{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T12:38:44Z","timestamp":1743079124668,"version":"3.40.3"},"publisher-location":"Cham","reference-count":37,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031359262"},{"type":"electronic","value":"9783031359279"}],"license":[{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023]]},"DOI":"10.1007\/978-3-031-35927-9_36","type":"book-chapter","created":{"date-parts":[[2023,7,8]],"date-time":"2023-07-08T23:05:33Z","timestamp":1688857533000},"page":"529-547","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["\u2018They\u2019re Not Risky\u2019 vs \u2018It Can Ruin Your Whole Life\u2019: How Parent-Child Dyads Differ in their Understandings of Online Risk"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-9176-6778","authenticated-orcid":false,"given":"Olivia","family":"Williams","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2735-8809","authenticated-orcid":false,"given":"Kerrianne","family":"Buchanan","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3889-6047","authenticated-orcid":false,"given":"Yee-Yin","family":"Choong","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,7,9]]},"reference":[{"key":"36_CR1","doi-asserted-by":"publisher","first-page":"810","DOI":"10.4135\/9781412963909.n172","volume":"1","author":"L Ayres","year":"2008","unstructured":"Ayres, L.: Semi-structured interview. SAGE Encyclopedia Qual. Res. Meth. 1, 810\u2013811 (2008). https:\/\/doi.org\/10.4135\/9781412963909.n172","journal-title":"SAGE Encyclopedia Qual. Res. Meth."},{"issue":"2","key":"36_CR2","doi-asserted-by":"publisher","first-page":"147","DOI":"10.1108\/ITSE-09-2015-0029","volume":"13","author":"F Annansingh","year":"2016","unstructured":"Annansingh, F., Veli, T.: An investigation into risks awareness and e-safety needs of children on the internet: a study of Devon UK. Interact. Technol. Smart Educ. 13(2), 147\u2013165 (2016). https:\/\/doi.org\/10.1108\/ITSE-09-2015-0029","journal-title":"Interact. Technol. Smart Educ."},{"key":"36_CR3","unstructured":"Auxier, B., Anderson, M., Perrin, A., Turner, E.: Children\u2019s engagement with digital devices, screen time. Pew Research Center (2020). https:\/\/www.pewresearch.org\/internet\/2020\/07\/28\/childrens-engagement-with-digital-devices-screen-time\/"},{"key":"36_CR4","unstructured":"Auxier, B., Anderson, M., Perrin, A., Turner, E.: Parenting approaches and concerns related to digital devices. Pew Research Center (2020). https:\/\/www.pewresearch.org\/internet\/2020\/07\/28\/parenting-approaches-and-concerns-related-to-digital-devices\/"},{"key":"36_CR5","doi-asserted-by":"publisher","unstructured":"Badillo-Urquiola, K.A., Ghosh, A.K., Wisniewski, P.: Understanding the unique online challenges faced by teens in the foster care system. In: Companion of the 2017 ACM Conference on Computer Supported Cooperative Work and Social Computing, pp. 139\u2013142, February 2017. https:\/\/doi.org\/10.1145\/3022198.3026314","DOI":"10.1145\/3022198.3026314"},{"issue":"2","key":"36_CR6","doi-asserted-by":"publisher","first-page":"167","DOI":"10.1109\/TPC.2009.2017985","volume":"52","author":"S Chai","year":"2009","unstructured":"Chai, S., BagchiSen, S., Morrell, C., Rao, H.R., Upadhyaya, S.J.: Internet and online information privacy: an exploratory study of preteens and early teens. IEEE Trans. Prof. Commun. 52(2), 167\u2013182 (2009). https:\/\/doi.org\/10.1109\/TPC.2009.2017985","journal-title":"IEEE Trans. Prof. Commun."},{"key":"36_CR7","doi-asserted-by":"publisher","DOI":"10.1016\/j.dr.2021.100979","volume":"61","author":"S Ciranka","year":"2021","unstructured":"Ciranka, S., van den Bos, W.: Adolescent risk-taking in the context of exploration and social influence. Dev. Rev. 61, 100979 (2021). https:\/\/doi.org\/10.1016\/j.dr.2021.100979","journal-title":"Dev. Rev."},{"issue":"1","key":"36_CR8","doi-asserted-by":"publisher","first-page":"1","DOI":"10.3102\/01623737026001001","volume":"26","author":"LM Desimone","year":"2004","unstructured":"Desimone, L.M., Le Floch, K.C.: Are we asking the right questions? Using cognitive interviews to improve surveys in education research. Educ. Eval. Policy Anal. 26(1), 1\u201322 (2004). https:\/\/doi.org\/10.3102\/01623737026001001","journal-title":"Educ. Eval. Policy Anal."},{"issue":"6","key":"36_CR9","doi-asserted-by":"publisher","first-page":"2281","DOI":"10.1016\/j.chb.2013.05.022","volume":"29","author":"K Davis","year":"2013","unstructured":"Davis, K.: Young people\u2019s digital lives: the impact of interpersonal relationships and digital media use on adolescents\u2019 sense of identity. Comput. Hum. Behav. 29(6), 2281\u20132293 (2013). https:\/\/doi.org\/10.1016\/j.chb.2013.05.022","journal-title":"Comput. Hum. Behav."},{"issue":"4","key":"36_CR10","doi-asserted-by":"publisher","first-page":"521","DOI":"10.1080\/17439884.2014.994219","volume":"41","author":"K Davis","year":"2016","unstructured":"Davis, K., Koepke, L.: Risk and protective factors associated with cyberbullying: are relationships or rules more protective? Learn. Media Technol. 41(4), 521\u2013545 (2016). https:\/\/doi.org\/10.1080\/17439884.2014.994219","journal-title":"Learn. Media Technol."},{"issue":"4","key":"36_CR11","doi-asserted-by":"publisher","first-page":"281","DOI":"10.1080\/07370024.2018.1437544","volume":"33","author":"A El Asam","year":"2018","unstructured":"El Asam, A., Katz, A.: Vulnerable young people and their experience of online risks. Hum.-Comput. Interact. 33(4), 281\u2013304 (2018). https:\/\/doi.org\/10.1080\/07370024.2018.1437544","journal-title":"Hum.-Comput. Interact."},{"issue":"22","key":"36_CR12","doi-asserted-by":"publisher","first-page":"8531","DOI":"10.3390\/ijerph17228531","volume":"17","author":"N Harriman","year":"2020","unstructured":"Harriman, N., Shortland, N., Su, M., Cote, T., Testa, M.A., Savoia, E.: Youth exposure to hate in the online space: an exploratory analysis. Int. J. Environ. Res. Public Health 17(22), 8531 (2020). https:\/\/doi.org\/10.3390\/ijerph17228531","journal-title":"Int. J. Environ. Res. Public Health"},{"key":"36_CR13","doi-asserted-by":"publisher","unstructured":"Helsper, E.J.: Digital inequalities amongst digital natives. In: The Routledge Companion to Digital Media and Children, pp. 435\u2013448. Routledge (2020). https:\/\/doi.org\/10.4324\/9781351004107","DOI":"10.4324\/9781351004107"},{"key":"36_CR14","first-page":"139","volume":"10","author":"P Kalibova","year":"2016","unstructured":"Kalibova, P., Milkova, E.: Internet addictive behaviour of adolescents. Int. J. Educ. Inf. Technol. 10, 139\u2013143 (2016)","journal-title":"Int. J. Educ. Inf. Technol."},{"key":"36_CR15","unstructured":"Kuldas, S., Sargioti, A., Milosevic, T., Norman, J.O.H.: A review and content validation of 10 measurement scales for parental mediation of children\u2019s Internet use. Int. J. Commun. 15, 23 (2021). https:\/\/ijoc.org\/index.php\/ijoc\/article\/view\/17265"},{"key":"36_CR16","doi-asserted-by":"publisher","unstructured":"Larraaga, E., Yubero, S., Ovejero, A., Navarro, R.: Loneliness, parent-child communication and cyberbullying victimization among Spanish youths. Comput. Hum. Beh. 65(C), 1\u20138 (2016). https:\/\/doi.org\/10.1016\/j.chb.2016.08.015","DOI":"10.1016\/j.chb.2016.08.015"},{"issue":"3","key":"36_CR17","doi-asserted-by":"publisher","first-page":"1103","DOI":"10.1177\/1461444816685930","volume":"20","author":"S Livingstone","year":"2018","unstructured":"Livingstone, S., Mascheroni, G., Staksrud, E.: European research on children\u2019s internet use: assessing the past and anticipating the future. New Media Soc. 20(3), 1103\u20131122 (2018). https:\/\/doi.org\/10.1177\/1461444816685930","journal-title":"New Media Soc."},{"issue":"2","key":"36_CR18","doi-asserted-by":"publisher","first-page":"116","DOI":"10.1027\/1016-9040\/a000450","volume":"27","author":"MG Lo Cricchio","year":"2022","unstructured":"Lo Cricchio, M.G., Palladino, B.E., Eleftheriou, A., Nocentini, A., Menesini, E.: Parental mediation strategies and their role on youth\u2019s online privacy disclosure and protection: a systematic review. Eur. Psychol. 27(2), 116\u2013130 (2022). https:\/\/doi.org\/10.1027\/1016-9040\/a000450","journal-title":"Eur. Psychol."},{"issue":"1\u20132","key":"36_CR19","doi-asserted-by":"publisher","first-page":"39","DOI":"10.3233\/DEV-200300","volume":"15","author":"C Longobardi","year":"2021","unstructured":"Longobardi, C., Fabris, M.A., Prino, L.E., Settanni, M.: Online sexual victimization among middle school students: prevalence and association with online risk behaviors. Int. J. Dev. Sustain. 15(1\u20132), 39\u201346 (2021). https:\/\/doi.org\/10.3233\/DEV-200300","journal-title":"Int. J. Dev. Sustain."},{"issue":"2","key":"36_CR20","doi-asserted-by":"publisher","first-page":"133","DOI":"10.1016\/j.jadohealth.2018.03.012","volume":"63","author":"S Madigan","year":"2018","unstructured":"Madigan, S., et al.: The prevalence of unwanted online sexual exposure and solicitation among youth: A meta-analysis. J. Adolesc. Health 63(2), 133\u2013141 (2018). https:\/\/doi.org\/10.1016\/j.jadohealth.2018.03.012","journal-title":"J. Adolesc. Health"},{"key":"36_CR21","doi-asserted-by":"publisher","unstructured":"Maqsood, S., Biddle, R., Maqsood, S., Chiasson, S.: An exploratory study of children's online password behaviours. In: Proceedings of the 17th ACM Conference on Interaction Design and Children, pp. 539\u2013544, June 2018. https:\/\/doi.org\/10.1145\/3202185.3210772","DOI":"10.1145\/3202185.3210772"},{"issue":"1","key":"36_CR22","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1504\/IJTEL.2016.075949","volume":"8","author":"C McDonald-Brown","year":"2016","unstructured":"McDonald-Brown, C., Laxman, K., Hope, J.: An exploration of the contexts, challenges and competencies of pre-teenage children on the internet. Int. J. Technol. Enhan. Learn. 8(1), 1\u201325 (2016)","journal-title":"Int. J. Technol. Enhan. Learn."},{"issue":"5","key":"36_CR23","doi-asserted-by":"publisher","first-page":"1169","DOI":"10.1108\/IntR-02-2017-0077","volume":"28","author":"BC McHugh","year":"2018","unstructured":"McHugh, B.C., Wisniewski, P.J., Rosson, M.B., Carroll, J.M.: When social media traumatizes teens: The roles of online risk exposure, coping, and post-traumatic stress. Internet Res. 28(5), 1169\u20131188 (2018). https:\/\/doi.org\/10.1108\/IntR-02-2017-0077","journal-title":"Internet Res."},{"key":"36_CR24","doi-asserted-by":"publisher","unstructured":"Rega, V., Gioia, F., Boursier, V.: Parental mediation and cyberbullying: a narrative literature review. Marr. Family Rev. 1\u201337 (2022). https:\/\/doi.org\/10.1080\/01494929.2022.2069199","DOI":"10.1080\/01494929.2022.2069199"},{"issue":"10","key":"36_CR25","doi-asserted-by":"publisher","first-page":"1257","DOI":"10.1007\/s00787-017-0984-0","volume":"26","author":"I Reiner","year":"2017","unstructured":"Reiner, I., Tibubos, A.N., Hardt, J., M\u00fcller, K., W\u00f6lfling, K., Beutel, M.E.: Peer attachment, specific patterns of internet use and problematic internet use in male and female adolescents. Eur. Child Adolesc. Psychiatry 26(10), 1257\u20131268 (2017). https:\/\/doi.org\/10.1007\/s00787-017-0984-0","journal-title":"Eur. Child Adolesc. Psychiatry"},{"key":"36_CR26","doi-asserted-by":"publisher","first-page":"19","DOI":"10.1016\/j.dcn.2017.07.007","volume":"27","author":"D Romer","year":"2017","unstructured":"Romer, D., Reyna, V.F., Satterthwaite, T.D.: Beyond stereotypes of adolescent risk-taking: placing the adolescent brain in developmental context. Dev. Cogn. Neurosci. 27, 19\u201334 (2017). https:\/\/doi.org\/10.1016\/j.dcn.2017.07.007","journal-title":"Dev. Cogn. Neurosci."},{"key":"36_CR27","unstructured":"Salda\u00f1a, J.: The Coding Manual for Qualitative Researchers. The Coding Manual for Qualitative Researchers, 3rd Ed. pp.1\u2013440 (2021). http:\/\/digital.casalini.it\/9781529755992"},{"key":"36_CR28","unstructured":"Smahel, D., et al.: EU Kids Online 2020: Survey results from 19 countries (2020). https:\/\/www.eukidsonline.ch\/files\/Eu-kids-online-2020-international-report.pdf"},{"issue":"4","key":"36_CR29","doi-asserted-by":"publisher","first-page":"318","DOI":"10.1097\/DBP.0000000000000553","volume":"39","author":"C Strong","year":"2018","unstructured":"Strong, C., Lee, C.T., Chao, L.H., Lin, C.Y., Tsai, M.C.: Adolescent Internet use, social integration, and depressive symptoms: analysis from a longitudinal cohort survey. J. Dev. Behav. Pediatr. 39(4), 318\u2013324 (2018). https:\/\/doi.org\/10.1097\/DBP.0000000000000553","journal-title":"J. Dev. Behav. Pediatr."},{"issue":"6","key":"36_CR30","doi-asserted-by":"publisher","first-page":"2838","DOI":"10.1016\/j.chb.2006.05.008","volume":"23","author":"M Valcke","year":"2007","unstructured":"Valcke, M., Schellens, T., Van Keer, H., Gerarts, M.: Primary school children\u2019s safe and unsafe use of the Internet at home and at school: An exploratory study. Comput. Hum. Behav. 23(6), 2838\u20132850 (2007). https:\/\/doi.org\/10.1016\/j.chb.2006.05.008","journal-title":"Comput. Hum. Behav."},{"key":"36_CR31","doi-asserted-by":"publisher","unstructured":"Vissenberg, J., d'Haenens, L.: Protecting youth\u2019s wellbeing online: Studying the associations between opportunities, risks, and resilience. Media Commun. 8(2), 175\u2013184 (2020). https:\/\/doi.org\/10.17645\/mac.v8i2.2774","DOI":"10.17645\/mac.v8i2.2774"},{"issue":"2","key":"36_CR32","doi-asserted-by":"publisher","first-page":"76","DOI":"10.1027\/1016-9040\/a000478","volume":"27","author":"J Vissenberg","year":"2022","unstructured":"Vissenberg, J., d\u2019Haenens, L., Livingstone, S.: Digital literacy and online resilience as facilitators of young people\u2019s well-being? A Systematic review? Eur. Psychol. 27(2), 76\u201385 (2022). https:\/\/doi.org\/10.1027\/1016-9040\/a000478","journal-title":"Eur. Psychol."},{"key":"36_CR33","doi-asserted-by":"publisher","DOI":"10.1016\/j.dr.2021.100980","volume":"61","author":"T Willoughby","year":"2021","unstructured":"Willoughby, T., Heffer, T., Good, M., Magnacca, C.: Is adolescence a time of heightened risk-taking? An overview of types of risk-taking behaviors across age groups. Dev. Rev. 61, 100980 (2021). https:\/\/doi.org\/10.1016\/j.dr.2021.100980","journal-title":"Dev. Rev."},{"key":"36_CR34","doi-asserted-by":"publisher","unstructured":"Wisniewski, P., Jia, H., Wang, N., Zheng, S., Xu, H., Rosson, M.B., Carroll, J.M.: Resilience mitigates the negative effects of adolescent internet addiction and online risk exposure. In Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems, pp. 4029\u20134038, April 2015. https:\/\/doi.org\/10.1145\/2702123.2702240","DOI":"10.1145\/2702123.2702240"},{"key":"36_CR35","doi-asserted-by":"publisher","unstructured":"Wisniewski, P., Xu, H., Rosson, M.B., Perkins, D.F., Carroll, J.M.: Dear diary: Teens reflect on their weekly online risk experiences. In: Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems, pp. 3919\u20133930, May 2016. https:\/\/doi.org\/10.1145\/2858036.2858317","DOI":"10.1145\/2858036.2858317"},{"key":"36_CR36","doi-asserted-by":"publisher","unstructured":"Wisniewski, P., Ghosh, A.K., Xu, H., Rosson, M.B. and Carroll, J.M.: Parental control vs. teen self-regulation: Is there a middle ground for mobile online safety?. In: Proceedings of the 2017 ACM Conference on Computer Supported Cooperative Work and Social Computing, pp. 51\u201369, February 2017. https:\/\/doi.org\/10.1145\/2998181.2998352","DOI":"10.1145\/2998181.2998352"},{"key":"36_CR37","doi-asserted-by":"publisher","unstructured":"Y\u0131lmaz, R., Gizem, K.Y.F., Tu\u011fba, \u00d6.H., Tu\u011fra, K.: Examining secondary school students' safe computer and internet usage awareness: an example from Bart\u0131n province. Pegem E\u011fitim Ve \u00d6\u011fretim Dergisi 7(1), 83\u2013114 (2017). https:\/\/doi.org\/10.14527\/pegegog.2017.004","DOI":"10.14527\/pegegog.2017.004"}],"container-title":["Lecture Notes in Computer Science","Social Computing and Social Media"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-35927-9_36","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,7,8]],"date-time":"2023-07-08T23:46:48Z","timestamp":1688860008000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-35927-9_36"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023]]},"ISBN":["9783031359262","9783031359279"],"references-count":37,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-35927-9_36","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2023]]},"assertion":[{"value":"9 July 2023","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"HCII","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Human-Computer Interaction","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Copenhagen","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Denmark","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2023","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"23 July 2023","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"28 July 2023","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"25","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"hcii2023","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/2023.hci.international\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"CMS","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"7472","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"1578","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"396","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"21% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}