{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T05:06:41Z","timestamp":1750309601444,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":28,"publisher":"ACM","license":[{"start":{"date-parts":[[2025,4,25]],"date-time":"2025-04-25T00:00:00Z","timestamp":1745539200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"Federal Ministry of Education and Research (Germany)","award":["16KIS1876K"],"award-info":[{"award-number":["16KIS1876K"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2025,4,26]]},"DOI":"10.1145\/3706599.3707600","type":"proceedings-article","created":{"date-parts":[[2025,4,23]],"date-time":"2025-04-23T20:20:42Z","timestamp":1745439642000},"page":"1-4","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Privacy for All: Empowering Vulnerable Groups with Diversity-Oriented Online Protection"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0003-6641-0168","authenticated-orcid":false,"given":"Clara","family":"Strathmann","sequence":"first","affiliation":[{"name":"University of Duisburg-Essen, Duisburg, Germany"}]}],"member":"320","published-online":{"date-parts":[[2025,4,25]]},"reference":[{"key":"e_1_3_3_1_1_2","doi-asserted-by":"publisher","DOI":"10.1126\/science.abj0826"},{"key":"e_1_3_3_1_2_2","doi-asserted-by":"publisher","DOI":"10.1145\/1525840.1525846"},{"key":"e_1_3_3_1_3_2","doi-asserted-by":"publisher","DOI":"10.1145\/1067860.1067865"},{"key":"e_1_3_3_1_4_2","doi-asserted-by":"publisher","DOI":"10.1080\/10508422.2017.1393340"},{"key":"e_1_3_3_1_5_2","volume-title":"S. Trepte & P","author":"Dienlin T.","year":"2023","unstructured":"Dienlin, T. (2023). Privacy calculus: Theory, studies, and new perspectives. In S. Trepte & P. K. Masur (Eds.), The Routledge Handbook of Privacy and Social Media (pp. 70\u201379). Routledge."},{"issue":"2","key":"e_1_3_3_1_6_2","first-page":"127","article-title":"Privacy literacy and its problems","volume":"27","author":"Hagendorff T.","year":"2018","unstructured":"Hagendorff, T. (2018). Privacy literacy and its problems. Journal of Information Ethics, 27(2), 127\u2013145.","journal-title":"Journal of Information Ethics"},{"key":"e_1_3_3_1_7_2","doi-asserted-by":"publisher","DOI":"10.1177\/0193841X9501900105"},{"key":"e_1_3_3_1_8_2","unstructured":"Livingstone S. Stoilova M. & Nandagiri R. (2019). Children's data and privacy online: Growing up in a digital age. An evidence reviw. London School of Economics and Political Science. https:\/\/eprints.lse.ac.uk\/101282\/1\/Livingstone_childrens_data_and_privacy_online_research_findings_published.pdf"},{"key":"e_1_3_3_1_9_2","doi-asserted-by":"publisher","DOI":"10.1177\/14703572221093559"},{"key":"e_1_3_3_1_10_2","doi-asserted-by":"publisher","DOI":"10.17645\/mac.v8i2.2855"},{"key":"e_1_3_3_1_11_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-658-18017-1_16-1"},{"key":"e_1_3_3_1_12_2","volume-title":"Qualitative Inhaltsanalyse: Grundlagen und Techniken [Qualitative Content Analysis: Basics and Techniques]","author":"Mayring P.","year":"2022","unstructured":"Mayring, P. (2022). Qualitative Inhaltsanalyse: Grundlagen und Techniken [Qualitative Content Analysis: Basics and Techniques] (13th ed.). Beltz","edition":"13"},{"key":"e_1_3_3_1_13_2","doi-asserted-by":"publisher","DOI":"10.4324\/9781003244677-12"},{"key":"e_1_3_3_1_14_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.childyouth.2021.106170"},{"key":"e_1_3_3_1_15_2","doi-asserted-by":"publisher","DOI":"10.56553\/popets-2024-0094"},{"key":"e_1_3_3_1_16_2","doi-asserted-by":"publisher","DOI":"10.4135\/9781483328164"},{"key":"e_1_3_3_1_17_2","doi-asserted-by":"publisher","DOI":"10.24908\/ss.v7i3\/4.4160"},{"key":"e_1_3_3_1_18_2","doi-asserted-by":"publisher","DOI":"10.1177\/0733464816669805"},{"key":"e_1_3_3_1_19_2","volume-title":"Challenges of Online Security for Senior Citizens [Master thesis]","author":"Sivagumaran S.","year":"2023","unstructured":"Sivagumaran, S. (2023). Challenges of Online Security for Senior Citizens [Master thesis]. Stockholm University, Stockholm. https:\/\/www.diva-portal.org\/smash\/record.jsf?pid=diva2%3A1784344&dswid=-3730"},{"key":"e_1_3_3_1_20_2","volume-title":"Older Adults and Technology Use. https:\/\/coilink.org\/20.500.12592\/95zsg4","author":"Smith A.","year":"2014","unstructured":"Smith, A. (2014). Older Adults and Technology Use. https:\/\/coilink.org\/20.500.12592\/95zsg4"},{"key":"e_1_3_3_1_21_2","doi-asserted-by":"publisher","DOI":"10.1108\/ILS-12-2023-0201"},{"key":"e_1_3_3_1_22_2","doi-asserted-by":"publisher","DOI":"10.1177\/2056305115578681"},{"key":"e_1_3_3_1_23_2","doi-asserted-by":"publisher","DOI":"10.1515\/9781614514909-042"},{"key":"e_1_3_3_1_24_2","doi-asserted-by":"publisher","DOI":"10.1177\/2056305115616149"},{"issue":"2","key":"e_1_3_3_1_25_2","first-page":"409","article-title":"I Agree. Or Do I? A Rights-Based Analysis of the Law on Children's Consent in the Digital World","volume":"34","author":"van der Hof S.","year":"2017","unstructured":"van der Hof, S. (2017). I Agree. Or Do I? A Rights-Based Analysis of the Law on Children's Consent in the Digital World. Wisconsin International Law Journal, 34(2), 409\u2013445. https:\/\/hdl.handle.net\/1887\/58542","journal-title":"Wisconsin International Law Journal"},{"key":"e_1_3_3_1_26_2","doi-asserted-by":"publisher","DOI":"10.1145\/3555144"},{"key":"e_1_3_3_1_27_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-58536-9_16"},{"key":"e_1_3_3_1_28_2","doi-asserted-by":"publisher","DOI":"10.56553\/popets-2024-0009"}],"event":{"name":"CHI EA '25: Extended Abstracts of the CHI Conference on Human Factors in Computing Systems","sponsor":["SIGCHI ACM Special Interest Group on Computer-Human Interaction"],"location":"Yokohama Japan","acronym":"CHI EA '25"},"container-title":["Proceedings of the Extended Abstracts of the CHI Conference on Human Factors in Computing Systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3706599.3707600","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3706599.3707600","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T01:57:10Z","timestamp":1750298230000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3706599.3707600"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,4,25]]},"references-count":28,"alternative-id":["10.1145\/3706599.3707600","10.1145\/3706599"],"URL":"https:\/\/doi.org\/10.1145\/3706599.3707600","relation":{},"subject":[],"published":{"date-parts":[[2025,4,25]]},"assertion":[{"value":"2025-04-25","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}