{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,15]],"date-time":"2026-05-15T14:28:42Z","timestamp":1778855322024,"version":"3.51.4"},"reference-count":71,"publisher":"Informa UK Limited","issue":"14","funder":[{"name":"National Social Science Fund of China","award":["20CXW017"],"award-info":[{"award-number":["20CXW017"]}]}],"content-domain":{"domain":["www.tandfonline.com"],"crossmark-restriction":true},"short-container-title":["Behaviour &amp; Information Technology"],"published-print":{"date-parts":[[2024,10,25]]},"DOI":"10.1080\/0144929x.2023.2285941","type":"journal-article","created":{"date-parts":[[2023,11,27]],"date-time":"2023-11-27T13:52:31Z","timestamp":1701093151000},"page":"3578-3591","update-policy":"https:\/\/doi.org\/10.1080\/tandf_crossmark_01","source":"Crossref","is-referenced-by-count":5,"title":["Protecting teenagers\u2019 gaming privacy: the roles of parental mediation, platform protection, and risky encounters"],"prefix":"10.1080","volume":"43","author":[{"given":"Hongliang","family":"Chen","sequence":"first","affiliation":[{"name":"College of Media and International Culture, Zhejiang University, Hangzhou, People\u2019s Republic of China"}]},{"given":"Yueying","family":"Chen","sequence":"additional","affiliation":[{"name":"College of Media and International Culture, Zhejiang University, Hangzhou, People\u2019s Republic of China"}]},{"given":"Juan","family":"Chen","sequence":"additional","affiliation":[{"name":"College of Journalism and Communication, South China University of Technology, Guangzhou, People\u2019s Republic of China"}]}],"member":"301","published-online":{"date-parts":[[2023,11,27]]},"reference":[{"key":"e_1_3_2_2_1","doi-asserted-by":"publisher","DOI":"10.1177\/1461444815606121"},{"key":"e_1_3_2_3_1","doi-asserted-by":"publisher","DOI":"10.14569\/ijacsa.2020.0111154"},{"key":"e_1_3_2_4_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.elerap.2019.100868"},{"key":"e_1_3_2_5_1","doi-asserted-by":"publisher","DOI":"10.1108\/ejm-06-2019-0515"},{"key":"e_1_3_2_6_1","volume-title":"Social Foundations of Thought and Action: A Social Cognitive Theory","author":"Bandura A.","year":"1986","unstructured":"Bandura, A. 1986. Social Foundations of Thought and Action: A Social Cognitive Theory. Saddle River, NJ: Prentice Hall."},{"key":"e_1_3_2_7_1","doi-asserted-by":"publisher","DOI":"10.1016\/0749-5978(91)90022-L"},{"key":"e_1_3_2_8_1","doi-asserted-by":"publisher","DOI":"10.4018\/jgim.2021050106"},{"key":"e_1_3_2_9_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11469-015-9561-2"},{"key":"e_1_3_2_10_1","doi-asserted-by":"publisher","DOI":"10.1177\/0093650218800915"},{"key":"e_1_3_2_11_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.istr.2009.10.007"},{"key":"e_1_3_2_12_1","doi-asserted-by":"publisher","DOI":"10.1177\/1461444817724168"},{"key":"e_1_3_2_13_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10639-014-9349-1"},{"key":"e_1_3_2_14_1","doi-asserted-by":"publisher","DOI":"10.1177\/1461444820902103"},{"key":"e_1_3_2_15_1","doi-asserted-by":"publisher","DOI":"10.1002\/asi.23567"},{"key":"e_1_3_2_16_1","doi-asserted-by":"publisher","DOI":"10.1177\/1077699018754908"},{"key":"e_1_3_2_17_1","unstructured":"China Internet Network Information Center (CNNIC). 2021. National Research Report on Internet Use by Minors in 2020. Chinese Government. https:\/\/www.cnnic.cn\/NMediaFile\/old_attach\/P020210720571098696248.pdf."},{"key":"e_1_3_2_18_1","doi-asserted-by":"publisher","DOI":"10.1177\/14614448211018797"},{"key":"e_1_3_2_19_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2022.107423"},{"key":"e_1_3_2_20_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10802-019-00"},{"key":"e_1_3_2_21_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2014.01.009"},{"key":"e_1_3_2_22_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.tele.2015.04.002"},{"key":"e_1_3_2_23_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2021.107147"},{"key":"e_1_3_2_24_1","doi-asserted-by":"publisher","DOI":"10.1207\/S15327957PSPR0501_5"},{"key":"e_1_3_2_25_1","doi-asserted-by":"publisher","DOI":"10.48550\/arXiv.2212.12964"},{"key":"e_1_3_2_26_1","doi-asserted-by":"publisher","DOI":"10.1080\/1369118x.2014.991343"},{"key":"e_1_3_2_27_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2016.02.091"},{"key":"e_1_3_2_28_1","doi-asserted-by":"publisher","DOI":"10.1080\/01639620701876577"},{"key":"e_1_3_2_29_1","doi-asserted-by":"publisher","DOI":"10.1080\/08838151.2022.2051511"},{"key":"e_1_3_2_30_1","doi-asserted-by":"publisher","DOI":"10.1080\/10705519909540118"},{"key":"e_1_3_2_31_1","doi-asserted-by":"publisher","DOI":"10.1177\/08862605221085015"},{"key":"e_1_3_2_32_1","doi-asserted-by":"publisher","DOI":"10.1287\/isre.1120.0441"},{"key":"e_1_3_2_33_1","doi-asserted-by":"publisher","DOI":"10.1108\/intr-01-2021-0005"},{"key":"e_1_3_2_34_1","doi-asserted-by":"publisher","DOI":"10.1177\/1461444820960068"},{"key":"e_1_3_2_35_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1532-7795.2009.00623.x"},{"key":"e_1_3_2_36_1","doi-asserted-by":"publisher","DOI":"10.1287\/mnsc.2018.3132"},{"key":"e_1_3_2_37_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1745-6606.2006.00071.x"},{"key":"e_1_3_2_38_1","doi-asserted-by":"publisher","DOI":"10.1089\/cyber.2014.0008"},{"key":"e_1_3_2_39_1","doi-asserted-by":"publisher","DOI":"10.1177\/1461444811410406"},{"key":"e_1_3_2_40_1","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0263079"},{"key":"e_1_3_2_41_1","doi-asserted-by":"publisher","DOI":"10.1027\/1016-9040\/a000450"},{"key":"e_1_3_2_42_1","doi-asserted-by":"publisher","DOI":"10.1080\/21670811.2020.1837639"},{"key":"e_1_3_2_43_1","doi-asserted-by":"publisher","DOI":"10.1177\/1461444820912544"},{"key":"e_1_3_2_44_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jretai.2008.04.004"},{"key":"e_1_3_2_45_1","doi-asserted-by":"publisher","DOI":"10.1108\/intr-05-2014-0134"},{"key":"e_1_3_2_46_1","doi-asserted-by":"publisher","DOI":"10.1155\/2020\/8903247"},{"key":"e_1_3_2_47_1","doi-asserted-by":"publisher","DOI":"10.1287\/isre.1040.0032"},{"key":"e_1_3_2_48_1","doi-asserted-by":"publisher","DOI":"10.1108\/IntR-02-2017-0077"},{"key":"e_1_3_2_49_1","doi-asserted-by":"publisher","DOI":"10.17645\/mac.v8i2.2846"},{"key":"e_1_3_2_50_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2012.07.008"},{"key":"e_1_3_2_51_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1460-2466.2008.00392.x"},{"key":"e_1_3_2_52_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jbusres.2021.11.022"},{"key":"e_1_3_2_53_1","doi-asserted-by":"publisher","DOI":"10.1080\/00223980.1975.9915803"},{"key":"e_1_3_2_54_1","first-page":"153","volume-title":"Social Psychophysiology","author":"Rogers R. W.","year":"1983","unstructured":"Rogers, R. W. 1983. \u201cCognitive and Physiological Processes in Fear Appeals and Attitude Change: A Revised Theory of Protection Motivation.\u201d In Social Psychophysiology, edited by J. Cacioppo, and R. Petty, 153\u2013176. New York: Guilford Press."},{"issue":"1","key":"e_1_3_2_55_1","first-page":"61","article-title":"Privacy in Gaming","author":"Russell N. C.","year":"2019","unstructured":"Russell, N. C., J. R. Reidenberg, and S. Moon. 2019. \u201cPrivacy in Gaming.\u201d 29 Fordham Intellectual Property, Media & Entertainment Law Journal XXIX (1): 61\u2013180. https:\/\/ir.lawnet.fordham.edu\/iplj\/vol29\/iss1\/4.","journal-title":"29 Fordham Intellectual Property, Media & Entertainment Law Journal"},{"key":"e_1_3_2_56_1","doi-asserted-by":"publisher","DOI":"10.4324\/9781410610904"},{"key":"e_1_3_2_57_1","doi-asserted-by":"publisher","DOI":"10.1080\/0144929X.2020.1811770"},{"key":"e_1_3_2_58_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jbusres.2019.11.084"},{"key":"e_1_3_2_59_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2015.01.046"},{"key":"e_1_3_2_60_1","doi-asserted-by":"publisher","DOI":"10.2501\/IJA-31-4-719-740"},{"key":"e_1_3_2_61_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2015.07.062"},{"key":"e_1_3_2_62_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.tele.2017.11.003"},{"key":"e_1_3_2_63_1","volume-title":"Summary of Research on Youth Online Privacy","author":"Steeves V.","year":"2010","unstructured":"Steeves, V., T. Milford, and A. Butts. 2010. Summary of Research on Youth Online Privacy. Ottawa: Office of the Privacy Commissioner of Canada."},{"key":"e_1_3_2_64_1","doi-asserted-by":"publisher","DOI":"10.1109\/GEM56474.2022.10017750"},{"key":"e_1_3_2_65_1","doi-asserted-by":"publisher","DOI":"10.3389\/fpsyg.2020.529665"},{"key":"e_1_3_2_66_1","volume-title":"Privacy and Freedom","author":"Westin A. F.","year":"1967","unstructured":"Westin, A. F. 1967. Privacy and Freedom. New York: Athenaeum."},{"key":"e_1_3_2_67_1","doi-asserted-by":"publisher","DOI":"10.1080\/01650250143000436"},{"key":"e_1_3_2_68_1","doi-asserted-by":"publisher","DOI":"10.1089\/glr2.2021.0026"},{"key":"e_1_3_2_69_1","doi-asserted-by":"publisher","DOI":"10.17705\/1jais.00281"},{"key":"e_1_3_2_70_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1745-6606.2008.00113.x"},{"key":"e_1_3_2_71_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1745-6606.2009.01146.x"},{"key":"e_1_3_2_72_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.tele.2019.02.001"}],"container-title":["Behaviour &amp; Information Technology"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.tandfonline.com\/doi\/pdf\/10.1080\/0144929X.2023.2285941","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,11,28]],"date-time":"2024-11-28T16:10:33Z","timestamp":1732810233000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.tandfonline.com\/doi\/full\/10.1080\/0144929X.2023.2285941"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,11,27]]},"references-count":71,"journal-issue":{"issue":"14","published-print":{"date-parts":[[2024,10,25]]}},"alternative-id":["10.1080\/0144929X.2023.2285941"],"URL":"https:\/\/doi.org\/10.1080\/0144929x.2023.2285941","relation":{},"ISSN":["0144-929X","1362-3001"],"issn-type":[{"value":"0144-929X","type":"print"},{"value":"1362-3001","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,11,27]]},"assertion":[{"value":"The publishing and review policy for this title is described in its Aims & Scope.","order":1,"name":"peerreview_statement","label":"Peer Review Statement"},{"value":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=tbit20","URL":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=tbit20","order":2,"name":"aims_and_scope_url","label":"Aim & Scope"},{"value":"2023-04-07","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2023-11-14","order":2,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2023-11-27","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}