{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:09:39Z","timestamp":1750219779893,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":31,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,6,19]],"date-time":"2023-06-19T00:00:00Z","timestamp":1687132800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,6,19]]},"DOI":"10.1145\/3585088.3593874","type":"proceedings-article","created":{"date-parts":[[2023,6,14]],"date-time":"2023-06-14T04:06:08Z","timestamp":1686715568000},"page":"475-479","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Sixty Percent: A Proactive Approach to Developing a Security-Conscious Mindset in Children"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0002-2030-9155","authenticated-orcid":false,"given":"Morgan","family":"Evans","sequence":"first","affiliation":[{"name":"Lancaster University, United Kingdom"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6375-7604","authenticated-orcid":false,"given":"Elisa","family":"Rubegni","sequence":"additional","affiliation":[{"name":"Lancaster University, United Kingdom"}]}],"member":"320","published-online":{"date-parts":[[2023,6,19]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"ONS. 2020. Internet access \u2013 households and individuals Great Britain - Office for National Statistics.\u00a0www.ons.gov.uk. Retrieved from https:\/\/www.ons.gov.uk\/peoplepopulationandcommunity\/householdcharacteristics\/homeinternetandsocialmediausage\/bulletins\/internetaccesshouseholdsandindividuals\/latest."},{"key":"e_1_3_2_1_2_1","unstructured":"Cabinet Office. 2009.\u00a0Cyber Security Strategy of the United Kingdom safety security and resilience in cyber space."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"crossref","unstructured":"Kanchan Singh Sakshi S Grover and Ranjini Kishen Kumar. 2022. Cyber Security Vulnerability Detection Using Natural Language Processing.\u00a02022 IEEE World AI IoT Congress (AIIoT).","DOI":"10.1109\/AIIoT54504.2022.9817336"},{"key":"e_1_3_2_1_4_1","volume-title":"Media use and attitudes report","author":"Children","year":"2022","unstructured":"Ofcom. 2022.\u00a0Children and parents: Media use and attitudes report 2022. Ofcom."},{"volume-title":"Retrieved","year":"2019","key":"e_1_3_2_1_5_1","unstructured":"Facebook. 2019. Terms of Service.\u00a0Facebook. Retrieved February 26, 2023 from https:\/\/www.facebook.com\/legal\/terms."},{"key":"e_1_3_2_1_6_1","unstructured":"Instagram. 2015. Terms of Use | Instagram Help Center.\u00a0Instagram.com. Retrieved from https:\/\/help.instagram.com\/581066165581870."},{"volume-title":"Retrieved","year":"2019","key":"e_1_3_2_1_7_1","unstructured":"Snapchat. 2019. Terms of Service \u2013 Snap Inc.\u00a0Snap.com. Retrieved February 26, 2023 from https:\/\/www.snap.com\/en-US\/terms."},{"key":"e_1_3_2_1_8_1","unstructured":"TikTok. 2022. Terms of Service | TikTok.\u00a0www.tiktok.com. Retrieved from https:\/\/www.tiktok.com\/legal\/page\/eea\/terms-of-service\/en."},{"volume-title":"Retrieved","year":"2021","key":"e_1_3_2_1_9_1","unstructured":"WhatsApp. 2021. WhatsApp Terms of Service.\u00a0WhatsApp.com. Retrieved February 26, 2023 from https:\/\/www.whatsapp.com\/legal\/terms-of-service\/?lang=en."},{"key":"e_1_3_2_1_10_1","unstructured":"Richard Power. 2011.\u00a0CHILD IDENTITY THEFT New Evidence Indicates Identity Thieves are Targeting Children for Unused Social Security Numbers."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"crossref","unstructured":"Hussain Aldawood and Geoffrey Skinner. 2018. Educating and Raising Awareness on Cyber Security Social Engineering: A Literature Review.\u00a02018 IEEE International Conference on Teaching Assessment and Learning for Engineering (TALE).","DOI":"10.1109\/TALE.2018.8615162"},{"volume-title":"Digital inclusion through mobile phones?: A comparison between mobile-only and computer users in internet access, skills and use.\u00a0Information","author":"Correa Teresa","key":"e_1_3_2_1_12_1","unstructured":"Teresa Correa, Isabel Pavez, and Javier Contreras. 2018. Digital inclusion through mobile phones?: A comparison between mobile-only and computer users in internet access, skills and use.\u00a0Information, Communication & Society\u00a023, 7: 1\u201318."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"crossref","unstructured":"Esma A\u00efmeur Sabrine Amri and Gilles Brassard. 2023. Fake news disinformation and misinformation in social media: a review.\u00a0Social Network Analysis and Mining\u00a013 1.","DOI":"10.1007\/s13278-023-01028-5"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"crossref","unstructured":"Ishaani Priyadarshini Sandipan Sahu and Raghvendra Kumar. 2023. A transfer learning approach for detecting offensive and hate speech on social media platforms.\u00a0Multimedia Tools and Applications\u00a02023.","DOI":"10.1007\/s11042-023-14481-3"},{"key":"e_1_3_2_1_15_1","volume-title":"Muhammad Sabih, and Hocine Cherifi.","author":"Qureshi Khubaib Ahmed","year":"2022","unstructured":"Khubaib Ahmed Qureshi, Rauf Ahmed Shams Malick, Muhammad Sabih, and Hocine Cherifi. 2022. Deception detection on social media: A source-based perspective.\u00a0Knowledge-Based Systems\u00a0256, 2022: 109649."},{"key":"e_1_3_2_1_16_1","unstructured":"Ofcom. 2022.\u00a0Online Nation."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"crossref","unstructured":"John Dempsey Gavin Sim and Brendan Cassidy. 2018.\u00a0Designing for GDPR -Investigating Children's Understanding of Privacy: A Survey Approach.","DOI":"10.14236\/ewic\/HCI2018.26"},{"key":"e_1_3_2_1_18_1","first-page":"1","article-title":"No Telling Passcodes Out Because They're Private","author":"Kumar Priya","year":"2017","unstructured":"Priya Kumar, Shalmali Milind Naik, Utkarsha Ramesh Devkar, Marshini Chetty, Tamara L. Clegg, and Jessica Vitak. 2017. \u201cNo Telling Passcodes Out Because They're Private.\u201d\u00a0Proceedings of the ACM on Human-Computer Interaction\u00a01, CSCW: 1\u201321.","journal-title":"\u00a0Proceedings of the ACM on Human-Computer Interaction\u00a01, CSCW"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"crossref","unstructured":"Filippos Giannakas G. Kambourakis and S. Gritzalis. 2015. CyberAware: A mobile game-based app for cybersecurity education and awareness.\u00a02015 International Conference on Interactive Mobile Communication Technologies and Learning (IMCL): 54\u201358.","DOI":"10.1109\/IMCTL.2015.7359553"},{"key":"e_1_3_2_1_20_1","volume-title":"Pensa","author":"Bioglio Livio","year":"2019","unstructured":"Livio Bioglio, Sara Capecchi, Federico Peiretti, Dennis Sayed, Antonella Torasso, and Ruggero G. Pensa. 2019. A Social Network Simulation Game to Raise Awareness of Privacy Among School Children.\u00a0IEEE Transactions on Learning Technologies\u00a012, 4: 456\u2013469."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"crossref","unstructured":"Jun Zhao Blanche Duron and Ge Wang. 2022. KOALA Hero: Inform Children of Privacy Risks of Mobile Apps.\u00a0Interaction Design and Children\u00a02022.","DOI":"10.1145\/3501712.3535278"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"crossref","unstructured":"Aurora Constantin Jessica Korte Judith Good 2022. A Distributed Participatory Design Research Protocol for Co-designing with Children.\u00a0Interaction Design and Children\u00a02022.","DOI":"10.1145\/3501712.3535286"},{"key":"e_1_3_2_1_23_1","unstructured":"UK Council for Internet Safety. 2020.\u00a0Education for a Connected World -2020 edition."},{"key":"e_1_3_2_1_24_1","volume-title":"Randomized Response: A Survey Technique for Eliminating Evasive Answer Bias.\u00a0Journal of the American Statistical Association\u00a060, 309: 63\u201369.","author":"Warner Stanley L.","year":"1965","unstructured":"Stanley L. Warner. 1965. Randomized Response: A Survey Technique for Eliminating Evasive Answer Bias.\u00a0Journal of the American Statistical Association\u00a060, 309: 63\u201369."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"crossref","unstructured":"Julia Meisters Adrian Hoffmann and Jochen Musch. 2022. More than random responding: Empirical evidence for the validity of the (Extended) Crosswise Model.\u00a0Behavior Research Methods.","DOI":"10.3758\/s13428-022-01819-2"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"crossref","unstructured":"Paul A Grassi James L Fenton Elaine M Newton 2017. Digital identity guidelines: authentication and lifecycle management.\u00a0NIST Special Publication 800-63B.","DOI":"10.6028\/NIST.SP.800-63b"},{"key":"e_1_3_2_1_27_1","unstructured":"Monica Konnie Mensah and Alfred Kuranchie. 2013. Influence of Parenting Styles on the Social Development of Children.\u00a0Academic Journal of Interdisciplinary Studies\u00a02 3."},{"key":"e_1_3_2_1_28_1","volume-title":"Cyberbullying: A Review of the Literature.\u00a0SSRN Electronic Journal\u00a01, 1: 1\u20139.","author":"Chakraborty Saurav","year":"2021","unstructured":"Saurav Chakraborty, Anol Bhattacherjee, and Agnieszka Onuchowska. 2021. Cyberbullying: A Review of the Literature.\u00a0SSRN Electronic Journal\u00a01, 1: 1\u20139."},{"key":"e_1_3_2_1_29_1","volume-title":"Retrieved","author":"NCSC.","year":"2022","unstructured":"NCSC. 2022. CyberSprinters.\u00a0www.ncsc.gov.uk. Retrieved February 26, 2023 from https:\/\/www.ncsc.gov.uk\/collection\/cybersprinters."},{"key":"e_1_3_2_1_30_1","unstructured":"Janet Read. 2005. The ABC of CCI.\u00a0Interfaces\u00a062 Spring 2005: 8\u20139."},{"key":"e_1_3_2_1_31_1","volume-title":"Cyberbullying: A Review of the Literature.\u00a0SSRN Electronic Journal\u00a01, 1: 1\u20139.","author":"Chakraborty Saurav","year":"2021","unstructured":"Saurav Chakraborty, Anol Bhattacherjee, and Agnieszka Onuchowska. 2021. Cyberbullying: A Review of the Literature.\u00a0SSRN Electronic Journal\u00a01, 1: 1\u20139."}],"event":{"name":"IDC '23: Interaction Design and Children","sponsor":["SIGCHI ACM Special Interest Group on Computer-Human Interaction"],"location":"Chicago IL USA","acronym":"IDC '23"},"container-title":["Proceedings of the 22nd Annual ACM Interaction Design and Children Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3585088.3593874","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3585088.3593874","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T16:37:41Z","timestamp":1750178261000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3585088.3593874"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,6,19]]},"references-count":31,"alternative-id":["10.1145\/3585088.3593874","10.1145\/3585088"],"URL":"https:\/\/doi.org\/10.1145\/3585088.3593874","relation":{},"subject":[],"published":{"date-parts":[[2023,6,19]]},"assertion":[{"value":"2023-06-19","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}