Parenting from the pocket: value tensions and technical directions for secure and private parent-teen mobile safety

@inproceedings{Czeskis2010ParentingFT,
  title={Parenting from the pocket: value tensions and technical directions for secure and private parent-teen mobile safety},
  author={Alexei Czeskis and Ivayla Dermendjieva and Hussein Yapit and Alan Borning and Batya Friedman and Brian T. Gill and Tadayoshi Kohno},
  booktitle={SOUPS},
  year={2010}
}
An increasing number of high-tech devices, such as driver monitoring systems and Internet usage monitoring tools, are advertised as useful or even necessary for good parenting of teens. Simultaneously, there is a growing market for mobile "personal safety" devices. As these trends merge, there will be significant implications for parent-teen relationships, affecting domains such as privacy, trust, and maturation. Not only the teen and his or her parents are affected; other important… 
Circle of Trust: A New Approach to Mobile Online Safety for Families
TLDR
This work designs and develops an Android "app" called Circle of Trust, a new approach to adolescent online safety that aims to strike a balance between a teen's privacy and their online safety through active communication and fostering trust between parents and children.
An Examination of Parenting Strategies for Children's Online Safety
Teenagers are using the internet for a variety of social and identity-based activities, but in doing so, they are exposed to risky situations. The work of ensuring teens' online safety largely falls
A Matter of Control or Safety?: Examining Parental Use of Technical Monitoring Apps on Teens' Mobile Devices
TLDR
Overall, increased parental control was associated with more (not fewer) online risks, and design recommendations for mobile apps that promote online safety through engaged, instead of restrictive, parenting are provided.
Parental Control vs. Teen Self-Regulation: Is there a middle ground for mobile online safety?
TLDR
A structured, qualitative feature analysis of 75 Android mobile apps found that the apps strongly favored features that promote parental control through monitoring and restricting teens' online behaviors over teen self-regulation or more communicative and collaborative practices between parents and teens.
Improving the safety of homeless young people with mobile phones: values, form and function
TLDR
A design space for how mobile phones can be used to manage unsafe situations is bound, related to values, function, function and form.
Parents' and Teens' Perspectives on Privacy In a Technology-Filled World
TLDR
This report explores the boundaries of teen privacy in both the physical and digital worlds and presents cases where parents made privacy decisions using false analogies with the physical world or outdated assumptions.
POCKET: A tool for protecting children's privacy online
TLDR
The POCKET framework is a novel, technically feasible and legally sound solution to automatically enforce COPPA, aimed at protecting a child's privacy by requiring parental consent before collecting information from children under the age of 13.
The boundaries between: Parental involvement in a teen's online world
TLDR
A qualitative study examines the challenge between parental concern for adolescent online safety and teens' desire to independently regulate their own online experiences to examine the boundaries between parental control and adolescent autonomy in virtual spaces.
Social and technical challenges in parenting teens' social media use
TLDR
An interview study with 16 parents to examine challenges in "technoparenting" - parenting teens' technology use concludes with design implications for a socially translucent "digital window".
Socially adaptive electronic partners for improved support of children's values: An empirical study with a location-sharing mobile app
TLDR
It is hypothesized that the use of SCs in mobile location sharing applications provides improved support for user values since it allows for a more flexible, context-aware location sharing.
...
1
2
3
4
5
...

References

SHOWING 1-10 OF 44 REFERENCES
Developing privacy guidelines for social location disclosure applications and services
TLDR
This article describes the design process of Reno, a location-enhanced, mobile coordination tool and person finder and distil this experience into a small set of guidelines for designers of social mobile applications and shows how these guidelines can be applied to a different application, called Boise.
Analysis on the Prospects of Parent-Adolescent Communication Served by Mobile Technology
TLDR
Survey results showed that mobile technology will do good to the parent-child's relationship, and the author will analyze the possibilities of providing services in parent-adolescent communication by using mobile technology.
The Watcher and the Watched: Social Judgments about Privacy in a Public Place
TLDR
Results showed that the majority of participants upheld some modicum of privacy in public; people’s privacy judgments were not a one-dimensional construct, but often involved considerations based on physical harm, psychological wellbeing, and informed consent.
Value tensions in design: the value sensitive design, development, and appropriation of a corporation's groupware system
TLDR
Key contributions include a "proof-of-concept" that established Value Sensitive Design principles and methods can be used to good effect for the design of groupware in an industry setting, a new design method for addressing value tensions, Value Dams and Flows, and the co-evolution of technology and organizational policy.
Development of a Privacy Addendum for Open Source Licenses: Value Sensitive Design in Industry
TLDR
This paper describes how the privacy addendum was developed, present legal terms, and discusses characteristics of the design methods and results that have implications for protecting privacy in ubiquitous information systems released in open source.
A Framework for Comparing Perspectives on Privacy and Pervasive Technologies
TLDR
This work outlines a framework to consider individual and group rights so that technology developers can more effectively reason about concerns for existing technology as well as generate new technologies that respect a well-defined set of social norms.
Patients, pacemakers, and implantable defibrillators: human values and security for wireless implantable medical devices
TLDR
This study explores patient views and values regarding their devices to inform the design of computer security for wireless IMDs, and offers design guidelines for future security systems for IMDs.
Profiles as Conversation: Networked Identity Performance on Friendster
  • D. Boyd, Jeffrey Heer
  • Computer Science
    Proceedings of the 39th Annual Hawaii International Conference on System Sciences (HICSS'06)
  • 2006
TLDR
This paper draws on data gathered through ethnography and reaffirmed through data collection and visualization to analyze the communicative aspects of Profiles within the Friendster service, and explores the shift from conversation to static representation, as active Profiles fossilize into recorded traces.
Cookies and Web browser design: toward realizing informed consent online
TLDR
It is concluded that while cookie technology has improved over time regarding informed consent, some startling problems remain and design remedies are offered.
Safe & sound: a wireless leash
TLDR
Safe & Sound uses location-aware mobile phones to create a "virtual leash"; a secure zone beyond which a child may not travel, and the peer-to-peer transmission of location helps reduce the privacy concerns which often arise with location- Aware systems.
...
1
2
3
4
5
...