{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,7]],"date-time":"2025-08-07T20:45:29Z","timestamp":1754599529550,"version":"3.40.3"},"publisher-location":"Cham","reference-count":30,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319667140"},{"type":"electronic","value":"9783319667157"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-66715-7_16","type":"book-chapter","created":{"date-parts":[[2017,8,24]],"date-time":"2017-08-24T10:51:03Z","timestamp":1503571863000},"page":"157-168","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["SikkerhetsL\u00f8ypa - Knowledge Toward Sustainable and Secure Paths of Creative and Critical Digital Skills"],"prefix":"10.1007","author":[{"given":"Letizia","family":"Jaccheri","sequence":"first","affiliation":[]},{"given":"Deepti","family":"Mishra","sequence":"additional","affiliation":[]},{"given":"Siv Hilde","family":"Houmb","sequence":"additional","affiliation":[]},{"given":"Aida","family":"Omerovic","sequence":"additional","affiliation":[]},{"given":"Sofia","family":"Papavlasopoulou","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,8,25]]},"reference":[{"issue":"3","key":"16_CR1","doi-asserted-by":"publisher","first-page":"364","DOI":"10.1080\/13691180802635455","volume":"12","author":"E Staksrud","year":"2009","unstructured":"Staksrud, E., Livingstone, S.: Children and online risk. Inf. Commun. Soc. 12(3), 364\u2013387 (2009). doi:10.1080\/13691180802635455","journal-title":"Inf. Commun. Soc."},{"key":"16_CR2","doi-asserted-by":"crossref","unstructured":"Teimouri, M., Hassan, M.S., Griffiths, M., Benrazavi, S.R., Bolong, J., Daud, A., Adzharuddin, N.A.: Assessing the validity of western measurement of online risks to children in an Asian context. Child Indic. Res. (2015)","DOI":"10.1007\/s12187-015-9316-4"},{"key":"16_CR3","unstructured":"Cybersecurity Strategic Research Agenda \u2013 SRA, Produced by the European Network and Information Security (NIS) Platform. http:\/\/www.kowi.de\/Portaldata\/2\/Resources\/horizon2020\/coop\/cybersecurity-SRA-final-v0_96-ENISA.pdf"},{"key":"16_CR4","series-title":"IFIP Advances in Information and Communication Technology","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/978-3-642-39377-8_1","volume-title":"Information Assurance and Security Education and Training","author":"R Reid","year":"2013","unstructured":"Reid, R., Van Niekerk, J.: Back to basics: information security education for the youth via gameplay. In: Dodge, R.C., Futcher, L. (eds.) WISE 2009. IAICT, vol. 406, pp. 1\u201310. Springer, Heidelberg (2013). doi:10.1007\/978-3-642-39377-8_1"},{"key":"16_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1007\/978-3-319-46100-7_1","volume-title":"Entertainment Computing - ICEC 2016","author":"IA Stanescu","year":"2016","unstructured":"Stanescu, I.A., Stefan, A., Baalsrud Hauge, J.M.: Using gamification mechanisms and digital games in structured and unstructured learning contexts. In: Wallner, G., Kriglstein, S., Hlavacs, H., Malaka, R., Lugmayr, A., Yang, H.-S. (eds.) ICEC 2016. LNCS, vol. 9926, pp. 3\u201314. Springer, Cham (2016). doi:10.1007\/978-3-319-46100-7_1"},{"key":"16_CR6","unstructured":"Hussain, Z., Griffiths, M.D., Baguley, T.: Online gaming addiction : classification, prediction and associated risk factors. Inf. Healthc. 6359 (2012)"},{"key":"16_CR7","doi-asserted-by":"crossref","unstructured":"Livingstone, S., Haddon, L.: Comparing children\u2019s online opportunities and risks across Europe (2009)","DOI":"10.2307\/j.ctt9qgvds"},{"key":"16_CR8","first-page":"2010","volume":"4","author":"A Lenhart","year":"2009","unstructured":"Lenhart, A.: Teens and sexting: how and why minor teens are sending sexually suggestive nude or nearly nude images via text messaging. Specialist 4, 2010 (2009)","journal-title":"Specialist"},{"key":"16_CR9","unstructured":"Livingstone, S., Mascheroni, G., \u00d3lafsson, K.: Children\u2019s online risks and opportunities: comparative findings from EU Kids Online and Net Children Go Mobile Executive summary (2014)"},{"key":"16_CR10","volume-title":"Patterns of Risk and Safety Online","author":"U Hasebrink","year":"2011","unstructured":"Hasebrink, U., G\u00f6rzig, A., Haddon, L., Kalmus, V., Livingstone, S.: Patterns of Risk and Safety Online. LSD, EU Kids Online Network, London (2011)"},{"key":"16_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"707","DOI":"10.1007\/978-3-319-39483-1_64","volume-title":"Learning and Collaboration Technologies","author":"B Lorenz","year":"2016","unstructured":"Lorenz, B., Kikkas, K., Laanpere, M., Laugasson, E.: A model to evaluate digital safety concerns in school environment. In: Zaphiris, P., Ioannou, A. (eds.) LCT 2016. LNCS, vol. 9753, pp. 707\u2013721. Springer, Cham (2016). doi:10.1007\/978-3-319-39483-1_64"},{"key":"16_CR12","unstructured":"Ofcom: Children Believe Everything they Read Online (2015)"},{"key":"16_CR13","doi-asserted-by":"crossref","unstructured":"Ashcroft, M., Kaati, L., Meyer, M.: A step towards detecting online grooming \u2013 identifying adults pretending to be children. In: Proceedings of the 2015 European Intelligence and Security Informatics Conference, EISIC 2015, pp. 98\u2013104. IEEE Computer Society, Washington, DC (2015)","DOI":"10.1109\/EISIC.2015.41"},{"key":"16_CR14","doi-asserted-by":"crossref","unstructured":"Tsirtsis, A., Tsapatsoulis, N., Stamatelatos, M., Papadamou, K., Sirivianos, M.: Cyber security risks for minors: a taxonomy and a software architecture. In: 2016 11th International Workshop on Semantic and Social Media Adaptation and Personalization (SMAP), Thessaloniki, pp. 93\u201399 (2016)","DOI":"10.1109\/SMAP.2016.7753391"},{"key":"16_CR15","unstructured":"Implementing the Children\u2019s Online Privacy Protection Act: A Report to Congress, FTC, February 2007. http:\/\/www.ftc.gov\/reports\/coppa\/07COPPA-Report-to-Congress.pdf"},{"key":"16_CR16","unstructured":"Marwick, A., Murgia-Diaz, D., Palfrey, J.: Youth, privacy and reputations. Berkman Center Research, Technical report 2010-5 (2010). http:\/\/papers.ssrn.com\/sol3\/papers.cfm?abstract_id=1588163"},{"issue":"3","key":"16_CR17","doi-asserted-by":"publisher","first-page":"133","DOI":"10.1108\/10650741211243157","volume":"29","author":"D Ktoridou","year":"2012","unstructured":"Ktoridou, D., Eteokleous, N., Zahariadou, A.: Exploring parents\u2019 and children\u2019s awareness on internet threats in relation to internet safety. Campus Wide Inf. Syst. 29(3), 133\u2013143 (2012)","journal-title":"Campus Wide Inf. Syst."},{"key":"16_CR18","doi-asserted-by":"publisher","first-page":"319","DOI":"10.1542\/peds.2010-1353","volume":"127","author":"DA Gentile","year":"2011","unstructured":"Gentile, D.A., Choo, H., Liau, A., Sim, T., Li, D., Fung, D., Khoo, A.: Pathological video game use amongst youths: a two-year longitudinal study. Pediatrics 127, 319\u2013329 (2011)","journal-title":"Pediatrics"},{"issue":"4","key":"16_CR19","doi-asserted-by":"publisher","first-page":"401","DOI":"10.1089\/cyber.2009.0222","volume":"13","author":"X Huang","year":"2010","unstructured":"Huang, X., Zhang, H., Li, M., Wang, J., Zhang, Y., Tao, R.: Mental health, personality, and parental rearing styles of adolescents with internet addiction disorder. Cyber Psychol. Behav. Soc. Netw. 13(4), 401\u2013406 (2010)","journal-title":"Cyber Psychol. Behav. Soc. Netw."},{"issue":"4","key":"16_CR20","doi-asserted-by":"publisher","first-page":"455","DOI":"10.1111\/j.1440-1819.2009.01925.x","volume":"63","author":"C Kwisook","year":"2009","unstructured":"Kwisook, C., Hyunsook, S., Myunghee, P., Jinkyu, H., Kitai, K., Byungkoo, L., Hyesun, G.: Internet overuse and excessive daytime sleepiness in adolescents. Psychiatry Clin. Neurosci. 63(4), 455\u2013462 (2009)","journal-title":"Psychiatry Clin. Neurosci."},{"key":"16_CR21","doi-asserted-by":"publisher","first-page":"77","DOI":"10.1080\/15213260802669458","volume":"12","author":"JS Lemmens","year":"2009","unstructured":"Lemmens, J.S., Valkenburg, P.M., Peter, J.: Development and validation of a game addiction scale for adolescents. Media Psychol. 12, 77\u201395 (2009)","journal-title":"Media Psychol."},{"key":"16_CR22","doi-asserted-by":"publisher","first-page":"205","DOI":"10.1111\/j.1360-0443.2010.03104.x","volume":"106","author":"AJ Van Rooij","year":"2011","unstructured":"Van Rooij, A.J., Schoenmakers, T.M., Vermulst, A.A., Van Den Eijnden, R.J.J.M., Van De Mheen, D.: Online video game addiction: identification of addicted adolescent gamers. Addiction 106, 205\u2013212 (2011)","journal-title":"Addiction"},{"key":"16_CR23","unstructured":"Kafai, Y.B., Richard, G.T., Brendesha, M. (eds.) Diversifying Barbie and Mortal Kombat, Intersectional Perspectives and Inclusive Designs in Gaming. ETC Press (2016)"},{"issue":"1","key":"16_CR24","doi-asserted-by":"publisher","first-page":"42","DOI":"10.1145\/323830.323843","volume":"43","author":"CM Gorriz","year":"2000","unstructured":"Gorriz, C.M., Medina, C.: Engaging girls with computers through software games. Commun. ACM 43(1), 42\u201349 (2000)","journal-title":"Commun. ACM"},{"key":"16_CR25","unstructured":"Fron, J., Fullerton, T., Morie, J., Pearce, C.: The hegemony of play. In: Baba, A. (ed.) Situated Play: Proceedings of the Digital Games Research Association Conference, Tokyo, pp. 309\u2013318, 24\u201328 September 2007"},{"issue":"1","key":"16_CR26","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1080\/02614360306571","volume":"22","author":"JO Bryce","year":"2003","unstructured":"Bryce, J.O., Rutter, J.: Gender dynamics and the social and spatial organization of computer gaming. Leis. Stud. 22(1), 1\u201315 (2003). Routledge, London","journal-title":"Leis. Stud."},{"key":"16_CR27","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"398","DOI":"10.1007\/978-3-319-07482-5_38","volume-title":"Learning and Collaboration Technologies. Designing and Developing Novel Learning Experiences","author":"MN Giannakos","year":"2014","unstructured":"Giannakos, M.N., Jaccheri, L., Leftheriotis, I.: Happy girls engaging with technology: assessing emotions and engagement related to programming activities. In: Zaphiris, P., Ioannou, A. (eds.) LCT 2014. LNCS, vol. 8523, pp. 398\u2013409. Springer, Cham (2014). doi:10.1007\/978-3-319-07482-5_38"},{"key":"16_CR28","doi-asserted-by":"crossref","unstructured":"Giannakos, M.N., Jaccheri, L.: What motivates children to become creators of digital enriched artifacts? In: Proceedings of the 9th ACM Conference on Creativity & Cognition. ACM (2013)","DOI":"10.1145\/2466627.2466634"},{"key":"16_CR29","doi-asserted-by":"crossref","unstructured":"Papavlasopoulou, S., Giannakos, M.N., Jaccheri, L.: Creative programming experiences for teenagers: attitudes, performance and gender differences. In: Proceedings of the 15th International Conference on Interaction Design and Children, IDC 2016, pp. 565\u2013570. ACM, New York (2016)","DOI":"10.1145\/2930674.2935994"},{"key":"16_CR30","unstructured":"Exploiting Ubiquitous Computing, Mobile Computing and the Internet of Things to promote Science Education. http:\/\/umi-sci-ed.eu\/"}],"container-title":["Lecture Notes in Computer Science","Entertainment Computing \u2013 ICEC 2017"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-66715-7_16","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,8,23]],"date-time":"2021-08-23T00:05:19Z","timestamp":1629677119000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-66715-7_16"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319667140","9783319667157"],"references-count":30,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-66715-7_16","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2017]]},"assertion":[{"value":"25 August 2017","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICEC","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Entertainment Computing","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Tsukuba City","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Japan","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2017","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"18 September 2017","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"21 September 2017","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"16","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"iwec2017","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/icec2017.net\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"This content has been made available to all.","name":"free","label":"Free to read"}]}}