skip to main content
10.1145/1837110.1837130acmotherconferencesArticle/Chapter ViewAbstractPublication PagessoupsConference Proceedingsconference-collections
research-article

Parenting from the pocket: value tensions and technical directions for secure and private parent-teen mobile safety

Published: 14 July 2010 Publication History

Abstract

An increasing number of high-tech devices, such as driver monitoring systems and Internet usage monitoring tools, are advertised as useful or even necessary for good parenting of teens. Simultaneously, there is a growing market for mobile "personal safety" devices. As these trends merge, there will be significant implications for parent-teen relationships, affecting domains such as privacy, trust, and maturation. Not only the teen and his or her parents are affected; other important stakeholders include the teen's friends who may be unwittingly monitored. This problem space, with less clear-cut assets, risks, and affected parties, thus lies well outside of more typical computer security applications.
To help understand this problem domain and what, if anything, should be built, we turn to the theory and methods of Value Sensitive Design, a systematic approach to designing for human values in technology. We first develop value scenarios that highlight potential issues, benefits, harms, and challenges. We then conducted semi-structured interviews with 18 participants (9 teens and their parents). Results show significant differences with respect to information about: 1) internal state (e.g., mood) versus external environment (e.g., location) state; 2) situation (e.g., emergency vs. non-emergency); and 3) awareness (e.g., notification vs. non-notification). The value scenario and interview results positioned us to identify key technical challenges -- such as strongly protecting the privacy of a teen's contextual information during ordinary situations but immediately exposing that information to others as appropriate in an emergency -- and corresponding architectural levers for these technologies.
In addition to laying a foundation for future work in this area, this research serves as a prototypical example of using Value Sensitive Design to explicate the underlying human values in complex security domains.

References

[1]
PC Tattletale internet monitoring software & parental control software, 2009. http://www.pctattletale.com/.
[2]
B. F. Batya, P. H. Kahn Jr., J. Hagman, R. L. Severson, and B. Gill. The watcher and the watched: social judgments about privacy in a public place. Human Computer Interaction, 21(2):235--272, 2006.
[3]
A. Beresford and F. Stajano. Location privacy in pervasive computing. In IEEE Pervasive Computing, 2003.
[4]
D. Boyd and J. Heer. Profiles as conversation: Networked identity performance on Friendster. In HICSS-39, January 2006.
[5]
BrickHouseSecurity.com. Cell phone spy, 2009. http://brickhousesecurity.com/cellphone-spy-simcardreader.html.
[6]
BrickHouseSecurity.com. BrickHouse child locator with wander alerts, 2010. http://www.brickhousesecurity.com/child-locator.html.
[7]
J. Clark and U. Hengartner. Panic passwords: authenticating under duress. In HOTSEC'08: Proceedings of the 3rd conference on Hot topics in security, pages 1--6, Berkeley, CA, USA, 2008. USENIX Association.
[8]
J. Davis, P. Lin, A. Borning, B. Friedman, P. H. Kahn Jr., and P. A. Waddell. Simulations for urban planning: Designing for human values. Computer, 39:66--72, 2006.
[9]
J. DeFao. Parents turn to tech toys to track teens, 2006. http://bit.ly/trackteens.
[10]
T. Denning, A. Borning, B. Friedman, B. Gill, T. Kohno, and W. H. Maisel. Patients, pacemakers, and implantable defibrillators: Human values and security for wireless implantable medical devices. In Proc. CHI 2010, pages 917--926. ACM Press, 2010.
[11]
DriveCam, Inc. Driver safety and fleet safety vehicle safety | DriveCam driver risk management, 2009. http://www.drivecam.com.
[12]
Y. Duan and J. Canny. Protecting user data in ubiquitous computing environments: Towards trustworthy environments. In Privacy Enhancing Technologies: Proc. 4th International Workshop (PET 2004). Springer, 2004.
[13]
J. L. Fleiss, B. Levin, and M. C. Paik. Statistical methods for rates and proportions. John Wiley & Sons, third edition, 2003.
[14]
B. Friedman, P. H. Kahn Jr., and A. Borning. Value Sensitive Design and information systems: Three case studies. In Human-Computer Interaction and Management Information Systems: Foundations. M.E. Sharpe, Armonk, NY, 2006.
[15]
B. Friedman, P. Lin, and J. K. Miller. Informed consent by design. In Designing Secure Systems That People Can Use, pages 495--521. O'Reilly and Associates, 2005.
[16]
B. Friedman, I. E. Smith, P. H. Kahn Jr., S. Consolvo, and J. Selawski. Development of a privacy addendum for open source licenses: Value Sensitive Design in industry. In Ubicomp, pages 194--211, 2006.
[17]
R. Geambasu, T. Kohno, A. Levy, and H. M. Levy. Vanish: Increasing data privacy with self-destructing data. In Proc. of the 18th USENIX Security Symposium, 2009.
[18]
M. Group Media. Is That an Interesting Conversation?, 2009. http://groupmedia.media.mit.edu/interest.php.
[19]
G. Iachello, I. Smith, S. Consolvo, M. Chen, and G. Abowd. Developing privacy guidelines for social location disclosure applications and services. In Symposium on Usable Privacy and Security, 2005.
[20]
A. Jacobs and G. Abowd. A framework for comparing perspectives on privacy and pervasive technologies. In IEEE Pervasive Computing, volume 2, 2003.
[21]
X. Jiang, J. I. Hong, and J. A. Landay. Approximate information flows: Socially-based modeling of privacy in ubiquitous computing. In UbiComp, 2002.
[22]
P. H. Kahn, H. Ishiguro, B. Friedman, and T. K. What is a human? Toward psychological benchmarks in the field of human-robot interaction. In Proceedings of the 15th International Symposium on Robot and Human Interactive Communication (RO-MAN '06), pages 364--371. IEEE, 2006.
[23]
A. LaMarca, Y. Chawathe, S. Consolvo, J. Hightower, I. Smith, J. Scott, T. Sohn, J. Howard, J. Hughes, F. Potter, J. Tabert, P. Powledge, G. Borriello, and B. Schilit. Place Lab: Device positioning using radio beacons in the wild. In Pervasive Computing, 2005.
[24]
J. Landis and G. Koch. The Measurement of Observer Agreement for Categorical Data. Biometrics, 33, 1977.
[25]
P. MacKenzie. An efficient two-party public key cryptosystem secure against adaptive chosen ciphertext attack. In PKC, 2003.
[26]
N. Marmasse and C. Schmandt. Safe & sound: a wireless leash. In Ext. Abstracts CHI 2003, pages 726--727. ACM Press, 2003.
[27]
J. K. Miller, B. Friedman, and G. Jancke. Value tensions in design: the value sensitive design, development, and appropriation of a corporation's groupware system. In GROUP, pages 281--290, 2007.
[28]
L. I. Millett, B. Friedman, and E. W. Felten. Cookies and web browser design: toward realizing informed consent online. In Proc. CHI 2001, pages 46--52. ACM Press, 2001.
[29]
E. Miluzzo, N. D. Lane, S. B. Eisenman, and A. T. Campbell. CenceMe -- injecting sensing presence into social networking applications. www.cs.dartmouth.edu/~campbell/cenceme.pdf.
[30]
Mobile Teen GPS. GPS vehicle tracking for teen drivers, 2009. http://www.mobileteengps.com/.
[31]
Monitoring Software Reviews. Parental control software & internet monitoring software reviews, 2009. http://www.monitoringsoftwarereviews.org/.
[32]
My Mobile Witness, Inc. My Mobile Witness(sm), 2008. http://www.mymobilewitness.com.
[33]
G. Myles, A. Friday, and N. Davies. Preserving privacy in environments with location-based applications. In IEEE Pervasive Computing, 2003.
[34]
L. P. Nathan, P. V. Klasnja, and B. Friedman. Value scenarios: a technique for envisioning systemic effects of new technologies. In Ext. Abstracts CHI 2007, pages 2585--2590. ACM Press, 2007.
[35]
NaVee Technologies, LLC. FreeFamilyWatch, 2008. http://www.freefamilywatch.com.
[36]
L. Skenazy. Free Range Kids. Jossey-Bass, 2009.
[37]
WebWatcher. Monitor computer use with remote computer monitoring software, 2009. http://www.webwatchernow.com.
[38]
C. White. Bladerunner GPS jacket locates kids, replicants, 2009. http://tinyurl.com/GPSjacket.
[39]
S. Yang, Q. Li, X. Wang, Y. Li, and R. Huang. Analysis on the prospects of parent-adolescent communication served by mobile technology. In WMUTE '08: Proceedings of the Fifth IEEE International Conference on Wireless, Mobile, and Ubiquitous Technology in Education, pages 213--215, Washington, DC, USA, 2008. IEEE Computer Society.

Cited By

View all
  • (2024)Transitioning Together: Collaborative Work in Adolescent Chronic Illness ManagementProceedings of the ACM on Human-Computer Interaction10.1145/36869568:CSCW2(1-24)Online publication date: 8-Nov-2024
  • (2024)Surveying a Landscape of Ethics-Focused Design MethodsACM Journal on Responsible Computing10.1145/36789881:3(1-32)Online publication date: 17-Jul-2024
  • (2024)Drinking Chai with Your (AI) Programming Partner: Value Tensions in the Tokenization of Future Human-AI Collaborative WorkProceedings of the 3rd Annual Meeting of the Symposium on Human-Computer Interaction for Work10.1145/3663384.3663390(1-15)Online publication date: 25-Jun-2024
  • Show More Cited By

Index Terms

  1. Parenting from the pocket: value tensions and technical directions for secure and private parent-teen mobile safety

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Other conferences
    SOUPS '10: Proceedings of the Sixth Symposium on Usable Privacy and Security
    July 2010
    236 pages
    ISBN:9781450302647
    DOI:10.1145/1837110

    Sponsors

    • Carnegie Mellon University: Carnegie Mellon University

    In-Cooperation

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 14 July 2010

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. direct and indirect stakeholders
    2. maturation
    3. mobile phones
    4. parenting technologies
    5. privacy
    6. safety
    7. security
    8. teenagers
    9. value dams and flows
    10. value sensitive design
    11. value tensions

    Qualifiers

    • Research-article

    Funding Sources

    Conference

    SOUPS '10
    Sponsor:
    • Carnegie Mellon University
    SOUPS '10: Symposium on Usable Privacy and Security
    July 14 - 16, 2010
    Washington, Redmond, USA

    Acceptance Rates

    Overall Acceptance Rate 15 of 49 submissions, 31%

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)111
    • Downloads (Last 6 weeks)14
    Reflects downloads up to 15 Feb 2025

    Other Metrics

    Citations

    Cited By

    View all
    • (2024)Transitioning Together: Collaborative Work in Adolescent Chronic Illness ManagementProceedings of the ACM on Human-Computer Interaction10.1145/36869568:CSCW2(1-24)Online publication date: 8-Nov-2024
    • (2024)Surveying a Landscape of Ethics-Focused Design MethodsACM Journal on Responsible Computing10.1145/36789881:3(1-32)Online publication date: 17-Jul-2024
    • (2024)Drinking Chai with Your (AI) Programming Partner: Value Tensions in the Tokenization of Future Human-AI Collaborative WorkProceedings of the 3rd Annual Meeting of the Symposium on Human-Computer Interaction for Work10.1145/3663384.3663390(1-15)Online publication date: 25-Jun-2024
    • (2024)Porous by Design: How Childcare Platforms Impact Worker Personhood, Safety, and ConnectionProceedings of the 2024 ACM Designing Interactive Systems Conference10.1145/3643834.3661552(1336-1349)Online publication date: 1-Jul-2024
    • (2024)"It's hard for him to make choices sometimes and he needs guidance": Re-orienting Parental Control for ChildrenProceedings of the ACM on Human-Computer Interaction10.1145/36373598:CSCW1(1-51)Online publication date: 26-Apr-2024
    • (2024)Challenges in Value-Sensitive AI Design: Insights from AI Practitioner InterviewsInternational Journal of Human–Computer Interaction10.1080/10447318.2024.2439021(1-18)Online publication date: 18-Dec-2024
    • (2024)AI ethics unwrapped: an empirical investigation of ethical principles in collaborative ideation processesAI and Ethics10.1007/s43681-024-00638-9Online publication date: 27-Dec-2024
    • (2024)Are UK Parents Empowered to Act on Their Cybersecurity Education Responsibilities?HCI for Cybersecurity, Privacy and Trust10.1007/978-3-031-61379-1_6(77-96)Online publication date: 29-Jun-2024
    • (2023)Instagram Çağının Dijital Ebeveynleri: Sharenting Bağlamında Bir İncelemeDigital Parents of the Instagram Age: A Review in the Context of SharentingTRT Akademi10.37679/trta.132835408:19(766-785)Online publication date: 30-Sep-2023
    • (2023)Toward Diabetes Device Development That Is Mindful to the Needs of Young People Living With Type 1 Diabetes: A Data- and Theory-Driven Qualitative StudyJMIR Diabetes10.2196/433778(e43377)Online publication date: 25-Jan-2023
    • Show More Cited By

    View Options

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Figures

    Tables

    Media

    Share

    Share

    Share this Publication link

    Share on social media