{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,7]],"date-time":"2026-02-07T10:08:58Z","timestamp":1770458938625,"version":"3.49.0"},"reference-count":77,"publisher":"Emerald","issue":"1","license":[{"start":{"date-parts":[[2021,7,16]],"date-time":"2021-07-16T00:00:00Z","timestamp":1626393600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.emerald.com\/insight\/site-policies"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["INTR"],"published-print":{"date-parts":[[2022,1,18]]},"abstract":"<jats:sec><jats:title content-type=\"abstract-subheading\">Purpose<\/jats:title><jats:p>This study investigates how different parental mediation strategies (active versus restrictive) and teen Douyin users' privacy risk perceptions are associated with their privacy management behaviors.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-subheading\">Design\/methodology\/approach<\/jats:title><jats:p>An online survey with teen Douyin users (<jats:italic>N<\/jats:italic>\u00a0=\u00a0500) was administered in mainland China.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-subheading\">Findings<\/jats:title><jats:p>Perceived privacy risk leads teenagers to implement stricter privacy management strategies. However, different types of parental mediation have different impacts on teens' privacy management behaviors. Discussion-based active mediation is positively correlated with privacy disclosure and privacy boundary linkage, while rule-based restrictive mediation is positively associated with privacy boundary control. In addition, active mediation encourages teens to use their own judgment about privacy risks when deciding how much personal information to disclose and with whom they want to share their information. Conversely, restrictive mediation results in teens making decisions about disclosing private information without taking their own risk assessments into account.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-subheading\">Originality\/value<\/jats:title><jats:p>Video-sharing social media platforms like TikTok and Douyin have become a cultural trend among teen social media users. However, loss of privacy is a potentially serious downside of using such platforms. Despite the platforms' popularity among this age group, little is known about the ways teens manage their privacy on such social media platforms. By examining how teens' privacy risk perception and parental intervention shape three different aspects of privacy boundary management (i.e. privacy disclosure, privacy boundary linkage, and privacy boundary control), this study provides a comprehensive understanding of teen Douyin users' privacy management.<\/jats:p><\/jats:sec>","DOI":"10.1108\/intr-01-2021-0005","type":"journal-article","created":{"date-parts":[[2021,7,7]],"date-time":"2021-07-07T04:47:39Z","timestamp":1625633259000},"page":"312-334","source":"Crossref","is-referenced-by-count":32,"title":["Teens' privacy management on video-sharing social media: the roles of perceived privacy risk and parental mediation"],"prefix":"10.1108","volume":"32","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-8076-7126","authenticated-orcid":false,"given":"Hyunjin","family":"Kang","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1636-8171","authenticated-orcid":false,"given":"Wonsun","family":"Shin","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8757-5824","authenticated-orcid":false,"given":"Junru","family":"Huang","sequence":"additional","affiliation":[]}],"member":"140","published-online":{"date-parts":[[2021,7,16]]},"reference":[{"key":"key2022011705590041400_ref001","first-page":"1","article-title":"Personal information privacy setting of online social networks and their suitability for mobile Internet devices","volume":"2","year":"2013","journal-title":"International Journal of Security, Privacy and Trust Management"},{"key":"key2022011705590041400_ref002","volume-title":"The Environment and Social Behaviour","year":"1975"},{"key":"key2022011705590041400_ref003","volume-title":"Why You Need to Excel at Video","year":"2016"},{"key":"key2022011705590041400_ref004","unstructured":"Bandura, A. (1989), \u201cSocial cognitive theory\u201d, in Vasta, R. (Ed.), Annals of Child Development, Jai Press, Greenwich, CT, Vol. 6, pp. 1-60."},{"issue":"7","key":"key2022011705590041400_ref005","doi-asserted-by":"publisher","first-page":"1038","DOI":"10.1016\/j.tele.2017.04.013","article-title":"The privacy paradox \u2013 investigating discrepancies between expressed privacy concerns and actual online behavior \u2013 a systematic literature review","volume":"34","year":"2017","journal-title":"Telematics and Informatics"},{"issue":"1","key":"key2022011705590041400_ref006","doi-asserted-by":"publisher","first-page":"26","DOI":"10.1111\/jcom.12276","article-title":"Online privacy concerns and privacy management: a meta-analytical review","volume":"67","year":"2017","journal-title":"Journal of Communication"},{"issue":"6","key":"key2022011705590041400_ref007","doi-asserted-by":"crossref","first-page":"370","DOI":"10.1093\/jcmc\/zmy020","article-title":"Understanding the effects of personalization as a privacy calculus: analyzing self-disclosure across health, news, and commerce contexts","volume":"23","year":"2018","journal-title":"Journal of Computer-Mediated Communication"},{"key":"key2022011705590041400_ref008","unstructured":"ByteDance (2020), \u201cDouyin creator ecosystem report\u201d, available at: https:\/\/index.toutiao.com\/pdfjs\/view.html?file=\/\/index.toutiao.com\/report\/download\/c93b5b5199bb4aedb0327a1ec15a4eae.pdf (accessed 15 January 2021)."},{"issue":"12","key":"key2022011705590041400_ref009","doi-asserted-by":"crossref","first-page":"2199","DOI":"10.1016\/j.worlddev.2011.05.021","article-title":"Labor migration and time use patterns of the left-behind children and elderly in rural China","volume":"39","year":"2011","journal-title":"World Development"},{"issue":"10","key":"key2022011705590041400_ref010","doi-asserted-by":"publisher","first-page":"1392","DOI":"10.1177\/0002764218792691","article-title":"Revisiting the privacy paradox on social media with an extended privacy calculus model: the Effect of privacy concerns, privacy self-efficacy, and social capital on privacy management","volume":"62","year":"2018","journal-title":"American Behavioral Scientist"},{"issue":"1","key":"key2022011705590041400_ref011","doi-asserted-by":"publisher","first-page":"13","DOI":"10.1680\/udap.2010.163","article-title":"Couldn't or wouldn't? The influence of privacy concerns and self-efficacy in privacy management on privacy protection","volume":"30","year":"2015","journal-title":"Cyberpsychology, Behavior, and Social Networking"},{"issue":"1","key":"key2022011705590041400_ref012","doi-asserted-by":"crossref","first-page":"173","DOI":"10.1177\/1077699018754908","article-title":"Reducing harm from media: a meta-analysis of parental mediation","volume":"96","year":"2019","journal-title":"Journalism and Mass Communication Quarterly"},{"key":"key2022011705590041400_ref013","doi-asserted-by":"crossref","unstructured":"Chen, X., Huang, Q., Rozelle, S., Shi, Y. and Zhang, L. (2014), \u201cEffect of migration on children's educational performance in rural China\u201d, in Brada, J.C., Wachtel, P. and Yang, D.T. (Eds), China's Economic Development, Palgrave Macmillan, London, pp. 206-224.","DOI":"10.1057\/9781137469960_11"},{"issue":"12","key":"key2022011705590041400_ref014","doi-asserted-by":"crossref","first-page":"2871","DOI":"10.1002\/asi.23567","article-title":"Teen online information disclosure: empirical testing of a protection motivation and social capital model","volume":"67","year":"2016","journal-title":"Journal of the Association for Information Science and Technology"},{"issue":"2","key":"key2022011705590041400_ref015","doi-asserted-by":"crossref","first-page":"279","DOI":"10.1108\/IntR-09-2013-0192","article-title":"Self-disclosure in social networking sites the role of perceived cost, perceived benefits and social influence","volume":"25","year":"2015","journal-title":"Internet Research"},{"issue":"10","key":"key2022011705590041400_ref016","doi-asserted-by":"publisher","first-page":"2079","DOI":"10.1002\/asi.21122","article-title":"Blogging, communication, and privacy management: development of the blogging privacy management measure","volume":"60","year":"2009","journal-title":"Journal of the American Society for Information Science and Technology"},{"key":"key2022011705590041400_ref017","unstructured":"China Internet Network Information Center (2020a), \u201cThe 2019 national survey report on minor Internet users\u201d, available at: https:\/\/www.cnnic.net.cn\/hlwfzyj\/hlwxzbg\/qsnbg\/202005\/P020200513370410784435.pdf (accessed 15 January 2021)."},{"key":"key2022011705590041400_ref018","unstructured":"China Internet Network Information Center (2020b), \u201cThe 46th statistical report on Internet development in China\u201d, available at: https:\/\/www.cnnic.net.cn\/hlwfzyj\/hlwxzbg\/hlwtjbg\/202009\/P020200929546215182514.pdf (accessed 15 January 2021)."},{"key":"key2022011705590041400_ref019","first-page":"503","article-title":"Networked privacy management in Facebook: a mixed-methods and multinational study","year":"2016"},{"issue":"3","key":"key2022011705590041400_ref020","doi-asserted-by":"publisher","first-page":"341","DOI":"10.1089\/cpb.2008.0226","article-title":"Information disclosure and control on Facebook: are they two sides of the same coin or two different processes?","volume":"12","year":"2009","journal-title":"CyberPsychology and Behavior"},{"issue":"2","key":"key2022011705590041400_ref021","doi-asserted-by":"publisher","first-page":"618","DOI":"10.1016\/j.jad.2013.07.007","article-title":"The parental overprotection scale: associations with child and parental anxiety","volume":"151","year":"2013","journal-title":"Journal of Affective Disorders"},{"issue":"5","key":"key2022011705590041400_ref022","first-page":"1","article-title":"An extended privacy calculus model for SNSs: analyzing self-disclosure and self-withdrawal in a representative US Sample","volume":"21","year":"2016","journal-title":"Journal of Computer-Mediated Communication"},{"issue":"3","key":"key2022011705590041400_ref023","doi-asserted-by":"publisher","first-page":"285","DOI":"10.1002\/ejsp.2049","article-title":"Is the privacy paradox a relic of the past? An in-depth analysis of privacy attitudes and privacy behaviors","volume":"45","year":"2015","journal-title":"European Journal of Social Psychology"},{"key":"key2022011705590041400_ref024","unstructured":"D\u00fcrager, A. and Livingstone, S. (2012), \u201cHow can parents support children's internet safety\u201d, available at: http:\/\/eprints.lse.ac.uk\/42872\/ (accessed 11 June 2021)."},{"issue":"1","key":"key2022011705590041400_ref025","doi-asserted-by":"crossref","first-page":"39","DOI":"10.1177\/002224378101800104","article-title":"Evaluating structural equation models with un- observable variables and measurement error","volume":"18","year":"1981","journal-title":"Journal of Marketing Research"},{"key":"key2022011705590041400_ref026","doi-asserted-by":"crossref","first-page":"2257","DOI":"10.1016\/j.chb.2013.05.006","article-title":"Friend or not to friend: coworker Facebook friend requests as an application of communication privacy management theory","volume":"29","year":"2013","journal-title":"Computers in Human Behavior"},{"key":"key2022011705590041400_ref027","volume-title":"Doing Research with Children: A Practical Guide","year":"2013","edition":"3rd ed."},{"key":"key2022011705590041400_ref028","unstructured":"Grusec, J. and Davidov, M. (2007), \u201cSocialization in the family: the roles of parents\u201d, in Joan, E., Grusec and Hastings, P.D. (Eds), Handbook of Socialization, The Guilford Press, New York, NY, pp. 284-308."},{"key":"key2022011705590041400_ref029","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/j.lrp.2013.01.001","article-title":"Partial least squares structural equation modelling: rigorous applications, better results and higher acceptance","volume":"46","year":"2013","journal-title":"Long Range Planning"},{"issue":"6","key":"key2022011705590041400_ref030","doi-asserted-by":"crossref","first-page":"813","DOI":"10.1177\/1461444812471814","article-title":"Peeling back the multiple layers of Twitter's private disclosure onion: the roles of virtual identity discrepancy and personality traits in communication privacy management on Twitter","volume":"15","year":"2013","journal-title":"New Media and Society"},{"key":"key2022011705590041400_ref031","volume-title":"TikTok Now Lets Parents Make Their Teens' Accounts More Private, a Parental Controls Update Adds New Search Restrictions, Too","year":"2020"},{"issue":"2","key":"key2022011705590041400_ref032","first-page":"229","article-title":"The co-evolution of two Chinese mobile short video apps: parallel platformization of Douyin and TikTok","volume":"9","year":"2020","journal-title":"Mobile Media and Communication"},{"issue":"4","key":"key2022011705590041400_ref033","doi-asserted-by":"crossref","first-page":"629","DOI":"10.1016\/j.adolescence.2013.03.016","article-title":"Cognitive, personality, and social factors associated with adolescents' online personal information disclosure","volume":"36","year":"2013","journal-title":"Journal of Adolescence"},{"issue":"4","key":"key2022011705590041400_ref034","doi-asserted-by":"crossref","first-page":"581","DOI":"10.1080\/08838150802437396","article-title":"Parental mediation of children's internet use","volume":"52","year":"2008","journal-title":"Journal of Broadcasting and Electronic Media"},{"key":"key2022011705590041400_ref035","unstructured":"Livingstone, S., Haddon, L., Vincent, J., Mascheroni, G. and Olafsson (2014), \u201cNet children go mobile: the UK report\u201d, available at: http:\/\/eprints.lse.ac.uk\/59098\/1\/__lse.ac.uk_storage_LIBRARY_Secondary_libfile_shared_repository_Content_Livingstone,%20S_EU%20Kids%20Online_Livingstone_Net_%20children_%20go_2014_Livingstone_Net_%20children_%20go_2014_author.pdf (accessed 11 June 2021)."},{"key":"key2022011705590041400_ref036","doi-asserted-by":"crossref","unstructured":"Lu, X. and Lu, Z. (2019), \u201cFifteen seconds of fame: a qualitative study of Douyin, A Short video sharing mobile application in China\u201d, in Meiselwitz, G. (Ed.), Social Computing and Social Media. Design, Human Behavior and Analytics. HCII 2019. Lecture Notes in Computer Science, Springer, Cham. doi: 10.1007\/978-3-030-21902-4_17.","DOI":"10.1007\/978-3-030-21902-4_17"},{"issue":"2","key":"key2022011705590041400_ref037","doi-asserted-by":"crossref","first-page":"205","DOI":"10.1016\/j.jretai.2008.04.004","article-title":"Protecting children's privacy online: how parental mediation strategies affect website safeguard effectiveness","volume":"84","year":"2008","journal-title":"Journal of Retailing"},{"issue":"7","key":"key2022011705590041400_ref038","doi-asserted-by":"crossref","first-page":"1051","DOI":"10.1177\/1461444814543995","article-title":"Networked privacy: how teenagers negotiate context in social media","volume":"16","year":"2014","journal-title":"New Media and Society"},{"key":"key2022011705590041400_ref039","doi-asserted-by":"crossref","unstructured":"Meral, K.Z. (2021), \u201cSocial media short video-sharing TikTok application and ethics: data privacy and addiction issues\u201d, in Taskiran, M.N. and Pinarbasi, F. (Eds), Multidisciplinary Approaches to Ethics in the Digital Era, IGI Global, pp. 147-165.","DOI":"10.4018\/978-1-7998-4117-3.ch010"},{"issue":"4","key":"key2022011705590041400_ref040","doi-asserted-by":"crossref","first-page":"387","DOI":"10.1089\/cpb.2009.0068","article-title":"Parental mediation, online activities, and cyberbullying","volume":"12","year":"2009","journal-title":"Cyberpsychology, Behavior, and Social Networking"},{"key":"key2022011705590041400_ref041","article-title":"Why free is too high a price for Facebook and google","year":"2019","journal-title":"Wall Street Journal"},{"issue":"4","key":"key2022011705590041400_ref042","doi-asserted-by":"crossref","first-page":"839","DOI":"10.1002\/asi.23206","article-title":"How are people enticed to disclose personal information despite privacy concerns in social network sites? The calculus between benefit and cost","volume":"66","year":"2015","journal-title":"Journal of the Association for Information Science and Technology"},{"issue":"6","key":"key2022011705590041400_ref043","doi-asserted-by":"publisher","first-page":"2366","DOI":"10.1016\/j.chb.2012.07.008","article-title":"Information privacy concerns, antecedents and privacy measure use in social networking sites: evidence from Malaysia","volume":"28","year":"2012","journal-title":"Computers in Human Behavior"},{"issue":"2","key":"key2022011705590041400_ref044","doi-asserted-by":"crossref","first-page":"161","DOI":"10.1023\/B:BUSI.0000035907.66617.f5","article-title":"Children and the changing world of advertising","volume":"52","year":"2004","journal-title":"Journal of Business Ethics"},{"issue":"1","key":"key2022011705590041400_ref045","doi-asserted-by":"crossref","first-page":"100","DOI":"10.1111\/j.1745-6606.2006.00070.x","article-title":"The privacy paradox\u202f: personal information disclosure intentions versus behaviors","volume":"41","year":"2007","journal-title":"Journal of Consumer Affairs"},{"issue":"4","key":"key2022011705590041400_ref046","doi-asserted-by":"publisher","first-page":"121","DOI":"10.3991\/IJIM.V14I04.12429","article-title":"Watch, share or create: the influence of personality traits and user motivation on TikTok mobile video usage","volume":"14","year":"2020","journal-title":"International Journal of Interactive Mobile Technologies"},{"key":"key2022011705590041400_ref047","doi-asserted-by":"publisher","first-page":"129","DOI":"10.1145\/642611.642635","article-title":"Unpacking \u2018privacy\u2019 for a networked world","year":"2003"},{"key":"key2022011705590041400_ref048","volume-title":"TikTok versus Snapchat: A Guide for Marketers","year":"2020"},{"issue":"3-4","key":"key2022011705590041400_ref049","doi-asserted-by":"crossref","first-page":"173","DOI":"10.1300\/J002v36n03_09","article-title":"Parent-youth relationships and the self-esteem of Chinese adolescents: collectivism versus individualism","volume":"36","year":"2005","journal-title":"Marriage and Family Review"},{"key":"key2022011705590041400_ref050","volume-title":"Boundaries of Privacy: Dialectics of Disclosure","year":"2002"},{"key":"key2022011705590041400_ref051","volume-title":"TikTok Passes Instagram as Second-Most Popular Social App for US Teens","year":"2020"},{"key":"key2022011705590041400_ref052","volume-title":"TikTok, a Chinese Video App, Brings Fun Back to Social Media","year":"2018"},{"key":"key2022011705590041400_ref053","doi-asserted-by":"crossref","first-page":"32","DOI":"10.1016\/j.chb.2013.12.025","article-title":"Parental mediation, peer norms and risky online behavior among adolescents","volume":"33","year":"2014","journal-title":"Computers in Human Behavior"},{"issue":"9","key":"key2022011705590041400_ref054","doi-asserted-by":"crossref","first-page":"578","DOI":"10.1089\/cyber.2014.0095","article-title":"Exploring the role of parents and peers in young adolescents' risk taking in social networking sites","volume":"17","year":"2014","journal-title":"Cyberpsychology, Behavior, and Social Networking"},{"key":"key2022011705590041400_ref055","doi-asserted-by":"crossref","first-page":"114","DOI":"10.1016\/j.chb.2015.07.062","article-title":"Adolescents' privacy concerns and information disclosure online: the role of parents and the Internet","volume":"54","year":"2016","journal-title":"Computers in Human Behavior"},{"key":"key2022011705590041400_ref056","volume-title":"Screen-Obsessed: Parenting in the Digital Age","year":"2019"},{"key":"key2022011705590041400_ref057","doi-asserted-by":"publisher","first-page":"1897","DOI":"10.1007\/s10639-020-10342-w","article-title":"Parental mediation of adolescent Internet use: combining strategies to promote awareness, autonomy and self-regulation in preparing youth for life on the web","volume":"26","year":"2020","journal-title":"Education and Information Technologies"},{"issue":"1","key":"key2022011705590041400_ref058","doi-asserted-by":"crossref","first-page":"65","DOI":"10.1080\/13676260903173462","article-title":"Value differences between generations in China: a study in Shanghai","volume":"13","year":"2010","journal-title":"Journal of Youth Studies"},{"key":"key2022011705590041400_ref059","doi-asserted-by":"publisher","first-page":"278","DOI":"10.1016\/j.chb.2015.06.006","article-title":"Location information disclosure in location-based social network services: privacy calculus, benefit structure, and gender differences","volume":"52","year":"2015","journal-title":"Computers in Human Behavior"},{"issue":"2","key":"key2022011705590041400_ref060","doi-asserted-by":"publisher","first-page":"248","DOI":"10.1111\/jcc4.12052","article-title":"The \u2018Privacy Paradox\u2019 in the social web: the impact of privacy concerns, individual characteristics, and the perceived social relevance on different forms of self-disclosure","volume":"19","year":"2014","journal-title":"Journal of Computer-Mediated Communication"},{"issue":"2","key":"key2022011705590041400_ref061","doi-asserted-by":"crossref","first-page":"160","DOI":"10.1177\/0038040715574779","article-title":"Divergent urban-rural trends in college attendance: state policy bias and structural exclusion in China","volume":"88","year":"2015","journal-title":"Sociology of Education"},{"key":"key2022011705590041400_ref062","volume-title":"Most Popular Categories on TikTok Worldwide 2020, by Hashtag Views","year":"2021"},{"issue":"4","key":"key2022011705590041400_ref063","doi-asserted-by":"crossref","first-page":"211","DOI":"10.1207\/S15327698JFC0104_01","article-title":"In words and deeds: parental involvement and mediation of children's television viewing","volume":"1","year":"2001","journal-title":"Journal of Family Communication"},{"key":"key2022011705590041400_ref064","article-title":"Research note: spreading hate on TikTok","year":"2020","journal-title":"Studies in Conflict and Terrorism"},{"issue":"2","key":"key2022011705590041400_ref065","doi-asserted-by":"publisher","first-page":"86","DOI":"10.1109\/MSP.2018.1870874","article-title":"The privacy paradox of adolescent online safety: a matter of risk prevention or risk resilience?","volume":"16","year":"2018","journal-title":"IEEE Security and Privacy"},{"key":"key2022011705590041400_ref066","first-page":"609","article-title":"Fighting for my space: coping mechanisms for SNS boundary regulation","year":"2012"},{"key":"key2022011705590041400_ref067","doi-asserted-by":"publisher","first-page":"302","DOI":"10.1145\/2675133.2675293","article-title":"\u2018Preventative\u2019 vs \u2018reactive\u2019: how parental mediation influences teens' social media privacy behaviors","year":"2015"},{"key":"key2022011705590041400_ref068","doi-asserted-by":"publisher","first-page":"3919","DOI":"10.1145\/2858036.2858317","article-title":"Dear diary: teens reflect on their weekly online risk experiences","year":"2016"},{"issue":"19","key":"key2022011705590041400_ref069","doi-asserted-by":"publisher","first-page":"6928","DOI":"10.1073\/pnas.1403158111","article-title":"Income inequality in today's China","volume":"111","year":"2014","journal-title":"Proceedings of the National Academy of Sciences"},{"issue":"6","key":"key2022011705590041400_ref070","first-page":"524","article-title":"Mainland Chinese parenting styles and parent-child interaction","volume":"29","year":"2005","journal-title":"International Journal of Behavioral Development"},{"issue":"12","key":"key2022011705590041400_ref071","doi-asserted-by":"crossref","first-page":"798","DOI":"10.17705\/1jais.00281","article-title":"Information privacy concerns: linking individual perceptions with institutional privacy assurances","volume":"12","year":"2011","journal-title":"Journal of the Association for Information Systems"},{"issue":"3","key":"key2022011705590041400_ref072","first-page":"362","article-title":"Parental influence and teens' attitude toward online privacy protection","volume":"43","year":"2008","journal-title":"Journal of Consumer Affairs"},{"issue":"3","key":"key2022011705590041400_ref073","doi-asserted-by":"crossref","first-page":"389","DOI":"10.1111\/j.1745-6606.2009.01146.x","article-title":"Determinants of online privacy concern and its influence on privacy protection behaviors among young adolescents","volume":"43","year":"2009","journal-title":"Journal of Consumer Affairs"},{"key":"key2022011705590041400_ref074","doi-asserted-by":"crossref","first-page":"30","DOI":"10.1016\/j.tele.2019.02.001","article-title":"Teens' responses to Facebook newsfeed advertising: the effects of cognitive appraisal and social influence on privacy concerns and coping strategies","volume":"38","year":"2019","journal-title":"Telematics and Informatics"},{"issue":"2","key":"key2022011705590041400_ref075","doi-asserted-by":"publisher","first-page":"219","DOI":"10.1177\/0163443720939452","article-title":"Infrastructuralization of Tik Tok: transformation, power relationships, and platformization of video entertainment in China","volume":"43","year":"2020","journal-title":"Media, Culture and Society"},{"issue":"3","key":"key2022011705590041400_ref076","doi-asserted-by":"publisher","first-page":"236","DOI":"10.1093\/jcmc\/zmaa004","article-title":"Privacy management and self-disclosure on social network sites: the moderating effects of stress and gender","volume":"25","year":"2020","journal-title":"Journal of Computer-Mediated Communication"},{"key":"key2022011705590041400_ref077","volume-title":"A Third of TikTok's US Users May Be 14 or under, Raising Safety Questions","year":"2020"}],"container-title":["Internet Research"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/INTR-01-2021-0005\/full\/xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/INTR-01-2021-0005\/full\/html","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,24]],"date-time":"2025-07-24T21:35:11Z","timestamp":1753392911000},"score":1,"resource":{"primary":{"URL":"http:\/\/www.emerald.com\/intr\/article\/32\/1\/312-334\/180256"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,7,16]]},"references-count":77,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2021,7,16]]},"published-print":{"date-parts":[[2022,1,18]]}},"alternative-id":["10.1108\/INTR-01-2021-0005"],"URL":"https:\/\/doi.org\/10.1108\/intr-01-2021-0005","relation":{},"ISSN":["1066-2243"],"issn-type":[{"value":"1066-2243","type":"print"}],"subject":[],"published":{"date-parts":[[2021,7,16]]}}}