{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,13]],"date-time":"2026-04-13T19:11:29Z","timestamp":1776107489159,"version":"3.50.1"},"publisher-location":"Republic and Canton of Geneva, Switzerland","reference-count":37,"publisher":"International World Wide Web Conferences Steering Committee","license":[{"start":{"date-parts":[[2015,5,18]],"date-time":"2015-05-18T00:00:00Z","timestamp":1431907200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"NSF","award":["DGE-0966187"],"award-info":[{"award-number":["DGE-0966187"]}]},{"name":"NSF","award":["CNS-1318659"],"award-info":[{"award-number":["CNS-1318659"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2015,5,18]]},"DOI":"10.1145\/2736277.2741124","type":"proceedings-article","created":{"date-parts":[[2016,2,5]],"date-time":"2016-02-05T20:37:12Z","timestamp":1454704632000},"page":"776-786","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":64,"title":["Children Seen But Not Heard"],"prefix":"10.1145","author":[{"given":"Tehila","family":"Minkus","sequence":"first","affiliation":[{"name":"New York University, New York, USA"}]},{"given":"Kelvin","family":"Liu","sequence":"additional","affiliation":[{"name":"New York University, Shanghai, China"}]},{"given":"Keith W.","family":"Ross","sequence":"additional","affiliation":[{"name":"New York University, New York, USA"}]}],"member":"320","published-online":{"date-parts":[[2015,5,18]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Instagram press. http:\/\/instagram.com\/press\/.  Instagram press. http:\/\/instagram.com\/press\/."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/1240624.1240683"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/2556288.2557403"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1741-3729.2012.00708.x"},{"key":"e_1_3_2_1_5_1","volume-title":"It's Complicated: the social lives of networked teens","author":"Boyd D.","year":"2014","unstructured":"D. Boyd . It's Complicated: the social lives of networked teens . Yale University Press , 2014 . D. Boyd. It's Complicated: the social lives of networked teens. Yale University Press, 2014."},{"key":"e_1_3_2_1_6_1","volume-title":"ICWSM","author":"Burke M.","year":"2013","unstructured":"M. Burke , L. A. Adamic , and K. Marciniak . Families on facebook . In ICWSM , 2013 . M. Burke, L. A. Adamic, and K. Marciniak. Families on facebook. In ICWSM, 2013."},{"key":"e_1_3_2_1_7_1","volume-title":"New York Times","author":"Considine A.","year":"2012","unstructured":"A. Considine . Making facebook less infantile . New York Times , August 9 2012 . A. Considine. Making facebook less infantile. New York Times, August 9 2012."},{"key":"e_1_3_2_1_8_1","volume-title":"Symposium on Usable Privacy and Security (SOUPS)","author":"Cranor L. F.","year":"2014","unstructured":"L. F. Cranor , A. L. Durity , A. Marsh , and B. Ur . Parents' and teens' perspectives on privacy in a technology-filled world . In Symposium on Usable Privacy and Security (SOUPS) , 2014 . L. F. Cranor, A. L. Durity, A. Marsh, and B. Ur. Parents' and teens' perspectives on privacy in a technology-filled world. In Symposium on Usable Privacy and Security (SOUPS), 2014."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/2504730.2504733"},{"key":"e_1_3_2_1_10_1","volume-title":"Profiling city residents using publicly available information. Technical report","author":"Dey R.","year":"2014","unstructured":"R. Dey , Y. Ding , and K. W. Ross . Profiling city residents using publicly available information. Technical report , New York University , Computer Science and Engineering, October 2014 . R. Dey, Y. Ding, and K. W. Ross. Profiling city residents using publicly available information. Technical report, New York University, Computer Science and Engineering, October 2014."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2012.6195711"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/2631775.2631808"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.3115\/1219840.1219885"},{"key":"e_1_3_2_1_14_1","volume-title":"Office of Justice Programs","author":"Finkelhor D.","year":"2000","unstructured":"D. Finkelhor and R. Ormrod . Kidnaping of Juveniles: Patterns from NIBRS. US Department of Justice , Office of Justice Programs , Office of Juvenile Justice and Delinquency Prevention , 2000 . D. Finkelhor and R. Ormrod. Kidnaping of Juveniles: Patterns from NIBRS. US Department of Justice, Office of Justice Programs, Office of Juvenile Justice and Delinquency Prevention, 2000."},{"key":"e_1_3_2_1_15_1","volume-title":"USA Today","author":"Guyn J.","year":"2014","unstructured":"J. Guyn . Facebook rolling out privacy checkup for users . USA Today , September 4 2014 . J. Guyn. Facebook rolling out privacy checkup for users. USA Today, September 4 2014."},{"key":"e_1_3_2_1_16_1","volume-title":"Why parents help their children lie to facebook about age: Unintended consequences of the \u2018children's online privacy protection act'. First Monday, 16(11)","author":"Hargittai E.","year":"2011","unstructured":"E. Hargittai , J. Schultz , J. Palfrey , Why parents help their children lie to facebook about age: Unintended consequences of the \u2018children's online privacy protection act'. First Monday, 16(11) , 2011 . E. Hargittai, J. Schultz, J. Palfrey, et al. Why parents help their children lie to facebook about age: Unintended consequences of the \u2018children's online privacy protection act'. First Monday, 16(11), 2011."},{"key":"e_1_3_2_1_17_1","volume-title":"ArXiv Preprints","author":"Hosseinmardi H.","year":"2014","unstructured":"H. Hosseinmardi , S. Li , Z. Yang , Q. Lv , R. I. Rafiq , R. Han , and S. Mishra . A comparison of common users across instagram and ask.fm to better understand cyberbullying . ArXiv Preprints , 2014 . H. Hosseinmardi, S. Li, Z. Yang, Q. Lv, R. I. Rafiq, R. Han, and S. Mishra. A comparison of common users across instagram and ask.fm to better understand cyberbullying. ArXiv Preprints, 2014."},{"key":"e_1_3_2_1_18_1","volume-title":"Proceedings of ICWSM. AAAI","author":"Hu Y.","year":"2014","unstructured":"Y. Hu , L. Manikonda , and S. Kambhampati . What we instagram: A first analysis of instagram photo content and user types . In Proceedings of ICWSM. AAAI , 2014 . Y. Hu, L. Manikonda, and S. Kambhampati. What we instagram: A first analysis of instagram photo content and user types. In Proceedings of ICWSM. AAAI, 2014."},{"key":"e_1_3_2_1_19_1","volume-title":"Gaydar: Facebook friendships expose sexual orientation. First Monday, 14(10)","author":"Jernigan C.","year":"2009","unstructured":"C. Jernigan and B. F. Mistree . Gaydar: Facebook friendships expose sexual orientation. First Monday, 14(10) , 2009 . C. Jernigan and B. F. Mistree. Gaydar: Facebook friendships expose sexual orientation. First Monday, 14(10), 2009."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.5555\/1671011.1671040"},{"key":"e_1_3_2_1_21_1","volume-title":"CNN","author":"Kelly H.","year":"2013","unstructured":"H. Kelly . Facebook changes privacy settings for teens . CNN , October 31, 2013 . H. Kelly. Facebook changes privacy settings for teens. CNN, October 31, 2013."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/2675133.2675149"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/1526709.1526899"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.poetic.2013.10.002"},{"key":"e_1_3_2_1_25_1","volume-title":"Parental mediation of children's internet use. Journal of broadcasting & electronic media, 52(4):581--599","author":"Livingstone S.","year":"2008","unstructured":"S. Livingstone and E. J. Helsper . Parental mediation of children's internet use. Journal of broadcasting & electronic media, 52(4):581--599 , 2008 . S. Livingstone and E. J. Helsper. Parental mediation of children's internet use. Journal of broadcasting & electronic media, 52(4):581--599, 2008."},{"key":"e_1_3_2_1_26_1","volume-title":"TechCrunch","author":"Lunden I.","year":"2014","unstructured":"I. Lunden . Instagram is the fastest-growing social site globally, mobile devices rule over pcs for access . TechCrunch , January 21, 2014 . I. Lunden. Instagram is the fastest-growing social site globally, mobile devices rule over pcs for access. TechCrunch, January 21, 2014."},{"key":"e_1_3_2_1_27_1","volume-title":"ArXiv Preprints","author":"Manikonda L.","year":"2014","unstructured":"L. Manikonda , Y. Hu , and S. Kambhampati . Analyzing user activities, demographics, social network structure and user-generated content on instagram . ArXiv Preprints , 2014 . L. Manikonda, Y. Hu, and S. Kambhampati. Analyzing user activities, demographics, social network structure and user-generated content on instagram. ArXiv Preprints, 2014."},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/2531602.2531603"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1542\/peds.2011-0054"},{"key":"e_1_3_2_1_30_1","volume-title":"New York Times","author":"Singer N.","year":"2012","unstructured":"N. Singer . Senator opens investigation of data brokers . New York Times , October 10, 2012 . N. Singer. Senator opens investigation of data brokers. New York Times, October 10, 2012."},{"key":"e_1_3_2_1_31_1","volume-title":"Pew Research Center","author":"Smith A.","year":"2014","unstructured":"A. Smith . 6 new facts about facebook . Pew Research Center , February 3, 2014 . A. Smith. 6 new facts about facebook. Pew Research Center, February 3, 2014."},{"key":"e_1_3_2_1_32_1","article-title":"On the web, children face intensive tracking","author":"Stecklow S.","year":"2010","unstructured":"S. Stecklow . On the web, children face intensive tracking . Wall Street Journal , September 17, 2010 . S. Stecklow. On the web, children face intensive tracking. Wall Street Journal, September 17, 2010.","journal-title":"Wall Street Journal"},{"key":"e_1_3_2_1_33_1","volume-title":"CNN","author":"Sultan A.","year":"2012","unstructured":"A. Sultan and J. Miller . Facebook parenting is destroying our children's privacy . CNN , May 25 2012 . A. Sultan and J. Miller. Facebook parenting is destroying our children's privacy. CNN, May 25 2012."},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/2512938.2512939"},{"key":"e_1_3_2_1_35_1","volume-title":"ACM","author":"Wang Y.","year":"2013","unstructured":"Y. Wang , P. G. Leon , K. Scott , X. Chen , A. Acquisti , and L. F. Cranor . Privacy nudges for social media: an exploratory facebook study. In Privacy and Security in Online Social Media (PSOSM) . ACM , 2013 . Y. Wang, P. G. Leon, K. Scott, X. Chen, A. Acquisti, and L. F. Cranor. Privacy nudges for social media: an exploratory facebook study. In Privacy and Security in Online Social Media (PSOSM). ACM, 2013."},{"key":"e_1_3_2_1_36_1","first-page":"189","article-title":"Can coppa work-an analysis of the parental consent measures in the children's online privacy protection act","volume":"11","author":"Warmund J.","year":"2000","unstructured":"J. Warmund . Can coppa work-an analysis of the parental consent measures in the children's online privacy protection act . Fordham Intell. Prop. Media & Ent. LJ , 11 : 189 , 2000 . J. Warmund. Can coppa work-an analysis of the parental consent measures in the children's online privacy protection act. Fordham Intell. Prop. Media & Ent. LJ, 11:189, 2000.","journal-title":"Fordham Intell. Prop. Media & Ent. LJ"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/1526709.1526781"}],"event":{"name":"WWW '15: 24th International World Wide Web Conference","location":"Florence Italy","acronym":"WWW '15","sponsor":["IW3C2 International World Wide Web Conference Committee","SIGWEB ACM Special Interest Group on Hypertext, Hypermedia, and Web"]},"container-title":["Proceedings of the 24th International Conference on World Wide Web"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2736277.2741124","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2736277.2741124","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T06:12:29Z","timestamp":1750227149000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2736277.2741124"}},"subtitle":["When Parents Compromise Children's Online Privacy"],"short-title":[],"issued":{"date-parts":[[2015,5,18]]},"references-count":37,"alternative-id":["10.1145\/2736277.2741124","10.5555\/2736277"],"URL":"https:\/\/doi.org\/10.1145\/2736277.2741124","relation":{},"subject":[],"published":{"date-parts":[[2015,5,18]]},"assertion":[{"value":"2015-05-18","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}