{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T05:05:40Z","timestamp":1750309540427,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":49,"publisher":"ACM","license":[{"start":{"date-parts":[[2025,4,25]],"date-time":"2025-04-25T00:00:00Z","timestamp":1745539200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000001","name":"NSF (National Science Foundation)","doi-asserted-by":"publisher","award":["CNS-2426397, CNS-2232653"],"award-info":[{"award-number":["CNS-2426397, CNS-2232653"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100019827","name":"Meta","doi-asserted-by":"publisher","award":["Research Award"],"award-info":[{"award-number":["Research Award"]}],"id":[{"id":"10.13039\/100019827","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100006785","name":"Google","doi-asserted-by":"publisher","award":["PSS Faculty Award"],"award-info":[{"award-number":["PSS Faculty Award"]}],"id":[{"id":"10.13039\/100006785","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2025,4,26]]},"DOI":"10.1145\/3706599.3719886","type":"proceedings-article","created":{"date-parts":[[2025,4,28]],"date-time":"2025-04-28T12:15:16Z","timestamp":1745842516000},"page":"1-7","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["Co-Design Privacy Notice and Controls with Children"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-2723-722X","authenticated-orcid":false,"given":"Lanjing","family":"Liu","sequence":"first","affiliation":[{"name":"Virginia Tech, Blacksburg, Virginia, USA"}]},{"ORCID":"https:\/\/orcid.org\/0009-0004-6886-294X","authenticated-orcid":false,"given":"Xiaozheng","family":"Wang","sequence":"additional","affiliation":[{"name":"Virginia Polytechnic Institute and State University, Blacksburg, Virginia, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5432-6952","authenticated-orcid":false,"given":"Shaddi","family":"Hasan","sequence":"additional","affiliation":[{"name":"Computer Science, Virginia Tech, Blacksburg, Virginia, USA"}]},{"ORCID":"https:\/\/orcid.org\/0009-0008-7900-9265","authenticated-orcid":false,"given":"Yaxing","family":"Yao","sequence":"additional","affiliation":[{"name":"Department of Computer Science, Virginia Tech, Blacksburg, Virginia, USA"}]}],"member":"320","published-online":{"date-parts":[[2025,4,25]]},"reference":[{"doi-asserted-by":"publisher","unstructured":"Mamtaj Akter Amy\u00a0J. Godfrey Jess Kropczynski Heather\u00a0R. Lipford and Pamela\u00a0J. Wisniewski. 2022. From Parental Control to Joint Family Oversight: Can Parents and Teens Manage Mobile Online Safety and Privacy as Equals? Proceedings of the ACM on Human-Computer Interaction 6 CSCW1 (2022) 57:1\u201357:28. 10.1145\/1145\/3512904","key":"e_1_3_3_2_2_2","DOI":"10.1145\/1145\/3512904"},{"doi-asserted-by":"publisher","key":"e_1_3_3_2_3_2","DOI":"10.1145\/3381991.3395612"},{"doi-asserted-by":"publisher","unstructured":"Noura Alomar and Serge Egelman. 2022. Developers Say the Darnedest Things: Privacy Compliance Processes Followed by Developers of Child-Directed Apps. Proceedings on Privacy Enhancing Technologies 2022 (10 2022) 250\u2013273. 10.56553\/popets-2022-0108","key":"e_1_3_3_2_4_2","DOI":"10.56553\/popets-2022-0108"},{"doi-asserted-by":"publisher","unstructured":"J.\u00a0Craig Andrews Kristen\u00a0L. Walker and Jeremy Kees. 2020. Children and Online Privacy Protection: Empowerment from Cognitive Defense Strategies. Journal of Public Policy & Marketing 39 2 (April 2020) 205\u2013219. 10.1177\/0743915619883638 Publisher: SAGE Publications Inc.","key":"e_1_3_3_2_5_2","DOI":"10.1177\/0743915619883638"},{"doi-asserted-by":"publisher","key":"e_1_3_3_2_6_2","DOI":"10.1145\/3311927.3325324"},{"key":"e_1_3_3_2_7_2","volume-title":"Successful qualitative research: a practical guide for beginners","author":"Braun Virginia","year":"2013","unstructured":"Virginia Braun and Victoria Clarke. 2013. Successful qualitative research: a practical guide for beginners. SAGE, Los Angeles. OCLC: ocn811733656."},{"key":"e_1_3_3_2_8_2","volume-title":"Global Kids Online research synthesis, 2015\u20132016","author":"Byrne Jasmina","year":"2016","unstructured":"Jasmina Byrne, Daniel Kardefelt-Winther, Sonia Livingstone, and Mariya Stoilova. 2016. Global Kids Online research synthesis, 2015\u20132016. Technical Report. UNICEF Office of Research\u2013 Innocenti and London School of Economics and Political Science, London, United Kingdom. http:\/\/globalkidsonline.net\/synthesis-report\/"},{"unstructured":"Cansu Caglar. 2021. Children\u2019s Right To Privacy And Data Protection: Does the Article on Conditions Applicable to Child\u2019s Consent Under the GDPR Tackle the Challenges of the Digital Era or Create Further Confusion? European Journal of Law and Technology 12 2 (2021) 1\u201331.","key":"e_1_3_3_2_9_2"},{"doi-asserted-by":"publisher","key":"e_1_3_3_2_10_2","DOI":"10.1145\/3544548.3581134"},{"doi-asserted-by":"publisher","unstructured":"John Dempsey Gavin Sim Brendan Cassidy and Vinh-Thong Ta. 2022. Children designing privacy warnings: Informing a set of design guidelines. International Journal of Child-Computer Interaction 31 (March 2022) 100446. 10.1016\/j.ijcci.2021.100446","key":"e_1_3_3_2_11_2","DOI":"10.1016\/j.ijcci.2021.100446"},{"doi-asserted-by":"publisher","key":"e_1_3_3_2_12_2","DOI":"10.1145\/1620545.1620564"},{"doi-asserted-by":"publisher","key":"e_1_3_3_2_13_2","DOI":"10.1145\/302979.303166"},{"doi-asserted-by":"publisher","key":"e_1_3_3_2_14_2","DOI":"10.1145\/3411764.3445599"},{"doi-asserted-by":"publisher","key":"e_1_3_3_2_15_2","DOI":"10.1145\/3411764.3445599"},{"doi-asserted-by":"publisher","key":"e_1_3_3_2_16_2","DOI":"10.1145\/3411764.3445148"},{"doi-asserted-by":"publisher","key":"e_1_3_3_2_17_2","DOI":"10.1109\/COASE.2016.7743474"},{"doi-asserted-by":"publisher","key":"e_1_3_3_2_18_2","DOI":"10.1145\/3411764.3445387"},{"doi-asserted-by":"publisher","key":"e_1_3_3_2_19_2","DOI":"10.1145\/3010915.3010936"},{"doi-asserted-by":"publisher","key":"e_1_3_3_2_20_2","DOI":"10.1145\/1572532.1572538"},{"doi-asserted-by":"publisher","key":"e_1_3_3_2_21_2","DOI":"10.1145\/3202185.3202735"},{"doi-asserted-by":"publisher","unstructured":"Priya\u00a0C. Kumar and Virginia\u00a0L. Byrne. 2022. The 5Ds of privacy literacy: A framework for privacy education. Information and Learning Sciences 123 (2022) 445\u2013461. 10.1108\/ILS-02-2022-0022","key":"e_1_3_3_2_22_2","DOI":"10.1108\/ILS-02-2022-0022"},{"doi-asserted-by":"publisher","key":"e_1_3_3_2_23_2","DOI":"10.1145\/3585088.3589375"},{"doi-asserted-by":"publisher","unstructured":"Anastasia Kuzminykh and Edward Lank. 2019. How Much Is Too Much? Understanding the Information Needs of Parents of Young Children. Proc. ACM Interact. Mob. Wearable Ubiquitous Technol. 3 2 (June 2019) 52:1\u201352:21. 10.1145\/1145\/3328923","key":"e_1_3_3_2_24_2","DOI":"10.1145\/1145\/3328923"},{"doi-asserted-by":"publisher","key":"e_1_3_3_2_25_2","DOI":"10.1145\/1145\/1957656.1957721"},{"doi-asserted-by":"publisher","key":"e_1_3_3_2_26_2","DOI":"10.56553\/popets-2024-0071"},{"doi-asserted-by":"publisher","key":"e_1_3_3_2_27_2","DOI":"10.1145\/3613904.3642044"},{"key":"e_1_3_3_2_28_2","volume-title":"Children\u2019s data and privacy online: Growing up in a digital age. An evidence review","author":"Livingstone Sonia","year":"2019","unstructured":"Sonia Livingstone, Stoilova Mariya, and Rishita Nandagiri. 2019. Children\u2019s data and privacy online: Growing up in a digital age. An evidence review. London School of Economics and Political Science, London."},{"doi-asserted-by":"publisher","key":"e_1_3_3_2_29_2","DOI":"10.4324\/9780203730638-26"},{"doi-asserted-by":"publisher","key":"e_1_3_3_2_30_2","DOI":"10.1145\/3025453.3025735"},{"doi-asserted-by":"crossref","unstructured":"Helen Nissenbaum. 2011. A contextual approach to privacy online. Daedalus 140 4 (2011) 32\u201348.","key":"e_1_3_3_2_31_2","DOI":"10.1162\/DAED_a_00113"},{"doi-asserted-by":"publisher","key":"e_1_3_3_2_32_2","DOI":"10.1145\/3097286.3097338"},{"doi-asserted-by":"publisher","key":"e_1_3_3_2_33_2","DOI":"10.1145\/3078072.3079722"},{"doi-asserted-by":"publisher","unstructured":"Kate Raynes-Goldie and Matthew Allen. 2014. Gaming Privacy: a Canadian case study of a children\u2019s co-created privacy literacy game. Surveillance & Society 12 3 (June 2014) 414\u2013426. 10.24908\/ss.v12i3.4958","key":"e_1_3_3_2_34_2","DOI":"10.24908\/ss.v12i3.4958"},{"doi-asserted-by":"publisher","key":"e_1_3_3_2_35_2","DOI":"10.1145\/3411764.3445465"},{"doi-asserted-by":"publisher","key":"e_1_3_3_2_36_2","DOI":"10.1515\/popets-2018-0021"},{"key":"e_1_3_3_2_37_2","volume-title":"Narrative methods for the human sciences.","author":"Riessman Catherine\u00a0Kohler","year":"2008","unstructured":"Catherine\u00a0Kohler Riessman. 2008. Narrative methods for the human sciences.Sage Publications, Inc, Thousand Oaks, CA, US."},{"doi-asserted-by":"publisher","key":"e_1_3_3_2_38_2","DOI":"10.1145\/3459990.3460725"},{"doi-asserted-by":"publisher","key":"e_1_3_3_2_39_2","DOI":"10.5555\/3235866.3235868"},{"doi-asserted-by":"publisher","key":"e_1_3_3_2_40_2","DOI":"10.1145\/3628516.3655819"},{"doi-asserted-by":"publisher","key":"e_1_3_3_2_41_2","DOI":"10.1145\/3411764.3445333"},{"key":"e_1_3_3_2_42_2","volume-title":"Young and Online: Children\u2019s Perspectives on Life in the Digital Age (The State of the World\u2019s Children 2017 Companion Report)","author":"Third Amanda","year":"2017","unstructured":"Amanda Third, Delphine Bellerose, Juliano\u00a0Diniz De\u00a0Oliveira, Girish Lala, and Georgina Theakstone. 2017. Young and Online: Children\u2019s Perspectives on Life in the Digital Age (The State of the World\u2019s Children 2017 Companion Report). Technical Report. Western Sydney University."},{"doi-asserted-by":"publisher","unstructured":"Sarah Turner Nandita Pattnaik Jason\u00a0R.C. Nurse and Shujun Li. 2022. \"You Just Assume It Is In There I Guess\": Understanding UK Families\u2019 Application and Knowledge of Smart Home Cyber Security. Proc. ACM Hum.-Comput. Interact. 6 CSCW2 Article 269 (Nov. 2022) 34\u00a0pages. 10.1145\/1145\/3555159","key":"e_1_3_3_2_43_2","DOI":"10.1145\/1145\/3555159"},{"doi-asserted-by":"publisher","key":"e_1_3_3_2_44_2","DOI":"10.1145\/1145\/3544548.3580933"},{"doi-asserted-by":"publisher","key":"e_1_3_3_2_45_2","DOI":"10.1145\/3290605.3300251"},{"doi-asserted-by":"publisher","key":"e_1_3_3_2_46_2","DOI":"10.1145\/3173574.3174149"},{"doi-asserted-by":"publisher","key":"e_1_3_3_2_47_2","DOI":"10.1145\/3585088.3589355"},{"doi-asserted-by":"publisher","unstructured":"Leah Zhang-Kennedy Yomna Abdelaziz and Sonia Chiasson. 2017. Cyberheroes: The design and evaluation of an interactive ebook to educate children about online privacy. International Journal of Child-Computer Interaction 13 (July 2017) 10\u201318. 10.1016\/j.ijcci.2017.05.001","key":"e_1_3_3_2_48_2","DOI":"10.1016\/j.ijcci.2017.05.001"},{"doi-asserted-by":"publisher","key":"e_1_3_3_2_49_2","DOI":"10.1145\/2930674.2930716"},{"doi-asserted-by":"publisher","key":"e_1_3_3_2_50_2","DOI":"10.1145\/1145\/3290605.3300336"}],"event":{"sponsor":["SIGCHI ACM Special Interest Group on Computer-Human Interaction"],"acronym":"CHI EA '25","name":"CHI EA '25: Extended Abstracts of the CHI Conference on Human Factors in Computing Systems","location":"Yokohama Japan"},"container-title":["Proceedings of the Extended Abstracts of the CHI Conference on Human Factors in Computing Systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3706599.3719886","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3706599.3719886","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3706599.3719886","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T01:18:35Z","timestamp":1750295915000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3706599.3719886"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,4,25]]},"references-count":49,"alternative-id":["10.1145\/3706599.3719886","10.1145\/3706599"],"URL":"https:\/\/doi.org\/10.1145\/3706599.3719886","relation":{},"subject":[],"published":{"date-parts":[[2025,4,25]]},"assertion":[{"value":"2025-04-25","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}