{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,21]],"date-time":"2025-10-21T00:39:45Z","timestamp":1761007185623,"version":"build-2065373602"},"reference-count":18,"publisher":"Wiley","issue":"1","license":[{"start":{"date-parts":[[2015,4,24]],"date-time":"2015-04-24T00:00:00Z","timestamp":1429833600000},"content-version":"vor","delay-in-days":478,"URL":"http:\/\/onlinelibrary.wiley.com\/termsAndConditions#vor"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Proc of Assoc for Info"],"published-print":{"date-parts":[[2014,1]]},"abstract":"<jats:title>ABSTRACT<\/jats:title><jats:p>Young people's social practices online and use of digital media have been conceptualized both as an opportunity and a threat to society. While the mass media has often focused on moral panic related to dramatic examples of social media\u2010related harm to young people, research within Library and Information Science has taken multiple methodological approaches to investigate the ways digital youth navigate and negotiate privacy in online spaces. Findings from such studies offer insight into youth cultures and technology design that supports online privacy.<\/jats:p><jats:p>This panel will demonstrate a variety of projects and approaches that have been taken to investigate privacy issues related to young people's online interactions and practices, and the social and design implications of emerging findings for our understanding of young people and online privacy. We will also lead audience members in an interactive brainstorming session centered around various research scenarios, asking participants to consider the strengths and weaknesses of specific research questions and methods in addressing adults\u2019 concerns related to youth and online privacy. We will conclude with an interactive discussion of recommended future research directions for enhancing our understanding of young people's privacy practices.<\/jats:p>","DOI":"10.1002\/meet.2014.14505101013","type":"journal-article","created":{"date-parts":[[2015,4,24]],"date-time":"2015-04-24T17:19:02Z","timestamp":1429895942000},"page":"1-5","source":"Crossref","is-referenced-by-count":2,"title":["Understanding networked youth and online privacy: Questions, methods and implications"],"prefix":"10.1002","volume":"51","author":[{"given":"Devon","family":"Greyson","sequence":"first","affiliation":[{"name":"Interdisciplinary Studies Graduate Program University of British Columbia Vancouver BC"}]},{"given":"Denise E.","family":"Agosto","sequence":"additional","affiliation":[{"name":"College of Computing &amp; Informatics Drexel University Philadelphia PA"}]},{"given":"Eric","family":"Meyers","sequence":"additional","affiliation":[{"name":"iSchool University of British Columbia Vancouver BC"}]},{"given":"Mega","family":"Subramaniam","sequence":"additional","affiliation":[{"name":"College of Information Studies University of Maryland College Park MD"}]},{"given":"June","family":"Abbas","sequence":"additional","affiliation":[{"name":"School of Library &amp; Information Studies University of Oklahoma Norman OK"}]}],"member":"311","published-online":{"date-parts":[[2015,4,24]]},"reference":[{"key":"e_1_2_9_2_1","doi-asserted-by":"crossref","DOI":"10.5040\/9798216023944","volume-title":"Teens, libraries, and social networking what librarians need to know","author":"Agosto D. E.","year":"2011"},{"key":"e_1_2_9_3_1","doi-asserted-by":"publisher","DOI":"10.7208\/chicago\/9780226163581.001.0001"},{"volume-title":"It's complicated: The social lives of networked teens","year":"2014","author":"boyd d.","key":"e_1_2_9_4_1"},{"volume-title":"Social Privacy in Networked Publics: Teens' Attitudes, Practices, and Strategies (SSRN Scholarly Paper No. ID 1925128)","year":"2011","author":"Boyd, D","key":"e_1_2_9_5_1"},{"key":"e_1_2_9_6_1","unstructured":"Burleigh N.(2013 September 17).Sexting Shame and Suicide.Rolling Stone. Retrieved fromhttp:\/\/www.rollingstone.com\/culture\/news\/sextingshame-and-suicide-20130917"},{"issue":"1","key":"e_1_2_9_7_1","first-page":"14","article-title":"Why Filters Won't Protect Children or Adults","volume":"18","author":"Kranich N.","year":"2004","journal-title":"Library Administration & Management"},{"issue":"2","key":"e_1_2_9_8_1","first-page":"369","article-title":"Update: COPPA is Ineffective Legislation! Next Steps for Protecting Youth Privacy Rights in the Social Networking Era","volume":"5","author":"Matecki L.","year":"2010","journal-title":"Northwestern Journal of Law & Social Policy"},{"key":"e_1_2_9_9_1","unstructured":"Meyers E. M.(2014).Using machinima as cultural probes to study communication in children's virtual worlds: An exploratory approach.iConference'14 \u2013 Breaking Down Walls: Culture Context Computing. March 4\u20107 2014 Berlin DE."},{"issue":"3","key":"e_1_2_9_10_1","article-title":"Who's watching your kids? Privacy and surveillance in virtual worlds for children","volume":"3","author":"Meyers E. M.","year":"2010","journal-title":"Journal of Virtual Worlds Research"},{"volume-title":"Enhancing Child Safety and Online Technologies","year":"2008","author":"Palfrey J.","key":"e_1_2_9_11_1"},{"volume-title":"Self\u2010reported Internet victimization in Canada (No. X5\u2010002\u2010X)","year":"2013","author":"Perreault S.","key":"e_1_2_9_12_1"},{"key":"e_1_2_9_13_1","doi-asserted-by":"publisher","DOI":"10.1108\/10748120110424816"},{"key":"e_1_2_9_14_1","unstructured":"Smith A.(2013 August 15).Where Teens Seek Online Privacy Advice.Pew Research Center's Internet & American Life Project. Retrieved fromhttp:\/\/www.pewinternet.org\/2013\/08\/15\/where-teensseek-online-privacy-advice"},{"key":"e_1_2_9_15_1","unstructured":"Subramaniam M. Valdivia C. Pellicone A.&Neigh Z.(2014).Teach me and trust me: Creating an empowered online community of tweens and parents.Proceedings of the 2014 iConference 244\u2013258"},{"volume-title":"Online victimization of youth: Five years later","year":"2006","author":"Wolak J.","key":"e_1_2_9_16_1"},{"key":"e_1_2_9_17_1","unstructured":"Worstall T.(2013).Paid apps having a bad time almost all revenue is from in app purchases in free apps.Forbes. Available at:http:\/\/www.forbes.com\/sites\/timworstall\/2013\/12\/30\/paid-apps-having-a-bad-time-almost-all-revenue-is-fromin-app-purchases-in-free-apps\/"},{"key":"e_1_2_9_18_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1745-6606.2009.01146.x"},{"key":"e_1_2_9_19_1","doi-asserted-by":"publisher","DOI":"10.1089\/cpb.2007.0240"}],"container-title":["Proceedings of the American Society for Information Science and Technology"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.wiley.com\/onlinelibrary\/tdm\/v1\/articles\/10.1002%2Fmeet.2014.14505101013","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.wiley.com\/onlinelibrary\/tdm\/v1\/articles\/10.1002%2Fmeet.2014.14505101013","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/asistdl.onlinelibrary.wiley.com\/doi\/pdf\/10.1002\/meet.2014.14505101013","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,20]],"date-time":"2025-10-20T12:00:10Z","timestamp":1760961610000},"score":1,"resource":{"primary":{"URL":"https:\/\/asistdl.onlinelibrary.wiley.com\/doi\/10.1002\/meet.2014.14505101013"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,1]]},"references-count":18,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2014,1]]}},"alternative-id":["10.1002\/meet.2014.14505101013"],"URL":"https:\/\/doi.org\/10.1002\/meet.2014.14505101013","archive":["Portico"],"relation":{},"ISSN":["0044-7870","1550-8390"],"issn-type":[{"type":"print","value":"0044-7870"},{"type":"electronic","value":"1550-8390"}],"subject":[],"published":{"date-parts":[[2014,1]]}}}