{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,13]],"date-time":"2026-04-13T16:01:43Z","timestamp":1776096103055,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":20,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,11,8]],"date-time":"2022-11-08T00:00:00Z","timestamp":1667865600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["IIP-1827700"],"award-info":[{"award-number":["IIP-1827700"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,11,8]]},"DOI":"10.1145\/3500868.3559710","type":"proceedings-article","created":{"date-parts":[[2022,11,7]],"date-time":"2022-11-07T23:18:17Z","timestamp":1667863097000},"page":"197-200","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":15,"title":["MOSafely, Is that Sus? A Youth-Centric Online Risk Assessment Dashboard"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-1569-9662","authenticated-orcid":false,"given":"Ashwaq","family":"Alsoubai","sequence":"first","affiliation":[{"name":"Vanderbilt University, United States and Information Systems, King AbdulAziz University, Saudi Arabia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8939-264X","authenticated-orcid":false,"given":"Xavier V.","family":"Caddle","sequence":"additional","affiliation":[{"name":"Department of Computer Science, University of Central Florida, United States"}]},{"given":"Ryan","family":"Doherty","sequence":"additional","affiliation":[{"name":"Computer Science, University of Central Florida, United States"}]},{"given":"Alexandra Taylor","family":"Koehler","sequence":"additional","affiliation":[{"name":"Computer Science, University of Central Florida, United States"}]},{"given":"Estefania","family":"Sanchez","sequence":"additional","affiliation":[{"name":"Computer Science, University of Central Florida, United States"}]},{"given":"Munmun","family":"De Choudhury","sequence":"additional","affiliation":[{"name":"School of Interactive Computing, Georgia Institute of Technology, United States"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6223-1029","authenticated-orcid":false,"given":"Pamela J.","family":"Wisniewski","sequence":"additional","affiliation":[{"name":"Department of Computer Science, Vanderbilt University, United States"}]}],"member":"320","published-online":{"date-parts":[[2022,11,8]]},"reference":[{"key":"e_1_3_2_2_1_1","doi-asserted-by":"crossref","unstructured":"Mamtaj Akter Amy\u00a0J Godfrey Jess Kropczynski Heather\u00a0R Lipford and Pamela\u00a0J Wisniewski. 2022. From Parental Control to Joint Family Oversight: Can Parents and Teens Manage Mobile Online Safety and Privacy as Equals?Proceedings of the ACM on Human-Computer Interaction 6 CSCW1(2022) 1\u201328.  Mamtaj Akter Amy\u00a0J Godfrey Jess Kropczynski Heather\u00a0R Lipford and Pamela\u00a0J Wisniewski. 2022. From Parental Control to Joint Family Oversight: Can Parents and Teens Manage Mobile Online Safety and Privacy as Equals?Proceedings of the ACM on Human-Computer Interaction 6 CSCW1(2022) 1\u201328.","DOI":"10.1145\/3512904"},{"key":"e_1_3_2_2_2_1","volume-title":"Understanding the Digital Lives of Youth: Analyzing Media Shared within Safe Versus Unsafe Private Conversations on Instagram. In CHI Conference on Human Factors in Computing Systems. 1\u201314","author":"Ali Shiza","year":"2022","unstructured":"Shiza Ali , Afsaneh Razi , Seunghyun Kim , Ashwaq Alsoubai , Joshua Gracie , Munmun De\u00a0Choudhury , Pamela\u00a0 J Wisniewski , and Gianluca Stringhini . 2022 . Understanding the Digital Lives of Youth: Analyzing Media Shared within Safe Versus Unsafe Private Conversations on Instagram. In CHI Conference on Human Factors in Computing Systems. 1\u201314 . Shiza Ali, Afsaneh Razi, Seunghyun Kim, Ashwaq Alsoubai, Joshua Gracie, Munmun De\u00a0Choudhury, Pamela\u00a0J Wisniewski, and Gianluca Stringhini. 2022. Understanding the Digital Lives of Youth: Analyzing Media Shared within Safe Versus Unsafe Private Conversations on Instagram. In CHI Conference on Human Factors in Computing Systems. 1\u201314."},{"key":"e_1_3_2_2_3_1","volume-title":"From \u2018Friends with Benefits","author":"AlSoubai Ashwaq","unstructured":"Ashwaq AlSoubai , Jihye Song , Afsaneh Razi , Nurun Naher , Munmun De\u00a0Choudhury , and Pamela\u00a0 J Wisniewski . 2022. From \u2018Friends with Benefits \u2019 to \u2018Sextortion:\u2019 A Nuanced Investigation of Adolescents\u2019 Online Sexual Risk Experiences . Ashwaq AlSoubai, Jihye Song, Afsaneh Razi, Nurun Naher, Munmun De\u00a0Choudhury, and Pamela\u00a0J Wisniewski. 2022. From \u2018Friends with Benefits\u2019 to \u2018Sextortion:\u2019 A Nuanced Investigation of Adolescents\u2019 Online Sexual Risk Experiences."},{"key":"e_1_3_2_2_4_1","unstructured":"Monica Anderson and Jingjing Jiang. 2018. Teens Social Media & Technology 2018 | Pew Research Center. http:\/\/www.pewinternet.org\/2018\/05\/31\/teens-social-media-technology-2018\/  Monica Anderson and Jingjing Jiang. 2018. Teens Social Media & Technology 2018 | Pew Research Center. http:\/\/www.pewinternet.org\/2018\/05\/31\/teens-social-media-technology-2018\/"},{"key":"e_1_3_2_2_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/3359249"},{"key":"e_1_3_2_2_6_1","volume-title":"CHI 2018 - Extended Abstracts of the 2018 CHI Conference on Human Factors in Computing Systems: Engage with CHI. Association for Computing Machinery. https:\/\/doi.org\/10","author":"Ghosh Arup\u00a0Kumar","year":"2018","unstructured":"Arup\u00a0Kumar Ghosh , Karla Badillo-Urquiola , Mary\u00a0Beth Rosson , Heng Xu , John Carroll , and Pamela\u00a0 J. Wisniewski . 2018 . A matter of control or safety? Examining parental use of technical monitoring apps on teens\u2019 mobile devices . In CHI 2018 - Extended Abstracts of the 2018 CHI Conference on Human Factors in Computing Systems: Engage with CHI. Association for Computing Machinery. https:\/\/doi.org\/10 .1145\/3173574.3173768 10.1145\/3173574.3173768 Arup\u00a0Kumar Ghosh, Karla Badillo-Urquiola, Mary\u00a0Beth Rosson, Heng Xu, John Carroll, and Pamela\u00a0J. Wisniewski. 2018. A matter of control or safety? Examining parental use of technical monitoring apps on teens\u2019 mobile devices. In CHI 2018 - Extended Abstracts of the 2018 CHI Conference on Human Factors in Computing Systems: Engage with CHI. Association for Computing Machinery. https:\/\/doi.org\/10.1145\/3173574.3173768"},{"key":"e_1_3_2_2_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/2675133.2675287"},{"key":"e_1_3_2_2_8_1","unstructured":"Seunghyun Kim Afsaneh Razi Ashwaq Alsoubai Chen Ling Gianluca Stringhini Pamela\u00a0J. Wisniewski and Munmun De\u00a0Choudhury. 2022. I\u2019m Talking to You: Detecting and Differentiating between Online Harassment in Networked Public vs. Private Social Media Spaces.  Seunghyun Kim Afsaneh Razi Ashwaq Alsoubai Chen Ling Gianluca Stringhini Pamela\u00a0J. Wisniewski and Munmun De\u00a0Choudhury. 2022. I\u2019m Talking to You: Detecting and Differentiating between Online Harassment in Networked Public vs. Private Social Media Spaces."},{"key":"e_1_3_2_2_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/3476066"},{"key":"e_1_3_2_2_10_1","doi-asserted-by":"publisher","DOI":"10.1177\/1461444809342697"},{"key":"e_1_3_2_2_11_1","volume-title":"Human-in-the-Loop Machine Learning: Active learning and annotation for human-centered AI","author":"Monarch Robert\u00a0Munro","unstructured":"Robert\u00a0Munro Monarch . 2021. Human-in-the-Loop Machine Learning: Active learning and annotation for human-centered AI . Simon and Schuster . Robert\u00a0Munro Monarch. 2021. Human-in-the-Loop Machine Learning: Active learning and annotation for human-centered AI. Simon and Schuster."},{"key":"e_1_3_2_2_12_1","doi-asserted-by":"publisher","DOI":"10.1146\/annurev.med.57.121304.131257"},{"key":"e_1_3_2_2_13_1","doi-asserted-by":"crossref","unstructured":"Afsaneh Razi Ashwaq AlSoubai Seunghyun Kim Shiza Ali Gianluca Stringhini Munmun De\u00a0Choudhury and Pamela\u00a0J Wisniewski. 2022. Sliding into My DMs: Detecting Uncomfortable or Unsafe Sexual Risk Experiences within Instagram Direct Messages Grounded in the Perspective of Youth.  Afsaneh Razi Ashwaq AlSoubai Seunghyun Kim Shiza Ali Gianluca Stringhini Munmun De\u00a0Choudhury and Pamela\u00a0J Wisniewski. 2022. Sliding into My DMs: Detecting Uncomfortable or Unsafe Sexual Risk Experiences within Instagram Direct Messages Grounded in the Perspective of Youth.","DOI":"10.1145\/3579522"},{"key":"e_1_3_2_2_14_1","doi-asserted-by":"crossref","unstructured":"Afsaneh Razi Ashwaq AlSoubai Seunghyun Kim Nurun Naher Shiza Ali Gianluca Stringhini Munmun De\u00a0Choudhury and Pamela\u00a0J Wisniewski. 2022. Instagram Data Donation: A Case Study on Collecting Ecologically Valid Social Media Data for the Purpose of Adolescent Online Risk Detection. In CHI Conference on Human Factors in Computing Systems Extended Abstracts. 1\u20139.  Afsaneh Razi Ashwaq AlSoubai Seunghyun Kim Nurun Naher Shiza Ali Gianluca Stringhini Munmun De\u00a0Choudhury and Pamela\u00a0J Wisniewski. 2022. Instagram Data Donation: A Case Study on Collecting Ecologically Valid Social Media Data for the Purpose of Adolescent Online Risk Detection. In CHI Conference on Human Factors in Computing Systems Extended Abstracts. 1\u20139.","DOI":"10.1145\/3491101.3503569"},{"key":"e_1_3_2_2_15_1","doi-asserted-by":"publisher","DOI":"10.2139\/ssrn.3851317"},{"key":"e_1_3_2_2_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/3479609"},{"key":"e_1_3_2_2_17_1","volume-title":"Explainable AI: interpreting, explaining and visualizing deep learning. Vol.\u00a011700","author":"Samek Wojciech","unstructured":"Wojciech Samek , Gr\u00e9goire Montavon , Andrea Vedaldi , Lars\u00a0Kai Hansen , and Klaus-Robert M\u00fcller . 2019. Explainable AI: interpreting, explaining and visualizing deep learning. Vol.\u00a011700 . Springer Nature . Wojciech Samek, Gr\u00e9goire Montavon, Andrea Vedaldi, Lars\u00a0Kai Hansen, and Klaus-Robert M\u00fcller. 2019. Explainable AI: interpreting, explaining and visualizing deep learning. Vol.\u00a011700. Springer Nature."},{"key":"e_1_3_2_2_18_1","unstructured":"Ben Shneiderman Catherine Plaisant Maxine\u00a0S Cohen Steven Jacobs Niklas Elmqvist and Nicholas Diakopoulos. 2016. Designing the user interface: strategies for effective human-computer interaction. Pearson.  Ben Shneiderman Catherine Plaisant Maxine\u00a0S Cohen Steven Jacobs Niklas Elmqvist and Nicholas Diakopoulos. 2016. Designing the user interface: strategies for effective human-computer interaction. Pearson."},{"key":"e_1_3_2_2_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/2858036.2858317"},{"key":"e_1_3_2_2_20_1","volume-title":"Education\u2013Relationships\u2013Play Multifaceted Aspects of the Internet and Child and Youth Online Safety","author":"Wro\u0144ska Agnieszka","unstructured":"Agnieszka Wro\u0144ska , Rafa\u0142 Lew-Starowicz , and Anna Rywczy\u0144ska . 2020. Education\u2013Relationships\u2013Play Multifaceted Aspects of the Internet and Child and Youth Online Safety . Foundation for the Development of the Education System . Agnieszka Wro\u0144ska, Rafa\u0142 Lew-Starowicz, and Anna Rywczy\u0144ska. 2020. Education\u2013Relationships\u2013Play Multifaceted Aspects of the Internet and Child and Youth Online Safety. Foundation for the Development of the Education System."}],"event":{"name":"CSCW '22: Computer Supported Cooperative Work and Social Computing","location":"Virtual Event Taiwan","acronym":"CSCW '22","sponsor":["SIGCHI ACM Special Interest Group on Computer-Human Interaction"]},"container-title":["Companion Publication of the 2022 Conference on Computer Supported Cooperative Work and Social Computing"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3500868.3559710","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3500868.3559710","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T19:30:39Z","timestamp":1750188639000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3500868.3559710"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,11,8]]},"references-count":20,"alternative-id":["10.1145\/3500868.3559710","10.1145\/3500868"],"URL":"https:\/\/doi.org\/10.1145\/3500868.3559710","relation":{},"subject":[],"published":{"date-parts":[[2022,11,8]]},"assertion":[{"value":"2022-11-08","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}