{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,13]],"date-time":"2026-04-13T23:19:08Z","timestamp":1776122348879,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":80,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,4,21]],"date-time":"2020-04-21T00:00:00Z","timestamp":1587427200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"The U.S. National Science Foundation","award":["CHS-1844881"],"award-info":[{"award-number":["CHS-1844881"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,4,21]]},"DOI":"10.1145\/3313831.3376747","type":"proceedings-article","created":{"date-parts":[[2020,5,27]],"date-time":"2020-05-27T19:28:08Z","timestamp":1590607688000},"page":"1-14","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":58,"title":["Circle of Trust: A New Approach to Mobile Online Safety for Families"],"prefix":"10.1145","author":[{"given":"Arup Kumar","family":"Ghosh","sequence":"first","affiliation":[{"name":"Jacksonville State University, Jacksonville, FL, USA"}]},{"given":"Charles E.","family":"Hughes","sequence":"additional","affiliation":[{"name":"University of Central Florida, Orlando, FL, USA"}]},{"given":"Pamela J.","family":"Wisniewski","sequence":"additional","affiliation":[{"name":"University of Central Florida, Orlando, FL, USA"}]}],"member":"320","published-online":{"date-parts":[[2020,4,23]]},"reference":[{"key":"e_1_3_2_2_1_1","volume-title":"Social Media & Technology","author":"Anderson Monica","year":"2018","unstructured":"Monica Anderson and Jingjing Jiang. 2018. Teens, Social Media & Technology 2018. Pew Research Center: Internet, Science & Tech. Retrieved September 10, 2018 from http:\/\/www.pewinternet.org\/2018\/05\/31\/teens-socialmedia-technology-2018\/"},{"key":"e_1_3_2_2_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/3272973.3273012"},{"key":"e_1_3_2_2_3_1","doi-asserted-by":"publisher","DOI":"10.1016\/0749--5978(91)90022-L"},{"key":"e_1_3_2_2_4_1","doi-asserted-by":"crossref","unstructured":"Diana Baumrind. 1987. A developmental perspective on adolescent risk taking in contemporary America. New directions for child development 37: 93--125.","DOI":"10.1002\/cd.23219873706"},{"key":"e_1_3_2_2_5_1","doi-asserted-by":"publisher","DOI":"10.1002\/cd.128"},{"key":"e_1_3_2_2_6_1","doi-asserted-by":"publisher","DOI":"10.1038\/nn1584"},{"key":"e_1_3_2_2_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/2818048.2819928"},{"key":"e_1_3_2_2_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/1864349.1864382"},{"key":"e_1_3_2_2_9_1","doi-asserted-by":"publisher","DOI":"10.1016\/S1054-139X(03)00100-9"},{"key":"e_1_3_2_2_10_1","volume-title":"It's Complicated: The Social Lives of Networked Teens","unstructured":"danah boyd. 2014. It's Complicated: The Social Lives of Networked Teens. Yale University Press, New Haven."},{"key":"e_1_3_2_2_11_1","doi-asserted-by":"publisher","DOI":"10.1177\/0265407594113011"},{"key":"e_1_3_2_2_12_1","doi-asserted-by":"publisher","DOI":"10.2307\/271007"},{"key":"e_1_3_2_2_13_1","volume-title":"The New York Times. Retrieved","author":"Chen Brian X.","year":"2017","unstructured":"Brian X. Chen. 2017. Google's New Parental Control App Has a Flaw: Puberty. The New York Times. Retrieved July 18, 2018 from https:\/\/www.nytimes.com\/2017\/07\/26\/technology\/personaltech\/android-parental-controls-family-link.html"},{"key":"e_1_3_2_2_14_1","volume-title":"ConnectSafely. Retrieved","author":"Collier Anne","year":"2014","unstructured":"Anne Collier. 2014. Less parental control, more support of kids' self-regulation: Study. ConnectSafely. Retrieved July 18, 2017 from http:\/\/www.connectsafely.org\/less-parental-controlmore-support-of-kids-self-regulation-study\/"},{"key":"e_1_3_2_2_15_1","volume-title":"Proceedings of the Tenth Symposium On Usable Privacy and Security. Retrieved","author":"Cranor Lorrie Faith","year":"2014","unstructured":"Lorrie Faith Cranor, Adam L. Durity, Abigail Marsh, and Blase Ur. 2014. Parents' and Teens' Perspectives on Privacy In a Technology-Filled World. In Proceedings of the Tenth Symposium On Usable Privacy and Security. Retrieved April 26, 2017 from https:\/\/www.usenix.org\/conference\/soups2014\/procee dings\/presentation\/cranor"},{"key":"e_1_3_2_2_16_1","doi-asserted-by":"publisher","unstructured":"Alexei Czeskis Ivayla Dermendjieva Hussein Yapit Alan Borning Batya Friedman Brian Gill and Tadayoshi Kohno. 2010. Parenting from the pocket: value tensions and technical directions for secure and private parent-teen mobile safety. 1. https:\/\/doi.org\/10.1145\/1837110.1837130","DOI":"10.1145\/1837110.1837130"},{"key":"e_1_3_2_2_17_1","doi-asserted-by":"publisher","DOI":"10.2307\/249008"},{"key":"e_1_3_2_2_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/3290605.3300457"},{"key":"e_1_3_2_2_19_1","doi-asserted-by":"publisher","DOI":"10.1080\/17439884.2012.658404"},{"key":"e_1_3_2_2_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/2207676.2208589"},{"key":"e_1_3_2_2_21_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1545--5300.2009.01277.x"},{"key":"e_1_3_2_2_22_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10826-018--1275--1"},{"key":"e_1_3_2_2_23_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1460--2466.2006.00297.x"},{"key":"e_1_3_2_2_24_1","volume-title":"Teaching Stranger Safety to Kids with Autism. Retrieved","author":"Jenna Wharff Ed.M.","year":"2019","unstructured":"Jenna Wharff Ed.M. Teaching Stranger Safety to Kids with Autism. Retrieved April 2, 2019 from http:\/\/blog.stageslearning.com\/blog\/teaching-autismstranger-safety"},{"key":"e_1_3_2_2_25_1","doi-asserted-by":"publisher","DOI":"10.1002\/asi.23450"},{"key":"e_1_3_2_2_26_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.lindif.2014.03.004"},{"key":"e_1_3_2_2_27_1","doi-asserted-by":"publisher","DOI":"10.3758\/BF03193146"},{"key":"e_1_3_2_2_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/3290605.3300827"},{"key":"e_1_3_2_2_29_1","volume-title":"Handbook of Life-Span Development","author":"Fingerman Karen L.","unstructured":"Karen L. Fingerman, Jacqui Smith, and Cynthia Berg. 2010. Coping and Self-Regulation across the Life Span. In Handbook of Life-Span Development. Springer Publishing Company."},{"key":"e_1_3_2_2_30_1","volume-title":"Early engagement and new technologies: Opening up the laboratory, Neelke Doorn, Daan Schuurbiers, Ibo Poel and Michael E","author":"Friedman Batya","year":"2016","unstructured":"Batya Friedman, Peter H. Kahn Jr, Alan Borning, and Alina Huldtgren. 2013. Value Sensitive Design and Information Systems. In Early engagement and new technologies: Opening up the laboratory, Neelke Doorn, Daan Schuurbiers, Ibo Poel and Michael E. Gorman (eds.). Springer Netherlands, 55--95. Retrieved May 22, 2016 from http:\/\/link.springer.com\/chapter\/10.1007\/978--94-0077844--3_4"},{"key":"e_1_3_2_2_31_1","unstructured":"Batya Friedman Peter H. Kahn and Alan Borning. 2002. Value Sensitive Design: Theory and Methods. Retrieved from http:\/\/faculty.washington.edu\/pkahn\/articles\/vsdtheory-methods-tr.pdf"},{"key":"e_1_3_2_2_32_1","doi-asserted-by":"publisher","DOI":"10.1007\/s13178-015-0186--9"},{"key":"e_1_3_2_2_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/3173574.3173698"},{"key":"e_1_3_2_2_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/3173574.3173768"},{"key":"e_1_3_2_2_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/1124772.1124961"},{"key":"e_1_3_2_2_36_1","volume-title":"computing, and society","author":"Harper Richard HR","unstructured":"Richard HR Harper. 2014. Trust, computing, and society. Cambridge University Press."},{"key":"e_1_3_2_2_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/2930674.2930680"},{"key":"e_1_3_2_2_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/2556288.2557128"},{"key":"e_1_3_2_2_39_1","doi-asserted-by":"publisher","DOI":"10.1111\/jcal.12220"},{"key":"e_1_3_2_2_40_1","volume-title":"Proceedings of the 19th ACM Conference on Computer-Supported Cooperative Work & Social Computing (CSCW '16)","author":"Hiniker Alexis","unstructured":"Alexis Hiniker, Sarita Y. Schoenebeck, and Julie A. Kientz. 2016. Not at the Dinner Table: Parents' and Children's Perspectives on Family Technology Rules. In Proceedings of the 19th ACM Conference on Computer-Supported Cooperative Work & Social Computing (CSCW '16), 1376--1389."},{"key":"e_1_3_2_2_41_1","doi-asserted-by":"publisher","DOI":"10.1080\/03004430215102"},{"key":"e_1_3_2_2_42_1","unstructured":"Carrie James Emily Weinstein and Kelly Mendoza. 2019. Teaching Digital Citizens in Today's World: Research and Insights Behind the Common Sense K-- 12 Digital Citizenship Curriculum. Common Sense Media."},{"key":"e_1_3_2_2_43_1","doi-asserted-by":"publisher","DOI":"10.1006\/jado.1999.0266"},{"key":"e_1_3_2_2_44_1","doi-asserted-by":"publisher","DOI":"10.1145\/2750858.2804283"},{"key":"e_1_3_2_2_45_1","doi-asserted-by":"publisher","DOI":"10.1037\/0012--1649.18.2.199"},{"key":"e_1_3_2_2_46_1","doi-asserted-by":"publisher","DOI":"10.1080\/02673843.2019.1651351"},{"key":"e_1_3_2_2_47_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.14678624.1991.tb01588.x"},{"key":"e_1_3_2_2_48_1","doi-asserted-by":"publisher","DOI":"10.1145\/3274370"},{"key":"e_1_3_2_2_49_1","doi-asserted-by":"publisher","DOI":"10.1037\/0003-066X.55.6.665"},{"key":"e_1_3_2_2_50_1","unstructured":"Sonia Livingstone Leslie Haddon Anke G\u00f6rzig and Kjartan \u00d3lafsson. 2011. Risks and safety on the internet: The perspective of European children. EU Kids Online. Retrieved from http:\/\/eprints.lse.ac.uk\/33731\/"},{"key":"e_1_3_2_2_51_1","doi-asserted-by":"publisher","DOI":"10.1001\/jamapediatrics.2017.5314"},{"key":"e_1_3_2_2_52_1","volume-title":"Teens and Digital Monitoring","author":"Anderson Monica","year":"2018","unstructured":"Monica Anderson. 2016. Parents, Teens and Digital Monitoring. Pew Research Center: Internet, Science & Tech. Retrieved September 10, 2018 from http:\/\/www.pewinternet.org\/2016\/01\/07\/parentsteens-and-digital-monitoring\/"},{"key":"e_1_3_2_2_53_1","doi-asserted-by":"publisher","unstructured":"Marije Nouwen Nassim Jafarinaimi and Bieke Zaman. 2017. Parental controls: reimagining technologies for parent-child interaction. https:\/\/doi.org\/10.18420\/ecscw2017--28","DOI":"10.18420\/ecscw2017--28"},{"key":"e_1_3_2_2_54_1","doi-asserted-by":"publisher","DOI":"10.1145\/2370216.2370224"},{"key":"e_1_3_2_2_55_1","doi-asserted-by":"crossref","unstructured":"R. Pain. 2006. Paranoid parenting? Rematerializing risk and fear for children. Social & cultural geography. 7 2: 221--243.","DOI":"10.1080\/14649360600600585"},{"key":"e_1_3_2_2_56_1","doi-asserted-by":"publisher","DOI":"10.1002\/9781118540190.wbeic132"},{"key":"e_1_3_2_2_57_1","volume-title":"The value of privacy","author":"Rossler Beate","unstructured":"Beate Rossler. 2018. The value of privacy. John Wiley & Sons."},{"key":"e_1_3_2_2_58_1","doi-asserted-by":"publisher","DOI":"10.1007\/978--3319--58753-0_91"},{"key":"e_1_3_2_2_59_1","doi-asserted-by":"publisher","DOI":"10.1080\/01926180902945855"},{"key":"e_1_3_2_2_60_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.14697610.2007.01846.x"},{"key":"e_1_3_2_2_61_1","doi-asserted-by":"publisher","DOI":"10.1111\/1467-8624.00210"},{"key":"e_1_3_2_2_62_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.14678624.1992.tb01694.x"},{"key":"e_1_3_2_2_63_1","doi-asserted-by":"publisher","DOI":"10.1145\/2632048.2632107"},{"key":"e_1_3_2_2_64_1","doi-asserted-by":"publisher","DOI":"10.1007\/s12130-010--9130--8"},{"key":"e_1_3_2_2_65_1","doi-asserted-by":"publisher","DOI":"10.1177\/0261927X02250056"},{"key":"e_1_3_2_2_66_1","volume-title":"Proceedings of the 20th ACM Conference on Computer Supported Cooperative Work & Social Computing.","author":"Wisniewski Pamela","unstructured":"Pamela Wisniewski, Arup Kumar Ghosh, Mary Beth Rosson, Heng Xu, and John M. Carroll. 2017. Parental Control vs. Teen Self-Regulation: Is there a middle ground for mobile online safety? In Proceedings of the 20th ACM Conference on Computer Supported Cooperative Work & Social Computing."},{"key":"e_1_3_2_2_67_1","doi-asserted-by":"publisher","DOI":"10.1145\/2702123.2702240"},{"key":"e_1_3_2_2_68_1","doi-asserted-by":"publisher","DOI":"10.1145\/2675133.2675293"},{"key":"e_1_3_2_2_69_1","doi-asserted-by":"publisher","DOI":"10.1145\/2858036.2858317"},{"key":"e_1_3_2_2_70_1","doi-asserted-by":"publisher","DOI":"10.1145\/2907069"},{"key":"e_1_3_2_2_71_1","volume-title":"Social media at the boundaries: supporting parents in managing youth's social media use","author":"Yardi Sarita","unstructured":"Sarita Yardi. 2012. Social media at the boundaries: supporting parents in managing youth's social media use. Georgia Institute of Technology."},{"key":"e_1_3_2_2_72_1","doi-asserted-by":"publisher","DOI":"10.1145\/1978942.1979422"},{"key":"e_1_3_2_2_73_1","volume-title":"It's Time to Do Something: Mitigating the Negative Impacts of Computing Through a Change to the Peer Review Process. ACM FCA. Retrieved","year":"2020","unstructured":"2018. It's Time to Do Something: Mitigating the Negative Impacts of Computing Through a Change to the Peer Review Process. ACM FCA. Retrieved January 6, 2020 from https:\/\/acmfca.org\/2018\/03\/29\/negativeimpacts\/"},{"key":"e_1_3_2_2_74_1","volume-title":"Retrieved","author":"Mobile Effects","year":"2019","unstructured":"Effects of Mobile Phones on Children's and Adolescents' Health: A Commentary - Hardell - 2018 - Child Development - Wiley Online Library. Retrieved September 20, 2019 from https:\/\/srcd.onlinelibrary.wiley.com\/doi\/full\/10.1111\/ cdev.12831"},{"key":"e_1_3_2_2_75_1","volume-title":"Award#1618153 - TWC SBE: Small: Helping Teens and Parents Negotiate Online Privacy and Safety. Retrieved","author":"Award Search NSF","year":"2020","unstructured":"NSF Award Search: Award#1618153 - TWC SBE: Small: Helping Teens and Parents Negotiate Online Privacy and Safety. Retrieved January 6, 2020 from https:\/\/www.nsf.gov\/awardsearch\/showAward?AWD _ID=1618153&HistoricalAwards=false"},{"key":"e_1_3_2_2_76_1","volume-title":"ScienceDaily. Retrieved","author":"Kids","year":"2018","unstructured":"Kids want parental help with online risk, but fear parental freak outs. ScienceDaily. Retrieved September 18, 2018 from https:\/\/www.sciencedaily.com\/releases\/2017\/02\/1702 28084230.htm"},{"key":"e_1_3_2_2_77_1","unstructured":"Amazon Rekognition -- Video and Image - AWS. Retrieved June 10 2018 from https:\/\/aws.amazon.com\/rekognition\/"},{"key":"e_1_3_2_2_78_1","unstructured":"Client--server model - Wikipedia. Retrieved November 28 2017 from https:\/\/en.wikipedia.org\/wiki\/Client%E2%80%93serv er_model"},{"key":"e_1_3_2_2_79_1","volume-title":"Inc. Retrieved","author":"Natural Language Amazon Comprehend","year":"2018","unstructured":"Amazon Comprehend - Natural Language Processing (NLP) and Machine Learning (ML). Amazon Web Services, Inc. Retrieved June 10, 2018 from https:\/\/aws.amazon.com\/comprehend\/"},{"key":"e_1_3_2_2_80_1","unstructured":"IBM SPSS Statistics 24 Documentation - United States. Retrieved June 18 2017 from http:\/\/www01.ibm.com\/support\/docview.wss?uid=swg27047033"}],"event":{"name":"CHI '20: CHI Conference on Human Factors in Computing Systems","location":"Honolulu HI USA","acronym":"CHI '20","sponsor":["SIGCHI ACM Special Interest Group on Computer-Human Interaction"]},"container-title":["Proceedings of the 2020 CHI Conference on Human Factors in Computing Systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3313831.3376747","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3313831.3376747","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T22:38:29Z","timestamp":1750199909000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3313831.3376747"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,4,21]]},"references-count":80,"alternative-id":["10.1145\/3313831.3376747","10.1145\/3313831"],"URL":"https:\/\/doi.org\/10.1145\/3313831.3376747","relation":{},"subject":[],"published":{"date-parts":[[2020,4,21]]},"assertion":[{"value":"2020-04-23","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}