UWSpace is currently experiencing technical difficulties resulting from its recent migration to a new version of its software. These technical issues are not affecting the submission and browse features of the site. UWaterloo community members may continue submitting items to UWSpace. We apologize for the inconvenience, and are actively working to resolve these technical issues.
 

From Nosy Little Brothers to Stranger-Danger: Children and Parents’ Perception of Mobile Threats

Loading...
Thumbnail Image

Date

2016-06-21

Authors

Zhang-Kennedy, Leah
Mekhail, Christine
Abdelaziz, Yomna
Chiasson, Sonia

Journal Title

Journal ISSN

Volume Title

Publisher

ACM

Abstract

The rise in mobile media use by children has heightened parents' concerns for their online safety. Through semi-structured interviews of parent-child dyads, we explore the perceived privacy and security threats faced by children aged seven to eleven along with the protection mechanisms employed. We identified four models of privacy held by children. Furthermore, we found that children's concerns fit into four child-adversary threat models: child-peers, child-media, child-strangers, and child-parents. Their concerns differed from the five threat models held by the parents: child-peers, child-media, child-strangers, child-technology, and child-self. Parents used a variety of protection strategies to minimize children's exposure to external threats. In reality, however, our results suggest that security and privacy risks from an internal family member or a friend are far more common than harm from outsiders.

Description

© {Zhang-Kennedy, Mekhail, Abdelaziz, Chiasson, | ACM} {2016}. This is the author's version of the work. It is posted here for your personal use. Not for redistribution. The definitive Version of Record was published in {Proceedings of the The 15th International Conference on Interaction Design and Children}, https://doi.org/10.1145/2930674.2930716.

Keywords

Privacy, Threat Models, Usable Privacy and Security, Human Factors, Child-Computer Interaction, Mobile

LC Keywords

Citation