{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,10]],"date-time":"2026-03-10T12:03:30Z","timestamp":1773144210964,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":24,"publisher":"ACM","license":[{"start":{"date-parts":[[2016,6,21]],"date-time":"2016-06-21T00:00:00Z","timestamp":1466467200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"Office of the Privacy Commissioner of Canada","award":["OPC Contributions Program"],"award-info":[{"award-number":["OPC Contributions Program"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2016,6,21]]},"DOI":"10.1145\/2930674.2930716","type":"proceedings-article","created":{"date-parts":[[2016,7,29]],"date-time":"2016-07-29T14:51:46Z","timestamp":1469803906000},"page":"388-399","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":51,"title":["From Nosy Little Brothers to Stranger-Danger"],"prefix":"10.1145","author":[{"given":"Leah","family":"Zhang-Kennedy","sequence":"first","affiliation":[{"name":"Carleton University, Ottawa, Canada"}]},{"given":"Christine","family":"Mekhail","sequence":"additional","affiliation":[{"name":"Carleton University, Ottawa, Canada"}]},{"given":"Yomna","family":"Abdelaziz","sequence":"additional","affiliation":[{"name":"Carleton University, Ottawa, Canada"}]},{"given":"Sonia","family":"Chiasson","sequence":"additional","affiliation":[{"name":"Carleton University, Ottawa, Canada"}]}],"member":"320","published-online":{"date-parts":[[2016,6,21]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/2702123.2702325"},{"key":"e_1_3_2_1_2_1","volume-title":"Mental models of security risks. Financial Cryptography and Data Security","author":"Asgharpour Farzaneh","year":"2007","unstructured":"Farzaneh Asgharpour , Debin Liu , and L Jean Camp . 2007. Mental models of security risks. Financial Cryptography and Data Security ( 2007 ), 367--377. Farzaneh Asgharpour, Debin Liu, and L Jean Camp. 2007. Mental models of security risks. Financial Cryptography and Data Security (2007), 367--377."},{"key":"e_1_3_2_1_3_1","unstructured":"Federal Trade Commission (FTC). 1998. Children's Online Privacy Protection Act. http:\/\/www.coppa.org. (1998).  Federal Trade Commission (FTC). 1998. Children's Online Privacy Protection Act. http:\/\/www.coppa.org. (1998)."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1007\/1-4020-4023-7_24"},{"key":"e_1_3_2_1_5_1","volume-title":"Comparing children's online opportunities and risks across Europe: Cross-national comparisons for EU Kids Online. status: published","author":"Hasebrink Uwe","year":"2008","unstructured":"Uwe Hasebrink , Sonia Livingstone , and Leslie Haddon . 2008. Comparing children's online opportunities and risks across Europe: Cross-national comparisons for EU Kids Online. status: published ( 2008 ). Uwe Hasebrink, Sonia Livingstone, and Leslie Haddon. 2008. Comparing children's online opportunities and risks across Europe: Cross-national comparisons for EU Kids Online. status: published (2008)."},{"key":"e_1_3_2_1_6_1","volume-title":"Mental Models of Privacy and Security","author":"Jean Camp","year":"2009","unstructured":"Camp Jean . 2009. Mental Models of Privacy and Security . IEEE Tech. and Society 28, 3 ( 2009 ). Camp Jean. 2009. Mental Models of Privacy and Security. IEEE Tech. and Society 28, 3 (2009)."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1080\/08838151.2015.1093479"},{"key":"e_1_3_2_1_8_1","volume-title":"Jinjuan Heidi Feng, and Harry Hochheiser","author":"Lazar Jonathan","year":"2010","unstructured":"Jonathan Lazar , Jinjuan Heidi Feng, and Harry Hochheiser . 2010 . Research methods in human-computer interaction. John Wiley & Sons . Jonathan Lazar, Jinjuan Heidi Feng, and Harry Hochheiser. 2010. Research methods in human-computer interaction. John Wiley & Sons."},{"key":"e_1_3_2_1_9_1","volume-title":"Children's privacy online: Experimenting with boundaries within and beyond the family. Computers, Phones, and the Internet: Domesticating Information Technology","author":"Livingstone Sonia","year":"2011","unstructured":"Sonia Livingstone . 2011. Children's privacy online: Experimenting with boundaries within and beyond the family. Computers, Phones, and the Internet: Domesticating Information Technology ( 2011 ), 128--144. Sonia Livingstone. 2011. Children's privacy online: Experimenting with boundaries within and beyond the family. Computers, Phones, and the Internet: Domesticating Information Technology (2011), 128--144."},{"key":"e_1_3_2_1_10_1","unstructured":"Sonia Livingstone and Magdalena Bober. 2004. UK children go online: Surveying the experiences of young people and their parents. (2004).  Sonia Livingstone and Magdalena Bober. 2004. UK children go online: Surveying the experiences of young people and their parents. (2004)."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.24908\/ss.v7i3\/4.4152"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1093\/bjsw\/bcs121"},{"key":"e_1_3_2_1_13_1","unstructured":"Common Sense Media and Victoria Rideout. 2013. Zero to eight: Children's media use in America: A Common Sense Media research study. https:\/\/www.commonsensemedia.org\/research\/. (2013).  Common Sense Media and Victoria Rideout. 2013. Zero to eight: Children's media use in America: A Common Sense Media research study. https:\/\/www.commonsensemedia.org\/research\/. (2013)."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1080\/08838151.2015.1054995"},{"key":"e_1_3_2_1_15_1","volume-title":"Interaction design: Beyond human-computer interaction","author":"Preece Jenny","unstructured":"Jenny Preece , Helen Sharp , and Yvonne Rogers . 2015. Interaction design: Beyond human-computer interaction . John Wiley & Sons . Jenny Preece, Helen Sharp, and Yvonne Rogers. 2015. Interaction design: Beyond human-computer interaction. John Wiley & Sons."},{"key":"e_1_3_2_1_16_1","volume-title":"New theoretical approaches for HCI. Annual review of information science and technology 38, 1","author":"Rogers Yvonne","year":"2004","unstructured":"Yvonne Rogers . 2004. New theoretical approaches for HCI. Annual review of information science and technology 38, 1 ( 2004 ), 87--143. Yvonne Rogers. 2004. New theoretical approaches for HCI. Annual review of information science and technology 38, 1 (2004), 87--143."},{"key":"e_1_3_2_1_17_1","volume-title":"Workshop on Home Usable Privacy and Security (HUPS).","author":"Schechter Stuart","year":"2013","unstructured":"Stuart Schechter . 2013 . The user is the enemy, and (s)he keeps reaching for that bright shiny power button . In Workshop on Home Usable Privacy and Security (HUPS). Stuart Schechter. 2013. The user is the enemy, and (s)he keeps reaching for that bright shiny power button. In Workshop on Home Usable Privacy and Security (HUPS)."},{"key":"e_1_3_2_1_18_1","first-page":"759","article-title":"Privacy for children","volume":"42","author":"Shmueli Benjamin","year":"2011","unstructured":"Benjamin Shmueli and Ayelet Blecher-Prigat . 2011 . Privacy for children . Columbia Human Rights Law Review 42 (2011), 759 -- 795 . Benjamin Shmueli and Ayelet Blecher-Prigat. 2011. Privacy for children. Columbia Human Rights Law Review 42 (2011), 759--795.","journal-title":"Columbia Human Rights Law Review"},{"key":"e_1_3_2_1_19_1","unstructured":"Valerie Steeves. 2014. Young Canadians in a wired world phase III: Life online. http:\/\/mediasmarts.ca\/sites\/mediasmarts\/files\/pdfs\/publication-report\/full\/YCWWIII_Life_Online_FullReport.pdf. (2014).  Valerie Steeves. 2014. Young Canadians in a wired world phase III: Life online. http:\/\/mediasmarts.ca\/sites\/mediasmarts\/files\/pdfs\/publication-report\/full\/YCWWIII_Life_Online_FullReport.pdf. (2014)."},{"key":"e_1_3_2_1_20_1","volume-title":"Grounded theory methodology. Handbook of qualitative research","author":"Strauss Anselm","year":"1994","unstructured":"Anselm Strauss and Juliet Corbin . 1994. Grounded theory methodology. Handbook of qualitative research ( 1994 ), 273--285. Anselm Strauss and Juliet Corbin. 1994. Grounded theory methodology. Handbook of qualitative research (1994), 273--285."},{"key":"e_1_3_2_1_21_1","volume-title":"Proceedings of the conference on European Association of Cognitive Ergonomics","author":"Swallow David","year":"2005","unstructured":"David Swallow , Mark Blythe , and Peter Wright . 2005 . Grounding experience: Relating theory and method to evaluate the user experience of smartphones . In Proceedings of the conference on European Association of Cognitive Ergonomics . University of Athens, 91--98. David Swallow, Mark Blythe, and Peter Wright. 2005. Grounding experience: Relating theory and method to evaluate the user experience of smartphones. In Proceedings of the conference on European Association of Cognitive Ergonomics. University of Athens, 91--98."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/1837110.1837125"},{"key":"e_1_3_2_1_23_1","volume-title":"Security Beliefs and Protective Behaviors Among United States Internet Users. In Symposium on Usable Privacy and Security (SOUPS). 309--325","author":"Wash Rick","year":"2015","unstructured":"Rick Wash and Emilee Rader . 2015 . Too Much Knowledge? Security Beliefs and Protective Behaviors Among United States Internet Users. In Symposium on Usable Privacy and Security (SOUPS). 309--325 . Rick Wash and Emilee Rader. 2015. Too Much Knowledge? Security Beliefs and Protective Behaviors Among United States Internet Users. In Symposium on Usable Privacy and Security (SOUPS). 309--325."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/1054972.1055088"}],"event":{"name":"IDC '16: Interaction Design and Children","location":"Manchester United Kingdom","acronym":"IDC '16","sponsor":["SIGCHI ACM Special Interest Group on Computer-Human Interaction"]},"container-title":["Proceedings of the The 15th International Conference on Interaction Design and Children"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2930674.2930716","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2930674.2930716","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:54:48Z","timestamp":1750222488000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2930674.2930716"}},"subtitle":["Children and Parents' Perception of Mobile Threats"],"short-title":[],"issued":{"date-parts":[[2016,6,21]]},"references-count":24,"alternative-id":["10.1145\/2930674.2930716","10.1145\/2930674"],"URL":"https:\/\/doi.org\/10.1145\/2930674.2930716","relation":{},"subject":[],"published":{"date-parts":[[2016,6,21]]},"assertion":[{"value":"2016-06-21","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}