Skip to main content

Mental Models of the Internet and Its Online Risks: Children and Their Parent(s)

  • Conference paper
  • First Online:
HCI for Cybersecurity, Privacy and Trust (HCII 2022)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 13333))

Included in the following conference series:

Abstract

Today, children have access to the Internet from an early age and are therefore considered digital natives. This paper investigates how children (aged five to eight) and their parents perceive and deal with the Internet and the privacy and security risks of being online. Therefore, we extended prior studies of Internet mental models of children. We used a two-fold study design by including drawing tasks in addition to a verbal interview. The drawings allowed us to uncover the tacit knowledge underlying children’s and parents’ mental models.

So far, research focused mainly on the threat models of “being online”, while our study has a more holistic view, investigating general perceptions of the Internet in-depth. In contrast to prior studies, which were mainly conducted outside of Europe with highly-educated participants, we recruited participants in Central Europe with a diverse educational background.

We found that children’s mental models start to take shape beyond physically tangible components between the age of seven to eight years. Hence, we argue that it is important to educate children about the Internet as well as security and privacy issues before that age. For younger children, we suggest using secure and privacy-preserving applications, as they are not yet able to grasp the bigger picture.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 79.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 99.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Brandom, R.: Inside elsagate, the conspiracy-fueled war on creepy Youtube kids videos. https://www.theverge.com/2017/12/8/16751206/elsagate-youtube-kids-creepy-conspiracy-theory. Accessed 17 Nov 2020

  2. Brodsky, J.E., Lodhi, A.K., Powers, K.L., Blumberg, F.C., Brooks, P.J.: “It’s just everywhere now’’: middle-school and college students’ mental models of the internet. Human Behav. Emerg. Technol. 3(4), 495–511 (2021)

    Article  Google Scholar 

  3. Clarke, V., Braun, V.: Thematic analysis. In: Michalos, M.C. (ed.) Encyclopedia of Critical Psychology, pp. 1947–1952. Springer, Heidelberg (2014). https://doi.org/10.1007/978-94-007-0753-5_3470

    Chapter  Google Scholar 

  4. Cohen, J.: A coefficient of agreement for nominal scales. Educ. Psychol. Measur. 20(1), 37–46 (1960)

    Article  Google Scholar 

  5. Consulting, I.: General Data Protection Regulation GDPR. https://gdpr-info.eu/. Accessed 14 Jan 2021

  6. Cranor, L.F., Durity, A.L., Marsh, A., Ur, B.: ‘Parents’ and ‘teens’ perspectives on privacy in a technology-filled world. In: 10th Symposium On Usable Privacy and Security (SOUPS’ 14), pp. 19–35 (2014)

    Google Scholar 

  7. Damon, W., Lerner, R.M., Kuhn, D., Siegler, R.S.: Handbook of Child Psychology, Cognition, Perception, and Language. Wiley, Hoboken (2006)

    Google Scholar 

  8. Dell’Antonia, K.: When should a child get an e-mail account? https://parenting.blogs.nytimes.com/2013/01/11/when-should-a-child-get-an-e-mail-account/. Accessed 08 Feb 2021

  9. Diethelm, I., Wilken, H., Zumbrägel, S.: An investigation of secondary school students’ conceptions on how the internet works. In: Proceedings of the 12th Koli Calling International Conference on Computing Education Research, pp. 67–73 (2012)

    Google Scholar 

  10. Edwards, S., Nolan, A., Henderson, M., Mantilla, A., Plowman, L., Skouteris, H.: Young children’s everyday concepts of the internet: a platform for cyber-safety education in the early years. Br. J. Educ. Technol. 49(1), 45–55 (2018)

    Article  Google Scholar 

  11. Eskelä-Haapanen, S., Kiili, C.: ‘It goes around the world’-children’s understanding of the internet. Nordic J. Digit. Literacy 14(3–04), 175–187 (2019)

    Google Scholar 

  12. Ey, L.A., Glenn Cupit, C.: Exploring young children’s understanding of risks associated with internet usage and their concepts of management strategies. J. Early Childhood Res. 9(1), 53–65 (2011)

    Article  Google Scholar 

  13. Fripp, C.: Check this list: 3.2 billion leaked usernames and passwords. https://www.komando.com/security-privacy/3-billion-leaked-passwords/777661/. Accessed 10 Feb 2021

  14. Fruth, J., Schulze, C., Rohde, M., Dittmann, J.: E-learning of IT security threats: a game prototype for children. In: De Decker, B., Dittmann, J., Kraetzer, C., Vielhauer, C. (eds.) CMS 2013. LNCS, vol. 8099, pp. 162–172. Springer, Heidelberg (2013). https://doi.org/10.1007/978-3-642-40779-6_14

    Chapter  Google Scholar 

  15. Gelman, S.A., Martinez, M., Davidson, N.S., Noles, N.S.: Developing digital privacy: children’s moral judgments concerning mobile GPS devices. Child Dev. 89(1), 17–26 (2018)

    Article  Google Scholar 

  16. Holloway, D., Green, L., Livingstone, S.: Zero to eight: young children and their internet use (2013)

    Google Scholar 

  17. Ishikawa, A., Bollis, E., Avila, S.: Combating the Elsagate phenomenon: deep learning architectures for disturbing cartoons. arXiv preprint arXiv:1904.08910 (2019)

  18. Johnson, J.: Global digital population as of October 2020. https://www.statista.com/statistics/617136/digital-population-worldwide/. Accessed 08 Jan 2021

  19. Kearney, A.R., Kaplan, S.: Toward a methodology for the measurement of knowledge structures of ordinary people: the conceptual content cognitive map (3CM). Environ. Behav. 29(5), 579–617 (1997)

    Article  Google Scholar 

  20. Krombholz, K., Busse, K., Pfeffer, K., Smith, M., von Zezschwitz, E.: “if https were secure, i wouldn’t need 2FA”-end user and administrator mental models of https. In: 2019 IEEE Symposium on Security and Privacy (S&P’19), pp. 246–263. IEEE (2019)

    Google Scholar 

  21. Kumar, P., Naik, S.M., Devkar, U.R., Chetty, M., Clegg, T.L., Vitak, J.: ‘No telling passcodes out because they’re private’ understanding children’s mental models of privacy and security online. In: Proceedings of the ACM on Human-Computer Interaction 1(CSCW), pp. 1–21 (2017)

    Google Scholar 

  22. Livingstone, S.: Children’s privacy online: experimenting with boundaries within and beyond the family (2006)

    Google Scholar 

  23. Mai, A., Pfeffer, K., Gusenbauer, M., Weippl, E., Krombholz, K.: User mental models of cryptocurrency systems-a grounded theory approach. In: Sixteenth Symposium on Usable Privacy and Security (SOUPS’ 20), pp. 341–358 (2020)

    Google Scholar 

  24. McReynolds, E., Hubbard, S., Lau, T., Saraf, A., Cakmak, M., Roesner, F.: Toys that listen: a study of parents, children, and internet-connected toys. In: Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems, pp. 5197–5207 (2017)

    Google Scholar 

  25. Oy, H.R.: Hello Ruby Books Series. http://www.helloruby.com/books. Accessed 12 Dec 2021

  26. Papadamou, K., et al.: Disturbed Youtube for kids: characterizing and detecting inappropriate videos targeting young children. In: Proceedings of the International AAAI Conference on Web and Social Media, vol. 14, pp. 522–533 (2020)

    Google Scholar 

  27. Papastergiou, M.: Students’ mental models of the internet and their didactical exploitation in informatics education. Educ. Inf. Technol. 10(4), 341–360 (2005)

    Article  Google Scholar 

  28. Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012)

    Google Scholar 

  29. Sharp, D.L., Bransford, J.D., Goldman, S.R., Risko, V.J., Kinzer, C.K., Vye, N.J.: Dynamic visual support for story comprehension and mental model building by young, at-risk children. Educ. Technol. Res. Dev. 43(4), 25–42 (1995). https://doi.org/10.1007/BF02300489

    Article  Google Scholar 

  30. Thatcher, A., Greyling, M.: Mental models of the internet. Int. J. Ind. Ergon. 22(4–5), 299–305 (1998)

    Article  Google Scholar 

  31. Vygotsky, L.S.: The Collected Works of LS Vygotsky: Problems of the Theory and History of Psychology, vol. 3. Springer, Heidelberg (1997)

    Google Scholar 

  32. Wolfe, M.: Childhood and privacy. In: Altman, I., Wohlwill, J.F. (eds.) Children and the Environment, pp. 175–222. Springer, Boston (1978). https://doi.org/10.1007/978-1-4684-3405-7_6

    Chapter  Google Scholar 

  33. Yan, Z.: Age differences in children’s understanding of the complexity of the internet. J. Appl. Dev. Psychol. 26(4), 385–396 (2005)

    Article  Google Scholar 

  34. Yan, Z.: What influences children’s and adolescents’ understanding of the complexity of the internet? Dev. Psychol. 42(3), 418 (2006)

    Article  Google Scholar 

  35. Yan, Z.: Limited knowledge and limited resources: children’s and adolescents’ understanding of the internet. J. Appl. Dev. Psychol. 30(2), 103–115 (2009)

    Article  Google Scholar 

  36. Zeng, E., Mare, S., Roesner, F.: End user security & privacy concerns with smart homes. In: Symposium on Usable Privacy and Security (SOUPS’17) (2017)

    Google Scholar 

  37. Zhang-Kennedy, L., Mekhail, C., Abdelaziz, Y., Chiasson, S.: From nosy little brothers to stranger-danger: children and parents’ perception of mobile threats. In: Proceedings of the The 15th International Conference on Interaction Design and Children, pp. 388–399 (2016)

    Google Scholar 

Download references

Acknowledgments

This material is based upon work partially supported by the Industry-related Dissertation funding program. SBA Research (SBA-K1) is a COMET Centre within the framework of COMET - Competence Centers for Excellent Technologies Programme and funded by BMK, BMDW, and the province of Vienna. The programs are both managed by FFG.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Alexandra Mai .

Editor information

Editors and Affiliations

A Appendix

A Appendix

1.1 A.1 Pre-study Questionnaire

1. Age

2. Gender

3. Highest completed education

4. Do after-school care/grandparents or others look after your child regularly? If yes, how often?

5. Are you professionally involved with technical aspects of the Internet (IT related fields)?

6. How applicable are the following statements?

Never(1), Rarely(2), Sometimes(3), Often(4), Daily(5)

I use the following Internet services: [*only asked parents]

  • Social Media (Facebook, Xing, Instagram, etc.)

  • VOD (YouTube, Netflix, Amazon Prime Video, etc.)

  • Online Shopping (Amazon, ebay, willhaben, etc.)

  • Instant messaging (WhatsApp, Facebook Messanger, Viber, etc.)

  • Online video chat services (Skype, Facetime, etc.)

  • *Email

  • *Online banking

  • Games (just asked during the children’s interview)

7. I am concerned about my privacy and the security of my data when using any of the services listed above. [only asked parents explicitly]

Not at all(1)—I am very concerned (5)

8. How much do the following statements apply to you?

Does not apply(1)—Applies very much (5)

  • I am experienced with technical devices such as computers, smartphones and tablets.

  • I learned about the Internet in the course of my education.

  • I often ask other people for help when I have problems with my computer/smartphone/tablet.

  • I am often asked by other people for help when they have problems with their computer/smartphone/tablet.

1.2 A.2 Pictures for Scenarios

Fig. 5.
figure 5

Pictures shown during user study

Rights and permissions

Reprints and permissions

Copyright information

© 2022 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Mai, A., Guelmino, L., Pfeffer, K., Weippl, E., Krombholz, K. (2022). Mental Models of the Internet and Its Online Risks: Children and Their Parent(s). In: Moallem, A. (eds) HCI for Cybersecurity, Privacy and Trust. HCII 2022. Lecture Notes in Computer Science, vol 13333. Springer, Cham. https://doi.org/10.1007/978-3-031-05563-8_4

Download citation

  • DOI: https://doi.org/10.1007/978-3-031-05563-8_4

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-031-05562-1

  • Online ISBN: 978-3-031-05563-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics