Adolescents and pornography: A review of 20 years of research

J Peter, PM Valkenburg - The Journal of Sex Research, 2016 - Taylor & Francis
The goal of this review was to systematize empirical research that was published in peer-
reviewed English-language journals between 1995 and 2015 on the prevalence, predictors …

[HTML][HTML] Social media and adolescent well-being in the Global South

S Ghai, L Magis-Weinberg, M Stoilova… - Current Opinion in …, 2022 - Elsevier
Despite the rapid proliferation of digital technologies in the Global South, most academic
research on social media and adolescent well-being has primarily focused on the Global …

Information security policy compliance model in organizations

NS Safa, R Von Solms, S Furnell - Computers & security, 2016 - Elsevier
The Internet and information technology have influenced human life significantly. However,
information security is still an important concern for both users and organizations …

Surveying pornography use: A shaky science resting on poor measurement foundations

T Kohut, RN Balzarini, WA Fisher… - The Journal of Sex …, 2020 - Taylor & Francis
ABSTRACT A great deal of pornography research relies on dubious measurements.
Measurement of pornography use has been highly variable across studies and existing …

The impact of internet pornography on adolescents: A review of the research

EW Owens, RJ Behun, JC Manning… - Sexual Addiction & …, 2012 - Taylor & Francis
The recent proliferation of Internet-enabled technology has significantly changed the way
adolescents encounter and consume sexually explicit material. Once confined to a personal …

[КНИГА][B] Digital youth: The role of media in development

K Subrahmanyam, D Šmahel - 2011 - Springer
Youth around the world are fittingly described as digital natives because of their comfort and
skill with technological hardware and content. Recent studies indicate that an overwhelming …

Understanding the violation of IS security policy in organizations: An integrated model based on social control and deterrence theory

L Cheng, Y Li, W Li, E Holm, Q Zhai - Computers & Security, 2013 - Elsevier
It is widely agreed that a large amount of information systems (IS) security incidents occur in
the workplace because employees subvert existing IS Security Policy (ISSP). In order to …

Cyberbullying and self-esteem: An Italian study

AL Palermiti, R Servidio, MG Bartolo… - Computers in Human …, 2017 - Elsevier
In this study, the cyberbullying risk related to self-esteem, social, and personal variables was
investigated. Cyberbullying describes a pervasive form of aggressive behaviour aimed at …

Motivation and opportunity based model to reduce information security insider threats in organisations

NS Safa, C Maple, T Watson, R Von Solms - Journal of information security …, 2018 - Elsevier
Abstract Information technology has brought with it many advantages for organisations, but
information security is still a major concern for organisations which rely on such technology …

What matters: Quantity or quality of pornography use? Psychological and behavioral factors of seeking treatment for problematic pornography use

M Gola, K Lewczuk, M Skorko - The journal of sexual medicine, 2016 - academic.oup.com
Introduction Pornography has become popular with Internet technology. For most people,
pornography use (PU) is entertainment; for some, it can result in seeking treatment for out-of …