{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,26]],"date-time":"2026-01-26T00:41:40Z","timestamp":1769388100264,"version":"3.49.0"},"publisher-location":"Dordrecht","reference-count":52,"publisher":"Springer Netherlands","isbn-type":[{"value":"9789400751842","type":"print"},{"value":"9789400751705","type":"electronic"}],"license":[{"start":{"date-parts":[[2012,10,12]],"date-time":"2012-10-12T00:00:00Z","timestamp":1350000000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2012,10,12]],"date-time":"2012-10-12T00:00:00Z","timestamp":1350000000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013]]},"DOI":"10.1007\/978-94-007-5170-5_5","type":"book-chapter","created":{"date-parts":[[2012,11,22]],"date-time":"2012-11-22T19:14:18Z","timestamp":1353611658000},"page":"119-144","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Digital Natives and the Metamorphosis of the European Information Society. The Emerging Behavioral Trends Regarding Privacy and Their Legal Implications"],"prefix":"10.1007","author":[{"given":"Norberto Nuno Gomes","family":"de Andrade","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Shara","family":"Monteleone","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2012,10,12]]},"reference":[{"key":"5_CR1","doi-asserted-by":"crossref","unstructured":"Alessandro Acquisti and Ralph Ross. 2006. Imagined communities: awareness, information sharing and privacy on the facebook. Proceedings of Privacy Enhancing Technologies Workshop(PET) 2006, LNCS 4258, Springer: 36\u201358.","DOI":"10.1007\/11957454_3"},{"key":"5_CR2","volume-title":"Regulatory impact assessment. Towards better regulation?","author":"L Allio","year":"2007","unstructured":"Allio, Lorenzo. 2007. Better regulation and impact assessment in the European Commission. InRegulatory impact assessment. Towards better regulation? ed. C. Kirkpatrick and D. Parker. Cheltenham: Edward Elgar."},{"key":"5_CR3","doi-asserted-by":"crossref","unstructured":"Allio, Lorenzo. 2010. Keeping the centre of gravity work: Impact assessment, scientific advice and regulatory reform.European Journal of Risk Regulation.","DOI":"10.1017\/S1867299X0000009X"},{"key":"5_CR4","doi-asserted-by":"crossref","first-page":"19","DOI":"10.1017\/S1867299X00000581","volume":"1","author":"L Allio","year":"2011","unstructured":"Allio, Lorenzo. 2011. On the smartness of smart regulation \u2013 A brief comment on the future reform agenda.European Journal of Risk Regulation 1: 19\u201320.","journal-title":"European Journal of Risk Regulation"},{"key":"5_CR5","doi-asserted-by":"publisher","first-page":"1289","DOI":"10.1016\/j.chb.2010.03.018","volume":"26","author":"Y Amichai-Hamburger","year":"2011","unstructured":"Amichai-Hamburger, Yair, and Gideon Vinitzky. 2011. Social network use and personality.Computers in Human Behavior 26: 1289\u20131295.","journal-title":"Computers in Human Behavior"},{"key":"5_CR6","first-page":"121","volume":"4","author":"N Andrade","year":"2010","unstructured":"Andrade, Norberto. 2010. Technology and metaphors: From cyberspace to ambient intelligence.Observatorio (OBS*) Journal 4: 121\u2013146.","journal-title":"Observatorio (OBS*) Journal"},{"key":"5_CR7","unstructured":"Article 29 Working Party. 2009a. The future of privacy. Joint contribution to the consultation of the European Commission on the legal framework for the fundamental right to protection of personal data.http:\/\/ec.europa.eu\/justice\/policies\/privacy\/docs\/wpdocs\/2009\/wp168_en.pdf."},{"key":"5_CR8","unstructured":"Article 29 Working Party. 2009b. Opinion 5\/2009 on online social networking.http:\/\/ec.europa.eu\/justice\/policies\/privacy\/docs\/wpdocs\/2009\/wp163_en.pdf."},{"key":"5_CR9","doi-asserted-by":"publisher","first-page":"775","DOI":"10.1111\/j.1467-8535.2007.00793.x","volume":"39","author":"S Bennett","year":"2008","unstructured":"Bennett, Sue, Karl Maton, and Lisa Kervin. 2008. The \u2018digital natives\u2019 debate: A critical review of the evidence.British Journal of Educational Technology 39: 775\u2013786.","journal-title":"British Journal of Educational Technology"},{"key":"5_CR10","unstructured":"Boyd, Danah and Alice Marwick. 2011. Social privacy in network publics: Teens\u2019 attitudes, practices and strategies.. Paper presented at Oxford Internet Institute\u2019s \u201cA Decade in Internet Time: Symposium on the Dynamics of the Internet and Society\u201d.http:\/\/papers.ssrn.com\/sol3\/papers.cfm?abstract_id=1925128. Accessed 22 Sept 2011."},{"issue":"6","key":"5_CR11","first-page":"40","volume":"20","author":"I Brown","year":"2010","unstructured":"Brown, Ian. 2010. Data protection: The new technical and political environment.Computers and Law 20(6): 40\u201342.","journal-title":"Computers and Law"},{"key":"5_CR12","volume-title":"Youth, identity and digital media","author":"D Buckingham","year":"2008","unstructured":"Buckingham, David. 2008.Youth, identity and digital media. Cambridge, MA: MIT Press."},{"key":"5_CR13","first-page":"1131","volume":"86","author":"MR Calo","year":"2011","unstructured":"Calo, Ryan. 2011. The boundaries of privacy harm.Indiana Law Journal 86: 1131.","journal-title":"Indiana Law Journal"},{"key":"5_CR14","unstructured":"Center for Democracy and Technology Policy Post. 2009. The dawn of the location-enabled.\n                https:\/\/www.cdt.org\/policy\/dawn-location-enabled-web."},{"key":"5_CR16","doi-asserted-by":"publisher","first-page":"96","DOI":"10.1016\/j.intcom.2010.10.004","volume":"23","author":"C Denvir","year":"2011","unstructured":"Denvir, Catrina, Nijel J. Balmer, and Pascoe Pleasence. 2011. Surfing the web \u2013 Recreation or resource? Exploring how young people in the UK use the internet as an advice portal for problems with a legal dimension.Interacting with Computers 23: 96\u2013104.","journal-title":"Interacting with Computers"},{"key":"5_CR17","volume-title":"Better regulation \u2013 simply explained","author":"European Commission","year":"2006","unstructured":"European Commission. 2006.Better regulation \u2013 simply explained. Luxembourg: Office for Official Publications of the European Communities."},{"key":"5_CR18","unstructured":"European Commission. 2009.Impact Assessment Guidelines. Luxembourg: Office for Official Publications of the European Communities."},{"issue":"3","key":"5_CR19","doi-asserted-by":"publisher","first-page":"585","DOI":"10.1016\/j.compedu.2010.09.020","volume":"56","author":"R Eynon","year":"2011","unstructured":"Eynon, Rebecca, and L.E. Malmberg. 2011. A typology of young people\u2019s internet use: Implications for education.Computers in Education 56(3): 585\u2013595.","journal-title":"Computers in Education"},{"issue":"8","key":"5_CR20","doi-asserted-by":"publisher","first-page":"1228","DOI":"10.1177\/1461444811401735","volume":"13","author":"RW Gehl","year":"2011","unstructured":"Gehl, Robert W. 2011. The archive and the processor: The internal logic of web 2.0.New Media and Society 13(8): 1228\u20131244.","journal-title":"New Media and Society"},{"issue":"4","key":"5_CR22","doi-asserted-by":"publisher","first-page":"289","DOI":"10.1007\/s10676-010-9224-8","volume":"13","author":"H Gordon","year":"2011","unstructured":"Gordon, Hull, Heather R. Lipford, and Celine Latulipe. 2011. Contextual gaps: Privacy issues on Facebook.Ethics and Information Technology 13(4): 289\u2013302.http:\/\/ssrn.com\/abstract=1427546.","journal-title":"Ethics and Information Technology"},{"key":"5_CR25","first-page":"793","volume":"19","author":"G James","year":"2010","unstructured":"Grimmelman James. 2010. Privacy as product safety.Widener Law Journal 19: 793.","journal-title":"Widener Law Journal"},{"key":"5_CR23","doi-asserted-by":"crossref","unstructured":"Gross, Ralph and Alessandro Acquisti. 2005. Information revelation and privacy in online social network (The Facebook case). InProceedings of the ACM workshop on privacy in the electronic society (WPES), New York: ACM.","DOI":"10.1145\/1102199.1102214"},{"key":"5_CR24","doi-asserted-by":"crossref","unstructured":"Hoofnagle, Chris, Jennifer King, Su Li, and Joseph Turow. 2010. How different are young adults from older adults when it comes to information privacy attitudes and policies?. Survey.http:\/\/www.ftc.gov\/os\/comments\/privacyroundtable\/544506-00125.pdf. Accessed 14 Apr 2010.","DOI":"10.2139\/ssrn.1589864"},{"key":"5_CR29","volume-title":"Digital privacy, theries, technologies and practices","author":"K Maria","year":"2008","unstructured":"Karyda, Maria, and Spyros Kokolakis. 2008. Privacy perceptions among members of online communities. InDigital privacy, theries, technologies and practices, ed. Alessandro Acquisti, Stefanos Gritzalis, Costas Lambrinousakis, and Sabrina De Capitani di Vecemercati. New York: Auerbach Publications."},{"issue":"2","key":"5_CR26","doi-asserted-by":"publisher","first-page":"136","DOI":"10.1016\/j.clsr.2009.02.010","volume":"25","author":"D Le M\u00e9tayer","year":"2009","unstructured":"Le M\u00e9tayer, Daniel, and Shara Monteleone. 2009. Automated consent through privacy agent: Legal requirements and technical architecture.Computer Law Security Review 25(2): 136\u2013144.","journal-title":"Computer Law Security Review"},{"key":"5_CR27","unstructured":"Lusoli, Wainer, Margherita Bacigalupo, Francisco Lupia\u00f1ez, Norberto Andrade, Shara Monteleone, and Ioannis Maghiros. 2012.Pan-European Survey of practices, attitudes & policy preferences as regard personal identity data management. JRC Scientific and Policy Reports, EUR 25295."},{"key":"5_CR28","doi-asserted-by":"publisher","first-page":"429","DOI":"10.1016\/j.compedu.2010.09.004","volume":"56","author":"A Margaryan","year":"2011","unstructured":"Margaryan, Anoush, Allison Littlejohn, and Gabrielle Vojt. 2011. Are digital natives a myth or reality?Computers in Education 56: 429\u2013440.","journal-title":"Computers in Education"},{"key":"5_CR30","unstructured":"Marwick, Alice, Diego Murgia-D\u00edaz, and John Palfrey. 2010. Youth, privacy and reputation.Berkman Center Research Publications No. 2010-5. Harvard: Harvard University."},{"key":"5_CR31","unstructured":"Mateus, Alexandre. M., and Jon. M. Peha. 2011. Quantifying global transfers of copyrighted content using BitTorrent. In39th telecommunications policy research conference (TPRC) 2011. Arlington: George Mason University School of Law."},{"key":"5_CR32","doi-asserted-by":"crossref","unstructured":"Mccolm, Helen. 2011. Smart regulation: The European Commission\u2019s updated strategy.European Journal of Risk Regulation.","DOI":"10.1017\/S1867299X00000568"},{"key":"5_CR33","volume-title":"Impact assessment in EU lawmaking","author":"ACM Meuwese","year":"2008","unstructured":"Meuwese, Anne. 2008.Impact assessment in EU lawmaking. The Hague: Kluwer Law International. Last accessed June 2012."},{"key":"5_CR34","unstructured":"Minnesota girl alleges school privacy invasion,CNN U.S., 10 Mar 2012,http:\/\/articles.cnn.com\/2012-03-10\/us\/us_minnesota-student-privacy_1_school-counselor-school-house-gate-facebook?_s=PM:US."},{"issue":"1","key":"5_CR35","first-page":"119","volume":"79","author":"H Nissenbaum","year":"2004","unstructured":"Nissenbaum, Helen. 2004. Privacy as contextual integrity.Washington Law Review 79(1): 119\u2013158.","journal-title":"Washington Law Review"},{"key":"5_CR36","volume-title":"Born digital","author":"J Palfrey","year":"2008","unstructured":"Palfrey, John, and Urs Grasser. 2008.Born digital. New York: Basic Books."},{"issue":"1","key":"5_CR15","doi-asserted-by":"publisher","first-page":"37","DOI":"10.1108\/14636680810856017","volume":"10","author":"P Corina","year":"2008","unstructured":"Pascu, Corina, David Osimo, Geomina Turlea, Martin Ulbric, Yves Punie, and Jean-Claude Burgelman. 2008. Social computing \u2013 Implications for the EU innovation landscape.Foresight 10(1): 37\u201352. Emerald.","journal-title":"Foresight"},{"key":"5_CR37","volume-title":"Data protection in a profiled world","author":"Y Poullet","year":"2010","unstructured":"Poullet, Yves. 2010. About the E-privacy directive: Towards a third generation of data protection legislation? InData protection in a profiled world, ed. Serge Gutwirth, Yves Poullet, and Paul De Hert. Dordrecht\/London: Springer."},{"issue":"5","key":"5_CR38","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1108\/10748120110424816","volume":"9","author":"M Prensky","year":"2001","unstructured":"Prensky, Marc. 2001. Digital natives, digital immigrants.On The Horizon 9(5): 1\u20136. MCB University Press.","journal-title":"On The Horizon"},{"key":"5_CR39","volume-title":"Property rights in personal data. A European perspective","author":"N Purtova","year":"2012","unstructured":"Purtova, Nadezhda. 2012.Property rights in personal data. A European perspective. Alphen aan den Rijn: Kluwer Law International."},{"key":"5_CR40","doi-asserted-by":"crossref","unstructured":"Reed, C. 2010. How to make bad law: Lessons from the computing and communications sector. Queen Mary School of Law Legal Studies Research Paper No. 40\/2010.","DOI":"10.2139\/ssrn.1538527"},{"key":"5_CR41","volume-title":"Ambient intelligence: The evolution of technology, communication and cognition towards the future of human-computer interaction","author":"G Riva","year":"2005","unstructured":"Riva, Giuseppe. 2005. The psychology of ambient intelligence: Activity, situation and presence. InAmbient intelligence: The evolution of technology, communication and cognition towards the future of human-computer interaction, ed. Giuseppe Riva, F. VItalaro, F. Davide, and M. Alcaniz. Amsterdam: IOS Press."},{"key":"5_CR42","unstructured":"Rochelandet, Fabrice, and Silvio H. T. Tai. 2012. Do privacy laws affect the location decisions of internet firms? Evidence for privacy havens. Available:http:\/\/ssrn.com\/abstract=2022160."},{"key":"5_CR43","doi-asserted-by":"crossref","unstructured":"Rouvroy, Antoinette. 2008. Privacy, data protection, and the unprecedented challenges of ambient inteligence.Studies in ethics, law, and technology. Berkeley: Berkeley Electronic Press.","DOI":"10.2202\/1941-6008.1001"},{"key":"5_CR44","unstructured":"Shah, Nishant and Fieke Jansen. 2011.Digital alternatives with a cause? Book one: To Be. Bangalore: The Center for Internet and Society, available athttp:\/\/www.scribd.com\/nilofarh\/d\/65628308-Book-1-To-Be-Digital-Alternatives-With-a-Cause."},{"issue":"2","key":"5_CR45","first-page":"195","volume":"3","author":"A Shmidt","year":"2009","unstructured":"Shmidt, Aernout. 2009. Radbruch in cyberspace: About law-system quality and ICT innovation.Masaryk University Journal of Law and Technology 3(2): 195\u2013218.","journal-title":"Masaryk University Journal of Law and Technology"},{"key":"5_CR46","volume-title":"Understanding privacy","author":"D Solove","year":"2008","unstructured":"Solove, Daniel. 2008.Understanding privacy. Harvard: Harvard University Press."},{"key":"5_CR47","doi-asserted-by":"crossref","unstructured":"Swire, Peter. 2012. Social networks, privacy, and freedom of association: Data empowerment vs. data protection.North Carolina Law Review, 2012; Ohio State Public Law Working Paper 165; 2011 TPRC Conference.","DOI":"10.2139\/ssrn.1989516"},{"issue":"1","key":"5_CR48","doi-asserted-by":"publisher","first-page":"15","DOI":"10.1093\/idpl\/ipq003","volume":"1","author":"O Tene","year":"2011","unstructured":"Tene, Omer. 2011. Privacy: The new generations.International Data Privacy Law 1(1): 15\u201327.","journal-title":"International Data Privacy Law"},{"key":"5_CR49","volume-title":"Deconstructing digital natives. Young people and new literacy","author":"M Thomas","year":"2001","unstructured":"Thomas, Micheal. 2001.Deconstructing digital natives. Young people and new literacy. New York: Routledge."},{"issue":"4","key":"5_CR50","doi-asserted-by":"publisher","first-page":"397","DOI":"10.1515\/comm.2010.021","volume":"35","author":"S Vandoninck","year":"2010","unstructured":"Vandoninck, Sofie, Leen d\u2019Haenens, and Veronica Donoso. 2010. Digital literacy among Flemish adolescents: How do they handle with online risks?Communications 35(4): 397\u2013416.","journal-title":"Communications"},{"key":"5_CR51","unstructured":"West, Heather 2009. Is online privacy a generational issue?.GeekDad, Wired.com.http:\/\/www.wired.com\/geekdad\/2009\/10\/is-online-privacy-a-generational-issue\/."},{"issue":"5","key":"5_CR52","first-page":"142","volume":"14","author":"R Wong","year":"2009","unstructured":"Wong, Rebecca. 2009. Social networking: A conceptual analysis of a data controller.Communications Law 14(5): 142\u2013149.","journal-title":"Communications Law"},{"issue":"1","key":"5_CR53","doi-asserted-by":"publisher","first-page":"53","DOI":"10.1016\/j.clsr.2010.11.004","volume":"27","author":"R Wong","year":"2011","unstructured":"Wong, Rebecca. 2011. Data protection: The future of privacy.Computer Law and Security Review 27(1): 53\u201357.","journal-title":"Computer Law and Security Review"}],"container-title":["European Data Protection: Coming of Age"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-94-007-5170-5_5","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,7,11]],"date-time":"2024-07-11T14:44:44Z","timestamp":1720709084000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-94-007-5170-5_5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,10,12]]},"ISBN":["9789400751842","9789400751705"],"references-count":52,"URL":"https:\/\/doi.org\/10.1007\/978-94-007-5170-5_5","relation":{},"subject":[],"published":{"date-parts":[[2012,10,12]]},"assertion":[{"value":"12 October 2012","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}