer and youth-reported unwanted exposure to sexual material online. Child Abuse Negl. 33(12), 857\u2013869 (2009)","journal-title":"Child Abuse Negl."},{"key":"19_CR75","doi-asserted-by":"crossref","unstructured":"Zhao, J., et al.: I make up a silly name\u2019 understanding children\u2019s perception of privacy risks online. In: Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems, pp. 1\u201313 (2019)","DOI":"10.1145\/3290605.3300336"}],"container-title":["Lecture Notes in Computer Science","Human-Computer Interaction"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-93864-1_19","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,3]],"date-time":"2025-06-03T09:15:40Z","timestamp":1748942140000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-93864-1_19"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"ISBN":["9783031938634","9783031938641"],"references-count":75,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-93864-1_19","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025]]},"assertion":[{"value":"4 June 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"HCII","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Human-Computer Interaction","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Gothenburg","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Sweden","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2025","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"22 June 2025","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"27 June 2025","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"27","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"hcii2025","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/2025.hci.international\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}