{"id":"https://openalex.org/W3120580625","doi":"https://doi.org/10.1108/ics-07-2020-0115","title":"The \u201cthree M\u2019s\u201d counter-measures to children\u2019s risky online behaviors: mentor, mitigate and monitor","display_name":"The \u201cthree M\u2019s\u201d counter-measures to children\u2019s risky online behaviors: mentor, mitigate and monitor","publication_year":2021,"publication_date":"2021-06-08","ids":{"openalex":"https://openalex.org/W3120580625","doi":"https://doi.org/10.1108/ics-07-2020-0115","mag":"3120580625"},"language":"en","primary_location":{"id":"pmh:oai:rke.abertay.ac.uk:publications/0e098140-0875-45c2-8860-226a8173dac5","is_oa":true,"landing_page_url":"https://rke.abertay.ac.uk/en/publications/0e098140-0875-45c2-8860-226a8173dac5","pdf_url":"https://rke.abertay.ac.uk/en/publications/0e098140-0875-45c2-8860-226a8173dac5","source":{"id":"https://openalex.org/S4306402526","display_name":"Abertay Research Portal (Abertay University)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I877506347","host_organization_name":"Abertay University","host_organization_lineage":["https://openalex.org/I877506347"],"host_organization_lineage_names":[],"type":"repository"},"license":"other-oa","license_id":"https://openalex.org/licenses/other-oa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Renaud , K &amp; Prior , S 2021 , ' The \u201cthree M\u2019s\u201d counter-measures to children\u2019s risky online behaviors : mentor, mitigate and monitor ' , Information and Computer Security , vol. 29 , no. 3 , pp. 526-557 . https://doi.org/10.1108/ICS-07-2020-0115","raw_type":"article"},"type":"article","indexed_in":[],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://rke.abertay.ac.uk/en/publications/0e098140-0875-45c2-8860-226a8173dac5","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5035796880","display_name":"Karen Renaud","orcid":"https://orcid.org/0000-0002-7187-6531"},"institutions":[{"id":"https://openalex.org/I165390105","display_name":"University of South Africa","ror":"https://ror.org/048cwvf49","country_code":"ZA","type":"education","lineage":["https://openalex.org/I165390105"]},{"id":"https://openalex.org/I181647926","display_name":"University of Strathclyde","ror":"https://ror.org/00n3w3b69","country_code":"GB","type":"education","lineage":["https://openalex.org/I181647926"]},{"id":"https://openalex.org/I203238179","display_name":"Rhodes University","ror":"https://ror.org/016sewp10","country_code":"ZA","type":"education","lineage":["https://openalex.org/I203238179"]}],"countries":["GB","ZA"],"is_corresponding":true,"raw_author_name":"Karen Renaud","raw_affiliation_strings":["Rhodes University","University of South Africa","University of Strathclyde"],"raw_orcid":"https://orcid.org/0000-0002-7187-6531","affiliations":[{"raw_affiliation_string":"Rhodes University","institution_ids":["https://openalex.org/I203238179"]},{"raw_affiliation_string":"University of South Africa","institution_ids":["https://openalex.org/I165390105"]},{"raw_affiliation_string":"University of Strathclyde","institution_ids":["https://openalex.org/I181647926"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5074965113","display_name":"Suzanne Prior","orcid":"https://orcid.org/0000-0002-0407-7019"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Suzanne Prior","raw_affiliation_strings":["SDI - Cyber Security"],"raw_orcid":"https://orcid.org/0000-0002-0407-7019","affiliations":[{"raw_affiliation_string":"SDI - Cyber Security","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5035796880"],"corresponding_institution_ids":["https://openalex.org/I165390105","https://openalex.org/I181647926","https://openalex.org/I203238179"],"apc_list":null,"apc_paid":null,"fwci":1.4194,"has_fulltext":true,"cited_by_count":4,"citation_normalized_percentile":{"value":0.82930796,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":96},"biblio":{"volume":"29","issue":"3","first_page":"526","last_page":"557"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12060","display_name":"Child Development and Digital Technology","score":0.9933000206947327,"subfield":{"id":"https://openalex.org/subfields/3304","display_name":"Education"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},"topics":[{"id":"https://openalex.org/T12060","display_name":"Child Development and Digital Technology","score":0.9933000206947327,"subfield":{"id":"https://openalex.org/subfields/3304","display_name":"Education"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T10355","display_name":"Impact of Technology on Adolescents","score":0.9914000034332275,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T11519","display_name":"Digital Mental Health Interventions","score":0.9629999995231628,"subfield":{"id":"https://openalex.org/subfields/3202","display_name":"Applied Psychology"},"field":{"id":"https://openalex.org/fields/32","display_name":"Psychology"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/globe","display_name":"Globe","score":0.6435614228248596},{"id":"https://openalex.org/keywords/internet-privacy","display_name":"Internet privacy","score":0.586995005607605},{"id":"https://openalex.org/keywords/clarity","display_name":"CLARITY","score":0.5731791853904724},{"id":"https://openalex.org/keywords/conflation","display_name":"Conflation","score":0.5547180771827698},{"id":"https://openalex.org/keywords/resource","display_name":"Resource (disambiguation)","score":0.5399736166000366},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.5084801912307739},{"id":"https://openalex.org/keywords/variety","display_name":"Variety (cybernetics)","score":0.4453088045120239},{"id":"https://openalex.org/keywords/psychology","display_name":"Psychology","score":0.4104154109954834},{"id":"https://openalex.org/keywords/public-relations","display_name":"Public relations","score":0.40676257014274597},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3967936038970947},{"id":"https://openalex.org/keywords/business","display_name":"Business","score":0.34757000207901},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.32356441020965576},{"id":"https://openalex.org/keywords/political-science","display_name":"Political science","score":0.19757157564163208},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.17473486065864563}],"concepts":[{"id":"https://openalex.org/C2775899829","wikidata":"https://www.wikidata.org/wiki/Q3109007","display_name":"Globe","level":2,"score":0.6435614228248596},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.586995005607605},{"id":"https://openalex.org/C2777146004","wikidata":"https://www.wikidata.org/wiki/Q14949826","display_name":"CLARITY","level":2,"score":0.5731791853904724},{"id":"https://openalex.org/C130440534","wikidata":"https://www.wikidata.org/wiki/Q14946528","display_name":"Conflation","level":2,"score":0.5547180771827698},{"id":"https://openalex.org/C206345919","wikidata":"https://www.wikidata.org/wiki/Q20380951","display_name":"Resource (disambiguation)","level":2,"score":0.5399736166000366},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.5084801912307739},{"id":"https://openalex.org/C136197465","wikidata":"https://www.wikidata.org/wiki/Q1729295","display_name":"Variety (cybernetics)","level":2,"score":0.4453088045120239},{"id":"https://openalex.org/C15744967","wikidata":"https://www.wikidata.org/wiki/Q9418","display_name":"Psychology","level":0,"score":0.4104154109954834},{"id":"https://openalex.org/C39549134","wikidata":"https://www.wikidata.org/wiki/Q133080","display_name":"Public relations","level":1,"score":0.40676257014274597},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3967936038970947},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.34757000207901},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.32356441020965576},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.19757157564163208},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.17473486065864563},{"id":"https://openalex.org/C185592680","wikidata":"https://www.wikidata.org/wiki/Q2329","display_name":"Chemistry","level":0,"score":0.0},{"id":"https://openalex.org/C111472728","wikidata":"https://www.wikidata.org/wiki/Q9471","display_name":"Epistemology","level":1,"score":0.0},{"id":"https://openalex.org/C169760540","wikidata":"https://www.wikidata.org/wiki/Q207011","display_name":"Neuroscience","level":1,"score":0.0},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.0},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.0},{"id":"https://openalex.org/C55493867","wikidata":"https://www.wikidata.org/wiki/Q7094","display_name":"Biochemistry","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"pmh:oai:rke.abertay.ac.uk:publications/0e098140-0875-45c2-8860-226a8173dac5","is_oa":true,"landing_page_url":"https://rke.abertay.ac.uk/en/publications/0e098140-0875-45c2-8860-226a8173dac5","pdf_url":"https://rke.abertay.ac.uk/en/publications/0e098140-0875-45c2-8860-226a8173dac5","source":{"id":"https://openalex.org/S4306402526","display_name":"Abertay Research Portal (Abertay University)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I877506347","host_organization_name":"Abertay University","host_organization_lineage":["https://openalex.org/I877506347"],"host_organization_lineage_names":[],"type":"repository"},"license":"other-oa","license_id":"https://openalex.org/licenses/other-oa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Renaud , K &amp; Prior , S 2021 , ' The \u201cthree M\u2019s\u201d counter-measures to children\u2019s risky online behaviors : mentor, mitigate and monitor ' , Information and Computer Security , vol. 29 , no. 3 , pp. 526-557 . https://doi.org/10.1108/ICS-07-2020-0115","raw_type":"article"},{"id":"mag:3120580625","is_oa":false,"landing_page_url":"https://dblp.uni-trier.de/db/journals/imcs/imcs29.html#RenaudP21","pdf_url":null,"source":{"id":"https://openalex.org/S4210195545","display_name":"Information and Computer Security","issn_l":"2056-4961","issn":["2056-4961","2056-497X"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319811","host_organization_name":"Emerald Publishing Limited","host_organization_lineage":["https://openalex.org/P4310319811"],"host_organization_lineage_names":["Emerald Publishing Limited"],"type":"journal"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":null,"raw_source_name":"Information and Computer Security","raw_type":null}],"best_oa_location":{"id":"pmh:oai:rke.abertay.ac.uk:publications/0e098140-0875-45c2-8860-226a8173dac5","is_oa":true,"landing_page_url":"https://rke.abertay.ac.uk/en/publications/0e098140-0875-45c2-8860-226a8173dac5","pdf_url":"https://rke.abertay.ac.uk/en/publications/0e098140-0875-45c2-8860-226a8173dac5","source":{"id":"https://openalex.org/S4306402526","display_name":"Abertay Research Portal (Abertay University)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I877506347","host_organization_name":"Abertay University","host_organization_lineage":["https://openalex.org/I877506347"],"host_organization_lineage_names":[],"type":"repository"},"license":"other-oa","license_id":"https://openalex.org/licenses/other-oa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Renaud , K &amp; Prior , S 2021 , ' The \u201cthree M\u2019s\u201d counter-measures to children\u2019s risky online behaviors : mentor, mitigate and monitor ' , Information and Computer Security , vol. 29 , no. 3 , pp. 526-557 . https://doi.org/10.1108/ICS-07-2020-0115","raw_type":"article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W3120580625.pdf"},"referenced_works_count":63,"referenced_works":["https://openalex.org/W39194978","https://openalex.org/W47498180","https://openalex.org/W173041835","https://openalex.org/W1229087846","https://openalex.org/W1509785886","https://openalex.org/W1510426010","https://openalex.org/W1525778942","https://openalex.org/W1551762230","https://openalex.org/W1737811870","https://openalex.org/W1916175779","https://openalex.org/W1984496015","https://openalex.org/W1996485725","https://openalex.org/W2004184632","https://openalex.org/W2015966886","https://openalex.org/W2031392157","https://openalex.org/W2046584031","https://openalex.org/W2078226413","https://openalex.org/W2099639539","https://openalex.org/W2110049365","https://openalex.org/W2111093787","https://openalex.org/W2124100166","https://openalex.org/W2125036394","https://openalex.org/W2138199375","https://openalex.org/W2140767054","https://openalex.org/W2146773166","https://openalex.org/W2149562789","https://openalex.org/W2150273139","https://openalex.org/W2151299531","https://openalex.org/W2157687596","https://openalex.org/W2345553623","https://openalex.org/W2412165429","https://openalex.org/W2474343775","https://openalex.org/W2487523146","https://openalex.org/W2490684596","https://openalex.org/W2499788830","https://openalex.org/W2503241677","https://openalex.org/W2509228054","https://openalex.org/W2528003776","https://openalex.org/W2550626052","https://openalex.org/W2554764394","https://openalex.org/W2557019892","https://openalex.org/W2558710894","https://openalex.org/W2559193040","https://openalex.org/W2604387072","https://openalex.org/W2605405874","https://openalex.org/W2611888395","https://openalex.org/W2617162905","https://openalex.org/W2752543279","https://openalex.org/W2760898139","https://openalex.org/W2767736468","https://openalex.org/W2771002167","https://openalex.org/W2788824161","https://openalex.org/W2883504028","https://openalex.org/W2902570269","https://openalex.org/W2905639740","https://openalex.org/W2955847201","https://openalex.org/W2966617333","https://openalex.org/W2971438575","https://openalex.org/W2975356441","https://openalex.org/W2978917679","https://openalex.org/W3004537598","https://openalex.org/W3011958014","https://openalex.org/W3089287372"],"related_works":["https://openalex.org/W2972567677","https://openalex.org/W3011959694","https://openalex.org/W2942013425","https://openalex.org/W2557019892","https://openalex.org/W2019187716","https://openalex.org/W2537277458","https://openalex.org/W1487556483","https://openalex.org/W4940255","https://openalex.org/W3210695009","https://openalex.org/W1902940358","https://openalex.org/W2170817288","https://openalex.org/W3119535378","https://openalex.org/W86781904","https://openalex.org/W3040424590","https://openalex.org/W2096024217","https://openalex.org/W3172305502","https://openalex.org/W3207564644","https://openalex.org/W2998569615","https://openalex.org/W3131636211","https://openalex.org/W2904195567"],"abstract_inverted_index":{"The":[0,186],"purpose":[1],"of":[2,10,26,49,56,83,105,121,127,152,182,198,275],"this":[3,27,100,113,192,245],"paper":[4],"is":[5,218,223,229],"to":[6,15,20,29,45,93,123,139,149,161,166,191,209,237,250,280],"scope":[7],"the":[8,23,47,54,72,76,89,102,118,133,162,204,221,227,241,251,258,282],"field":[9],"child-related":[11],"online":[12,91],"harms":[13,79,183],"and":[14,31,42,53,64,87,97,107,112,159,176,184,214,231,262,271],"produce":[16],"a":[17,67,81,136,179,263],"resource":[18,137,145,187,265],"pack":[19,138,146,188,266],"communicate":[21],"all":[22,195],"different":[24,111,224],"dimensions":[25],"domain":[28,193],"teachers":[30,41,65],"carers.,With":[32],"children":[33],"increasingly":[34],"operating":[35],"as":[36,169],"independent":[37],"agents":[38],"online,":[39],"their":[40,50,95],"carers":[43,272],"need":[44,134],"understand":[46],"risks":[48],"new":[51],"playground":[52],"range":[55,120,181],"risk":[57],"management":[58],"strategies":[59],"they":[60,277],"can":[61,268,278],"deploy.":[62],"Carers":[63],"play":[66],"prominent":[68],"role":[69],"in":[70,203,212,273],"applying":[71],"three":[73,156],"M\u2019s:":[74],"mentoring":[75],"child,":[77],"mitigating":[78],"using":[80],"variety":[82],"technologies":[84],"(where":[85],"possible)":[86],"monitoring":[88],"child\u2019s":[90],"activities":[92],"ensure":[94],"cybersecurity":[96],"cybersafety.":[98],"In":[99],"space,":[101],"core":[103,128],"concepts":[104],"\u201ccybersafety\u201d":[106],"\u201ccybersecurity\u201d":[108],"are":[109,235],"substantively":[110],"should":[114],"be":[115,124,167,238],"acknowledged":[116],"for":[117,135,155,194],"full":[119],"counter-measures":[122],"appreciated.":[125],"Evidence":[126],"concept":[129,174],"conflation":[130],"emerged,":[131],"confirming":[132],"improve":[140],"comprehension.":[141],"A":[142],"carefully":[143],"crafted":[144],"was":[147,207],"developed":[148],"convey":[150],"knowledge":[151],"risky":[153,233],"behaviors":[154,234],"age":[157],"groups":[158],"mapped":[160],"appropriate":[163],"\u201cthree":[164],"M\u2019s\u201d":[165,260],"used":[168],"counter-measures.,The":[170],"investigation":[171,206],"revealed":[172],"key":[173],"conflation,":[175],"then":[177],"identified":[178],"wide":[180],"countermeasures.":[185],"brings":[189],"clarity":[190],"stakeholders.,The":[196],"number":[197],"people":[199],"who":[200],"were":[201],"involved":[202],"empirical":[205],"limited":[208],"those":[210],"living":[211],"Scotland":[213],"Nigeria,":[215],"but":[216,247],"it":[217],"unlikely":[219],"that":[220,267],"situation":[222],"elsewhere":[225],"because":[226],"internet":[228],"global":[230],"children\u2019s":[232],"likely":[236],"similar":[239],"across":[240],"globe.,Others":[242],"have":[243],"investigated":[244],"domain,":[246],"no":[248],"one,":[249],"authors\u2019":[252],"knowledge,":[253],"has":[254],"come":[255],"up":[256],"with":[257],"\u201cThree":[259],"formulation":[261],"visualization-based":[264],"inform":[269],"educators":[270],"terms":[274],"actions":[276],"take":[279],"address":[281],"harms.":[283]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":1},{"year":2023,"cited_by_count":2}],"updated_date":"2026-04-28T14:05:53.105641","created_date":"2025-10-10T00:00:00"}
