Abstract:
Children can easily bypass the mechanisms adopted by apps to verify their age and, thereby, be exposed to privacy and safety threats. We identified how the top 10 social ...Show MoreMetadata
Abstract:
Children can easily bypass the mechanisms adopted by apps to verify their age and, thereby, be exposed to privacy and safety threats. We identified how the top 10 social and communication apps among underage users apply age limits.
Published in: IEEE Software ( Volume: 39, Issue: 3, May-June 2022)