{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,13]],"date-time":"2026-04-13T23:14:24Z","timestamp":1776122064731,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":62,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,4,27]],"date-time":"2022-04-27T00:00:00Z","timestamp":1651017600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000001","name":"NSF (National Science Foundation)","doi-asserted-by":"publisher","award":["1827700"],"award-info":[{"award-number":["1827700"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022,4,27]]},"DOI":"10.1145\/3491102.3501969","type":"proceedings-article","created":{"date-parts":[[2022,4,28]],"date-time":"2022-04-28T17:09:36Z","timestamp":1651165776000},"page":"1-14","source":"Crossref","is-referenced-by-count":37,"title":["Understanding the Digital Lives of Youth: Analyzing Media Shared within Safe Versus Unsafe Private Conversations on Instagram"],"prefix":"10.1145","author":[{"given":"Shiza","family":"Ali","sequence":"first","affiliation":[{"name":"Boston University, United States"}]},{"given":"Afsaneh","family":"Razi","sequence":"additional","affiliation":[{"name":"Department of Computer Science, University of Central Florida, United States"}]},{"given":"Seunghyun","family":"Kim","sequence":"additional","affiliation":[{"name":"School of Interactive Computing, Georgia Institute of Technology, United States"}]},{"given":"Ashwaq","family":"Alsoubai","sequence":"additional","affiliation":[{"name":"University of Central Florida, United States"}]},{"given":"Joshua","family":"Gracie","sequence":"additional","affiliation":[{"name":"University of Central Florida, United States"}]},{"given":"Munmun","family":"De Choudhury","sequence":"additional","affiliation":[{"name":"School of Interactive Computing, Georgia Institute of Technology, United States"}]},{"given":"Pamela J.","family":"Wisniewski","sequence":"additional","affiliation":[{"name":"Department of Computer Science, University of Central Florida, United States"}]},{"given":"Gianluca","family":"Stringhini","sequence":"additional","affiliation":[{"name":"Boston University, United States"}]}],"member":"320","published-online":{"date-parts":[[2022,4,28]]},"reference":[{"key":"e_1_3_2_2_1_1","unstructured":"Monica Anderson and Jingjing Jiang. 2018. Teens Social Media & Technology 2018 | Pew Research Center. https:\/\/www.pewresearch.org\/internet\/2018\/05\/31\/teens-social-media-technology-2018\/ Monica Anderson and Jingjing Jiang. 2018. Teens Social Media & Technology 2018 | Pew Research Center. https:\/\/www.pewresearch.org\/internet\/2018\/05\/31\/teens-social-media-technology-2018\/"},{"key":"e_1_3_2_2_2_1","unstructured":"Monica Anderson and Jingjing Jiang. 2018. Teens Social Media & Technology 2018 | Pew Research Center. http:\/\/www.pewinternet.org\/2018\/05\/31\/teens-social-media-technology-2018\/ Monica Anderson and Jingjing Jiang. 2018. Teens Social Media & Technology 2018 | Pew Research Center. http:\/\/www.pewinternet.org\/2018\/05\/31\/teens-social-media-technology-2018\/"},{"key":"e_1_3_2_2_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/3432930"},{"key":"e_1_3_2_2_4_1","doi-asserted-by":"crossref","unstructured":"Susan\u00a0B Barnes. 2006. A privacy paradox: Social networking in the United States. Susan\u00a0B Barnes. 2006. A privacy paradox: Social networking in the United States.","DOI":"10.5210\/fm.v11i9.1394"},{"key":"e_1_3_2_2_5_1","unstructured":"U.S.\u00a0Census Bureau. 2021. U.S. Census Bureau QuickFacts: United States. https:\/\/www.census.gov\/quickfacts\/fact\/table\/US\/PST045219 U.S.\u00a0Census Bureau. 2021. U.S. Census Bureau QuickFacts: United States. https:\/\/www.census.gov\/quickfacts\/fact\/table\/US\/PST045219"},{"key":"e_1_3_2_2_6_1","volume-title":"boyd","year":"2007","unstructured":"d. boyd . 2007 . Why Youth (Heart) Social Network Sites: The Role of Networked Publics in Teenage Social Life . d. boyd. 2007. Why Youth (Heart) Social Network Sites: The Role of Networked Publics in Teenage Social Life."},{"key":"e_1_3_2_2_7_1","volume-title":"It\u2019s Complicated: The Social Lives of Networked Teens","year":"2014","unstructured":"danah boyd. 2014 . It\u2019s Complicated: The Social Lives of Networked Teens . http:\/\/www.jstor.org\/stable\/j.ctt5vm5gk danah boyd. 2014. It\u2019s Complicated: The Social Lives of Networked Teens. http:\/\/www.jstor.org\/stable\/j.ctt5vm5gk"},{"key":"e_1_3_2_2_8_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jadohealth.2014.04.002"},{"key":"e_1_3_2_2_9_1","volume-title":"Cyberbullying in social networking sites: An adolescent victim\u2019s perspective. Computers in human behavior 36","author":"Dredge Rebecca","year":"2014","unstructured":"Rebecca Dredge , John Gleeson , and Xochitl De\u00a0la Piedad\u00a0Garcia . 2014. Cyberbullying in social networking sites: An adolescent victim\u2019s perspective. Computers in human behavior 36 ( 2014 ), 13\u201320. Rebecca Dredge, John Gleeson, and Xochitl De\u00a0la Piedad\u00a0Garcia. 2014. Cyberbullying in social networking sites: An adolescent victim\u2019s perspective. Computers in human behavior 36 (2014), 13\u201320."},{"key":"e_1_3_2_2_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/2858036.2858535"},{"key":"e_1_3_2_2_11_1","doi-asserted-by":"publisher","DOI":"10.1086\/209351"},{"key":"e_1_3_2_2_12_1","unstructured":"General Data Protection\u00a0Regulation (GDPR). 2021. Art. 20 GDPR \u2013 Right to data portability | General Data Protection Regulation (GDPR). https:\/\/gdpr-info.eu\/art-20-gdpr\/ General Data Protection\u00a0Regulation (GDPR). 2021. Art. 20 GDPR \u2013 Right to data portability | General Data Protection Regulation (GDPR). https:\/\/gdpr-info.eu\/art-20-gdpr\/"},{"key":"e_1_3_2_2_13_1","unstructured":"Google. 2021. Vision AI | Derive Image Insights via ML | Cloud Vision API. https:\/\/cloud.google.com\/vision Google. 2021. Vision AI | Derive Image Insights via ML | Cloud Vision API. https:\/\/cloud.google.com\/vision"},{"key":"e_1_3_2_2_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/3449116"},{"key":"e_1_3_2_2_15_1","volume-title":"You\u2019ll Send Me a Pic","author":"Hartikainen Heidi","unstructured":"Heidi Hartikainen , Afsaneh Razi , and Pamela Wisniewski . 2021. \u2018If You Care About Me , You\u2019ll Send Me a Pic \u2019 - Examining the Role of Peer Pressure in Adolescent Sexting. Association for Computing Machinery, New York, NY, USA, 67\u201371. https:\/\/doi.org\/10.1145\/3462204.3481739 Heidi Hartikainen, Afsaneh Razi, and Pamela Wisniewski. 2021. \u2018If You Care About Me, You\u2019ll Send Me a Pic\u2019 - Examining the Role of Peer Pressure in Adolescent Sexting. Association for Computing Machinery, New York, NY, USA, 67\u201371. https:\/\/doi.org\/10.1145\/3462204.3481739"},{"key":"e_1_3_2_2_16_1","volume-title":"Shubhra Kanti\u00a0Karmaker Santu, and Syed\u00a0Ishtiaque Ahmed","author":"Hassan Naeemul","year":"2020","unstructured":"Naeemul Hassan , Amrit Poudel , Jason Hale , Claire Hubacek , Khandaker\u00a0Tasnim Huq , Shubhra Kanti\u00a0Karmaker Santu, and Syed\u00a0Ishtiaque Ahmed . 2020 . Towards Automated Sexual Violence Report Tracking ., 250\u2013259\u00a0pages. Naeemul Hassan, Amrit Poudel, Jason Hale, Claire Hubacek, Khandaker\u00a0Tasnim Huq, Shubhra Kanti\u00a0Karmaker Santu, and Syed\u00a0Ishtiaque Ahmed. 2020. Towards Automated Sexual Violence Report Tracking., 250\u2013259\u00a0pages."},{"key":"e_1_3_2_2_17_1","unstructured":"Homa Hosseinmardi Sabrina\u00a0Arredondo Mattson Rahat\u00a0Ibn Rafiq Richard Han Qin Lv and Shivakant Mishra. 2015. Detection of Cyberbullying Incidents on the Instagram Social Network. arxiv:1503.03909http:\/\/arxiv.org\/abs\/1503.03909 Homa Hosseinmardi Sabrina\u00a0Arredondo Mattson Rahat\u00a0Ibn Rafiq Richard Han Qin Lv and Shivakant Mishra. 2015. Detection of Cyberbullying Incidents on the Instagram Social Network. arxiv:1503.03909http:\/\/arxiv.org\/abs\/1503.03909"},{"key":"e_1_3_2_2_18_1","volume-title":"Three approaches to qualitative content analysis. Qualitative health research 15, 9","author":"Hsieh Hsiu-Fang","year":"2005","unstructured":"Hsiu-Fang Hsieh and Sarah\u00a0 E Shannon . 2005. Three approaches to qualitative content analysis. Qualitative health research 15, 9 ( 2005 ), 1277\u20131288. Hsiu-Fang Hsieh and Sarah\u00a0E Shannon. 2005. Three approaches to qualitative content analysis. Qualitative health research 15, 9 (2005), 1277\u20131288."},{"key":"e_1_3_2_2_19_1","unstructured":"Yuheng Hu Lydia Manikonda and Subbarao Kambhampati. 2014. What We Instagram: A First Analysis of Instagram Photo Content and User Types. https:\/\/ojs.aaai.org\/index.php\/ICWSM\/article\/view\/14578 Yuheng Hu Lydia Manikonda and Subbarao Kambhampati. 2014. What We Instagram: A First Analysis of Instagram Photo Content and User Types. https:\/\/ojs.aaai.org\/index.php\/ICWSM\/article\/view\/14578"},{"key":"e_1_3_2_2_20_1","unstructured":"Instagram. 2021. Continuing to Make Instagram Safer for the Youngest Members of Our Community. https:\/\/about.instagram.com\/blog\/announcements\/continuing-to-make-instagram-safer-for-the-youngest-members-of-our-community Instagram. 2021. Continuing to Make Instagram Safer for the Youngest Members of Our Community. https:\/\/about.instagram.com\/blog\/announcements\/continuing-to-make-instagram-safer-for-the-youngest-members-of-our-community"},{"key":"e_1_3_2_2_21_1","unstructured":"Mansoor Iqbal. 2021. Instagram Revenue and Usage Statistics (2021) - Business of Apps. https:\/\/www.businessofapps.com\/data\/instagram-statistics\/ Mansoor Iqbal. 2021. Instagram Revenue and Usage Statistics (2021) - Business of Apps. https:\/\/www.businessofapps.com\/data\/instagram-statistics\/"},{"key":"e_1_3_2_2_22_1","doi-asserted-by":"crossref","unstructured":"Jin Jang Kyungsik Han Dongwon Lee Haiyan Jia and Patrick Shih. 2016. Teens Engage More with Fewer Photos: Temporal and Comparative Analysis on Behaviors in Instagram. https:\/\/doi.org\/10.1145\/2914586.2914602 Jin Jang Kyungsik Han Dongwon Lee Haiyan Jia and Patrick Shih. 2016. Teens Engage More with Fewer Photos: Temporal and Comparative Analysis on Behaviors in Instagram. https:\/\/doi.org\/10.1145\/2914586.2914602","DOI":"10.1145\/2914586.2914602"},{"key":"e_1_3_2_2_23_1","volume-title":"Proc. Computer-Supported Cooperative Work and Social Computing 2015 (01","author":"Jia Haiyan","year":"2014","unstructured":"Haiyan Jia , Pamela Wisniewski , Heng Xu , Mary\u00a0Beth Rosson , and John Carroll . 2014 . Risk-taking as a Learning Process for Shaping Teen\u2019s Online Information Privacy Behaviors . Proc. Computer-Supported Cooperative Work and Social Computing 2015 (01 2014). https:\/\/doi.org\/10.1145\/2675133.2675287 Haiyan Jia, Pamela Wisniewski, Heng Xu, Mary\u00a0Beth Rosson, and John Carroll. 2014. Risk-taking as a Learning Process for Shaping Teen\u2019s Online Information Privacy Behaviors. Proc. Computer-Supported Cooperative Work and Social Computing 2015 (01 2014). https:\/\/doi.org\/10.1145\/2675133.2675287"},{"key":"e_1_3_2_2_24_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jadohealth.2011.09.015"},{"key":"e_1_3_2_2_25_1","volume-title":"Mobile taskflow in context: a screenshot study of smartphone usage","author":"Karlson K","year":"2009","unstructured":"Amy\u00a0 K Karlson , Shamsi\u00a0 T Iqbal , Brian Meyers , Gonzalo Ramos , Kathy Lee , and John\u00a0 C Tang . 2010. Mobile taskflow in context: a screenshot study of smartphone usage ., 2009 \u20132018\u00a0pages. Amy\u00a0K Karlson, Shamsi\u00a0T Iqbal, Brian Meyers, Gonzalo Ramos, Kathy Lee, and John\u00a0C Tang. 2010. Mobile taskflow in context: a screenshot study of smartphone usage., 2009\u20132018\u00a0pages."},{"key":"e_1_3_2_2_26_1","doi-asserted-by":"publisher","DOI":"10.1177\/0044118X15604849"},{"key":"e_1_3_2_2_27_1","unstructured":"Seunghyun Kim Afsaneh Razi Gianluca Stringhini Pamela Wisniewski and Munmun De\u00a0Choudhury. 2021. You Don\u2019t Know How I Feel: Insider-Outsider Perspective Gaps in Cyberbullying Risk Detection. Seunghyun Kim Afsaneh Razi Gianluca Stringhini Pamela Wisniewski and Munmun De\u00a0Choudhury. 2021. You Don\u2019t Know How I Feel: Insider-Outsider Perspective Gaps in Cyberbullying Risk Detection."},{"key":"e_1_3_2_2_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/3476066"},{"key":"e_1_3_2_2_29_1","doi-asserted-by":"crossref","unstructured":"J. Kofoed and Malene\u00a0Charlotte Larsen. 2016. A snap of intimacy: Photo-sharing practices among young people on social media. J. Kofoed and Malene\u00a0Charlotte Larsen. 2016. A snap of intimacy: Photo-sharing practices among young people on social media.","DOI":"10.5210\/fm.v21i11.6905"},{"key":"e_1_3_2_2_30_1","doi-asserted-by":"crossref","unstructured":"Kay l. O\u2019Halloran Alvin Chua and Alexey Podlasov. 2014. 25. The role of images in social media analytics: A multimodal digital humanities approach. 565\u2013588\u00a0pages. https:\/\/doi.org\/10.1515\/9783110255492.565 Kay l. O\u2019Halloran Alvin Chua and Alexey Podlasov. 2014. 25. The role of images in social media analytics: A multimodal digital humanities approach. 565\u2013588\u00a0pages. https:\/\/doi.org\/10.1515\/9783110255492.565","DOI":"10.1515\/9783110255492.565"},{"key":"e_1_3_2_2_31_1","unstructured":"Bernard Lindgren. 2017. Statistical theory. Bernard Lindgren. 2017. Statistical theory."},{"key":"e_1_3_2_2_32_1","doi-asserted-by":"crossref","unstructured":"Ping Liu Joshua Guberman Libby Hemphill and Aron Culotta. 2018. Forecasting the Presence and Intensity of Hostility on Instagram Using Linguistic and Social Features. https:\/\/ojs.aaai.org\/index.php\/ICWSM\/article\/view\/15022 Ping Liu Joshua Guberman Libby Hemphill and Aron Culotta. 2018. Forecasting the Presence and Intensity of Hostility on Instagram Using Linguistic and Social Features. https:\/\/ojs.aaai.org\/index.php\/ICWSM\/article\/view\/15022","DOI":"10.1609\/icwsm.v12i1.15022"},{"key":"e_1_3_2_2_33_1","unstructured":"Sonia Livingstone Leslie Haddon Anke G\u00f6rzig and Kjartan \u00d3lafsson. 2010. Risks and safety on the internet: the perspective of European children: key findings from the EU Kids Online survey of 9-16 year olds and their parents in 25 countries. Sonia Livingstone Leslie Haddon Anke G\u00f6rzig and Kjartan \u00d3lafsson. 2010. Risks and safety on the internet: the perspective of European children: key findings from the EU Kids Online survey of 9-16 year olds and their parents in 25 countries."},{"key":"e_1_3_2_2_34_1","unstructured":"Xiao Ma Jeff Hancock and Mor Naaman. 2016. Anonymity intimacy and self-disclosure in social media. 3857\u20133869\u00a0pages. Xiao Ma Jeff Hancock and Mor Naaman. 2016. Anonymity intimacy and self-disclosure in social media. 3857\u20133869\u00a0pages."},{"key":"e_1_3_2_2_35_1","doi-asserted-by":"crossref","unstructured":"Tolba Marwa Ouadfel Salima and Meshoul Souham. 2018. Deep learning for online harassment detection in tweets. https:\/\/doi.org\/10.1109\/PAIS.2018.8598530 Tolba Marwa Ouadfel Salima and Meshoul Souham. 2018. Deep learning for online harassment detection in tweets. https:\/\/doi.org\/10.1109\/PAIS.2018.8598530","DOI":"10.1109\/PAIS.2018.8598530"},{"key":"e_1_3_2_2_36_1","volume-title":"Networked privacy: How teenagers negotiate context in social media. New media & society 16, 7","author":"Marwick E","year":"2014","unstructured":"Alice\u00a0 E Marwick and danah boyd. 2014. Networked privacy: How teenagers negotiate context in social media. New media & society 16, 7 ( 2014 ), 1051\u20131067. Alice\u00a0E Marwick and danah boyd. 2014. Networked privacy: How teenagers negotiate context in social media. New media & society 16, 7 (2014), 1051\u20131067."},{"key":"e_1_3_2_2_37_1","doi-asserted-by":"crossref","unstructured":"Hiroaki Masaki Kengo Shibata Shui Hoshino Takahiro Ishihama Nagayuki Saito and Koji Yatani. 2020. Exploring Nudge Designs to Help Adolescent SNS Users Avoid Privacy and Safety Threats. 11\u00a0pages. https:\/\/doi.org\/10.1145\/3313831.3376666 Hiroaki Masaki Kengo Shibata Shui Hoshino Takahiro Ishihama Nagayuki Saito and Koji Yatani. 2020. Exploring Nudge Designs to Help Adolescent SNS Users Avoid Privacy and Safety Threats. 11\u00a0pages. https:\/\/doi.org\/10.1145\/3313831.3376666","DOI":"10.1145\/3313831.3376666"},{"key":"e_1_3_2_2_38_1","unstructured":"Bridget\u00a0Christine McHugh Pamela Wisniewski Mary\u00a0Beth Rosson and John\u00a0M Carroll. 2018. When social media traumatizes teens. Bridget\u00a0Christine McHugh Pamela Wisniewski Mary\u00a0Beth Rosson and John\u00a0M Carroll. 2018. When social media traumatizes teens."},{"key":"e_1_3_2_2_39_1","unstructured":"Jerold\u00a0D Miller and Shirley\u00a0M Hufstedler. 2009. Cyberbullying Knows No Borders. Jerold\u00a0D Miller and Shirley\u00a0M Hufstedler. 2009. Cyberbullying Knows No Borders."},{"key":"e_1_3_2_2_40_1","unstructured":"Pushkar Mishra Helen Yannakoudakis and Ekaterina Shutova. 2019. Tackling online abuse: A survey of automated abuse detection methods. Pushkar Mishra Helen Yannakoudakis and Ekaterina Shutova. 2019. Tackling online abuse: A survey of automated abuse detection methods."},{"key":"e_1_3_2_2_41_1","unstructured":"Maryam Mohsin. 2021. 10 Instagram Statistics You Need to Know in 2021 [New Data]. https:\/\/www.oberlo.com\/blog\/instagram-stats-every-marketer-should-know Maryam Mohsin. 2021. 10 Instagram Statistics You Need to Know in 2021 [New Data]. https:\/\/www.oberlo.com\/blog\/instagram-stats-every-marketer-should-know"},{"key":"e_1_3_2_2_42_1","doi-asserted-by":"crossref","unstructured":"R Morris Daniel McDuff and R Calvo. 2014. Crowdsourcing techniques for affective computing. 384\u2013394\u00a0pages. R Morris Daniel McDuff and R Calvo. 2014. Crowdsourcing techniques for affective computing. 384\u2013394\u00a0pages.","DOI":"10.1093\/oxfordhb\/9780199942237.013.003"},{"key":"e_1_3_2_2_43_1","unstructured":"Lauren North. 2021. What is a screenshot? | TechSmith. https:\/\/www.techsmith.com\/blog\/screenshot\/ Lauren North. 2021. What is a screenshot? | TechSmith. https:\/\/www.techsmith.com\/blog\/screenshot\/"},{"key":"e_1_3_2_2_44_1","volume-title":"\u00a0F. Almeida","author":"Ottoni Raphael","year":"2018","unstructured":"Raphael Ottoni , Evandro Cunha , Gabriel Magno , P. Bernardina , W. Meira , and Virg\u00edlio A . \u00a0F. Almeida . 2018 . Analyzing Right-wing YouTube Channels: Hate, Violence and Discrimination . Raphael Ottoni, Evandro Cunha, Gabriel Magno, P. Bernardina, W. Meira, and Virg\u00edlio A.\u00a0F. Almeida. 2018. Analyzing Right-wing YouTube Channels: Hate, Violence and Discrimination."},{"key":"e_1_3_2_2_45_1","doi-asserted-by":"publisher","DOI":"10.1145\/3078072.3079722"},{"key":"e_1_3_2_2_46_1","doi-asserted-by":"publisher","DOI":"10.1145\/3313831.3376400"},{"key":"e_1_3_2_2_47_1","doi-asserted-by":"publisher","DOI":"10.1145\/3479609"},{"key":"e_1_3_2_2_48_1","unstructured":"Afsaneh Razi Seunghyun Kim Munmun\u00a0De Choudhury and Pamela Wisniewski. 2019. Ethical considerations for adolescent online risk detection AI systems. Afsaneh Razi Seunghyun Kim Munmun\u00a0De Choudhury and Pamela Wisniewski. 2019. Ethical considerations for adolescent online risk detection AI systems."},{"key":"e_1_3_2_2_49_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2018.12.021"},{"key":"e_1_3_2_2_50_1","doi-asserted-by":"publisher","DOI":"10.1109\/TAFFC.2017.2761757"},{"key":"e_1_3_2_2_51_1","first-page":"86","article-title":"A Framework for Automatic Detection and Prevention of Cyberbullying in Social Media","volume":"5","author":"Shruthi","year":"2017","unstructured":"Shruthi and Prof\u00a0Mangala C. 2017 . A Framework for Automatic Detection and Prevention of Cyberbullying in Social Media . International Journal of Innovative Research in Computer and Communication Engineering 5 , 6 (2017), 86 \u2013 90 . www.ijircce.com Shruthi and Prof\u00a0Mangala C. 2017. A Framework for Automatic Detection and Prevention of Cyberbullying in Social Media. International Journal of Innovative Research in Computer and Communication Engineering 5, 6 (2017), 86\u201390. www.ijircce.com","journal-title":"International Journal of Innovative Research in Computer and Communication Engineering"},{"key":"e_1_3_2_2_52_1","doi-asserted-by":"publisher","DOI":"10.1145\/3400806.3400825"},{"key":"e_1_3_2_2_53_1","unstructured":"H Tankovska. 2021. Instagram: age distribution of global audiences 2021 | Statista. https:\/\/www.statista.com\/statistics\/325587\/instagram-global-age-group\/ H Tankovska. 2021. Instagram: age distribution of global audiences 2021 | Statista. https:\/\/www.statista.com\/statistics\/325587\/instagram-global-age-group\/"},{"key":"e_1_3_2_2_54_1","doi-asserted-by":"crossref","unstructured":"Muhammad\u00a0Uzair Tariq Afsaneh Razi Karla Badillo-Urquiola and Pamela Wisniewski. 2019. A Review of the Gaps and Opportunities of Nudity and Skin Detection Algorithmic Research for the Purpose of Combating Adolescent Sexting Behaviors. 90\u2013108\u00a0pages. Muhammad\u00a0Uzair Tariq Afsaneh Razi Karla Badillo-Urquiola and Pamela Wisniewski. 2019. A Review of the Gaps and Opportunities of Nudity and Skin Detection Algorithmic Research for the Purpose of Combating Adolescent Sexting Behaviors. 90\u2013108\u00a0pages.","DOI":"10.1007\/978-3-030-22636-7_6"},{"key":"e_1_3_2_2_55_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2016.2587640"},{"key":"e_1_3_2_2_56_1","doi-asserted-by":"crossref","unstructured":"Yilin Wang and Baoxin Li. 2015. Sentiment Analysis for Social Media Images. 1584-1591\u00a0pages. https:\/\/doi.org\/10.1109\/ICDMW.2015.142 Yilin Wang and Baoxin Li. 2015. Sentiment Analysis for Social Media Images. 1584-1591\u00a0pages. https:\/\/doi.org\/10.1109\/ICDMW.2015.142","DOI":"10.1109\/ICDMW.2015.142"},{"key":"e_1_3_2_2_57_1","doi-asserted-by":"publisher","DOI":"10.1080\/13552600.2014.948085"},{"key":"e_1_3_2_2_58_1","volume-title":"The Privacy Paradox of Adolescent Online Safety: A Matter of Risk Prevention or Risk Resilience?IEEE Security Privacy 16, 2","author":"Wisniewski Pamela","year":"2018","unstructured":"Pamela Wisniewski . 2018. The Privacy Paradox of Adolescent Online Safety: A Matter of Risk Prevention or Risk Resilience?IEEE Security Privacy 16, 2 ( 2018 ), 86\u201390. https:\/\/doi.org\/10.1109\/MSP.2018.1870874 Pamela Wisniewski. 2018. The Privacy Paradox of Adolescent Online Safety: A Matter of Risk Prevention or Risk Resilience?IEEE Security Privacy 16, 2 (2018), 86\u201390. https:\/\/doi.org\/10.1109\/MSP.2018.1870874"},{"key":"e_1_3_2_2_59_1","doi-asserted-by":"publisher","DOI":"10.1145\/2675133.2675293"},{"key":"e_1_3_2_2_60_1","doi-asserted-by":"publisher","DOI":"10.1145\/2998181.2998236"},{"key":"e_1_3_2_2_61_1","doi-asserted-by":"crossref","unstructured":"Pamela Wisniewski Heng Xu Mary\u00a0Beth Rosson Daniel\u00a0F Perkins and John\u00a0M Carroll. 2016. Dear diary: Teens reflect on their weekly online risk experiences. 3919\u20133930\u00a0pages. Pamela Wisniewski Heng Xu Mary\u00a0Beth Rosson Daniel\u00a0F Perkins and John\u00a0M Carroll. 2016. Dear diary: Teens reflect on their weekly online risk experiences. 3919\u20133930\u00a0pages.","DOI":"10.1145\/2858036.2858317"},{"key":"e_1_3_2_2_62_1","doi-asserted-by":"publisher","DOI":"10.1177\/1470357216643220"}],"event":{"name":"CHI '22: CHI Conference on Human Factors in Computing Systems","location":"New Orleans LA USA","acronym":"CHI '22","sponsor":["SIGCHI ACM Special Interest Group on Computer-Human Interaction"]},"container-title":["CHI Conference on Human Factors in Computing Systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3491102.3501969","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3491102.3501969","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3491102.3501969","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T19:31:05Z","timestamp":1750188665000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3491102.3501969"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,4,27]]},"references-count":62,"alternative-id":["10.1145\/3491102.3501969","10.1145\/3491102"],"URL":"https:\/\/doi.org\/10.1145\/3491102.3501969","relation":{},"subject":[],"published":{"date-parts":[[2022,4,27]]}}}