skip to main content
research-article

'No Telling Passcodes Out Because They're Private': Understanding Children's Mental Models of Privacy and Security Online

Published: 06 December 2017 Publication History

Abstract

Children under age 12 increasingly use Internet-connected devices to go online. And while Internet use exposes people to privacy and security risks, few studies examine how these children perceive and address such concerns. To fill this gap, we conducted a qualitative study of 18 U.S. families with children ages 5-11. We found that children recognized certain privacy and security components from the contextual integrity framework, but children ages 5-7 had gaps in their knowledge. Children developed some strategies to manage concerns but largely relied on parents for support. Parents primarily used passive strategies to mediate children's device use and largely deferred teaching children about these concerns to the future. We argue that helping children develop strong privacy and security practices at a young age will prepare them to manage their privacy and security as adolescents and adults. We offer recommendations to scaffold children's learning on privacy and security.

References

[1]
Louise Barkhuus. 2012. The Mismeasurement of Privacy: Using Contextual Integrity to Reconsider Privacy in HCI. Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, ACM, 367--376.
[2]
Lindsay Blackwell, Emma Gardiner, and Sarita Schoenebeck. 2016. Managing Expectations: Technology Tensions Among Parents and Teens. Proceedings of the 19th ACM Conference on Computer-Supported Cooperative Work & Social Computing, ACM, 1390--1401.
[3]
danah boyd. 2014. It's complicated: the social lives of networked teens. Yale University press, New Haven.
[4]
Tom Buchanan, Carina Paine, Adam N. Joinson, and Ulf-Dietrich Reips. 2007. Development of measures of online privacy concern and protection for use on the Internet. Journal of the American Society for Information Science and Technology 58, 2: 157--165.
[5]
Duanne Buhrmester and Karen Prager. 1995. Patterns and Functions of Self-Disclosure During Childhood and Adolescence. In K.J. Rotenberg, ed., Disclosure Processes in Children and Adolescents. Cambridge University Press, Cambridge, UK, 10--56.
[6]
L. J. Camp. 2009. Mental models of privacy and security. IEEE Technology and Society Magazine 28, 3: 37--46.
[7]
Seth Chaiklin. 2003. The Zone of Proximal Development in Vygotsky's Analysis of Learning and Instruction. In A. Kozulin, B. Gindis, V.S. Ageyev, and S.M. Miller, eds., Vygotsky's Educational Theory in Cultural Context. Cambridge University Press, Cambridge, UK, 65--82.
[8]
Malinda J. Colwell, Kimberly Corson, Anuradha Sastry, and Holly Wright. 2016. Secret keepers: children's theory of mind and their conception of secrecy. Early Child Development and Care 186, 3: 369--381.
[9]
Common Sense Media. 2013. Zero to Eight: Children's Media Use in America 2013. Common Sense Media, San Francisco, CA.
[10]
Lorrie Faith Cranor, Adam L. Durity, Abigail Marsh, and Blase Ur. 2014. Parents' and Teens' Perspectives on Privacy In a Technology-Filled World. SOUPS, 19--35.
[11]
Pavni Diwanji. 2017. "Be Internet Awesome": Helping kids make smart decisions online. Google. Retrieved July 9, 2017 from http://www.blog.google:443/topics/families/be-internet-awesome-helping-kids-make-smart-decisions-online/.
[12]
Andrea Düerager and Sonia Livingstone. 2012. How can parents support children's internet safety? London School of Economics, London, UK.
[13]
Serge Egelman and Eyal Peer. 2015. Scaling the Security Wall: Developing a Security Behavior Intentions Scale (SeBIS). Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems, ACM, 2873--2882.
[14]
Lesley-Anne Ey and C. Glenn Cupit. 2011. Exploring young children's understanding of risks associated with Internet usage and their concepts of management strategies. Journal of Early Childhood Research 9, 1: 53--65.
[15]
Family Online Safety Institute. Three Teachable Moments. Family Online Safety Institute, Washington, DC.
[16]
Federal Trade Commission. 2014. Net Cetera: Chatting with Kids About Being Online. U.S. Federal Trade Commission, Washington, DC.
[17]
Natt Garun. 2017. Amazon will soon refund up to $70 million of in-app purchases made by children. The Verge. Retrieved April 27, 2017 from http://www.theverge.com/2017/4/4/15183254/amazon-ends-appeal-refund-70-million-in-app-purchases.
[18]
Paulina Haduong, David Cruz, Leah Plunkett, and Urs Gasser. 2016. The Internet and You. Berkman Klein Center for Internet & Society, Cambridge, MA.
[19]
Alexis Hiniker, Sarita Y. Schoenebeck, and Julie A. Kientz. 2016. Not at the Dinner Table: Parents' and Children's Perspectives on Family Technology Rules. Proceedings of the 19th ACM Conference on Computer-Supported Cooperative Work & Social Computing, ACM, 1376--1389.
[20]
Alexis Hiniker, Hyewon Suh, Sabina Cao, and Julie A. Kientz. 2016. Screen Time Tantrums: How Families Manage Screen Media Experiences for Toddlers and Preschoolers. Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems, ACM, 648--660.
[21]
Donell Holloway, Lelia Green, and Sonia Livingstone. 2013. Zero to eight: young children and their internet use. London School of Economics, London.
[22]
Mat Honan. 2017. Meet Amazon's New Echo Show: Alexa Is Watching. BuzzFeed. Retrieved June 27, 2017 from https://www.buzzfeed.com/mathonan/meet-amazons-new-echo-show-alexa-is-watching.
[23]
Lori G. Irwin and Joy Johnson. 2005. Interviewing Young Children: Explicating Our Practices and Dilemmas. Qualitative Health Research 15, 6: 821--831.
[24]
P.N. Johnson-Laird, Vittorio Girotto, and Paolo Legrenzi. 1998. Mental models: a gentle guide for outsiders. Retrieved from http://musicweb.ucsd.edu/~sdubnov/Mu206/MentalModels.pdf
[25]
Amanda Lenhart. 2015. Teens, Social Media & Technology Overview 2015. Pew Research Center, Washington, DC.
[26]
Sonia Livingstone. 2006. Children's Privacy Online: Experimenting with Boundaries Within and Beyond the Family. In R. Kraut, M. Brynin, and S. Kiesler, eds., Computers, Phones, and the Internet: Domesticating Information Technology. Oxford University Press, New York, NY, 145--167.
[27]
Sonia Livingstone and Leslie Haddon. 2012. Theoretical framework for children's internet use. In S. Livingstone, L. Haddon, and A. Görzig, eds., Children, Risk and Safety on the Internet: Research and policy challenges in comparative perspective. Policy Press, Bristol, UK, 1--14.
[28]
Sonia Livingstone, Leslie Haddon, and Anke Görzig, eds. 2012. Children, risk and safety on the internet: research and policy challenges in comparative perspective. Policy Press, Bristol, UK.
[29]
Sonia Livingstone, Uwe Hasebrink, and Anke Görzig. 2012. Towards a general model of determinants of risk and safety. In S. Livingstone, L. Haddon, and A. Görzig, eds., Children, Risk and Safety on the Internet: Research and policy challenges in comparative perspective. Policy Press, Bristol, UK, 323--337.
[30]
Mary Madden, Sandra Cortesi, Urs Gasser, Amanda Lenhart, and Maeve Duggan. 2012. Parents, Teens, and Online Privacy. Pew Research Center, Washington, DC.
[31]
Abigail Marsh, Lorrie Faith Cranor, and Julie S. Downs. 2017. Experts' Views on Digital Parenting Strategies. Carnegie Mellon University, Pittsburgh, PA.
[32]
Melissa Mazmanian and Simone Lanette. 2017. "Okay, One More Episode": An Ethnography of Parenting in the Digital Age. Proceedings of the 2017 ACM Conference on Computer Supported Cooperative Work and Social Computing, ACM, 2273--2286.
[33]
Emily McReynolds, Sarah Hubbard, Timothy Lau, Aditya Saraf, Maya Cakmak, and Franziska Roesner. 2017. Toys that Listen: A Study of Parents, Children, and Internet-Connected Toys. Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems, ACM, forthcoming.
[34]
Megha Mohan and Kayleen Devlin. 2017. Fears over fake Bieber and Styles accounts. BBC News. Retrieved April 27, 2017 from http://www.bbc.com/news/blogs-trending-39670673.
[35]
Kathryn C. Montgomery. 2013. Protecting Children's Privacy Online: The Battle Continues. Human Rights 39, 3: 6.
[36]
Helen Nissenbaum. 2010. Privacy in Context: Technology, Policy, and the Integrity of Social Life. Stanford University Press, Stanford, CA.
[37]
G. S. O'Keeffe, K. Clarke-Pearson, and Council on Communications and Media. 2011. The Impact of Social Media on Children, Adolescents, and Families. Pediatrics 127, 4: 800--804.
[38]
Leysia Palen and Paul Dourish. 2003. Unpacking "Privacy" for a Networked World. Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, ACM, 129--136.
[39]
Jessica A. Pater, Andrew D. Miller, and Elizabeth D. Mynatt. 2015. This Digital Life: A Neighborhood-Based Study of Adolescents' Lives Online. Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems, ACM, 2305--2314.
[40]
Gabriela Pavarini, Debora de Hollanda Souza, and Carol Kozak Hawk. 2013. Parental Practices and Theory of Mind Development. Journal of Child and Family Studies 22, 6: 844--853.
[41]
PBS Kids. 2017. Frequently Asked Questions. Retrieved April 27, 2017 from http://pbskids.org/help/faq.html#good_username.
[42]
Sandra Petronio. 2002. Boundaries of privacy: dialectics of disclosure. State University of New York Press, Albany.
[43]
Chris Quintana, Brian J. Reiser, Elizabeth A. Davis, et al. 2004. A Scaffolding Design Framework for Software to Support Science Inquiry. Journal of the Learning Sciences 13, 3: 337--386.
[44]
Kate Raynes-Goldie and Matthew Allen. 2014. Gaming Privacy: a Canadian case study of a children's co-created privacy literacy game. Surveillance & Society 12, 3: 414--426.
[45]
Irving Seidman. 2013. Interviewing as Qualitative Research: A Guide for Researchers in Education & the Social Sciences. Teachers College Press, New York.
[46]
H. Jeff Smith, Tamara Dinev, and Heng Xu. 2011. Information Privacy Research: An Interdisciplinary Review. MIS Quarterly 35, 4: 980-A27.
[47]
Valerie Steeves, Trevor Milford, and Ashley Butts. 2010. Summary of Research on Youth Online Privacy. Office of the Privacy Commissioner of Canada, Ottawa, Canada.
[48]
Lev Vygotsky. 1987. Zone of Proximal Development. Mind in society: The development of higher psychological processes 5291: 157.
[49]
Rick Wash. 2010. Folk Models of Home Computer Security. In Proceedings of the Symposium on Usable Privacy and Security (SOUPS).
[50]
James V Wertsch. 1984. The Zone of Proximal Development: Some Conceptual Issues. New Directions for Child and Adolescent Development 1984, 23: 7--18.
[51]
Heinz Wimmer and Josef Perner. 1983. Beliefs about beliefs: Representation and constraining function of wrong beliefs in young children's understanding of deception. Cognition 13, 1: 103--128.
[52]
Pamela Wisniewski, Haiyan Jia, Heng Xu, Mary Beth Rosson, and John M. Carroll. 2015. "Preventative" vs. "Reactive": How Parental Mediation Influences Teens' Social Media Privacy Behaviors. Proceedings of the 18th ACM Conference on Computer Supported Cooperative Work & Social Computing, ACM, 302--316.
[53]
Pamela Wisniewski, Heng Xu, Mary Beth Rosson, and John M. Carroll. 2017. Parents Just Don't Understand: Why Teens Don't Talk to Parents About Their Online Risk Experiences. Proceedings of the 2017 ACM Conference on Computer Supported Cooperative Work and Social Computing, ACM, 523--540.
[54]
Maxine Wolfe. 1978. Childhood and Privacy. In I. Altman and J.F. Wohlwill, eds., Children and the Environment. Plenum Press, New York, NY, 175--222.
[55]
Yaxing Yao, Davide Lo Re, and Yang Wang. 2017. Folk Models of Online Behavioral Advertising. Proceedings of the 2017 ACM Conference on Computer Supported Cooperative Work and Social Computing, ACM, 1957--1969.
[56]
Leah Zhang-Kennedy, Christine Mekhail, Yomna Abdelaziz, and Sonia Chiasson. 2016. From Nosy Little Brothers to Stranger-Danger: Children and Parents' Perception of Mobile Threats. Proceedings of the 15th International Conference on Interaction Design and Children, ACM, 388--399.

Cited By

View all
  • (2025)Let us make robots “Think in child!”: How children conceptualize fairness, inclusion, and privacy with social robotsInternational Journal of Child-Computer Interaction10.1016/j.ijcci.2024.10070643(100706)Online publication date: Mar-2025
  • (2024)Online Privacy, Young People, and Datafication: Different Perceptions About Online Privacy Across Antigua & Barbuda, Australia, Ghana, and SloveniaSocial Media + Society10.1177/2056305124129804210:4Online publication date: 11-Nov-2024
  • (2024)Growing Up With Dark Patterns: How Children Perceive Malicious User Interface DesignsProceedings of the 13th Nordic Conference on Human-Computer Interaction10.1145/3679318.3685358(1-17)Online publication date: 13-Oct-2024
  • Show More Cited By

Index Terms

  1. 'No Telling Passcodes Out Because They're Private': Understanding Children's Mental Models of Privacy and Security Online

      Recommendations

      Comments

      Information & Contributors

      Information

      Published In

      cover image Proceedings of the ACM on Human-Computer Interaction
      Proceedings of the ACM on Human-Computer Interaction  Volume 1, Issue CSCW
      November 2017
      2095 pages
      EISSN:2573-0142
      DOI:10.1145/3171581
      Issue’s Table of Contents
      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      Published: 06 December 2017
      Published in PACMHCI Volume 1, Issue CSCW

      Permissions

      Request permissions for this article.

      Check for updates

      Author Tags

      1. contextual integrity
      2. elementary school-aged children
      3. internet safety
      4. internet-connected devices
      5. online risks
      6. parents
      7. privacy and security online

      Qualifiers

      • Research-article

      Funding Sources

      • Google Faculty Research Award

      Contributors

      Other Metrics

      Bibliometrics & Citations

      Bibliometrics

      Article Metrics

      • Downloads (Last 12 months)363
      • Downloads (Last 6 weeks)28
      Reflects downloads up to 03 Mar 2025

      Other Metrics

      Citations

      Cited By

      View all
      • (2025)Let us make robots “Think in child!”: How children conceptualize fairness, inclusion, and privacy with social robotsInternational Journal of Child-Computer Interaction10.1016/j.ijcci.2024.10070643(100706)Online publication date: Mar-2025
      • (2024)Online Privacy, Young People, and Datafication: Different Perceptions About Online Privacy Across Antigua & Barbuda, Australia, Ghana, and SloveniaSocial Media + Society10.1177/2056305124129804210:4Online publication date: 11-Nov-2024
      • (2024)Growing Up With Dark Patterns: How Children Perceive Malicious User Interface DesignsProceedings of the 13th Nordic Conference on Human-Computer Interaction10.1145/3679318.3685358(1-17)Online publication date: 13-Oct-2024
      • (2024)A Roadmap for Applying the Contextual Integrity Framework in Qualitative Privacy ResearchProceedings of the ACM on Human-Computer Interaction10.1145/36537108:CSCW1(1-29)Online publication date: 26-Apr-2024
      • (2024)DiffAudit: Auditing Privacy Practices of Online Services for Children and AdolescentsProceedings of the 2024 ACM on Internet Measurement Conference10.1145/3646547.3688416(488-504)Online publication date: 4-Nov-2024
      • (2024)Labeling in the Dark: Exploring Content Creators’ and Consumers’ Experiences with Content Classification for Child Safety on YouTubeProceedings of the 2024 ACM Designing Interactive Systems Conference10.1145/3643834.3661565(1518-1532)Online publication date: 1-Jul-2024
      • (2024)Evaluating the Use of Hypothetical 'Would You Rather' Scenarios to Discuss Privacy and Security Concepts with ChildrenProceedings of the ACM on Human-Computer Interaction10.1145/36410048:CSCW1(1-32)Online publication date: 26-Apr-2024
      • (2024)On Being an Expert: Habitus as a Lens for Understanding Privacy ExpertiseProceedings of the ACM on Human-Computer Interaction10.1145/36373798:CSCW1(1-25)Online publication date: 26-Apr-2024
      • (2024)"Why is Everything in the Cloud?": Co-Designing Visual Cues Representing Data Processes with ChildrenProceedings of the 23rd Annual ACM Interaction Design and Children Conference10.1145/3628516.3655819(517-532)Online publication date: 17-Jun-2024
      • (2024)Creating Personas of Parents of Young Children Based on Balancing PrioritiesProceedings of the 23rd Annual ACM Interaction Design and Children Conference10.1145/3628516.3655790(105-118)Online publication date: 17-Jun-2024
      • Show More Cited By

      View Options

      Login options

      Full Access

      View options

      PDF

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader

      Figures

      Tables

      Media

      Share

      Share

      Share this Publication link

      Share on social media