Abstract
Today, children have access to the Internet from an early age and are therefore considered digital natives. This paper investigates how children (aged five to eight) and their parents perceive and deal with the Internet and the privacy and security risks of being online. Therefore, we extended prior studies of Internet mental models of children. We used a two-fold study design by including drawing tasks in addition to a verbal interview. The drawings allowed us to uncover the tacit knowledge underlying children’s and parents’ mental models.
So far, research focused mainly on the threat models of “being online”, while our study has a more holistic view, investigating general perceptions of the Internet in-depth. In contrast to prior studies, which were mainly conducted outside of Europe with highly-educated participants, we recruited participants in Central Europe with a diverse educational background.
We found that children’s mental models start to take shape beyond physically tangible components between the age of seven to eight years. Hence, we argue that it is important to educate children about the Internet as well as security and privacy issues before that age. For younger children, we suggest using secure and privacy-preserving applications, as they are not yet able to grasp the bigger picture.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Brandom, R.: Inside elsagate, the conspiracy-fueled war on creepy Youtube kids videos. https://www.theverge.com/2017/12/8/16751206/elsagate-youtube-kids-creepy-conspiracy-theory. Accessed 17 Nov 2020
Brodsky, J.E., Lodhi, A.K., Powers, K.L., Blumberg, F.C., Brooks, P.J.: “It’s just everywhere now’’: middle-school and college students’ mental models of the internet. Human Behav. Emerg. Technol. 3(4), 495–511 (2021)
Clarke, V., Braun, V.: Thematic analysis. In: Michalos, M.C. (ed.) Encyclopedia of Critical Psychology, pp. 1947–1952. Springer, Heidelberg (2014). https://doi.org/10.1007/978-94-007-0753-5_3470
Cohen, J.: A coefficient of agreement for nominal scales. Educ. Psychol. Measur. 20(1), 37–46 (1960)
Consulting, I.: General Data Protection Regulation GDPR. https://gdpr-info.eu/. Accessed 14 Jan 2021
Cranor, L.F., Durity, A.L., Marsh, A., Ur, B.: ‘Parents’ and ‘teens’ perspectives on privacy in a technology-filled world. In: 10th Symposium On Usable Privacy and Security (SOUPS’ 14), pp. 19–35 (2014)
Damon, W., Lerner, R.M., Kuhn, D., Siegler, R.S.: Handbook of Child Psychology, Cognition, Perception, and Language. Wiley, Hoboken (2006)
Dell’Antonia, K.: When should a child get an e-mail account? https://parenting.blogs.nytimes.com/2013/01/11/when-should-a-child-get-an-e-mail-account/. Accessed 08 Feb 2021
Diethelm, I., Wilken, H., Zumbrägel, S.: An investigation of secondary school students’ conceptions on how the internet works. In: Proceedings of the 12th Koli Calling International Conference on Computing Education Research, pp. 67–73 (2012)
Edwards, S., Nolan, A., Henderson, M., Mantilla, A., Plowman, L., Skouteris, H.: Young children’s everyday concepts of the internet: a platform for cyber-safety education in the early years. Br. J. Educ. Technol. 49(1), 45–55 (2018)
Eskelä-Haapanen, S., Kiili, C.: ‘It goes around the world’-children’s understanding of the internet. Nordic J. Digit. Literacy 14(3–04), 175–187 (2019)
Ey, L.A., Glenn Cupit, C.: Exploring young children’s understanding of risks associated with internet usage and their concepts of management strategies. J. Early Childhood Res. 9(1), 53–65 (2011)
Fripp, C.: Check this list: 3.2 billion leaked usernames and passwords. https://www.komando.com/security-privacy/3-billion-leaked-passwords/777661/. Accessed 10 Feb 2021
Fruth, J., Schulze, C., Rohde, M., Dittmann, J.: E-learning of IT security threats: a game prototype for children. In: De Decker, B., Dittmann, J., Kraetzer, C., Vielhauer, C. (eds.) CMS 2013. LNCS, vol. 8099, pp. 162–172. Springer, Heidelberg (2013). https://doi.org/10.1007/978-3-642-40779-6_14
Gelman, S.A., Martinez, M., Davidson, N.S., Noles, N.S.: Developing digital privacy: children’s moral judgments concerning mobile GPS devices. Child Dev. 89(1), 17–26 (2018)
Holloway, D., Green, L., Livingstone, S.: Zero to eight: young children and their internet use (2013)
Ishikawa, A., Bollis, E., Avila, S.: Combating the Elsagate phenomenon: deep learning architectures for disturbing cartoons. arXiv preprint arXiv:1904.08910 (2019)
Johnson, J.: Global digital population as of October 2020. https://www.statista.com/statistics/617136/digital-population-worldwide/. Accessed 08 Jan 2021
Kearney, A.R., Kaplan, S.: Toward a methodology for the measurement of knowledge structures of ordinary people: the conceptual content cognitive map (3CM). Environ. Behav. 29(5), 579–617 (1997)
Krombholz, K., Busse, K., Pfeffer, K., Smith, M., von Zezschwitz, E.: “if https were secure, i wouldn’t need 2FA”-end user and administrator mental models of https. In: 2019 IEEE Symposium on Security and Privacy (S&P’19), pp. 246–263. IEEE (2019)
Kumar, P., Naik, S.M., Devkar, U.R., Chetty, M., Clegg, T.L., Vitak, J.: ‘No telling passcodes out because they’re private’ understanding children’s mental models of privacy and security online. In: Proceedings of the ACM on Human-Computer Interaction 1(CSCW), pp. 1–21 (2017)
Livingstone, S.: Children’s privacy online: experimenting with boundaries within and beyond the family (2006)
Mai, A., Pfeffer, K., Gusenbauer, M., Weippl, E., Krombholz, K.: User mental models of cryptocurrency systems-a grounded theory approach. In: Sixteenth Symposium on Usable Privacy and Security (SOUPS’ 20), pp. 341–358 (2020)
McReynolds, E., Hubbard, S., Lau, T., Saraf, A., Cakmak, M., Roesner, F.: Toys that listen: a study of parents, children, and internet-connected toys. In: Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems, pp. 5197–5207 (2017)
Oy, H.R.: Hello Ruby Books Series. http://www.helloruby.com/books. Accessed 12 Dec 2021
Papadamou, K., et al.: Disturbed Youtube for kids: characterizing and detecting inappropriate videos targeting young children. In: Proceedings of the International AAAI Conference on Web and Social Media, vol. 14, pp. 522–533 (2020)
Papastergiou, M.: Students’ mental models of the internet and their didactical exploitation in informatics education. Educ. Inf. Technol. 10(4), 341–360 (2005)
Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012)
Sharp, D.L., Bransford, J.D., Goldman, S.R., Risko, V.J., Kinzer, C.K., Vye, N.J.: Dynamic visual support for story comprehension and mental model building by young, at-risk children. Educ. Technol. Res. Dev. 43(4), 25–42 (1995). https://doi.org/10.1007/BF02300489
Thatcher, A., Greyling, M.: Mental models of the internet. Int. J. Ind. Ergon. 22(4–5), 299–305 (1998)
Vygotsky, L.S.: The Collected Works of LS Vygotsky: Problems of the Theory and History of Psychology, vol. 3. Springer, Heidelberg (1997)
Wolfe, M.: Childhood and privacy. In: Altman, I., Wohlwill, J.F. (eds.) Children and the Environment, pp. 175–222. Springer, Boston (1978). https://doi.org/10.1007/978-1-4684-3405-7_6
Yan, Z.: Age differences in children’s understanding of the complexity of the internet. J. Appl. Dev. Psychol. 26(4), 385–396 (2005)
Yan, Z.: What influences children’s and adolescents’ understanding of the complexity of the internet? Dev. Psychol. 42(3), 418 (2006)
Yan, Z.: Limited knowledge and limited resources: children’s and adolescents’ understanding of the internet. J. Appl. Dev. Psychol. 30(2), 103–115 (2009)
Zeng, E., Mare, S., Roesner, F.: End user security & privacy concerns with smart homes. In: Symposium on Usable Privacy and Security (SOUPS’17) (2017)
Zhang-Kennedy, L., Mekhail, C., Abdelaziz, Y., Chiasson, S.: From nosy little brothers to stranger-danger: children and parents’ perception of mobile threats. In: Proceedings of the The 15th International Conference on Interaction Design and Children, pp. 388–399 (2016)
Acknowledgments
This material is based upon work partially supported by the Industry-related Dissertation funding program. SBA Research (SBA-K1) is a COMET Centre within the framework of COMET - Competence Centers for Excellent Technologies Programme and funded by BMK, BMDW, and the province of Vienna. The programs are both managed by FFG.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
A Appendix
A Appendix
1.1 A.1 Pre-study Questionnaire
1. Age
2. Gender
3. Highest completed education
4. Do after-school care/grandparents or others look after your child regularly? If yes, how often?
5. Are you professionally involved with technical aspects of the Internet (IT related fields)?
6. How applicable are the following statements?
Never(1), Rarely(2), Sometimes(3), Often(4), Daily(5)
I use the following Internet services: [*only asked parents]
-
Social Media (Facebook, Xing, Instagram, etc.)
-
VOD (YouTube, Netflix, Amazon Prime Video, etc.)
-
Online Shopping (Amazon, ebay, willhaben, etc.)
-
Instant messaging (WhatsApp, Facebook Messanger, Viber, etc.)
-
Online video chat services (Skype, Facetime, etc.)
-
*Email
-
*Online banking
-
Games (just asked during the children’s interview)
7. I am concerned about my privacy and the security of my data when using any of the services listed above. [only asked parents explicitly]
Not at all(1)—I am very concerned (5)
8. How much do the following statements apply to you?
Does not apply(1)—Applies very much (5)
-
I am experienced with technical devices such as computers, smartphones and tablets.
-
I learned about the Internet in the course of my education.
-
I often ask other people for help when I have problems with my computer/smartphone/tablet.
-
I am often asked by other people for help when they have problems with their computer/smartphone/tablet.
1.2 A.2 Pictures for Scenarios
Rights and permissions
Copyright information
© 2022 The Author(s), under exclusive license to Springer Nature Switzerland AG
About this paper
Cite this paper
Mai, A., Guelmino, L., Pfeffer, K., Weippl, E., Krombholz, K. (2022). Mental Models of the Internet and Its Online Risks: Children and Their Parent(s). In: Moallem, A. (eds) HCI for Cybersecurity, Privacy and Trust. HCII 2022. Lecture Notes in Computer Science, vol 13333. Springer, Cham. https://doi.org/10.1007/978-3-031-05563-8_4
Download citation
DOI: https://doi.org/10.1007/978-3-031-05563-8_4
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-031-05562-1
Online ISBN: 978-3-031-05563-8
eBook Packages: Computer ScienceComputer Science (R0)