[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
10.1145/1124772.1124790acmconferencesArticle/Chapter ViewAbstractPublication PageschiConference Proceedingsconference-collections
Article

Girls, technology and privacy: "is my mother listening?"

Published: 22 April 2006 Publication History

Abstract

This paper describes a study undertaken to explore the ways in which older teenage girls use technology to construct and maintain a sense of private space while living at home with parents. The study used blogging as an experimental and integral part of the research, in order to facilitate ongoing communication between researcher and participant.

References

[1]
Green, N. (2002). Who's Watching Whom? Monitoring and Accountability in Mobile Relations. In B. Brown, N. Green & R. Harper (Eds.), Wireless World: Social and Interactional Aspects of the Mobile Age (pp. 32-45). London: Springer-Verlag.
[2]
Grinter, R.E. and Eldridge, M., y do tngrs luv 2 txt msg? Proc. of Seventh European Conference on CSCW. (Bonn, Germany, Sept. 2001).
[3]
Grinter, R.E. and Palen, L., Instant Messaging in Teen Life. Proc. of CSCW '02. (New Orleans, USA, Nov. 2002).
[4]
Ito, M. and Okabe, D. Intimate Connections: Contextualizing Japanese Youth and Mobile Messaging in Harper, R., Palen, L. and Taylor, A. Eds., Inside the Text: Social Perspectives on SMS in the Mobile Age (Forthcoming).
[5]
March, W. and Fleuriot, C. The Worst Technology for Girls. Proc. of EPIC '06 (Redmond, USA, Nov. 2005).

Cited By

View all
  • (2024)Overview of Usable Privacy Research: Major Themes and Research DirectionsThe Curious Case of Usable Privacy10.1007/978-3-031-54158-2_3(43-102)Online publication date: 20-Mar-2024
  • (2017)The Third Wave?Proceedings of the 2017 New Security Paradigms Workshop10.1145/3171533.3171538(122-130)Online publication date: 1-Oct-2017
  • (2016)Monitoring children's physical activity and sleepProceedings of the 28th Australian Conference on Computer-Human Interaction10.1145/3010915.3010936(50-58)Online publication date: 29-Nov-2016
  • Show More Cited By

Index Terms

  1. Girls, technology and privacy: "is my mother listening?"

    Recommendations

    Comments

    Please enable JavaScript to view thecomments powered by Disqus.

    Information & Contributors

    Information

    Published In

    cover image ACM Conferences
    CHI '06: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
    April 2006
    1353 pages
    ISBN:1595933727
    DOI:10.1145/1124772
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Sponsors

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 22 April 2006

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. blogs
    2. mobility
    3. phones
    4. privacy
    5. teenage girls

    Qualifiers

    • Article

    Conference

    CHI06
    Sponsor:
    CHI06: CHI 2006 Conference on Human Factors in Computing Systems
    April 22 - 27, 2006
    Québec, Montréal, Canada

    Acceptance Rates

    Overall Acceptance Rate 6,199 of 26,314 submissions, 24%

    Upcoming Conference

    CHI 2025
    ACM CHI Conference on Human Factors in Computing Systems
    April 26 - May 1, 2025
    Yokohama , Japan

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)11
    • Downloads (Last 6 weeks)0
    Reflects downloads up to 03 Jan 2025

    Other Metrics

    Citations

    Cited By

    View all
    • (2024)Overview of Usable Privacy Research: Major Themes and Research DirectionsThe Curious Case of Usable Privacy10.1007/978-3-031-54158-2_3(43-102)Online publication date: 20-Mar-2024
    • (2017)The Third Wave?Proceedings of the 2017 New Security Paradigms Workshop10.1145/3171533.3171538(122-130)Online publication date: 1-Oct-2017
    • (2016)Monitoring children's physical activity and sleepProceedings of the 28th Australian Conference on Computer-Human Interaction10.1145/3010915.3010936(50-58)Online publication date: 29-Nov-2016
    • (2016)Engaging Teens in Dialogue on Potential Technological Futures with User EnactmentsPerspectives on HCI Research with Teenagers10.1007/978-3-319-33450-9_7(151-178)Online publication date: 4-Aug-2016
    • (2016)Research Strategies for Mobile HealthcareMobile Technologies as a Health Care Tool10.1007/978-3-319-05918-1_3(43-55)Online publication date: 23-Feb-2016
    • (2015)Texting: Its Uses, Misuses, and EffectsEncyclopedia of Mobile Phone Behavior10.4018/978-1-4666-8239-9.ch099(1214-1241)Online publication date: 2015
    • (2014)Intruders versus intrusivenessProceedings of the 2014 ACM International Joint Conference on Pervasive and Ubiquitous Computing10.1145/2632048.2632107(129-139)Online publication date: 13-Sep-2014
    • (2013)At the mobile experience flicksProceedings of the 15th international conference on Human-computer interaction with mobile devices and services10.1145/2493190.2493226(304-307)Online publication date: 27-Aug-2013
    • (2013)How and why teenagers use video chatProceedings of the 2013 conference on Computer supported cooperative work10.1145/2441776.2441861(759-768)Online publication date: 23-Feb-2013
    • (2012)The hankie probeCHI '12 Extended Abstracts on Human Factors in Computing Systems10.1145/2212776.2223729(1919-1924)Online publication date: 5-May-2012
    • Show More Cited By

    View Options

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media