" Strike at the Root": Co-designing Real-Time Social Media Interventions for Adolescent Online Risk Prevention

Z Agha, K Badillo-Urquiola, PJ Wisniewski - Proceedings of the ACM on …, 2023 - dl.acm.org
Adolescent online safety researchers have emphasized the importance of moving beyond
restrictive and privacy invasive approaches to online safety, towards resilience-based …

12 Ways to Empower: Designing for Children's Digital Autonomy

G Wang, J Zhao, M Van Kleek, N Shadbolt - Proceedings of the 2023 …, 2023 - dl.acm.org
In recent years, growing research has been made on supporting children to become more
autonomous in the digital environment around them. However, there has been little …

The show must go on: A conceptual model of conducting synchronous participatory design with children online

KJ Lee, W Roldan, TQ Zhu, H Kaur Saluja… - Proceedings of the …, 2021 - dl.acm.org
Co-designing with children in an online environment is increasingly important due to
external factors, such as the COVID-19 pandemic, and the diversification and inclusion of …

Sok: A framework for unifying at-risk user research

N Warford, T Matthews, K Yang, O Akgul… - … IEEE Symposium on …, 2022 - ieeexplore.ieee.org
At-risk users are people who experience risk factors that augment or amplify their chances of
being digitally attacked and/or suffering disproportionate harms. In this systematization work …

I make up a silly name' Understanding Children's Perception of Privacy Risks Online

J Zhao, G Wang, C Dally, P Slovak… - Proceedings of the …, 2019 - dl.acm.org
Children under 11 are often regarded as too young to comprehend the implications of online
privacy. Perhaps as a result, little research has focused on younger kids' risk recognition and …

Laughing is scary, but farting is cute: A conceptual model of children's perspectives of creepy technologies

JC Yip, K Sobel, X Gao, AM Hishikawa, A Lim… - Proceedings of the …, 2019 - dl.acm.org
In HCI, adult concerns about technologies for children have been studied extensively.
However, less is known about what children themselves find concerning in everyday …

" It's Stored, Hopefully, on an Encrypted Server'': Mitigating Users' Misconceptions About {FIDO2} Biometric {WebAuthn}

L Lassak, A Hildebrandt, M Golla, B Ur - 30th USENIX Security …, 2021 - usenix.org
While prior attempts at passwordless authentication on the web have required specialized
hardware, FIDO2's WebAuthn protocol lets users sign into websites with their smartphone …

Conducting risky research with teens: co-designing for the ethical treatment and protection of adolescents

K Badillo-Urquiola, Z Shea, Z Agha, I Lediaeva… - Proceedings of the …, 2021 - dl.acm.org
The methods in which we study the online experiences of adolescents should be evidence-
based and informed by youth. This is especially true when studying sensitive topics, such as …

'Treat me as your friend, not a number in your database': Co-designing with Children to Cope with Datafication Online

G Wang, J Zhao, M Van Kleek, N Shadbolt - Proceedings of the 2023 …, 2023 - dl.acm.org
Datafication refers to the practices through which children's online actions are pervasively
recorded, tracked, aggregated, analysed, and exploited by online services in ways including …

Stranger danger! social media app features co-designed with children to keep them safe online

K Badillo-Urquiola, D Smriti, B McNally… - Proceedings of the 18th …, 2019 - dl.acm.org
Mobile social media applications (" apps"), such as TikTok (previously Musical. ly), have
recently surfaced in news media due to harmful incidents involving young children engaging …