skip to main content
10.1145/3479162.3479180acmotherconferencesArticle/Chapter ViewAbstractPublication PagesicccmConference Proceedingsconference-collections
research-article

Children's Behavior on the Internet: Conceptualizing the Synergy of Privacy and Information Disclosure

Published:28 October 2021Publication History

ABSTRACT

Children's behavior on the Internet and their information disclosure and privacy are essential topics in academic research and practice. The main focus of this study assesses current research concerning children's online behavior related to privacy and information disclosure and analyzes the extant studies. Furthermore, the study sheds light on the emergence and present state of these concepts through a thorough analysis and classification of papers in this domain from reputable researches obtained from the literature. Thus, this study establishes a framework for categorizing research, summarizing significant findings, and highlights research gaps and future opportunities concerning children's online behaviors and activities.

References

  1. S. Livingstone and D. R. Brake, "On the rapid rise of social networking sites: New findings and policy implications," Children & Society, vol. 24, no. 1, pp. 75-83, 2010.Google ScholarGoogle ScholarCross RefCross Ref
  2. J. Y. Kim, J. S. Lee, and S. Oh, "A path model of school violence perpetration: introducing online game addiction as a new risk factor," Journal of Interpersonal Violence, vol. 32, no. 21, pp. 3205-3225, 2017.Google ScholarGoogle ScholarCross RefCross Ref
  3. M. O. Lwin, A. D. Miyazaki, A. J. Stanaland, and E. Lee, "Online usage motive and information disclosure for preteen children," Young Consumers, vol. 13, no. 4, pp. 345-356, 2012.Google ScholarGoogle ScholarCross RefCross Ref
  4. Alkhalifah and J. D'Ambra, "Identity Management Systems Research: Frameworks, Emergemce, and Future Opportunities," in ECIS, 2015.Google ScholarGoogle Scholar
  5. H. Venter, M. Eloff, L. Labuschagne, J. Eloff, and R. von Solms, New Approaches for Security, Privacy and Trust in Complex Environments: Proceedings of the IFIP TC 11 22nd International Information Security Conference (SEC 2007), 14-16 May 2007, Sandton, South Africa. Springer, 2007.Google ScholarGoogle Scholar
  6. E. Aghasian, S. Garg, L. Gao, S. Yu, and J. Montgomery, "Scoring users’ privacy disclosure across multiple online social networks," IEEE Access, vol. 5, pp. 13118-13130, 2017.Google ScholarGoogle ScholarCross RefCross Ref
  7. K. Li, Z. Lin, and X. Wang, "An empirical analysis of users’ privacy disclosure behaviors on social network sites," Information & Management, vol. 52, no. 7, pp. 882-891, 2015.Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. W. Shin and N. Ismail, "Exploring the role of parents and peers in young adolescents' risk taking on social networking sites," Cyberpsychology, Behavior, and Social Networking, vol. 17, no. 9, pp. 578-583, 2014.Google ScholarGoogle ScholarCross RefCross Ref
  9. T. Buchanan, C. Paine, A. N. Joinson, and U. D. Reips, "Development of measures of online privacy concern and protection for use on the Internet," Journal of the American Society for Information Science and technology, vol. 58, no. 2, pp. 157-165, 2007.Google ScholarGoogle ScholarCross RefCross Ref
  10. Z. De Souza and G. N. Dick, "Information disclosure on MySpace–the what, the why and the implications," Pastoral Care in Education, vol. 26, no. 3, pp. 143-157, 2008.Google ScholarGoogle ScholarCross RefCross Ref
  11. N. K. Lankton, D. H. McKnight, and J. F. Tripp, "Facebook privacy management strategies: A cluster analysis of user privacy behaviors," Computers in Human Behavior, vol. 76, pp. 149-163, 2017.Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. C. S. Silva, G. A. Barbosa, I. S. Silva, T. S. Silva, F. Mourão, and F. Coutinho, "Privacy for Children and Teenagers on Social Networks from a Usability Perspective: A Case Study on Facebook," in Proceedings of the 2017 ACM on Web Science Conference, 2017, pp. 63-71: ACM.Google ScholarGoogle Scholar
  13. K. Li, X. Wang, K. Li, and J. Che, "Information privacy disclosure on social network sites: An empirical investigation from social exchange perspective," Nankai Business Review International, vol. 7, no. 3, pp. 282-300, 2016.Google ScholarGoogle ScholarCross RefCross Ref
  14. X. Zhang, L. Zhang, and C. Gu, "Security Risk Estimation of Social Network Privacy Issue," in Proceedings of the 2017 the 7th International Conference on Communication and Network Security, 2017, pp. 81-85: ACM.Google ScholarGoogle Scholar
  15. M. Soryani and B. Minaei, "Social networks research aspects: A vast and fast survey focused on the issue of privacy in social network sites," arXiv preprint arXiv:1201.3745, 2012.Google ScholarGoogle Scholar
  16. F. Xu, K. Michael, and X. Chen, "Factors affecting privacy disclosure on social network sites: an integrated model," Electronic Commerce Research, vol. 13, no. 2, pp. 151-168, 2013.Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. Y. Jordaan and G. Van Heerden, "Online privacy-related predictors of Facebook usage intensity," Computers in Human Behavior, vol. 70, pp. 90-96, 2017.Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. Z. De Souza and G. N. Dick, "Disclosure of information by children in social networking—Not just a case of “you show me yours and I'll show you mine”," International Journal of Information Management, vol. 29, no. 4, pp. 255-261, 2009.Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. N. Joinson, U.-D. Reips, T. Buchanan, and C. B. P. Schofield, "Privacy, trust, and self-disclosure online," Human–Computer Interaction, vol. 25, no. 1, pp. 1-24, 2010.Google ScholarGoogle Scholar
  20. H. Krasnova, S. Spiekermann, K. Koroleva, and T. Hildebrand, "Online social networks: Why we disclose," Journal of Information Technology, vol. 25, no. 2, pp. 109-125, 2010.Google ScholarGoogle ScholarCross RefCross Ref
  21. F. Stutzman, R. Capra, and J. Thompson, "Factors mediating disclosure in social network sites," Computers in Human Behavior, vol. 27, no. 1, pp. 590-598, 2011.Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. J. Bryce and J. Fraser, "The role of disclosure of personal information in the evaluation of risk and trust in young peoples’ online interactions," Computers in Human Behavior, vol. 30, pp. 299-306, 2014.Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. F. Annansingh and T. Veli, "An investigation into risks awareness and e-safety needs of children on the internet: a study of Devon, UK," Interactive Technology and Smart Education, vol. 13, no. 2, pp. 147-165, 2016.Google ScholarGoogle ScholarCross RefCross Ref
  24. S. Bannon, T. McGlynn, K. McKenzie, and E. Quayle, "The Internet and young people with additional support needs (ASN): Risk and safety," Computers in Human Behavior, vol. 53, pp. 495-503, 2015.Google ScholarGoogle ScholarDigital LibraryDigital Library
  25. J. Bremer, "The internet and children: advantages and disadvantages," Child and Adolescent Psychiatric Clinics, vol. 14, no. 3, pp. 405-428, 2005.Google ScholarGoogle ScholarCross RefCross Ref
  26. J. Wojniak and M. Majorek, "Children in internet space–the European Union policies on children's safety online," in SHS Web of Conferences, 2016, vol. 26, p. 01048: EDP Sciences.Google ScholarGoogle Scholar
  27. P. Li, T. Li, H. Ye, J. Li, X. Chen, and Y. Xiang, "Privacy-preserving machine learning with multiple data providers," Future Generation Computer Systems, 2018.Google ScholarGoogle Scholar
  28. N. Papernot, P. McDaniel, A. Sinha, and M. Wellman, "Towards the science of security and privacy in machine learning," arXiv preprint arXiv:1611.03814, 2016.Google ScholarGoogle Scholar
  29. Z. Ji, Z. C. Lipton, and C. Elkan, "Differential privacy and machine learning: a survey and review," arXiv preprint arXiv:1412.7584, 2014.Google ScholarGoogle Scholar

Index Terms

  1. Children's Behavior on the Internet: Conceptualizing the Synergy of Privacy and Information Disclosure
          Index terms have been assigned to the content through auto-classification.

          Recommendations

          Comments

          Login options

          Check if you have access through your login credentials or your institution to get full access on this article.

          Sign in
          • Published in

            cover image ACM Other conferences
            ICCCM '21: Proceedings of the 9th International Conference on Computer and Communications Management
            July 2021
            223 pages
            ISBN:9781450390071
            DOI:10.1145/3479162

            Copyright © 2021 ACM

            Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

            Publisher

            Association for Computing Machinery

            New York, NY, United States

            Publication History

            • Published: 28 October 2021

            Permissions

            Request permissions about this article.

            Request Permissions

            Check for updates

            Qualifiers

            • research-article
            • Research
            • Refereed limited

          PDF Format

          View or Download as a PDF file.

          PDF

          eReader

          View online with eReader.

          eReader

          HTML Format

          View this article in HTML Format .

          View HTML Format