{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,30]],"date-time":"2025-10-30T09:19:02Z","timestamp":1761815942498,"version":"build-2065373602"},"publisher-location":"New York, NY, USA","reference-count":93,"publisher":"ACM","content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2025,11,5]]},"DOI":"10.1145\/3757887.3763015","type":"proceedings-article","created":{"date-parts":[[2025,10,29]],"date-time":"2025-10-29T07:42:58Z","timestamp":1761723778000},"page":"271-287","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["\u201cI shouldn\u2019t have to scan my face to play a video game\u201d: dissonance in harm and values in children's online media policy"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-3097-4634","authenticated-orcid":false,"given":"Sara M","family":"Abdulla","sequence":"first","affiliation":[{"name":"Northwestern University, Chicago, Illinois, USA"}]}],"member":"320","published-online":{"date-parts":[[2025,11,4]]},"reference":[{"key":"e_1_3_3_1_2_2","unstructured":"[n. d.]. Age Assurance on X. https:\/\/help.x.com\/en\/rules-and-policies\/age-assurance"},{"key":"e_1_3_3_1_3_2","unstructured":"2024. Introducing Instagram Teen Accounts: Built-In Protections for Teens Peace of Mind for Parents. https:\/\/about.fb.com\/news\/2024\/09\/instagram-teen-accounts\/"},{"key":"e_1_3_3_1_4_2","unstructured":"[n. d.]. Social media ban in Australia | A simple guide. https:\/\/www.unicef.org.au\/unicef-youth\/staying-safe-online\/social-media-ban-explainer?srsltid=AfmBOorzrTGVG4b5f0RnXW0TIOtSE9BUvk3lPc97UcOx9g7pa-3UWNQ8"},{"key":"e_1_3_3_1_5_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-62122-7_198-2"},{"key":"e_1_3_3_1_6_2","doi-asserted-by":"publisher","unstructured":"Sara\u00a0M. Abdulla. 2025. Are Deepfakes \u201cAb\u201dNormal Enough? On Using Norm Shifts in Gender and Sexuality Safety Measures. IEEE Security and Privacy 23 4 (2025) 15\u201320. 10.1109\/MSEC.2025.3577741","DOI":"10.1109\/MSEC.2025.3577741"},{"key":"e_1_3_3_1_7_2","unstructured":"Family\u00a0Policy Alliance. 2023. Sen. Marsha Blackburns Top Priority is Social Media. Heres Why.https:\/\/www.youtube.com\/watch?v=jg21OdmUj1g&ab_channel=FamilyPolicyAlliance"},{"key":"e_1_3_3_1_8_2","unstructured":"Bobby Allyn. 2024. Inside the TikTok documents: Stripping teens and boosting \u2019attractive\u2019 people. NPR (Oct. 2024). https:\/\/www.npr.org\/2024\/10\/12\/g-s1-28040\/teens-tiktok-addiction-lawsuit-investigation-documents"},{"key":"e_1_3_3_1_9_2","unstructured":"Monica Anderson and Michelle Faverio. [n. d.]. Social media policies for minors: What US adults and teens think | Pew Research Center."},{"key":"e_1_3_3_1_10_2","doi-asserted-by":"publisher","DOI":"10.1145\/3614407.3643705"},{"key":"e_1_3_3_1_11_2","doi-asserted-by":"crossref","unstructured":"Mary Arakelyan Seneca Freyleue Divya Avula Jennifer\u00a0L McLaren A\u00a0James O\u2019Malley and JoAnna\u00a0K Leyenaar. 2023. Pediatric mental health hospitalizations at acute care hospitals in the US 2009-2019. Jama 329 12 (2023) 1000\u20131011.","DOI":"10.1001\/jama.2023.1992"},{"key":"e_1_3_3_1_12_2","unstructured":"Abby Bacon. 2023. Children\u2019s safety in the digital age: A look at identity verification legislation in the United States. American University (Washington DC); Juris Mentem Law Review (2023)."},{"key":"e_1_3_3_1_13_2","volume-title":"draft report for the Administrative Conference of the United States","author":"Balla Steve","year":"2021","unstructured":"Steve Balla, Reeve Bull, Bridget Dooling, Emily Hammond, Michael Herz, Michael Livermore, and Beth\u00a0Simone Noveck. 2021. Mass, computer-generated, and fraudulent comments. In draft report for the Administrative Conference of the United States."},{"key":"e_1_3_3_1_14_2","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9781107590205.004"},{"key":"e_1_3_3_1_15_2","doi-asserted-by":"publisher","DOI":"10.1002\/9781118541555.wbiepc156"},{"key":"e_1_3_3_1_16_2","volume-title":"It\u2019s complicated: the social lives of networked teens","author":"Boyd Danah","year":"2014","unstructured":"Danah Boyd. 2014. It\u2019s complicated: the social lives of networked teens. Yale University Press, New Haven."},{"key":"e_1_3_3_1_17_2","doi-asserted-by":"publisher","unstructured":"Danah Boyd and Eszter Hargittai. 2013. Connected and concerned: Variation in parents\u2019 online safety concerns. Policy & Internet 5 3 (2013) 245\u2013269. 10.1002\/1944-2866.POI332_eprint: https:\/\/onlinelibrary.wiley.com\/doi\/pdf\/10.1002\/1944-2866.POI332.","DOI":"10.1002\/1944-2866.POI332"},{"key":"e_1_3_3_1_18_2","doi-asserted-by":"publisher","unstructured":"Danah Boyd Eszter Hargittai Jason Schultz and John Palfrey. 2011. Why parents help their children lie to Facebook about age: Unintended consequences of the \u2018Children\u2019s Online Privacy Protection Act\u2019. First Monday (Oct. 2011). 10.5210\/fm.v16i11.3850","DOI":"10.5210\/fm.v16i11.3850"},{"key":"e_1_3_3_1_19_2","doi-asserted-by":"publisher","DOI":"10.1109\/SP54263.2024.00222"},{"key":"e_1_3_3_1_20_2","doi-asserted-by":"publisher","unstructured":"Ngai\u00a0Keung Chan Chris\u00a0Chao Su and Alexis Shore. 2025. Shifting platform values in community guidelines: Examining the evolution of TikTok\u2019s governance frameworks. New Media & Society 27 2 (Feb. 2025) 1127\u20131151. 10.1177\/14614448231189476Publisher: SAGE Publications.","DOI":"10.1177\/14614448231189476"},{"key":"e_1_3_3_1_21_2","unstructured":"Alvin Chang. Augu. The next Time Someone Says Video Games Are Causing America\u2019s Gun Problem Show Them This Chart. https:\/\/www.vox.com\/policy-and-politics\/2019\/8\/5\/20755092\/gun-shooting-video-game-chart"},{"key":"e_1_3_3_1_22_2","volume-title":"Constructing grounded theory: A practical guide through qualitative analysis","author":"Charmaz Kathy","year":"2006","unstructured":"Kathy Charmaz. 2006. Constructing grounded theory: A practical guide through qualitative analysis. Sage. https:\/\/books.google.com\/books?hl=en&lr=&id=2ThdBAAAQBAJ&oi=fnd&pg=PP1&dq=grounded+theory+qualitative+analysis&ots=f-lR6PoACT&sig=5MGTe6oQN7kLuZy4zNDgcrGWrjA"},{"key":"e_1_3_3_1_23_2","unstructured":"Federal\u00a0Trade Commission. 2023. Children\u2019s Online Privacy Parental Consent Method; Application of the ESRB Group for Approval of Parental Consent Method. https:\/\/www.regulations.gov\/docket\/FTC-2023-0044"},{"key":"e_1_3_3_1_24_2","unstructured":"Federal\u00a0Trade Commission. 2023. Children\u2019s Online Privacy Parental Consent Method; Application of the ESRB Group for Approval of Parental Consent Method. https:\/\/www.regulations.gov\/docket\/FTC-2024-0003"},{"key":"e_1_3_3_1_25_2","volume-title":"FTC staff report finds large social media and video streaming companies have engaged in vast surveillance of users with lax privacy controls and inadequate safeguards for kids and teens","author":"Commission Federal\u00a0Trade","year":"2024","unstructured":"Federal\u00a0Trade Commission. 2024. FTC staff report finds large social media and video streaming companies have engaged in vast surveillance of users with lax privacy controls and inadequate safeguards for kids and teens. Technical Report. Federal Trade Commission. https:\/\/www.ftc.gov\/news-events\/news\/press-releases\/2024\/09\/ftc-staff-report-finds-large-social-media-vid"},{"key":"e_1_3_3_1_26_2","unstructured":"U.S.\u00a0Supreme Court. 1925. Pierce v. Society of Sisters. 268 U.S. 510."},{"key":"e_1_3_3_1_27_2","unstructured":"U.S.\u00a0Supreme Court. 1972. Wisconsin v. Yoder. 406 U.S. 205."},{"key":"e_1_3_3_1_28_2","unstructured":"U.S.\u00a0Supreme Court. 1997. Reno v. American Civil Liberties Union. 521 U.S. 844."},{"key":"e_1_3_3_1_29_2","unstructured":"U.S.\u00a0Supreme Court. 2025. Free Speech Coalition v. Paxton. U.S. Supreme Court by U.S. Court of Appeals 5th Cir. (2025). No. 24-10577 upheld constitutionality of age verification law."},{"key":"e_1_3_3_1_30_2","doi-asserted-by":"publisher","unstructured":"Margaret\u00a0S. Crocco Avner Segall Anne-Lise Halvorsen Alexandra Stamm and Rebecca Jacobsen. 2020. \u201cIt\u2019s not like they\u2019re selling your data to dangerous people\u201d: Internet privacy teens and (non-)controversial public issues. The Journal of Social Studies Research 44 1 (Jan. 2020) 21\u201333. 10.1016\/j.jssr.2019.09.004Publisher: SAGE Publications.","DOI":"10.1016\/j.jssr.2019.09.004"},{"key":"e_1_3_3_1_31_2","unstructured":"dana boyd. 2005. Regulation of Risk And the Public Domain . https:\/\/www.zephoria.org\/thoughts\/archives\/2024\/10\/09\/risks-vs-harms-youth-social-media.html."},{"key":"e_1_3_3_1_32_2","doi-asserted-by":"publisher","unstructured":"Prabu David Hyesun Choung and John\u00a0S. Seberger. 2024. Who is responsible? US Public perceptions of AI governance through the lenses of trust and ethics. Public Understanding of Science 33 5 (July 2024) 654\u2013672. 10.1177\/09636625231224592Publisher: SAGE Publications Ltd.","DOI":"10.1177\/09636625231224592"},{"key":"e_1_3_3_1_33_2","doi-asserted-by":"crossref","unstructured":"Fedor\u00a0A Dokshin. 2022. The public speaks: Using large-scale public comments data in public response research. Energy Research & Social Science 91 (2022) 102689.","DOI":"10.1016\/j.erss.2022.102689"},{"key":"e_1_3_3_1_34_2","unstructured":"Marlon Ettinger. 2024. Tiktok Appears to Be Automatically Banning People With Dwarfism Because It Thinks They\u2019re Underage . https:\/\/www.dailydot.com\/debug\/tiktok-ban-dwarf-little-people\/"},{"key":"e_1_3_3_1_35_2","doi-asserted-by":"publisher","unstructured":"Rachel Fabi and Lauren Zahn. 2022. Public Reason Public Comments and Public Charge: A Case Study in Moral & Practical Reasoning in Federal Rulemaking. Journal of Law Medicine & Ethics 50 2 (June 2022) 322\u2013335. 10.1017\/jme.2022.59","DOI":"10.1017\/jme.2022.59"},{"key":"e_1_3_3_1_36_2","doi-asserted-by":"publisher","DOI":"10.4324\/9781003035244-3"},{"key":"e_1_3_3_1_37_2","unstructured":"Megan Farokhmanesh. Augu. Bluesky Goes Dark in Mississippi Over Age Verification Law. https:\/\/www.wired.com\/story\/bluesky-goes-dark-in-mississippi-age-verification\/"},{"key":"e_1_3_3_1_38_2","doi-asserted-by":"publisher","unstructured":"Mike Feintuck. 2005. Precautionary Maybe but What\u2019s the Principle? The Precautionary Principle the Regulation of Risk and the Public Domain. Journal of Law and Society 32 3 (2005) 371\u2013398. 10.1111\/j.1467-6478.2005.00329.x_eprint: https:\/\/onlinelibrary.wiley.com\/doi\/pdf\/10.1111\/j.1467-6478.2005.00329.x.","DOI":"10.1111\/j.1467-6478.2005.00329.x"},{"key":"e_1_3_3_1_39_2","doi-asserted-by":"publisher","DOI":"10.1145\/3173574.3173627"},{"key":"e_1_3_3_1_40_2","doi-asserted-by":"publisher","unstructured":"Claire Finkelstein. 2003. Is Risk a Harm? University of Pennsylvania Law Review 151 3 (2003) 963\u20131001. 10.2307\/3312883Publisher: The University of Pennsylvania Law Review.","DOI":"10.2307\/3312883"},{"key":"e_1_3_3_1_41_2","unstructured":"Jessica Fisher. 2013. BROWN V. ENTERTAINMENT MERCHANTS ASSOCIATION: Modern warfare on first amendment protection of violent video games. J. Bus. & Tech. L. 8 (2013) 525."},{"key":"e_1_3_3_1_42_2","volume-title":"Young men\u2019s media landscaping report","author":"Fisher Krista","year":"2025","unstructured":"Krista Fisher, Pete Fisher, and Charlie Sabgir. 2025. Young men\u2019s media landscaping report. Report. Movember Foundation. https:\/\/apo.org.au\/node\/332119 Journal Abbreviation: In-depth research on emerging trends, challenges, and opportunities."},{"key":"e_1_3_3_1_43_2","unstructured":"Graham Fraser Liv McMahon and Grace Dean. 23 J. As porn sites apply new age checks will users hand over personal ID?https:\/\/www.bbc.com\/news\/articles\/c1k81lj8nvpo"},{"key":"e_1_3_3_1_44_2","unstructured":"Deen Freelon Amy\u00a0B Becker Bob Lannon and Andrew Pendleton. 2016. Net neutrality| narrowing the gap: gender and mobilization in net neutrality advocacy. International Journal of Communication 10 (2016) 23."},{"key":"e_1_3_3_1_45_2","doi-asserted-by":"crossref","unstructured":"Batya Friedman. 1996. Value-sensitive design. interactions 3 6 (1996) 16\u201323.","DOI":"10.1145\/242485.242493"},{"key":"e_1_3_3_1_46_2","unstructured":"gracelm. 2022. Introducing New Ways to Verify Age on Instagram. https:\/\/about.fb.com\/news\/2022\/06\/new-ways-to-verify-age-on-instagram\/"},{"key":"e_1_3_3_1_47_2","doi-asserted-by":"crossref","unstructured":"James Grimmelmann. 2024. The Return of Age Verification Laws. Commun. ACM 67 5 (2024) 34\u201336.","DOI":"10.1145\/3651865"},{"key":"e_1_3_3_1_48_2","volume-title":"The anxious generation: How the great rewiring of childhood is causing an epidemic of mental illness","author":"Haidt Jonathan","year":"2024","unstructured":"Jonathan Haidt. 2024. The anxious generation: How the great rewiring of childhood is causing an epidemic of mental illness. Random House."},{"key":"e_1_3_3_1_49_2","volume-title":"Face Analysis Technology Evaluation: Age Estimation and Verification","author":"Hanaoka Kayee","year":"2024","unstructured":"Kayee Hanaoka, Patrick\u00a0J Grother, Mei\u00a0Lee Ngan, Joyce Yang, George\u00a0W Quinn, and Austin Hom. 2024. Face Analysis Technology Evaluation: Age Estimation and Verification. US Department of Commerce, National Institute of Standards and Technology."},{"key":"e_1_3_3_1_50_2","unstructured":"Office of the Assistant Secretary\u00a0for Health\u00a0(OASH). 2023. Surgeon General Issues New Advisory About Effects Social Media Use Has on Youth Mental Health. https:\/\/www.hhs.gov\/about\/news\/2023\/05\/23\/surgeon-general-issues-new-advisory-about-effects-social-media-use-has-youth-mental-health.html Last Modified: 2023-05-23T11:39:35-0400."},{"key":"e_1_3_3_1_51_2","doi-asserted-by":"crossref","unstructured":"Steven Hitlin and Jane\u00a0Allyn Piliavin. 2004. Values: Reviving a dormant concept. Annu. Rev. Sociol. 30 1 (2004) 359\u2013393.","DOI":"10.1146\/annurev.soc.30.012703.110640"},{"key":"e_1_3_3_1_52_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-85610-6_39"},{"key":"e_1_3_3_1_53_2","doi-asserted-by":"publisher","unstructured":"Alexis\u00a0Shore Ingber and Chris\u00a0Chao Su. 2025. Protecting Children of the TikTok Era: A Discourse Analysis in the Absence of Law. Policy & Internet 17 2 (2025) e431. 10.1002\/poi3.431_eprint: https:\/\/onlinelibrary.wiley.com\/doi\/pdf\/10.1002\/poi3.431.","DOI":"10.1002\/poi3.431"},{"key":"e_1_3_3_1_54_2","unstructured":"A Jackson. 2020. Parental advisory: The story of a warning label. JSTOR Daily (2020)."},{"key":"e_1_3_3_1_55_2","unstructured":"Meg\u00a0Leta Jones Mac\u00a0Milin Kiran and Cal Newport. 2024. Are We Tumbling Toward an Adults-Only Internet?https:\/\/www.promarket.org\/2024\/04\/12\/are-we-tumbling-toward-an-adults-only-internet\/"},{"key":"e_1_3_3_1_56_2","doi-asserted-by":"crossref","unstructured":"Nicholas Kerry Laith Al-Shawaf Maria Barbato Carlota Batres Khandis\u00a0R Blake Youngjae Cha Gregory\u00a0V Chauvin Jeremy\u00a0DW Clifton Ana\u00a0Maria Fernandez Andrzej Galbarczyk et\u00a0al. 2022. Experimental and cross-cultural evidence that parenthood and parental care motives increase social conservatism. Proceedings of the Royal Society B 289 1982 (2022) 20220978.","DOI":"10.1098\/rspb.2022.0978"},{"key":"e_1_3_3_1_57_2","doi-asserted-by":"publisher","DOI":"10.1145\/3585088.3589375"},{"key":"e_1_3_3_1_58_2","volume-title":"The evolving capacities of the child","author":"Lansdown Gerison","year":"2005","unstructured":"Gerison Lansdown. 2005. The evolving capacities of the child. Technical Report. Research Papers in Economics."},{"key":"e_1_3_3_1_59_2","doi-asserted-by":"publisher","unstructured":"Dafna Lemish. 2023. The social media (moral) panic this time: Why CAM scholars may need a more complex approach. Journal of Children and Media 17 3 (July 2023) 271\u2013277. 10.1080\/17482798.2023.2235159Publisher: Routledge _eprint: https:\/\/doi.org\/10.1080\/17482798.2023.2235159.","DOI":"10.1080\/17482798.2023.2235159"},{"key":"e_1_3_3_1_60_2","doi-asserted-by":"publisher","unstructured":"Tesary Lin. 2021. Valuing Intrinsic and Instrumental Preferences for Privacy. 10.2139\/ssrn.3406412","DOI":"10.2139\/ssrn.3406412"},{"key":"e_1_3_3_1_61_2","doi-asserted-by":"crossref","unstructured":"Xiaoxuan Liu Jianghong Liu Dalmacio\u00a0D Flores and Catherine\u00a0C McDonald. 2024. Family factors related to adolescent screen media use and mental health outcomes: A systematic review and recommendation for practices. Journal of Adolescence 96 7 (2024) 1401\u20131427.","DOI":"10.1002\/jad.12367"},{"key":"e_1_3_3_1_62_2","doi-asserted-by":"crossref","unstructured":"Kyle\u00a0C Longest Steven Hitlin and Stephen Vaisey. 2013. Position and disposition: The contextual development of human values. Social forces 91 4 (2013) 1499\u20131528.","DOI":"10.1093\/sf\/sot045"},{"key":"e_1_3_3_1_63_2","unstructured":"Patrick\u00a0M Markey and Christopher\u00a0J Ferguson. 2017. Teaching Us to Fear: The Violent Video Game Moral Panic and The Politics of Game Research. American journal of play 10 1 (2017) 99\u2013115."},{"key":"e_1_3_3_1_64_2","doi-asserted-by":"publisher","unstructured":"Alice Marwick Jacob Smith Robyn Caplan and Meher Wadhawan. 2024. Child Online Safety Legislation (COSL) - A Primer. The Bulletin of Technology & Public Life (May 2024). 10.21428\/bfcb0bff.de78f444","DOI":"10.21428\/bfcb0bff.de78f444"},{"key":"e_1_3_3_1_65_2","doi-asserted-by":"crossref","unstructured":"James\u00a0H Moor. 1997. Towards a theory of privacy in the information age. ACM Sigcas Computers and Society 27 3 (1997) 27\u201332.","DOI":"10.1145\/270858.270866"},{"key":"e_1_3_3_1_66_2","doi-asserted-by":"publisher","unstructured":"Giles Moss. 2025. Digital Regulation and Questions of Legitimacy. Policy & Internet 17 2 (2025). 10.1002\/poi3.433_eprint: https:\/\/onlinelibrary.wiley.com\/doi\/pdf\/10.1002\/poi3.433.","DOI":"10.1002\/poi3.433"},{"key":"e_1_3_3_1_67_2","unstructured":"Helen Nissenbaum. 2004. Privacy as contextual integrity. Wash. L. Rev. 79 (2004) 119. https:\/\/heinonline.org\/hol-cgi-bin\/get_pdf.cgi?handle=hein.journals\/washlr79&section=16&casa_token=dihd-Fkgm7gAAAAA:_7x-XUtzMoqv9LS0zDrlF9RFvSN-Jz4-qz-bx5Y8h3MO5Xra3wBg-C1EGYWEs21AsldMq5kidQ Publisher: HeinOnline."},{"key":"e_1_3_3_1_68_2","unstructured":"Office of\u00a0the Surgeon\u00a0General et\u00a0al. 2023. Our epidemic of loneliness and isolation: The US Surgeon General\u2019s Advisory on the healing effects of social connection and community [Internet]. (2023)."},{"key":"e_1_3_3_1_69_2","doi-asserted-by":"publisher","unstructured":"Amy Orben. 2020. The Sisyphean Cycle of Technology Panics. Perspectives on Psychological Science 15 5 (Sept. 2020) 1143\u20131157. 10.1177\/1745691620919372Publisher: SAGE Publications Inc.","DOI":"10.1177\/1745691620919372"},{"key":"e_1_3_3_1_70_2","doi-asserted-by":"crossref","unstructured":"Amy Orben Adrian Meier Tim Dalgleish and Sarah-Jayne Blakemore. 2024. Mechanisms linking social media use to adolescent mental health vulnerability. Nature Reviews Psychology 3 6 (2024) 407\u2013423.","DOI":"10.1038\/s44159-024-00307-y"},{"key":"e_1_3_3_1_71_2","doi-asserted-by":"publisher","unstructured":"Jinkyung\u00a0Katie Park Mamtaj Akter Pamela Wisniewski and Karla Badillo-Urquiola. 2024. It\u2019s Still Complicated: From Privacy-Invasive Parental Control to Teen-Centric Solutions for Digital Resilience. IEEE Security & Privacy01 (July 2024) 2\u201312. 10.1109\/MSEC.2024.3417804Publisher: IEEE Computer Society.","DOI":"10.1109\/MSEC.2024.3417804"},{"key":"e_1_3_3_1_72_2","doi-asserted-by":"crossref","unstructured":"Anthony\u00a0T Pinter Jialun\u00a0Aaron Jiang Katie\u00a0Z Gach Melanie\u00a0M Sidwell James\u00a0E Dykes and Jed\u00a0R Brubaker. 2019. \" Am I Never Going to Be Free of All This Crap?\" Upsetting Encounters with Algorithmically Curated Content About Ex-Partners. Proceedings of the ACM on Human-Computer Interaction 3 CSCW (2019) 1\u201323.","DOI":"10.1145\/3359172"},{"key":"e_1_3_3_1_73_2","unstructured":"Leah Plunkett. 2020. To stop sharenting & other children\u2019s privacy harms start playing: A blueprint for a new Protecting the Private Lives of Adolescents and Youth (PPLAY) act. Seton Hall Legis. J. 44 (2020) 457."},{"key":"e_1_3_3_1_74_2","unstructured":"Tanner Pool. 2024. Honey I Shrunk the Kids (Social Media Access): States\u2019 Actions to Regulate Social Media Access for Minors through Parental Consent and the First Amendment. Okla. City UL Rev. 49 (2024) 379."},{"key":"e_1_3_3_1_75_2","unstructured":"raham Fraser Liv McMahon and Grace Dean. 23 J. As porn sites apply new age checks will users hand over personal ID?https:\/\/www.bbc.com\/news\/articles\/c1k81lj8nvpo"},{"key":"e_1_3_3_1_76_2","doi-asserted-by":"publisher","unstructured":"Afsaneh Razi Zainab Agha Neeraj Chatlani and Pamela Wisniewski. 2020. Privacy Challenges for Adolescents as a Vulnerable Population. SSRN (April 2020). 10.2139\/ssrn.3587558","DOI":"10.2139\/ssrn.3587558"},{"key":"e_1_3_3_1_77_2","unstructured":"Julian Ring. Sept. Tipper Gore Twisted Sister and the fight to put warning labels on music. https:\/\/www.npr.org\/2025\/09\/12\/nx-s1-5460888\/music-parental-advisory-sticker-tipper-gore"},{"key":"e_1_3_3_1_78_2","doi-asserted-by":"crossref","unstructured":"Jed Rubenfeld. 1989. The right of privacy. Harvard Law Review (1989) 737\u2013807.","DOI":"10.2307\/1341305"},{"key":"e_1_3_3_1_79_2","doi-asserted-by":"crossref","unstructured":"Florian Saurwein and Charlotte Spencer-Smith. 2021. Automated trouble: The role of algorithmic selection in harms on social media platforms. Media and Communication 9 4 (2021) 222\u2013233.","DOI":"10.17645\/mac.v9i4.4062"},{"key":"e_1_3_3_1_80_2","unstructured":"Sarita Schoenebeck and Lindsay Blackwell. 2020. Reimagining Social Media Governance: Harm Accountability and Repair. Yale Journal of Law and Technology 23 (2020) 113. https:\/\/heinonline.org\/HOL\/Page?handle=hein.journals\/yjolt23&id=799&div=&collection="},{"key":"e_1_3_3_1_81_2","doi-asserted-by":"publisher","unstructured":"Pamela Schulz. 2018. Children as Commodities: Conflicting Discourses of Protection and Abuse of Children. Children Australia 43 4 (Dec. 2018) 231\u2013244. 10.1017\/cha.2018.43","DOI":"10.1017\/cha.2018.43"},{"key":"e_1_3_3_1_82_2","unstructured":"Svetlana Smirnova Sonia Livingstone and Mariya Stoilova. 2021. Understanding of user needs and problems: a rapid evidence review of age assurance and parental controls. https:\/\/euconsent.eu\/download\/understanding-of-user-needs-and-problems-a-rapid-evidence-review-of-age-assurance-and-parental-controls\/ Num Pages: 60 Publisher: euConsent."},{"key":"e_1_3_3_1_83_2","doi-asserted-by":"crossref","unstructured":"Daniel\u00a0J Solove. 2005. A taxonomy of privacy. U. Pa. l. Rev. 154 (2005) 477.","DOI":"10.2307\/40041279"},{"key":"e_1_3_3_1_84_2","unstructured":"Shaun\u00a0B Spencer. 2002. Reasonable Expectatoins and the Erosion of Privacy. San Diego L. Rev. 39 (2002) 843."},{"key":"e_1_3_3_1_85_2","doi-asserted-by":"crossref","unstructured":"Zahra Stardust Abdul Obeid Alan McKee and Daniel Angus. 2024. Mandatory age verification for pornography access: Why it can\u2019t and won\u2019t \u2018save the children\u2019. Big Data & Society 11 2 (2024) 20539517241252129.","DOI":"10.1177\/20539517241252129"},{"key":"e_1_3_3_1_86_2","unstructured":"Zahra Takhshid. 2022. Children\u2019s Digital Privacy and the Case Against Parental Consent. Tex. L. Rev. 101 (2022) 1417."},{"key":"e_1_3_3_1_87_2","unstructured":"National Telecommunications and Information Administration. 2023. Kids Online Health and Safety Task Force. https:\/\/www.regulations.gov\/docket\/NTIA-2023-0008"},{"key":"e_1_3_3_1_88_2","unstructured":"Omer Tene and Jules Polonetsky. 2013. A theory of creepy: technology privacy and shifting social norms. Yale JL & Tech. 16 (2013) 59."},{"key":"e_1_3_3_1_89_2","doi-asserted-by":"publisher","unstructured":"Amanda Terrell. 2019. Twenge J. M. (2017). iGen: Why Today\u2019s Super\u2010Connected Kids Are Growing Up Less Rebellious More Tolerant Less Happy\u2014and Completely Unprepared for Adulthood and What That Means for the Rest of Us. New York NY: Atria. ISBN: 978\u20101\u20105011\u20105201\u20106 paperback. 342 pp. Family and Consumer Sciences Research Journal 48 (Dec. 2019). 10.1111\/fcsr.12345","DOI":"10.1111\/fcsr.12345"},{"key":"e_1_3_3_1_90_2","first-page":"25","volume-title":"The psychology of values","author":"Tetlock Philip\u00a0E","year":"2013","unstructured":"Philip\u00a0E Tetlock, Randall\u00a0S Peterson, and Jennifer\u00a0S Lerner. 2013. Revising the value pluralism model: Incorporating social content and context postulates. In The psychology of values. Psychology Press, 25\u201351."},{"key":"e_1_3_3_1_91_2","doi-asserted-by":"crossref","unstructured":"Matti Vuorre Amy Orben and Andrew\u00a0K Przybylski. 2021. There is no evidence that associations between adolescents\u2019 digital technology engagement and mental health problems have increased. Clinical Psychological Science 9 5 (2021) 823\u2013835.","DOI":"10.1177\/2167702621994549"},{"key":"e_1_3_3_1_92_2","doi-asserted-by":"publisher","unstructured":"Pamela Wisniewski. 2018. The Privacy Paradox of Adolescent Online Safety: A Matter of Risk Prevention or Risk Resilience? IEEE Security and Privacy 16 2 (March 2018) 86\u201390. 10.1109\/MSP.2018.1870874","DOI":"10.1109\/MSP.2018.1870874"},{"key":"e_1_3_3_1_93_2","doi-asserted-by":"publisher","DOI":"10.1145\/2930674.2930716"},{"key":"e_1_3_3_1_94_2","doi-asserted-by":"publisher","DOI":"10.4324\/9781003320609-27"}],"event":{"name":"EAAMO '25: Equity and Access in Algorithms, Mechanisms, and Optimization","sponsor":["SIGecom Special Interest Group on Economics and Computation","SIGAI ACM Special Interest Group on Artificial Intelligence"],"location":"Pittsburgh USA","acronym":"EAAMO '25"},"container-title":["Proceedings of the 5th ACM Conference on Equity and Access in Algorithms, Mechanisms, and Optimization"],"original-title":[],"deposited":{"date-parts":[[2025,10,30]],"date-time":"2025-10-30T09:15:17Z","timestamp":1761815717000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3757887.3763015"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,11,4]]},"references-count":93,"alternative-id":["10.1145\/3757887.3763015","10.1145\/3757887"],"URL":"https:\/\/doi.org\/10.1145\/3757887.3763015","relation":{},"subject":[],"published":{"date-parts":[[2025,11,4]]},"assertion":[{"value":"2025-11-04","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}