{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,13]],"date-time":"2026-04-13T17:04:59Z","timestamp":1776099899465,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":106,"publisher":"ACM","funder":[{"name":"Institute for Advanced Studies (IAS) at the University of Luxembourg","award":["Young Academics 2021"],"award-info":[{"award-number":["Young Academics 2021"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2025,11,19]]},"DOI":"10.1145\/3719027.3765214","type":"proceedings-article","created":{"date-parts":[[2025,11,22]],"date-time":"2025-11-22T23:33:16Z","timestamp":1763854396000},"page":"1934-1948","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["Empowering Parents to Support Children's Online Security and Privacy: Findings from a Randomized Controlled Trial"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-0794-1551","authenticated-orcid":false,"given":"Xiaowei","family":"Chen","sequence":"first","affiliation":[{"name":"Department of Behavioral and Cognitive Sciences, University of Luxembourg, Esch-sur-Alzette, Luxembourg"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4461-0551","authenticated-orcid":false,"given":"Verena","family":"Distler","sequence":"additional","affiliation":[{"name":"Department of Computer Science, Aalto University, Espoo, Finland"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3648-8349","authenticated-orcid":false,"given":"Chloe","family":"Gordon","sequence":"additional","affiliation":[{"name":"Institute for Positive Psychology and Education, Australian Catholic University, Melbourne, Australia"}]},{"ORCID":"https:\/\/orcid.org\/0009-0008-7900-9265","authenticated-orcid":false,"given":"Yaxing","family":"Yao","sequence":"additional","affiliation":[{"name":"Department of Computer Science, Johns Hopkins University, Baltimore,, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3745-9021","authenticated-orcid":false,"given":"Ziwen","family":"Teuber","sequence":"additional","affiliation":[{"name":"Department of Behavioral and Cognitive Sciences, University of Luxembourg, Esch-sur-Alzette, Luxembourg"}]}],"member":"320","published-online":{"date-parts":[[2025,11,22]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.csa.2023.100031"},{"key":"e_1_3_2_1_2_1","volume-title":"Zulaiha Ali Othman, Yusri Hakim Yeop, and Siti Norul Huda Sheikh Abdullah.","author":"Ahmad Nazilah","year":"2018","unstructured":"Nazilah Ahmad, Umi Asma'Mokhtar, Wan Fariza Paizi Fauzi, Zulaiha Ali Othman, Yusri Hakim Yeop, and Siti Norul Huda Sheikh Abdullah. 2018. Cyber security situational awareness among parents. In 2018 cyber resilience conference (crc). IEEE, 1--3."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/3512904"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/3613904.3641962"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1057\/s41599-023-01556-7"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/3427228.3427287"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/3381991.3395612"},{"key":"e_1_3_2_1_8_1","volume-title":"Social Media and Technology","author":"Anderson Monica","year":"2023","unstructured":"Monica Anderson, Michelle Faverio, and Jeffrey Gottfried. 2023. Teens, Social Media and Technology 2023. https:\/\/www.pewresearch.org\/internet\/2023\/12\/ 11\/teens-social-media-and-technology-2023\/. Accessed: 10--27--2024."},{"key":"e_1_3_2_1_9_1","volume-title":"The influence of parenting style on adolescent competence and substance use. The journal of early adolescence 11, 1","author":"Baumrind Diana","year":"1991","unstructured":"Diana Baumrind. 1991. The influence of parenting style on adolescent competence and substance use. The journal of early adolescence 11, 1 (1991), 56--95."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2023.103620"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2023.103620"},{"key":"e_1_3_2_1_12_1","unstructured":"Better Health Channel. n.d.. Teenagers and communication. https:\/\/www.betterhealth.vic.gov.au\/health\/healthyliving\/teenagers-and-communication. Accessed: 2025-01--17."},{"key":"e_1_3_2_1_13_1","volume-title":"Development of parent--adolescent relationships: Conflict interactions as a mechanism of change. Child development perspectives 12, 3","author":"Branje Susan","year":"2018","unstructured":"Susan Branje. 2018. Development of parent--adolescent relationships: Conflict interactions as a mechanism of change. Child development perspectives 12, 3 (2018), 171--176."},{"key":"e_1_3_2_1_14_1","volume-title":"Thematic analysis: a practical guide to understanding and doing. 1. Thousand Oaks","author":"Braun Virginia","year":"2021","unstructured":"Virginia Braun and Victoria Clarke. 2021. Thematic analysis: a practical guide to understanding and doing. 1. Thousand Oaks (2021)."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1002\/asi.20459"},{"key":"e_1_3_2_1_16_1","first-page":"E537","article-title":"Longitudinal studies","volume":"7","author":"Caruana Edward Joseph","year":"2015","unstructured":"Edward Joseph Caruana, Marius Roman, Jules Hern\u00e1ndez-S\u00e1nchez, and Piergiorgio Solli. 2015. Longitudinal studies. Journal of thoracic disease 7, 11 (2015), E537.","journal-title":"Journal of thoracic disease"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/3544548.3580777"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1093\/cybsec\/tyac006"},{"key":"e_1_3_2_1_19_1","volume-title":"What Motivates and Discourages Employees in Phishing Interventions: An Exploration of Expectancy-Value Theory. In Twentieth Symposium on Usable Privacy and Security (SOUPS","author":"Chen Xiaowei","year":"2024","unstructured":"Xiaowei Chen, Sophie Doublet, Anastasia Sergeeva, Gabriele Lenzini, Vincent Koenig, and Verena Distler. 2024. What Motivates and Discourages Employees in Phishing Interventions: An Exploration of Expectancy-Value Theory. In Twentieth Symposium on Usable Privacy and Security (SOUPS 2024). 487--506."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/3613904.3641943"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/3706598.3713122"},{"key":"e_1_3_2_1_22_1","volume-title":"10th Symposium On Usable Privacy and Security (SOUPS","author":"Cranor Lorrie Faith","year":"2014","unstructured":"Lorrie Faith Cranor, Adam L. Durity, Abigail Marsh, and Blase Ur. 2014. Parents' and Teens' Perspectives on Privacy In a Technology-Filled World. In 10th Symposium On Usable Privacy and Security (SOUPS 2014). USENIX Association, Menlo Park, CA, 19--35."},{"key":"e_1_3_2_1_23_1","volume-title":"The ''what'' and ''why'' of goal pursuits: Human needs and the self-determination of behavior. Psychological inquiry 11, 4","author":"Deci Edward L","year":"2000","unstructured":"Edward L Deci and RichardMRyan. 2000. The ''what'' and ''why'' of goal pursuits: Human needs and the self-determination of behavior. Psychological inquiry 11, 4 (2000), 227--268."},{"key":"e_1_3_2_1_24_1","unstructured":"eSafetyresearch. 2019. Parenting in the digital age. https:\/\/www.esafety.gov.au\/ research\/parenting-digital-age. Accessed: 12-02--2024."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1186\/s13063-018-3159-5"},{"key":"e_1_3_2_1_26_1","first-page":"22","article-title":"Security as an emerging dimension of Digital Literacy for education: a systematic literature review","volume":"18","author":"Rocha Estrada Francisco Javier","year":"2022","unstructured":"Francisco Javier Rocha Estrada, Carlos Enrique George-Reyes, and Leonardo David Glasserman-Morales. 2022. Security as an emerging dimension of Digital Literacy for education: a systematic literature review. Journal of E-Learning and Knowledge Society 18, 2 (2022), 22--33.","journal-title":"Journal of E-Learning and Knowledge Society"},{"key":"e_1_3_2_1_27_1","volume-title":"Fifteenth symposium on usable privacy and security (SOUPS","author":"Faklaris Cori","year":"2019","unstructured":"Cori Faklaris, Laura A Dabbish, and Jason I Hong. 2019. A self-report measure of end-user security attitudes (SA-6). In Fifteenth symposium on usable privacy and security (SOUPS 2019). 61--77."},{"key":"e_1_3_2_1_28_1","volume-title":"A flexible statistical power analysis program for the social, behavioral, and biomedical sciences. Behavior research methods 39, 2","author":"Faul Franz","year":"2007","unstructured":"Franz Faul, Edgar Erdfelder, Albert-Georg Lang, and Axel Buchner. 2007. G* Power 3: A flexible statistical power analysis program for the social, behavioral, and biomedical sciences. Behavior research methods 39, 2 (2007), 175--191."},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/1541948.1541999"},{"key":"e_1_3_2_1_30_1","volume-title":"Eighteenth Symposium on Usable Privacy and Security (SOUPS","author":"Gerber Nina","year":"2022","unstructured":"Nina Gerber and Karola Marky. 2022. The Nerd Factor: The Potential of S&P Adepts to Serve as a Social Resource in the User's Quest for More Secure and Privacy-Preserving Behavior. In Eighteenth Symposium on Usable Privacy and Security (SOUPS 2022). USENIX Association, Boston, MA, 57--76."},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2022.107626"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/3173574.3173698"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1037\/t67741-000"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1037\/0022-0663.99.3.532"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1177\/0095798412475085"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-287-630-0_9"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.56553\/popets-2022-0078"},{"key":"e_1_3_2_1_38_1","volume-title":"Safe by design: where are we now? Safety science 45, 1--2","author":"Hale Andrew","year":"2007","unstructured":"Andrew Hale, Barry Kirwan, and Urban Kjell\u00e9n. 2007. Safe by design: where are we now? Safety science 45, 1--2 (2007), 305--327."},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2017.10.008"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1080\/15391523.2020.1809034"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP54263.2024.00027"},{"key":"e_1_3_2_1_42_1","unstructured":"Franziska Herbert Collins W Munyendo Jonas Hielscher Steffen Becker and Yixin Zou. 2025. Digital Security Perceptions and Practices Around the World: A WEIRD versus Non-WEIRD Comparison. In USENIX Security. USENIX."},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1145\/3658644.3690196"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1186\/s12911-016-0301-8"},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP61157.2025.00076"},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2023.103252"},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1460-2466.2012.01643.x"},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1177\/00131245231179674"},{"key":"e_1_3_2_1_49_1","volume-title":"Seventeenth Symposium on Usable Privacy and Security (SOUPS","author":"Kaushik Smirity","year":"2021","unstructured":"Smirity Kaushik, Yaxing Yao, Pierre Dewitte, and Yang Wang. 2021. ''How I Know For Sure'': People's Perspectives on Solely Automated Decision-Making (SADM). In Seventeenth Symposium on Usable Privacy and Security (SOUPS 2021). 159--180."},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1145\/3290605.3300537"},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1145\/3585088.3589375"},{"key":"e_1_3_2_1_52_1","unstructured":"Carine Lallemand and Guillaume Gronier. 2015. M\u00e9thodes de design UX: 30 m\u00e9thodes fondamentales pour concevoir et \u00e9valuer les syst\u00e8mes interactifs. Editions Eyrolles."},{"key":"e_1_3_2_1_53_1","volume-title":"Thirteenth Symposium on Usable Privacy and Security (SOUPS","author":"Lastdrager Elmer","year":"2017","unstructured":"Elmer Lastdrager, In\u00e9s Carvajal Gallardo, Pieter Hartel, and Marianne Junger. 2017. How Effective is Anti-Phishing Training for Children?. In Thirteenth Symposium on Usable Privacy and Security (SOUPS 2017). USENIX Association, 229--239."},{"key":"e_1_3_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.1145\/3688459.3688476"},{"key":"e_1_3_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-62918-1_8"},{"key":"e_1_3_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.56553\/popets-2024-0071"},{"key":"e_1_3_2_1_57_1","doi-asserted-by":"publisher","DOI":"10.1016\/0022-1031(83)90023-9"},{"key":"e_1_3_2_1_58_1","doi-asserted-by":"publisher","DOI":"10.1145\/3428361.3428464"},{"key":"e_1_3_2_1_59_1","volume-title":"Applying the science of learning: evidence-based principles for the design of multimedia instruction. American psychologist 63, 8","author":"Mayer Richard E","year":"2008","unstructured":"Richard E Mayer. 2008. Applying the science of learning: evidence-based principles for the design of multimedia instruction. American psychologist 63, 8 (2008), 760."},{"key":"e_1_3_2_1_60_1","volume-title":"Socialization in the context of the family: Parent-child interaction. Handbook of child psychology 4","author":"McCoby EE","year":"1983","unstructured":"EE McCoby. 1983. Socialization in the context of the family: Parent-child interaction. Handbook of child psychology 4 (1983), 1--101."},{"key":"e_1_3_2_1_61_1","first-page":"1","article-title":"Measuring personality constructs: The advantages and disadvantages of self-reports, informant reports and behavioural assessments","volume":"1","author":"McDonald Jennifer Dodorico","year":"2008","unstructured":"Jennifer Dodorico McDonald. 2008. Measuring personality constructs: The advantages and disadvantages of self-reports, informant reports and behavioural assessments. Enquire 1, 1 (2008), 1--19.","journal-title":"Enquire"},{"key":"e_1_3_2_1_62_1","volume-title":"Twentieth Symposium on Usable Privacy and Security (SOUPS","author":"McLeod Joy","year":"2024","unstructured":"Joy McLeod, Leah Zhang-Kennedy, and Elizabeth Stobert. 2024. Comparing teacher and creator perspectives on the design of cybersecurity and privacy educational resources. In Twentieth Symposium on Usable Privacy and Security (SOUPS 2024). 587--603."},{"key":"e_1_3_2_1_63_1","doi-asserted-by":"publisher","DOI":"10.1145\/3025453.3025735"},{"key":"e_1_3_2_1_64_1","volume-title":"Christina Renee Peter, and Suzanne Bartholomae","author":"Meschke Laurie L","year":"2012","unstructured":"Laurie L Meschke, Christina Renee Peter, and Suzanne Bartholomae. 2012. Developmentally appropriate practice to promote healthy adolescent development: Integrating research and practice. In Child & Youth Care Forum, Vol. 41. Springer, 89--108."},{"key":"e_1_3_2_1_65_1","doi-asserted-by":"publisher","DOI":"10.1086\/209332"},{"key":"e_1_3_2_1_66_1","volume-title":"An exploratory study into the negotiation of cyber-security within the family home. Frontiers in psychology 11","author":"Muir Kate","year":"2020","unstructured":"Kate Muir and Adam Joinson. 2020. An exploratory study into the negotiation of cyber-security within the family home. Frontiers in psychology 11 (2020), 424."},{"key":"e_1_3_2_1_67_1","doi-asserted-by":"publisher","DOI":"10.1145\/3703465.3703470"},{"key":"e_1_3_2_1_68_1","volume-title":"Borja del Pozo Cruz, and Chris Lonsdale","author":"Noetel Michael","year":"2021","unstructured":"Michael Noetel, Shantell Griffith, Oscar Delaney, Taren Sanders, Philip Parker, Borja del Pozo Cruz, and Chris Lonsdale. 2021. Video improves learning in higher education: A systematic review. Review of educational research 91, 2 (2021), 204--236."},{"key":"e_1_3_2_1_69_1","doi-asserted-by":"publisher","DOI":"10.1787\/a97db61c-en"},{"key":"e_1_3_2_1_70_1","volume-title":"It's Still Complicated: From Privacy-Invasive Parental Control to Teen-Centric Solutions for Digital Resilience","author":"Park Jinkyung Katie","year":"2024","unstructured":"Jinkyung Katie Park, Mamtaj Akter, Pamela Wisniewski, and Karla Badillo- Urquiola. 2024. It's Still Complicated: From Privacy-Invasive Parental Control to Teen-Centric Solutions for Digital Resilience. IEEE Security & Privacy (2024)."},{"key":"e_1_3_2_1_71_1","unstructured":"J. W. Patchin and S. Hinduja. 2024. 2023 Cyberbullying Data. Cyberbullying Research Center. https:\/\/cyberbullying.org\/2023-cyberbullying-data. Accessed: 10--23--2024."},{"key":"e_1_3_2_1_72_1","unstructured":"Kate Payne. 2025. In lawsuit over teen's death judge rejects arguments that AI chatbots have free speech rights. https:\/\/apnews.com\/article\/ai-lawsuit-suicideartificial- intelligence-free-speech-ccc77a5ff5a84bda753d2b044c83d4b6. Accessed: 2025-07--12."},{"key":"e_1_3_2_1_73_1","doi-asserted-by":"publisher","DOI":"10.1108\/10748120110424816"},{"key":"e_1_3_2_1_74_1","doi-asserted-by":"publisher","DOI":"10.1080\/21532974.2011.10784684"},{"key":"e_1_3_2_1_75_1","doi-asserted-by":"publisher","DOI":"10.1145\/3590777.3590802"},{"key":"e_1_3_2_1_76_1","doi-asserted-by":"publisher","DOI":"10.1145\/3462203.3475900"},{"key":"e_1_3_2_1_77_1","first-page":"121","article-title":"Identifying patterns in informal sources of security information","volume":"1","author":"Rader Emilee","year":"2015","unstructured":"Emilee Rader and Rick Wash. 2015. Identifying patterns in informal sources of security information. Journal of Cybersecurity 1, 1 (2015), 121--144.","journal-title":"Journal of Cybersecurity"},{"key":"e_1_3_2_1_78_1","volume-title":"Batman Hacked My Password: A Subtitle-Based Analysis of Password Depiction in Movies. In Twentieth Symposium on Usable Privacy and Security (SOUPS","author":"Raphael Maike M.","year":"2024","unstructured":"Maike M. Raphael, Aikaterini Kanta, Rico Seebonn, Markus D\u00fcrmuth, and Camille Cobb. 2024. Batman Hacked My Password: A Subtitle-Based Analysis of Password Depiction in Movies. In Twentieth Symposium on Usable Privacy and Security (SOUPS 2024). USENIX Association, Philadelphia, PA, 199--218."},{"key":"e_1_3_2_1_79_1","doi-asserted-by":"publisher","DOI":"10.31244\/9783830991007"},{"key":"e_1_3_2_1_80_1","volume-title":"A protection motivation theory of fear appeals and attitude change1. The journal of psychology 91, 1","author":"Rogers Ronald W","year":"1975","unstructured":"Ronald W Rogers. 1975. A protection motivation theory of fear appeals and attitude change1. The journal of psychology 91, 1 (1975), 93--114."},{"key":"e_1_3_2_1_81_1","volume-title":"Are multimedia resources effective in life science education? A meta-analysis. Bioscience education 18, 1","author":"Rolfe Vivien E","year":"2011","unstructured":"Vivien E Rolfe and Douglas Gray. 2011. Are multimedia resources effective in life science education? A meta-analysis. Bioscience education 18, 1 (2011), 1--14."},{"key":"e_1_3_2_1_82_1","first-page":"32","article-title":"Digital literacy for parents of the 21st century children","volume":"38","author":"Romero Margarida","year":"2014","unstructured":"Margarida Romero. 2014. Digital literacy for parents of the 21st century children. Elearning Papers 38 (2014), 32--40.","journal-title":"Elearning Papers"},{"key":"e_1_3_2_1_83_1","volume-title":"The significance of autonomy and autonomy support in psychological development and psychopathology. Developmental psychopathology","author":"Ryan Richard M","unstructured":"Richard M Ryan, Edward L Deci, Wendy S Grolnick, and Jennifer G La Guardia. 2015. The significance of autonomy and autonomy support in psychological development and psychopathology. Developmental psychopathology: Volume one: Theory and method (2015), 795--849."},{"key":"e_1_3_2_1_84_1","doi-asserted-by":"publisher","DOI":"10.1109\/TE.2022.3231019"},{"key":"e_1_3_2_1_85_1","volume-title":"European Symposium on Research in Computer Security. Springer, 248--265","author":"Sasse M Angela","year":"2022","unstructured":"M Angela Sasse, Jonas Hielscher, Jennifer Friedauer, and Annalina Buckmann. 2022. Rebooting it security awareness--how organisations can encourage and sustain secure behaviours. In European Symposium on Research in Computer Security. Springer, 248--265."},{"key":"e_1_3_2_1_86_1","doi-asserted-by":"publisher","DOI":"10.1145\/3706598.3713845"},{"key":"e_1_3_2_1_87_1","volume-title":"Stress and Self-Efficacy. In 33rd USENIX Security Symposium (USENIX Security 24)","author":"Sch\u00f6ps Markus","year":"2024","unstructured":"Markus Sch\u00f6ps, Marco Gutfleisch, Eric Wolter, and M Angela Sasse. 2024. Simulated Stress: A Case Study of the Effects of a Simulated Phishing Campaign on Employees' Perception, Stress and Self-Efficacy. In 33rd USENIX Security Symposium (USENIX Security 24). 4589--4606."},{"key":"e_1_3_2_1_88_1","unstructured":"Filipo Sharevski and Jennifer Vander Loop. 2023. Children Parents and Misinformation on Social Media. http:\/\/arxiv.org\/abs\/2312.09359 arXiv:2312.09359."},{"key":"e_1_3_2_1_89_1","doi-asserted-by":"publisher","DOI":"10.1136\/bmj.316.7126.201"},{"key":"e_1_3_2_1_90_1","doi-asserted-by":"publisher","DOI":"10.1145\/3613904.3642885"},{"key":"e_1_3_2_1_91_1","doi-asserted-by":"publisher","DOI":"10.2307\/40041279"},{"key":"e_1_3_2_1_92_1","unstructured":"William Stallings and Lawrie Brown. 2015. Computer security: principles and practice. Pearson."},{"key":"e_1_3_2_1_93_1","doi-asserted-by":"publisher","DOI":"10.1145\/3479858"},{"key":"e_1_3_2_1_94_1","doi-asserted-by":"publisher","DOI":"10.1145\/3328778.3366816"},{"key":"e_1_3_2_1_95_1","volume-title":"Using multivariate statistics","author":"Tabachnick Barbara G","unstructured":"Barbara G Tabachnick, Linda S Fidell, and Jodie B Ullman. 2013. Using multivariate statistics. Vol. 6. Pearson Boston, MA."},{"key":"e_1_3_2_1_96_1","doi-asserted-by":"publisher","unstructured":"Ziwen Teuber and Xiaowei Chen. 2025. Parenting Digital Natives: A Randomized Controlled Trial on Security and Privacy Education in Families. https:\/\/doi.org\/10.17605\/OSF.IO\/ZQY7B. OSF Preregistration.","DOI":"10.17605\/OSF.IO\/ZQY7B"},{"key":"e_1_3_2_1_97_1","volume-title":"30th USENIX Security Symposium (USENIX Security 21)","author":"Theofanos Mary","year":"2021","unstructured":"Mary Theofanos, Yee-Yin Choong, and Olivia Murphy. 2021. 'Passwords Keep Me Safe' -- Understanding What Children Think about Passwords. In 30th USENIX Security Symposium (USENIX Security 21). USENIX Association, 19--35."},{"key":"e_1_3_2_1_98_1","unstructured":"UNICEF. 2018. More than 175 000 children go online for the first time every day tapping into great opportunities. https:\/\/www.unicef.org\/eca\/press-releases. Accessed: 12-01--2024."},{"key":"e_1_3_2_1_99_1","volume-title":"Convention on the Rights of the Child - Children's Version. https:\/\/www.unicef.org\/child-rights-convention\/convention-textchildrens-version. Accessed: 12-01--2024","author":"UNICEF.","year":"2023","unstructured":"UNICEF. 2023. Convention on the Rights of the Child - Children's Version. https:\/\/www.unicef.org\/child-rights-convention\/convention-textchildrens-version. Accessed: 12-01--2024."},{"key":"e_1_3_2_1_100_1","unstructured":"VERBIsoftware. 2024. MAXQDA. https:\/\/www.maxqda.com\/."},{"key":"e_1_3_2_1_101_1","doi-asserted-by":"publisher","DOI":"10.1145\/1868914.1868973"},{"key":"e_1_3_2_1_102_1","doi-asserted-by":"publisher","DOI":"10.1145\/3706598.3713538"},{"key":"e_1_3_2_1_103_1","volume-title":"Twentieth Symposium on Usable Privacy and Security (SOUPS","author":"Preuschen Alexandra Von","year":"2024","unstructured":"Alexandra Von Preuschen, Monika C Schuhmacher, and Verena Zimmermann. 2024. Beyond fear and frustration-towards a holistic understanding of emotions in cybersecurity. In Twentieth Symposium on Usable Privacy and Security (SOUPS 2024). 623--642."},{"key":"e_1_3_2_1_104_1","doi-asserted-by":"publisher","DOI":"10.1145\/3173574.3174066"},{"key":"e_1_3_2_1_105_1","volume-title":"Proceedings of 2025 IEEE Symposium on Security and Privacy (SP)","author":"Yu Yaman","year":"2024","unstructured":"Yaman Yu, Tanusree Sharma, Melinda Hu, Justin Wang, and Yang Wang. 2024. Exploring Parent-Child Perceptions on Safety in Generative AI: Concerns, Mitigation Strategies, and Design Implications. In Proceedings of 2025 IEEE Symposium on Security and Privacy (SP) (San Francisco, US, May 12, 2025)."},{"key":"e_1_3_2_1_106_1","doi-asserted-by":"publisher","DOI":"10.1145\/3427920"}],"event":{"name":"CCS '25: ACM SIGSAC Conference on Computer and Communications Security","location":"Taipei Taiwan","acronym":"CCS '25","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 2025 ACM SIGSAC Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3719027.3765214","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,12,22]],"date-time":"2025-12-22T22:15:28Z","timestamp":1766441728000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3719027.3765214"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,11,19]]},"references-count":106,"alternative-id":["10.1145\/3719027.3765214","10.1145\/3719027"],"URL":"https:\/\/doi.org\/10.1145\/3719027.3765214","relation":{},"subject":[],"published":{"date-parts":[[2025,11,19]]},"assertion":[{"value":"2025-11-22","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}