{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,13]],"date-time":"2026-04-13T18:27:50Z","timestamp":1776104870445,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":21,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,11,8]],"date-time":"2022-11-08T00:00:00Z","timestamp":1667865600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["1827700, 1844881"],"award-info":[{"award-number":["1827700, 1844881"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100001143","name":"William T. Grant Foundation","doi-asserted-by":"publisher","award":["187941"],"award-info":[{"award-number":["187941"]}],"id":[{"id":"10.13039\/100001143","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,11,8]]},"DOI":"10.1145\/3500868.3559469","type":"proceedings-article","created":{"date-parts":[[2022,11,7]],"date-time":"2022-11-07T23:18:17Z","timestamp":1667863097000},"page":"94-97","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":14,"title":["From Ignoring Strangers\u2019 Solicitations to Mutual Sexting with Friends: Understanding Youth\u2019s Online Sexual Risks in Instagram Private Conversations"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-1399-9058","authenticated-orcid":false,"given":"Prema","family":"Dev","sequence":"first","affiliation":[{"name":"University of Central Florida, United States"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6519-3742","authenticated-orcid":false,"given":"Jessica","family":"Medina","sequence":"additional","affiliation":[{"name":"University of Central Florida, United States"}]},{"given":"Zainab","family":"Agha","sequence":"additional","affiliation":[{"name":"Vanderbilt University, United States"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5829-8004","authenticated-orcid":false,"given":"Munmun","family":"De Choudhury","sequence":"additional","affiliation":[{"name":"Georgia Institute of Technology, United States"}]},{"given":"Afsaneh","family":"Razi","sequence":"additional","affiliation":[{"name":"Drexel University, United States"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6223-1029","authenticated-orcid":false,"given":"Pamela J.","family":"Wisniewski","sequence":"additional","affiliation":[{"name":"Vanderbilt University, United States"}]}],"member":"320","published-online":{"date-parts":[[2022,11,8]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"crossref","unstructured":"Mamtaj Akter Amy\u00a0J Godfrey Jess Kropczynski Heather\u00a0R Lipford and Pamela\u00a0J Wisniewski. 2022. From Parental Control to Joint Family Oversight: Can Parents and Teens Manage Mobile Online Safety and Privacy as Equals?Proceedings of the ACM on Human-Computer Interaction 6 CSCW1(2022) 1\u201328.  Mamtaj Akter Amy\u00a0J Godfrey Jess Kropczynski Heather\u00a0R Lipford and Pamela\u00a0J Wisniewski. 2022. From Parental Control to Joint Family Oversight: Can Parents and Teens Manage Mobile Online Safety and Privacy as Equals?Proceedings of the ACM on Human-Computer Interaction 6 CSCW1(2022) 1\u201328.","DOI":"10.1145\/3512904"},{"key":"e_1_3_2_1_2_1","volume-title":"Pamela\u00a0J. Wisniewski, and Gianluca Stringhini.","author":"Ali Shiza","year":"2022","unstructured":"Shiza Ali , Afsaneh Razi , Seunghyun Kim , Ashwaq Alsoubai , Joshua Gracie , Munmun De Choudhury , Pamela\u00a0J. Wisniewski, and Gianluca Stringhini. 2022 . Understanding the Digital Lives of Youth: Analyzing Media Shared within Safe Versus Unsafe Private Conversations on Instagram . https:\/\/doi.org\/10.1145\/3491102.3501969 10.1145\/3491102.3501969 Shiza Ali, Afsaneh Razi, Seunghyun Kim, Ashwaq Alsoubai, Joshua Gracie, Munmun De Choudhury, Pamela\u00a0J. Wisniewski, and Gianluca Stringhini. 2022. Understanding the Digital Lives of Youth: Analyzing Media Shared within Safe Versus Unsafe Private Conversations on Instagram. https:\/\/doi.org\/10.1145\/3491102.3501969"},{"key":"e_1_3_2_1_3_1","first-page":"1673","article-title":"Teens, social media & technology 2018","volume":"31","author":"Anderson Monica","year":"2018","unstructured":"Monica Anderson , Jingjing Jiang , 2018 . Teens, social media & technology 2018 . Pew Research Center 31 , 2018 (2018), 1673 \u2013 1689 . Monica Anderson, Jingjing Jiang, 2018. Teens, social media & technology 2018. Pew Research Center 31, 2018 (2018), 1673\u20131689.","journal-title":"Pew Research Center"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/3311927.3323133"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2018.02.003"},{"key":"e_1_3_2_1_6_1","volume-title":"Technology-facilitated sexual assault in children and adolescents. Don't Forget The Bubbles (Feb","author":"Team DFTB.","year":"2022","unstructured":"Team DFTB. 2022. Technology-facilitated sexual assault in children and adolescents. Don't Forget The Bubbles (Feb . 2022 ). https:\/\/doi.org\/10.31440\/dftb.47086 10.31440\/dftb.47086 Team DFTB. 2022. Technology-facilitated sexual assault in children and adolescents. Don't Forget The Bubbles (Feb. 2022). https:\/\/doi.org\/10.31440\/dftb.47086"},{"key":"e_1_3_2_1_7_1","first-page":"15","article-title":"Gender differences in adolescent online victimisation and sexting expectancies","volume":"19","author":"Harris Tara","year":"2018","unstructured":"Tara Harris and Francois Steyn . 2018 . Gender differences in adolescent online victimisation and sexting expectancies . Child Abuse Research in South Africa 19 , 1 (2018), 15 \u2013 29 . Tara Harris and Francois Steyn. 2018. Gender differences in adolescent online victimisation and sexting expectancies. Child Abuse Research in South Africa 19, 1 (2018), 15\u201329.","journal-title":"Child Abuse Research in South Africa"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/3449116"},{"key":"e_1_3_2_1_9_1","volume-title":"Pic\u2019-Examining the Role of Peer Pressure in Adolescent Sexting. In Companion Publication of the 2021 Conference on Computer Supported Cooperative Work and Social Computing. 67\u201371","author":"Hartikainen Heidi","year":"2021","unstructured":"Heidi Hartikainen , Afsaneh Razi , and Pamela Wisniewski . 2021 . \u2018If You Care About Me, You\u2019ll Send Me a Pic\u2019-Examining the Role of Peer Pressure in Adolescent Sexting. In Companion Publication of the 2021 Conference on Computer Supported Cooperative Work and Social Computing. 67\u201371 . Heidi Hartikainen, Afsaneh Razi, and Pamela Wisniewski. 2021. \u2018If You Care About Me, You\u2019ll Send Me a Pic\u2019-Examining the Role of Peer Pressure in Adolescent Sexting. In Companion Publication of the 2021 Conference on Computer Supported Cooperative Work and Social Computing. 67\u201371."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.polgeo.2006.08.007"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1080\/17482798.2014.923009"},{"key":"e_1_3_2_1_12_1","volume-title":"When adolescents receive sexual messages on the internet: Explaining experiences of risk and harm. Computers in human behavior 33","author":"Livingstone Sonia","year":"2014","unstructured":"Sonia Livingstone and Anke G\u00f6rzig . 2014. When adolescents receive sexual messages on the internet: Explaining experiences of risk and harm. Computers in human behavior 33 ( 2014 ), 8\u201315. Sonia Livingstone and Anke G\u00f6rzig. 2014. When adolescents receive sexual messages on the internet: Explaining experiences of risk and harm. Computers in human behavior 33 (2014), 8\u201315."},{"key":"e_1_3_2_1_13_1","unstructured":"Wendy\u00a0G Macdowall David\u00a0S Reid Ruth Lewis Raquel Bos\u00f3\u00a0P\u00e9rez Kirstin\u00a0R Mitchell Karen\u00a0J Maxwell Clarissa Smith Feona Attwood Jo Gibbs Bernie Hogan 2022. Sexting among British adults: a qualitative analysis of sexting as emotion work governed by \u2018feeling rules\u2019. Culture Health & Sexuality(2022) 1\u201316.  Wendy\u00a0G Macdowall David\u00a0S Reid Ruth Lewis Raquel Bos\u00f3\u00a0P\u00e9rez Kirstin\u00a0R Mitchell Karen\u00a0J Maxwell Clarissa Smith Feona Attwood Jo Gibbs Bernie Hogan 2022. Sexting among British adults: a qualitative analysis of sexting as emotion work governed by \u2018feeling rules\u2019. Culture Health & Sexuality(2022) 1\u201316."},{"key":"e_1_3_2_1_14_1","unstructured":"Kimberly\u00a0J. Mitchell Lisa\u00a0Mali Jones David Finkelhor and Janis Wolak. 2014. Trends in Unwanted Online Experiences and Sexting : Final Report.  Kimberly\u00a0J. Mitchell Lisa\u00a0Mali Jones David Finkelhor and Janis Wolak. 2014. Trends in Unwanted Online Experiences and Sexting : Final Report."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"crossref","unstructured":"Afsaneh Razi Ashwaq AlSoubai Seunghyun Kim Nurun Naher Shiza Ali Gianluca Stringhini Munmun De\u00a0Choudhury and Pamela\u00a0J Wisniewski. 2022. Instagram Data Donation: A Case Study on Collecting Ecologically Valid Social Media Data for the Purpose of Adolescent Online Risk Detection. In CHI Conference on Human Factors in Computing Systems Extended Abstracts. 1\u20139.  Afsaneh Razi Ashwaq AlSoubai Seunghyun Kim Nurun Naher Shiza Ali Gianluca Stringhini Munmun De\u00a0Choudhury and Pamela\u00a0J Wisniewski. 2022. Instagram Data Donation: A Case Study on Collecting Ecologically Valid Social Media Data for the Purpose of Adolescent Online Risk Detection. In CHI Conference on Human Factors in Computing Systems Extended Abstracts. 1\u20139.","DOI":"10.1145\/3491101.3503569"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/3313831.3376400"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/3479609"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1177\/1077801219880959"},{"key":"e_1_3_2_1_19_1","volume-title":"An overview of content analysis. Practical assessment, research, and evaluation 7, 1","author":"Stemler Steve","year":"2000","unstructured":"Steve Stemler . 2000. An overview of content analysis. Practical assessment, research, and evaluation 7, 1 ( 2000 ). Steve Stemler. 2000. An overview of content analysis. Practical assessment, research, and evaluation 7, 1 (2000)."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/2858036.2858317"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jadohealth.2017.08.014"}],"event":{"name":"CSCW '22: Computer Supported Cooperative Work and Social Computing","location":"Virtual Event Taiwan","acronym":"CSCW '22","sponsor":["SIGCHI ACM Special Interest Group on Computer-Human Interaction"]},"container-title":["Companion Publication of the 2022 Conference on Computer Supported Cooperative Work and Social Computing"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3500868.3559469","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3500868.3559469","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T19:30:39Z","timestamp":1750188639000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3500868.3559469"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,11,8]]},"references-count":21,"alternative-id":["10.1145\/3500868.3559469","10.1145\/3500868"],"URL":"https:\/\/doi.org\/10.1145\/3500868.3559469","relation":{},"subject":[],"published":{"date-parts":[[2022,11,8]]},"assertion":[{"value":"2022-11-08","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}