{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,20]],"date-time":"2025-09-20T06:48:33Z","timestamp":1758350913691,"version":"3.44.0"},"reference-count":74,"publisher":"Springer Science and Business Media LLC","issue":"14","license":[{"start":{"date-parts":[[2025,4,11]],"date-time":"2025-04-11T00:00:00Z","timestamp":1744329600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,4,11]],"date-time":"2025-04-11T00:00:00Z","timestamp":1744329600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Educ Inf Technol"],"published-print":{"date-parts":[[2025,9]]},"DOI":"10.1007\/s10639-025-13493-w","type":"journal-article","created":{"date-parts":[[2025,4,11]],"date-time":"2025-04-11T01:09:01Z","timestamp":1744333741000},"page":"19559-19589","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Keeping students safe: the experiences of educators implementing monitoring applications in K-12 settings"],"prefix":"10.1007","volume":"30","author":[{"ORCID":"https:\/\/orcid.org\/0009-0003-2256-7614","authenticated-orcid":false,"given":"Mia A.","family":"Garcia","sequence":"first","affiliation":[]},{"given":"Duncan","family":"Culbreth","sequence":"additional","affiliation":[]},{"given":"Sejal Parikh","family":"Foxx","sequence":"additional","affiliation":[]},{"given":"Florence","family":"Martin","sequence":"additional","affiliation":[]},{"given":"Weichao","family":"Wang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,4,11]]},"reference":[{"issue":"2","key":"13493_CR1","doi-asserted-by":"publisher","first-page":"34","DOI":"10.1108\/17581184201000012","volume":"2","author":"DA Abrahams","year":"2010","unstructured":"Abrahams, D. A. (2010). Technology adoption in higher education: A framework for identifying and prioritizing issues and barriers to adoption of instructional technology. Journal of Applied Research in Higher Education, 2(2), 34\u201349. https:\/\/doi.org\/10.1108\/17581184201000012","journal-title":"Journal of Applied Research in Higher Education"},{"doi-asserted-by":"publisher","unstructured":"Alhazmi, A. A., & Kaufmann, A. (2022). Phenomenological qualitative methods applied to the analysis of cross-cultural experience in novel educational social contexts. Frontiers in psychology, 13, 785134. https:\/\/doi.org\/10.3389\/fpsyg.2022.785134","key":"13493_CR2","DOI":"10.3389\/fpsyg.2022.785134"},{"unstructured":"Annan, D. L. (2008). Facilitating adoption of technology in higher education. Distance Learning, 5(1).","key":"13493_CR3"},{"unstructured":"Ayer, L., Boudreaux, B., Paige, J. W., Holmes, P., Blagg, T. L., & Mendon-Plasek, S. J. (2024). Artificial intelligence-based student activity monitoring for suicide risk: Considerations for K-12 schools, caregivers, government, and technology developers. Rand Health Quarterly, 11(2), 2.","key":"13493_CR4"},{"issue":"2","key":"13493_CR5","doi-asserted-by":"publisher","first-page":"215","DOI":"10.1080\/0268093022000043065","volume":"18","author":"SJ Ball","year":"2003","unstructured":"Ball, S. J. (2003). The teacher\u2019s soul and the terrors of performativity. Journal of Education Policy, 18(2), 215\u2013228. https:\/\/doi.org\/10.1080\/0268093022000043065","journal-title":"Journal of Education Policy"},{"doi-asserted-by":"crossref","unstructured":"Bandura, A. (1977). Self-efficacy: Toward a unifying theory of behavioral change. Psychology Review, 84(2), 191.","key":"13493_CR6","DOI":"10.1037\/\/0033-295X.84.2.191"},{"key":"13493_CR7","doi-asserted-by":"publisher","first-page":"747","DOI":"10.1037\/0003-066X.37.7.747","volume":"37","author":"A Bandura","year":"1982","unstructured":"Bandura, A. (1982). The psychology of chance encounters and life paths. American Psychologist, 37, 747\u2013755.","journal-title":"American Psychologist"},{"unstructured":"Bandura, A. (1986). Social foundations of thought and action: A social cognitive theory. Social Foundations of Thought and Action: A Social Cognitive Theory., xiii, 617\u2013xiii, 617.","key":"13493_CR8"},{"key":"13493_CR9","doi-asserted-by":"publisher","first-page":"95","DOI":"10.1207\/s15327965pli0902_2","volume":"9","author":"A Bandura","year":"1998","unstructured":"Bandura, A. (1998). Exploration of fortuitous determinants of life paths. Psychological Inquirer, 9, 95\u201399.","journal-title":"Psychological Inquirer"},{"doi-asserted-by":"publisher","unstructured":"Bandura, A. (2001a). Social cognitive theory: An agentic perspective. Annual Review of Psychology, 52, 1\u201326. https:\/\/doi.org\/10.1146\/annurev.psych.52.1.1","key":"13493_CR10","DOI":"10.1146\/annurev.psych.52.1.1"},{"issue":"1","key":"13493_CR11","doi-asserted-by":"publisher","first-page":"12","DOI":"10.1037\/h0086876","volume":"42","author":"A Bandura","year":"2001","unstructured":"Bandura, A. (2001b). The changing face of psychology at the dawning of a globalization era. Canadian Psychology, 42(1), 12\u201324. https:\/\/doi.org\/10.1037\/h0086876","journal-title":"Canadian Psychology"},{"issue":"6","key":"13493_CR12","doi-asserted-by":"publisher","first-page":"3315","DOI":"10.1111\/bjet.12736","volume":"50","author":"K Beckman","year":"2019","unstructured":"Beckman, K., Bennett, S., & Lockyer, L. (2019). Reproduction and transformation of students\u2019 technology practice\u202f: The tale of two distinctive secondary student cases. British Journal of Educational Technology, 50(6), 3315\u20133328. https:\/\/doi.org\/10.1111\/bjet.12736","journal-title":"British Journal of Educational Technology"},{"issue":"7","key":"13493_CR13","doi-asserted-by":"publisher","first-page":"1312","DOI":"10.1177\/0044118X20916617","volume":"52","author":"M Birnhack","year":"2020","unstructured":"Birnhack, M., & Perry-Hazan, L. (2020). School surveillance in context: High school students\u2019 perspectives on CCTV, privacy, and security. Youth & Society, 52(7), 1312\u20131330.","journal-title":"Youth & Society"},{"unstructured":"Boyatzis R.\u2009E. (1998). Transforming qualitative information: Thematic analysis and code development. Sage.","key":"13493_CR14"},{"unstructured":"Bryman, A. (2012). Social research methods.\u00a0 Oxford University Press.","key":"13493_CR15"},{"issue":"1","key":"13493_CR16","doi-asserted-by":"publisher","first-page":"8","DOI":"10.1186\/s40561-02400293-x","volume":"11","author":"MC Buchan","year":"2024","unstructured":"Buchan, M. C., Bhawra, J., & Katapally, T. R. (2024). Navigating the digital world: Development of an evidence-based digital literacy program and assessment tool for youth. Smart Learning Environments, 11(1), 8. https:\/\/doi.org\/10.1186\/s40561-02400293-x","journal-title":"Smart Learning Environments"},{"doi-asserted-by":"publisher","unstructured":"Cai, Z., Mao, P., Wang, Z., Wang, D., He, J., & Fan, X. (2023). Associations between problematic internet use and mental health outcomes of students: A meta-analytic review. Adolescent research review, 8(1), 45\u201362. https:\/\/doi.org\/10.1007\/s40894-022-00201-9","key":"13493_CR17","DOI":"10.1007\/s40894-022-00201-9"},{"issue":"1","key":"13493_CR18","doi-asserted-by":"publisher","first-page":"78","DOI":"10.1002\/wps.20088","volume":"13","author":"V Carli","year":"2014","unstructured":"Carli, V., Hoven, C. W., Wasserman, C., Chiesa, F., Guffanti, G., Sarchiapone, M., et al. (2014). A newly identified group of adolescents at \u201cinvisible\u201d risk for psychopathology and suicidal behavior: Findings from the SEYLE study. World Psychiatry, 13(1), 78\u201386. https:\/\/doi.org\/10.1002\/wps.20088","journal-title":"World Psychiatry"},{"doi-asserted-by":"publisher","unstructured":"Casella, R. (2018). School security and its corporate offerings. In J. Deakin, E. Taylor, & A. Kupchik (Eds.), The palgrave international handbook of school discipline, surveillance, and social control (pp. 389\u2013404). Springer International Publishing. https:\/\/doi.org\/10.1007\/978-3-319-71559-9_20","key":"13493_CR19","DOI":"10.1007\/978-3-319-71559-9_20"},{"key":"13493_CR20","doi-asserted-by":"publisher","first-page":"162","DOI":"10.1016\/j.compedu.2018.03.001","volume":"121","author":"M Claro","year":"2018","unstructured":"Claro, M., Salinas, A., Cabello-Hutt, T., SanMart\u00edn, E., Preiss, D., Valenzuela, S., & Jara, I. (2018). Teaching in a Digital Environment (TIDE): Defining and measuring teachers\u2019 capacity to develop students\u2019 digital information and communication skills. Computers & Education, 121, 162\u2013174. https:\/\/doi.org\/10.1016\/j.compedu.2018.03.001","journal-title":"Computers & Education"},{"key":"13493_CR21","volume-title":"Qualitative inquiry and research design: Choosing among five traditions","author":"JW Creswell","year":"1998","unstructured":"Creswell, J. W. (1998). Qualitative inquiry and research design: Choosing among five traditions. Sage."},{"unstructured":"Creswell, J. W., & Poth, C. N. (2016). Qualitative inquiry and research design: Choosing among five approaches. Sage publications.","key":"13493_CR22"},{"unstructured":"Crooks R. N. (2016). The coded schoolhouse: One-to-one tablet computer programs and urban education (Publication No. 1802324059) [Doctoral dissertation, UCLA]. ProQuest Dissertations Publishing.","key":"13493_CR23"},{"doi-asserted-by":"crossref","unstructured":"Davidson D. (1971). Agency: In agent, action, and reason. In R. Binkley, R. Bronaugh, & A. Marras (Eds.), (pp. 3\u201337). University of Toronto Press.","key":"13493_CR24","DOI":"10.3138\/9781442656963-002"},{"issue":"6","key":"13493_CR25","doi-asserted-by":"publisher","first-page":"1129","DOI":"10.1037\/0021-9010.86.6.1129","volume":"86","author":"S Debowski","year":"2001","unstructured":"Debowski, S., Wood, R. E., & Bandura, A. (2001). Impact of guided exploration and enactive exploration on self-regulatory mechanisms and information acquisition through electronic search. Journal of Applied Psychology, 86(6), 1129\u20131141. https:\/\/doi.org\/10.1037\/0021-9010.86.6.1129","journal-title":"Journal of Applied Psychology"},{"unstructured":"Federal Communications Commission. (2023). Consumer guide: Children\u2019s internet protection act (CIPA). Federal Communications Commission.","key":"13493_CR26"},{"unstructured":"Fenton, D. (2021). Preparing Elementary Preservice Teachers to Integrate Technology: Examining the Effects of a New Science Course Sequence with Technology Infusion.","key":"13493_CR27"},{"key":"13493_CR28","volume-title":"Discipline and punish","author":"M Foucault","year":"1977","unstructured":"Foucault, M. (1977). Discipline and punish. Pantheon Books."},{"volume-title":"Phenomenology and psychological research","year":"1985","unstructured":"Giorgi, A. (Ed.). (1985). Phenomenology and psychological research. Duquesne University Press.","key":"13493_CR29"},{"doi-asserted-by":"publisher","unstructured":"Gopika, J. S., & Rekha, R. V. (2023). Awareness and use of digital learning before and during COVID-19. International Journal of Educational Reform, 10567879231173388, 10567879231173389. https:\/\/doi.org\/10.1177\/10567879231173389","key":"13493_CR30","DOI":"10.1177\/10567879231173389"},{"key":"13493_CR31","doi-asserted-by":"publisher","first-page":"9","DOI":"10.1016\/j.chb.2015.11.006","volume":"56","author":"A Gorzig","year":"2016","unstructured":"Gorzig, A. (2016). Adolescents\u2019 experience of offline and online risks: Separate and joint propensities. Computers in Human Behavior, 56, 9\u201313.","journal-title":"Computers in Human Behavior"},{"unstructured":"Grant-Chapman, H., Laird, E., & Venzke, C. (2021). Student activity monitoring software: Research insights and recommendations (pp. 1\u20137). Center for Democracy & Technology.","key":"13493_CR32"},{"doi-asserted-by":"crossref","unstructured":"Hankerson, D., Venske, C., Laird, E., Grant-Chapman, H., & Thakur, D. (2021). Online and observed: Student privacy implications of school-issued devices and student activity monitoring software. Center for Democracy & Technology.  https:\/\/cdt.org\/insights\/report-online-and-observed-student-privacy-implications-of-school-issued-devices-and-student-activity-monitoring-software\/","key":"13493_CR33","DOI":"10.31219\/osf.io\/73a2b"},{"doi-asserted-by":"crossref","unstructured":"Jefferson B. J. (2020). Digitize and punish: Racial criminalization in the digital age.","key":"13493_CR34","DOI":"10.5749\/j.ctvz0h9s7"},{"unstructured":"Kao, J., & Gillum, J. (2020). Reverse-Engineering an Audio Aggression Detection Algorithm.","key":"13493_CR35"},{"key":"13493_CR36","volume-title":"Pre-K through 12 education and covid-19: Landscape analysis of impact indicators","author":"A Kazouh","year":"2020","unstructured":"Kazouh, A., Hollowell, A., Fox, L., & Bentley-Edwards, K. (2020). Pre-K through 12 education and covid-19: Landscape analysis of impact indicators. Public School Forum of North Carolina."},{"issue":"1","key":"13493_CR37","doi-asserted-by":"publisher","first-page":"76","DOI":"10.1111\/camh.12621","volume":"28","author":"K Kikerpill","year":"2023","unstructured":"Kikerpill, K., & Siibak, A. (2023). Schools engaged in doom-monitoring students\u2019 online interactions and content creation: An analysis of dominant media discourses. Child and Adolescent Mental Health, 28(1), 76\u201382. https:\/\/doi.org\/10.1111\/camh.12621","journal-title":"Child and Adolescent Mental Health"},{"doi-asserted-by":"publisher","unstructured":"Kim J. Y. (2012). The nonlinear association between Internet using time for non-educational purposes and adolescent health. Journal of Preventive Medicine and Public Health = Yebang Uihakhoe chi, 45(1), 37\u201346. https:\/\/doi.org\/10.3961\/jpmph.2012.45.1.37","key":"13493_CR38","DOI":"10.3961\/jpmph.2012.45.1.37"},{"doi-asserted-by":"publisher","unstructured":"Kumar P. C., Vitak J., Chetty M., Clegg T. L. (2019). The platformization of the classroom: Teachers as surveillant consumers. Surveillance & Society, 17(1\/2), 145\u2013152. https:\/\/doi.org\/10.24908\/ss.v17i1\/2.12926","key":"13493_CR39","DOI":"10.24908\/ss.v17i1\/2.12926"},{"unstructured":"Laird, E., Grant-Chapman, H., Venzke, C., & Quay-de la Vallee, H. (2022). Hidden harms: The misleading promise of monitoring students online. The Center for Democracy & Technology. Retrieved October 15 2024, from\u00a0https:\/\/cdt.org\/wp-content\/uploads\/2022\/08\/Hidden-Harms-The-Misleading-Promiseof-Monitoring-Students-Online-Research-Report-Final-Accessible.pdf","key":"13493_CR40"},{"unstructured":"Lincoln, Y. S. (1985). Naturalistic inquiry (Vol. 75). Sage.","key":"13493_CR41"},{"key":"13493_CR42","doi-asserted-by":"publisher","DOI":"10.1016\/0147-1767(85)90062-8","volume-title":"Naturalistic Inquiry","author":"YS Lincoln","year":"1985","unstructured":"Lincoln, Y. S., & Guba, E. G. (1985). Naturalistic Inquiry. Sage Publications."},{"key":"13493_CR43","doi-asserted-by":"publisher","first-page":"289","DOI":"10.1016\/j.jad.2023.01.019","volume":"325","author":"M Liu","year":"2023","unstructured":"Liu, M., Xiao, J., Kamper-DeMarco, K. E., & Fu, Z. (2023). Problematic internet use and suicidality and self-injurious behaviors in adolescents: Effects of negative affectivity and social support. Journal of Affective Disorders, 325, 289\u2013296. https:\/\/doi.org\/10.1016\/j.jad.2023.01.019","journal-title":"Journal of Affective Disorders"},{"issue":"3","key":"13493_CR44","doi-asserted-by":"publisher","first-page":"393","DOI":"10.1177\/1461444808089415","volume":"10","author":"S Livingstone","year":"2008","unstructured":"Livingstone, S. (2008). Taking risky opportunities in youthful content creation: Teenagers\u2019 use of social networking sites for intimacy, privacy and self-expression. New Media & Society, 10(3), 393\u2013411.","journal-title":"New Media & Society"},{"issue":"1","key":"13493_CR45","doi-asserted-by":"publisher","first-page":"4","DOI":"10.1080\/17482798.2015.1123164","volume":"10","author":"S Livingstone","year":"2016","unstructured":"Livingstone, S. (2016). Reframing media effects in terms of children\u2019s rights in the digital age. Journal of Children and Media, 10(1), 4\u201312.","journal-title":"Journal of Children and Media"},{"issue":"2","key":"13493_CR46","doi-asserted-by":"publisher","first-page":"309","DOI":"10.1177\/1461444809342697","volume":"12","author":"S Livingstone","year":"2010","unstructured":"Livingstone, S., & Helsper, E. (2010). Balancing opportunities and risks in teenagers\u2019 use of the internet: The role of online skills and internet self-efficacy. New Media and Society, 12(2), 309\u2013329.","journal-title":"New Media and Society"},{"unstructured":"Livingstone, S., Haddon, L., Gorzig, A., & Olafsson, K. (2011). Risks and safety on the internet: The perspective of European children\u2013Full findings and policy implications from the EU Kids Online survey of 9\u201316 year olds and their parents in 25 countries. EU Kids Online.","key":"13493_CR47"},{"unstructured":"Livingstone, S., Mascheroni, G., & Staksrud, E. (2015). Developing a framework for researching children\u2019s online risks and opportunities in Europe. EU Kids Online.","key":"13493_CR48"},{"doi-asserted-by":"publisher","unstructured":"Livingstone, S., & Stoilova, M. (2021). The 4Cs: Classifying online risk to children. (CO:RE Short Report Series on Key Topics). Hamburg: Leibniz-Institut f\u00fcr Medienforschung | Hans-Bredow-Institut (HBI); CO:RE - Children Online: Research and Evidence. https:\/\/doi.org\/10.21241\/ssoar.7181","key":"13493_CR49","DOI":"10.21241\/ssoar.7181"},{"doi-asserted-by":"publisher","unstructured":"Machete, P., & Turpin, M. (2020). The use of critical thinking to identify fake news: A systematic literature review. Responsible Design, Implementation and Use of Information and Communication Technology: 19th IFIP WG 6.11 Conference on e-Business, e-Services, and e-Society, I3E 2020, Skukuza, South Africa, April 6\u20138, 2020, Proceedings, Part II, 12067, 235\u2013 246. https:\/\/doi.org\/10.1007\/978-3-030-45002-1_20","key":"13493_CR50","DOI":"10.1007\/978-3-030-45002-1_20"},{"key":"13493_CR51","doi-asserted-by":"publisher","DOI":"10.4135\/9781412995658","volume-title":"Phenomenological research methods","author":"C Moustakas","year":"1994","unstructured":"Moustakas, C. (1994). Phenomenological research methods. Sage."},{"doi-asserted-by":"publisher","unstructured":"Nan, X., Wang, Y., & Thier, K. (2022). Why do people believe health misinformation and who is at risk? A systematic review of individual differences in susceptibility to health misinformation. Social Science & Medicine, 314, 115398. https:\/\/doi.org\/10.1016\/j.socscimed.2022.115398","key":"13493_CR52","DOI":"10.1016\/j.socscimed.2022.115398"},{"issue":"2","key":"13493_CR53","doi-asserted-by":"publisher","first-page":"239","DOI":"10.24908\/ss.v15i2.6033","volume":"15","author":"S Nemorin","year":"2017","unstructured":"Nemorin, S. (2017). Post-panoptic pedagogies: The changing nature of school surveillance in the digital age. Surveillance & Society, 15(2), 239\u2013253.","journal-title":"Surveillance & Society"},{"doi-asserted-by":"crossref","unstructured":"Nichols, P., & Monea, A. (2022). De-escalating \u2018dataveillance\u2019 in schools. Kappanonline.Org. Retrieved October 20, 2024, from https:\/\/kappanonline.org\/de-escalating-dataveillance-in-schools-nichols-monea\/","key":"13493_CR54","DOI":"10.1177\/00317217221142978"},{"unstructured":"O\u2019Donnell, B. (2021). Rise in online enticement and other trends: NCMEC releases 2020 exploitation stats. National Center for Missing and Exploited Children. Retrieved on October 20, 2024, from https:\/\/www.missingkids.org\/blog\/2021\/rise-in-online-enticement-and-other-trends--ncmec-releases-2020","key":"13493_CR55"},{"unstructured":"Office of the Federal Register, National Archives and Records Administration. (1999). 64 FR 59888\u2014Children\u2019s Online Privacy Protection Rule. Office of the Federal Register, National Archives and Records Administration.","key":"13493_CR56"},{"unstructured":"Office of Senator Elizabeth Warren. (2022). Markey Investigation Finds That EdTech Student Surveillance Platforms Need Urgent Federal Action to Protect Students, press release.","key":"13493_CR57"},{"doi-asserted-by":"crossref","unstructured":"Polkinghorne D. E. (1989). \u201cPhenomenological research methods\u201d, in existential-phenomenological perspectives in Psychology (Boston, MA: Springer; ), 41\u201360.","key":"13493_CR58","DOI":"10.1007\/978-1-4615-6989-3_3"},{"key":"13493_CR59","doi-asserted-by":"publisher","first-page":"135","DOI":"10.1007\/s12528-020-09259-7","volume":"33","author":"D Polly","year":"2021","unstructured":"Polly, D., Martin, F., & Guilbaud, T. C. (2021). Examining barriers and desired supports to increase faculty members\u2019 use of digital technologies: Perspectives of faculty, staff and administrators. Journal of Computing in Higher Education, 33, 135\u2013156. https:\/\/doi.org\/10.1007\/s12528-020-09259-7","journal-title":"Journal of Computing in Higher Education"},{"doi-asserted-by":"publisher","unstructured":"Prez-Escoda, A., Jimnez-Narros, C., Perlado-Lamo-de-Espinosa, M., & Pedrero-Esteban, L. M. (2020). Social networks\u2019 engagement during the COVID-19 pandemic in Spain: Health media vs. Healthcare professionals. International Journal of Environmental Research and Public Health, 17(14). https:\/\/doi.org\/10.3390\/ijerph17145261","key":"13493_CR60","DOI":"10.3390\/ijerph17145261"},{"issue":"5\u20136","key":"13493_CR61","doi-asserted-by":"publisher","first-page":"812","DOI":"10.1080\/01425692.2021.1914549","volume":"42","author":"K Proudfoot","year":"2021","unstructured":"Proudfoot, K. (2021). Panopticism, teacher surveillance and the \u2018unseen.\u2019 British Journal of Sociology of Education, 42(5\u20136), 812\u2013827. https:\/\/doi.org\/10.1080\/01425692.2021.1914549","journal-title":"British Journal of Sociology of Education"},{"key":"13493_CR62","doi-asserted-by":"publisher","DOI":"10.1177\/00420859241279446","author":"S Sheikh","year":"2024","unstructured":"Sheikh, S., Stolberg, A., & Gilmour, A. F. (2024). Investigating advanced school surveillance practices and disproportionality: A systematic review. Urban Education. https:\/\/doi.org\/10.1177\/00420859241279446. Urban Education (Beverly Hills, Calif.).","journal-title":"Urban Education"},{"key":"13493_CR63","volume-title":"EU Kids Online 2020: Survey results from 19 countries","author":"D Smahel","year":"2020","unstructured":"Smahel, D., Machackova, H., Mascheroni, G., Dedkova, L., Staksrud, E., Olafsson, K., & Hasebrink, U. (2020). EU Kids Online 2020: Survey results from 19 countries. London School of Economics and Political Science."},{"issue":"3","key":"13493_CR64","doi-asserted-by":"publisher","first-page":"252","DOI":"10.1080\/15391523.2014.888271","volume":"46","author":"DS Stanhope","year":"2014","unstructured":"Stanhope, D. S., & Corn, J. O. (2014). Acquiring teacher commitment to 1: 1 Initiatives: The role of the technology facilitator. Journal of Research on Technology in Education, 46(3), 252\u2013276. https:\/\/doi.org\/10.1080\/15391523.2014.888271","journal-title":"Journal of Research on Technology in Education"},{"key":"13493_CR65","doi-asserted-by":"publisher","first-page":"557","DOI":"10.1080\/1369118X.2019.1657164","volume":"24","author":"M Stoilova","year":"2021","unstructured":"Stoilova, M., Nandagiri, R., & Livingstone, S. (2021). Children\u2019s understanding of personal data and privacy online\u2014A systematic evidence mapping. Information, Communication & Society, 24, 557\u2013575. https:\/\/doi.org\/10.1080\/1369118X.2019.1657164","journal-title":"Information, Communication & Society"},{"issue":"2","key":"13493_CR66","doi-asserted-by":"publisher","first-page":"625","DOI":"10.3102\/0034654308325896","volume":"79","author":"ET Straub","year":"2009","unstructured":"Straub, E. T. (2009). Understanding technology adoption: Theory and future directions for informal learning. Review of Educational Research, 79(2), 625\u2013649. https:\/\/doi.org\/10.3102\/0034654308325896","journal-title":"Review of Educational Research"},{"doi-asserted-by":"crossref","unstructured":"Tang, S., Werner-Seidler, A., Torok, M., Mackinnon, A. J., & Christensen, H. (2021). The relationship between screen time and mental health in young people: A systematic review of longitudinal studies. Clinical psychology review, 86, 102021.","key":"13493_CR67","DOI":"10.1016\/j.cpr.2021.102021"},{"issue":"1","key":"13493_CR68","doi-asserted-by":"publisher","first-page":"99","DOI":"10.1111\/josh.13107","volume":"92","author":"H Utter","year":"2022","unstructured":"Utter, H., Polacsek, M., & Emond, J. A. (2022). Parents\u2019 perceptions of privacy policies and practices for school-issued digital devices: Implications for school practices. Journal of School Health, 92(1), 99\u2013108. https:\/\/doi.org\/10.1111\/josh.13107","journal-title":"Journal of School Health"},{"key":"13493_CR69","volume-title":"Digital transformation and scenarios of general education development. Modern analytics of education","author":"A Uvarov","year":"2020","unstructured":"Uvarov, A. (2020). Digital transformation and scenarios of general education development. Modern analytics of education. NRU HSE."},{"key":"13493_CR70","volume-title":"Researching lived experience: Human science for an action sensitive pedagogy","author":"M Van Manen","year":"1990","unstructured":"Van Manen, M. (1990). Researching lived experience: Human science for an action sensitive pedagogy. State University of New York Press."},{"issue":"6","key":"13493_CR71","doi-asserted-by":"publisher","first-page":"572","DOI":"10.1016\/j.ypmed.2009.04.008","volume":"48","author":"M van Nieuwenhuijzen","year":"2009","unstructured":"van Nieuwenhuijzen, M., Junger, M., Klein Velderman, M., Wiefferink, K. H., Paulussen, T. W. G. M., Hox, J., & Reijneveld, S. A. (2009). Clustering of health-compromising behavior and delinquency in adolescents and adults in the Dutch population. Preventive Medicine, 48(6), 572\u2013578.","journal-title":"Preventive Medicine"},{"doi-asserted-by":"publisher","unstructured":"Vissenberg, J., & d\u2019Haenens, L. (2020). Protecting youths\u2019 wellbeing online: studying the associations between opportunities, risks, and resilience. Media and Communication (Lisboa), 8(2), 175\u2013184. https:\/\/doi.org\/10.17645\/mac.v8i2.2774","key":"13493_CR72","DOI":"10.17645\/mac.v8i2.2774"},{"unstructured":"Vogels, E. A. (2022). Teens and cyberbullying in 2022. Pew Research Center. Retrieved on October 21, 2024, from https:\/\/www.pewresearch.org\/internet\/2022\/12\/15\/teens-and-cyberbullying-2022\/","key":"13493_CR73"},{"issue":"4","key":"13493_CR74","doi-asserted-by":"publisher","first-page":"23","DOI":"10.15585\/mmwr.su7304a3","volume":"73","author":"E Young","year":"2024","unstructured":"Young, E., McCain, J. L., Mercado, M. C., et al. (2024). Frequent social media use and experiences with bullying victimization, persistent feelings of sadness or hopelessness, and suicide risk among high school students \u2014 Youth risk behavior survey, United States, 2023. MMWR Supplements, 73(4), 23\u201330. https:\/\/doi.org\/10.15585\/mmwr.su7304a3","journal-title":"MMWR Supplements"}],"container-title":["Education and Information Technologies"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10639-025-13493-w.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10639-025-13493-w\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10639-025-13493-w.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,9,19]],"date-time":"2025-09-19T06:52:21Z","timestamp":1758264741000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10639-025-13493-w"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,4,11]]},"references-count":74,"journal-issue":{"issue":"14","published-print":{"date-parts":[[2025,9]]}},"alternative-id":["13493"],"URL":"https:\/\/doi.org\/10.1007\/s10639-025-13493-w","relation":{},"ISSN":["1360-2357","1573-7608"],"issn-type":[{"type":"print","value":"1360-2357"},{"type":"electronic","value":"1573-7608"}],"subject":[],"published":{"date-parts":[[2025,4,11]]},"assertion":[{"value":"22 August 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"10 March 2025","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"11 April 2025","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"There are no competing interests.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}]}}