The boundaries between: Parental involvement in a teen's online world
暂无分享,去创建一个
Pamela J. Wisniewski | Mary Beth Rosson | John M. Carroll | Daniel F. Perkins | Lee B. Erickson | Heng Xu | M. Rosson | John Millar Carroll | Heng Xu | D. Perkins | P. Wisniewski
[1] Ralf De Wolf,et al. Managing privacy boundaries together: Exploring individual and group privacy management strategies in Facebook , 2014, Comput. Hum. Behav..
[2] J. Freedman,et al. Conceptions of Crowding. (Book Reviews: Crowding and Behavior; The Environment and Social Behavior. Privacy, Personal Space. Territory, Crowding) , 1975 .
[3] Jeffrey T. Child,et al. Blogging, communication, and privacy management: Development of the Blogging Privacy Management Measure , 2009, J. Assoc. Inf. Sci. Technol..
[4] Rutger C. M. E. Engels,et al. Keeping Secrets from Parents: Advantages and Disadvantages of Secrecy in Adolescence , 2002 .
[5] Sonia Livingstone,et al. Taking risky opportunities in youthful content creation: teenagers' use of social networking sites for intimacy, privacy and self-expression , 2008, New Media Soc..
[6] John Patrick Caughlin,et al. "I'd rather not talk about it": adolescents' and young adults' use of topic avoidance in stepfamilies , 2002 .
[7] Anthony D. Miyazaki,et al. Protecting children's privacy online: How parental mediation strategies affect website safeguard effectiveness , 2008 .
[8] I. Altman. Privacy Regulation: Culturally Universal or Culturally Specific? , 1977 .
[9] Eileen M. Trauth,et al. Understanding Computer-Mediated Discussions: Positivist and Interpretive Analyses of Group Support System Use , 2000, MIS Q..
[10] Karen Bradley. Internet lives: social context and moral domain in adolescent development. , 2005, New directions for youth development.
[11] Paul A. Watters,et al. Young people, child pornography, and subcultural norms on the Internet , 2013, J. Assoc. Inf. Sci. Technol..
[12] Al Salam,et al. Protecting Children Online: Exploring the Impact of an Online Identifier for Registered Sex Offenders on Adult Internet Users' Online Information Sharing Behaviors , 2012, AMCIS.
[13] Zanieb De Souza,et al. Information Disclosure by Children in Social Networking - And What do the Parents Know? , 2008, AMCIS.
[14] Sandra Petronio,et al. Privacy binds in family interactions: The case of parental privacy invasion. , 1994 .
[15] S. Livingstone,et al. Parental Mediation of Children's Internet Use , 2008 .
[16] Ronald J. Faber,et al. Tweens' Online Privacy Risks and the Role of Parental Mediation , 2012 .
[17] Shirley Gregor,et al. The Nature of Theory in Information Systems , 2006, MIS Q..
[18] Gustavo S. Mesch. Parental Mediation, Online Activities, and Cyberbullying , 2009, Cyberpsychology Behav. Soc. Netw..
[19] E. Guba,et al. Competing paradigms in qualitative research. , 1994 .
[20] S. Petronio. Brief Status Report on Communication Privacy Management Theory , 2013 .
[21] D. Baumrind,et al. Patterns of parental authority and adolescent autonomy. , 2005, New directions for child and adolescent development.
[22] D. Baumrind,et al. A developmental perspective on adolescent risk taking in contemporary America. , 1987, New directions for child development.
[23] Lada A. Adamic,et al. Families on Facebook , 2013, ICWSM.
[24] Jeffrey T. Child,et al. Blog scrubbing: Exploring triggers that change privacy rules , 2011, Comput. Hum. Behav..
[25] Michael D. Myers,et al. A Set of Principles for Conducting and Evaluating Interpretive Field Studies in Information Systems , 1999, MIS Q..
[26] S. Yardi,et al. Social media at the boundaries: supporting parents in managing youth's social media use , 2012 .
[27] S. Petronio. Communication Privacy Management Theory: What Do We Know About Family Privacy Regulation? , 2010 .
[28] Urs Gasser,et al. Teens, social media, and privacy , 2013 .
[29] Geoff Walsham,et al. Interpretive case studies in IS research: nature and method , 1995 .
[30] D. Boyd. Why Youth (Heart) Social Network Sites: The Role of Networked Publics in Teenage Social Life , 2007 .
[31] I. Altman. A Conceptual Analysis , 1976 .
[32] S. Petronio. Boundaries of Privacy: Dialectics of Disclosure , 2002 .
[33] Pamela J. Wisniewski,et al. Adolescent online safety: the "moral" of the story , 2014, CSCW.
[34] Emma Sorbring,et al. Mothers’ and fathers’ insights into teenagers’ use of the internet , 2012, New Media Soc..
[35] Brian O'Neill,et al. Towards a better internet for children: findings and recommendations from EU Kids Online to inform the CEO coalition , 2012 .
[36] V. Derlega,et al. Privacy and self-disclosure in social relationships. , 1977 .
[37] N. Hoffart. Basics of Qualitative Research: Techniques and Procedures for Developing Grounded Theory , 2000 .
[38] R. Laufer,et al. Privacy as a Concept and a Social Issue: A Multidimensional Developmental Theory , 1977 .
[39] I. Altman. Privacy: A Conceptual Analysis. , 1976 .
[40] Skyler T. Hawk,et al. Adolescents' Perceptions of Privacy Invasion in Reaction to Parental Solicitation and Control , 2008 .
[41] Blase Ur,et al. Parents' and Teens' Perspectives on Privacy In a Technology-Filled World , 2014, SOUPS.
[42] Alan Borning,et al. Parenting from the pocket: value tensions and technical directions for secure and private parent-teen mobile safety , 2010, SOUPS.
[43] June Ahn,et al. The effect of social network sites on adolescents' social and academic development: Current theories and controversies , 2011, J. Assoc. Inf. Sci. Technol..
[44] Larry D. Rosen,et al. The association of parenting style and child age with parental limit setting and adolescent MySpace behavior , 2008 .
[45] Lois Ann Scheidt,et al. It’s Complicated: The Social Lives of Networked Teens , 2015, New Media Soc..
[46] Louis Leung,et al. The influences of information literacy, internet addiction and parenting styles on internet risks , 2012, New Media Soc..
[47] Angie Williams,et al. Adolescents' Relationships With Parents , 2003 .
[48] June Abbas,et al. High school seniors' social network and other ICT use preferences and concerns , 2010, ASIST.
[49] Jeffrey T. Child,et al. Let's Be Facebook Friends: Exploring Parental Facebook Friend Requests from a Communication Privacy Management (CPM) Perspective , 2013 .
[50] W. Andrew Collins,et al. Conflict Processes and Transitions in Parent and Peer Relationships , 1997, Journal of adolescent research.
[51] Paul M. Haridakis,et al. Blogging privacy rule orientations, privacy management, and content deletion practices: The variability of online privacy management activity at different stages of social media use , 2012, Comput. Hum. Behav..
[52] F. Çok,et al. Motives for risk-taking in adolescence: a cross-cultural study. , 2009, Journal of adolescence.
[53] June Abbas,et al. Relationships and social rules: Teens' social network and other ICT selection practices , 2012, J. Assoc. Inf. Sci. Technol..
[54] Kimberly A. Patton. Teens and Technology , 2011 .
[55] Michael D. Myers,et al. The qualitative interview in IS research: Examining the craft , 2007, Inf. Organ..
[56] V. Braun,et al. Using thematic analysis in psychology , 2006 .
[57] M. D. Myers,et al. Qualitative Research in Business & Management , 2008 .
[58] K. Eisenhardt. Building theories from case study research , 1989, STUDI ORGANIZZATIVI.