skip to main content
research-article
Open access

Child Safety in the Smart Home: Parents' Perceptions, Needs, and Mitigation Strategies

Published: 18 October 2021 Publication History

Abstract

Concerns about child physical and digital safety are emerging with families' adoption of smart home technologies such as robot vacuums and smart speakers. To better understand parents' definitions and perceptions of child safety regarding smart home technologies, we interviewed 23 parents who are smart home adopters. We contribute insights into parents' perceptions of the physical and digital safety risks smart home technologies pose to children, and how such perceptions formed and changed across three phases. In acquiring smart home devices, parents already considered whether the device could cause physical harm to their children or pose privacy and security risks. Once children become active users of smart home technologies, parents however reported encountering unanticipated physical safety risks and digital safety issues (e.g., exposure to unsuitable content) that required their mitigation strategies. As their children grow up, parents further expressed the need to shift attention from physical safety to digital safety. Parents' safety perceptions influence how they involve children in smart home interactions and implement mitigation strategies, such as restricting access to certain devices and using parental controls. We identify six factors that shape parents' perception and evaluation of smart home safety risks to children, including parenting style, parents' tech-savviness, parents' trust in tech companies, children's age and developmental differences, news media, and device characteristics. We provide design and policy recommendations to better protect children's safety in the smart home environment.

References

[1]
Frances K Aldrich. 2003. Smart homes: past, present and future. In Inside the smart home. Springer, UK, 17--39. https://doi.org/10.1007/1--85233--854--7_2
[2]
Tawfiq Ammari, Sarita Schoenebeck, and Daniel Romero. 2019. Self-declared throwaway accounts on Reddit: How platform affordances and shared norms enable parenting disclosure and support. Proceedings of the ACM on Human-Computer Interaction 3, CSCW (2019), 135:1--135:30. https://doi.org/10.1145/3359237
[3]
Tawfiq Ammari, Sarita Schoenebeck, and Daniel M Romero. 2018. Pseudonymous parents: Comparing parenting roles and identities on the Mommit and Daddit subreddits. In ACM Conference on Human Factors in Computing Systems (CHI). Association for Computing Machinery, 489:1--489:13. https://doi.org/10.1145/3173574.3174063
[4]
Alan R Andreasen. 1977. A taxonomy of consumer satisfaction/dissatisfaction measures. Journal of Consumer Affairs 11, 2 (1977), 11--24. https://doi.org/10.1111/j.1745--6606.1977.tb00612.x
[5]
Brooke Auxier, Lee Rainie, Monica Anderson, Andrew Perrin, Madhu Kumar, and Erica Turner. 2019. Americans and privacy: Concerned, confused and feeling lack of control over their personal information. Technical Report. Pew Research Center. https://www.pewresearch.org/internet/wp-content/uploads/sites/9/2019/11/Pew-Research-Center_PI_2019.11.15_Privacy_FINAL.pdf
[6]
Nazmiye Balta-Ozkan, Rosemary Davidson, Martha Bicket, and Lorraine Whitmarsh. 2013. Social barriers to the adoption of smart homes. Energy Policy 63 (2013), 363--374. https://doi.org/10.1016/j.enpol.2013.08.043
[7]
Andrea Bellucci, Giulio Jacucci, Veera Kotkavuori, Bari? Serim, Imtiaj Ahmed, and Salu Ylirisku. 2015. Extreme Co-design: Prototyping with and by the User for Appropriation of Web-connected Tags. In International Symposium on End User Development. Springer, 109--124. https://doi.org/10.1007/978--3--319--18425--8_8
[8]
Erin Beneteau, Ashley Boone, Yuxing Wu, Julie A Kientz, Jason Yip, and Alexis Hiniker. 2020. Parenting with Alexa: exploring the introduction of smart speakers on family dynamics. In ACM Conference on Human Factors in Computing Systems (CHI). Association for Computing Machinery, 217:1--217:13. https://doi.org/10.1145/3313831.3376344
[9]
Erin Beneteau, Olivia K Richards, Mingrui Zhang, Julie A Kientz, Jason Yip, and Alexis Hiniker. 2019. Communication breakdowns between families and Alexa. In ACM Conference on Human Factors in Computing Systems (CHI). Association for Computing Machinery, 243:1--243:13. https://doi.org/10.1145/3290605.3300473
[10]
Danah Boyd. 2014. It's complicated: The social lives of networked teens. Yale University Press.
[11]
J Jo?ko Brakus, Bernd H Schmitt, and Lia Zarantonello. 2009. Brand experience: what is it? How is it measured? Does it affect loyalty? Journal of Marketing 73, 3 (2009), 52--68. https://doi.org/10.1509/jmkg.73.3.052
[12]
Ian Carlos Campbell. 2020. Apple will require apps to add privacy 'nutrition labels' starting December 8th. https://www.theverge.com/2020/11/5/21551926/apple-privacy-developers-nutrition-labels-app-store-ios-14
[13]
Jilin Chen, Gary Hsieh, Jalal U Mahmud, and Jeffrey Nichols. 2014. Understanding individuals' personal values from social media word use. In ACM Conference on Computer Supported Cooperative Work & Social Computing (CSCW). Association for Computing Machinery, 405--414. https://doi.org/10.1145/2531602.2531608
[14]
Eun Kyoung Choe, Sunny Consolvo, Jaeyeon Jung, Beverly Harrison, Shwetak N Patel, and Julie A Kientz. 2012. Investigating receptiveness to sensing and inference in the home using sensor proxies. In ACM Conference on Ubiquitous Computing (UbiComp). Association for Computing Machinery, 61--70. https://doi.org/10.1145/2370216.2370226
[15]
United States Consumer Product Safety Commission. 2021. Children's Products. https://www.cpsc.gov/Business--Manufacturing/Business-Education/childrens-products
[16]
Diane J Cook. 2012. How smart is your home? Science 335, 6076 (2012), 1579--1581. https://doi.org/10.1126/science.1217640
[17]
William A Corsaro. 2017. The sociology of childhood. Sage publications.
[18]
Lorrie Faith Cranor, Adam L Durity, Abigail Marsh, and Blase Ur. 2014. Parents' and teens' perspectives on privacy in a technology-filled world. In Symposium On Usable Privacy and Security (SOUPS). USENIX Association, 19--35. https://www.usenix.org/system/files/conference/soups2014/soups14-paper-cranor.pdf
[19]
Sarah Darby. 2010. Smart metering: what potential for householder engagement? Building research & information 38, 5 (2010), 442--457. https://doi.org/10.1080/09613218.2010.492660
[20]
Sauvik Das, Laura A Dabbish, and Jason I Hong. 2019. A typology of perceived triggers for end-user security and privacy behaviors. In Symposium on Usable Privacy and Security (SOUPS). USENIX Association, 97--115. https://www.usenix.org/system/files/soups2019-das.pdf
[21]
Sauvik Das, Joanne Lo, Laura Dabbish, and Jason I Hong. 2018. Breaking! A Typology of Security and Privacy News and How It's Shared. In ACM Conference on Human Factors in Computing Systems (CHI). Association for Computing Machinery, 1:1--1:12. https://doi.org/10.1145/3173574.3173575
[22]
Scott Davidoff, Min Kyung Lee, Charles Yiu, John Zimmerman, and Anind K Dey. 2006. Principles of smart home control. In ACM International Conference on Ubiquitous Computing (UbiComp). Association for Computing Machinery, 19--34. https://doi.org/10.1007/11853565_2
[23]
J Delgado, ME Ramirez-Cardich, Robert H Gilman, R Lavarello, N Dahodwala, A Bazan, V Rodriguez, RI Cama, M Tovar, and A Lescano. 2002. Risk factors for burns in children: crowding, poverty, and poor maternal education. Injury Prevention 8, 1 (2002), 38--41. https://doi.org/10.1136/ip.8.1.38
[24]
Tamara Denning, Tadayoshi Kohno, and Henry M Levy. 2013. Computer security and the modern home. Commun. ACM 56, 1 (2013), 94--103. https://doi.org/10.1145/2398356.2398377
[25]
Robert A Dershewitz and Edward R Christophersen. 1984. Childhood household safety: An overview. American Journal of Diseases of Children 138, 1 (1984), 85--88. https://doi.org/10.1001/archpedi.1984.02140390073022
[26]
Nils Ehrenberg and Turkka Keinonen. 2021. The Technology Is Enemy for Me at the Moment: How Smart Home Technologies Assert Control Beyond Intent. In ACM Conference on Human Factors in Computing Systems (CHI). Association for Computing Machinery, 407:1--407:11. https://doi.org/10.1145/3411764.3445058
[27]
Pardis Emami-Naeini, Yuvraj Agarwal, Lorrie Faith Cranor, and Hanan Hibshi. 2020. Ask the Experts: What Should Be on an IoT Privacy and Security Label?. In Symposium on Security and Privacy. IEEE, 447--464. https://doi.org/10.1109/SP40000.2020.0004
[28]
Pardis Emami-Naeini, Henry Dixon, Yuvraj Agarwal, and Lorrie Faith Cranor. 2019. Exploring how privacy and security factor into IoT device purchase behavior. In ACM Conference on Human Factors in Computing Systems (CHI). Association for Computing Machinery, 534:1--534:12. https://doi.org/10.1145/3290605.3300764
[29]
Lee B Erickson, Pamela Wisniewski, Heng Xu, John M Carroll, Mary Beth Rosson, and Daniel F Perkins. 2016. The boundaries between: Parental involvement in a teen's online world. Journal of the Association for Information Science and Technology 67, 6 (2016), 1384--1403. https://doi.org/10.1002/asi.23450
[30]
Robert J Fisher. 1993. Social desirability bias and the validity of indirect questioning. Journal of Consumer Research 20, 2 (1993), 303--315. https://doi.org/10.1086/209351
[31]
Internet Safety Technical Task Force. 2009. Enhancing Child Safety and Online Technologies. Technical Report. The Berkman Center for Internet & Society, Harvard University. https://cyber.harvard.edu/sites/cyber.law.harvard.edu/files/ISTTF_Final_Report.pdf
[32]
Thomas R Frieden. 2010. A framework for public health action: the health impact pyramid. American journal of public health 100, 4 (2010), 590--595.
[33]
Christine Geeng and Franziska Roesner. 2019. Who's In Control? Interactions In Multi-User Smart Homes. In ACM Conference on Human Factors in Computing Systems (CHI). Association for Computing Machinery, 268:1--268:13. https://doi.org/10.1145/3290605.3300498
[34]
Samantha Grossman. 2015. Here's a Cute Baby Riding a Roomba Like a Total Pro. https://time.com/3889326/baby-riding-roomba-video/
[35]
Anita G�rling and Tommy G�rling. 1995. Mothers' anticipation and prevention of unintentional injury to young children in the home. Journal of Pediatric Psychology 20, 1 (1995), 23--36. https://doi.org/10.1093/jpepsy/20.1.23
[36]
Tom Hargreaves, Charlie Wilson, and Richard Hauxwell-Baldwin. 2018. Learning to live in a smart home. Building Research & Information 46, 1 (2018), 127--139. https://doi.org/10.1080/09613218.2017.1286882
[37]
Patrick CK Hung, Farkhund Iqbal, Shih-Chia Huang, Mohammed Melaisi, and Kevin Pang. 2016. A glance of child's play privacy in smart toys. In International Conference on Cloud Computing and Security. Springer, 217--231. https://doi.org/10.1007/978--3--319--48674--1_20
[38]
Timo Jakobi, Corinna Ogonowski, Nico Castelli, Gunnar Stevens, and Volker Wulf. 2017. The catch (es) with smart home: Experiences of a living lab field study. In ACM Conference on Human Factors in Computing Systems (CHI). Association for Computing Machinery, 1620--1633. https://doi.org/10.1145/3025453.3025799
[39]
William Jang, Adil Chhabra, and Aarathi Prasad. 2017. Enabling multi-user controls in smart home devices. In ACM Workshop on Internet of Things Security and Privacy. Association for Computing Machinery, 49--54. https://doi.org/10.1145/3139937.3139941
[40]
Ruogu Kang, Laura Dabbish, Nathaniel Fruchter, and Sara Kiesler. 2015. "My Data Just Goes Everywhere": User Mental Models of the Internet and Implications for Privacy and Security. In Symposium On Usable Privacy and Security (SOUPS). USENIX Association, 39--52. https://www.usenix.org/system/files/conference/soups2015/soups15-paper-kang.pdf
[41]
Evangelos Karapanos, John Zimmerman, Jodi Forlizzi, and Jean-Bernard Martens. 2009. User experience over time: an initial framework. In ACM Conference on Human Factors in Computing Systems (CHI). Association for Computing Machinery, 729--738. https://doi.org/10.1145/1518701.1518814
[42]
Patrick Gage Kelley, Joanna Bresee, Lorrie Faith Cranor, and Robert W Reeder. 2009. A "nutrition label" for privacy. In Symposium on Usable Privacy and Security (SOUPS). Association for Computing Machinery, 4:1--4:12. https://doi.org/10.1145/1572532.1572538
[43]
Patrick Gage Kelley, Lucian Cesca, Joanna Bresee, and Lorrie Faith Cranor. 2010. Standardizing privacy notices: an online study of the nutrition label approach. In ACM Conference on Human Factors in Computing Systems (CHI). Association for Computing Machinery, 1573--1582. https://doi.org/10.1145/1753326.1753561
[44]
Denise Kendrick, Ben Young, Amanda J Mason-Jones, Nohaid Ilyas, Felix A Achana, Nicola J Cooper, Stephanie J Hubbard, Alex J Sutton, Sherie Smith, Persephone Wynn, et al. 2013. Home safety education and provision of safety equipment for injury prevention. Evidence-based child health: a Cochrane review journal 8, 3 (2013), 761--939. https://doi.org/10.1002/ebch.1911
[45]
Nikos Komninos, Eleni Philippou, and Andreas Pitsillides. 2014. Survey in smart grid and smart home security: Issues, challenges and countermeasures. IEEE Communications Surveys & Tutorials 16, 4 (2014), 1933--1954. https://doi.org/10.1109/COMST.2014.2320093
[46]
Vinay Koshy, Joon Sung Sung Park, Ti-Chung Cheng, and Karrie Karahalios. 2021. "We Just Use What They Give Us": Understanding Passenger User Perspectives in Smart Homes. In ACM Conference on Human Factors in Computing Systems (CHI). Association for Computing Machinery, 41:1--41:14. https://doi.org/10.1145/3411764.3445598
[47]
Tiiu Koskela and Kaisa V��n�nen-Vainio-Mattila. 2004. Evolution towards smart home environments: empirical evaluation of three user interfaces. Personal and Ubiquitous Computing 8, 3--4 (2004), 234--240. https://doi.org/10.1007/s00779-004-0283-x
[48]
Jennie Jacobs Kronenfeld, Mark Reiser, Deborah C Glik, Carlos Alatorre, and Kirby Jackson. 1997. Safety behaviors of mothers of young children: Impact of cognitive, stress and background factors. Health 1, 2 (1997), 205--225. https://doi.org/10.1177/136345939700100205
[49]
Priya Kumar, Shalmali Milind Naik, Utkarsha Ramesh Devkar, Marshini Chetty, Tamara L Clegg, and Jessica Vitak. 2017. 'No Telling Passcodes Out Because They're Private': Understanding Children's Mental Models of Privacy and Security Online. Proceedings of the ACM on Human-Computer Interaction 1, CSCW (2017), 64:1--64:21. https://doi.org/10.1145/3134699
[50]
Frederick S Lane. 2012. Cybertraps for the Young. NTI Upstream.
[51]
Josephine Lau, Benjamin Zimmerman, and Florian Schaub. 2018. Alexa, are you listening? privacy perceptions, concerns and privacy-seeking behaviors with smart speakers. Proceedings of the ACM on Human-Computer Interaction 2, CSCW (2018), 102:1--102:31. https://doi.org/10.1145/3274371
[52]
John C LeBlanc, I Barry Pless, W James King, Harry Bawden, Anne-Claude Bernard-Bonnin, Terry Klassen, and Milton Tenenbein. 2006. Home safety measures and the risk of unintentional injury among young children: a multicentre case--control study. CMAJ 175, 8 (2006), 883--887.
[53]
Simon CR Lewis. 2011. Energy in the smart home. In The connected home: The future of domestic life. Springer, 281--300. https://doi.org/10.1007/978-0--85729--476-0_14
[54]
Sonia Livingstone, Leslie Haddon, Anke G�rzig, and Kjartan �lafsson. 2011. Risks and safety on the internet: The perspective of European children. Technical Report. EU Kids Online Network. http://eprints.lse.ac.uk/33731/1/Risks%20and%20safety%20on%20the%20internet%28lsero%29.pdf
[55]
Sonia Livingstone, Giovanna Mascheroni, Michael Dreier, Stephane Chaudron, and Kaat Lagae. 2015. How parents of young children manage digital devices at home: The role of income, education and parental style. Technical Report. http://eprints.lse.ac.uk/63378/
[56]
Sonia Livingstone, Kjartan �lafsson, Ellen J Helsper, Francisco Lupi��ez-Villanueva, Giuseppe A Veltri, and Frans Folkvord. 2017. Maximizing opportunities and minimizing risks for children online: The role of digital skills in emerging strategies of parental mediation. Journal of Communication 67, 1 (2017), 82--105. https://doi.org/10.1111/jcom.12277
[57]
Sonia Livingstone, Mariya Stoilova, and Rishita Nandagiri. 2019. Children's data and privacy online: growing up in a digital age: an evidence review. Technical Report. London School of Economics and Political Science. http://eprints.lse.ac.uk/101283/1/Livingstone_childrens_data_and_privacy_online_evidence_review_published.pdf
[58]
Nathan Malkin, Joe Deatrick, Allen Tong, Primal Wijesekera, Serge Egelman, and David Wagner. 2019. Privacy attitudes of smart speaker users. Proceedings on Privacy Enhancing Technologies 2019, 4 (2019), 250--271. https://doi.org/10.2478/popets-2019-0068
[59]
Adam P Matheny Jr. 1986. Injuries among toddlers: Contributions from child, mother, and family. Journal of Pediatric Psychology 11, 2 (1986), 163--176. https://doi.org/10.1093/jpepsy/11.2.163
[60]
Christian F Mauro and Yvette R Harris. 2000. The influence of maternal child-rearing attitudes and teaching behaviors on preschoolers' delay of gratification. The Journal of Genetic Psychology 161, 3 (2000), 292--306. https://doi.org/10.1080/00221320009596712
[61]
Emily McReynolds, Sarah Hubbard, Timothy Lau, Aditya Saraf, Maya Cakmak, and Franziska Roesner. 2017. Toys that listen: A study of parents, children, and internet-connected toys. In ACM Conference on Human Factors in Computing Systems (CHI). Association for Computing Machinery, 5197--5207. https://doi.org/10.1145/3025453.3025735
[62]
Charles Mock, Carlos Arreola-Risa, Rodolfo Trevino-Perez, Victoria Almazan-Saavedra, Jaime E Zozaya-Paz, Reynaldo Gonzalez-Solis, Kate Simpson, Laura Rodriguez-Romo, and Martin H Hernandez-Torre. 2003. Injury prevention counselling to improve safety practices by parents in Mexico. Bulletin of the World Health Organization 81 (2003), 591--598. https://www.scielosp.org/pdf/bwho/2003.v81n8/591--598/en
[63]
Barbara A Morrongiello and M Corbett. 2006. The parent supervision attributes profile questionnaire: a measure of supervision relevant to children's risk of unintentional injury. Injury Prevention 12, 1 (2006), 19--23. https://doi.org/10.1136/ip.2005.008862
[64]
Barbara A Morrongiello, Michael Corbett, Jennifer Lasenby, Natalie Johnston, and Meghan McCourt. 2006. Factors influencing young children's risk of unintentional injury: Parenting style and strategies for teaching about home safety. Journal of applied developmental psychology 27, 6 (2006), 560--570.
[65]
Barbara A Morrongiello and Sophie Kiriakou. 2004. Mothers' home-safety practices for preventing six types of childhood injuries: what do they do, and why? Journal of Pediatric Psychology 29, 4 (2004), 285--297. https://doi.org/10.1093/jpepsy/jsh030
[66]
Barbara A Morrongiello, Corina Midgett, and Roslyn Shields. 2001. Don't run with scissors: young children's knowledge of home safety rules. Journal of Pediatric Psychology 26, 2 (2001), 105--115. https://doi.org/10.1093/jpepsy/26.2.105
[67]
Barbara A Morrongiello, Lisa Ondejko, and Amanda Littlejohn. 2004. Understanding toddlers' in-home injuries: I. Context, correlates, and determinants. Journal of Pediatric Psychology 29, 6 (2004), 415--431. https://doi.org/10.1093/jpepsy/jsh046
[68]
Soraya Sarhaddi Nelson. 2017. Germany Bans My Friend Cayla Doll Over Spying Concerns. https://www.npr.org/2017/02/20/516292295/germany-bans-my-friend-cayla-doll-over-spying-concerns
[69]
Peter Nikken and Marjon Schols. 2015. How and why parents guide the media use of young children. Journal of Child and Family Studies 24, 11 (2015), 3423--3435. https://doi.org/10.1007/s10826-015-0144--4
[70]
Sang Hyun Park, So Hee Won, Jong Bong Lee, and Sung Woo Kim. 2003. Smart home--digitally engineered domestic life. Personal and Ubiquitous Computing 7, 3--4 (2003), 189--196. https://doi.org/10.1007/s00779-003-0228--9
[71]
Charith Perera, Ciaran McCormick, Arosha K Bandara, Blaine A Price, and Bashar Nuseibeh. 2016. Privacy-by-design framework for assessing internet of things applications and platforms. In ACM International Conference on the Internet of Things. Association for Computing Machinery, 83--92. https://doi.org/10.1145/2991561.2991566
[72]
Lizette Peterson, Janet Farmer, and Javad H. Kashani. 1990. Parental injury prevention endeavors: A function of health beliefs? Health Psychology 9, 2 (1990), 177--191. https://doi.org/10.1037/0278--6133.9.2.177
[73]
Eleni Petridou, Dimitrios Trichopoulos, E Mera, Y Papadatos, K Papazoglou, A Marantos, and C Skondras. 1998. Risk factors for childhood burn injuries: a case-control study from Greece. Burns 24, 2 (1998), 123--128. https://doi.org/10.1016/S0305--4179(97)00095--8
[74]
Todd Powers, Dorothy Advincula, Manila S Austin, Stacy Graiko, and Jasper Snyder. 2012. Digital and social media in the purchase decision process: A special report from the Advertising Research Foundation. Journal of Advertising Research 52, 4 (2012), 479--489. https://doi.org/10.2501/JAR-52--4--479--489
[75]
Jens Qvortrup, William A Corsaro, Michael-Sebastian Honig, and Gill Valentine. 2009. The Palgrave handbook of childhood studies. Palgrave Macmillan, UK.
[76]
Emilee Rader, Samantha Hautea, and Anjali Munasinghe. 2020. "I Have a Narrow Thought Process": Constraints on Explanations Connecting Inferences and Self-Perceptions. In Symposium on Usable Privacy and Security (SOUPS). USENIX Association, USA, 457--488. https://www.usenix.org/system/files/soups2020-rader.pdf
[77]
Jenny Radesky and Alexis Hiniker. 2021. From moral panic to systemic change: Making child-centered design the default. International Journal of Child-Computer Interaction (2021), 100351.
[78]
Jenny S Radesky, Staci Eisenberg, Caroline J Kistin, Jamie Gross, Gabrielle Block, Barry Zuckerman, and Michael Silverstein. 2016. Overstimulated consumers or next-generation learners? Parent tensions about child mobile technology use. The Annals of Family Medicine 14, 6 (2016), 503--508.
[79]
Helen J Richardson. 2009. A 'smart house' is not a home: The domestication of ICTs. Information Systems Frontiers 11, 5 (2009), 599. https://doi.org/10.1007/s10796-008--9137--9
[80]
Frederick P Rivara, Ned Calonge, and Robert S Thompson. 1989. Population-based study of unintentional injury incidence and impact during childhood. American Journal of Public Health 79, 8 (1989), 990--994. https://doi.org/10.2105/AJPH.79.8.990
[81]
Michael C Roberts and Penelope H Brooks. 1987. Children's injuries: Issues in prevention and public policy. Journal of Social Issues 43, 2 (1987), 1--12. https://doi.org/10.1111/j.1540--4560.1987.tb01291.x
[82]
Johnny Salda�a. 2015. The coding manual for qualitative researchers. Sage, USA.
[83]
Ruth Simpson. 1996. Neither clear nor present: The social construction of safety and danger. In Sociological Forum, Vol. 11. Springer, 549--562. https://doi.org/10.1007/BF02408392
[84]
Kaiwen Sun, Carlo Sugatan, Tanisha Afnan, Hayley Simon, Susan A Gelman, Jenny Radesky, and Florian Schaub. 2021. "They See You're a Girl if You Pick a Pink Robot with a Skirt": A Qualitative Study of How Children Conceptualize Data Processing and Digital Privacy Risks. In ACM Conference on Human Factors in Computing Systems (CHI). Association for Computing Machinery, 687:1--687:34. https://doi.org/10.1145/3411764.3445333
[85]
Richard H Thaler and Cass R Sunstein. 2009. Nudge: improving decisions about health, wealth, and happiness. Yale University Press.
[86]
Kentaro Toyama. 2011. Technology as amplifier in international development. In iConference. Association for Computing Machinery, 75--82. https://doi.org/10.1145/1940761.1940772
[87]
K Tsoumakas, E Dousis, F Mavridi, A Gremou, and V Matziou. 2009. Parent's adherence to children's home-accident preventive measures. International Nursing Review 56, 3 (2009), 369--374. https://doi.org/10.1111/j.1466--7657.2009.00720.x
[88]
Blase Ur, Jaeyeon Jung, and Stuart Schechter. 2013. The current state of access control for smart devices in homes. In Workshop on Home Usable Privacy and Security. USENIX Association, USA, 1--6. http://cups.cs.cmu.edu/soups/2013/HUPS/HUPS13-BlaseUR.pdf
[89]
Blase Ur, Jaeyeon Jung, and Stuart Schechter. 2014. Intruders versus intrusiveness: teens' and parents' perspectives on home-entryway surveillance. In ACM International Joint Conference on Pervasive and Ubiquitous Computing. Association for Computing Machinery, 129--139. https://doi.org/10.1145/2632048.2632107
[90]
Facebook User. 2017. You Should Consider Adding A Child Lock Feature to Future Roomba. https://www.facebook.com/irobot/posts/you-should-consider-adding-a-child-lock-feature-to-future-roombas-my-17-month-ol/10154621980033924/
[91]
Reddit User. 2019. Wireless button with child safe battery compartment? https://www.reddit.com/r/homeautomation/ comments/d2ok4i/wireless_button_with_child_safe_battery/
[92]
Mariana Vaillant-Molina and Lorraine E Bahrick. 2012. The role of intersensory redundancy in the emergence of social referencing in 51/2-month-old infants. Developmental psychology 48, 1 (2012), 1.
[93]
Neil Vigdor. 2019. Somebody's Watching: Hackers Breach Ring Home Security Cameras. https://www.nytimes.com/2019/12/15/us/Hacked-ring-home-security-cameras.html
[94]
Tedra A Walden and Tamra A Ogan. 1988. The development of social referencing. Child development 59, 5 (1988), 1230--1240.
[95]
Robomow Website. 2021. What safety features does Robomow have? https://robomow.zendesk.com/hc/en-us/articles/115005333265-What-safety-features-does-Robomow-have-
[96]
Wikipedia. 2021. CE marking. https://en.wikipedia.org/wiki/CE_marking
[97]
Wikipedia. 2021. HomeKit. https://en.wikipedia.org/wiki/HomeKit
[98]
Wikipedia. 2021. UL(safety organization). https://en.wikipedia.org/wiki/UL_(safety_organization)
[99]
Charlie Wilson, Tom Hargreaves, and Richard Hauxwell-Baldwin. 2015. Smart homes and their users: a systematic analysis and key challenges. Personal and Ubiquitous Computing 19, 2 (2015), 463--476. https://doi.org/10.1007/s00779-014-0813-0
[100]
Pamela Wisniewski, Arup Kumar Ghosh, Heng Xu, Mary Beth Rosson, and John M Carroll. 2017. Parental Control vs. Teen Self-Regulation: Is there a middle ground for mobile online safety?. In ACM Conference on Computer Supported Cooperative Work & Social Computing (CSCW). Association for Computing Machinery, 51--69. https://doi.org/10.1145/2998181.2998352
[101]
Pamela Wisniewski, Haiyan Jia, Heng Xu, Mary Beth Rosson, and John M Carroll. 2015. "Preventative" vs. "Reactive:" How Parental Mediation Influences Teens' Social Media Privacy Behaviors. In ACM Conference on Computer Supported Cooperative Work & Social Computing (CSCW). Association for Computing Machinery, 302--316. https://doi.org/10.1145/2675133.2675293
[102]
Jong-bum Woo and Youn-kyung Lim. 2015. User experience in do-it-yourself-style smart homes. In ACM International Joint Conference on Pervasive and Ubiquitous Computing (UbiComp). Association for Computing Machinery, 779--790. https://doi.org/10.1145/2750858.2806063
[103]
Peter Worthy, Ben Matthews, and Stephen Viller. 2016. Trust me: doubts and concerns living with the Internet of Things. In ACM Conference on Designing Interactive Systems (DIS). Association for Computing Machinery, 427--434. https://doi.org/10.1145/2901790.2901890
[104]
Zheng Yan. 2005. Age differences in children's understanding of the complexity of the Internet. Journal of Applied Developmental Psychology 26, 4 (2005), 385--396. https://doi.org/10.1016/j.appdev.2005.04.001
[105]
Zheng Yan. 2009. Limited knowledge and limited resources: Children's and adolescents' understanding of the Internet. Journal of Applied Developmental Psychology 30, 2 (2009), 103--115. https://doi.org/10.1016/j.appdev.2008.10.012
[106]
Yaxing Yao, Justin Reed Basdeo, Smirity Kaushik, and Yang Wang. 2019. Defending my castle: A co-design study of privacy mechanisms for smart homes. In ACM Conference on Human Factors in Computing Systems (CHI). Association for Computing Machinery, 198:1--198:12. https://doi.org/10.1145/3290605.3300428
[107]
Yaxing Yao, Justin Reed Basdeo, Oriana Rosata Mcdonough, and Yang Wang. 2019. Privacy perceptions and designs of bystanders in smart homes. Proceedings of the ACM on Human-Computer Interaction 3, CSCW (2019), 59:1--59:24.
[108]
Eric Zeng, Shrirang Mare, and Franziska Roesner. 2017. End user security and privacy concerns with smart homes. In Symposium on Usable Privacy and Security (SOUPS). USENIX Association, USA, 65--80. https://www.usenix.org/system/files/conference/soups2017/soups2017-zeng.pdf
[109]
Eric Zeng and Franziska Roesner. 2019. Understanding and improving security and privacy in multi-user smart homes: a design exploration and in-home user study. In USENIX Security Symposium. USENIX Association, USA, 159--176. https://www.usenix.org/system/files/sec19-zeng.pdf
[110]
Eviatar Zerubavel. 1993. The fine line. University of Chicago Press, USA.
[111]
Jun Zhao, Ge Wang, Carys Dally, Petr Slovak, Julian Edbrooke-Childs, Max Van Kleek, and Nigel Shadbolt. 2019. 'I make up a silly name': Understanding Children's Perception of Privacy Risks Online. In ACM Conference on Human Factors in Computing Systems (CHI). Association for Computing Machinery, 106:1--106:13. https://doi.org/10.1145/3290605.3300336
[112]
Yixin Zou, Abraham H Mhaidli, Austin McCall, and Florian Schaub. 2018. "I've Got Nothing to Lose": Consumers' Risk Perceptions and Protective Actions after the Equifax Data Breach. In Symposium on Usable Privacy and Security (SOUPS). USENIX Association, USA, 197--216. https://www.usenix.org/system/files/conference/soups2018/soups2018-zou.pdf

Cited By

View all
  • (2024)Beyond Individual Concerns: Multi-user Privacy in Large Language ModelsProceedings of the 6th ACM Conference on Conversational User Interfaces10.1145/3640794.3665883(1-6)Online publication date: 8-Jul-2024
  • (2024)Unfulfilled Promises of Child Safety and Privacy: Portrayals and Use of Children in Smart Home MarketingProceedings of the ACM on Human-Computer Interaction10.1145/36374228:CSCW1(1-29)Online publication date: 26-Apr-2024
  • (2024)Methods for Family-Centered Design: Bridging the Gap Between Research and PracticeExtended Abstracts of the 2024 CHI Conference on Human Factors in Computing Systems10.1145/3613905.3636290(1-6)Online publication date: 11-May-2024
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image Proceedings of the ACM on Human-Computer Interaction
Proceedings of the ACM on Human-Computer Interaction  Volume 5, Issue CSCW2
CSCW2
October 2021
5376 pages
EISSN:2573-0142
DOI:10.1145/3493286
Issue’s Table of Contents
This work is licensed under a Creative Commons Attribution International 4.0 License.

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 18 October 2021
Published in PACMHCI Volume 5, Issue CSCW2

Check for updates

Author Tags

  1. child safety
  2. child-centered design
  3. parenting
  4. smart home technologies

Qualifiers

  • Research-article

Funding Sources

  • University of Michigan MCubed grant

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)1,188
  • Downloads (Last 6 weeks)113
Reflects downloads up to 22 Oct 2024

Other Metrics

Citations

Cited By

View all
  • (2024)Beyond Individual Concerns: Multi-user Privacy in Large Language ModelsProceedings of the 6th ACM Conference on Conversational User Interfaces10.1145/3640794.3665883(1-6)Online publication date: 8-Jul-2024
  • (2024)Unfulfilled Promises of Child Safety and Privacy: Portrayals and Use of Children in Smart Home MarketingProceedings of the ACM on Human-Computer Interaction10.1145/36374228:CSCW1(1-29)Online publication date: 26-Apr-2024
  • (2024)Methods for Family-Centered Design: Bridging the Gap Between Research and PracticeExtended Abstracts of the 2024 CHI Conference on Human Factors in Computing Systems10.1145/3613905.3636290(1-6)Online publication date: 11-May-2024
  • (2024)Creating Safe Places: Understanding the Lived Experiences of Families Managing Cystic Fibrosis in Young ChildrenProceedings of the 2024 CHI Conference on Human Factors in Computing Systems10.1145/3613904.3642334(1-18)Online publication date: 11-May-2024
  • (2024)Wrist-bound Guanxi, Jiazu, and Kuolie: Unpacking Chinese Adolescent Smartwatch-Mediated SocializationProceedings of the 2024 CHI Conference on Human Factors in Computing Systems10.1145/3613904.3642044(1-21)Online publication date: 11-May-2024
  • (2024)Toward Family-Robot Interactions: A Family-Centered Framework in HRIProceedings of the 2024 ACM/IEEE International Conference on Human-Robot Interaction10.1145/3610977.3634976(76-85)Online publication date: 11-Mar-2024
  • (2024)SoK: Safer Digital-Safety Research Involving At-Risk Users2024 IEEE Symposium on Security and Privacy (SP)10.1109/SP54263.2024.00071(635-654)Online publication date: 19-May-2024
  • (2024)Smart Devices Require Skilled Users: Home Automation Performance Tests among the Dutch PopulationInternational Journal of Human–Computer Interaction10.1080/10447318.2024.2364470(1-12)Online publication date: 18-Jun-2024
  • (2023)"I'm going to trust this until it burns me' parents' privacy concerns and delegation of trust in K-8 educational technologyProceedings of the 32nd USENIX Conference on Security Symposium10.5555/3620237.3620521(5073-5090)Online publication date: 9-Aug-2023
  • (2023)Smart Home Technologies to Facilitate Ageing-in-Place: Professionals PerceptionSustainability10.3390/su1508654215:8(6542)Online publication date: 12-Apr-2023
  • Show More Cited By

View Options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Get Access

Login options

Full Access

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media