Experts ’ Views on Digital Parenting Strategies
暂无分享,去创建一个
Lorrie Faith Cranor | Julie S. Downs | L. Cranor | J. Downs | A. Marsh | Abigail Marsh | Mary March | Maria Fátima Pombo March
[1] Sandra Petronio,et al. Privacy binds in family interactions: The case of parental privacy invasion. , 1994 .
[2] L. Cottrell,et al. But I Trust My Teen: Parents' Attitudes and Response to a Parental Monitoring Intervention , 2012, AIDS research and treatment.
[3] S. Livingstone,et al. Regulating the internet at home: contrasting the perspectives of children and parents , 2006 .
[4] Margaret K. Nelson,et al. Parenting Out of Control: Anxious Parents in Uncertain Times , 2010 .
[5] Zahra Ashktorab,et al. Designing Cyberbullying Mitigation and Prevention Solutions through Participatory Design With Teenagers , 2016, CHI.
[6] Gerjo Kok,et al. Threatening communication: a critical re-analysis and a revised meta-analytic test of fear appeal theory , 2013, Health psychology review.
[7] Lorrie Faith Cranor,et al. Behavioral response to phishing risk , 2007, eCrime '07.
[8] Christian Sandvig,et al. When Should We Use Real Names in Published Accounts of Internet Research , 2016 .
[9] Priscilla M. Regan,et al. Kids R Us: Online Social Networking and the Potential for Empowerment , 2010 .
[10] Pamela J. Wisniewski,et al. Resilience Mitigates the Negative Effects of Adolescent Internet Addiction and Online Risk Exposure , 2015, CHI.
[11] Lois Ann Scheidt,et al. It’s Complicated: The Social Lives of Networked Teens , 2015, New Media Soc..
[12] Julie S. Downs,et al. Prescriptive scientific narratives for communicating usable science , 2014, Proceedings of the National Academy of Sciences.
[13] Pamela J. Wisniewski,et al. Risk-taking as a Learning Process for Shaping Teen's Online Information Privacy Behaviors , 2015, CSCW.
[14] Alice E. Marwick,et al. Youth, privacy and reputation , 2010 .
[15] Danah Boyd,et al. Networked privacy: How teenagers negotiate context in social media , 2014, New Media Soc..
[16] Tehila Minkus,et al. Children Seen But Not Heard: When Parents Compromise Children's Online Privacy , 2015, WWW.
[17] Pamela J. Wisniewski,et al. Dear Diary: Teens Reflect on Their Weekly Online Risk Experiences , 2016, CHI.
[18] Lorrie Faith Cranor,et al. Decision strategies and susceptibility to phishing , 2006, SOUPS '06.
[19] V. Steeves,et al. Fixing Broken Doors: Strategies for Drafting Privacy Policies Young People Can Understand , 2010 .
[20] Loes Keijsers,et al. Mind your own business! Longitudinal relations between perceived privacy invasion and adolescent-parent conflict. , 2009, Journal of family psychology : JFP : journal of the Division of Family Psychology of the American Psychological Association.
[21] J. Smetana. “It’s 10 O’Clock: Do You Know Where Your Children Are?” Recent Advances in Understanding Parental Monitoring and Adolescents’ Information Management , 2008 .
[22] Pamela J. Wisniewski,et al. Adolescent online safety: the "moral" of the story , 2014, CSCW.
[23] Alice E. Marwick,et al. ‘It's just drama’: teen perspectives on conflict and aggression in a networked era , 2014 .
[24] E. Englander. Low Risk Associated with Most Teenage Sexting: A Study of 617 18-Year-Olds , 2012 .
[25] A. Tversky,et al. Judgment under Uncertainty: Heuristics and Biases , 1974, Science.
[26] Blase Ur,et al. Parents' and Teens' Perspectives on Privacy In a Technology-Filled World , 2014, SOUPS.
[27] Urs Gasser,et al. Teens, social media, and privacy , 2013 .
[28] Kevin J. Calderwood. Digital research confidential: The secrets of studying behavior online , 2016, New Media Soc..
[29] Tawfiq Ammari,et al. Accessing Social Support and Overcoming Judgment on Social Media among Parents of Children with Special Needs , 2014, ICWSM.
[30] S. Schoenebeck. The Secret Life of Online Moms: Anonymity and Disinhibition on YouBeMom.com , 2013, ICWSM.
[31] Amy Bruckman,et al. Social and technical challenges in parenting teens' social media use , 2011, CHI.
[32] Pamela J. Wisniewski,et al. "Preventative" vs. "Reactive": How Parental Mediation Influences Teens' Social Media Privacy Behaviors , 2015, CSCW.
[33] Kim Witte,et al. Fear as motivator, fear as inhibitor: Using the extended parallel process model to explain fear appeal successes and failures. , 1996 .