TY - GEN
T1 - Co-designing mobile online safety applications with children
AU - McNally, Brenna
AU - Kumar, Priya
AU - Hordatt, Chelsea
AU - Mauriello, Matthew Louis
AU - Naik, Shalmali
AU - Norooz, Leyla
AU - Shorter, Alazandra
AU - Golub, Evan
AU - Druin, Allison
N1 - Publisher Copyright:
© 2018 Association for Computing Machinery.
PY - 2018/4/20
Y1 - 2018/4/20
N2 - Parents use mobile monitoring software to observe and restrict their children's activities in order to minimize the risks associated with Internet-enabled mobile devices. As children are stakeholders in such technologies, recent research has called for their inclusion in its design process. To investigate children's perceptions of parental mobile monitoring technologies and explore their interaction preferences, we held two co-design sessions with 12 children ages 7-12. Children first reviewed and redesigned an existing mobile monitoring application. Next, they designed ways children could use monitoring software when they encounter mobile risks (e.g., cyberbullying, inappropriate content). Results showed that children acknowledged safety needs and accepted certain parental controls. They preferred and designed controls that emphasized restriction over monitoring, taught risk coping, promoted parent-child communication, and automated interactions. Our results benefit designers looking to develop parental mobile monitoring technologies in ways that children will both accept and can actively benefit from.
AB - Parents use mobile monitoring software to observe and restrict their children's activities in order to minimize the risks associated with Internet-enabled mobile devices. As children are stakeholders in such technologies, recent research has called for their inclusion in its design process. To investigate children's perceptions of parental mobile monitoring technologies and explore their interaction preferences, we held two co-design sessions with 12 children ages 7-12. Children first reviewed and redesigned an existing mobile monitoring application. Next, they designed ways children could use monitoring software when they encounter mobile risks (e.g., cyberbullying, inappropriate content). Results showed that children acknowledged safety needs and accepted certain parental controls. They preferred and designed controls that emphasized restriction over monitoring, taught risk coping, promoted parent-child communication, and automated interactions. Our results benefit designers looking to develop parental mobile monitoring technologies in ways that children will both accept and can actively benefit from.
UR - http://www.scopus.com/inward/record.url?scp=85046950628&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=85046950628&partnerID=8YFLogxK
U2 - 10.1145/3173574.3174097
DO - 10.1145/3173574.3174097
M3 - Conference contribution
AN - SCOPUS:85046950628
T3 - Conference on Human Factors in Computing Systems - Proceedings
BT - CHI 2018 - Extended Abstracts of the 2018 CHI Conference on Human Factors in Computing Systems
PB - Association for Computing Machinery
T2 - 2018 CHI Conference on Human Factors in Computing Systems, CHI 2018
Y2 - 21 April 2018 through 26 April 2018
ER -