{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,13]],"date-time":"2026-04-13T23:14:26Z","timestamp":1776122066923,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":129,"publisher":"ACM","license":[{"start":{"date-parts":[[2026,6,23]],"date-time":"2026-06-23T00:00:00Z","timestamp":1782172800000},"content-version":"vor","delay-in-days":365,"URL":"http:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["2326505"],"award-info":[{"award-number":["2326505"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2025,6,23]]},"DOI":"10.1145\/3713043.3728858","type":"proceedings-article","created":{"date-parts":[[2025,6,23]],"date-time":"2025-06-23T13:16:04Z","timestamp":1750684564000},"page":"296-313","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":4,"title":["Dangerous Playgrounds: Child Players\u2019 Encounters with Design-Mediated Risks on User Generated Game Platforms and Their Safety Practices"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-2720-9114","authenticated-orcid":false,"given":"Zinan","family":"Zhang","sequence":"first","affiliation":[{"name":"College of Information Sciences and Technology, The Pennsylvania State University, University Park, Pennsylvania, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9436-7940","authenticated-orcid":false,"given":"Xinning","family":"Gui","sequence":"additional","affiliation":[{"name":"College of Information Sciences and Technology, The Pennsylvania State University, University Park, Pennsylvania, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0869-0304","authenticated-orcid":false,"given":"Junnan","family":"Yu","sequence":"additional","affiliation":[{"name":"School of Design, The Hong Kong Polytechnic University, Hong Kong, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7932-2939","authenticated-orcid":false,"given":"Sunhye","family":"Bai","sequence":"additional","affiliation":[{"name":"The Ballmer Institute for Children's Behavioral Health, University of Oregon, Portland, Oregon, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4255-3725","authenticated-orcid":false,"given":"Yubo","family":"Kou","sequence":"additional","affiliation":[{"name":"College of Information Sciences and Technology, The Pennsylvania State University, University Park, Pennsylvania, USA"}]}],"member":"320","published-online":{"date-parts":[[2025,6,23]]},"reference":[{"key":"e_1_3_3_2_1_2","doi-asserted-by":"publisher","DOI":"10.1145\/3411764.3445363"},{"key":"e_1_3_3_2_2_2","doi-asserted-by":"publisher","DOI":"10.1145\/3579625"},{"key":"e_1_3_3_2_3_2","volume-title":"International Conference on Human-computer interaction","author":"Agha Zainab","year":"2021","unstructured":"Zainab Agha, Reza Ghaiumy Anaraky, Karla Badillo-Urquiola, Bridget McHugh, and Pamela Wisniewski. 2021. \u2018Just-in-time'parenting: A two-month examination of the bi-directional influences between parental mediation and adolescent online risk exposure. In International Conference on Human-computer interaction, 2021. Springer, 261\u2013280."},{"key":"e_1_3_3_2_4_2","doi-asserted-by":"publisher","DOI":"10.1177\/2047173417719555"},{"key":"e_1_3_3_2_5_2","doi-asserted-by":"publisher","DOI":"10.1145\/3331184.3331262"},{"key":"e_1_3_3_2_6_2","volume-title":"Roblox User and Growth Stats You Need to Know","author":"Team Backlinko","year":"2024","unstructured":"Backlinko Team. Roblox User and Growth Stats You Need to Know in 2024. 2024. Backlinko. Retrieved September 7, 2024 from https:\/\/backlinko.com\/roblox-users"},{"key":"e_1_3_3_2_7_2","first-page":"729","article-title":"Automatic detection and analysis of the \u201cGame Hack","volume":"18","author":"Badawi Emad","year":"2019","unstructured":"Emad Badawi, Guy-Vincent Jourdan, Gregor Bochmann, and Iosif-Viorel Onut. 2019. Automatic detection and analysis of the \u201cGame Hack\u201d Scam. Journal of Web Engineering 18, 8 (2019), 729\u2013760.","journal-title":"Journal of Web Engineering"},{"key":"e_1_3_3_2_8_2","doi-asserted-by":"publisher","DOI":"10.1145\/3311927.3323133"},{"key":"e_1_3_3_2_9_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.jesp.2007.10.003"},{"key":"e_1_3_3_2_10_2","doi-asserted-by":"publisher","DOI":"10.1007\/s11199-009-9683-8"},{"key":"e_1_3_3_2_11_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4613-9814-1_7"},{"key":"e_1_3_3_2_12_2","volume-title":"Conceptual and design thinking for thematic analysis. Qualitative psychology 9, 1","author":"Braun Virginia","year":"2022","unstructured":"Virginia Braun and Victoria Clarke. 2022. Conceptual and design thinking for thematic analysis. Qualitative psychology 9, 1 (2022), 3."},{"key":"e_1_3_3_2_13_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-13942-0_2"},{"key":"e_1_3_3_2_14_2","volume-title":"The role of disclosure of personal information in the evaluation of risk and trust in young peoples","author":"Bryce Jo","year":"2014","unstructured":"Jo Bryce and James Fraser. 2014. The role of disclosure of personal information in the evaluation of risk and trust in young peoples\u2019 online interactions. Computers in Human Behavior 30, (2014), 299\u2013306."},{"key":"e_1_3_3_2_15_2","doi-asserted-by":"publisher","DOI":"10.1177\/2056305117707189"},{"key":"e_1_3_3_2_16_2","doi-asserted-by":"publisher","DOI":"10.1177\/0004865814521224"},{"key":"e_1_3_3_2_17_2","doi-asserted-by":"publisher","DOI":"10.1177\/1461444817724168"},{"key":"e_1_3_3_2_18_2","volume-title":"International journal of public health 60","author":"Callaghan Mary","year":"2015","unstructured":"Mary Callaghan, Colette Kelly, and Michal Molcho. 2015. Exploring traditional and cyberbullying among Irish adolescents. International journal of public health 60, (2015), 199\u2013206."},{"key":"e_1_3_3_2_19_2","doi-asserted-by":"publisher","DOI":"10.1080\/03004430500131387"},{"key":"e_1_3_3_2_20_2","volume-title":"Computers in Human Behavior 52","author":"Cao Bolin","year":"2015","unstructured":"Bolin Cao and Wan-Ying Lin. 2015. How do victims react to cyberbullying on social networking sites? The influence of previous cyberbullying victimization experiences. Computers in Human Behavior 52, (2015), 458\u2013465."},{"key":"e_1_3_3_2_21_2","doi-asserted-by":"publisher","DOI":"10.1080\/17517575.2023.2188122"},{"key":"e_1_3_3_2_22_2","doi-asserted-by":"publisher","DOI":"10.1109\/SocialCom-PASSAT.2012.55"},{"key":"e_1_3_3_2_23_2","volume-title":"Cyber threat landscape faced by financial and insurance industry. Trends and issues in crime and criminal justice 408","author":"Raymond Choo Kim-Kwang","year":"2011","unstructured":"Kim-Kwang Raymond Choo. 2011. Cyber threat landscape faced by financial and insurance industry. Trends and issues in crime and criminal justice 408 (2011), 1\u20136."},{"key":"e_1_3_3_2_24_2","doi-asserted-by":"publisher","DOI":"10.1111\/j.1468-2885.2011.01391.x"},{"key":"e_1_3_3_2_25_2","volume-title":"Thematic Analysis: A Practical Guide","author":"Clarke Victoria","year":"2021","unstructured":"Victoria Clarke and Virginia Braun. 2021. Thematic Analysis: A Practical Guide. SAGE Publications Ltd, London. Retrieved from http:\/\/digital.casalini.it\/9781526417305"},{"key":"e_1_3_3_2_26_2","doi-asserted-by":"publisher","DOI":"10.1177\/15554120211026255"},{"key":"e_1_3_3_2_27_2","volume-title":"A reflection on the use of semi-structured interviews. Nurse Researcher (through 2013) 13, 1","author":"Dearnley Christine","year":"2005","unstructured":"Christine Dearnley. 2005. A reflection on the use of semi-structured interviews. Nurse Researcher (through 2013) 13, 1 (2005), 19\u201328."},{"key":"e_1_3_3_2_28_2","doi-asserted-by":"publisher","DOI":"10.1089\/g4h.2014.0055"},{"key":"e_1_3_3_2_29_2","volume-title":"What Parents Need To Know About Roblox. ESRB Ratings. Retrieved","author":"Patricia","year":"2025","unstructured":"Patricia E. Vance ESRB President. 2024. What Parents Need To Know About Roblox. ESRB Ratings. Retrieved March 31, 2025 from https:\/\/www.esrb.org\/blog\/what-parents-need-to-know-about-roblox-2\/"},{"key":"e_1_3_3_2_30_2","volume-title":"Retrieved","author":"Team EU","year":"2022","unstructured":"EU Team. 2022. Children's rights in the Digital Services Act - Joint letter. 5rights. Retrieved December 27, 2024 from https:\/\/5rightsfoundation.com\/resource\/childrens-rights-in-the-digital-services-act-joint-letter\/"},{"key":"e_1_3_3_2_31_2","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2022.3218415"},{"key":"e_1_3_3_2_32_2","volume-title":"Extremists creep into Roblox, an online game popular with children. NBC News (August","author":"Farivar Cyrus","year":"2019","unstructured":"Cyrus Farivar. 2019. Extremists creep into Roblox, an online game popular with children. NBC News (August 2019). Retrieved May 5, 2023 from https:\/\/www.nbcnews.com\/tech\/tech-news\/extremists-creep-roblox-online-game-popular-children-n1045056"},{"key":"e_1_3_3_2_33_2","unstructured":"David P. Farrington. 2007. Childhood risk factors and risk-focused prevention. The Oxford handbook of criminology 4 (2007) 602\u2013640."},{"key":"e_1_3_3_2_34_2","volume-title":"Retrieved","author":"Federal Trade Commission","year":"2013","unstructured":"Federal Trade Commission. 2013. Children's Online Privacy Protection Rule (\u201cCOPPA\u201d). Retrieved March 29, 2025 from https:\/\/www.ftc.gov\/legal-library\/browse\/rules\/childrens-online-privacy-protection-rule-coppa"},{"key":"e_1_3_3_2_35_2","doi-asserted-by":"publisher","DOI":"10.1145\/1054972.1055076"},{"key":"e_1_3_3_2_36_2","doi-asserted-by":"publisher","DOI":"10.1177\/0361684314553578"},{"key":"e_1_3_3_2_37_2","doi-asserted-by":"publisher","DOI":"10.1177\/1329878X1415100114"},{"key":"e_1_3_3_2_38_2","volume-title":"The effects of the presence or absence of parents on interviews with children. Nurse Researcher (through 2013) 19, 2 (January","author":"Gardner Helen","year":"2012","unstructured":"Helen Gardner and Duncan Randall. 2012. The effects of the presence or absence of parents on interviews with children. Nurse Researcher (through 2013) 19, 2 (January 2012), 6\u201310."},{"key":"e_1_3_3_2_39_2","doi-asserted-by":"publisher","DOI":"10.1145\/3585088.3589370"},{"key":"e_1_3_3_2_40_2","volume-title":"Retrieved","author":"Greer Nancy","year":"2022","unstructured":"Nancy Greer, Cailem Murray Boyle, and Rebecca Jenkinson. 2022. Harms associated with loot boxes, simulated gambling and other in-game purchases in video games: a review of the evidence. (2022). Retrieved March 26, 2024 from https:\/\/www.classification.gov.au\/sites\/default\/files\/documents\/agrc_literature_review_final_20220906_accessible.pdf"},{"key":"e_1_3_3_2_41_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.copsyc.2022.101326"},{"key":"e_1_3_3_2_42_2","volume-title":"Retrieved","author":"Guo Keyan","year":"2024","unstructured":"Keyan Guo, Ayush Utkarsh, Wenbo Ding, Isabelle Ondracek, Ziming Zhao, Guo Freeman, Nishant Vishwamitra, and Hongxin Hu. 2024. Moderating Illicit Online Image Promotion for Unsafe User-Generated Content Games Using Large Vision-Language Models. Retrieved August 23, 2024 from http:\/\/arxiv.org\/abs\/2403.18957"},{"key":"e_1_3_3_2_43_2","volume-title":"Proceedings of the The 15th International Conference on Interaction Design and Children","author":"Hartikainen Heidi","year":"2016","unstructured":"Heidi Hartikainen, Netta Iivari, and Marianne Kinnula. 2016. Should we design for control, trust or involvement? A discourses survey about children's online safety. In Proceedings of the The 15th International Conference on Interaction Design and Children, 2016. 367\u2013378."},{"key":"e_1_3_3_2_44_2","volume-title":"Finding common ground: Comparing children's and parents","author":"Hartikainen Heidi","year":"2017","unstructured":"Heidi Hartikainen, Marianne Kinnula, Netta Iivari, and Dorina Rajanen. 2017. Finding common ground: Comparing children's and parents\u2019 views on children's online safety. Electronic Visualisation and the Arts (EVA 2017) (2017), 1\u201312."},{"key":"e_1_3_3_2_45_2","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0204572"},{"key":"e_1_3_3_2_46_2","doi-asserted-by":"crossref","first-page":"1","DOI":"10.34293\/education.v8i4.3232","article-title":"Researcher Positionality\u2013A Consideration of Its Influence and Place in Qualitative Research\u2013A New Researcher Guide","volume":"8","author":"Darwin Holmes Andrew Gary","year":"2020","unstructured":"Andrew Gary Darwin Holmes. 2020. Researcher Positionality\u2013A Consideration of Its Influence and Place in Qualitative Research\u2013A New Researcher Guide. Shanlax International Journal of Education 8, 4 (2020), 1\u201310.","journal-title":"Shanlax International Journal of Education"},{"key":"e_1_3_3_2_47_2","doi-asserted-by":"publisher","DOI":"10.2196\/23886"},{"key":"e_1_3_3_2_48_2","volume-title":"Retrieved","author":"Office Information Comissioner's","year":"2024","unstructured":"Information Comissioner's Office. 2024. Annex B: Age and developmental stages. Retrieved December 17, 2024 from https:\/\/ico.org.uk\/for-organisations\/uk-gdpr-guidance-and-resources\/childrens-information\/childrens-code-guidance-and-resources\/age-appropriate-design-a-code-of-practice-for-online-services\/annex-b-age-and-developmental-stages\/"},{"key":"e_1_3_3_2_49_2","volume-title":"Retrieved","author":"Office Information Comissioner's","year":"2025","unstructured":"Information Comissioner's Office. 2025. Protecting children's privacy online: Our Children's code strategy. Retrieved March 29, 2025 from https:\/\/ico.org.uk\/for-organisations\/uk-gdpr-guidance-and-resources\/childrens-information\/childrens-code-guidance-and-resources\/protecting-childrens-privacy-online-our-childrens-code-strategy\/"},{"key":"e_1_3_3_2_50_2","volume-title":"Retrieved","author":"Office Information Comissioner's","year":"2025","unstructured":"Information Comissioner's Office. 2025. Children's code guidance and resources. Retrieved March 29, 2025 from https:\/\/ico.org.uk\/for-organisations\/uk-gdpr-guidance-and-resources\/childrens-information\/childrens-code-guidance-and-resources\/"},{"key":"e_1_3_3_2_51_2","doi-asserted-by":"publisher","DOI":"10.1186\/1471-2458-11-440"},{"key":"e_1_3_3_2_52_2","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0256762"},{"key":"e_1_3_3_2_53_2","volume-title":"Latifa Ben Arfa Rabai, and Anis Ben Aissa","author":"Jouini Mouna","year":"2014","unstructured":"Mouna Jouini, Latifa Ben Arfa Rabai, and Anis Ben Aissa. 2014. Classification of security threats in information systems. Procedia Computer Science 32, (2014), 489\u2013496."},{"key":"e_1_3_3_2_54_2","volume-title":"Ronald C. Kessler, David J. Kupfer, and David R. Offord.","author":"Kazdin Alan E.","year":"1997","unstructured":"Alan E. Kazdin, Helena Chmura Kraemer, Ronald C. Kessler, David J. Kupfer, and David R. Offord. 1997. Contributions of risk-factor research to developmental psychopathology. Clinical psychology review 17, 4 (1997), 375\u2013406."},{"key":"e_1_3_3_2_55_2","doi-asserted-by":"publisher","DOI":"10.1145\/3563657.3595960"},{"key":"e_1_3_3_2_56_2","doi-asserted-by":"publisher","DOI":"10.1145\/3643834.3660678"},{"key":"e_1_3_3_2_57_2","volume-title":"Mods as lightning rods: A typology of video game mods, intellectual property, and social benefit\/harm. Social & legal studies 28, 4","author":"Kretzschmar Mark","year":"2019","unstructured":"Mark Kretzschmar and Mel Stanfill. 2019. Mods as lightning rods: A typology of video game mods, intellectual property, and social benefit\/harm. Social & legal studies 28, 4 (2019), 517\u2013536."},{"key":"e_1_3_3_2_58_2","doi-asserted-by":"publisher","DOI":"10.18261\/njc.24.2.6"},{"key":"e_1_3_3_2_59_2","doi-asserted-by":"publisher","DOI":"10.1177\/02697580241258786"},{"key":"e_1_3_3_2_60_2","volume-title":"Proceedings of the ACM on Human-Computer Interaction 1, CSCW","author":"Kumar Priya","year":"2017","unstructured":"Priya Kumar, Shalmali Milind Naik, Utkarsha Ramesh Devkar, Marshini Chetty, Tamara L. Clegg, and Jessica Vitak. 2017. \u201cNo Telling Passcodes Out Because They're Private\u201d Understanding Children's Mental Models of Privacy and Security Online. Proceedings of the ACM on Human-Computer Interaction 1, CSCW (2017), 1\u201321."},{"key":"e_1_3_3_2_61_2","doi-asserted-by":"publisher","DOI":"10.1089\/cyber.2012.0087"},{"key":"e_1_3_3_2_62_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.childyouth.2017.06.002"},{"key":"e_1_3_3_2_63_2","doi-asserted-by":"publisher","DOI":"10.1111\/jcom.12277"},{"key":"e_1_3_3_2_64_2","volume-title":"Retrieved","author":"Livingstone Sonia","year":"2021","unstructured":"Sonia Livingstone and Mariya Stoilova. 2021. The 4Cs: Classifying online risk to children. (2021). Retrieved May 30, 2024 from https:\/\/www.ssoar.info\/ssoar\/bitstream\/handle\/document\/71817\/ssoar-2021-livingstone_et_al-The_4Cs_Classifying_Online_Risk.pdf"},{"key":"e_1_3_3_2_65_2","volume-title":"Proc. ICIL 18","author":"Magkos Emmanouil","year":"2014","unstructured":"Emmanouil Magkos, Eleni Kleisiari, Panagiotis Chanias, and Viktor Giannakouris-Salalidis. 2014. Parental control and children's internet safety: the good, the bad and the ugly. Proc. ICIL 18, (2014), 2014."},{"key":"e_1_3_3_2_66_2","doi-asserted-by":"publisher","DOI":"10.1111\/j.1099-0860.1996.tb00464.x"},{"key":"e_1_3_3_2_67_2","volume-title":"Global News. Retrieved","year":"2023","unstructured":"Marilisaraccoglobal. Mom horrified to see her 7-year-old's Roblox character \u2018gang-raped\u2019 in popular online game - National | Globalnews.ca. Global News. Retrieved March 16, 2023 from https:\/\/globalnews.ca\/news\/4316449\/roblox-gang-rape-7-year-old-girl\/"},{"key":"e_1_3_3_2_68_2","doi-asserted-by":"publisher","DOI":"10.1145\/3359174"},{"key":"e_1_3_3_2_69_2","article-title":"Who's watching your kids? Safety and surveillance in virtual worlds for children","volume":"3","author":"Meyers Eric M.","year":"2010","unstructured":"Eric M. Meyers, Lisa P. Nathan, and Kristene Unsworth. 2010. Who's watching your kids? Safety and surveillance in virtual worlds for children. Journal For Virtual Worlds Research 3, 2 (2010).","journal-title":"Journal For Virtual Worlds Research"},{"key":"e_1_3_3_2_70_2","volume-title":"Guide. Retrieved","year":"2025","unstructured":"Minecraft.net. 2023. Minecraft Parents\u2019 Guide. Retrieved April 1, 2025 from https:\/\/www.minecraft.net\/en-us\/article\/parents\u2013guide-minecraft"},{"key":"e_1_3_3_2_71_2","doi-asserted-by":"publisher","DOI":"10.1111\/j.1939-0025.2010.01040.x"},{"key":"e_1_3_3_2_72_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.chiabu.2007.04.015"},{"key":"e_1_3_3_2_73_2","doi-asserted-by":"publisher","DOI":"10.1145\/3474678"},{"key":"e_1_3_3_2_74_2","doi-asserted-by":"publisher","DOI":"10.1177\/1464884916673557"},{"key":"e_1_3_3_2_75_2","first-page":"1","article-title":"Bandura's social learning theory & social cognitive learning theory","volume":"1","author":"Nabavi Razieh Tadayon","year":"2012","unstructured":"Razieh Tadayon Nabavi. 2012. Bandura's social learning theory & social cognitive learning theory. Theory of Developmental Psychology 1, 1 (2012), 1\u201324.","journal-title":"Theory of Developmental Psychology"},{"key":"e_1_3_3_2_76_2","doi-asserted-by":"publisher","DOI":"10.1080\/17439880600756803"},{"key":"e_1_3_3_2_77_2","doi-asserted-by":"publisher","DOI":"10.1080\/17439884.2013.782038"},{"key":"e_1_3_3_2_78_2","doi-asserted-by":"publisher","DOI":"10.1145\/2872427.2883062"},{"key":"e_1_3_3_2_79_2","first-page":"841","article-title":"Social media: challenges and concerns for families","volume":"63","author":"O'Keeffe Gwenn Schurgin","year":"2016","unstructured":"Gwenn Schurgin O'Keeffe. 2016. Social media: challenges and concerns for families. Pediatric Clinics 63, 5 (2016), 841\u2013849.","journal-title":"Pediatric Clinics"},{"key":"e_1_3_3_2_80_2","doi-asserted-by":"publisher","DOI":"10.1177\/1461444817691531"},{"key":"e_1_3_3_2_81_2","doi-asserted-by":"publisher","DOI":"10.1037\/a0024555"},{"key":"e_1_3_3_2_82_2","volume-title":"IDC\u201924: Proceedings of the 23rd Annual ACM Interaction Design and Children Conference, 2024","author":"Park Jinkyung","year":"2024","unstructured":"Jinkyung Park, Joshua Gracie, Ashwaq Alsoubai, Afsaneh Razi, and Pamela J. Wisniewski. 2024. Personally Targeted Risk vs. Humor: How Online Risk Perceptions of Youth vs. Third-Party Annotators Differ based on Privately Shared Media on Instagram. In IDC\u201924: Proceedings of the 23rd Annual ACM Interaction Design and Children Conference, 2024. Association for Computing Machinery, 1\u201313. Retrieved August 5, 2024 from https:\/\/stirlab.org\/wp-content\/uploads\/Park-et-al_idc24-19.pdf"},{"key":"e_1_3_3_2_83_2","doi-asserted-by":"publisher","DOI":"10.1145\/2702123.2702534"},{"key":"e_1_3_3_2_84_2","volume-title":"Qualitative evaluation and research methods","author":"Patton Michael Quinn","unstructured":"Michael Quinn Patton. 1990. Qualitative evaluation and research methods. Sage Publications, Inc, Newbury Park, CA."},{"key":"e_1_3_3_2_85_2","doi-asserted-by":"publisher","DOI":"10.1145\/3078072.3079722"},{"key":"e_1_3_3_2_86_2","doi-asserted-by":"publisher","DOI":"10.1080\/1369118032000163277"},{"key":"e_1_3_3_2_87_2","doi-asserted-by":"publisher","DOI":"10.1177\/1555412007307955"},{"key":"e_1_3_3_2_88_2","doi-asserted-by":"publisher","DOI":"10.1108\/11766091111162070"},{"key":"e_1_3_3_2_89_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijcci.2021.100343"},{"key":"e_1_3_3_2_90_2","doi-asserted-by":"publisher","DOI":"10.1145\/2702123.2702456"},{"key":"e_1_3_3_2_91_2","volume-title":"Rogers","author":"Ringenberg Tatiana R.","year":"2022","unstructured":"Tatiana R. Ringenberg, Kathryn C. Seigfried-Spellar, Julia M. Rayz, and Marcus K. Rogers. 2022. A scoping review of child grooming strategies: Pre-and post-internet. Child Abuse & Neglect 123, (2022), 105392."},{"key":"e_1_3_3_2_92_2","volume-title":"Johanna MF van Oosten, and Juan-Jos\u00e9 Igartua","author":"Dios Isabel","year":"2018","unstructured":"Isabel Rodr\u00edguez-de-Dios, Johanna MF van Oosten, and Juan-Jos\u00e9 Igartua. 2018. A study of the relationship between parental mediation and adolescents\u2019 digital skills, online risks and online opportunities. Computers in Human Behavior 82, (2018), 186\u2013198."},{"key":"e_1_3_3_2_93_2","volume-title":"Joao Paulo Carvalho, Sofia Oliveira, Lu\u00edsa Coheur, Paula Paulino, AM Veiga Sim\u00e3o, and Isabel Trancoso.","author":"Rosa Hugo","year":"2019","unstructured":"Hugo Rosa, N\u00e1dia Pereira, Ricardo Ribeiro, Paula Costa Ferreira, Joao Paulo Carvalho, Sofia Oliveira, Lu\u00edsa Coheur, Paula Paulino, AM Veiga Sim\u00e3o, and Isabel Trancoso. 2019. Automatic cyberbullying detection: A systematic review. Computers in Human Behavior 93, (2019), 333\u2013345."},{"key":"e_1_3_3_2_94_2","doi-asserted-by":"publisher","DOI":"10.1109\/TAFFC.2017.2761757"},{"key":"e_1_3_3_2_95_2","doi-asserted-by":"publisher","DOI":"10.1108\/OIR-06-2020-0258"},{"key":"e_1_3_3_2_96_2","doi-asserted-by":"publisher","DOI":"10.1145\/3479512"},{"key":"e_1_3_3_2_97_2","doi-asserted-by":"publisher","DOI":"10.1177\/20563051231157297"},{"key":"e_1_3_3_2_98_2","doi-asserted-by":"publisher","DOI":"10.1145\/3544548.3581512"},{"key":"e_1_3_3_2_99_2","volume-title":"Patterson","author":"Sharar Sam R.","year":"2007","unstructured":"Sam R. Sharar, Gretchen J. Carrougher, Dana Nakamura, Hunter G. Hoffman, David K. Blough, and David R. Patterson. 2007. Factors influencing the efficacy of virtual reality distraction analgesia during postburn physical therapy: preliminary results from 3 ongoing studies. Archives of physical medicine and rehabilitation 88, 12 (2007), S43\u2013S49."},{"key":"e_1_3_3_2_100_2","volume-title":"DemandSage. Retrieved","author":"Shewale Rohit","year":"2024","unstructured":"Rohit Shewale. 2024. 25 Minecraft Statistics For 2024 (Users, Servers, & More). DemandSage. Retrieved May 28, 2024 from https:\/\/www.demandsage.com\/minecraft-statistics\/"},{"key":"e_1_3_3_2_101_2","doi-asserted-by":"publisher","DOI":"10.1177\/1461444815626612"},{"key":"e_1_3_3_2_102_2","volume-title":"National Sex Education Standards","year":"2024","unstructured":"Siecus. 2020. National Sex Education Standards: Second Edition - SIECUS. Retrieved December 26, 2024 from https:\/\/siecus.org\/resource\/national-sex-ed-standards-second-edition\/, https:\/\/siecus.org\/resource\/national-sex-ed-standards-second-edition\/"},{"key":"e_1_3_3_2_103_2","doi-asserted-by":"publisher","DOI":"10.1080\/1369118X.2014.934387"},{"key":"e_1_3_3_2_104_2","unstructured":"David Smahel Hana Machackova Giovanna Mascheroni Lenka Dedkova Elisabeth Staksrud Kjartan \u00d3lafsson Sonia Livingstone and Uwe Hasebrink. 2020. EU Kids Online 2020: Survey results from 19 countries. (2020)."},{"key":"e_1_3_3_2_105_2","doi-asserted-by":"publisher","DOI":"10.1109\/ISTAS61960.2024.10732489"},{"key":"e_1_3_3_2_106_2","volume-title":"Violent video game exposure and bullying in early adolescence: A longitudinal study examining moderation of trait aggressiveness and moral identity. Psychology of violence 12, 3","author":"Teng Zhaojun","year":"2022","unstructured":"Zhaojun Teng, Chunyan Yang, Meg Stomski, Qian Nie, and Cheng Guo. 2022. Violent video game exposure and bullying in early adolescence: A longitudinal study examining moderation of trait aggressiveness and moral identity. Psychology of violence 12, 3 (2022), 149."},{"key":"e_1_3_3_2_107_2","volume-title":"Christine Bracamonte Wiggs, and Lynne M. Borden","author":"Totenhagen Casey J.","year":"2015","unstructured":"Casey J. Totenhagen, Deborah M. Casper, Kelsey M. Faber, Leslie A. Bosch, Christine Bracamonte Wiggs, and Lynne M. Borden. 2015. Youth financial literacy: A review of key considerations and promising delivery methods. Journal of Family and Economic Issues 36, (2015), 167\u2013191."},{"key":"e_1_3_3_2_108_2","doi-asserted-by":"publisher","DOI":"10.1111\/fcre.12615"},{"key":"e_1_3_3_2_109_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-47854-7_4"},{"key":"e_1_3_3_2_110_2","doi-asserted-by":"publisher","DOI":"10.1177\/0162243905285847"},{"key":"e_1_3_3_2_111_2","volume-title":"VIDEOGAMES EUROPE. Retrieved","author":"Europe Video Games","year":"2024","unstructured":"Video Games Europe. PEGI \u2013 The European content rating system. VIDEOGAMES EUROPE. Retrieved August 16, 2024 from https:\/\/www.videogameseurope.eu\/responsible-gameplay\/pegi-the-european-content-rating-system\/"},{"key":"e_1_3_3_2_112_2","doi-asserted-by":"publisher","DOI":"10.1145\/3544548.3580935"},{"key":"e_1_3_3_2_113_2","volume-title":"Proceedings of the 2017 ACM Conference on Computer Supported Cooperative Work and Social Computing","author":"Wisniewski Pamela","year":"2017","unstructured":"Pamela Wisniewski, Arup Kumar Ghosh, Heng Xu, Mary Beth Rosson, and John M. Carroll. 2017. Parental control vs. teen self-regulation: Is there a middle ground for mobile online safety? In Proceedings of the 2017 ACM Conference on Computer Supported Cooperative Work and Social Computing, 2017. 51\u201369."},{"key":"e_1_3_3_2_114_2","doi-asserted-by":"publisher","DOI":"10.1145\/2858036.2858317"},{"key":"e_1_3_3_2_115_2","first-page":"2013","article-title":"Dark patterns in the design of games","volume":"2013","author":"Zagal Jos\u00e9 P.","year":"2013","unstructured":"Jos\u00e9 P. Zagal, Staffan Bj\u00f6rk, and Chris Lewis. 2013. Dark patterns in the design of games. In Foundations of Digital Games 2013, 2013.","journal-title":"Foundations of Digital Games"},{"key":"e_1_3_3_2_116_2","doi-asserted-by":"publisher","DOI":"10.1089\/cyber.2019.0676"},{"key":"e_1_3_3_2_117_2","doi-asserted-by":"publisher","DOI":"10.1145\/3677076"},{"key":"e_1_3_3_2_118_2","doi-asserted-by":"publisher","DOI":"10.1145\/3677110"},{"key":"e_1_3_3_2_119_2","unstructured":"Experience Guidelines | Documentation - Roblox Creator Hub. Retrieved August 29 2023 from https:\/\/create.roblox.com\/docs"},{"key":"e_1_3_3_2_120_2","unstructured":"Discover Minecraft Servers for Your Device. 2024. Minecraft.net. Retrieved September 9 2024 from https:\/\/www.minecraft.net\/en-us\/servers"},{"key":"e_1_3_3_2_121_2","unstructured":"Creative Directory. Rec Room. Retrieved September 9 2024 from https:\/\/recroom.com\/creative"},{"key":"e_1_3_3_2_122_2","volume-title":"Fortnite. Retrieved","author":"Fortnite Create","year":"2024","unstructured":"Create - Fortnite. Epic Games\u2019 Fortnite. Retrieved September 9, 2024 from http:\/\/www.fortnite.com\/create?lang=en-US"},{"key":"e_1_3_3_2_123_2","unstructured":"PEGI Changes Rating Advice for Roblox | Pegi Public Site. Retrieved September 12 2024 from https:\/\/pegi.info\/news\/pegi-changes-rating-advice-roblox"},{"key":"e_1_3_3_2_124_2","unstructured":"ESRB Ratings Guides Categories Content Descriptors. ESRB Ratings. Retrieved August 29 2023 from https:\/\/www.esrb.org\/ratings-guide\/"},{"key":"e_1_3_3_2_125_2","unstructured":"ESRB Ratings | Entertainment Software Ratings Board. ESRB Ratings. Retrieved August 16 2024 from https:\/\/www.esrb.org\/"},{"key":"e_1_3_3_2_126_2","unstructured":"Content Maturity Labels. Roblox Support. Retrieved April 1 2025 from https:\/\/en.help.roblox.com\/hc\/en-us\/articles\/8862768451604-Content-Maturity-Labels"},{"key":"e_1_3_3_2_127_2","unstructured":"Experience Guidelines and Age Recommendations. Roblox Support. Retrieved September 8 2023 from https:\/\/en.help.roblox.com\/hc\/en-us\/articles\/8862768451604-Experience-Guidelines-and-Age-Recommendations"},{"key":"e_1_3_3_2_128_2","unstructured":"Will I Get My Robux Back If I Delete\/Do Not Like an Item? Roblox Support. Retrieved January 8 2025 from https:\/\/en.help.roblox.com\/hc\/en-us\/articles\/203313290-Will-I-Get-My-Robux-Back-If-I-Delete-Do-Not-Like-an-Item"},{"key":"e_1_3_3_2_129_2","unstructured":"Minecraft Refund Policy | Minecraft Help. Minecraft.net. Retrieved January 8 2025 from https:\/\/www.minecraft.net\/hc\/en-us"}],"event":{"name":"IDC '25: Interaction Design and Children","location":"Reykjavik Iceland","acronym":"IDC '25","sponsor":["SIGCHI ACM Special Interest Group on Computer-Human Interaction"]},"container-title":["Proceedings of the 24th Interaction Design and Children"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3713043.3728858","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3713043.3728858","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,23]],"date-time":"2025-06-23T13:19:18Z","timestamp":1750684758000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3713043.3728858"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,6,23]]},"references-count":129,"alternative-id":["10.1145\/3713043.3728858","10.1145\/3713043"],"URL":"https:\/\/doi.org\/10.1145\/3713043.3728858","relation":{},"subject":[],"published":{"date-parts":[[2025,6,23]]},"assertion":[{"value":"2025-06-23","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}