909
Views
10
CrossRef citations to date
0
Altmetric
Articles

Positive Youth Development and Foster Care Youth: A Digital Perspective

&

REFERENCES

  • Allison, S., Bauermeister, J. A., Bull, S., Lightfoot, M., Mustanski, B., Shegog, R., & Levine, D. (2012). The intersection of youth, technology, and new media with sexual health: Moving the research agenda forward. Journal of Adolescent Health, 51, 207–212.
  • Amichai-Hamburger, Y. (2013). Youth Internet and wellbeing. Computers in Human Behavior, 29, 1–2.
  • Anderson-Butcher, D., Lesseigne, A., Ball, A., Brzozowski, M., Lehnert, M., & McCormick, B. L. (2010). Adolescent weblog use: Risky or protective? Child and Adolescent Social Work Journal, 27, 63–77.
  • Bauer, S., & Moessner, M. (2013). Harnessing the power of technology for the treatment and prevention of eating disorders. International Journal of Eating Disorders, 46, 508–515.
  • Bers, M. U. (2010). Beyond computer literacy: Supporting youth’s positive development through technology. New Directions for Youth Development, 128, 13–23.
  • Billieux, J., Van der Linden, M., Achab, S., Khazaal, Y., Paraskevoupoulos, L., Zullino, D., & Thorens, G. (2013). Why do you play World of Warcraft? An in-depth exploration of self-reported motivations to play online and in-game behaviours in the virtual world of Azeroth. Computers in Human Behavior, 29, 103–109.
  • boyd, d. (2014). It’s complicated. New Haven, CT: Yale University Press. Retrieved from http://www.danah.org/books/ItsComplicated.pdf.
  • Brink, A., & Wissing, M. P. (2013). Towards a theory-based positive youth development programme. Journal of Child & Adolescent Mental Health, 25, 7–22.
  • Byrne, S., & Lee, T. (2011). Toward predicting youth resistance to Internet risk prevention strategies. Journal of Broadcasting and Electronic Media, 55, 90–113.
  • Child Welfare Information Gateway. (2013). Social media: Tips for youth in foster care. Washington, DC: U.S. Department of Health and Human Services, Children’s Bureau.
  • Dolev-Cohen, M., & Barak, A. (2013). Adolescents’s use of Instant Messaging as a means of emotional relief. Computers in Human Behavior, 29, 58–63.
  • Eshet-Alkalai, Y., & Chajut, E. (2009). Changes over time in digital literacy. Cyberpsychology & Behavior, 12, 713–715.
  • Fenaughty, J., & Harre, N. (2013). Factors associated with young people’s successful resolution of distressing electronic harassment. Computers & Education, 61, 242–250.
  • Finkelor, D., Wolak, J., & Mitchell, K. (2002). Close online relationships in a national sample of adolescents. Adolescence, 37(147), 441–445.
  • Finn, J., Kerman, B., & LeCornec, J. (2005). Reducing the digital divide for children in foster care: First-year evaluation of the Building Skills-Building Futures program. Research on Social Work Practice, 15, 470–480.
  • Fitch, D. (2012). Youth in foster care and social media: A framework for developing privacy guidelines. Journal of Technology in Human Services, 30, 94–108.
  • Geldof, G. J., Bowers, E. P., Boyd, M. J., Mueller, M. K., Napolitano, C. M., Schmidt, K. L., … Lerner, R. M. (2014). Creation of short and very short measures of the five C’s of positive youth development. Journal of Research on Adolescence, 24, 163–176.
  • Gustavsson, N., & MacEachron, A. (2008). Creating foster care youth biographies: A role for the internet. Journal of Technology & Human Services, 26, 45–55.
  • Havlicek, J. (2011). Lives in motion: A review of former foster youth in the context of their experiences in the child welfare system. Children and Youth Services Review, 33, 1090–1100.
  • Hudson, A. L. (2012). Where do youth in foster care receive information about unplanned pregnancy and sexually transmitted infections? Journal of Pediatric Nursing, 27, 443–450.
  • Jones, L. M., Mitchell, K. J., & Finkelhor, D. (2013). Online harassment in context: Trends from three youth Internet safety surveys (2000, 2005, 2010). Psychology of Violence, 3, 53–69.
  • Kidsmatterinc.org. (2013). Identity theft is a serious issue facing foster youth. Retrieved from www.kidsmatterinc.org/practice-innovation/identity-theft-is-a-serious-issue-facing-foster-youth/.
  • Kiriakidis, S. P., & Kavoura, A. (2010). Cyberbullying: A review of the literature on harassment through the Internet and other electronic means. Family and Community Health, 33, 82–93.
  • Lenhart, A., Madden, M., Macgill, A. R., & Smith, A. (2007). Teens and social media. Retrieved from www.pewInternet.org/Reports/2007/Teens-and-social-media.aspx.
  • Lenhart, A., Madden, M., Smith, A., Purcell, K., Zickuhr, K., & Rainie, L. (2011). Teens, kindness and cruelty on social network sites. Retrieved from www.pewInternet.org/Reports/2011/Teens-and-social-media/Summary.aspx#.
  • Lerner, R. M. (2005). Promoting positive youth development: Theoretical and empirical bases. Workshop on the Science of Adolescent Health and Development, National Research Council, Washington, DC. September 9, 2005. National Research Council/Institute of Medicine. Washington, DC: National Academy of Sciences.
  • Lerner, R. M., Lerner, J. V., von Eye, A., Bowers, E. P., & Lewin-Bizan, S. (2011). Individual and contextual bases of thriving in adolescents: A view of the issues. Journal of Adolescence, 34, 1107–1114.
  • Lwin, M. O., Li, B., & Ang, R. P. (2112). Stop bugging me: An examination of adolescents’ protection behavior against online harassment. Journal of Adolescence, 35, 31–41.
  • McClure, E. A., Acquavita, S. P., Harding, E., & Stitzer, M. L. (2013). Utilization of communication technology by patients enrolled in substance abuse treatment. Drug and Alcohol Dependence, 129, 145–150.
  • Mewton, L., Wong, N., & Andrews, G. (2012). The effectiveness of Internet cognitive behavioral therapy for generalized anxiety disorder in clinical practice. Depression and Anxiety, 29, 843–849.
  • Mitchell, K. J., Finkelhor, D., Jones, L. M., & Wolak, J. (2012). Prevalence and characteristics of youth sexting: A national study. Pediatrics, 129, 13–20.
  • Mitchell, K. J., & Ybarra, M. (2009). Social networking sites: Finding a balance between their risks and benefits. Archives of Pediatric and Adolescent Medicine, 163, 87–89.
  • Moritz, S., Schilling, L., Hauschildt, M., Schroder, J., & Treszl, A. (2012). A randomized controlled trial of Internet-based therapy in depression. Behaviour Research and Therapy, 50, 513–521.
  • Moscardelli, D. M., & Divine, R. (2007). Adolescents’ concern for privacy when using the Internet: An empirical analysis of predictors and relationships with privacy-protecting behaviors. Family and Consumer Sciences Research Journal, 35(3), 232–252.
  • NAMLE (National Association for Media Literacy Education). (2007). Core principles of media literacy education in the United States. Retrieved from http://namle.net/wp-content/uploads/2013/01/CorePrinciples.pdf.
  • Petrovic, W. (2011). Free computers for county foster children helps bridge the digital divide. Retrieved from http://www.netliteracy.org/?s=foster+children
  • Pew Internet. (2012). Teens Internet access demographics. Retrieved from www.pewInternet.org/Static-Pages/Trend-Data-(Teens)/Whos-Online.aspz.
  • Raiff, B. R., Jarvis, B. P., Turturici, M., & Dallery, J. (2013). Acceptability of an Internet-based contingency management intervention for smoking cessation: Views of smokers, nonsmokers and healthcare professionals. Experimental & Clinical Psychopharmacology, 21, 204–213.
  • Shook, J. J., Goodkind, S., Herring, D., Pohlig, R. T., Kolivoski, K., & Kim, K. H. (2013). How different are their experiences and outcomes? Comparing aged out and other child welfare involved youth. Children and Youth Services Review, 35, 11–18.
  • Simpson, J. E. (2013). Managing unregulated contact in the age of new technology: Possible solutions. Adoption & Fostering, 37, 380–388.
  • Skye Wingate, V., Minney, J. A., & Guadagno, R. E. (2013). Sticks and stones may break your bones, but words will always hurt you: A review of cyberbullying. Social Influence, 8, 87–106.
  • Slonje, R., Smith, P. K., & Frisen, A. (2013). The nature of cyberbullying, and strategies for prevention. Computers in Human Behavior, 29, 26–31.
  • van Deuren, A., & van Dijk, J. (2011). Internet skills and the digital divide. New Media & Society, 13, 893–911.
  • Wells, M., & Mitchell, K. J. (2008). How do high-risk youth use the Internet? Characteristics and implications for prevention. Child Maltreatment, 13, 227–234.
  • Wiederhold, B. K. (2012). As parents invade Facebook, teens tweet more. Cyberpsychology, Behavior, and Social Networking, 15, 385.
  • Wogan, J. B. (2014). Why every foster kid should have an ‘electronic backpack’. Retrieved from www.govtech.com/health/Why-Every-Kid-Should-Have-an-Electronic-Backpack.html
  • Wolak, J., Finkelhor, D., Ybarra, M. I., & Mitchel, K. J. (2010). Online “predators” and their victims: Myths, realities, and implications for prevention and treatment. Psychology of Violence, 1, 13–35.
  • Ybarra, M. L., & Mitchell, K. J. (2005). Exposure to Internet pornography among children and adolescents: A national survey. Cyberpsychology and Behavior, 8, 473–486.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.