{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,15]],"date-time":"2026-03-15T13:33:40Z","timestamp":1773581620808,"version":"3.50.1"},"publisher-location":"Cham","reference-count":107,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783030827854","type":"print"},{"value":"9783030827861","type":"electronic"}],"license":[{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2022,2,9]],"date-time":"2022-02-09T00:00:00Z","timestamp":1644364800000},"content-version":"vor","delay-in-days":39,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"funder":[{"DOI":"10.13039\/100006498","name":"Clemson University","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100006498","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022]]},"abstract":"<jats:title>Abstract<\/jats:title><jats:p>Late adolescence represents an important life stage where children are becoming more independent and autonomous from their parents but are not quite old enough to go out on their own. Teenagers are also avid users of mobile devices and social media and actively use their smartphones to connect with friends and share their lives. Much of the research looking at teen technology use has employed a risk-centric approach; in other words, it takes the view that teens are putting themselves at risk by sharing personal information online, so the privacy-oriented solutions typically involve parental monitoring or technology restrictions. In this chapter, we review the research on teens, technology use, and privacy and discuss why such risk-centric models may be problematic to teens\u2019 maturation. Instead, we argue that\u2014much like it was for prior generations\u2014risk-taking is a learning process critical to becoming a young adult and that teens do think about their privacy online, albeit in different ways than their adult counterparts. We offer design heuristics for developing tools for teens that allow for appropriate levels of risk-taking while protecting their privacy and ensuring their safety.<\/jats:p>","DOI":"10.1007\/978-3-030-82786-1_14","type":"book-chapter","created":{"date-parts":[[2022,2,9]],"date-time":"2022-02-09T14:02:49Z","timestamp":1644415369000},"page":"315-336","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":17,"title":["Privacy in Adolescence"],"prefix":"10.1007","author":[{"given":"Pamela J.","family":"Wisniewski","sequence":"first","affiliation":[]},{"given":"Jessica","family":"Vitak","sequence":"additional","affiliation":[]},{"given":"Heidi","family":"Hartikainen","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,2,9]]},"reference":[{"key":"14_CR1","volume-title":"Teens, Social Media & Technology 2018","author":"M Anderson","year":"2018","unstructured":"Anderson, M., and J. Jiang. 2018. Teens, Social Media & Technology 2018. Washington, DC: Pew Research Center."},{"key":"14_CR2","volume-title":"Teens, Social Media & Technology Overview 2015","author":"A Lenhart","year":"2015","unstructured":"Lenhart, A., M. Duggan, A. Perrin, R. Stepler, L. Rainie, and K. Parker. 2015. Teens, Social Media & Technology Overview 2015. Washington, DC: Pew Research Center."},{"key":"14_CR3","volume-title":"Teens, Technology and Romantic Relationships","author":"A Lenhart","year":"2015","unstructured":"Lenhart, A., A. Monica, and A. Smith. 2015. Teens, Technology and Romantic Relationships. Washington, DC: Pew Research Center."},{"key":"14_CR4","volume-title":"Media Use by Tweens and Teens 2015","author":"The Common Sense Census","year":"2015","unstructured":"The Common Sense Census. 2015. Media Use by Tweens and Teens 2015. San Francisco, CA: Common Sense Media."},{"key":"14_CR5","volume-title":"News and America\u2019s Kids: How Young People Perceive and Are Impacted by the News","author":"MB Robb","year":"2017","unstructured":"Robb, M.B. 2017. News and America\u2019s Kids: How Young People Perceive and Are Impacted by the News. San Francisco, CA: Common Sense Media."},{"key":"14_CR6","volume-title":"Born Digital: Understanding the First Generation of Digital Natives","author":"JG Palfrey","year":"2008","unstructured":"Palfrey, J.G., and U. Gasser. 2008. Born Digital: Understanding the First Generation of Digital Natives. New York: Basic Books."},{"key":"14_CR7","doi-asserted-by":"publisher","first-page":"92","DOI":"10.1111\/j.1475-682X.2009.00317.x","volume":"80","author":"E Hargittai","year":"2010","unstructured":"Hargittai, E. 2010. Digital Na(t)ives? Variation in internet skills and uses among members of the \u201cnet generation\u201d*. Sociological Inquiry. 80: 92\u2013113. https:\/\/doi.org\/10.1111\/j.1475-682X.2009.00317.x.","journal-title":"Sociological Inquiry."},{"key":"14_CR8","volume-title":"It\u2019s Complicated: The Social Lives of Networked Teens","author":"D Boyd","year":"2014","unstructured":"Boyd, D. 2014. It\u2019s Complicated: The Social Lives of Networked Teens. New Haven, CT: Yale University Press."},{"issue":"9","key":"14_CR9","first-page":"11","volume":"11","author":"SB Barnes","year":"2006","unstructured":"Barnes, S.B. 2006. A privacy paradox: Social networking in the United States. First Monday. 11 (9): 11\u201315.","journal-title":"First Monday."},{"key":"14_CR10","doi-asserted-by":"publisher","first-page":"285","DOI":"10.1007\/978-94-007-0641-5_14","volume-title":"Computers, Privacy and Data Protection: An element of choice","author":"M Walrave","year":"2011","unstructured":"Walrave, M., and W. Heirman. 2011. Disclosing or protecting? Teenagers\u2019 online self-disclosure. In Computers, Privacy and Data Protection: An element of choice, 285\u2013307. Dordrecht: Springer. https:\/\/doi.org\/10.1007\/978-94-007-0641-5_14."},{"key":"14_CR11","doi-asserted-by":"crossref","unstructured":"Anjum, B. Ubiquity: An Interview with Pamela Wisniewski. https:\/\/ubiquity.acm.org\/article.cfm?id=3301323. Last Accessed 29 Aug 2019.","DOI":"10.1145\/3313830"},{"key":"14_CR12","doi-asserted-by":"publisher","first-page":"36","DOI":"10.1007\/11957454_3","volume-title":"Privacy Enhancing Technologies","author":"A Acquisti","year":"2006","unstructured":"Acquisti, A., and R. Gross. 2006. Imagined communities: Awareness, information sharing, and privacy on the Facebook. In Privacy Enhancing Technologies, 36\u201358. Berlin, Heidelberg: Springer."},{"key":"14_CR13","unstructured":"Acquisti, A., and Grossklags, J. 2005. Uncertainty, ambiguity and privacy. Presented at the Fourth Annual Workshop Economics and Information Security (WEIS 2005)."},{"key":"14_CR14","doi-asserted-by":"publisher","first-page":"635","DOI":"10.1111\/jcpp.12197","volume":"55","author":"S Livingstone","year":"2014","unstructured":"Livingstone, S., and P.K. Smith. 2014. Annual research review: Harms experienced by child users of online and mobile technologies: The nature, prevalence and management of sexual and aggressive risks in the digital age. Journal of Child Psychology and Psychiatry 55: 635\u2013654. https:\/\/doi.org\/10.1111\/jcpp.12197.","journal-title":"Journal of Child Psychology and Psychiatry"},{"key":"14_CR15","doi-asserted-by":"crossref","unstructured":"2003. Age limits and adolescents. Paediatr Child Health. 8: 577.","DOI":"10.1093\/pch\/8.9.577"},{"key":"14_CR16","doi-asserted-by":"crossref","unstructured":"Pinter, A.T., Wisniewski, P., Xu, H., Rosson, M.B., Carroll, J.M. 2017. Adolescent online safety: Moving beyond formative evaluations to designing solutions for the future. In Proceedings of the International Conference on Interaction Design and Children.","DOI":"10.1145\/3078072.3079722"},{"key":"14_CR17","unstructured":"Children\u2019s Online Privacy Protection Rule (\u201cCOPPA\u201d). 2013."},{"key":"14_CR18","doi-asserted-by":"publisher","first-page":"51","DOI":"10.1196\/annals.1308.005","volume":"1021","author":"L Steinberg","year":"2004","unstructured":"Steinberg, L. 2004. Risk taking in adolescence: What changes, and why? Annals of the New York Academy of Sciences 1021: 51\u201358. https:\/\/doi.org\/10.1196\/annals.1308.005.","journal-title":"Annals of the New York Academy of Sciences"},{"key":"14_CR19","doi-asserted-by":"publisher","first-page":"61","DOI":"10.1002\/cd.128","volume":"2005","author":"D Baumrind","year":"2005","unstructured":"Baumrind, D. 2005. Patterns of parental authority and adolescent autonomy. New Directions for Child and Adolescent Development. 2005: 61\u201369. https:\/\/doi.org\/10.1002\/cd.128.","journal-title":"New Directions for Child and Adolescent Development."},{"key":"14_CR20","volume-title":"Adolescent Relations with Mothers, Fathers, and Friends","author":"J Youniss","year":"1985","unstructured":"Youniss, J., and J. Smollar. 1985. Adolescent Relations with Mothers, Fathers, and Friends. Chicago, IL: University of Chicago Press."},{"key":"14_CR21","doi-asserted-by":"publisher","first-page":"217","DOI":"10.1037\/0278-6133.14.3.217","volume":"14","author":"LD Cohn","year":"1995","unstructured":"Cohn, L.D., S. Macfarlane, C. Yanez, and W.K. Imai. 1995. Risk-perception: differences between adolescents and adults. Health Psychology 14: 217.","journal-title":"Health Psychology"},{"key":"14_CR22","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1196\/annals.1308.001","volume":"1021","author":"RE Dahl","year":"2004","unstructured":"Dahl, R.E. 2004. Adolescent brain development: A period of vulnerabilities and opportunities. Keynote Address. Annals of the New York Academy of Sciences. 1021: 1\u201322. https:\/\/doi.org\/10.1196\/annals.1308.001.","journal-title":"Keynote Address. Annals of the New York Academy of Sciences."},{"key":"14_CR23","doi-asserted-by":"publisher","first-page":"231","DOI":"10.1007\/978-1-4614-1436-0_15","volume-title":"Early Adulthood in a Family Context","author":"JJ Arnett","year":"2012","unstructured":"Arnett, J.J. 2012. New horizons in research on emerging and young adulthood. In Early Adulthood in a Family Context, ed. A. Booth, S.L. Brown, N.S. Landale, W.D. Manning, and S.M. McHale, 231\u2013244. New York, NY: Springer. https:\/\/doi.org\/10.1007\/978-1-4614-1436-0_15."},{"key":"14_CR24","doi-asserted-by":"publisher","first-page":"1531","DOI":"10.1037\/0012-1649.43.6.1531","volume":"43","author":"L Steinberg","year":"2007","unstructured":"Steinberg, L., and K.C. Monahan. 2007. Age differences in resistance to peer influence. Developmental Psychology 43: 1531\u20131543. https:\/\/doi.org\/10.1037\/0012-1649.43.6.1531.","journal-title":"Developmental Psychology"},{"key":"14_CR25","doi-asserted-by":"publisher","first-page":"155","DOI":"10.1017\/S0954579406060093","volume":"18","author":"JP Allen","year":"2006","unstructured":"Allen, J.P., M.R. Porter, and F.C. McFARLAND. 2006. Leaders and followers in adolescent close friendships: Susceptibility to peer influence as a predictor of risky behavior, friendship instability, and depression. Development and Psychopathology 18: 155\u2013172. https:\/\/doi.org\/10.1017\/S0954579406060093.","journal-title":"Development and Psychopathology"},{"key":"14_CR26","doi-asserted-by":"publisher","first-page":"123","DOI":"10.1023\/A:1014069926507","volume":"31","author":"C Finkenauer","year":"2002","unstructured":"Finkenauer, C., R.C.M.E. Engels, and W. Meeus. 2002. Keeping secrets from parents: Advantages and disadvantages of secrecy in adolescence. Journal of Youth and Adolescence. 31: 123\u2013136. https:\/\/doi.org\/10.1023\/A:1014069926507.","journal-title":"Journal of Youth and Adolescence."},{"key":"14_CR27","unstructured":"Conflict Processes and Transitions in Parent and Peer Relationships: Implications for Autonomy and Regulation \u2013 W. Andrew Collins, Brett Laursen, Nicole Mortensen, Coral Luebker, Margaret Ferreira, 1997. https:\/\/journals.sagepub.com\/doi\/10.1177\/0743554897122003. Last Accessed 29 Aug 2019."},{"key":"14_CR28","doi-asserted-by":"publisher","first-page":"93","DOI":"10.1002\/cd.23219873706","volume":"37","author":"D Baumrind","year":"1987","unstructured":"Baumrind, D. 1987. A developmental perspective on adolescent risk taking in contemporary America. New Directions for Child Development 37: 93\u2013125.","journal-title":"New Directions for Child Development"},{"key":"14_CR29","doi-asserted-by":"publisher","first-page":"754","DOI":"10.2307\/1131416","volume":"65","author":"L Steinberg","year":"1994","unstructured":"Steinberg, L., S.D. Lamborn, N. Darling, N.S. Mounts, and S.M. Dornbusch. 1994. Over-time changes in adjustment and competence among adolescents from authoritative, authoritarian, indulgent, and neglectful families. Child Development. 65: 754\u2013770. https:\/\/doi.org\/10.2307\/1131416.","journal-title":"Child Development."},{"key":"14_CR30","doi-asserted-by":"publisher","first-page":"26","DOI":"10.1109\/MSP.2005.22","volume":"3","author":"A Acquisti","year":"2005","unstructured":"Acquisti, A., and J. Grossklags. 2005. Privacy and rationality in individual decision making. IEEE Security & Privacy. 3: 26\u201333.","journal-title":"IEEE Security & Privacy."},{"key":"14_CR31","doi-asserted-by":"publisher","first-page":"2837","DOI":"10.1145\/2851581.2892413","volume-title":"Proceedings of the 2016 CHI Conference Extended Abstracts on Human Factors in Computing Systems","author":"A Gambino","year":"2016","unstructured":"Gambino, A., J. Kim, S.S. Sundar, J. Ge, and M.B. Rosson. 2016. User disbelief in privacy paradox: Heuristics that determine disclosure. In Proceedings of the 2016 CHI Conference Extended Abstracts on Human Factors in Computing Systems, 2837\u20132843. New York, NY: ACM. https:\/\/doi.org\/10.1145\/2851581.2892413."},{"key":"14_CR32","doi-asserted-by":"publisher","first-page":"100","DOI":"10.1111\/j.1745-6606.2006.00070.x","volume":"41","author":"PA Norberg","year":"2007","unstructured":"Norberg, P.A., D.R. Horne, and D.A. Horne. 2007. The privacy paradox: Personal information disclosure intentions versus behaviors. Journal of Consumer Affairs. 41: 100\u2013126. https:\/\/doi.org\/10.1111\/j.1745-6606.2006.00070.x.","journal-title":"Journal of Consumer Affairs."},{"key":"14_CR33","doi-asserted-by":"publisher","first-page":"5240","DOI":"10.1145\/2858036.2858381","volume-title":"Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems","author":"C Phelan","year":"2016","unstructured":"Phelan, C., C. Lampe, and P. Resnick. 2016. It\u2019s creepy, but it doesn\u2019t bother me. In Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems, 5240\u20135251. New York, NY: ACM. https:\/\/doi.org\/10.1145\/2858036.2858381."},{"issue":"2","key":"14_CR34","volume":"3","author":"S Utz","year":"2009","unstructured":"Utz, S., and N. Kr\u00e4mer. 2009. The privacy paradox on social network sites revisited: The role of individual characteristics and group norms. Cyberpsychology: Journal of Psychosocial Research on Cyberspace. 3 (2): 1.","journal-title":"Cyberpsychology: Journal of Psychosocial Research on Cyberspace."},{"key":"14_CR35","volume-title":"The Value of Privacy","author":"B Rossler","year":"2005","unstructured":"Rossler, B. 2005. The Value of Privacy. Cambridge: Polity Press."},{"key":"14_CR36","doi-asserted-by":"publisher","unstructured":"Steeves, V., and P. Regan. 2014. Young people online and the social value of privacy. Journal of Information, Communication and Ethics in Society. https:\/\/doi.org\/10.1108\/JICES-01-2014-0004.","DOI":"10.1108\/JICES-01-2014-0004"},{"key":"14_CR37","volume-title":"Proceedings of the 2018 ACM Conference on Human Factors in Computing Systems","author":"AK Ghosh","year":"2018","unstructured":"Ghosh, A.K., K. Badillo-Urquiola, S. Guha, J.J. LaViola Jr., and P.J. Wisniewski. 2018. Safety vs. surveillance: What children have to say about mobile apps for parental control. In Proceedings of the 2018 ACM Conference on Human Factors in Computing Systems. Montr\u00e9al, Canada: ACM."},{"key":"14_CR38","doi-asserted-by":"publisher","first-page":"58","DOI":"10.1177\/0261927X02250056","volume":"22","author":"A Williams","year":"2003","unstructured":"Williams, A. 2003. Adolescents\u2019 relationships with parents. Journal of Language and Social Psychology. 22: 58\u201365. https:\/\/doi.org\/10.1177\/0261927X02250056.","journal-title":"Journal of Language and Social Psychology."},{"key":"14_CR39","doi-asserted-by":"publisher","first-page":"737","DOI":"10.1006\/jado.1999.0266","volume":"22","author":"M Kerr","year":"1999","unstructured":"Kerr, M., H. Stattin, and K. Trost. 1999. To know you is to trust you: Parents\u2019 trust is rooted in child disclosure of information. Journal of Adolescence 22: 737\u2013752. https:\/\/doi.org\/10.1006\/jado.1999.0266.","journal-title":"Journal of Adolescence"},{"key":"14_CR40","doi-asserted-by":"publisher","DOI":"10.4324\/9781843926818","volume-title":"Theorizing Surveillance","author":"D Lyon","year":"2006","unstructured":"Lyon, D. 2006. Theorizing Surveillance. London: Routledge."},{"key":"14_CR41","volume-title":"The Costs of Privacy: Surveillance and Reputation in America","author":"SL Nock","year":"1993","unstructured":"Nock, S.L. 1993. The Costs of Privacy: Surveillance and Reputation in America. Piscataway: Transaction Publishers."},{"key":"14_CR42","unstructured":"Gao, G. What Americans think about NSA surveillance, national security and privacy. http:\/\/www.pewresearch.org\/fact-tank\/2015\/05\/29\/what-americans-think-about-nsa-surveillance-national-security-and-privacy\/. Last Accessed 17 July 2017."},{"key":"14_CR43","doi-asserted-by":"publisher","first-page":"86","DOI":"10.1109\/MSP.2018.1870874","volume":"16","author":"P Wisniewski","year":"2018","unstructured":"Wisniewski, P. 2018. The privacy paradox of adolescent online safety: A matter of risk prevention or risk resilience? IEEE Security & Privacy. 16: 86\u201390. https:\/\/doi.org\/10.1109\/MSP.2018.1870874.","journal-title":"IEEE Security & Privacy."},{"key":"14_CR44","doi-asserted-by":"publisher","first-page":"645","DOI":"10.1007\/978-3-319-58753-0_91","volume-title":"HCI International 2017 \u2013 Posters\u2019 Extended Abstracts","author":"DJ Schiano","year":"2017","unstructured":"Schiano, D.J., and C. Burg. 2017. Parental controls: Oxymoron and design opportunity. In HCI International 2017 \u2013 Posters\u2019 Extended Abstracts, 645\u2013652. Berlin: Springer, Champions. https:\/\/doi.org\/10.1007\/978-3-319-58753-0_91."},{"key":"14_CR45","doi-asserted-by":"publisher","first-page":"51","DOI":"10.1145\/2998181.2998352","volume-title":"Proceedings of the 2017 ACM Conference on Computer Supported Cooperative Work and Social Computing","author":"P Wisniewski","year":"2017","unstructured":"Wisniewski, P., A.K. Ghosh, H. Xu, M.B. Rosson, and J.M. Carroll. 2017. Parental control vs. teen self-regulation: Is there a middle ground for mobile online safety? In Proceedings of the 2017 ACM Conference on Computer Supported Cooperative Work and Social Computing, 51\u201369. New York, NY: ACM. https:\/\/doi.org\/10.1145\/2998181.2998352."},{"key":"14_CR46","unstructured":"Collier, A. Less parental control, more support of kids\u2019 self-regulation: Study. http:\/\/www.connectsafely.org\/less-parental-control-more-support-of-kids-self-regulation-study\/. Last Accessed 18 July 2017."},{"key":"14_CR47","first-page":"21","volume-title":"Computer Mediated Communication in Personal Relationships","author":"JT Child","year":"2011","unstructured":"Child, J.T., and S. Petronio. 2011. Unpacking the paradoxes of privacy in CMC relationships: The challenges of blogging and relational communication on the internet. In Computer Mediated Communication in Personal Relationships, ed. Webb, K.W.& L., 21\u201340. New York: Peter Lang."},{"key":"14_CR48","doi-asserted-by":"publisher","unstructured":"Erickson, L.B., P. Wisniewski, H. Xu, J.M. Carroll, M.B. Rosson, and D.F. Perkins. 2015. The boundaries between: Parental involvement in a teen\u2019s online world. Journal of the Association for Information Science and Technology. https:\/\/doi.org\/10.1002\/asi.23450.","DOI":"10.1002\/asi.23450"},{"key":"14_CR49","doi-asserted-by":"publisher","first-page":"523","DOI":"10.1145\/2998181.2998236","volume-title":"Proceedings of the 2017 ACM Conference on Computer Supported Cooperative Work and Social Computing","author":"P Wisniewski","year":"2017","unstructured":"Wisniewski, P., H. Xu, M.B. Rosson, and J.M. Carroll. 2017. Parents just don\u2019t understand: Why teens don\u2019t talk to parents about their online risk experiences. In Proceedings of the 2017 ACM Conference on Computer Supported Cooperative Work and Social Computing, 523\u2013540. New York, NY: ACM. https:\/\/doi.org\/10.1145\/2998181.2998236."},{"key":"14_CR50","doi-asserted-by":"publisher","unstructured":"Yardi, S., Bruckman, A. 2011. Social and technical challenges in parenting teens\u2019 social media use. Presented at the Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, 1979422. https:\/\/doi.org\/10.1145\/1978942.1979422.","DOI":"10.1145\/1978942.1979422"},{"key":"14_CR51","volume-title":"Proceedings of the Tenth Symposium on Usable Privacy and Security","author":"LF Cranor","year":"2014","unstructured":"Cranor, L.F., A.L. Durity, A. Marsh, and B. Ur. 2014. Parents\u2019 and teens\u2019 perspectives on privacy in a technology-filled world. In Proceedings of the Tenth Symposium on Usable Privacy and Security. Menlo Park, CA: USENIX."},{"key":"14_CR52","doi-asserted-by":"publisher","first-page":"367","DOI":"10.1145\/2930674.2930680","volume-title":"Proceedings of the the 15th International Conference on Interaction Design and Children","author":"H Hartikainen","year":"2016","unstructured":"Hartikainen, H., N. Iivari, and M. Kinnula. 2016. Should we design for control, trust or involvement? A discourses survey about children\u2019s online safety. In Proceedings of the the 15th International Conference on Interaction Design and Children, 367\u2013378. New York, NY: ACM. https:\/\/doi.org\/10.1145\/2930674.2930680."},{"key":"14_CR53","doi-asserted-by":"publisher","first-page":"309","DOI":"10.1177\/1461444809342697","volume":"12","author":"S Livingstone","year":"2010","unstructured":"Livingstone, S., and E. Helsper. 2010. Balancing opportunities and risks in teenagers\u2019 use of the internet: The role of online skills and internet self-efficacy. New Media & Society. 12: 309\u2013329. https:\/\/doi.org\/10.1177\/1461444809342697.","journal-title":"New Media & Society."},{"key":"14_CR54","doi-asserted-by":"publisher","first-page":"263","DOI":"10.1007\/s10676-013-9323-4","volume":"15","author":"K Mathiesen","year":"2013","unstructured":"Mathiesen, K. 2013. The internet, children, and privacy: The case against parental monitoring. Ethics and Information Technology 15: 263\u2013274. https:\/\/doi.org\/10.1007\/s10676-013-9323-4.","journal-title":"Ethics and Information Technology"},{"key":"14_CR55","doi-asserted-by":"publisher","first-page":"43:1","DOI":"10.14236\/ewic\/HCI2017.43","volume-title":"Proceedings of the 31st British Computer Society Human Computer Interaction Conference","author":"H Hartikainen","year":"2017","unstructured":"Hartikainen, H., M. Kinnula, N. Iivari, and D. Rajanen. 2017. Finding common ground: Comparing children\u2019s and parents\u2019 views on children\u2019s online safety. In Proceedings of the 31st British Computer Society Human Computer Interaction Conference, 43:1\u201343:12. Swindon: BCS Learning & Development Ltd. https:\/\/doi.org\/10.14236\/ewic\/HCI2017.43."},{"key":"14_CR56","doi-asserted-by":"publisher","first-page":"4029","DOI":"10.1145\/2702123.2702240","volume-title":"Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems","author":"P Wisniewski","year":"2015","unstructured":"Wisniewski, P., H. Jia, N. Wang, S. Zheng, H. Xu, M.B. Rosson, and J.M. Carroll. 2015. Resilience mitigates the negative effects of adolescent internet addiction and online risk exposure. In Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems, 4029\u20134038. New York, NY: ACM. https:\/\/doi.org\/10.1145\/2702123.2702240."},{"key":"14_CR57","doi-asserted-by":"publisher","first-page":"1051","DOI":"10.1177\/1461444814543995","volume":"16","author":"AE Marwick","year":"2014","unstructured":"Marwick, A.E., and D. Boyd. 2014. Networked privacy: How teenagers negotiate context in social media. New Media & Society 16: 1051\u20131067.","journal-title":"New Media & Society"},{"key":"14_CR58","doi-asserted-by":"publisher","first-page":"175","DOI":"10.1111\/j.1756-2589.2010.00052.x","volume":"2","author":"S Petronio","year":"2010","unstructured":"Petronio, S. 2010. Communication privacy management theory: What do we know about family privacy regulation? Journal of Family Theory & Review. 2: 175\u2013196.","journal-title":"Journal of Family Theory & Review."},{"issue":"1055","key":"14_CR59","first-page":"2","volume":"21","author":"M Madden","year":"2013","unstructured":"Madden, M., A. Lenhart, S. Cortesi, U. Gasser, M. Duggan, A. Smith, and M. Beaton. 2013. Teens, social media, and privacy. Pew Research Center 21 (1055): 2\u201386.","journal-title":"Pew Research Center"},{"key":"14_CR60","doi-asserted-by":"publisher","first-page":"LBW1214:1","DOI":"10.1145\/3290607.3313033","volume-title":"Extended Abstracts of the 2019 CHI Conference on Human Factors in Computing Systems","author":"S Dewar","year":"2019","unstructured":"Dewar, S., S. Islam, E. Resor, and N. Salehi. 2019. Finsta: Creating \u201cFake\u201d spaces for authentic performance. In Extended Abstracts of the 2019 CHI Conference on Human Factors in Computing Systems, LBW1214:1\u2013LBW1214:6. New York, NY: ACM. https:\/\/doi.org\/10.1145\/3290607.3313033."},{"key":"14_CR61","doi-asserted-by":"publisher","first-page":"4","DOI":"10.1080\/17439884.2012.658404","volume":"38","author":"K Davis","year":"2013","unstructured":"Davis, K., and C. James. 2013. Tweens\u2019 conceptions of privacy online: implications for educators. Learning, Media and Technology 38: 4\u201325. https:\/\/doi.org\/10.1080\/17439884.2012.658404.","journal-title":"Learning, Media and Technology"},{"key":"14_CR62","doi-asserted-by":"publisher","first-page":"376","DOI":"10.1111\/j.1469-7610.2007.01846.x","volume":"49","author":"PK Smith","year":"2008","unstructured":"Smith, P.K., J. Mahdavi, M. Carvalho, S. Fisher, S. Russell, and N. Tippett. 2008. Cyberbullying: Its nature and impact in secondary school pupils. Journal of Child Psychology and Psychiatry and Allied Disciplines 49: 376\u2013385. https:\/\/doi.org\/10.1111\/j.1469-7610.2007.01846.x.","journal-title":"Journal of Child Psychology and Psychiatry and Allied Disciplines"},{"key":"14_CR63","doi-asserted-by":"publisher","first-page":"3919","DOI":"10.1145\/2858036.2858317","volume-title":"Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems","author":"P Wisniewski","year":"2016","unstructured":"Wisniewski, P., H. Xu, M.B. Rosson, D.F. Perkins, and J.M. Carroll. 2016. Dear diary: Teens reflect on their weekly online risk experiences. In Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems, 3919\u20133930. New York, NY: ACM. https:\/\/doi.org\/10.1145\/2858036.2858317."},{"key":"14_CR64","doi-asserted-by":"publisher","first-page":"347","DOI":"10.1177\/1461444815606121","volume":"19","author":"DE Agosto","year":"2017","unstructured":"Agosto, D.E., and J. Abbas. 2017. \u201cDon\u2019t be dumb\u2014that\u2019s the rule I try to live by\u201d: A closer look at older teens\u2019 online privacy and safety attitudes. New Media & Society. 19: 347\u2013365. https:\/\/doi.org\/10.1177\/1461444815606121.","journal-title":"New Media & Society."},{"key":"14_CR65","doi-asserted-by":"publisher","first-page":"302","DOI":"10.1145\/2675133.2675293","volume-title":"Proceedings of the 18th ACM Conference on Computer Supported Cooperative Work & Social Computing","author":"P Wisniewski","year":"2015","unstructured":"Wisniewski, P., H. Jia, H. Xu, M.B. Rosson, and J.M. Carroll. 2015. \u201cPreventative\u201d vs. \u201cReactive\u201d: How parental mediation influences teens\u2019 social media privacy behaviors. In Proceedings of the 18th ACM Conference on Computer Supported Cooperative Work & Social Computing, 302\u2013316. New York, NY: ACM. https:\/\/doi.org\/10.1145\/2675133.2675293."},{"key":"14_CR66","doi-asserted-by":"publisher","first-page":"46","DOI":"10.1080\/15267431.2012.742089","volume":"13","author":"JT Child","year":"2013","unstructured":"Child, J.T., and D.A. Westermann. 2013. Let\u2019s be Facebook friends: Exploring parental Facebook friend requests from a communication privacy management (CPM) perspective. Journal of Family Communication. 13: 46\u201359. https:\/\/doi.org\/10.1080\/15267431.2012.742089.","journal-title":"Journal of Family Communication."},{"key":"14_CR67","unstructured":"Got a teen driver? Here is tech to help keep them safe, https:\/\/www.usatoday.com\/story\/tech\/columnist\/2017\/06\/25\/got-teen-driver-here-tech-help-keep-them-safe\/103076252\/. Last Accessed 29 Aug 2019."},{"key":"14_CR68","doi-asserted-by":"publisher","unstructured":"Czeskis, A., Dermendjieva, I., Yapit, H., Borning, A., Friedman, B., Gill, B., Kohno, T. 2010. Parenting from the pocket: value tensions and technical directions for secure and private parent-teen mobile safety. Presented at the Proceedings of the Sixth Symposium on Usable Privacy and Security, 1837130. https:\/\/doi.org\/10.1145\/1837110.1837130.","DOI":"10.1145\/1837110.1837130"},{"key":"14_CR69","doi-asserted-by":"publisher","first-page":"486","DOI":"10.1111\/j.1460-2466.2006.00297.x","volume":"56","author":"MS Eastin","year":"2006","unstructured":"Eastin, M.S., B.S. Greenberg, and L. Hofschire. 2006. Parenting the Internet. Journal of Communication. 56: 486\u2013504. https:\/\/doi.org\/10.1111\/j.1460-2466.2006.00297.x.","journal-title":"Journal of Communication."},{"key":"14_CR70","volume-title":"Risks and Safety on the Internet: The Perspective of European Children","author":"S Livingstone","year":"2011","unstructured":"Livingstone, S., L. Haddon, A. G\u00f6rzig, and K. \u00d3lafsson. 2011. Risks and Safety on the Internet: The Perspective of European Children. London: EU Kids Online."},{"key":"14_CR71","doi-asserted-by":"publisher","first-page":"52","DOI":"10.1080\/08838159909364474","volume":"43","author":"PM Valkenburg","year":"1999","unstructured":"Valkenburg, P.M., M. Krcmar, A.L. Peeters, and N.M. Marseille. 1999. Developing a scale to assess three styles of television mediation: \u201cInstructive Mediation,\u201d \u201cRestrictive Mediation,\u201d and \u201cSocial Coviewing.\u201d. Journal of Broadcasting & Electronic Media. 43: 52\u201366.","journal-title":"Journal of Broadcasting & Electronic Media."},{"key":"14_CR72","volume-title":"How can parents support children\u2019s internet safety?","author":"A Duerager","year":"2012","unstructured":"Duerager, A., Livingstone, S. 2012.  How can parents support children\u2019s internet safety?"},{"key":"14_CR73","doi-asserted-by":"publisher","first-page":"581","DOI":"10.1080\/08838150802437396","volume":"52","author":"S Livingstone","year":"2008","unstructured":"Livingstone, S., and E.J. Helsper. 2008. Parental mediation of Children\u2019s internet use. Journal of Broadcasting & Electronic Media. 52: 581\u2013599. https:\/\/doi.org\/10.1080\/08838150802437396.","journal-title":"Journal of Broadcasting & Electronic Media."},{"key":"14_CR74","doi-asserted-by":"publisher","first-page":"387","DOI":"10.1089\/cpb.2009.0068","volume":"12","author":"GS Mesch","year":"2009","unstructured":"Mesch, G.S. 2009. Parental mediation, online activities, and cyberbullying. Cyber Psychology and Behavior 12: 387\u2013393.","journal-title":"Cyber Psychology and Behavior"},{"key":"14_CR75","doi-asserted-by":"publisher","first-page":"273","DOI":"10.1007\/s10802-007-9176-6","volume":"36","author":"TW Gardner","year":"2008","unstructured":"Gardner, T.W., T.J. Dishion, and A.M. Connell. 2008. Adolescent self-regulation as resilience: Resistance to antisocial behavior within the deviant peer context. Journal of Abnormal Child Psychology. 36: 273\u2013284.","journal-title":"Journal of Abnormal Child Psychology."},{"key":"14_CR76","volume-title":"Handbook of Life-Span Development","author":"KL Fingerman","year":"2010","unstructured":"Fingerman, K.L., J. Smith, and C. Berg. 2010. Coping and self-regulation across the life span. In Handbook of Life-Span Development. Cham: Springer Publishing Company."},{"key":"14_CR77","doi-asserted-by":"publisher","first-page":"199","DOI":"10.1037\/0012-1649.18.2.199","volume":"18","author":"CB Kopp","year":"1982","unstructured":"Kopp, C.B. 1982. Antecedents of self-regulation: A developmental perspective. Developmental Psychology 18: 199\u2013214. https:\/\/doi.org\/10.1037\/0012-1649.18.2.199.","journal-title":"Developmental Psychology"},{"key":"14_CR78","doi-asserted-by":"publisher","first-page":"246","DOI":"10.1111\/jora.12125","volume":"25","author":"KL Moilanen","year":"2015","unstructured":"Moilanen, K.L., K.E. Rasmussen, and L.M. Padilla-Walker. 2015. Bidirectional associations between self-regulation and parenting styles in early adolescence. Journal of Research on Adolescence (Wiley-Blackwell) 25: 246\u2013262. https:\/\/doi.org\/10.1111\/jora.12125.","journal-title":"Journal of Research on Adolescence (Wiley-Blackwell)"},{"key":"14_CR79","doi-asserted-by":"publisher","first-page":"248","DOI":"10.1016\/0749-5978(91)90022-L","volume":"50","author":"A Bandura","year":"1991","unstructured":"Bandura, A. 1991. Social cognitive theory of self-regulation. Organizational Behavior and Human Decision Processes. 50: 248\u2013287. https:\/\/doi.org\/10.1016\/0749-5978(91)90022-L.","journal-title":"Organizational Behavior and Human Decision Processes."},{"key":"14_CR80","doi-asserted-by":"publisher","first-page":"1458","DOI":"10.1038\/nn1584","volume":"8","author":"A Bechara","year":"2005","unstructured":"Bechara, A. 2005. Decision making, impulse control and loss of willpower to resist drugs: A neurocognitive perspective. Nature Neuroscience 8: 1458\u20131463. https:\/\/doi.org\/10.1038\/nn1584.","journal-title":"Nature Neuroscience"},{"key":"14_CR81","doi-asserted-by":"publisher","first-page":"665","DOI":"10.1037\/0003-066X.55.6.665","volume":"55","author":"RS Lazarus","year":"2000","unstructured":"Lazarus, R.S. 2000. Toward better research on stress and coping. The American Psychologist. 55: 665\u2013673.","journal-title":"The American Psychologist."},{"key":"14_CR82","doi-asserted-by":"publisher","first-page":"583","DOI":"10.1145\/2675133.2675287","volume-title":"Proceedings of the 18th ACM Conference on Computer Supported Cooperative Work & Social Computing","author":"H Jia","year":"2015","unstructured":"Jia, H., P.J. Wisniewski, H. Xu, M.B. Rosson, and J.M. Carroll. 2015. Risk-taking as a learning process for shaping teen\u2019s online information privacy behaviors. In Proceedings of the 18th ACM Conference on Computer Supported Cooperative Work & Social Computing, 583\u2013599. New York, NY: ACM. https:\/\/doi.org\/10.1145\/2675133.2675287."},{"key":"14_CR83","unstructured":"d\u2019Haenens, L., Vandoninck, S., Donoso, V. How to cope and build online resilience? http:\/\/www2.lse.ac.uk\/media@lse\/research\/EUKidsOnline\/Home.aspx. Last Accessed 22 Oct 2019."},{"key":"14_CR84","doi-asserted-by":"publisher","first-page":"1651","DOI":"10.1016\/j.chb.2010.06.013","volume":"26","author":"DM Law","year":"2010","unstructured":"Law, D.M., J.D. Shapka, and B.F. Olson. 2010. To control or not to control? Parenting Behaviours and Adolescent Online Aggression. Computers in Human Behavior. 26: 1651\u20131656. https:\/\/doi.org\/10.1016\/j.chb.2010.06.013.","journal-title":"Parenting Behaviours and Adolescent Online Aggression. Computers in Human Behavior."},{"key":"14_CR85","unstructured":"NSF Award Search: Award#1618153 \u2013 TWC SBE: Small: Helping teens and parents negotiate online privacy and safety. https:\/\/www.nsf.gov\/awardsearch\/showAward?AWD_ID=1618153&HistoricalAwards=false. Last Accessed 31 July 2017."},{"key":"14_CR86","doi-asserted-by":"publisher","first-page":"1797","DOI":"10.1145\/2556288.2557128","volume-title":"Proceedings of the 32Nd Annual ACM Conference on Human Factors in Computing Systems","author":"Y Hashish","year":"2014","unstructured":"Hashish, Y., A. Bunt, and J.E. Young. 2014. Involving children in content control: A collaborative and education-oriented content filtering approach. In Proceedings of the 32Nd Annual ACM Conference on Human Factors in Computing Systems, 1797\u20131806. New York, NY: ACM. https:\/\/doi.org\/10.1145\/2556288.2557128."},{"key":"14_CR87","doi-asserted-by":"publisher","first-page":"867","DOI":"10.1145\/2750858.2804283","volume-title":"Proceedings of the 2015 ACM International Joint Conference on Pervasive and Ubiquitous Computing","author":"M Ko","year":"2015","unstructured":"Ko, M., S. Choi, S. Yang, J. Lee, and U. Lee. 2015. FamiLync: Facilitating participatory parental mediation of adolescents\u2019 smartphone use. In Proceedings of the 2015 ACM International Joint Conference on Pervasive and Ubiquitous Computing, 867\u2013878. New York, NY: ACM."},{"key":"14_CR88","doi-asserted-by":"publisher","unstructured":"Nouwen, M., JafariNaimi, N., Zaman, B. 2017, August 1. Parental controls: reimagining technologies for parent-child interaction. In Presented at the Proceedings of 15th European Conference on Computer-Supported Cooperative Work-Exploratory Papers, Reports of the European Society for Socially Embedded Technologies. https:\/\/doi.org\/10.18420\/ecscw2017-28.","DOI":"10.18420\/ecscw2017-28"},{"issue":"1","key":"14_CR89","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s10567-013-0135-1","volume":"17","author":"LAS Shapiro","year":"2014","unstructured":"Shapiro, L.A.S., and G. Margolin. 2014. Growing up wired: Social networking sites and adolescent psychosocial development. Clinical Child and Family Psychology Review 17 (1): 1\u201318. https:\/\/doi.org\/10.1007\/s10567-013-0135-1.","journal-title":"Clinical Child and Family Psychology Review"},{"key":"14_CR90","doi-asserted-by":"publisher","first-page":"179","DOI":"10.1016\/j.jadohealth.2011.09.015","volume":"50","author":"LM Jones","year":"2012","unstructured":"Jones, L.M., K.J. Mitchell, and D. Finkelhor. 2012. Trends in youth internet victimization: Findings from three youth internet safety surveys 2000\u20132010. Journal of Adolescent Health 50: 179\u2013186. https:\/\/doi.org\/10.1016\/j.jadohealth.2011.09.015.","journal-title":"Journal of Adolescent Health"},{"key":"14_CR91","unstructured":"Center for Disease Control: FastStats. https:\/\/www.cdc.gov\/nchs\/fastats\/suicide.htm. Last Accessed 24 Nov 2017."},{"key":"14_CR92","doi-asserted-by":"publisher","unstructured":"Twenge, J.M., T.E. Joiner, M.L. Rogers, and G.N. Martin. 2017. Increases in depressive symptoms, suicide-related outcomes, and suicide rates among U.S. adolescents after 2010 and links to increased new media screen time. Clinical Psychological Science. https:\/\/doi.org\/10.1177\/2167702617723376.","DOI":"10.1177\/2167702617723376"},{"key":"14_CR93","volume-title":"Life on the Screen","author":"S Turkle","year":"2011","unstructured":"Turkle, S. 2011. Life on the Screen. New York: Simon and Schuster."},{"key":"14_CR94","doi-asserted-by":"publisher","unstructured":"Jensen, M., M.J. George, M.R. Russell, and C.L. Odgers. 2019. Young adolescents\u2019 digital technology use and mental health symptoms: Little evidence of longitudinal or daily linkages. Clinical Psychological Science. https:\/\/doi.org\/10.1177\/2167702619859336.","DOI":"10.1177\/2167702619859336"},{"key":"14_CR95","doi-asserted-by":"publisher","first-page":"173","DOI":"10.1038\/s41562-018-0506-1","volume":"3","author":"A Orben","year":"2019","unstructured":"Orben, A., and A.K. Przybylski. 2019. The association between adolescent Well-being and digital technology use. Nature Human Behaviour 3: 173\u2013182. https:\/\/doi.org\/10.1038\/s41562-018-0506-1.","journal-title":"Nature Human Behaviour"},{"key":"14_CR96","doi-asserted-by":"publisher","first-page":"194:1","DOI":"10.1145\/3173574.3173768","volume-title":"Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems","author":"AK Ghosh","year":"2018","unstructured":"Ghosh, A.K., K. Badillo-Urquiola, M.B. Rosson, H. Xu, J.M. Carroll, and P.J. Wisniewski. 2018. A matter of control or safety? Examining parental use of technical monitoring apps on teens\u2019 mobile devices. In Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, 194:1\u2013194:14. New York, NY: ACM. https:\/\/doi.org\/10.1145\/3173574.3173768."},{"key":"14_CR97","doi-asserted-by":"publisher","first-page":"399","DOI":"10.1146\/annurev.publhealth.26.021304.144357","volume":"26","author":"F Stevenson","year":"2005","unstructured":"Stevenson, F., and M.A. Zimmerman. 2005. Adolescent resilience: A framework for understanding healthy development in the face of risk. Annual Review of Public Health. 26: 399\u2013419.","journal-title":"Annual Review of Public Health."},{"key":"14_CR98","doi-asserted-by":"publisher","first-page":"30","DOI":"10.1007\/978-3-319-21783-3_3","volume-title":"Nordic Contributions in IS Research","author":"H Hartikainen","year":"2015","unstructured":"Hartikainen, H., N. Iivari, and M. Kinnula. 2015. Children and web 2.0: What they do, what we fear, and what is done to make them safe. In Nordic Contributions in IS Research, ed. H. Oinas-Kukkonen, N. Iivari, K. Kuutti, A. \u00d6\u00f6rni, and M. Rajanen, 30\u201343. Cham: Springer International Publishing. https:\/\/doi.org\/10.1007\/978-3-319-21783-3_3."},{"key":"14_CR99","doi-asserted-by":"publisher","first-page":"578","DOI":"10.1089\/cyber.2014.0095","volume":"17","author":"W Shin","year":"2014","unstructured":"Shin, W., and N. Ismail. 2014. Exploring the role of parents and peers in young adolescents\u2019 risk taking on social networking sites. Cyberpsychology, Behavior and Social Networking 17: 578\u2013583. https:\/\/doi.org\/10.1089\/cyber.2014.0095.","journal-title":"Cyberpsychology, Behavior and Social Networking"},{"key":"14_CR100","unstructured":"Duerager, A., and Livingstone, S. How can parents support children\u2019s internet safety? \nhttp:\/\/www2.lse.ac.uk\/media@lse\/research\/EUKidsOnline\/Home.aspx, Last Accessed 22 Oct 2019."},{"key":"14_CR101","volume-title":"Encyclopedia of Human-Computer Interaction","author":"C Abras","year":"2004","unstructured":"Abras, C., D. Maloney-krichmar, and J. Preece. 2004. User-centered design. In Encyclopedia of Human-Computer Interaction, ed. W. Bainbridge. Thousand Oaks: Sage."},{"key":"14_CR102","volume-title":"Human Development and Education","author":"RJ Havighurst","year":"1953","unstructured":"Havighurst, R.J. 1953. Human Development and Education. New York: Longmans, Green."},{"key":"14_CR103","volume-title":"Boyd, Danah: It\u2019s Complicated: The Social Lives of Networked Teens","author":"EJ Helsper","year":"2014","unstructured":"Helsper, Ellen Johanna. 2014. Boyd, Danah: It\u2019s Complicated: The Social Lives of Networked Teens. New Haven: Yale University Press."},{"key":"14_CR104","doi-asserted-by":"publisher","first-page":"3919","DOI":"10.1145\/2858036.2858317","volume-title":"Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems","author":"P Wisniewski","year":"2016","unstructured":"Wisniewski, P., H. Xu, M.B. Rosson, D.F. Perkins, and J.M. Carroll. 2016. Dear diary: Teens reflect on their weekly online risk experiences. In Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems, 3919\u20133930. New York: ACM. https:\/\/doi.org\/10.1145\/2858036.2858317."},{"key":"14_CR105","unstructured":"Comprehensive Sex Education: Research and Results. http:\/\/www.advocatesforyouth.org\/publications\/1487. Last Accessed 4 Aug 2016."},{"key":"14_CR106","unstructured":"Covenant Eyes."},{"key":"14_CR107","volume-title":"Nudge: Improving Decisions About Health, Wealth, and Happiness","author":"RH Thaler","year":"2008","unstructured":"Thaler, R.H., and C. Sunstein. 2008. Nudge: Improving Decisions About Health, Wealth, and Happiness. New Haven, NJ & London, U.K.: Yale University Press."}],"container-title":["Modern Socio-Technical Perspectives on Privacy"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-82786-1_14","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,4,19]],"date-time":"2022-04-19T20:07:10Z","timestamp":1650398830000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-82786-1_14"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022]]},"ISBN":["9783030827854","9783030827861"],"references-count":107,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-82786-1_14","relation":{},"subject":[],"published":{"date-parts":[[2022]]},"assertion":[{"value":"9 February 2022","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}