{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,15]],"date-time":"2026-03-15T02:48:49Z","timestamp":1773542929140,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":58,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,11,11]],"date-time":"2024-11-11T00:00:00Z","timestamp":1731283200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100006374","name":"National Science Foundation","doi-asserted-by":"publisher","award":["CNS-1949699"],"award-info":[{"award-number":["CNS-1949699"]}],"id":[{"id":"10.13039\/501100006374","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,11,11]]},"DOI":"10.1145\/3678884.3681888","type":"proceedings-article","created":{"date-parts":[[2024,11,13]],"date-time":"2024-11-13T18:38:08Z","timestamp":1731523088000},"page":"437-443","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":4,"title":["Hacker, Their Actions, and Fear Appeal: A First Look Through the Lens of Children"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-3840-9015","authenticated-orcid":false,"given":"Rizu","family":"Paudel","sequence":"first","affiliation":[{"name":"Utah State University, Logan, Utah, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5764-2253","authenticated-orcid":false,"given":"Mahdi Nasrullah","family":"Al-Ameen","sequence":"additional","affiliation":[{"name":"Utah State University, Logan, Utah, USA"}]}],"member":"320","published-online":{"date-parts":[[2024,11,13]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1002\/jcpy.1191"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1108\/ICS-01-2016-0005"},{"key":"e_1_3_2_1_3_1","volume-title":"Understanding Your Users: A Practical Guide to User Research Methods 2 ed.)","author":"Baxter Kathy","unstructured":"Kathy Baxter, Catherine Courage, and Kelly Caine. 2015. Understanding Your Users: A Practical Guide to User Research Methods 2 ed.). Morgan Kaufmann Publishers Inc., San Francisco, CA, USA."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/3584931.3606983"},{"key":"e_1_3_2_1_5_1","volume-title":"Transforming qualitative information: Thematic analysis and code development. sage","author":"Boyatzis Richard E","unstructured":"Richard E Boyatzis. 1998. Transforming qualitative information: Thematic analysis and code development. sage, Thousand Oaks, CA, USA."},{"key":"e_1_3_2_1_6_1","volume-title":"Using thematic analysis in psychology. Qualitative research in psychology","author":"Braun Virginia","year":"2006","unstructured":"Virginia Braun and Victoria Clarke. 2006. Using thematic analysis in psychology. Qualitative research in psychology, Vol. 3, 2 (2006), 77--101."},{"key":"e_1_3_2_1_7_1","volume-title":"One size fits all? What counts as quality practice in (reflexive) thematic analysis? Qualitative research in psychology","author":"Braun Virginia","year":"2021","unstructured":"Virginia Braun and Victoria Clarke. 2021. One size fits all? What counts as quality practice in (reflexive) thematic analysis? Qualitative research in psychology, Vol. 18, 3 (2021), 328--352."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/3442381.3449837"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"crossref","unstructured":"Yee-Yin Choong Mary Theofanos Karen Renaud and Suzanne Prior. 2019. Case study--exploring children's password knowledge and practices. (2019).","DOI":"10.14722\/usec.2019.23027"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1080\/07380569.2013.807719"},{"key":"e_1_3_2_1_11_1","volume-title":"Proceedings of CHI 2003 workshop on HCI and security systems.","author":"Dourish Paul","year":"2003","unstructured":"Paul Dourish, J Delgado De La Flor, and Melissa Joseph. 2003. Security as a practical problem: Some preliminary observations of everyday mental models. In Proceedings of CHI 2003 workshop on HCI and security systems."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/3584931.3607019"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/3613905.3651113"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/3613904.3642696"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-35936-1_15"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1108\/ICS-04-2023-0047"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/3450329.3476862"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/1541948.1541999"},{"key":"e_1_3_2_1_19_1","volume-title":"Zero to eight. Young children and their internet use","author":"Holloway Donell","year":"2013","unstructured":"Donell Holloway, Lelia Green, and Sonia Livingstone. 2013. Zero to eight. Young children and their internet use, Vol. 14 (2013)."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/3585088.3589359"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1037\/10518-066"},{"key":"e_1_3_2_1_22_1","first-page":"1","article-title":"Cyber security breaches survey 2020. London: Department for Digital","volume":"4","author":"Johns Emma","year":"2020","unstructured":"Emma Johns. 2020. Cyber security breaches survey 2020. London: Department for Digital, Culture, Media & Sport, Vol. 4, 1 (2020), 1--4.","journal-title":"Culture, Media & Sport"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1287\/mksc.2019.1198"},{"key":"e_1_3_2_1_24_1","volume-title":"Proceedings of the ACM on Human-Computer Interaction","volume":"1","author":"Kumar Priya","year":"2017","unstructured":"Priya Kumar, Shalmali Milind Naik, Utkarsha Ramesh Devkar, Marshini Chetty, Tamara L Clegg, and Jessica Vitak. 2017. 'No Telling Passcodes Out Because They're Private' Understanding Children's Mental Models of Privacy and Security Online. Proceedings of the ACM on Human-Computer Interaction, Vol. 1, CSCW (2017), 1--21."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/1358628.1358846"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/3078072.3084333"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/3202185.3210772"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1080\/01972243.2021.1951415"},{"key":"e_1_3_2_1_29_1","volume-title":"NCES 2019--144","author":"McFarland Joel","year":"2019","unstructured":"Joel McFarland, Bill Hussar, Jijun Zhang, Xiaolei Wang, Ke Wang, Sarah Hein, Melissa Diliberti, Emily Forrest Cataldi, Farrah Bullock Mann, and Amy Barmer. 2019. The Condition of Education 2019. NCES 2019--144. National Center for Education Statistics (2019)."},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.3758\/s13415-013-0205-3"},{"key":"e_1_3_2_1_31_1","volume-title":"European Proceedings of Social and Behavioural Sciences","volume":"30","author":"Zardeckait Kristina","year":"2017","unstructured":"Ugn.e Paluckait.e, Kristina vZardeckait.e-Matulaitien.e, et al. 2017. Adolescents? perception of risky behaviour on the internet. European Proceedings of Social and Behavioural Sciences, Vol. 30 (2017)."},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/3442381.3450056"},{"key":"e_1_3_2_1_33_1","volume-title":"SUIC International Conference.","author":"Pasupa Sarakard","year":"2017","unstructured":"Sarakard Pasupa and Krit Pasupa. 2017. The potential of digital storytelling in encouraging sustainable lifestyle. In SUIC International Conference."},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/3637387"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/3579595"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/3584931.3606962"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.3390\/su13031193"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijcci.2020.100169"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/3311927.3325327"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/2307096.2307125"},{"key":"e_1_3_2_1_41_1","first-page":"371","article-title":"Analysis of password generation types in teenagers--focusing on the students of jeollanam-do. International Journal of u-and e-Service","volume":"8","author":"Rim KwangCheol","year":"2015","unstructured":"KwangCheol Rim and SoYoung Choi. 2015. Analysis of password generation types in teenagers--focusing on the students of jeollanam-do. International Journal of u-and e-Service, Science and Technology, Vol. 8, 9 (2015), 371--380.","journal-title":"Science and Technology"},{"key":"e_1_3_2_1_42_1","first-page":"37","article-title":"What educators should know about teaching digital storytelling","volume":"22","author":"Robin Bernard R","year":"2012","unstructured":"Bernard R Robin and Sara G McNeil. 2012. What educators should know about teaching digital storytelling. Digital Education Review, Vol. 22 (2012), 37--51.","journal-title":"Digital Education Review"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2009.11"},{"key":"e_1_3_2_1_44_1","volume-title":"The common sense census: media use by tweens and teens","author":"Sense C","year":"2015","unstructured":"C Sense. 2019. The common sense census: media use by tweens and teens. 2015."},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1080\/10447318.2024.2323248"},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1145\/3584931.3607002"},{"key":"e_1_3_2_1_47_1","volume-title":"TOWARDS THE DESIGN AND EVALUATION OF CLICKBAIT EDUCATION CONTENT: LEVERAGING USER MENTAL MODELS AND LEARNING SCIENCE PRINCIPLES. In INTED2024 Proceedings. IATED, 1794--1804","author":"Shrestha A","year":"2024","unstructured":"A Shrestha, A Flood, B Hackler, A Behfar, and MN Al-Ameen. 2024. TOWARDS THE DESIGN AND EVALUATION OF CLICKBAIT EDUCATION CONTENT: LEVERAGING USER MENTAL MODELS AND LEARNING SCIENCE PRINCIPLES. In INTED2024 Proceedings. IATED, 1794--1804."},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1145\/3613904.3642301"},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1145\/3555763"},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-35822-7_8"},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1145\/3616383"},{"key":"e_1_3_2_1_52_1","volume-title":"30th USENIX Security Symposium (USENIX Security 21)","author":"Theofanos Mary","year":"2021","unstructured":"Mary Theofanos, Yee-Yin Choong, and Olivia Murphy. 2021. 'Passwords Keep Me Safe'--Understanding What Children Think about Passwords. In 30th USENIX Security Symposium (USENIX Security 21). 19--35."},{"key":"e_1_3_2_1_53_1","article-title":"An analytical study on the awareness of parents about cybercrimes against children","volume":"4","author":"Tiwari RITU DUBEY","year":"2019","unstructured":"RITU DUBEY Tiwari. 2019. An analytical study on the awareness of parents about cybercrimes against children. Int. J. Transform. Media, Journalism Mass Commuication, Vol. 4, 2 (2019).","journal-title":"Int. J. Transform. Media, Journalism Mass Commuication"},{"key":"e_1_3_2_1_54_1","volume-title":"Cyber security breaches survey","author":"Vaidya Rishi","year":"2019","unstructured":"Rishi Vaidya. 2019. Cyber security breaches survey 2019. Department for Digital, Culture, Media and Sport, Vol. 66 (2019)."},{"key":"e_1_3_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.1145\/1837110.1837125"},{"key":"e_1_3_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.3390\/su11195264"},{"key":"e_1_3_2_1_57_1","doi-asserted-by":"publisher","DOI":"10.1145\/2930674.2930716"},{"key":"e_1_3_2_1_58_1","doi-asserted-by":"publisher","DOI":"10.23919\/MIPRO.2017.7973563"}],"event":{"name":"CSCW '24: The 27th ACM Conference on Computer-Supported Cooperative Work and Social Computing","location":"San Jose Costa Rica","acronym":"CSCW '24","sponsor":["SIGCHI ACM Special Interest Group on Computer-Human Interaction"]},"container-title":["Companion Publication of the 2024 Conference on Computer-Supported Cooperative Work and Social Computing"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3678884.3681888","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3678884.3681888","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,15]],"date-time":"2026-03-15T01:56:05Z","timestamp":1773539765000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3678884.3681888"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,11,11]]},"references-count":58,"alternative-id":["10.1145\/3678884.3681888","10.1145\/3678884"],"URL":"https:\/\/doi.org\/10.1145\/3678884.3681888","relation":{},"subject":[],"published":{"date-parts":[[2024,11,11]]},"assertion":[{"value":"2024-11-13","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}