{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,9]],"date-time":"2026-04-09T17:06:27Z","timestamp":1775754387714,"version":"3.50.1"},"reference-count":44,"publisher":"IEEE","license":[{"start":{"date-parts":[[2025,2,5]],"date-time":"2025-02-05T00:00:00Z","timestamp":1738713600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,2,5]],"date-time":"2025-02-05T00:00:00Z","timestamp":1738713600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025,2,5]]},"DOI":"10.1109\/icaic63015.2025.10848639","type":"proceedings-article","created":{"date-parts":[[2025,1,29]],"date-time":"2025-01-29T18:44:02Z","timestamp":1738176242000},"page":"1-10","source":"Crossref","is-referenced-by-count":7,"title":["Applying Communication Privacy Management Theory to Youth Privacy Management in AI Contexts"],"prefix":"10.1109","author":[{"given":"Molly","family":"Campbell","sequence":"first","affiliation":[{"name":"Vancouver Island University,Computer Science Department,Nanaimo,Canada"}]},{"given":"Sandhya","family":"Joshi","sequence":"additional","affiliation":[{"name":"Vancouver Island University,VIU Affiliate,Nanaimo,Canada"}]},{"given":"Ankur","family":"Barthwal","sequence":"additional","affiliation":[{"name":"Vancouver Island University,Computer Science Department,Nanaimo,Canada"}]},{"given":"Austin","family":"Shouli","sequence":"additional","affiliation":[{"name":"Vancouver Island University,Computer Science Department,Nanaimo,Canada"}]},{"given":"Ajay Kumar","family":"Shrestha","sequence":"additional","affiliation":[{"name":"Vancouver Island University,Computer Science Department,Nanaimo,Canada"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1001\/jamanetworkopen.2023.10659"},{"key":"ref2","article-title":"Navigating AI to unpack youth privacy concerns: An in-depth exploration and systematic review","volume-title":"2024 IEEE 15th Annual Information Technology, Electronics and Mobile Communication Conference (IEMCON)","author":"Shrestha"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1080\/0144929x.2024.2350666"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1353\/book4588"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1093\/acprof:oso\/9780195312805.003.0010"},{"key":"ref6","article-title":"Teens, social media and privacy","volume-title":"Pew Research Center","author":"Madden"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2015.07.025"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1177\/0093650211418338"},{"key":"ref9","first-page":"1","article-title":"Global kids online research synthesis, 2015-2016","author":"Byrne","year":"2016"},{"key":"ref10","article-title":"Young Canadians in a wired world, phase III: Life online","year":"2022"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1126\/science.aaa1465"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1207\/s15506878jobem4901_6"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1111\/j.1745-6606.2009.01146.x"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/985692.985752"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1057\/ejis.2013.17"},{"issue":"January","key":"ref16","first-page":"1","article-title":"Children\u2019s data and privacy online: Growing up in a digital age","author":"Stoilova","year":"2019","journal-title":"London School of Economics and Political Science."},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.4324\/9781003120827-18"},{"key":"ref18","article-title":"Social privacy in networked publics: Teens\u2019 attitudes, practices, and strategies","volume-title":"A Decade in Internet Time: Symposium on the Dynamics of the Internet and Society","author":"Marwick"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1177\/0894439318777706"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.2307\/41409971"},{"key":"ref21","article-title":"Examining the formation of individual\u2019s privacy concerns: Toward an integrative view","volume-title":"ICIS 2008 Proceedings","author":"Xu"},{"issue":"4","key":"ref22","first-page":"336","article-title":"Internet users\u2019 information privacy concerns (IUIPC): The construct, the scale, and a causal model","volume":"15","author":"Malhotra","year":"2004"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1080\/08838150802437396"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.28945\/1326"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1145\/293411.293475"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1287\/isre.1060.0080"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1177\/0149206314525202"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.5465\/AMR.1995.9508080335"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1111\/isj.12062"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1002\/dir.20009"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.2307\/41409969"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.2307\/25750704"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1002\/asi.20459"},{"key":"ref34","article-title":"Investigation of the privacy concerns in AI systems for young digital citizens: A comparative stakeholder analysis","volume-title":"2025 IEEE 15th Annual Computing and Communication Workshop and Conference (CCWC)","author":"Campbell"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/TPS-ISA48467.2019.00033"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1287\/isre.14.2.189.16018"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.7717\/peerj-cs.502"},{"key":"ref38","article-title":"A primer on partial least squares structural equation modeling (PLS-SEM)","author":"Hair"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.2753\/MTP1069-6679160402"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1108\/ebr-10-2013-0128"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1590\/S1807-76922012005000006"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.17705\/1CAIS.00407"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1016\/0022-1031(85)90017-4"},{"key":"ref44","article-title":"Toward ethical AI: A qualitative analysis of stakeholder perspectives","volume-title":"2025 IEEE 15th Annual Computing and Communication Workshop and Conference (CCWC)","author":"Shrestha"}],"event":{"name":"2025 IEEE 4th International Conference on AI in Cybersecurity (ICAIC)","location":"Houston, TX, USA","start":{"date-parts":[[2025,2,5]]},"end":{"date-parts":[[2025,2,7]]}},"container-title":["2025 IEEE 4th International Conference on AI in Cybersecurity (ICAIC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/10848546\/10848537\/10848639.pdf?arnumber=10848639","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,30]],"date-time":"2025-01-30T05:32:56Z","timestamp":1738215176000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10848639\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,2,5]]},"references-count":44,"URL":"https:\/\/doi.org\/10.1109\/icaic63015.2025.10848639","relation":{},"subject":[],"published":{"date-parts":[[2025,2,5]]}}}