{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,21]],"date-time":"2025-10-21T00:33:11Z","timestamp":1761006791006,"version":"build-2065373602"},"reference-count":7,"publisher":"Wiley","issue":"1","license":[{"start":{"date-parts":[[2010,11,18]],"date-time":"2010-11-18T00:00:00Z","timestamp":1290038400000},"content-version":"vor","delay-in-days":686,"URL":"http:\/\/onlinelibrary.wiley.com\/termsAndConditions#vor"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Proc of Assoc for Info"],"published-print":{"date-parts":[[2009,1]]},"DOI":"10.1002\/meet.2009.1450460374","type":"journal-article","created":{"date-parts":[[2010,1,29]],"date-time":"2010-01-29T16:24:34Z","timestamp":1264782274000},"page":"1-3","source":"Crossref","is-referenced-by-count":0,"title":["Adolescents' information behavior when isolated from peer groups: Lessons from new immigrant adolescents' everyday life information seeking"],"prefix":"10.1002","volume":"46","author":[{"given":"Joung Hwa","family":"Koo","sequence":"first","affiliation":[]},{"given":"Melissa","family":"Gross","sequence":"additional","affiliation":[]}],"member":"311","published-online":{"date-parts":[[2010,11,18]]},"reference":[{"key":"e_1_2_4_2_1","first-page":"1","volume-title":"Youth information\u2010seeking behavior II: Theories, models, and issues","author":"Fisher K.","year":"2007"},{"key":"e_1_2_4_3_1","doi-asserted-by":"publisher","DOI":"10.1177\/0164027506289723"},{"key":"e_1_2_4_4_1","first-page":"27","volume-title":"Youth information\u2010seeking behavior II: Theories, models, and issues","author":"Hughes\u2010Hassell S.","year":"2007"},{"key":"e_1_2_4_5_1","first-page":"175","volume-title":"Handbook of adolescent development","author":"Scholte R.","year":"2006"},{"key":"e_1_2_4_6_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.lisr.2007.04.011"},{"key":"e_1_2_4_7_1","doi-asserted-by":"publisher","DOI":"10.1037\/0022-3514.44.1.127"},{"key":"e_1_2_4_8_1","doi-asserted-by":"publisher","DOI":"10.1177\/0265407587044007"}],"container-title":["Proceedings of the American Society for Information Science and Technology"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.wiley.com\/onlinelibrary\/tdm\/v1\/articles\/10.1002%2Fmeet.2009.1450460374","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.wiley.com\/onlinelibrary\/tdm\/v1\/articles\/10.1002%2Fmeet.2009.1450460374","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/asistdl.onlinelibrary.wiley.com\/doi\/pdf\/10.1002\/meet.2009.1450460374","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,20]],"date-time":"2025-10-20T10:12:09Z","timestamp":1760955129000},"score":1,"resource":{"primary":{"URL":"https:\/\/asistdl.onlinelibrary.wiley.com\/doi\/10.1002\/meet.2009.1450460374"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009,1]]},"references-count":7,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2009,1]]}},"alternative-id":["10.1002\/meet.2009.1450460374"],"URL":"https:\/\/doi.org\/10.1002\/meet.2009.1450460374","archive":["Portico"],"relation":{},"ISSN":["0044-7870","1550-8390"],"issn-type":[{"type":"print","value":"0044-7870"},{"type":"electronic","value":"1550-8390"}],"subject":[],"published":{"date-parts":[[2009,1]]}}}