{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,13]],"date-time":"2026-04-13T22:12:48Z","timestamp":1776118368061,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":78,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,5,2]],"date-time":"2019-05-02T00:00:00Z","timestamp":1556755200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"EPSRC","award":["EP\/R511742\/1"],"award-info":[{"award-number":["EP\/R511742\/1"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,5,2]]},"DOI":"10.1145\/3290605.3300336","type":"proceedings-article","created":{"date-parts":[[2019,4,29]],"date-time":"2019-04-29T17:04:32Z","timestamp":1556557472000},"page":"1-13","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":95,"title":["`I make up a silly name'"],"prefix":"10.1145","author":[{"given":"Jun","family":"Zhao","sequence":"first","affiliation":[{"name":"University of Oxford, Oxford, Oxfordshire, United Kingdom"}]},{"given":"Ge","family":"Wang","sequence":"additional","affiliation":[{"name":"University College London, London, United Kingdom"}]},{"given":"Carys","family":"Dally","sequence":"additional","affiliation":[{"name":"University of Oxford, Oxford, United Kingdom"}]},{"given":"Petr","family":"Slovak","sequence":"additional","affiliation":[{"name":"King's College London, London, United Kingdom"}]},{"given":"Julian","family":"Edbrooke-Childs","sequence":"additional","affiliation":[{"name":"UCL Interaction Centre, University College London London, UK"}]},{"given":"Max","family":"Van Kleek","sequence":"additional","affiliation":[{"name":"University of Oxford, Oxford, Oxfordshire, United Kingdom"}]},{"given":"Nigel","family":"Shadbolt","sequence":"additional","affiliation":[{"name":"University of Oxford, Oxford, United Kingdom"}]}],"member":"320","published-online":{"date-parts":[[2019,5,2]]},"reference":[{"key":"e_1_3_2_2_1_1","volume-title":"Zero to Eight: Children's Media Use in America","year":"2013","unstructured":"2013. Zero to Eight: Children's Media Use in America 2013 . Technical Report. Common Sense Media . https:\/\/www.commonsensemedia.org\/ research\/zero-to-eight-childrens-media-use-in-america-2013 2013. Zero to Eight: Children's Media Use in America 2013. Technical Report. Common Sense Media. https:\/\/www.commonsensemedia.org\/ research\/zero-to-eight-childrens-media-use-in-america-2013"},{"key":"e_1_3_2_2_2_1","first-page":"2018","article-title":"Call for evidence - Age Appropriate Design Code. https:\/\/ico.org.uk\/about-the-ico\/ico-and-stakeholder-consultations\/ call-for-evidence-age-appropriate-design-code\/","year":"2018","unstructured":"2018 . Call for evidence - Age Appropriate Design Code. https:\/\/ico.org.uk\/about-the-ico\/ico-and-stakeholder-consultations\/ call-for-evidence-age-appropriate-design-code\/ . Accessed : 2018 - 2009 . 2018. Call for evidence - Age Appropriate Design Code. https:\/\/ico.org.uk\/about-the-ico\/ico-and-stakeholder-consultations\/ call-for-evidence-age-appropriate-design-code\/. Accessed: 2018-09.","journal-title":"Accessed"},{"key":"e_1_3_2_2_3_1","first-page":"2018","article-title":"Children and the GDPR. https:\/\/ico.org.uk\/for-organisations\/ guide-to-the-general-data-protection-regulation-gdpr\/childrenand-the-gdpr\/","year":"2018","unstructured":"2018 . Children and the GDPR. https:\/\/ico.org.uk\/for-organisations\/ guide-to-the-general-data-protection-regulation-gdpr\/childrenand-the-gdpr\/ . Accessed : 2018 - 2008 . 2018. Children and the GDPR. https:\/\/ico.org.uk\/for-organisations\/ guide-to-the-general-data-protection-regulation-gdpr\/childrenand-the-gdpr\/. Accessed: 2018-08.","journal-title":"Accessed"},{"key":"e_1_3_2_2_4_1","first-page":"2018","article-title":"Children's rights and the GDPR -- are the new consultations creating light or further confusion? http:\/\/blogs.lse.ac.uk\/ mediapolicyproject\/2017\/05\/11\/childrens-rights-and-the-gdprare-the-new-consultations-creating-light-or-further-confusion\/","year":"2018","unstructured":"2018 . Children's rights and the GDPR -- are the new consultations creating light or further confusion? http:\/\/blogs.lse.ac.uk\/ mediapolicyproject\/2017\/05\/11\/childrens-rights-and-the-gdprare-the-new-consultations-creating-light-or-further-confusion\/ . Accessed : 2018 - 2008 . 2018. Children's rights and the GDPR -- are the new consultations creating light or further confusion? http:\/\/blogs.lse.ac.uk\/ mediapolicyproject\/2017\/05\/11\/childrens-rights-and-the-gdprare-the-new-consultations-creating-light-or-further-confusion\/. Accessed: 2018-08.","journal-title":"Accessed"},{"key":"e_1_3_2_2_5_1","first-page":"2018","article-title":"Instagram Help Center. https:\/\/help.instagram.com\/ 116024195217477","year":"2018","unstructured":"2018 . Instagram Help Center. https:\/\/help.instagram.com\/ 116024195217477 . Accessed : 2018 - 2008 . 2018. Instagram Help Center. https:\/\/help.instagram.com\/ 116024195217477. Accessed: 2018-08.","journal-title":"Accessed"},{"key":"e_1_3_2_2_6_1","unstructured":"2019. Must Have Apps for Kids Under Five. https:\/\/ www.lifewire.com\/great-apps-for-kids-5-and-under-4152990. Accessed: 2019-02  2019. Must Have Apps for Kids Under Five. https:\/\/ www.lifewire.com\/great-apps-for-kids-5-and-under-4152990. Accessed: 2019-02"},{"key":"e_1_3_2_2_7_1","volume-title":"Privacy and human behavior in the age of information. Science 347, 6221","author":"Acquisti Alessandro","year":"2015","unstructured":"Alessandro Acquisti , Laura Brandimarte , and George Loewenstein . 2015. Privacy and human behavior in the age of information. Science 347, 6221 ( 2015 ), 509--514. Alessandro Acquisti, Laura Brandimarte, and George Loewenstein. 2015. Privacy and human behavior in the age of information. Science 347, 6221 (2015), 509--514."},{"key":"e_1_3_2_2_8_1","article-title":"The economics of privacy","volume":"52","author":"Acquisti Alessandro","year":"2016","unstructured":"Alessandro Acquisti , Curtis R Taylor , and Liad Wagman . 2016 . The economics of privacy . Journal of Economic Literature 52 , 2 (2016). Alessandro Acquisti, Curtis R Taylor, and Liad Wagman. 2016. The economics of privacy. Journal of Economic Literature 52, 2 (2016).","journal-title":"Journal of Economic Literature"},{"key":"e_1_3_2_2_9_1","volume-title":"The Developmental Psychology-from infancy to adulthood","author":"Ann Birch","year":"2000","unstructured":"Birch Ann . 2000. The Developmental Psychology-from infancy to adulthood . Bucharest : The Technical Publishing House ( 2000 ). Birch Ann. 2000. The Developmental Psychology-from infancy to adulthood. Bucharest: The Technical Publishing House (2000)."},{"key":"e_1_3_2_2_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/2207676.2207727"},{"key":"e_1_3_2_2_11_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.tele.2017.04.013"},{"key":"e_1_3_2_2_12_1","doi-asserted-by":"publisher","DOI":"10.1561\/3300000016"},{"key":"e_1_3_2_2_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/3201064.3201089"},{"key":"e_1_3_2_2_14_1","doi-asserted-by":"publisher","DOI":"10.1177\/1948550612455931"},{"key":"e_1_3_2_2_15_1","unstructured":"Tanya Byron. 2010. Do we have safer children in a digital world? A review of progress since the 2008 Byron Review. (2010).  Tanya Byron. 2010. Do we have safer children in a digital world? A review of progress since the 2008 Byron Review. (2010)."},{"key":"e_1_3_2_2_16_1","volume-title":"The zone of proximal development in Vygotsky's analysis of learning and instruction. Vygotsky's educational theory in cultural context 1","author":"Chaiklin Seth","year":"2003","unstructured":"Seth Chaiklin . 2003. The zone of proximal development in Vygotsky's analysis of learning and instruction. Vygotsky's educational theory in cultural context 1 ( 2003 ), 39--64. Seth Chaiklin. 2003. The zone of proximal development in Vygotsky's analysis of learning and instruction. Vygotsky's educational theory in cultural context 1 (2003), 39--64."},{"key":"e_1_3_2_2_17_1","volume-title":"Small-scale deceit: Deception as a marker of two-, three-, and four-year-olds' early theories of mind. Child development","author":"Chandler Michael","year":"1989","unstructured":"Michael Chandler , Anna S Fritz , and Suzanne Hala . 1989. Small-scale deceit: Deception as a marker of two-, three-, and four-year-olds' early theories of mind. Child development ( 1989 ), 1263--1277. Michael Chandler, Anna S Fritz, and Suzanne Hala. 1989. Small-scale deceit: Deception as a marker of two-, three-, and four-year-olds' early theories of mind. Child development (1989), 1263--1277."},{"key":"e_1_3_2_2_18_1","volume-title":"Parents' involvement in children's learning in the United States and China: Implications for children's academic and emotional adjustment. Child development 82, 3","author":"Sin-Sze Cheung Cecilia","year":"2011","unstructured":"Cecilia Sin-Sze Cheung and Eva M Pomerantz . 2011. Parents' involvement in children's learning in the United States and China: Implications for children's academic and emotional adjustment. Child development 82, 3 ( 2011 ), 932--950. Cecilia Sin-Sze Cheung and Eva M Pomerantz. 2011. Parents' involvement in children's learning in the United States and China: Implications for children's academic and emotional adjustment. Child development 82, 3 (2011), 932--950."},{"key":"e_1_3_2_2_19_1","doi-asserted-by":"publisher","DOI":"10.1080\/03004430.2015.1031657"},{"key":"e_1_3_2_2_20_1","unstructured":"Federal Trade Commission et al. 2015. Kids' Apps Disclosures Revisited.  Federal Trade Commission et al. 2015. Kids' Apps Disclosures Revisited."},{"key":"e_1_3_2_2_21_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2015.07.013"},{"key":"e_1_3_2_2_22_1","volume-title":"An introduction to Vygotsky","author":"Daniels Harry","unstructured":"Harry Daniels . 2005. An introduction to Vygotsky . Psychology Press . Harry Daniels. 2005. An introduction to Vygotsky. Psychology Press."},{"key":"e_1_3_2_2_24_1","doi-asserted-by":"publisher","DOI":"10.1080\/03004430.2016.1238824"},{"key":"e_1_3_2_2_25_1","volume-title":"Proceedings of the Bloomberg Data for Good Exchange Conference.","author":"D'Ignazio Catherine","year":"2015","unstructured":"Catherine D'Ignazio and Rahul Bhargava . 2015 . Approaches to building big data literacy . In Proceedings of the Bloomberg Data for Good Exchange Conference. Catherine D'Ignazio and Rahul Bhargava. 2015. Approaches to building big data literacy. In Proceedings of the Bloomberg Data for Good Exchange Conference."},{"key":"e_1_3_2_2_26_1","doi-asserted-by":"publisher","DOI":"10.1177\/1476718X10367471"},{"key":"e_1_3_2_2_27_1","doi-asserted-by":"publisher","DOI":"10.1080\/03004430.2016.1219730"},{"key":"e_1_3_2_2_28_1","volume-title":"Measuring nominal scale agreement among many raters. Psychological bulletin 76, 5","author":"Fleiss Joseph L","year":"1971","unstructured":"Joseph L Fleiss . 1971. Measuring nominal scale agreement among many raters. Psychological bulletin 76, 5 ( 1971 ), 378. Joseph L Fleiss. 1971. Measuring nominal scale agreement among many raters. Psychological bulletin 76, 5 (1971), 378."},{"key":"e_1_3_2_2_29_1","volume-title":"Researching children's experiences","author":"Freeman Melissa","unstructured":"Melissa Freeman and Sandra Mathison . 2008. Researching children's experiences . The Guilford Press . Melissa Freeman and Sandra Mathison. 2008. Researching children's experiences. The Guilford Press."},{"key":"e_1_3_2_2_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/3173574.3173698"},{"key":"e_1_3_2_2_31_1","doi-asserted-by":"publisher","DOI":"10.1177\/1744987107079791"},{"key":"e_1_3_2_2_32_1","volume-title":"Researching children's experience: Approaches and methods","author":"Greene Sheila","unstructured":"Sheila Greene and Diane Hogan . 2005. Researching children's experience: Approaches and methods . Sage . Sheila Greene and Diane Hogan. 2005. Researching children's experience: Approaches and methods. Sage."},{"key":"e_1_3_2_2_33_1","volume-title":"Understanding bullying and victimization during childhood and adolescence: A mixed methods study. Child development 82, 1","author":"Guerra Nancy G","year":"2011","unstructured":"Nancy G Guerra , Kirk R Williams , and Shelly Sadek . 2011. Understanding bullying and victimization during childhood and adolescence: A mixed methods study. Child development 82, 1 ( 2011 ), 295--310. Nancy G Guerra, Kirk R Williams, and Shelly Sadek. 2011. Understanding bullying and victimization during childhood and adolescence: A mixed methods study. Child development 82, 1 (2011), 295--310."},{"key":"e_1_3_2_2_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/2556288.2557128"},{"key":"e_1_3_2_2_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/3025453.3025823"},{"key":"e_1_3_2_2_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/2858036.2858278"},{"key":"e_1_3_2_2_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/2675133.2675287"},{"key":"e_1_3_2_2_38_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1083-6101.2009.01439.x"},{"key":"e_1_3_2_2_39_1","volume-title":"Young Children and Families in the information age","author":"Judge Sharon","unstructured":"Sharon Judge , Kimberly Floyd , and Tara Jeffs . 2015. Using mobile media devices and apps to promote young children's learning . In Young Children and Families in the information age . Springer , 117--131. Sharon Judge, Kimberly Floyd, and Tara Jeffs. 2015. Using mobile media devices and apps to promote young children's learning. In Young Children and Families in the information age. Springer, 117--131."},{"key":"e_1_3_2_2_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/3134699"},{"key":"e_1_3_2_2_42_1","doi-asserted-by":"publisher","DOI":"10.1145\/3202185.3202735"},{"key":"e_1_3_2_2_43_1","volume-title":"When private information settles the bill: Money and privacy in Google's market for smartphone applications","author":"Kummer Michael E","year":"2016","unstructured":"Michael E Kummer and Patrick Schulte . 2016. When private information settles the bill: Money and privacy in Google's market for smartphone applications . ZEW-Centre for European Economic Research Discussion Paper 16-031 ( 2016 ). Michael E Kummer and Patrick Schulte. 2016. When private information settles the bill: Money and privacy in Google's market for smartphone applications. ZEW-Centre for European Economic Research Discussion Paper 16-031 (2016)."},{"key":"e_1_3_2_2_44_1","unstructured":"Sonia Livingstone. 2006. Children's privacy online: experimenting with boundaries within and beyond the family. (2006).  Sonia Livingstone. 2006. Children's privacy online: experimenting with boundaries within and beyond the family. (2006)."},{"key":"e_1_3_2_2_45_1","first-page":"18","article-title":"Children: a special case for privacy","volume":"46","author":"Livingstone Sonia","year":"2018","unstructured":"Sonia Livingstone . 2018 . Children: a special case for privacy ? Intermedia 46 , 2 (2018), 18 -- 23 . Sonia Livingstone. 2018. Children: a special case for privacy? Intermedia 46, 2 (2018), 18--23.","journal-title":"Intermedia"},{"key":"e_1_3_2_2_46_1","doi-asserted-by":"crossref","unstructured":"Sonia Livingstone Alicia Blum-Ross Jennifer Pavlick and Kjartan Olafsson. 2018. In the digital home how do parents support their children and who supports them? Technical Report. LSE.  Sonia Livingstone Alicia Blum-Ross Jennifer Pavlick and Kjartan Olafsson. 2018. In the digital home how do parents support their children and who supports them? Technical Report. LSE.","DOI":"10.12968\/cypn.2018.5.46"},{"key":"e_1_3_2_2_50_1","volume-title":"Conceptualising privacy online: what do, and what should, children understand? Parenting for a Digital Future","author":"Livingstone Sonia","year":"2018","unstructured":"Sonia Livingstone , Mariya Stoilova , and Rishita Nandagiri . 2018. Conceptualising privacy online: what do, and what should, children understand? Parenting for a Digital Future ( 2018 ), 1--4. Sonia Livingstone, Mariya Stoilova, and Rishita Nandagiri. 2018. Conceptualising privacy online: what do, and what should, children understand? Parenting for a Digital Future (2018), 1--4."},{"key":"e_1_3_2_2_51_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jretai.2008.04.004"},{"key":"e_1_3_2_2_52_1","doi-asserted-by":"publisher","DOI":"10.1145\/3202185.3202753"},{"key":"e_1_3_2_2_53_1","doi-asserted-by":"publisher","DOI":"10.1145\/3173574.3174097"},{"key":"e_1_3_2_2_54_1","doi-asserted-by":"publisher","DOI":"10.1145\/3025453.3025735"},{"key":"e_1_3_2_2_55_1","volume-title":"Theories and approaches to learning in the early years","author":"Miller Linda","unstructured":"Linda Miller and Linda Pound . 2010. Theories and approaches to learning in the early years . Sage . Linda Miller and Linda Pound. 2010. Theories and approaches to learning in the early years. Sage."},{"key":"e_1_3_2_2_56_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.childyouth.2009.05.004"},{"key":"e_1_3_2_2_57_1","volume-title":"Hearing children's voices: methodological issues in conducting focus groups with children aged 7--11 years. Qualitative research 2, 1","author":"Morgan Myfanwy","year":"2002","unstructured":"Myfanwy Morgan , Sara Gibbs , Krista Maxwell , and Nicky Britten . 2002. Hearing children's voices: methodological issues in conducting focus groups with children aged 7--11 years. Qualitative research 2, 1 ( 2002 ), 5--20. Myfanwy Morgan, Sara Gibbs, Krista Maxwell, and Nicky Britten. 2002. Hearing children's voices: methodological issues in conducting focus groups with children aged 7--11 years. Qualitative research 2, 1 (2002), 5--20."},{"key":"e_1_3_2_2_58_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10643-013-0608-3"},{"key":"e_1_3_2_2_59_1","first-page":"119","article-title":"Privacy as contextual integrity","volume":"79","author":"Nissenbaum Helen","year":"2004","unstructured":"Helen Nissenbaum . 2004 . Privacy as contextual integrity . Wash. L. Rev. 79 (2004), 119 . Helen Nissenbaum. 2004. Privacy as contextual integrity. Wash. L. Rev. 79 (2004), 119.","journal-title":"Wash. L. Rev."},{"key":"e_1_3_2_2_60_1","unstructured":"ofcom.org. 2017. Children and parents: media use and attitude report. https:\/\/www.ofcom.org.uk\/ data\/assets\/pdf_file\/0020\/108182\/children-parents-media-useattitudes-2017.pdf  ofcom.org. 2017. Children and parents: media use and attitude report. https:\/\/www.ofcom.org.uk\/ data\/assets\/pdf_file\/0020\/108182\/children-parents-media-useattitudes-2017.pdf"},{"key":"e_1_3_2_2_61_1","doi-asserted-by":"publisher","DOI":"10.1109\/MIC.2016.34"},{"key":"e_1_3_2_2_62_1","doi-asserted-by":"publisher","DOI":"10.1145\/3097286.3097338"},{"key":"e_1_3_2_2_63_1","doi-asserted-by":"publisher","DOI":"10.12681\/ppej.8779"},{"key":"e_1_3_2_2_64_1","volume-title":"Eleni Kyza, Daniel Edelson, and Elliot Soloway.","author":"Quintana Chris","year":"2004","unstructured":"Chris Quintana , Brian J Reiser , Elizabeth A Davis , Joseph Krajcik , Eric Fretz , Ravit Golan Duncan , Eleni Kyza, Daniel Edelson, and Elliot Soloway. 2004 . A scaffolding design framework for software to support science inquiry. The journal of the learning sciences 13, 3 (2004), 337-- 386. Chris Quintana, Brian J Reiser, Elizabeth A Davis, Joseph Krajcik, Eric Fretz, Ravit Golan Duncan, Eleni Kyza, Daniel Edelson, and Elliot Soloway. 2004. A scaffolding design framework for software to support science inquiry. The journal of the learning sciences 13, 3 (2004), 337-- 386."},{"key":"e_1_3_2_2_65_1","volume-title":"Workshop on Technology and Consumer Protection (ConPro 2017), in conjunction with the 38th IEEE Symposium on Security and Privacy.","author":"Reyes Irwin","year":"2017","unstructured":"Irwin Reyes , Primal Wiesekera , Abbas Razaghpanah , Joel Reardon , Narseo Vallina-Rodriguez , Serge Egelman , and Christian Kreibich . 2017 . \" Is Our Children's Apps Learning?\" Automatically Detecting COPPA Violations . In Workshop on Technology and Consumer Protection (ConPro 2017), in conjunction with the 38th IEEE Symposium on Security and Privacy. Irwin Reyes, Primal Wiesekera, Abbas Razaghpanah, Joel Reardon, Narseo Vallina-Rodriguez, Serge Egelman, and Christian Kreibich. 2017. \"Is Our Children's Apps Learning?\" Automatically Detecting COPPA Violations. In Workshop on Technology and Consumer Protection (ConPro 2017), in conjunction with the 38th IEEE Symposium on Security and Privacy."},{"key":"e_1_3_2_2_66_1","doi-asserted-by":"publisher","DOI":"10.1515\/popets-2018-0021"},{"key":"e_1_3_2_2_67_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2015.09.013"},{"key":"e_1_3_2_2_68_1","doi-asserted-by":"publisher","DOI":"10.1145\/3091478.3091479"},{"key":"e_1_3_2_2_69_1","unstructured":"Daniel J Solove. 2008. Understanding privacy. (2008).  Daniel J Solove. 2008. Understanding privacy. (2008)."},{"key":"e_1_3_2_2_70_1","volume-title":"Focus groups: Theory and practice","author":"Stewart David W","unstructured":"David W Stewart and Prem N Shamdasani . 2014. Focus groups: Theory and practice . Vol. 20 . Sage publications. David W Stewart and Prem N Shamdasani. 2014. Focus groups: Theory and practice. Vol. 20. Sage publications."},{"key":"e_1_3_2_2_71_1","doi-asserted-by":"publisher","DOI":"10.1145\/2637166.2637232"},{"key":"e_1_3_2_2_72_1","doi-asserted-by":"publisher","DOI":"10.1145\/3173574.3173967"},{"key":"e_1_3_2_2_73_1","doi-asserted-by":"publisher","DOI":"10.1145\/1837110.1837125"},{"key":"e_1_3_2_2_74_1","volume-title":"Involving Parents in Their Children's Learning: A Knowledge-Sharing Approach","author":"Whalley Margy","unstructured":"Margy Whalley . 2017. Involving Parents in Their Children's Learning: A Knowledge-Sharing Approach . Sage . Margy Whalley. 2017. Involving Parents in Their Children's Learning: A Knowledge-Sharing Approach. Sage."},{"key":"e_1_3_2_2_75_1","volume-title":"USENIX Security Symposium. 499--514","author":"Wijesekera Primal","year":"2015","unstructured":"Primal Wijesekera , Arjun Baokar , Ashkan Hosseini , Serge Egelman , David Wagner , and Konstantin Beznosov . 2015 . Android Permissions Remystified: A Field Study on Contextual Integrity .. In USENIX Security Symposium. 499--514 . Primal Wijesekera, Arjun Baokar, Ashkan Hosseini, Serge Egelman, David Wagner, and Konstantin Beznosov. 2015. Android Permissions Remystified: A Field Study on Contextual Integrity.. In USENIX Security Symposium. 499--514."},{"key":"e_1_3_2_2_76_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2018.1870874"},{"key":"e_1_3_2_2_77_1","doi-asserted-by":"publisher","DOI":"10.1145\/2998181.2998352"},{"key":"e_1_3_2_2_78_1","doi-asserted-by":"publisher","DOI":"10.1145\/2998181.2998236"},{"key":"e_1_3_2_2_79_1","doi-asserted-by":"publisher","DOI":"10.1145\/2998181.2998316"},{"key":"e_1_3_2_2_80_1","doi-asserted-by":"publisher","DOI":"10.1145\/2517840.2517864"},{"key":"e_1_3_2_2_81_1","volume-title":"Cyberheroes: The design and evaluation of an interactive ebook to educate children about online privacy. International Journal of ChildComputer Interaction","author":"Zhang-Kennedy Leah","year":"2017","unstructured":"Leah Zhang-Kennedy , Yomna Abdelaziz , and Sonia Chiasson . 2017 . Cyberheroes: The design and evaluation of an interactive ebook to educate children about online privacy. International Journal of ChildComputer Interaction (2017). Leah Zhang-Kennedy, Yomna Abdelaziz, and Sonia Chiasson. 2017. Cyberheroes: The design and evaluation of an interactive ebook to educate children about online privacy. International Journal of ChildComputer Interaction (2017)."},{"key":"e_1_3_2_2_82_1","doi-asserted-by":"publisher","DOI":"10.1145\/2930674.2935984"},{"key":"e_1_3_2_2_83_1","doi-asserted-by":"publisher","DOI":"10.1145\/2930674.2930716"}],"event":{"name":"CHI '19: CHI Conference on Human Factors in Computing Systems","location":"Glasgow Scotland Uk","acronym":"CHI '19","sponsor":["SIGCHI ACM Special Interest Group on Computer-Human Interaction"]},"container-title":["Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3290605.3300336","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3290605.3300336","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T00:58:07Z","timestamp":1750208287000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3290605.3300336"}},"subtitle":["Understanding Children's Perception of Privacy Risks Online"],"short-title":[],"issued":{"date-parts":[[2019,5,2]]},"references-count":78,"alternative-id":["10.1145\/3290605.3300336","10.1145\/3290605"],"URL":"https:\/\/doi.org\/10.1145\/3290605.3300336","relation":{},"subject":[],"published":{"date-parts":[[2019,5,2]]},"assertion":[{"value":"2019-05-02","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}