{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,10]],"date-time":"2026-03-10T11:20:06Z","timestamp":1773141606222,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":60,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,3,11]],"date-time":"2024-03-11T00:00:00Z","timestamp":1710115200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"Honda Research Institute Japan"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,3,11]]},"DOI":"10.1145\/3610977.3634946","type":"proceedings-article","created":{"date-parts":[[2024,3,10]],"date-time":"2024-03-10T00:19:00Z","timestamp":1710029940000},"page":"423-432","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":4,"title":["Snitches Get Unplugged: Adolescents' Privacy Concerns about Robots in the Home are Relationally Situated"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-6964-8441","authenticated-orcid":false,"given":"Leigh","family":"Levinson","sequence":"first","affiliation":[{"name":"Indiana University Bloomington, Bloomington, IN, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1212-3628","authenticated-orcid":false,"given":"Christena","family":"Nippert-Eng","sequence":"additional","affiliation":[{"name":"Indiana University Bloomington, Bloomington, IN, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3191-6818","authenticated-orcid":false,"given":"Randy","family":"Gomez","sequence":"additional","affiliation":[{"name":"Honda Research Institute Japan, Wako, Japan"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2553-854X","authenticated-orcid":false,"given":"Selma","family":"Sabanovi\u0107","sequence":"additional","affiliation":[{"name":"Indiana University Bloomington, Bloomington, IN, USA"}]}],"member":"320","published-online":{"date-parts":[[2024,3,11]]},"reference":[{"key":"e_1_3_2_2_1_1","volume-title":"Fifteenth Symposium on Usable Privacy and Security (SOUPS 2019","author":"Abdi Noura","year":"2019","unstructured":"Noura Abdi, Kopo M. Ramokapane, and Jose M. Such. 2019. More than Smart Speakers: Security and Privacy Perceptions of Smart Home Personal Assistants. In Fifteenth Symposium on Usable Privacy and Security (SOUPS 2019). USENIX Association, Santa Clara, CA, 451--466. https:\/\/www.usenix.org\/conference\/ soups2019\/presentation\/abdi"},{"key":"e_1_3_2_2_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/3411764.3445122"},{"key":"e_1_3_2_2_3_1","doi-asserted-by":"publisher","DOI":"10.1177\/1609406919887274"},{"key":"e_1_3_2_2_4_1","volume-title":"Robots for Connection: A Co-Design Study with Adolescents. In 2022 31st IEEE International Conference on Robot and Human Interactive Communication (RO-MAN). 578--583","author":"Alves-Oliveira Patr\u00edcia","year":"2022","unstructured":"Patr\u00edcia Alves-Oliveira, Elin A. Bj\u00f6rling, Patriya Wiesmann, Heba Dwikat, Simran Bhatia, Kai Mihata, and Maya Cakmak. 2022. Robots for Connection: A Co-Design Study with Adolescents. In 2022 31st IEEE International Conference on Robot and Human Interactive Communication (RO-MAN). 578--583. https:\/\/doi.org\/10.1109\/ RO-MAN53752.2022.9900534"},{"key":"e_1_3_2_2_5_1","doi-asserted-by":"publisher","DOI":"10.1080\/24735132.2022.2101825"},{"key":"e_1_3_2_2_6_1","volume-title":"Social networking in the United States. First Monday 11, 9","author":"Barnes Susan B","year":"2006","unstructured":"Susan B Barnes and A Privacy Paradox. 2006. Social networking in the United States. First Monday 11, 9 (2006)."},{"key":"e_1_3_2_2_7_1","volume-title":"Social robots for education: A review. Science robotics 3, 21","author":"Belpaeme Tony","year":"2018","unstructured":"Tony Belpaeme, James Kennedy, Aditi Ramachandran, Brian Scassellati, and Fumihide Tanaka. 2018. Social robots for education: A review. Science robotics 3, 21 (2018), eaat5954."},{"key":"e_1_3_2_2_8_1","doi-asserted-by":"publisher","DOI":"10.1126\/scirobotics.aat5954"},{"key":"e_1_3_2_2_9_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-62056-1_50"},{"key":"e_1_3_2_2_10_1","doi-asserted-by":"publisher","DOI":"10.1007\/s12369-019-00539-6"},{"key":"e_1_3_2_2_11_1","volume-title":"It's complicated: The social lives of networked teens","author":"Boyd Danah","unstructured":"Danah Boyd. 2014. It's complicated: The social lives of networked teens. Yale University Press."},{"key":"e_1_3_2_2_12_1","volume-title":"Lin, Patrick and Abney, Keith and Bekey","author":"Calo Ryan","unstructured":"Ryan Calo. 2010. Robots and privacy,\" Robot Ethics: The Ethical and Social Implications of Robotics, Lin, Patrick and Abney, Keith and Bekey, George A. MIT press."},{"key":"e_1_3_2_2_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/IEMBS.2010.5627905"},{"key":"e_1_3_2_2_14_1","volume-title":"New York","author":"Dignum Virginia","year":"2020","unstructured":"Virginia Dignum, Melaniel Penagos, Klara Pigmans, and Steven Vosloo. 2020. Policy guidance on AI for children. UNICEF Office of Global Insight and Policy, New York (2020)."},{"key":"e_1_3_2_2_15_1","doi-asserted-by":"publisher","DOI":"10.1007\/s12369-011-0094-y"},{"key":"e_1_3_2_2_16_1","doi-asserted-by":"publisher","DOI":"10.30658\/hmc.1.5"},{"key":"e_1_3_2_2_17_1","volume-title":"Privacy and the Limits of Law. The Yale law journal 89, 3","author":"Gavison Ruth","year":"1980","unstructured":"Ruth Gavison. 1980. Privacy and the Limits of Law. The Yale law journal 89, 3 (1980), 421--471."},{"key":"e_1_3_2_2_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/3290605.3300498"},{"key":"e_1_3_2_2_19_1","doi-asserted-by":"publisher","DOI":"10.1177\/1744987107079791"},{"key":"e_1_3_2_2_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/ROMAN53752.2022.9900644"},{"key":"e_1_3_2_2_21_1","doi-asserted-by":"publisher","DOI":"10.1002\/hbe2.321"},{"key":"e_1_3_2_2_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/3171221.3171288"},{"key":"e_1_3_2_2_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICRA40945.2020.9197016"},{"key":"e_1_3_2_2_24_1","volume-title":"Heather A Horst, Patricia G Lange, Dilan Mahendran, Katynka Z Mart\u00ednez, et al.","author":"Ito Mizuko","year":"2010","unstructured":"Mizuko Ito, Sonja Baumer, Matteo Bittanti, Danah Boyd, Rachel Cody, Becky Herr- Stephenson, Heather A Horst, Patricia G Lange, Dilan Mahendran, Katynka Z Mart\u00ednez, et al. 2010. Hanging out, messing around, and geeking out. MIT Press Cambridge, MA."},{"key":"e_1_3_2_2_25_1","volume-title":"Mixed methods. Qualitative research in applied linguistics: A practical introduction 23","author":"Ivankova Nataliya V","year":"2009","unstructured":"Nataliya V Ivankova and John W Creswell. 2009. Mixed methods. Qualitative research in applied linguistics: A practical introduction 23 (2009), 135--161."},{"key":"e_1_3_2_2_26_1","doi-asserted-by":"publisher","DOI":"10.1111\/cdep.12011"},{"key":"e_1_3_2_2_27_1","volume-title":"you'll have to go into the closet now\": Children's social and moral relationships with a humanoid robot. Developmental psychology 48, 2","author":"Kahn Peter H","year":"2012","unstructured":"Peter H Kahn Jr, Takayuki Kanda, Hiroshi Ishiguro, Nathan G Freier, Rachel L Severson, Brian T Gill, Jolina H Ruckert, and Solace Shen. 2012. \"Robovie, you'll have to go into the closet now\": Children's social and moral relationships with a humanoid robot. Developmental psychology 48, 2 (2012), 303."},{"key":"e_1_3_2_2_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/HRI53351.2022.9889636"},{"key":"e_1_3_2_2_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/1957656.1957721"},{"key":"e_1_3_2_2_30_1","doi-asserted-by":"publisher","DOI":"10.1007\/s12369-013-0178-y"},{"key":"e_1_3_2_2_31_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-24670-8_6"},{"key":"e_1_3_2_2_32_1","volume-title":"What do parents think, and do, about their children's online privacy?","author":"Livingstone Sonia","year":"2018","unstructured":"Sonia Livingstone, Alicia Blum-Ross, and Dongmiao Zhang. 2018. What do parents think, and do, about their children's online privacy? (2018)."},{"key":"e_1_3_2_2_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/3543829.3543838"},{"key":"e_1_3_2_2_34_1","doi-asserted-by":"publisher","DOI":"10.30658\/hmc.1.6"},{"key":"e_1_3_2_2_35_1","doi-asserted-by":"publisher","DOI":"10.3389\/frobt.2021.627958"},{"key":"e_1_3_2_2_36_1","first-page":"2","article-title":"Teens, social media, and privacy","volume":"21","author":"Madden Mary","year":"2013","unstructured":"Mary Madden, Amanda Lenhart, Sandra Cortesi, Urs Gasser, Maeve Duggan, Aaron Smith, and Meredith Beaton. 2013. Teens, social media, and privacy. Pew Research Center 21, 1055 (2013), 2--86.","journal-title":"Pew Research Center"},{"key":"e_1_3_2_2_37_1","doi-asserted-by":"publisher","DOI":"10.1109\/HRI.2016.7451750"},{"key":"e_1_3_2_2_38_1","doi-asserted-by":"crossref","unstructured":"Giovanna Mascheroni Andra Siibak et al. 2021. Datafied childhoods: Data practices and imaginaries in children's lives. Peter Lang.","DOI":"10.3726\/b17460"},{"key":"e_1_3_2_2_39_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.appdev.2008.10.011"},{"key":"e_1_3_2_2_40_1","volume-title":"Doing youth participatory action research: Transforming inquiry with researchers, educators, and students","author":"Mirra Nicole","unstructured":"Nicole Mirra, Antero Garcia, and Ernest Morrell. 2015. Doing youth participatory action research: Transforming inquiry with researchers, educators, and students. Routledge."},{"key":"e_1_3_2_2_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/191666.191703"},{"key":"e_1_3_2_2_42_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijcci.2021.100319"},{"key":"e_1_3_2_2_43_1","article-title":"Privacy in the United States: Some implications for design","volume":"1","author":"Nippert-Eng Christena","year":"2007","unstructured":"Christena Nippert-Eng. 2007. Privacy in the United States: Some implications for design. International Journal of Design 1, 2 (2007).","journal-title":"International Journal of Design"},{"key":"e_1_3_2_2_44_1","volume-title":"Islands of privacy","author":"Nippert-Eng Christena E","unstructured":"Christena E Nippert-Eng. 2019. Islands of privacy. University of Chicago Press."},{"key":"e_1_3_2_2_45_1","first-page":"119","article-title":"Privacy as contextual integrity","volume":"79","author":"Nissenbaum Helen","year":"2004","unstructured":"Helen Nissenbaum. 2004. Privacy as contextual integrity. Wash. L. Rev. 79 (2004), 119.","journal-title":"Wash. L. Rev."},{"key":"e_1_3_2_2_46_1","volume-title":"Privacy in context: Technology, policy, and the integrity of social life","author":"Nissenbaum Helen","unstructured":"Helen Nissenbaum. 2020. Privacy in context: Technology, policy, and the integrity of social life. Stanford University Press."},{"key":"e_1_3_2_2_47_1","doi-asserted-by":"crossref","unstructured":"Jason Reid. 2012. \" My Room! Private! Keep Out! This Means You!\": A Brief Overview of the Emergence of the Autonomous Teen Bedroom in Post--World","DOI":"10.1353\/hcy.2012.0034"},{"key":"e_1_3_2_2_48_1","doi-asserted-by":"publisher","DOI":"10.1145\/3121113.3121212"},{"key":"e_1_3_2_2_49_1","doi-asserted-by":"publisher","DOI":"10.1109\/ARSO.2018.8625758"},{"key":"e_1_3_2_2_50_1","first-page":"293","article-title":"Persuasive Robots Should Avoid Authority: The Effects of Formal and Real Authority on","volume":"39","author":"Saunderson Shane P","year":"2015","unstructured":"Shane P Saunderson and Goldie Nejat. 2015. Persuasive Robots Should Avoid Authority: The Effects of Formal and Real Authority on. Auton. Robots 39 (2015), 293--312.","journal-title":"Auton. Robots"},{"key":"e_1_3_2_2_51_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jecp.2019.06.009"},{"key":"e_1_3_2_2_52_1","doi-asserted-by":"publisher","DOI":"10.1177\/0162243915571167"},{"key":"e_1_3_2_2_53_1","doi-asserted-by":"publisher","DOI":"10.17645\/mac.v8i4.3407"},{"key":"e_1_3_2_2_54_1","doi-asserted-by":"publisher","DOI":"10.1109\/ROMAN.2016.7745233"},{"key":"e_1_3_2_2_55_1","doi-asserted-by":"publisher","DOI":"10.1002\/9780470281819.ch6"},{"key":"e_1_3_2_2_56_1","volume-title":"New York","author":"United Nations Children's Fund (UNICEF). 2021.","year":"2021","unstructured":"United Nations Children's Fund (UNICEF). 2021. AI and You: AI guide for teens. UNICEF Office of Global Insight and Policy, New York (2021)."},{"key":"e_1_3_2_2_57_1","doi-asserted-by":"publisher","DOI":"10.1007\/978--90--6704--731--9_2"},{"key":"e_1_3_2_2_58_1","volume-title":"An introduction to grounded theory with a special focus on axial coding and the coding paradigm. Compendium for early career researchers in mathematics education 13, 1","author":"Vollstedt Maike","year":"2019","unstructured":"Maike Vollstedt and Sebastian Rezat. 2019. An introduction to grounded theory with a special focus on axial coding and the coding paradigm. Compendium for early career researchers in mathematics education 13, 1 (2019), 81--100."},{"key":"e_1_3_2_2_59_1","doi-asserted-by":"publisher","DOI":"10.3389\/feduc.2022.803393"},{"key":"e_1_3_2_2_60_1","volume-title":"End user security and privacy concerns with smart homes. In thirteenth symposium on usable privacy and security (SOUPS","author":"Zeng Eric","year":"2017","unstructured":"Eric Zeng, Shrirang Mare, and Franziska Roesner. 2017. End user security and privacy concerns with smart homes. In thirteenth symposium on usable privacy and security (SOUPS 2017). 65--80."}],"event":{"name":"HRI '24: ACM\/IEEE International Conference on Human-Robot Interaction","location":"Boulder CO USA","acronym":"HRI '24","sponsor":["SIGAI ACM Special Interest Group on Artificial Intelligence","SIGCHI ACM Special Interest Group on Computer-Human Interaction"]},"container-title":["Proceedings of the 2024 ACM\/IEEE International Conference on Human-Robot Interaction"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3610977.3634946","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3610977.3634946","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,28]],"date-time":"2025-08-28T16:31:50Z","timestamp":1756398710000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3610977.3634946"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,3,11]]},"references-count":60,"alternative-id":["10.1145\/3610977.3634946","10.1145\/3610977"],"URL":"https:\/\/doi.org\/10.1145\/3610977.3634946","relation":{},"subject":[],"published":{"date-parts":[[2024,3,11]]},"assertion":[{"value":"2024-03-11","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}