T. Ahmed, P. Shaffer, K. Connelly, D. Crandall, and &. A. Kapadia, Addressing Physical Safety, Security, and Privacy for People with Visual Impairments, SOUPS 2016, 2016.

S. Baron?cohen, Do autistic children have obsessions and compulsions?, British Journal of Clinical Psychology, vol.28, issue.3, pp.193-200, 1989.
DOI : 10.1111/j.2044-8260.1989.tb01369.x

P. Benford, The use of Internet-based communication by people with autism. Doc- toral dissertation, University of Nottingham, 2008.

T. Brugha, S. Cooper, S. Mcmanus, S. Purdon, J. Smith et al., Estimating the prevalence of Austism Spectrum Conditions in Adults: Extending the 2007 Adult Psychiatric Morbidity Survey, 2012.

K. Caine, S. Sabanovic, and &. M. Carter, The effect of monitoring by cameras and robots on the privacy enhancing behaviors of older adults, Proceedings of the seventh annual ACM/IEEE international conference on Human-Robot Interaction, HRI '12, pp.343-350, 2012.
DOI : 10.1145/2157689.2157807

L. Cranor, A. Durity, A. Marsh, and &. B. Ur, Parents' and Teens' Perspectives on Privacy In a Technology-Filled World, SOUPS 2014, 2014.

R. A. Davis, A cognitive-behavioral model of pathological Internet use, Computers in Human Behavior, vol.17, issue.2, pp.187-195, 2001.
DOI : 10.1016/S0747-5632(00)00041-8

B. Dosono, Patron privacy: A luxury concern for marginalized internet users Available at https://www.ideals.illinois, IConference 2016, p.89438, 2016.

B. Dosono, J. Hayes, and &. Y. Wang, I'm Stuck! " : A Contextual Inquiry of People with Visual Impairments in Authentication, SOUPS 2015, pp.151-168, 2015.

P. Dunphy, J. Vines, L. Coles-kemp, R. Clarke, V. Vlachokyriakos et al., Understanding the Experience-Centeredness of Privacy and Security Technologies, Proceedings of the 2014 workshop on New Security Paradigms Workshop, NSPW '14, pp.83-94, 2014.
DOI : 10.1016/j.chb.2014.04.024

B. Glaser, The Discovery of Grounded Theory; Strategies for Qualitative Research, Nursing Research, vol.17, issue.4, p.81, 1967.
DOI : 10.1097/00006199-196807000-00014

T. Grandin, My mind is a web browser: How people with autism think, Cerebrum, vol.2, issue.1, pp.14-22, 2000.

P. Hall, C. Heath, L. Coles-kemp, and &. A. Tanner, Examining the Contribution of Critical Visualisation to Information Security, Proceedings of the New Security Paradigms Workshop on ZZZ, NSPW '15, pp.59-72, 2015.
DOI : 10.1007/978-3-642-01862-6_30

H. Hartikainen, N. Livari, and M. Kinnula, Should We Design for Control, Trust or Involvement?, Proceedings of the The 15th International Conference on Interaction Design and Children, IDC '16, pp.367-378, 2016.
DOI : 10.1145/1978942.1979422

H. Hong, S. Yarosh, J. Kim, G. Abowd, and &. R. Arriaga, Investigating the use of circles in social networks to support independence of individuals with autism, Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, CHI '13, pp.3207-3216, 2013.
DOI : 10.1145/2470654.2466439

H. Hong, G. Abowd, and &. R. Arriaga, Towards Designing Social Question-and-Answer Systems for Behavioral Support of Individuals with Autism, Proceedings of the 9th International Conference on Pervasive Computing Technologies for Healthcare, pp.17-24, 2015.
DOI : 10.4108/icst.pervasivehealth.2015.259282

I. Ion, R. Reeder, and &. S. Consolvo, no one can hack my mind " : Comparing Expert and Non-Expert Security Practices Available at https, SOUPS 2015, pp.327-346, 2015.

J. Kientz, G. Hayes, T. Westeyn, T. Starner, and &. G. Abowd, Pervasive Computing and Autism: Assisting Caregivers of Children with Special Needs, IEEE Pervasive Computing, vol.6, issue.1, pp.28-3518, 2007.
DOI : 10.1109/MPRV.2007.18

R. Kirkham and &. C. Greenhalgh, Social Access vs. Privacy in Wearable Computing: A Case Study of Autism, IEEE Pervasive Computing, vol.14, issue.1, pp.26-33, 2015.
DOI : 10.1109/MPRV.2015.14

J. Lewandowski, T. Hutchins, P. Prelock, and &. D. Murray-close, Examining the Benefit of Including a Sibling in Story-Based Interventions With a Child With Asperger Syndrome, Contemporary Issues in Communication Science & Disorders, p.41, 2014.

M. Lombard, J. Snyder?duch, and &. C. Bracken, Content Analysis in Mass Communication: Assessment and Reporting of Intercoder Reliability, Human Communication Research, vol.22, issue.4, pp.587-604, 2002.
DOI : 10.1016/B978-012691360-6/50005-7

O. Lovaas, R. Koegel, J. Simmons, and &. J. Long, Some generalization and follow-up measures on autistic children in behavior therapy1, Journal of Applied Behavior Analysis, vol.6, issue.1, pp.131-165, 1973.
DOI : 10.1901/jaba.1973.6-131

G. Marcu, A. Dey, and &. S. Kiesler, Parent-driven use of wearable cameras for autism support, Proceedings of the 2012 ACM Conference on Ubiquitous Computing, UbiComp '12, pp.401-410, 2012.
DOI : 10.1145/2370216.2370277

J. A. Rode, Digital parenting: Designing children's safety, Proc. BCS-HCI, 2009.

A. Sasse, Scaring and Bullying People into Security Won't Work, IEEE Security & Privacy, vol.13, issue.3, pp.80-83, 2015.
DOI : 10.1109/MSP.2015.65

URL : http://discovery.ucl.ac.uk/1495933/1/scare_security_ieee2np2015.pdf

K. Suzuki, T. Hachisu, and &. K. Iida, EnhancedTouch, Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems, CHI '16, pp.1282-1293, 2016.
DOI : 10.5014/ajot.61.2.190

M. Tentori, L. Escobedo, and &. G. Balderas, A Smart Environment for Children with Autism, IEEE Pervasive Computing, vol.14, issue.2, pp.42-50, 2015.
DOI : 10.1109/MPRV.2015.22

M. Tixier and &. M. Lewkowicz, "Counting on the Group", Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems, CHI '16, pp.3545-3558, 2016.
DOI : 10.1145/1183456.1183461

Y. Wang, P. G. Leon, A. Acquisti, L. F. Cranor, A. Forget et al., A field trial of privacy nudges for facebook, Proceedings of the 32nd annual ACM conference on Human factors in computing systems, CHI '14, 2014.
DOI : 10.1145/2556288.2557413

R. Wash, Folk models of home computer security, Proceedings of the Sixth Symposium on Usable Privacy and Security, SOUPS '10, 2010.
DOI : 10.1145/1837110.1837125

P. Washington, C. Voss, N. Haber, S. Tanaka, J. Daniels et al., A Wearable Social Interaction Aid for Children with Autism, Proceedings of the 2016 CHI Conference Extended Abstracts on Human Factors in Computing Systems, CHI EA '16, pp.2348-2354, 2016.
DOI : 10.1177/1362361301005003007

P. Wisniewski, H. Jia, H. Xu, M. Rosson, and &. J. Carroll, "Preventative" vs. "Reactive", Proceedings of the 18th ACM Conference on Computer Supported Cooperative Work & Social Computing, CSCW '15, pp.302-316, 2015.
DOI : 10.1146/annurev.publhealth.26.021304.144357

S. Yardi and &. A. Bruckman, Social and technical challenges in parenting teens' social media use, Proceedings of the 2011 annual conference on Human factors in computing systems, CHI '11, 2011.
DOI : 10.1145/1978942.1979422