{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,3,15]],"date-time":"2024-03-15T04:29:23Z","timestamp":1710476963297},"reference-count":62,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/legalcode"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2020]]},"DOI":"10.1109\/access.2020.3007141","type":"journal-article","created":{"date-parts":[[2020,7,6]],"date-time":"2020-07-06T20:36:23Z","timestamp":1594067783000},"page":"174375-174393","source":"Crossref","is-referenced-by-count":4,"title":["A Collaborative Method for Protecting Teens Against Online Predators Over Social Networks: A Behavioral Analysis"],"prefix":"10.1109","volume":"8","author":[{"ORCID":"http:\/\/orcid.org\/0000-0003-0381-706X","authenticated-orcid":false,"given":"Alia","family":"Samreen","sequence":"first","affiliation":[]},{"ORCID":"http:\/\/orcid.org\/0000-0003-2488-8043","authenticated-orcid":false,"given":"Adnan","family":"Ahmad","sequence":"additional","affiliation":[]},{"ORCID":"http:\/\/orcid.org\/0000-0002-2960-9632","authenticated-orcid":false,"given":"Furkh","family":"Zeshan","sequence":"additional","affiliation":[]},{"ORCID":"http:\/\/orcid.org\/0000-0002-3985-0948","authenticated-orcid":false,"given":"Farooq","family":"Ahmad","sequence":"additional","affiliation":[]},{"ORCID":"http:\/\/orcid.org\/0000-0003-1830-7388","authenticated-orcid":false,"given":"Sohaib","family":"Ahmed","sequence":"additional","affiliation":[]},{"ORCID":"http:\/\/orcid.org\/0000-0002-4414-6197","authenticated-orcid":false,"given":"Zuhaib Ashfaq","family":"Khan","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","first-page":"201","article-title":"Effective trust-aware e-learning recommender system based on learning styles and knowledge levels","volume":"16","author":"dwivedi","year":"2013","journal-title":"J Educ Technol Soc"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.5220\/0005477604240429"},{"key":"ref33","first-page":"77","article-title":"An integrated model for e-commerce adoption at the customer level with the impact of social commerce","volume":"10","author":"hajli","year":"2012","journal-title":"Int J Inf Manage Sci"},{"key":"ref32","first-page":"260","article-title":"Electronic commerce mashups: Combining applications to useful services for shoppers","author":"leitner","year":"2008","journal-title":"Proc Int Conf E-Commerce"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-44875-6_2"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1016\/j.intmar.2011.01.002"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-31965-5_68"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1046\/j.1360-3736.2003.00185.x"},{"key":"ref35","author":"morer","year":"2011","journal-title":"Towards and Inclusive Definition of E-Learning"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/CSAE.2012.6272853"},{"key":"ref60","year":"2019","journal-title":"USE questionnaire Usefulness satisfaction and ease of use"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.5116\/ijme.4dfb.8dfd"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1007\/s00038-012-0416-3"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/ICRIIS.2011.6125729"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/EUC.2011.73"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1016\/j.elerap.2011.07.003"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4419-6515-8"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/IAdCC.2013.6514270"},{"key":"ref20","first-page":"27","article-title":"Trust online: Young adults’ evaluation of Web content","volume":"4","author":"hargittai","year":"2010","journal-title":"Int J Commun"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/1556460.1556499"},{"key":"ref21","article-title":"Social media & mobile Internet use among teens and young adults. Millennials","author":"lenhart","year":"2010"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.5121\/ijasuc.2010.1301"},{"key":"ref23","article-title":"An explicit trust model towards better system security","author":"mark creado","year":"2014","journal-title":"arXiv 1403 0282"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/ICGCIoT.2015.7380706"},{"key":"ref25","year":"2020"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2009.263"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4419-6287-4_4"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1109\/5.24143"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1108\/14684520710832324"},{"key":"ref57","first-page":"433","article-title":"Protection of reputation versus freedom of expression: Striking a manageable compromise in the tort of defamation","volume":"63","author":"schaffner","year":"1989","journal-title":"S Cal L Rev"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2014.02.024"},{"key":"ref55","first-page":"253","article-title":"A review of online social networking profiles by adolescents: Implications for future research and intervention","volume":"43","author":"williams","year":"2008","journal-title":"ADOLESCENCE-SAN DIEGO-"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1108\/14684520910944427"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1001\/jama.300.10.1181"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1007\/s40815-017-0309-y"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1080\/13811110903044419"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1111\/j.1099-0860.2008.00157.x"},{"key":"ref40","first-page":"63","article-title":"Exploring e-learning effectiveness based on activity theory: An example of asynchronous distance learning","volume":"15","author":"hung","year":"2009","journal-title":"MIS REVIEW An International Journal"},{"key":"ref12","author":"feng","year":"2005","journal-title":"Choosing Online Partners in the Virtual World How Online Partners’ Characteristics Affect Online Dating"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.5204\/ijcjsd.v3i3.144"},{"key":"ref14","article-title":"How has Internet dating changed society? An insider’s look","author":"brooks","year":"2011"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1177\/0146167208318067"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.4324\/9781315636269"},{"key":"ref17","article-title":"Teens and mobile phones: Text messaging explodes as teens embrace it as the centerpiece of their communication strategies with friends","author":"lenhart","year":"2010"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1542\/peds.2011-0054"},{"key":"ref19","author":"boyd","year":"2008","journal-title":"Taken out of Context American Teen Sociality in Networked Publics"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2012.08.009"},{"key":"ref3","first-page":"5","article-title":"Data privacy as a civil right: The EU gets it","volume":"103","author":"ku","year":"2015","journal-title":"Kentucky Law Journal"},{"key":"ref6","article-title":"Emerging natural user interfaces in mobile computing: A bottoms-up survey","author":"shatilov","year":"2019","journal-title":"arXiv 1911 04794"},{"key":"ref5","author":"clement","year":"2020","journal-title":"Number of daily active Facebook users worldwide as of 1st Quarter 2020 Statista Com"},{"key":"ref8","first-page":"1","article-title":"Social media marketing: Advantages and disadvantages","author":"nadaraja","year":"2013"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1016\/j.bushor.2017.11.002"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1145\/2554850.2554878"},{"key":"ref9","author":"milam","year":"2020","journal-title":"The Absolute Craziest Deaths Caused By Social Media Rankers com"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1145\/1864708.1864736"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/CCNC.2018.8319278"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1145\/2501654.2501661"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1109\/ISI.2010.5484757"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/KIMAS.2005.1427054"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.4108\/ICST.MOBIQUITOUS2009.6828"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1108\/10662240910927849"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1007\/11962977_15"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6287639\/8948470\/09133402.pdf?arnumber=9133402","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,12,17]],"date-time":"2021-12-17T19:54:13Z","timestamp":1639770853000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9133402\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"references-count":62,"URL":"https:\/\/doi.org\/10.1109\/access.2020.3007141","relation":{},"ISSN":["2169-3536"],"issn-type":[{"value":"2169-3536","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020]]}}}