skip to main content
10.1145/3173574.3173698acmconferencesArticle/Chapter ViewAbstractPublication PageschiConference Proceedingsconference-collections
research-article

Safety vs. Surveillance: What Children Have to Say about Mobile Apps for Parental Control

Published:19 April 2018Publication History

ABSTRACT

Mobile applications ("apps") developed to promote online safety for children are underutilized and rely heavily on parental control features that monitor and restrict their child's mobile activities. This asymmetry in parental surveillance initiates an interesting research question -- how do children themselves feel about such parental control apps? We conducted a qualitative analysis of 736 reviews of 37 mobile online safety apps from Google Play that were publicly posted and written by children (ages 8-19). Our results indicate that child ratings were significantly lower than that of parents with 76% of the child reviews giving apps a single star. Children felt that the apps were overly restrictive and invasive of their personal privacy, negatively impacting their relationships with their parents. We relate these findings with HCI literature on mobile online safety, including broader literature around privacy and surveillance, and outline design opportunities for online safety apps.

Skip Supplemental Material Section

Supplemental Material

pn1838-file5.mp4

mp4

2.4 MB

pn1838.mp4

mp4

161.9 MB

References

  1. Monica Anderson. 2016. Parents, Teens and Digital Monitoring. Pew Research Center: Internet, Science & Tech. Retrieved July 12, 2016 from http://www.pewinternet.org/2016/01/07/parents-teens-and-digital-monitoring/Google ScholarGoogle Scholar
  2. Zahra Ashktorab and Jessica Vitak. 2016. Designing Cyberbullying Mitigation and Prevention Solutions Through Participatory Design With Teenagers. In Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems (CHI '16), 3895--3905. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. Saeideh Bakhshi, Partha Kanuparthy, and David A. Shamma. 2015. Understanding Online Reviews: Funny, Cool or Useful? In Proceedings of the 18th ACM Conference on Computer Supported Cooperative Work & Social Computing (CSCW '15), 1270--1276. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. Eric P.S. Baumer, Phil Adams, Vera D. Khovanskaya, Tony C. Liao, Madeline E. Smith, Victoria Schwanda Sosik, and Kaiton Williams. 2013. Limiting, Leaving, and (Re)Lapsing: An Exploration of Facebook Non-use Practices and Experiences. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (CHI '13), 3257--3266. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. Diana Baumrind. 1987. A developmental perspective on adolescent risk taking in contemporary America. New Directions for Child and Adolescent Development 1987, 37: 93--125.Google ScholarGoogle ScholarCross RefCross Ref
  6. Diana Baumrind. 2005. Patterns of parental authority and adolescent autonomy. New Directions for Child and Adolescent Development 2005, 108: 61--69.Google ScholarGoogle Scholar
  7. Lindsay Blackwell, Emma Gardiner, and Sarita Schoenebeck. 2016. Managing Expectations: Technology Tensions Among Parents and Teens. In Proceedings of the 19th ACM Conference on Computer-Supported Cooperative Work & Social Computing (CSCW '16), 1390--1401. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. Julie Boesen, Jennifer A. Rode, and Clara Mancini. 2010. The Domestic Panopticon: Location Tracking in Families. In Proceedings of the 12th ACM International Conference on Ubiquitous Computing, 65--74. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. danah boyd. 2014. It's Complicated: The Social Lives of Networked Teens. Yale University Press, New Haven. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. Toke Haunstrup Christensen. 2009. "Connected presence" in distributed family life. New Media & Society 11, 3: 433--451.Google ScholarGoogle ScholarCross RefCross Ref
  11. Lorrie Faith Cranor, Adam L. Durity, Abigail Marsh, and Blase Ur. 2014. Parents' and Teens' Perspectives on Privacy In a Technology-Filled World. In Proceedings of the Tenth Symposium On Usable Privacy and Security.Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. Alexei Czeskis, Ivayla Dermendjieva, Hussein Yapit, Alan Borning, Batya Friedman, Brian Gill, and Tadayoshi Kohno. 2010. Parenting from the Pocket: Value Tensions and Technical Directions for Secure and Private Parent-teen Mobile Safety. In Proceedings of the Sixth Symposium on Usable Privacy and Security (SOUPS '10), 15:1--15:15. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. Marie Drolet and Isabelle Arcand. 2013. Positive Development, Sense of Belonging, and Support of Peers among Early Adolescents: Perspectives of Different Actors. International Education Studies 6, 4: 29.Google ScholarGoogle ScholarCross RefCross Ref
  14. Wenjing Duan, Bin Gu, and Andrew B. Whinston. 2008. Do online reviews matter? - An empirical investigation of panel data. Decision Support Systems 45, 4: 1007--1016. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. Daniel A. Epstein, Bradley H. Jacobson, Elizabeth Bales, David W. McDonald, and Sean A. Munson. 2015. From "Nobody Cares" to "Way to Go!": A Design Framework for Social Sharing in Personal Informatics. In Proceedings of the 18th ACM Conference on Computer Supported Cooperative Work & Social Computing (CSCW '15), 1622--1636. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. Lee B. Erickson, Pamela Wisniewski, Heng Xu, John M. Carroll, Mary Beth Rosson, and Daniel F. Perkins. 2016. The boundaries between: Parental involvement in a teen's online world. Journal of the Association for Information Science & Technology 67, 6: 1384--1403. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. Jennifer Fereday and Eimear Muir-Cochrane. 2008. Demonstrating Rigor Using Thematic Analysis: A Hybrid Approach of Inductive and Deductive Coding and Theme Development. International Journal of Qualitative Methods - ARCHIVE 5, 1: 80--92.Google ScholarGoogle ScholarCross RefCross Ref
  18. Colin Fitzpatrick, Jeremy Birnholtz, and Darren Gergle. 2016. People, Places, and Perceptions: Effects of Location Check-in Awareness on Impressions of Strangers. In Proceedings of the 18th International Conference on Human-Computer Interaction with Mobile Devices and Services (MobileHCI '16), 295--305. Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. Bin Fu, Jialiu Lin, Lei Li, Christos Faloutsos, Jason Hong, and Norman Sadeh. 2013. Why People Hate Your App: Making Sense of User Feedback in a Mobile App Store. In Proceedings of the 19th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (KDD '13), 1276--1284. Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. Kentaro Fujita and Joseph C. Roberts. 2010. Promoting prospective self-control through abstraction. Journal of Experimental Social Psychology 46, 6: 1049--1054.Google ScholarGoogle ScholarCross RefCross Ref
  21. Daniel Gerdes and James H. Conn. 2001. A User-Friendly Look at Qualitative Research Methods. Physical Educator 58, 4: 183.Google ScholarGoogle Scholar
  22. Giovanna Mascheroni and Kjartan Ólafsson. 2016. The mobile Internet: Access, use, opportunities and divides among European children. New Media & Society 18, 8: 1657--1679.Google ScholarGoogle ScholarCross RefCross Ref
  23. Shion Guha and Jeremy Birnholtz. 2013. Can You See Me Now?: Location, Visibility and the Management of Impressions on Foursquare. In Proceedings of the 15th International Conference on Human-computer Interaction with Mobile Devices and Services (MobileHCI '13), 183--192. Google ScholarGoogle ScholarDigital LibraryDigital Library
  24. Shion Guha and Stephen B. Wicker. 2015. Spatial Subterfuge: An Experience Sampling Study to Predict Deceptive Location Disclosures. In Proceedings of the 2015 ACM International Joint Conference on Pervasive and Ubiquitous Computing (UbiComp '15), 1131--1135. Google ScholarGoogle ScholarDigital LibraryDigital Library
  25. Shion Guha and Stephen B. Wicker. 2015. Do Birds of a Feather Watch Each Other?: Homophily and Social Surveillance in Location Based Social Networks. In Proceedings of the 18th ACM Conference on Computer Supported Cooperative Work & Social Computing (CSCW '15), 1010--1020. Google ScholarGoogle ScholarDigital LibraryDigital Library
  26. Heidi Hartikainen, Netta Iivari, and Marianne Kinnula. 2016. Should We Design for Control, Trust or Involvement?: A Discourses Survey About Children's Online Safety. In Proceedings of the The 15th International Conference on Interaction Design and Children (IDC '16), 367--378. Google ScholarGoogle ScholarDigital LibraryDigital Library
  27. Yasmeen Hashish, Andrea Bunt, and James E. Young. 2014. Involving Children in Content Control: A Collaborative and Education-oriented Content Filtering Approach. In Proceedings of the 32Nd Annual ACM Conference on Human Factors in Computing Systems (CHI '14), 1797--1806. Google ScholarGoogle ScholarDigital LibraryDigital Library
  28. Alexis Hiniker, Sarita Y. Schoenebeck, and Julie A. Kientz. 2016. Not at the Dinner Table: Parents' and Children's Perspectives on Family Technology Rules. In Proceedings of the 19th ACM Conference on Computer-Supported Cooperative Work & Social Computing (CSCW '16), 1376--1389. Google ScholarGoogle ScholarDigital LibraryDigital Library
  29. Leonard Hoon, Rajesh Vasa, Gloria Yoanita Martino, Jean-Guy Schneider, and Kon Mouzakis. 2013. Awesome!: Conveying Satisfaction on the App Store. In Proceedings of the 25th Australian Computer-Human Interaction Conference: Augmentation, Application, Innovation, Collaboration (OzCHI '13), 229--232. Google ScholarGoogle ScholarDigital LibraryDigital Library
  30. Nan Hu, Indranil Bose, Noi Sian Koh, and Ling Liu. 2012. Manipulation of online reviews: An analysis of ratings, readability, and sentiments. Decision Support Systems 52, 3: 674--684. Google ScholarGoogle ScholarDigital LibraryDigital Library
  31. Nan Hu, Paul A. Pavlou, and Jennifer Zhang. 2006. Can Online Reviews Reveal a Product's True Quality?: Empirical Findings and Analytical Modeling of Online Word-of-mouth Communication. In Proceedings of the 7th ACM Conference on Electronic Commerce (EC '06), 324--330. Google ScholarGoogle ScholarDigital LibraryDigital Library
  32. Nan Hu, Jie Zhang, and Paul A. Pavlou. 2009. Overcoming the J-shaped Distribution of Product Reviews. Commun. ACM 52, 10: 144--147. Google ScholarGoogle ScholarDigital LibraryDigital Library
  33. Gregor Jawecki and Johann Fuller. 2008. How to use the innovative potential of online communities? Netnography -- an unobtrusive research method to absorb the knowledge and creativity of online communities. International Journal of Business Process Integration and Management 3, 4: 248--255.Google ScholarGoogle ScholarCross RefCross Ref
  34. Haiyan Jia, Pamela J. Wisniewski, Heng Xu, Mary Beth Rosson, and John M. Carroll. 2015. Risk-taking As a Learning Process for Shaping Teen's Online Information Privacy Behaviors. In Proceedings of the 18th ACM Conference on Computer Supported Cooperative Work & Social Computing (CSCW '15), 583--599. Google ScholarGoogle ScholarDigital LibraryDigital Library
  35. Carrie D. Kennedy-Lightsey and Brandi N. Frisby. 2016. Parental Privacy Invasion, Family Communication Patterns, and Perceived Ownership of Private Information. Communication Reports 29, 2: 75--86.Google ScholarGoogle ScholarCross RefCross Ref
  36. Minsam Ko, Seungwoo Choi, Subin Yang, Joonwon Lee, and Uichin Lee. 2015. FamiLync: Facilitating Participatory Parental Mediation of Adolescents' Smartphone Use. In Proceedings of the 2015 ACM International Joint Conference on Pervasive and Ubiquitous Computing (UbiComp '15), 867--878. Google ScholarGoogle ScholarDigital LibraryDigital Library
  37. Nikolaos Korfiatis, Elena García-Bariocanal, and Salvador Sánchez-Alonso. 2012. Evaluating content quality and helpfulness of online product reviews: The interplay of review helpfulness vs. review content. Electronic Commerce Research and Applications 11, 3: 205--217. Google ScholarGoogle ScholarDigital LibraryDigital Library
  38. Ben M. F. Law, Andrew M. H. Siu, and Daniel T. L. Shek. 2012. Recognition for Positive Behavior as a Critical Youth Development Construct: Conceptual Bases and Implications on Youth Service Development. The Scientific World Journal 2012: e809578.Google ScholarGoogle ScholarCross RefCross Ref
  39. Sonia Livingstone and Peter K. Smith. 2014. Annual Research Review: Harms experienced by child users of online and mobile technologies: the nature, prevalence and management of sexual and aggressive risks in the digital age. Journal of Child Psychology and Psychiatry 55, 6: 635--654.Google ScholarGoogle ScholarCross RefCross Ref
  40. Sonya Livingstone. 2008. Taking risky opportunities in youthful content creation: Teenagers' use of social networking sites for intimacy, privacy, and self-expression. New Media & Society 10: 393--411.Google ScholarGoogle ScholarCross RefCross Ref
  41. Alice Marwick. 2012. The Public Domain: Surveillance in Everyday Life. Surveillance & Society 9, 4: 378--393.Google ScholarGoogle ScholarCross RefCross Ref
  42. Alice E Marwick and danah boyd. 2014. Networked privacy: How teenagers negotiate context in social media. New Media & Society 16, 7: 1051--1067.Google ScholarGoogle ScholarCross RefCross Ref
  43. Karsten Nebe and Dirk Zimmermann. 2007. Aspects of Integrating User Centered Design into Software Engineering Processes. In Human-Computer Interaction. Interaction Design and Usability, 194--203. Google ScholarGoogle ScholarDigital LibraryDigital Library
  44. Helen Nissenbaum. 2004. PRIVACY AS CONTEXTUAL INTEGRITY. Washington Law Review 79, 119.Google ScholarGoogle Scholar
  45. Ardis L. Olson, Cecelia A. Gaffney, Pamela W. Lee, and Pamela Starr. 2008. Changing Adolescent Health Behaviors. American Journal of Preventive Medicine 35, 5: S359--S364.Google ScholarGoogle ScholarCross RefCross Ref
  46. Antti Oulasvirta, Aurora Pihlajamaa, Jukka Perkiö, Debarshi Ray, Taneli Vähäkangas, Tero Hasu, Niklas Vainio, and Petri Myllymäki. 2012. Long-term Effects of Ubiquitous Surveillance in the Home. In Proceedings of the 2012 ACM Conference on Ubiquitous Computing (UbiComp '12), 41--50. Google ScholarGoogle ScholarDigital LibraryDigital Library
  47. R. Pain. 2006. Paranoid parenting? Rematerializing risk and fear for children. Social & cultural geography. 7, 2: 221--243.Google ScholarGoogle Scholar
  48. Sandra Petronio. 1994. Privacy binds in family interactions: The case of parental privacy invasion. In The dark side of interpersonal communication, W. R. Cupach B. H. Spitzberg (ed.). Lawrence Erlbaum Associates, Inc, Hillsdale, NJ, England, 241--257.Google ScholarGoogle Scholar
  49. Sandra Sporbert Petronio. 2002. Boundaries of Privacy: Dialects of Disclosure. SUNY Press.Google ScholarGoogle Scholar
  50. Anthony T. Pinter, Pamela Wisniewski, Heng Xu, Mary Beth Rosson, and John M. Carroll. 2017. Adolescent Online Safety: Moving Beyond Formative Evaluations to Designing Solutions for the Future. In Proceedings of the International Conference on Interaction Design and Children. Google ScholarGoogle ScholarDigital LibraryDigital Library
  51. Erika S. Poole and Tamara Peyton. 2013. Interaction Design Research with Adolescents: Methodological Challenges and Best Practices. In Proceedings of the 12th International Conference on Interaction Design and Children (IDC '13), 211--217. Google ScholarGoogle ScholarDigital LibraryDigital Library
  52. Rivka Ribak. 2009. Remote control, umbilical cord and beyond: the mobile phone as a transitional object. The British Journal of Developmental Psychology 27, Pt 1: 183--196.Google ScholarGoogle ScholarCross RefCross Ref
  53. Jennifer A. Rode. 2009. Digital Parenting: Designing Children's Safety. In Proceedings of the 23rd British HCI Group Annual Conference on People and Computers: Celebrating People and Technology (BCS-HCI '09), 244--251. Google ScholarGoogle ScholarDigital LibraryDigital Library
  54. Stefan Siersdorfer, Sergiu Chelaru, Wolfgang Nejdl, and Jose San Pedro. 2010. How Useful Are Your Comments?: Analyzing and Predicting Youtube Comments and Comment Ratings. In Proceedings of the 19th International Conference on World Wide Web (WWW '10), 891--900. Google ScholarGoogle ScholarDigital LibraryDigital Library
  55. Yvette Solomon, Jo Warin, Charlie Lewis, and Wendy Langford. 2002. Intimate Talk between Parents and their Teenage Children: Democratic Openness or Covert Control? Sociology 36, 4: 965--983.Google ScholarGoogle ScholarCross RefCross Ref
  56. H. Stattin and M. Kerr. 2000. Parental monitoring: a reinterpretation. Child Development 71, 4: 1072--1085.Google ScholarGoogle ScholarCross RefCross Ref
  57. Anselm Strauss and Juliet Corbin. 1998. Basics of Qualitative Research: Techniques and Procedures for Developing Grounded Theory. SAGE Publications, Inc, Thousand Oaks.Google ScholarGoogle Scholar
  58. Blase Ur, Jaeyeon Jung, and Stuart Schechter. 2014. Intruders Versus Intrusiveness: Teens' and Parents' Perspectives on Home-entryway Surveillance. In Proceedings of the 2014 ACM International Joint Conference on Pervasive and Ubiquitous Computing (UbiComp '14), 129--139. Google ScholarGoogle ScholarDigital LibraryDigital Library
  59. Rajesh Vasa, Leonard Hoon, Kon Mouzakis, and Akihiro Noguchi. 2012. A Preliminary Analysis of Mobile App User Reviews. In Proceedings of the 24th Australian Computer-Human Interaction Conference (OzCHI '12), 241--244. Google ScholarGoogle ScholarDigital LibraryDigital Library
  60. Yang Wang, Pedro Giovanni Leon, Alessandro Acquisti, Lorrie Faith Cranor, Alain Forget, and Norman Sadeh. 2014. A Field Trial of Privacy Nudges for Facebook. In Proceedings of the 32Nd Annual ACM Conference on Human Factors in Computing Systems (CHI '14), 2367--2376. Google ScholarGoogle ScholarDigital LibraryDigital Library
  61. Robert S. Weisskirch. 2009. Parenting by cell phone: parental monitoring of adolescents and family relations. Journal of Youth and Adolescence 38, 8: 1123--1139.Google ScholarGoogle ScholarCross RefCross Ref
  62. Sarah Whittle, Julian G. Simmons, Meg Dennison, Nandita Vijayakumar, Orli Schwartz, Marie B. H. Yap, Lisa Sheeber, and Nicholas B. Allen. 2014. Positive parenting predicts the development of adolescent brain structure: A longitudinal study. Developmental Cognitive Neuroscience 8: 7--17.Google ScholarGoogle ScholarCross RefCross Ref
  63. Pamela Wisniewski, Arup Kumar Ghosh, Mary Beth Rosson, Heng Xu, and John M. Carroll. 2017. Parental Control vs. Teen Self-Regulation: Is there a middle ground for mobile online safety? In Proceedings of the 20th ACM Conference on Computer Supported Cooperative Work & Social Computing. Google ScholarGoogle ScholarDigital LibraryDigital Library
  64. Pamela Wisniewski, Haiyan Jia, Na Wang, Saijing Zheng, Heng Xu, Mary Beth Rosson, and John M. Carroll. 2015. Resilience Mitigates the Negative Effects of Adolescent Internet Addiction and Online Risk Exposure. In Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems (CHI '15), 4029--4038. Google ScholarGoogle ScholarDigital LibraryDigital Library
  65. Pamela Wisniewski, Mary Beth Rosson, Heng Xu, and John M. Carroll. 2017. Parents Just Don't Understand: Why Teens Don't Talk to Parents about Their Online Risk Experiences. In Proceedings of the 20th ACM Conference on Computer Supported Cooperative Work & Social Computing. Google ScholarGoogle ScholarDigital LibraryDigital Library
  66. Pamela Wisniewski, Heng Xu, Jack Carroll, and Mary Beth Rosson. 2013. Grand Challenges of Researching Adolescent Online Safety: A Family Systems Approach. AMCIS 2013 Proceedings. Retrieved from http://aisel.aisnet.org/amcis2013/SocialTechnicalIssues/GeneralPresentations/10Google ScholarGoogle Scholar
  67. Pamela Wisniewski, Heng Xu, Mary Beth Rosson, Daniel F. Perkins, and John M. Carroll. 2016. Dear Diary: Teens Reflect on Their Weekly Online Risk Experiences. In Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems (CHI '16), 3919--3930. Google ScholarGoogle ScholarDigital LibraryDigital Library
  68. Y. Zhang and B.M. Wildemuth. 2009. Qualitative analysis of content. Applications of social research methods to questions in information and library science: 308--319.Google ScholarGoogle Scholar
  69. 2013. Children's Online Privacy Protection Rule ("COPPA"). Federal Trade Commission. Retrieved August 1, 2017 from https://www.ftc.gov/enforcement/rules/rulemaking-regulatory-reform-proceedings/childrens-online-privacy-protection-ruleGoogle ScholarGoogle Scholar
  70. Downloading App Store & Google Play reviews made easy. Retrieved August 8, 2016 from http://heedzy.com/feedback#Google ScholarGoogle Scholar
  71. Screen Time Parental Control - Android Apps on Google Play. Retrieved August 6, 2016 from https://play.google.com/store/apps/details?id=com.screentime.rcGoogle ScholarGoogle Scholar

Index Terms

  1. Safety vs. Surveillance: What Children Have to Say about Mobile Apps for Parental Control

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Conferences
      CHI '18: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems
      April 2018
      8489 pages
      ISBN:9781450356206
      DOI:10.1145/3173574

      Copyright © 2018 ACM

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 19 April 2018

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • research-article

      Acceptance Rates

      CHI '18 Paper Acceptance Rate666of2,590submissions,26%Overall Acceptance Rate6,199of26,314submissions,24%

      Upcoming Conference

      CHI '24
      CHI Conference on Human Factors in Computing Systems
      May 11 - 16, 2024
      Honolulu , HI , USA

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader