{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T15:08:33Z","timestamp":1743088113894,"version":"3.40.3"},"publisher-location":"Cham","reference-count":18,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030507312"},{"type":"electronic","value":"9783030507329"}],"license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-3-030-50732-9_77","type":"book-chapter","created":{"date-parts":[[2020,7,11]],"date-time":"2020-07-11T07:02:59Z","timestamp":1594450979000},"page":"597-604","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Attention! Designing a Target Group-Oriented Risk Communication Strategy"],"prefix":"10.1007","author":[{"given":"Lara","family":"Raffel","sequence":"first","affiliation":[]},{"given":"Patrick","family":"Bours","sequence":"additional","affiliation":[]},{"given":"Sashidharan","family":"Komandur","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,7,10]]},"reference":[{"key":"77_CR1","doi-asserted-by":"publisher","first-page":"1912","DOI":"10.1177\/1609406919887274","volume":"18","author":"K Adler","year":"2019","unstructured":"Adler, K., Salanter\u00e4, S., Zumstein-Shaha, M.: Focus group interviews in child, youth, and parent research: an integrative literature review. Int. J. Qual. Methods 18, 1912\u20131918 (2019)","journal-title":"Int. J. Qual. Methods"},{"issue":"8","key":"77_CR2","doi-asserted-by":"publisher","first-page":"957","DOI":"10.1080\/10538712.2014.960632","volume":"23","author":"N Bennett","year":"2014","unstructured":"Bennett, N., O\u2019Donohue, W.: The construct of grooming in child sexual abuse: conceptual and measurement issues. J. Child Sex. Abuse 23(8), 957\u2013976 (2014)","journal-title":"J. Child Sex. Abuse"},{"key":"77_CR3","doi-asserted-by":"publisher","first-page":"158","DOI":"10.1016\/j.ssci.2019.05.025","volume":"118","author":"A Boholm","year":"2019","unstructured":"Boholm, A.: Lessons of success and failure: practicing risk communication at government agencies. Saf. Sci. 118, 158\u2013167 (2019)","journal-title":"Saf. Sci."},{"issue":"1","key":"77_CR4","doi-asserted-by":"publisher","first-page":"79","DOI":"10.1111\/j.1468-2311.2011.00682.x","volume":"55","author":"M Colton","year":"2012","unstructured":"Colton, M., Roberts, S., Vanstone, M.: Learning lessons from men who have sexually abused children. Howard J. Crim. Justice 55(1), 79\u201393 (2012)","journal-title":"Howard J. Crim. Justice"},{"key":"77_CR5","unstructured":"Gamhewage, G.: An introduction to risk communication (2014). https:\/\/www.who.int\/risk-communication\/introduction-to-risk-communication.pdf?ua=1. Accessed 11 Nov 2019"},{"key":"77_CR6","unstructured":"Gray, D., Brown, S., Macanufo, J.: Gamestorming: A Playbook for Innovators, Rulebreakers, and Changemakers. O\u2019Reilly (2010)"},{"key":"77_CR7","doi-asserted-by":"crossref","unstructured":"Kennedy, C., Kools, S., Krueger, R.: Methodological considerations in children\u2019s focus groups. Nurs. Res. 50, 184\u2013187 (2001)","DOI":"10.1097\/00006199-200105000-00010"},{"key":"77_CR8","unstructured":"Lanning, K.: Compliant child victim: confronting an uncomfortable reality. In: Quayle, E., Taylor, M. (eds.) Viewing child pornography on the Internet, pp. 49\u201360. Russell House (2005)"},{"key":"77_CR9","unstructured":"Lanning, K.: Child molesters: A behavioral analysis, 5th edn. National Center for Missing & Exploited Children (2010)"},{"issue":"1","key":"77_CR10","doi-asserted-by":"publisher","first-page":"5","DOI":"10.1177\/0886260517742046","volume":"33","author":"K Lanning","year":"2018","unstructured":"Lanning, K.: The evolution of grooming: concept and term. J. Interpersonal Violence 33(1), 5\u201316 (2018)","journal-title":"J. Interpersonal Violence"},{"key":"77_CR11","doi-asserted-by":"crossref","unstructured":"Lundgren, R., McMakin, A.: Risk communication: A Handbook for Communicating Environmental, Safety, and Health Risks. Wiley-IEEE (2009)","DOI":"10.1002\/9780470480120"},{"issue":"3","key":"77_CR12","doi-asserted-by":"publisher","first-page":"339","DOI":"10.1080\/13645579.2015.1011821","volume":"19","author":"O McGarry","year":"2016","unstructured":"McGarry, O.: Repositioning the research encounter: exploring power dynamics and positionality in youth research. Int. J. Soc. Res. Methodol. 19(3), 339\u2013354 (2016)","journal-title":"Int. J. Soc. Res. Methodol."},{"key":"77_CR13","unstructured":"Sandman, P.: \u201cwatch out!\u201d precaution advocacy fundamentals (2007). http:\/\/www.psandman.com\/handouts\/sand59a.pdf. Accessed 12 Mar 2020"},{"key":"77_CR14","unstructured":"Smahel, D., et al.: EU kids online 2020: survey results from 19 countries (2020)"},{"key":"77_CR15","unstructured":"Webster, S., et al.: European online grooming project - final report (2012)"},{"issue":"6","key":"77_CR16","doi-asserted-by":"publisher","first-page":"724","DOI":"10.1080\/01639625.2016.1197656","volume":"38","author":"GM Winters","year":"2017","unstructured":"Winters, G.M., Jeglic, E.L.: Stages of sexual grooming: Recognizing potentially predatory behaviors of child molesters. Deviant Behav. 38(6), 724\u2013733 (2017)","journal-title":"Deviant Behav."},{"issue":"1","key":"77_CR17","doi-asserted-by":"publisher","first-page":"62","DOI":"10.1080\/13552600.2016.1271146","volume":"23","author":"GM Winters","year":"2017","unstructured":"Winters, G.M., Kaylor, L.E., Jeglic, E.L.: Sexual offenders contacting children online: an examination of transcripts of sexual grooming. Journal of Sexual Aggression 23(1), 62\u201376 (2017)","journal-title":"Journal of Sexual Aggression"},{"issue":"3","key":"77_CR18","doi-asserted-by":"publisher","first-page":"219","DOI":"10.1016\/S0003-6870(02)00009-1","volume":"33","author":"MS Wogalter","year":"2002","unstructured":"Wogalter, M.S., Conzola, V.C., Smith-Jackson, T.L.: Research-based guidelines for warning design and evaluation. Appl. Ergon. 33(3), 219\u201330 (2002)","journal-title":"Appl. Ergon."}],"container-title":["Communications in Computer and Information Science","HCI International 2020 - Posters"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-50732-9_77","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,7,11]],"date-time":"2024-07-11T00:10:20Z","timestamp":1720656620000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-50732-9_77"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"ISBN":["9783030507312","9783030507329"],"references-count":18,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-50732-9_77","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2020]]},"assertion":[{"value":"10 July 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"HCII","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Human-Computer Interaction","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Copenhagen","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Denmark","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2020","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"19 July 2020","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"24 July 2020","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"22","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"hcii2020","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/2020.hci.international\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"This content has been made available to all.","name":"free","label":"Free to read"}]}}