{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,6]],"date-time":"2026-01-06T18:48:53Z","timestamp":1767725333968,"version":"build-2238731810"},"reference-count":23,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2019,7,13]],"date-time":"2019-07-13T00:00:00Z","timestamp":1562976000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2019,7,13]],"date-time":"2019-07-13T00:00:00Z","timestamp":1562976000000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Educ Inf Technol"],"published-print":{"date-parts":[[2020,1]]},"DOI":"10.1007\/s10639-019-09952-w","type":"journal-article","created":{"date-parts":[[2019,7,12]],"date-time":"2019-07-12T21:02:27Z","timestamp":1562965347000},"page":"163-174","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":25,"title":["Sensitizing young children on internet addiction and online safety risks through storytelling in a mobile application"],"prefix":"10.1007","volume":"25","author":[{"given":"Fotis","family":"Lazarinis","sequence":"first","affiliation":[]},{"given":"Kyriaki","family":"Alexandri","sequence":"additional","affiliation":[]},{"given":"Chris","family":"Panagiotakopoulos","sequence":"additional","affiliation":[]},{"given":"Vasileios S.","family":"Verykios","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,7,13]]},"reference":[{"key":"9952_CR1","doi-asserted-by":"publisher","unstructured":"Aldhayan, M., Cham, S., Kostoulas, T., Basel Al-mourad, M., Ali, R. (2019) Online peer support groups to combat digital addiction: User acceptance and rejection factors, WorldCIST'19 2019: New knowledge in information systems and technologies, pp. 139\u2013150. \n                  https:\/\/doi.org\/10.1007\/978-3-030-16187-3_14\n                  \n                .","DOI":"10.1007\/978-3-030-16187-3_14"},{"key":"9952_CR2","doi-asserted-by":"publisher","unstructured":"Alrobai, A., McAlaney, J., Dogan, H., Phalp, K., & Ali, R. (2016). Exploring the requirements and design of persuasive intervention technology to combat digital addiction. Presented at 10th International Working Conference on Human-Centred Software Engineering HCSE, Stockholm. \n                  https:\/\/doi.org\/10.1007\/978-3-319-44902-9_9\n                  \n                .","DOI":"10.1007\/978-3-319-44902-9_9"},{"key":"9952_CR3","unstructured":"Bibi, Z. H., Bujang, A. B., & Johari, A. (2014). Internet security risks: Are youths aware of them? In Management and Technology in Knowledge, service, Tourism & Hospitality (pp. 9\u201312). CRC Press, Boca Raton."},{"key":"9952_CR4","doi-asserted-by":"publisher","first-page":"458","DOI":"10.1111\/jsr.12388","volume":"25","author":"YL Chen","year":"2016","unstructured":"Chen, Y. L., & Gau, S. S. (2016). Sleep problems and internet addiction among children and adolescents: A longitudinal study. Journal of Sleep Research, 25, 458\u2013465. \n                  https:\/\/doi.org\/10.1111\/jsr.12388\n                  \n                .","journal-title":"Journal of Sleep Research"},{"key":"9952_CR5","doi-asserted-by":"publisher","first-page":"311","DOI":"10.1108\/14684520310502261","volume":"27","author":"RAM Correia","year":"2003","unstructured":"Correia, R. A. M., & Teixeira, J. C. (2003). Information literacy: An integrated concept for a safer internet. Online Information Review, 27, 311\u2013320. \n                  https:\/\/doi.org\/10.1108\/14684520310502261\n                  \n                .","journal-title":"Online Information Review"},{"key":"9952_CR6","unstructured":"D\u00fcrager, A. & Livingstone, S. (2012). How can parents support children\u2019s internet safety? London: EU Kids Online. Available at: \n                  http:\/\/www.thechildrensmediafoundation.org\/wp-content\/uploads\/2014\/02\/Duerager-2012-how-can-parents-support-internet-safety.pdf\n                  \n                . Accessed 8 Sept 2019."},{"issue":"1","key":"9952_CR7","doi-asserted-by":"publisher","first-page":"45","DOI":"10.1111\/bjet.12529","volume":"49","author":"S Edwards","year":"2018","unstructured":"Edwards, S., Nolan, A., Henderson, M., Mantilla, A., Plowman, L., & Skouteris, H. (2018). Young children\u2019s everyday concepts of the internet: A platform for cybersafety education in the early years. British Journal of Educational Technology, 49(1), 45\u201355. \n                  https:\/\/doi.org\/10.1111\/bjet.12529\n                  \n                .","journal-title":"British Journal of Educational Technology"},{"key":"9952_CR8","unstructured":"Holloway, D., Green, L., Livingstone, S. (2013). Zero to eight: Young children and their internet use. LSE, London: EU Kids Online. Accessed \n                  http:\/\/eprints.lse.ac.uk\/52630\/\n                  \n                . Accessed 8 Sept 2019."},{"issue":"3","key":"9952_CR9","doi-asserted-by":"publisher","first-page":"959","DOI":"10.1016\/j.chb.2012.12.024","volume":"29","author":"DJ Kuss","year":"2013","unstructured":"Kuss, D. J., Griffiths, M. D., & Binder, J. F. (2013). Internet addiction in students: Prevalence and risk factors. Computers in Human Behavior, 29(3), 959\u2013966. \n                  https:\/\/doi.org\/10.1016\/j.chb.2012.12.024\n                  \n                .","journal-title":"Computers in Human Behavior"},{"issue":"1","key":"9952_CR10","doi-asserted-by":"publisher","first-page":"157","DOI":"10.1108\/02640471011023441","volume":"28","author":"F Lazarinis","year":"2010","unstructured":"Lazarinis, F. (2010). Online risks obstructing safe internet access for students. The Electronic Library, 28(1), 157\u2013170. \n                  https:\/\/doi.org\/10.1108\/02640471011023441\n                  \n                .","journal-title":"The Electronic Library"},{"issue":"4","key":"9952_CR11","doi-asserted-by":"publisher","first-page":"466","DOI":"10.1177\/1461444812452412","volume":"15","author":"S Lee","year":"2013","unstructured":"Lee, S. (2013). Parental restrictive mediation of children\u2019s internet use: Effective for what and for whom? New Media & Society, 15(4), 466\u2013481. \n                  https:\/\/doi.org\/10.1177\/1461444812452412\n                  \n                .","journal-title":"New Media & Society"},{"key":"9952_CR12","unstructured":"Lembrechts, L. (2012). Digital image bullying among school students in Belgium: An exploration of the characteristics of bullies and their victims. International Journal of Cyber Criminology, 6(2), 968\u2013983 \n                  http:\/\/hdl.handle.net\/1942\/14617\n                  \n                . Accessed 8 Sept 2019."},{"issue":"4","key":"9952_CR13","doi-asserted-by":"publisher","first-page":"326","DOI":"10.1037\/ppm0000094","volume":"6","author":"AK Liau","year":"2017","unstructured":"Liau, A. K., Park, Y., Gentile, D. A., Katna, D. P., Tan, C. H. A., & Khoo, A. (2017). iZ HERO adventure: Evaluating the effectiveness of a peer-mentoring and transmedia cyberwellness program for children. Psychology of Popular Media Culture, 6(4), 326\u2013337 \n                  https:\/\/doi.org\/10.1037\/ppm0000094\n                  \n                .","journal-title":"Psychology of Popular Media Culture"},{"key":"9952_CR14","unstructured":"Livingstone, S., Davidson, J., Bryce, J., Batool, S., Haughton, C., & Nandi, A. (2017a). Children's online activities, risks and safety: a literature review by the UKCCIS evidence group. Available online at: \n                  http:\/\/www.lse.ac.uk\/business-and-consultancy\/consulting\/consulting-reports\/childrens-online-activities-risks-and-safety\n                  \n                . Accessed 8 Sept 2019."},{"issue":"1","key":"9952_CR15","doi-asserted-by":"publisher","first-page":"82","DOI":"10.1111\/jcom.12277","volume":"67","author":"S Livingstone","year":"2017","unstructured":"Livingstone, S., \u00d3lafsson, K., Helsper, E. J., Lupi\u00e1\u00f1ez, F., Veltri, G. A., & Folkvord, F. (2017b). Maximizing opportunities and minimizing risks for children online: The role of digital skills in emerging strategies of parental mediation. Journal of Communication, 67(1), 82\u2013105. \n                  https:\/\/doi.org\/10.1111\/jcom.12277\n                  \n                .","journal-title":"Journal of Communication"},{"key":"9952_CR16","volume-title":"Net children go mobile: Risks and opportunities","author":"G Mascheroni","year":"2014","unstructured":"Mascheroni, G., & \u00d3lafsson, K. (2014). Net children go mobile: Risks and opportunities (2nd ed.). Milano: Educatt.","edition":"2"},{"key":"9952_CR17","doi-asserted-by":"publisher","unstructured":"Pyshkin, E., Mozgovoy, M., Chisler, A., Volkova, Y. (2016). Striving with online addiction with a self-control chrome extension, IEEE Symposium Series on Computational Intelligence (SSCI), \n                  https:\/\/doi.org\/10.1109\/SSCI.2016.7850190\n                  \n                .","DOI":"10.1109\/SSCI.2016.7850190"},{"issue":"6","key":"9952_CR18","doi-asserted-by":"publisher","first-page":"2703","DOI":"10.1016\/j.chb.2013.06.040","volume":"29","author":"R Sabella","year":"2013","unstructured":"Sabella, R., Patchin, J., & Hinduja, S. (2013). Cyberbullying myths and realities. Computers in Human Behavior, 29(6), 2703\u20132711. \n                  https:\/\/doi.org\/10.1016\/j.chb.2013.06.040\n                  \n                .","journal-title":"Computers in Human Behavior"},{"key":"9952_CR19","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1177\/1461444815626612","volume":"19","author":"W Shin","year":"2016","unstructured":"Shin, W., & Lwin, M. O. (2016). How does \u201ctalking about the internet with others\u201d affect teenagers\u2019 experience of online risks? The role of active mediation by parents, peers, and school teachers. New Media & Society, 19, 1\u201318. \n                  https:\/\/doi.org\/10.1177\/1461444815626612\n                  \n                .","journal-title":"New Media & Society"},{"key":"9952_CR20","doi-asserted-by":"publisher","first-page":"277","DOI":"10.1016\/j.chb.2009.11.014","volume":"26","author":"RS Tokunaga","year":"2010","unstructured":"Tokunaga, R. S. (2010). Following you home from school: A critical review and synthesis of research on cyber bullying victimization. Computers in Human Behavior, 26, 277\u2013287. \n                  https:\/\/doi.org\/10.1016\/j.chb.2009.11.014\n                  \n                .","journal-title":"Computers in Human Behavior"},{"key":"9952_CR21","doi-asserted-by":"publisher","first-page":"2838","DOI":"10.1016\/j.chb.2006.05.008","volume":"23","author":"M Valcke","year":"2007","unstructured":"Valcke, M., Schellens, T., Van Keer, H., & Gerarts, M. (2007). Primary school children's safe and unsafe use of internet at home and at school: An exploratory study. Computers in Human Behavior, 23, 2838\u20132850. \n                  https:\/\/doi.org\/10.1016\/j.chb.2006.05.008\n                  \n                .","journal-title":"Computers in Human Behavior"},{"issue":"12","key":"9952_CR22","first-page":"731","volume":"17","author":"A Weinstein","year":"2015","unstructured":"Weinstein, A., Yaacov, Y., Manning, M., Danon, P., & Weizman, A. (2015). Internet addiction and attention deficit hyperactivity disorder (ADHD) among school children. Israeli Medical Association Journal, 17(12), 731\u2013734.","journal-title":"Israeli Medical Association Journal"},{"key":"9952_CR23","doi-asserted-by":"publisher","first-page":"S42","DOI":"10.1016\/j.jadohealth.2007.09.004","volume":"41","author":"ML Ybarra","year":"2007","unstructured":"Ybarra, M. L., Diener-West, M., & Leaf, P. J. (2007). Examining the overlap in internet harassment and school bullying: Implications for school intervention. Journal of Adolescent Health, 41, S42\u2013S50. \n                  https:\/\/doi.org\/10.1016\/j.jadohealth.2007.09.004\n                  \n                .","journal-title":"Journal of Adolescent Health"}],"updated-by":[{"DOI":"10.1007\/s10639-020-10303-3","type":"correction","label":"Correction","source":"publisher","updated":{"date-parts":[[2020,8,27]],"date-time":"2020-08-27T00:00:00Z","timestamp":1598486400000}}],"container-title":["Education and Information Technologies"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10639-019-09952-w.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10639-019-09952-w\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10639-019-09952-w.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,6]],"date-time":"2020-11-06T12:14:54Z","timestamp":1604664894000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10639-019-09952-w"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,7,13]]},"references-count":23,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2020,1]]}},"alternative-id":["9952"],"URL":"https:\/\/doi.org\/10.1007\/s10639-019-09952-w","relation":{},"ISSN":["1360-2357","1573-7608"],"issn-type":[{"value":"1360-2357","type":"print"},{"value":"1573-7608","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,7,13]]},"assertion":[{"value":"10 January 2019","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"19 June 2019","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"13 July 2019","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"27 August 2020","order":4,"name":"change_date","label":"Change Date","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"Correction","order":5,"name":"change_type","label":"Change Type","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"The original version of this article unfortunately contained a couple of mistakes.","order":6,"name":"change_details","label":"Change Details","group":{"name":"ArticleHistory","label":"Article History"}}]}}