Protecting adolescents from online safety risks is a major contemporary concern, and researching adolescent online safety is equally as challenging. Relatively few researchers have studied adolescent online safety, but the studies that do exist have documented threats from privacy breaches, cyberbullying, sexual predation, and other types of risk exposure. The grand challenge, however, is how we can approach these problems in a way that will protect adolescents while allowing them to engage socially online. We discuss two key challenges: operationalizing online safety; and defining online risks. We propose that Information Systems (IS) researchers should leverage family systems theory, a methodological approach grounded in developmental psy...
Alongside its many advantages, the Internet presents a variety of challenges and risks to adolescent...
The purpose of this study was to investigate if parental involvement in digital activities relates t...
The authors focus on identifying the psychological aspects of the problem of information security of...
Protecting adolescents from online safety risks is a major contemporary concern, and researching ado...
Teenagers are using the internet for a variety of social and identity-based activities, but in doing...
Although there is evidence that young people are tech-savvy with the know-how to keep themselves saf...
Background: Internet communication applications have become an important social context for the deve...
Today\u27s experts encourage serious conversations between parents and children about the risks of o...
This research analyzes the discrepancies respecting parents' and their children's perspectives on ad...
By taking a more \u27teen-centric\u27 instead of a \u27parent-centric\u27 approach to adolescent onl...
Item does not contain fulltextChildren’s engagement in risky online behavior—such as providing perso...
Περιέχει το πλήρες κείμενοThe purpose of this paper is to provide an overall insight into the factor...
Children’s engagement in risky online behavior—such as providing personal information or agreeing to...
Mobile technologies (e.g., smartphones and associated social media accessed through downloadable mob...
Mobile technologies (e.g., smartphones and associated social media accessed through downloadable mob...
Alongside its many advantages, the Internet presents a variety of challenges and risks to adolescent...
The purpose of this study was to investigate if parental involvement in digital activities relates t...
The authors focus on identifying the psychological aspects of the problem of information security of...
Protecting adolescents from online safety risks is a major contemporary concern, and researching ado...
Teenagers are using the internet for a variety of social and identity-based activities, but in doing...
Although there is evidence that young people are tech-savvy with the know-how to keep themselves saf...
Background: Internet communication applications have become an important social context for the deve...
Today\u27s experts encourage serious conversations between parents and children about the risks of o...
This research analyzes the discrepancies respecting parents' and their children's perspectives on ad...
By taking a more \u27teen-centric\u27 instead of a \u27parent-centric\u27 approach to adolescent onl...
Item does not contain fulltextChildren’s engagement in risky online behavior—such as providing perso...
Περιέχει το πλήρες κείμενοThe purpose of this paper is to provide an overall insight into the factor...
Children’s engagement in risky online behavior—such as providing personal information or agreeing to...
Mobile technologies (e.g., smartphones and associated social media accessed through downloadable mob...
Mobile technologies (e.g., smartphones and associated social media accessed through downloadable mob...
Alongside its many advantages, the Internet presents a variety of challenges and risks to adolescent...
The purpose of this study was to investigate if parental involvement in digital activities relates t...
The authors focus on identifying the psychological aspects of the problem of information security of...