{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T10:32:47Z","timestamp":1750156367008,"version":"3.30.1"},"reference-count":113,"publisher":"Informa UK Limited","issue":"16","content-domain":{"domain":["www.tandfonline.com"],"crossmark-restriction":true},"short-container-title":["Behaviour &amp; Information Technology"],"published-print":{"date-parts":[[2024,12,9]]},"DOI":"10.1080\/0144929x.2024.2305286","type":"journal-article","created":{"date-parts":[[2024,1,22]],"date-time":"2024-01-22T13:30:01Z","timestamp":1705930201000},"page":"4150-4171","update-policy":"https:\/\/doi.org\/10.1080\/tandf_crossmark_01","source":"Crossref","is-referenced-by-count":1,"title":["A measurement model of online privacy cognitions in a sample of U.S. adolescents"],"prefix":"10.1080","volume":"43","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-5562-5150","authenticated-orcid":false,"given":"Erin","family":"Corcoran","sequence":"first","affiliation":[{"name":"Department of Clinical and Health Psychology, University of Florida, Gainesville, FL, USA"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0009-0009-2453-9709","authenticated-orcid":false,"given":"Alex","family":"Clement","sequence":"additional","affiliation":[{"name":"Department of Clinical and Health Psychology, University of Florida, Gainesville, FL, USA"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8003-6078","authenticated-orcid":false,"given":"Joy","family":"Gabrielli","sequence":"additional","affiliation":[{"name":"Department of Clinical and Health Psychology, University of Florida, Gainesville, FL, USA"}],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"301","published-online":{"date-parts":[[2024,1,22]]},"reference":[{"key":"e_1_3_4_2_1","doi-asserted-by":"publisher","DOI":"10.1016\/0749-5978(91)90020-T"},{"key":"e_1_3_4_3_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1559-1816.2002.tb00236.x"},{"key":"e_1_3_4_4_1","first-page":"907","article-title":"Dismantling the \u2018Black Opticon\u2019: Privacy, Race Equity, and Online Data-Protection Reform","volume":"131","author":"Allen A. L.","year":"2022","unstructured":"Allen, A. L. 2022. \u201cDismantling the \u2018Black Opticon\u2019: Privacy, Race Equity, and Online Data-Protection Reform.\u201d The Yale Law Journal Forum 131:907\u2013959. Accessed December 21, 2023. https:\/\/www.yalelawjournal.org\/forum\/dismantling-the-black-opticon.","journal-title":"The Yale Law Journal Forum"},{"key":"e_1_3_4_5_1","volume-title":"Racial and Ethnic Differences in How People Use Mobile Technology","author":"Anderson M.","year":"2015","unstructured":"Anderson, M. 2015. Racial and Ethnic Differences in How People Use Mobile Technology. Pew Research Center. https:\/\/www.pewresearch.org\/short-reads\/2015\/04\/30\/racial-and-ethnic-differences-in-how-people-use-mobile-technology\/."},{"key":"e_1_3_4_6_1","volume-title":"Teens, Social Media & Technology 2018","author":"Anderson M.","year":"2018","unstructured":"Anderson, M., and J. Jiang. 2018. Teens, Social Media & Technology 2018. Pew Research Center. https:\/\/www.pewresearch.org\/internet\/wp-content\/uploads\/sites\/9\/2018\/05\/PI_2018.05.31_TeensTech_TOPLINE.pdf."},{"key":"e_1_3_4_7_1","doi-asserted-by":"publisher","DOI":"10.1177\/07439156231165250"},{"key":"e_1_3_4_8_1","doi-asserted-by":"publisher","DOI":"10.5210\/fm.v11i9.1394"},{"key":"e_1_3_4_9_1","doi-asserted-by":"publisher","DOI":"10.1080\/17482798.2011.633412"},{"key":"e_1_3_4_10_1","volume-title":"It's Complicated: The Social Lives of Networked Teens","author":"boyd d.","year":"2014","unstructured":"boyd, d. 2014. It's Complicated: The Social Lives of Networked Teens. Yale University Press. https:\/\/www.danah.org\/books\/ItsComplicated.pdf."},{"key":"e_1_3_4_11_1","doi-asserted-by":"publisher","DOI":"10.31219\/osf.io\/2gec4"},{"key":"e_1_3_4_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/2078827.2078847"},{"key":"e_1_3_4_13_1","doi-asserted-by":"publisher","DOI":"10.1002\/asi.20459"},{"key":"e_1_3_4_14_1","doi-asserted-by":"publisher","DOI":"10.4324\/9780203807644"},{"key":"e_1_3_4_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPC.2009.2017985"},{"key":"e_1_3_4_16_1","doi-asserted-by":"publisher","DOI":"10.1207\/S15328007SEM0902_5"},{"key":"e_1_3_4_17_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2017.12.001"},{"key":"e_1_3_4_18_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.compedu.2016.10.002"},{"key":"e_1_3_4_19_1","unstructured":"Collins. 2012. \u201cAttitude.\u201d In Collins English Dictionary. William Collins Sons. https:\/\/www.dictionary.com\/browse\/attitude."},{"key":"e_1_3_4_20_1","doi-asserted-by":"publisher","DOI":"10.1177\/1541204013503889"},{"key":"e_1_3_4_21_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10862-022-09962-y"},{"key":"e_1_3_4_22_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jssr.2019.09.004"},{"key":"e_1_3_4_23_1","doi-asserted-by":"publisher","DOI":"10.2196\/mhealth.7626"},{"key":"e_1_3_4_24_1","doi-asserted-by":"publisher","DOI":"10.1177\/1461444819876570"},{"key":"e_1_3_4_25_1","doi-asserted-by":"publisher","DOI":"10.3389\/fpsyg.2017.00815"},{"key":"e_1_3_4_26_1","volume-title":"Defining Generations: Where Millennials End and Generation Z Begins","author":"Dimock M.","year":"2019","unstructured":"Dimock, M. 2019. Defining Generations: Where Millennials End and Generation Z Begins. Pew Research Center. https:\/\/www.pewresearch.org\/short-reads\/2019\/01\/17\/where-millennials-end-and-generation-z-begins\/."},{"key":"e_1_3_4_27_1","doi-asserted-by":"publisher","DOI":"10.1080\/01449290410001715723"},{"key":"e_1_3_4_28_1","doi-asserted-by":"publisher","DOI":"10.1177\/0044118X20938416"},{"key":"e_1_3_4_29_1","doi-asserted-by":"publisher","DOI":"10.56553\/popets-2023-0049"},{"key":"e_1_3_4_30_1","volume-title":"Health App Broke Its Privacy Promises by Disclosing Intimate Details About Users","author":"Fair L.","year":"2021","unstructured":"Fair, L. 2021. Health App Broke Its Privacy Promises by Disclosing Intimate Details About Users. Federal Trade Commission. https:\/\/www.ftc.gov\/business-guidance\/blog\/2021\/01\/health-app-broke-its-privacy-promises-disclosing-intimate-details-about-users."},{"key":"e_1_3_4_31_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2014.01.009"},{"key":"e_1_3_4_32_1","doi-asserted-by":"publisher","DOI":"10.1177\/001872675400700202"},{"key":"e_1_3_4_33_1","doi-asserted-by":"publisher","DOI":"10.1542\/peds.2017-3718"},{"key":"e_1_3_4_34_1","doi-asserted-by":"publisher","DOI":"10.5040\/9798400693366"},{"key":"e_1_3_4_35_1","first-page":"63","volume-title":"Children, Media and Consumption: On the Front Edge, Yearbook 2007","author":"Grant I. C.","year":"2006","unstructured":"Grant, I. C. 2006. \u201cOnline Privacy: An Issue for Adolescents.\u201d In Children, Media and Consumption: On the Front Edge, Yearbook 2007, edited by K. M. Ekstr\u00f6m and B. Tufte, 63\u201377. G\u00f6teborg: The International Clearinghouse on Children, Youth and Media."},{"key":"e_1_3_4_36_1","first-page":"3737","article-title":"\u2018What Can I Really Do?\u2019 Explaining the Privacy Paradox with Online Apathy","volume":"10","author":"Hargittai E.","year":"2016","unstructured":"Hargittai, E., and A. Marwick. 2016. \u201c\u2018What Can I Really Do?\u2019 Explaining the Privacy Paradox with Online Apathy.\u201d International Journal of Communication 10:3737\u20133757.","journal-title":"International Journal of Communication"},{"key":"e_1_3_4_37_1","unstructured":"Harwell D. 2022. \u201cRemote Learning Apps Shared Children\u2019s Data at a \u2018Dizzying Scale\u2019.\u201d The Washington Post May 25. https:\/\/www.washingtonpost.com\/technology\/2022\/05\/24\/remote-school-app-tracking-privacy\/."},{"key":"e_1_3_4_38_1","doi-asserted-by":"publisher","DOI":"10.1089\/cyber.2012.0041"},{"key":"e_1_3_4_39_1","doi-asserted-by":"publisher","DOI":"10.2139\/ssrn.3319830"},{"key":"e_1_3_4_40_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2016.02.091"},{"key":"e_1_3_4_41_1","volume-title":"Zero to Eight: Young Children and Their Internet use","author":"Holloway D.","year":"2013","unstructured":"Holloway, D., L. Green, and S. Livingstone. 2013. Zero to Eight: Young Children and Their Internet use. EU Kids Online. https:\/\/eprints.lse.ac.uk\/52630\/1\/Zero_to_eight.pdf."},{"key":"e_1_3_4_42_1","doi-asserted-by":"publisher","DOI":"10.17645\/mac.v10i1.4704"},{"key":"e_1_3_4_43_1","doi-asserted-by":"publisher","DOI":"10.25300\/MISQ\/2013\/37.1.12"},{"key":"e_1_3_4_44_1","unstructured":"Hudson L. 2016. \u201cHow to Protect Privacy While Using Pok\u00e9mon Go and Other Apps.\u201d The New York Times July 12. https:\/\/www.nytimes.com\/2016\/07\/14\/technology\/personaltech\/how-to-protect-privacy-while-using-pokemon-go-and-other-apps.html."},{"key":"e_1_3_4_45_1","volume-title":"Teaching Digital Citizens in Today\u2019s World: Research and Insights Behind the Common Sense K\u201312 Digital Citizenship Curriculum","author":"James C.","year":"2019","unstructured":"James, C., E. Weinstein, and K. Mendoza. 2019. Teaching Digital Citizens in Today\u2019s World: Research and Insights Behind the Common Sense K\u201312 Digital Citizenship Curriculum. Common Sense Media. https:\/\/www.researchgate.net\/profile\/Donia-Ragab\/publication\/337447543_Teaching_Digital_Citizens_in_Today's_World_Research_and_Insights_Behind_the_Common_Sense_K-12_Digital_Citizenship_Curriculum\/links\/5dd82852458515dc2f43a28c\/Teaching-Digital-Citizens-in-Todays-World-Research-and-Insights-Behind-the-Common-Sense-K-12-Digital-Citizenship-Curriculum.pdf."},{"key":"e_1_3_4_46_1","doi-asserted-by":"publisher","DOI":"10.1145\/3313831.3376611"},{"key":"e_1_3_4_47_1","doi-asserted-by":"publisher","DOI":"10.1145\/2675133.2675287"},{"key":"e_1_3_4_48_1","volume-title":"Data Brokers and the Sale of Americans\u2019 Mental Health Data: The Exchange of Our Most Sensitive Data and What It Means for Personal Privacy","author":"Kim J.","year":"2023","unstructured":"Kim, J. 2023. Data Brokers and the Sale of Americans\u2019 Mental Health Data: The Exchange of Our Most Sensitive Data and What It Means for Personal Privacy. Durham, NC: Duke University, Sanford School of Public Policy. https:\/\/techpolicy.sanford.duke.edu\/data-brokers-and-the-sale-of-americans-mental-health-data\/."},{"key":"e_1_3_4_49_1","unstructured":"Knorr C. and Common Sense Media. 2016. \u201cWatch What You Tweet: Social Media Can Affect College Admissions.\u201d CNN September 21. https:\/\/www.cnn.com\/2016\/09\/21\/health\/kids-social-media-college-admissions\/index.html."},{"key":"e_1_3_4_50_1","doi-asserted-by":"publisher","DOI":"10.1111\/josh.12977"},{"key":"e_1_3_4_51_1","doi-asserted-by":"publisher","DOI":"10.1109\/HICSS.2010.307"},{"key":"e_1_3_4_52_1","unstructured":"Leetaru K. 2015. \u201cWhen Toys Are Hackable and Our Children Become Data Breach Victims.\u201d Forbes December 12. https:\/\/www.forbes.com\/sites\/kalevleetaru\/2015\/12\/12\/when-toys-are-hackable-and-our-children-become-data-breach-victims\/#7d5638d57ea5."},{"key":"e_1_3_4_53_1","volume-title":"Social Media & Mobile Internet use among Teens and Young Adults","author":"Lenhart A.","year":"2010","unstructured":"Lenhart, A., K. Purcell, A. Smith, and K. Zickuhr. 2010. Social Media & Mobile Internet use among Teens and Young Adults. Pew Research Center. https:\/\/eric.ed.gov\/?id=ED525056."},{"key":"e_1_3_4_54_1","volume-title":"Longitudinal Structural Equation Modeling","author":"Little T. D.","year":"2013","unstructured":"Little, T. D. 2013. Longitudinal Structural Equation Modeling. New York: Guilford Press."},{"key":"e_1_3_4_55_1","volume-title":"Children's Data and Privacy Online: Growing Up in a Digital Age: An Evidence Review","author":"Livingstone S.","year":"2019","unstructured":"Livingstone, S., M. Stoilova, and R. Nandagiri. 2019a. Children's Data and Privacy Online: Growing Up in a Digital Age: An Evidence Review. London: London School of Economics and Political Science, Department of Media and Communications. https:\/\/www.lse.ac.uk\/media-and-communications\/assets\/documents\/research\/projects\/childrens-privacy-online\/Evidence-review.pdf."},{"key":"e_1_3_4_56_1","volume-title":"Talking to Children About Data and Privacy Online: Research Methodology","author":"Livingstone S.","year":"2019","unstructured":"Livingstone, S., M. Stoilova, and R. Nandagiri. 2019b. Talking to Children About Data and Privacy Online: Research Methodology. London: London School of Economics and Political Science. https:\/\/www.lse.ac.uk\/media-and-communications\/assets\/documents\/research\/projects\/childrens-privacy-online\/Talking-to-children-about-data-and-privacy-online-methodology-final.pdf."},{"key":"e_1_3_4_57_1","volume-title":"AMCIS 2010 Proceedings","author":"Lo J.","year":"2010","unstructured":"Lo, J. 2010. \u201cPrivacy Concern, Locus of Control, and Salience in a Trust-Risk Model of Information Disclosure on Social Networking Site.\u201d In AMCIS 2010 Proceedings, August. https:\/\/aisel.aisnet.org\/amcis2010\/110."},{"key":"e_1_3_4_58_1","volume-title":"Teens and Mobile Apps Privacy","author":"Madden M.","year":"2013","unstructured":"Madden, M., A. Lenhart, S. Cortesi, and U. Gasser. 2013a. Teens and Mobile Apps Privacy. Pew Research Center. https:\/\/www.pewinternet.org\/wp-content\/uploads\/sites\/9\/media\/Files\/Reports\/2013\/PIP_Teens-and-Mobile-Apps-Privacy.pdf."},{"key":"e_1_3_4_59_1","volume-title":"Teens, Social Media, and Privacy","author":"Madden M.","year":"2013","unstructured":"Madden, M., A. Lenhart, S. Cortesi, U. Gasser, M. Duggan, A. Smith, and M. Beaton. 2013b. Teens, Social Media, and Privacy. Pew Research Center. http:\/\/pewinternet.org\/Reports\/2013\/Teens-Social-Media-And-Privacy.aspx."},{"key":"e_1_3_4_60_1","unstructured":"Maheshwari S. C. Kang and D. McCabe. 2022. \u201cBans on TikTok Gain Momentum in Washington and States.\u201d The New York Times December 20. https:\/\/www.nytimes.com\/2022\/12\/20\/technology\/tiktok-ban-government-issued-devices.html."},{"key":"e_1_3_4_61_1","doi-asserted-by":"publisher","DOI":"10.1287\/isre.1040.0032"},{"key":"e_1_3_4_62_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.drugalcdep.2011.10.011"},{"key":"e_1_3_4_63_1","doi-asserted-by":"publisher","DOI":"10.1177\/1461444814543995"},{"key":"e_1_3_4_64_1","unstructured":"Marwick A. E. D. Murgia-Diaz and J. G. Palfrey. 2010. Youth Privacy and Reputation (Literature Review). Berkman Center Research Publication No. 2010-5; Harvard Public Law Working Paper No. 10-29. http:\/\/ssrn.com\/abstract=1588163."},{"key":"e_1_3_4_65_1","doi-asserted-by":"publisher","DOI":"10.1093\/hcr\/hqaa012"},{"key":"e_1_3_4_66_1","doi-asserted-by":"publisher","DOI":"10.1177\/0270467610365355"},{"key":"e_1_3_4_67_1","doi-asserted-by":"publisher","DOI":"10.31234\/osf.io\/7zng6"},{"key":"e_1_3_4_68_1","doi-asserted-by":"publisher","DOI":"10.1080\/21670811.2016.1234938"},{"key":"e_1_3_4_69_1","doi-asserted-by":"publisher","DOI":"10.2196\/16736"},{"key":"e_1_3_4_70_1","doi-asserted-by":"publisher","DOI":"10.1177\/1077727X06296622"},{"key":"e_1_3_4_71_1","volume-title":"Mplus User\u2019s Guide","author":"Muth\u00e9n L. K.","year":"1998","unstructured":"Muth\u00e9n, L. K., and B. O. Muth\u00e9n. 1998\u20132017. Mplus User\u2019s Guide. 8th ed. Los Angeles, CA: Muth\u00e9n & Muth\u00e9n.","edition":"8"},{"key":"e_1_3_4_72_1","doi-asserted-by":"publisher","DOI":"10.1162\/DAED_a_00113"},{"key":"e_1_3_4_73_1","doi-asserted-by":"publisher","DOI":"10.3389\/fpsyg.2020.543388"},{"key":"e_1_3_4_74_1","unstructured":"Palfrey J. G. U. Gasser and D. Boyd. 2010. Response to FCC Notice of Inquiry 09-94: Empowering Parents and Protecting Children in an Evolving Media Landscape. Berkman Center Research Publication No. 2010-02 Harvard Public Law Working Paper No. 10-19. https:\/\/papers.ssrn.com\/sol3\/papers.cfm?abstract_id=1559208."},{"key":"e_1_3_4_75_1","doi-asserted-by":"publisher","DOI":"10.1177\/0093650211418338"},{"key":"e_1_3_4_76_1","volume-title":"On the Cusp of Adulthood and Facing an Uncertain Future: What We Know About Gen Z So Far","author":"Parker K.","year":"2020","unstructured":"Parker, K., and R. Igielnik. 2020. On the Cusp of Adulthood and Facing an Uncertain Future: What We Know About Gen Z So Far. Pew Research Center. https:\/\/www.pewresearch.org\/social-trends\/2020\/05\/14\/on-the-cusp-of-adulthood-and-facing-an-uncertain-future-what-we-know-about-gen-z-so-far-2\/."},{"key":"e_1_3_4_77_1","doi-asserted-by":"publisher","DOI":"10.1006\/jado.1997.0094"},{"key":"e_1_3_4_78_1","doi-asserted-by":"publisher","DOI":"10.1353\/book4588"},{"key":"e_1_3_4_79_1","first-page":"103","volume-title":"Cyberbullying and Digital Safety: Applying Global Research to Youth in India","author":"Pinter A. T.","year":"2022","unstructured":"Pinter, A. T., A. K. Ghosh, and P. J. Wisniewski. 2022. \u201cGoing Beyond Cyberbullying: Adolescent Online Safety and Digital Risks.\u201d In Cyberbullying and Digital Safety: Applying Global Research to Youth in India, edited by D. Sharma, K. Mehari, J. Doty, N. Sharma, and P. Wisniewski, 103\u2013135. Gainesville, FL: Library Press. https:\/\/cmci.colorado.edu\/idlab\/assets\/bibliography\/pdf\/pinter-cyberbullying2022.pdf."},{"key":"e_1_3_4_80_1","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0153842"},{"key":"e_1_3_4_81_1","doi-asserted-by":"publisher","DOI":"10.14236\/ewic\/HCI2009.29"},{"key":"e_1_3_4_82_1","first-page":"345","article-title":"Free Speech, Privacy, and the Web That Never Forgets","volume":"9","author":"Rosen J.","year":"2011","unstructured":"Rosen, J. 2011. \u201cFree Speech, Privacy, and the Web That Never Forgets.\u201d Journal on Telecommunications & High Technology Law 9:345. http:\/\/www.jthtl.org\/content\/articles\/V9I2\/JTHTLv9i2_Rosen.PDF.","journal-title":"Journal on Telecommunications & High Technology Law"},{"key":"e_1_3_4_83_1","doi-asserted-by":"publisher","DOI":"10.1080\/00224545.2014.914881"},{"key":"e_1_3_4_84_1","unstructured":"Santer N. D. A. Manago A. Starks and S. M. Reich. 2021. \u201cEarly Adolescents\u2019 Perspectives on Digital Privacy.\u201d In Algorithmic Rights and Protections for Children 1\u201338. https:\/\/assets.pubpub.org\/mdauvfxj\/5c8afefe-bd04-4560-9097-b2a09557394b.pdf."},{"key":"e_1_3_4_85_1","doi-asserted-by":"publisher","DOI":"10.1509\/jppm.19.1.62.16949"},{"key":"e_1_3_4_86_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2015.07.062"},{"key":"e_1_3_4_87_1","doi-asserted-by":"publisher","DOI":"10.1609\/icwsm.v10i1.14811"},{"key":"e_1_3_4_88_1","doi-asserted-by":"publisher","DOI":"10.21953\/lse.47fdeqj01ofo"},{"key":"e_1_3_4_89_1","volume-title":"Online Shopping and E-Commerce","author":"Smith A.","year":"2016","unstructured":"Smith, A., and M. Anderson. 2016. Online Shopping and E-Commerce. Pew Research Center. https:\/\/www.pewresearch.org\/internet\/2016\/12\/19\/online-shopping-and-e-commerce\/."},{"key":"e_1_3_4_90_1","volume-title":"The Digital Person: Technology and Privacy in the Information Age","author":"Solove D. J.","year":"2004","unstructured":"Solove, D. J. 2004. The Digital Person: Technology and Privacy in the Information Age. Vol. 1. New York: NYU Press. https:\/\/scholarship.law.gwu.edu\/cgi\/viewcontent.cgi?article=2501&context=faculty_publications."},{"key":"e_1_3_4_91_1","first-page":"839","article-title":"Sharenting: Children's Privacy in the Age of Social Media","volume":"66","author":"Steinberg S. B.","year":"2016","unstructured":"Steinberg, S. B. 2016. \u201cSharenting: Children's Privacy in the Age of Social Media.\u201d Emory Law Journal 66:839. https:\/\/heinonline.org\/hol-cgi-bin\/get_pdf.cgi?handle=hein.journals\/emlj66&section=27&casa_token=Sdeg7GmcY74AAAAA:dXBAwFqHarEe9NesFnpKwqNhBnAXvMMN6zVnn0B4beWV2N9PTq5GeYz0ZzpTADOJ7Lndlbg.","journal-title":"Emory Law Journal"},{"key":"e_1_3_4_92_1","unstructured":"Stevens L. 2018. \u201cAmazon Alexa-Powered Device Recorded and Shared User\u2019s Conversation Without Permission.\u201d The Wall Street Journal May 24. https:\/\/www.wsj.com\/articles\/amazon-alexa-powered-device-recorded-and-shared-users-conversation-without-permission-1527203250."},{"key":"e_1_3_4_93_1","doi-asserted-by":"publisher","DOI":"10.17645\/mac.v8i4.3407"},{"key":"e_1_3_4_94_1","doi-asserted-by":"publisher","DOI":"10.1080\/1369118X.2019.1657164"},{"key":"e_1_3_4_95_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-94-017-9385-8_14"},{"key":"e_1_3_4_96_1","doi-asserted-by":"publisher","DOI":"10.1177\/0270467607311484"},{"key":"e_1_3_4_97_1","doi-asserted-by":"publisher","DOI":"10.18251\/ijme.v23i1.2463"},{"key":"e_1_3_4_98_1","unstructured":"U.S. Census Bureau. 2020. 2019 American Community Survey Single-Year Estimates. https:\/\/www.census.gov\/programs-surveys\/acs\/data.html."},{"key":"e_1_3_4_99_1","unstructured":"U.S. Census Bureau. 2021. 2020 Census Illuminates Racial and Ethnic Composition of the Country. https:\/\/www.census.gov\/library\/stories\/2021\/08\/improved-race-ethnicity-measures-reveal-united-states-population-much-more-multiracial.html#:~:text=The%20largest%20Multiracial%20combinations%20in Other%20Race%20(1%20million)."},{"issue":"2","key":"e_1_3_4_100_1","first-page":"Article 2","article-title":"The Privacy Paradox on Social Network Sites Revisited: The Role of Individual Characteristics and Group Norms","volume":"3","author":"Utz S.","year":"2015","unstructured":"Utz, S., and N. C. Kr\u00e4mer. 2015. \u201cThe Privacy Paradox on Social Network Sites Revisited: The Role of Individual Characteristics and Group Norms.\u201d Cyberpsychology: Journal of Psychosocial Research on Cyberspace 3 (2): Article 2. https:\/\/www.researchgate.net\/profile\/Sonja-Utz\/publication\/344749944_The_privacy_paradox_on_social_network_sites_revisited_The_role_of_individual_characteristics_and_group_norms\/links\/5f8d8dec299bf1b53e327079\/The-privacy-paradox-on-social-network-sites-revisited-The-role-of-individual-characteristics-and-group-norms.pdf.","journal-title":"Cyberpsychology: Journal of Psychosocial Research on Cyberspace"},{"key":"e_1_3_4_101_1","unstructured":"Valentino-DeVries J. 2015. \u201cFlaws in Baby Monitors Open Door for Hackers.\u201d The Wall Street Journal September 2. https:\/\/www.wsj.com\/articles\/BL-DGB-43272."},{"key":"e_1_3_4_102_1","first-page":"409","article-title":"I Agree, or Do I: A Rights-Based Analysis of the Law on Children's Consent in the Digital World","volume":"34","author":"Van der Hof S.","year":"2016","unstructured":"Van der Hof, S. 2016. \u201cI Agree, or Do I: A Rights-Based Analysis of the Law on Children's Consent in the Digital World.\u201d Wisconsin International Law Journal 34:409. https:\/\/heinonline.org\/HOL\/LandingPage?handle=hein.journals\/wisint34&div=17&id=&page.","journal-title":"Wisconsin International Law Journal"},{"key":"e_1_3_4_103_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2014.11.036"},{"key":"e_1_3_4_104_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.childyouth.2019.104401"},{"key":"e_1_3_4_105_1","volume-title":"Teens, Social Media and Technology 2022","author":"Vogels E. A.","year":"2022","unstructured":"Vogels, E. A., R. Gelles-Watnick, and N. Massarat. 2022. Teens, Social Media and Technology 2022. Pew Research Center. https:\/\/www.pewresearch.org\/internet\/2022\/08\/10\/teens-social-media-and-technology-2022\/."},{"key":"e_1_3_4_106_1","doi-asserted-by":"publisher","DOI":"10.4324\/9781003244677-20"},{"issue":"1","key":"e_1_3_4_107_1","first-page":"166","article-title":"Privacy and Freedom","volume":"25","author":"Westin A. F.","year":"1968","unstructured":"Westin, A. F. 1968. \u201cPrivacy and Freedom.\u201d Washington and Lee Law Review 25 (1): 166. https:\/\/scholarlycommons.law.wlu.edu\/cgi\/viewcontent.cgi?article=3659&context=wlulr.","journal-title":"Washington and Lee Law Review"},{"key":"e_1_3_4_108_1","doi-asserted-by":"publisher","DOI":"10.1145\/2531602.2531696"},{"key":"e_1_3_4_109_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.appdev.2005.04.001"},{"key":"e_1_3_4_110_1","doi-asserted-by":"publisher","DOI":"10.1037\/0012-1649.42.3.418"},{"issue":"1","key":"e_1_3_4_111_1","first-page":"207","article-title":"Students\u2019 Perception Toward Personal Information and Privacy Disclosure in E-Learning","volume":"13","author":"Yang F.","year":"2014","unstructured":"Yang, F., and S. Wang. 2014. \u201cStudents\u2019 Perception Toward Personal Information and Privacy Disclosure in E-Learning.\u201d Turkish Online Journal of Educational Technology-TOJET 13 (1): 207\u2013216. https:\/\/files.eric.ed.gov\/fulltext\/EJ1018188.pdf.","journal-title":"Turkish Online Journal of Educational Technology-TOJET"},{"key":"e_1_3_4_112_1","doi-asserted-by":"publisher","DOI":"10.1542\/peds.2007-0693"},{"key":"e_1_3_4_113_1","doi-asserted-by":"publisher","DOI":"10.1089\/cpb.2007.0240"},{"key":"e_1_3_4_114_1","doi-asserted-by":"publisher","DOI":"10.1145\/3290605.3300336"}],"container-title":["Behaviour &amp; Information Technology"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.tandfonline.com\/doi\/pdf\/10.1080\/0144929X.2024.2305286","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,12,10]],"date-time":"2024-12-10T11:44:42Z","timestamp":1733831082000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.tandfonline.com\/doi\/full\/10.1080\/0144929X.2024.2305286"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,1,22]]},"references-count":113,"journal-issue":{"issue":"16","published-print":{"date-parts":[[2024,12,9]]}},"alternative-id":["10.1080\/0144929X.2024.2305286"],"URL":"https:\/\/doi.org\/10.1080\/0144929x.2024.2305286","relation":{},"ISSN":["0144-929X","1362-3001"],"issn-type":[{"type":"print","value":"0144-929X"},{"type":"electronic","value":"1362-3001"}],"subject":[],"published":{"date-parts":[[2024,1,22]]},"assertion":[{"value":"The publishing and review policy for this title is described in its Aims & Scope.","order":1,"name":"peerreview_statement","label":"Peer Review Statement"},{"value":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=tbit20","URL":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=tbit20","order":2,"name":"aims_and_scope_url","label":"Aim & Scope"},{"value":"2022-10-07","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2024-01-03","order":2,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2024-01-22","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}