pith. machine review for the scientific record. sign in

arxiv: 2604.26494 · v1 · submitted 2026-04-29 · 💻 cs.HC · cs.AI· cs.CY· cs.ET

Recognition: unknown

Culturally Aware GenAI Risks for Youth: Perspectives from Youth, Parents, and Teachers in a Non-Western Context

Authors on Pith no claims yet

Pith reviewed 2026-05-07 11:48 UTC · model grok-4.3

classification 💻 cs.HC cs.AIcs.CYcs.ET
keywords generative AIyouth privacycultural risksSaudi Arabianon-Western contextsemotional supportfamily honorshared accounts
0
0 comments X

The pith

Youth in Saudi Arabia face privacy risks from GenAI when sharing personal details that clash with cultural expectations of modesty and family honor.

A machine-rendered reading of the paper's core claim, the machinery that carries it, and where it could break.

The paper investigates how generative AI tools create new privacy and safety issues for youth aged 7 to 17 in Saudi Arabia by examining their interactions alongside those of parents and teachers. Through analysis of over 2000 social media posts and interviews with 31 participants, it shows that seeking emotional support from AI often leads to disclosures of personal and family information that violate communal norms around modesty, privacy, and honor. These issues are worsened by socioeconomic practices such as sharing GenAI accounts to reduce costs. The work matters because most prior safety research on AI for youth assumes Western individual privacy models, leaving gaps in understanding relational and cultural risks in communal societies. It concludes with design implications for parental controls that respect local values instead of imposing external standards.

Core claim

Through mixed-methods analysis of Reddit and X posts plus interviews, the study establishes that GenAI use by Saudi youth carries significant risks from disclosing personal and family information, which directly conflicts with culturally rooted expectations of modesty, privacy, and honor. These risks intensify when youth turn to AI for emotional support and are further amplified by cost-driven use of shared accounts within families or among strangers. The findings frame privacy and safety as context-dependent and relational, shaped by communal structures and prescribed social norms, and translate into design implications aligned with parents' and teachers' expectations for appropriate youth-

What carries the argument

Context-dependent and relational privacy formed by communal structure and prescribed norms of modesty, privacy, and honor, which creates conflicts when youth disclose information to GenAI for emotional support.

If this is right

  • GenAI tools require culturally adapted parental controls that align with expectations of modesty and honor rather than standard Western privacy settings.
  • Shared account practices driven by cost create additional exposure pathways that demand targeted safeguards for family or group use.
  • Parents and teachers anticipate guidance mechanisms that let youth use GenAI while preserving relational family privacy.
  • Risk assessments for youth AI use must account for non-Western communal influences instead of applying universal models.

Where Pith is reading between the lines

These are editorial extensions of the paper, not claims the author makes directly.

  • AI developers could add optional cultural privacy modules for regions with strong honor-based norms to reduce unintended disclosures.
  • The same disclosure conflicts may appear in other communal or honor-oriented societies, pointing to the value of comparative studies across countries.
  • Schools or community programs might test workshops that teach youth culturally compatible ways to seek support from AI without violating family expectations.

Load-bearing premise

That the analyzed social media posts and the convenience sample of Saudi youth, parents, and teachers capture representative experiences without major selection or reporting bias.

What would settle it

A broad observational study or larger representative survey of Saudi youth GenAI use that finds no perceived conflicts between emotional support disclosures and family honor or modesty norms would undermine the central claim.

read the original abstract

Generative AI tools are widely used by youth and have introduced new privacy and safety challenges. While prior research has explored youth's safety in GenAI within western context, it often overlooks the cultural, religious, and social dimensions of technology use that strongly shape youths digital experiences in countries like Saudi Arabia. To address the gap, this study explores children (aged 7 to 17), parents and teachers interactions with GenAI tools and risk perceptions through non-western lens. Through a mixed methods approach, we analyzed 736 Reddit and 1,262 X(Twitter) posts and conducted interviews with 31 Saudi Arabian participants (8 youth, 13 parents, 10 teachers). Our findings highlight context dependent and relational privacy and safety of GenAI from non-western context which often formed by communal structure and prescribed norms. We found significant risks tied to youths disclosure of personal and family information, which conflict with culturally rooted expectations of modesty, privacy, and honor, particularly when youth seek emotional support from GenAI. These risks further compounded by socio economic factors such as cost-saving practices leading to the use of shared GenAI accounts (e.g.ChatGPT) within families or even among strangers. We provide design implication reflecting on parents and teachers expectation of how youth should use GenAI. This work lays groundwork for inclusive, context sensitive parental controls that adhere to cultural norms and values.

Editorial analysis

A structured set of objections, weighed in public.

Desk editor's note, referee report, simulated authors' rebuttal, and a circularity audit. Tearing a paper down is the easy half of reading it; the pith above is the substance, this is the friction.

Referee Report

2 major / 1 minor

Summary. This paper claims to explore GenAI risks for youth in a non-Western (Saudi Arabian) context using a mixed-methods approach. It analyzes 736 Reddit posts and 1,262 X posts, supplemented by interviews with 31 Saudi participants (8 youth, 13 parents, 10 teachers). The key findings emphasize context-dependent privacy and safety issues shaped by communal structures and norms, particularly risks from youth disclosing personal and family information that conflict with cultural expectations of modesty, privacy, and honor—especially when seeking emotional support from GenAI. Additional risks arise from socio-economic factors like shared GenAI accounts, and the paper concludes with design implications for culturally sensitive parental controls.

Significance. If the results hold, the paper makes a valuable contribution to the field of human-computer interaction by addressing the gap in research on GenAI safety and privacy for youth outside Western contexts. It provides empirical insights into how cultural, religious, and social dimensions influence technology use in Saudi Arabia, highlighting the need for culturally aware design. The mixed-methods design combining social media scraping and interviews is appropriate and offers complementary breadth and depth. This groundwork for inclusive, context-sensitive parental controls could inform more equitable AI development practices.

major comments (2)
  1. [Methods] The central claim that youth disclosure of personal and family information creates culturally specific risks conflicting with expectations of modesty, privacy, and honor depends on the representativeness of the data sources. The Methods section describes a convenience sample of 31 interviewees without providing details on stratification by region, socio-economic status, gender balance, or religiosity—factors the paper itself identifies as relevant to communal norms and shared-account practices. Similarly, the social media posts (736 Reddit, 1,262 X) are likely skewed toward certain demographics, potentially missing more traditional voices. This could limit the generalizability of the findings to the broader Saudi population.
  2. [Analysis] The thematic analysis of posts and interviews does not report details on coding procedures, such as inter-rater agreement or validation of cultural interpretations. Given that the findings hinge on identifying context-dependent risks tied to cultural norms, the absence of these reliability measures raises questions about the robustness of the thematic categories related to privacy, honor, and emotional support use.
minor comments (1)
  1. [Abstract] The abstract refers to 'X(Twitter)' without clarification; it should specify 'X (formerly Twitter)' to avoid confusion for readers unfamiliar with the platform's rebranding.

Simulated Author's Rebuttal

2 responses · 0 unresolved

We thank the referee for their constructive feedback and for recognizing the value of our work in addressing GenAI risks in a non-Western context. We have carefully considered the major comments and provide point-by-point responses below, along with our plans for revision.

read point-by-point responses
  1. Referee: [Methods] The central claim that youth disclosure of personal and family information creates culturally specific risks conflicting with expectations of modesty, privacy, and honor depends on the representativeness of the data sources. The Methods section describes a convenience sample of 31 interviewees without providing details on stratification by region, socio-economic status, gender balance, or religiosity—factors the paper itself identifies as relevant to communal norms and shared-account practices. Similarly, the social media posts (736 Reddit, 1,262 X) are likely skewed toward certain demographics, potentially missing more traditional voices. This could limit the generalizability of the findings to the broader Saudi population.

    Authors: We agree that detailing the sample characteristics and acknowledging limitations is important for transparency. Our interview recruitment was conducted via convenience sampling through established networks in Saudi Arabia to navigate cultural sensitivities around discussing family and personal matters. We did not explicitly stratify by the mentioned factors due to challenges in recruiting participants for sensitive topics while ensuring voluntary participation and privacy. The social media data consists of publicly available posts, which naturally reflect users willing to discuss GenAI experiences online. In the revised version, we will expand the Methods section to include more information on recruitment procedures, participant demographics where available, and add a limitations paragraph in the Discussion section addressing potential biases and the scope of generalizability. We will also clarify that the study is exploratory and aims to surface culturally specific insights rather than provide population-level estimates. revision: yes

  2. Referee: [Analysis] The thematic analysis of posts and interviews does not report details on coding procedures, such as inter-rater agreement or validation of cultural interpretations. Given that the findings hinge on identifying context-dependent risks tied to cultural norms, the absence of these reliability measures raises questions about the robustness of the thematic categories related to privacy, honor, and emotional support use.

    Authors: We acknowledge the need for greater transparency in our analytical process. The thematic analysis was conducted inductively by the lead author, with iterative discussions and consensus-building among all co-authors, who possess relevant cultural and contextual knowledge of Saudi society. This collaborative approach served to validate cultural interpretations. Formal inter-rater reliability metrics were not computed because the coding was not performed independently by multiple coders but rather through team review. In the revised manuscript, we will provide a detailed account of the coding steps, including how themes were developed, refined, and validated through team consensus and, where feasible, participant feedback. This will strengthen the description of our methods without altering the core findings. revision: partial

Circularity Check

0 steps flagged

No circularity in empirical qualitative analysis

full rationale

The paper reports thematic findings from direct analysis of 736 Reddit posts, 1,262 X posts, and 31 interviews with Saudi participants. No equations, fitted parameters, self-definitional loops, or load-bearing self-citations appear in the provided text; claims about disclosure risks and cultural norms are presented as emerging from the collected data rather than reducing to inputs by construction. This is standard qualitative research with no derivation chain that collapses into its own premises.

Axiom & Free-Parameter Ledger

0 free parameters · 1 axioms · 0 invented entities

The central claims rest on interpretive assumptions about Saudi cultural norms rather than on quantitative models or external benchmarks.

axioms (1)
  • domain assumption Saudi cultural norms around modesty, family honor, and communal privacy strongly shape digital disclosure decisions.
    Used to interpret why certain GenAI interactions constitute risks.

pith-pipeline@v0.9.0 · 5565 in / 1264 out tokens · 37007 ms · 2026-05-07T11:48:00.753644+00:00 · methodology

discussion (0)

Sign in with ORCID, Apple, or X to comment. Anyone can read and Pith papers without signing in.

Reference graph

Works this paper leans on

84 extracted references · 18 canonical work pages · 2 internal anchors

  1. [1]

    Creativeconnect: Supporting reference recombination for graphic design ideation with generative ai,

    D. Choi, S. Hong, J. Park, J. J. Y . Chung, and J. Kim, “Creativeconnect: Supporting reference recombination for graphic design ideation with generative ai,” inProceedings of the 2024 CHI Conference on Human Factors in Computing Systems, ser. CHI ’24. New York, NY , USA: Association for Computing Machinery, 2024. [Online]. Available: https://doi.org/10.11...

  2. [2]

    The co-creative design framework for hybrid intelligence,

    N. Davis, J. Sherson, and J. Rafner, “The co-creative design framework for hybrid intelligence,” inProceedings of the 2025 Conference on Creativity and Cognition, ser. C&C ’25. New York, NY , USA: Association for Computing Machinery, 2025, p. 560–572. [Online]. Available: https://doi-org.proxy2.library.illinois. edu/10.1145/3698061.3726934

  3. [3]

    The Rise of AI Companions: Interaction with AI Companions and Psychological Well-being

    Y . Zhang, D. Zhao, J. T. Hancock, R. Kraut, and D. Yang, “The rise of ai companions: How human-chatbot relationships influence well- being,” 2025. [Online]. Available: https://arxiv.org/abs/2506.12605

  4. [4]

    80% saudi adults reported using ai tools, with 1 in 3 using them regularly,

    L. Alhamawi, “80% saudi adults reported using ai tools, with 1 in 3 using them regularly,” jun 2025, arab News. [Online]. Available: https://www.arabnews.com/node/2604816/saudi-arabia

  5. [5]

    Saudi internet report 2024,

    S. Communications and T. C. (CST), “Saudi internet report 2024,” pp. 1–51, 2024. [Online]. Available: https://www.cst.gov.sa/ en/media-center/news/N2025051200

  6. [6]

    The future of child devel- opment in the ai era. cross-disciplinary perspectives between ai and child development experts,

    M. Neugnot-Cerioli and O. M. Laurenty, “The future of child devel- opment in the ai era. cross-disciplinary perspectives between ai and child development experts,”arXiv preprint arXiv:2405.19275, 2024

  7. [7]

    Privacy and social media use in the arabian gulf: Saudi arabian & qatari traditional values in the digital world,

    N. Abokhodair, S. Abbar, S. Vieweg, and Y . Mejova, “Privacy and social media use in the arabian gulf: Saudi arabian & qatari traditional values in the digital world,”The Journal of Web Science, vol. 3, 2017

  8. [8]

    Exploring social media privacy concerns: a comprehensive survey study across 16 middle eastern and north african countries,

    A. Farooq, J. Salminen, J. D. Martin, K. Aldous, S.-G. Jung, and B. J. Jansen, “Exploring social media privacy concerns: a comprehensive survey study across 16 middle eastern and north african countries,” IEEE Access, vol. 12, pp. 147 087–147 105, 2024

  9. [9]

    Exploring parent- child perceptions on safety in generative ai: Concerns, mitigation strategies, and design implications,

    Y . Yu, T. Sharma, M. Hu, J. Wang, and Y . Wang, “Exploring parent- child perceptions on safety in generative ai: Concerns, mitigation strategies, and design implications,”arXiv preprint arXiv:2406.10461, 2024

  10. [10]

    Understanding generative ai risks for youth: A taxonomy based on empirical data,

    Y . Yu, Y . Liu, J. Zhang, Y . Huang, and Y . Wang, “Understanding generative ai risks for youth: A taxonomy based on empirical data,” arXiv preprint arXiv:2502.16383, 2025

  11. [11]

    Saudi parents’ privacy concerns about their children’s smart device applications,

    E. Alashwali and F. Alashwali, “Saudi parents’ privacy concerns about their children’s smart device applications,” 2022. [Online]. Available: https://arxiv.org/abs/2105.13634

  12. [12]

    Smart spaces, private lives: A culturally grounded study of privacy behaviors in saudi homes,

    Y . Alsiyatet al., “Smart spaces, private lives: A culturally grounded study of privacy behaviors in saudi homes,” in Proceedings of the 21st Symposium on Usable Privacy and Security (SOUPS 2025). USENIX Association, 2025. [Online]. Available: https://www.usenix.org/system/files/soups2025-alsiyat.pdf

  13. [13]

    Investigating how parental perceptions of cybersecurity influence children’s safety in the cyber world: A case study of saudi arabia,

    T. Mian and E. Alatawi, “Investigating how parental perceptions of cybersecurity influence children’s safety in the cyber world: A case study of saudi arabia,”Intelligent Information Management, vol. 15, pp. 350–372, 2023. [Online]. Available: https://www.scirp. org/journal/paperinformation?paperid=127588

  14. [14]

    Saudi parents’ privacy concerns about their children’s smart device applications,

    E. Alashwali and F. Alashwali, “Saudi parents’ privacy concerns about their children’s smart device applications,”International Journal of Child-Computer Interaction, vol. 33, p. 100486, 2022. [Online]. Available: https://www.sciencedirect.com/science/article/ abs/pii/S2212868922000216

  15. [15]

    The privacy paradox applies to iot devices too: A saudi arabian study,

    N. Aleisa, K. Renaud, and I. Bongiovanni, “The privacy paradox applies to iot devices too: A saudi arabian study,”Computers & Security, vol. 96, p. 101897, 2020. [Online]. Available: https: //www.sciencedirect.com/science/article/abs/pii/S0167404820301711

  16. [16]

    Perceived usefulness of internet of things (iot) in the lives of saudi users,

    A. M. Alqarniet al., “Perceived usefulness of internet of things (iot) in the lives of saudi users,”PLOS ONE, vol. 19, no. 1, p. e0280521, 2024. [Online]. Available: https://pmc.ncbi.nlm.nih.gov/ articles/PMC10844255/

  17. [17]

    Unplug, mute, avoid: Investigating smart speaker users’ privacy protection behaviours in saudi homes,

    A. Alorini, Y . Wu, A. Bin Sawad, M. Prasad, and A. B. Kocaballi, “Unplug, mute, avoid: Investigating smart speaker users’ privacy protection behaviours in saudi homes,”arXiv preprint arXiv:2508.04202, 2025. [Online]. Available: https://arxiv.org/abs/ 2508.04202

  18. [18]

    Majority of parents worried about their child’s on- line safety,

    Saudi Gazette, “Majority of parents worried about their child’s on- line safety,” https://saudigazette.com.sa/article/578232, 2019, survey reported in Saudi Gazette with Kaspersky

  19. [19]

    Tasra: a taxonomy and analysis of societal- scale risks from ai,

    A. Critch and S. Russell, “Tasra: a taxonomy and analysis of societal- scale risks from ai,”arXiv preprint arXiv:2306.06924, 2023

  20. [20]

    The AI risk repository: A meta-review, database, and taxonomy of risks from artificial intelligence

    P. Slattery, A. K. Saeri, E. A. Grundy, J. Graham, M. Noetel, R. Uuk, J. Dao, S. Pour, S. Casper, and N. Thompson, “The ai risk repository: A comprehensive meta-review, database, and taxonomy of risks from artificial intelligence,”arXiv preprint arXiv:2408.12622, 2024

  21. [21]

    It’sa fair game, or is it? examining how users navigate disclosure risks and benefits when using llm-based conversational agents,

    Z. Zhang, M. Jia, B. Yao, S. Das, A. Lerner, D. Wang, and T. Li, “It’sa fair game, or is it? examining how users navigate disclosure risks and benefits when using llm-based conversational agents,”arXiv preprint arXiv:2309.11653, 2023

  22. [22]

    Youth understandings of online privacy and security: A dyadic study of children and their parents,

    O. Williams, Y .-Y . Choong, and K. Buchanan, “Youth understandings of online privacy and security: A dyadic study of children and their parents,” inNineteenth Symposium on Usable Privacy and Security (SOUPS 2023), 2023, pp. 399–416

  23. [23]

    Child safety in the smart home: parents’ perceptions, needs, and mitigation strategies,

    K. Sun, Y . Zou, J. Radesky, C. Brooks, and F. Schaub, “Child safety in the smart home: parents’ perceptions, needs, and mitigation strategies,”Proceedings of the ACM on Human-Computer Interaction, vol. 5, no. CSCW2, pp. 1–41, 2021

  24. [24]

    Understanding parents’ perceptions and practices toward children’s security and privacy in virtual reality,

    J. Cao, A. Das, P. Emami-Naeiniet al., “Understanding parents’ perceptions and practices toward children’s security and privacy in virtual reality,” in2024 IEEE Symposium on Security and Privacy (SP). IEEE, 2024, pp. 1554–1572

  25. [25]

    In their own words: What bothers children online?

    S. Livingstone, L. Kirwil, C. Ponte, and E. Staksrud, “In their own words: What bothers children online?”European Journal of Communication, vol. 29, no. 3, pp. 271–288, 2014

  26. [26]

    Parenting styles in arab societies: A first cross-regional research study,

    M. Dwairy, M. Achoui, R. Abouserie, A. Farah, A. A. Sakhleh, M. Fayad, and H. K. Khan, “Parenting styles in arab societies: A first cross-regional research study,”Journal of Cross-Cultural Psychology, vol. 37, 2006. [Online]. Available: https://doi-org.ezaccess.libraries. psu.edu/10.1177/0022022106286922

  27. [27]

    Risk assessments of virtual interactions on saudi families,

    H. F. A. Moubarak and A. Afthanorhan, “Risk assessments of virtual interactions on saudi families,”Humanities and Social Sciences Communications, vol. 11, pp. 1–9, 2024. [Online]. Available: https://api.semanticscholar.org/CorpusID:267749452

  28. [28]

    Internet risks for children: Parents’ perceptions and attitudes: An investigative study of the saudi context,

    N. Alqahtani, S. Furnell, S. Atkinson, and I. Stengel, “Internet risks for children: Parents’ perceptions and attitudes: An investigative study of the saudi context,”2017 Internet Technologies and Applications (ITA), pp. 98–103, 2017. [Online]. Available: https: //api.semanticscholar.org/CorpusID:3208549

  29. [29]

    Assessing the validity of western measurement of online risks to children in an asian context,

    M. Teimouri, M. S. Hassan, M. D. Griffiths, S. R. Benrazavi, J. Bolong, A. Daud, and N. A. Adzharuddin, “Assessing the validity of western measurement of online risks to children in an asian context,” Child Indicators Research, vol. 9, pp. 407–428, 2016. [Online]. Available: https://api.semanticscholar.org/CorpusID:144497740

  30. [30]

    Why children are unsafe in cyberspace,

    D. Panhans, L. Hoteit, S. Yousuf, T. Breward, A. AlFaadhel, and B. AlShaalan, “Why children are unsafe in cyberspace,” sep 2022, bCG. [Online]. Available: https://www.bcg.com/publications/2022/ why-children-are-unsafe-in-cyberspace

  31. [31]

    Unravelling cyberbullying among egyptian adolescents: the protective influence of self-control and moral identity with gender and socioeconomic dynamics,

    B. E. M. Othman, S. M. Z. Abdelhai, M. I. T. Ibrahim, A. E. M. Hamed, A. M. Barakat, and E. E. Elsayed, “Unravelling cyberbullying among egyptian adolescents: the protective influence of self-control and moral identity with gender and socioeconomic dynamics,”BMC Psychology, vol. 13, 2025. [Online]. Available: https://api.semanticscholar.org/CorpusID:277851724

  32. [32]

    The factors of cyberbullying among the basic stage students in the city of al-ain: A study on a sample of parents in the city of al-ain,

    M. H. Rehima, K. M. Al-Tkhaynehb, and W. K. Al-Shamsc, “The factors of cyberbullying among the basic stage students in the city of al-ain: A study on a sample of parents in the city of al-ain,”nternational Journal of Innovation, Creativity and Change,

  33. [33]

    Available: https://api.semanticscholar.org/CorpusID: 218528984

    [Online]. Available: https://api.semanticscholar.org/CorpusID: 218528984

  34. [34]

    Prevalence of cyberbullying and associated factors among adolescents in dubai schools: complex design survey – 2019,

    S. Farooq, M. Abdullatif, and A. Altheeb, “Prevalence of cyberbullying and associated factors among adolescents in dubai schools: complex design survey – 2019,”International Journal of Adolescence and Youth, vol. 28, 2023. [Online]. Available: https://api.semanticscholar.org/CorpusID:265228028

  35. [35]

    Parents’ perception of cyberbullying of their children in saudi arabia,

    S. A. Alfakeh, A. Alghamdi, K. A. Kouzaba, M. Altaifi, S. Abu- Alamah, and M. M. Salamah, “Parents’ perception of cyberbullying of their children in saudi arabia,”Journal of Family & Community Medicine, vol. 28, pp. 117 – 124, 2021. [Online]. Available: https://api.semanticscholar.org/CorpusID:235250129

  36. [36]

    From entertainment to extortion: Tunisian children’s online experiences

    A. P. Martin, H. Keskes, W. Heni, P. Burton, A. Deliege, C. Rabhi, and R. Ayari, “From entertainment to extortion: Tunisian children’s online experiences.”Child abuse & neglect, vol. 145, p. 106405,

  37. [37]

    Available: https://api.semanticscholar.org/CorpusID: 261219941

    [Online]. Available: https://api.semanticscholar.org/CorpusID: 261219941

  38. [38]

    Digital literacy for children exploring definitions and frameworks,

    UNICEF, “Digital literacy for children exploring definitions and frameworks,” aug 2019, uNICEF. [Online]. Available: https://www.unicef.org/innocenti/media/1216/file/ %20UNICEF-Global-Insight-digital-literacy-scoping-paper-2020. pdfa

  39. [39]

    Cybersecurity early education: A review of current cybersecurity education for young children,

    E. Ebrahimi, M. Pare, G. Stoker, and S. White, “Cybersecurity early education: A review of current cybersecurity education for young children,” inInternational Conference on Computer Supported Education, 2025. [Online]. Available: https://api.semanticscholar.org/ CorpusID:277964299

  40. [40]

    Artificial intelligence (ai) literacy in early childhood education: The challenges and opportunities,

    J. Su, D. T. K. Ng, and S. K.-W. Chu, “Artificial intelligence (ai) literacy in early childhood education: The challenges and opportunities,”Comput. Educ. Artif. Intell., vol. 4, p. 100124,

  41. [41]

    Available: https://api.semanticscholar.org/CorpusID: 255877185

    [Online]. Available: https://api.semanticscholar.org/CorpusID: 255877185

  42. [42]

    D. A. A. Almethen and D. M. A. Alomair, “The role of age, grade level, and subject area in determining the inclusion of digital citizenship elements in elementary school curricula: Perspectives of teachers in the kingdom of saudi arabia,”Heliyon, vol. 10,

  43. [43]

    Available: https://api.semanticscholar.org/CorpusID: 271203269

    [Online]. Available: https://api.semanticscholar.org/CorpusID: 271203269

  44. [44]

    Cybersecurity awareness and its impact on protecting children in cyberspace,

    A. AlShabibi and M. N. Al-Suqri, “Cybersecurity awareness and its impact on protecting children in cyberspace,”2021 22nd International Arab Conference on Information Technology (ACIT), pp. 1–6,

  45. [45]

    Available: https://api.semanticscholar.org/CorpusID: 246028191

    [Online]. Available: https://api.semanticscholar.org/CorpusID: 246028191

  46. [46]

    Tech giants agree to child safety principles around generative ai,

    M. Landi, “Tech giants agree to child safety principles around generative ai,” April 2024, the- independent. [Online]. Available: https://www.the-independent.com/ tech/thorn-google-openai-microsoft-meta-b2533348.html

  47. [47]

    Parents of 16-year-old sue openai, claiming chatgpt advised on his suicide,

    C. Duffy, “Parents of 16-year-old sue openai, claiming chatgpt advised on his suicide,” Aug 2025, cNN. [Online]. Available: https: //www.cnn.com/2025/08/26/tech/openai-chatgpt-teen-suicide-lawsuit

  48. [48]

    Chatgpt to add parental controls for teen users within the next month,

    A. Yang, “Chatgpt to add parental controls for teen users within the next month,” Sep 2025, nBC. [Online]. Available: https://www.nbcnews.com/tech/innovation/ chatgpt-adds-parental-controls-teen-users-openai-rcna228506

  49. [49]

    Building more helpful chatgpt experiences for everyone,

    AOpenAI, “Building more helpful chatgpt experiences for everyone,” Sep 2025, openAI. [Online]. Available: https://openai.com/index/ building-more-helpful-chatgpt-experiences-for-everyone/

  50. [50]

    Manage your child’s access to gemini apps,

    Google, “Manage your child’s access to gemini apps,” google. [Online]. Available: https://support.google.com/families/ answer/16109150?hl=en

  51. [51]

    Google is going to let kids use its gemini ai,

    U. Shakir, “Google is going to let kids use its gemini ai,” May 2025, the verge. [Online]. Available: https://www.theverge.com/news/660678/ google-gemini-ai-children-under-13-family-link-chatbot-access

  52. [52]

    Use parental controls on your child’s iphone or ipad,

    Apple, “Use parental controls on your child’s iphone or ipad,” May 2025, apple. [Online]. Available: https://support.apple.com/en-us/ 105121

  53. [53]

    Help keep your family safer online,

    Google, “Help keep your family safer online,” google. [Online]. Available: https://families.google/intl/my/familylink/

  54. [54]

    Snapchat and uae ministry launch new parental control feature,

    ArabNews, “Snapchat and uae ministry launch new parental control feature,” sep 2022, arabNews. [Online]. Available: https: //www.arabnews.com/node/2162576/media

  55. [55]

    Saudi parents’ privacy concerns about their children’s smart device applications,

    E. S. Alashwali and F. Alashwali, “Saudi parents’ privacy concerns about their children’s smart device applications,”Int. J. Child Comput. Interact., vol. 33, p. 100486, 2021. [Online]. Available: https://api.semanticscholar.org/CorpusID:248392432

  56. [56]

    Understanding users’ se- curity and privacy concerns and attitudes towards conversational ai platforms,

    M. Ali, A. Arunasalam, and H. Farrukh, “Understanding users’ se- curity and privacy concerns and attitudes towards conversational ai platforms,” in2025 IEEE Symposium on Security and Privacy (SP), 2025, pp. 298–316

  57. [57]

    X users, stats, data & trends for 2025,

    D. G. D. Insights, “X users, stats, data & trends for 2025,” 2025. [Online]. Available: https://datareportal.com/essential-x-stats

  58. [58]

    Reddit user agreement,

    Reddit, “Reddit user agreement,” 2025. [Online]. Available: https://redditinc.com/policies/user-agreement#:∼:text=No%20one% 20under%2013%20is,view%20mature%20content%20on%20Reddit

  59. [59]

    About parental consent on x

    X, “About parental consent on x.” [Online]. Available: https: //help.x.com/en/using-x/parental-consent

  60. [60]

    Praw: The python reddit api wrapper

    PRAW, “Praw: The python reddit api wrapper.” [Online]. Available: https://praw.readthedocs.io/en/stable/a

  61. [61]

    Twitter search scraper

    Apify, “Twitter search scraper.” [Online]. Available: https://apify. com/epctex/twitter-search-scraper

  62. [62]

    Children in saudi arabia among youngest in the world to receive first mobile device: Norton research,

    ZAWY A, “Children in saudi arabia among youngest in the world to receive first mobile device: Norton research,” November 2018. [Online]. Available: https://tinyurl.com/mwk9bscw

  63. [63]

    A systematic literature review on cyber security education for children,

    R. B. Sa ˘glam, V . Miller, and V . N. L. Franqueira, “A systematic literature review on cyber security education for children,”IEEE Transactions on Education, vol. 66, no. 3, pp. 274–286, 2023

  64. [64]

    Reliability and inter- rater reliability in qualitative research: Norms and guidelines for cscw and hci practice,

    N. McDonald, S. Schoenebeck, and A. Forte, “Reliability and inter- rater reliability in qualitative research: Norms and guidelines for cscw and hci practice,”Proceedings of the ACM on human-computer interaction, vol. 3, no. CSCW, pp. 1–23, 2019

  65. [65]

    Privacy & social media in the context of the arab gulf,

    N. Abokhodair and S. Vieweg, “Privacy & social media in the context of the arab gulf,”Proceedings of the 2016 ACM Conference on Designing Interactive Systems, 2016. [Online]. Available: https://api.semanticscholar.org/CorpusID:16124621

  66. [66]

    An exploratory study of attitudes towards privacy in social media and the threat of blackmail: The views of a group of saudi women,

    Y . Al-Saggaf, “An exploratory study of attitudes towards privacy in social media and the threat of blackmail: The views of a group of saudi women,”The Electronic Journal of Information Systems in Developing Countries, vol. 75, 2016. [Online]. Available: https://api.semanticscholar.org/CorpusID:148465697

  67. [67]

    User perceptions and experiences of targeted ads on social media platforms: Learning from bangladesh and india,

    T. Sharma, S. Kaushik, Y . Yu, S. I. Ahmed, and Y . Wang, “User perceptions and experiences of targeted ads on social media platforms: Learning from bangladesh and india,” in Proceedings of the 2023 CHI Conference on Human Factors in Computing Systems, ser. CHI ’23. New York, NY , USA: Association for Computing Machinery, 2023. [Online]. Available: https:...

  68. [68]

    Exploring families’ use and mediation of generative ai: A multi-user perspective,

    S. Zhang, B. Cagiltay, J. Li, D. Sullivan, B. Mutlu, H. Kirkorian, and K. Fawaz, “Exploring families’ use and mediation of generative ai: A multi-user perspective,”arXiv preprint arXiv:2504.09004, 2025

  69. [69]

    The role of ai in peer support for young people: A study of preferences for human- and ai- generated responses,

    J. Young, L. M. Jawara, D. N. Nguyen, B. P. Daly, J. Huh- Yoo, and A. Razi, “The role of ai in peer support for young people: A study of preferences for human- and ai- generated responses,”Proceedings of the 2024 CHI Conference on Human Factors in Computing Systems, 2024. [Online]. Available: https://api.semanticscholar.org/CorpusID:269605057

  70. [70]

    Prac3 (privacy, reputation, accountability, consent, credit, compensation): V oice actors in ai data- economy,

    T. Sharma, Y . Zhou, and V . Berisha, “Prac3 (privacy, reputation, accountability, consent, credit, compensation): V oice actors in ai data- economy,” inProceedings of the AAAI/ACM Conference on AI, Ethics, and Society, vol. 8, no. 3, 2025, pp. 2360–2372

  71. [71]

    Aligning ai with public values: Deliberation and decision-making for governing multimodal llms in political video analysis,

    T. Sharma, Y . Potter, Z. Kilhoffer, Y . Huang, D. Song, and Y . Wang, “Aligning ai with public values: Deliberation and decision-making for governing multimodal llms in political video analysis,” inProceedings of the AAAI/ACM Conference on AI, Ethics, and Society, vol. 8, no. 3, 2025, pp. 2345–2359

  72. [72]

    ” i’m not convinced that they don’t collect more than is necessary

    T. Sharma, L. Kyi, Y . Wang, and A. J. Biega, “” i’m not convinced that they don’t collect more than is necessary”:{User-Controlled}data minimization design in search engines,” in33rd USENIX Security Symposium (USENIX Security 24), 2024, pp. 2797–2812

  73. [73]

    Doodlebot: An educational robot for creativity and ai literacy,

    R. Williams, S. Ali, R. Alcantara, T. Burghleh, S. Alghowinem, and C. Breazeal, “Doodlebot: An educational robot for creativity and ai literacy,”2024 19th ACM/IEEE International Conference on Human-Robot Interaction (HRI), pp. 772–780, 2024. [Online]. Available: https://api.semanticscholar.org/CorpusID:268330712

  74. [74]

    Developing middle school students’ ai literacy,

    I. A. Lee, S. Ali, H. Zhang, D. DiPaola, and C. Breazeal, “Developing middle school students’ ai literacy,”Proceedings of the 52nd ACM Technical Symposium on Computer Science Education,

  75. [75]

    Available: https://api.semanticscholar.org/CorpusID: 232126002

    [Online]. Available: https://api.semanticscholar.org/CorpusID: 232126002

  76. [76]

    Constructionism, ethics, and creativity: Developing primary and middle school artificial intelligence education,

    S. Ali, B. H. Payne, R. Williams, H. W. Park, and C. Breazeal, “Constructionism, ethics, and creativity: Developing primary and middle school artificial intelligence education,” 2019. [Online]. Available: https://api.semanticscholar.org/CorpusID:199457395

  77. [77]

    Ai + ethics curricula for middle school youth: Lessons learned from three project- based curricula,

    R. Williams, S. Ali, N. Devasia, D. DiPaola, J. Hong, S. P. Kaputsos, B. Jordan, and C. Breazeal, “Ai + ethics curricula for middle school youth: Lessons learned from three project- based curricula,”International Journal of Artificial Intelligence in Education, pp. 1 – 59, 2022. [Online]. Available: https: //api.semanticscholar.org/CorpusID:251263208

  78. [78]

    Understanding teacher perspectives and experiences after deployment of ai literacy curriculum in middle-school classrooms,

    P. Ravi, A. Broski, G. Stump, H. Abelson, E. Klopfer, and C. Breazeal, “Understanding teacher perspectives and experiences after deployment of ai literacy curriculum in middle-school classrooms,”ArXiv, vol. abs/2312.04839, 2023. [Online]. Available: https://api.semanticscholar.org/CorpusID:265654961

  79. [79]

    Developing a holistic ai literacy framework for children,

    K. Jia, T. H. M. Leung, N. Y . I. Cheung, Y . Li, and J. Yu, “Developing a holistic ai literacy framework for children,”ACM Transactions on Computing Education, vol. 25, pp. 1 – 30, 2025. [Online]. Available: https://api.semanticscholar.org/CorpusID:277587818

  80. [80]

    Envisioning ai for k-12: What should every child know about ai?

    D. S. Touretzky, C. Gardner-Mccune, F. G. Martin, and D. W. Seehorn, “Envisioning ai for k-12: What should every child know about ai?” inAAAI Conference on Artificial Intelligence,

Showing first 80 references.