{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,22]],"date-time":"2025-11-22T18:29:22Z","timestamp":1763836162157,"version":"3.41.0"},"reference-count":97,"publisher":"Association for Computing Machinery (ACM)","issue":"GROUP","license":[{"start":{"date-parts":[[2022,12,29]],"date-time":"2022-12-29T00:00:00Z","timestamp":1672272000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100001143","name":"William T. Grant Foundation","doi-asserted-by":"publisher","award":["187941"],"award-info":[{"award-number":["187941"]}],"id":[{"id":"10.13039\/100001143","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["IIP-1827700"],"award-info":[{"award-number":["IIP-1827700"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["Proc. ACM Hum.-Comput. Interact."],"published-print":{"date-parts":[[2023,1]]},"abstract":"<jats:p>\n            Social service providers play a vital role in the developmental outcomes of underprivileged youth as they transition into adulthood. Educators, mental health professionals, juvenile justice officers, and child welfare caseworkers often have first-hand knowledge of the trials uniquely faced by these vulnerable youth and are charged with mitigating harmful risks, such as mental health challenges, child abuse, drug use, and sex trafficking. Yet, less is known about whether or how social service providers assess and mitigate the\n            <jats:italic>online<\/jats:italic>\n            risk experiences of youth under their care. Therefore, as part of the National Science Foundation (NSF) I-Corps program, we conducted interviews with 37 social service providers (SSPs) who work with underprivileged youth to determine what (if any) online risks are most concerning to them given their role in youth protection, how they assess or become aware of these online risk experiences, and whether they see value in the possibility of using artificial intelligence (AI) as a potential solution for online risk detection. Overall, online sexual risks (e.g., sexual grooming and abuse) and cyberbullying were the most salient concern across all social service domains, especially when these experiences crossed the boundary between the digital and the physical worlds. Yet, SSPs had to rely heavily on youth self-reports to know whether and when online risks occurred, which required building a trusting relationship with youth; otherwise, SSPs became aware only after a formal investigation had been launched. Therefore, most SSPs found value in the potential for using AI as an early detection system and to monitor youth, but they were concerned that such a solution would not be feasible due to a lack of resources to adequately respond to online incidences, access to the necessary digital trace data (e.g., social media), context, and concerns about violating the trust relationships they built with youth. Thus, such automated risk detection systems should be designed and deployed with caution, as their implementation could cause youth to mistrust adults, thereby limiting the receipt of necessary guidance and support. We add to the bodies of research on adolescent online safety and the benefits and challenges of leveraging algorithmic systems in the public sector.\n          <\/jats:p>","DOI":"10.1145\/3567556","type":"journal-article","created":{"date-parts":[[2022,12,29]],"date-time":"2022-12-29T21:22:24Z","timestamp":1672348944000},"page":"1-35","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":13,"title":["Duty to Respond"],"prefix":"10.1145","volume":"7","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-8632-2283","authenticated-orcid":false,"given":"Xavier V.","family":"Caddle","sequence":"first","affiliation":[{"name":"University of Central Florida, Orlando, FL, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7974-6742","authenticated-orcid":false,"given":"Nurun","family":"Naher","sequence":"additional","affiliation":[{"name":"University of Central Florida, Orlando, FL, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5017-766X","authenticated-orcid":false,"given":"Zachary P.","family":"Miller","sequence":"additional","affiliation":[{"name":"University of Central Florida, Oviedo , FL, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1165-3619","authenticated-orcid":false,"given":"Karla","family":"Badillo-Urquiola","sequence":"additional","affiliation":[{"name":"University of Notre Dame, Notre Dame, IN, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6223-1029","authenticated-orcid":false,"given":"Pamela J.","family":"Wisniewski","sequence":"additional","affiliation":[{"name":"Vanderbilt University, Nashville, TN, USA"}]}],"member":"320","published-online":{"date-parts":[[2022,12,29]]},"reference":[{"key":"e_1_2_1_1_1","unstructured":"Denielle Kirk L Abaquita. 2020. Understanding the Challenges Child Welfare Workers Encounter Related to Promoting the Online Safety of Foster Youth. (2020).  Denielle Kirk L Abaquita. 2020. Understanding the Challenges Child Welfare Workers Encounter Related to Promoting the Online Safety of Foster Youth. (2020)."},{"key":"e_1_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/3512904"},{"key":"e_1_2_1_3_1","volume-title":"Effects Cyberbullying of Children and Prevention Methods. In 2022 Fifth International Conference of Women in Data Science at Prince Sultan University (WiDS PSU). IEEE, 133--137","author":"Tavash Yara Al","year":"2022","unstructured":"Yara Al Tavash , Nofe Al Mussa , Alhanouf AlAjaji , and Nor Shahida Mohd Jamail . 2022 . Effects Cyberbullying of Children and Prevention Methods. In 2022 Fifth International Conference of Women in Data Science at Prince Sultan University (WiDS PSU). IEEE, 133--137 . Yara Al Tavash, Nofe Al Mussa, Alhanouf AlAjaji, and Nor Shahida Mohd Jamail. 2022. Effects Cyberbullying of Children and Prevention Methods. In 2022 Fifth International Conference of Women in Data Science at Prince Sultan University (WiDS PSU). IEEE, 133--137."},{"key":"e_1_2_1_4_1","unstructured":"Monica Anderson and Jingjing Jiang. 2018. Teens Social Media & Technology 2018 | Pew Research Center. http: \/\/www.pewinternet.org\/2018\/05\/31\/teens-social-media-technology-2018\/  Monica Anderson and Jingjing Jiang. 2018. Teens Social Media & Technology 2018 | Pew Research Center. http: \/\/www.pewinternet.org\/2018\/05\/31\/teens-social-media-technology-2018\/"},{"key":"e_1_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/3148330.3154521"},{"key":"e_1_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/3078072.3079724"},{"key":"e_1_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/3290605.3300497"},{"key":"e_1_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/3323994.3369889"},{"key":"e_1_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/3432930"},{"key":"e_1_2_1_10_1","unstructured":"Karla Badillo-Urquiola and Pamela Wisniewski. 2017. For Those Who Need it Most: Helping'At-Risk'Youth Manage Online Risks. In Badillo-Urquiola K.* Wisniewski P.\"(2017)\"For Those Who Need It Most: Helping \"At-Risk\" Youth Manage Online Risks \" Extended Abstract presented at the Workshop on Equity and Inclusivity at the 2017 ACM Conference on Interaction Design and Children (IDC 2017) Stanford CA.  Karla Badillo-Urquiola and Pamela Wisniewski. 2017. For Those Who Need it Most: Helping'At-Risk'Youth Manage Online Risks. In Badillo-Urquiola K.* Wisniewski P.\"(2017)\"For Those Who Need It Most: Helping \"At-Risk\" Youth Manage Online Risks \" Extended Abstract presented at the Workshop on Equity and Inclusivity at the 2017 ACM Conference on Interaction Design and Children (IDC 2017) Stanford CA."},{"key":"e_1_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1177\/15248380211025241"},{"key":"e_1_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1080\/10926771.2017.1330793"},{"key":"e_1_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0169839"},{"key":"e_1_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1111\/cfs.12063"},{"key":"e_1_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1542\/peds.2012-0842"},{"key":"e_1_2_1_16_1","unstructured":"Johana Bhuiyan. 2022. Facebook gave police their private data. Now this duo face abortion charges. https:\/\/www  Johana Bhuiyan. 2022. Facebook gave police their private data. Now this duo face abortion charges. https:\/\/www"},{"key":"e_1_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1007\/978--981--10--5251--4_103"},{"key":"e_1_2_1_18_1","first-page":"439","article-title":"Reality and research in the ecology of human development","volume":"119","author":"Bronfenbrenner Urie","year":"1975","unstructured":"Urie Bronfenbrenner . 1975 . Reality and research in the ecology of human development . Proceedings of the American Philosophical Society 119 , 6 (1975), 439 -- 469 . Urie Bronfenbrenner. 1975. Reality and research in the ecology of human development. Proceedings of the American Philosophical Society 119, 6 (1975), 439--469.","journal-title":"Proceedings of the American Philosophical Society"},{"volume-title":"The ecology of human development: Experiments by nature and design","author":"Bronfenbrenner Urie","key":"e_1_2_1_19_1","unstructured":"Urie Bronfenbrenner . 1979. The ecology of human development: Experiments by nature and design . Harvard university press . Urie Bronfenbrenner. 1979. The ecology of human development: Experiments by nature and design. Harvard university press."},{"key":"e_1_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/3290605.3300271"},{"key":"e_1_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2013.09.012"},{"key":"e_1_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/3462204.3481731"},{"key":"e_1_2_1_23_1","volume-title":"Shaolingyun Guo, Mengtong Chen, Camilla Kin-Ming Lo, and Patrick Ip.","author":"Chen Qiqi","year":"2022","unstructured":"Qiqi Chen , Ko Ling Chan , Shaolingyun Guo, Mengtong Chen, Camilla Kin-Ming Lo, and Patrick Ip. 2022 . Effectiveness of digital health interventions in reducing bullying and cyberbullying: a meta-analysis. Trauma, Violence, & Abuse ( 2022), 15248380221082090. Qiqi Chen, Ko Ling Chan, Shaolingyun Guo, Mengtong Chen, Camilla Kin-Ming Lo, and Patrick Ip. 2022. Effectiveness of digital health interventions in reducing bullying and cyberbullying: a meta-analysis. Trauma, Violence, & Abuse (2022), 15248380221082090."},{"key":"e_1_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.childyouth.2017.06.027"},{"key":"e_1_2_1_25_1","volume-title":"How to cope and build online resilience?","author":"Haenens Leen","year":"2013","unstructured":"Leen d' Haenens , Sofie Vandoninck , and Ver\u00f3nica Donoso . 2013. How to cope and build online resilience? ( 2013 ). Leen d'Haenens, Sofie Vandoninck, and Ver\u00f3nica Donoso. 2013. How to cope and build online resilience? (2013)."},{"key":"e_1_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1080\/07370024.2018.1437544"},{"key":"e_1_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.childyouth.2015.10.017"},{"key":"e_1_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1136\/bmj.e2683"},{"key":"e_1_2_1_29_1","volume-title":"Companion of the 2020 ACM International Conference on Supporting Group Work. 111--114","author":"Ammitzb\u00f8ll Fl\u00fcgge Asbj\u00f8rn William","year":"2020","unstructured":"Asbj\u00f8rn William Ammitzb\u00f8ll Fl\u00fcgge , Thomas Hildebrandt , and Naja Holten M\u00f8ller . 2020 . Algorithmic decision making in public services: A CSCW-perspective . In Companion of the 2020 ACM International Conference on Supporting Group Work. 111--114 . Asbj\u00f8rn William Ammitzb\u00f8ll Fl\u00fcgge, Thomas Hildebrandt, and Naja Holten M\u00f8ller. 2020. Algorithmic decision making in public services: A CSCW-perspective. In Companion of the 2020 ACM International Conference on Supporting Group Work. 111--114."},{"key":"e_1_2_1_30_1","unstructured":"Werner Geyser. 2021. GDPR and Social Media: What Data Protection and Privacy Mean for Social Media Marketers. https:\/\/influencermarketinghub.com\/gdpr-social-media\/ (Accessed on 08\/15\/2022).  Werner Geyser. 2021. GDPR and Social Media: What Data Protection and Privacy Mean for Social Media Marketers. https:\/\/influencermarketinghub.com\/gdpr-social-media\/ (Accessed on 08\/15\/2022)."},{"key":"e_1_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.geb.2013.06.013"},{"key":"e_1_2_1_32_1","volume-title":"Impact evaluation of a predictive risk modeling tool for Allegheny county's child welfare office","author":"Goldhaber-Fiebert Jeremy D","year":"2019","unstructured":"Jeremy D Goldhaber-Fiebert and Lea Prince . 2019. Impact evaluation of a predictive risk modeling tool for Allegheny county's child welfare office . Pittsburgh : Allegheny County ( 2019 ). Jeremy D Goldhaber-Fiebert and Lea Prince. 2019. Impact evaluation of a predictive risk modeling tool for Allegheny county's child welfare office. Pittsburgh: Allegheny County (2019)."},{"volume-title":"Improving Educational Outcomes for Youth in the Juvenile Justice and Child Welfare Systems through Interagency Communication and Collaboration. Practice Guide","author":"Gonsoulin Simon","key":"e_1_2_1_33_1","unstructured":"Simon Gonsoulin and NW Read . 2011. Improving Educational Outcomes for Youth in the Juvenile Justice and Child Welfare Systems through Interagency Communication and Collaboration. Practice Guide . National Evaluation and Technical Assistance Center for the Education of Children and Youth Who Are Neglected, Delinquent, or At-Risk (2011). Simon Gonsoulin and NW Read. 2011. Improving Educational Outcomes for Youth in the Juvenile Justice and Child Welfare Systems through Interagency Communication and Collaboration. Practice Guide. National Evaluation and Technical Assistance Center for the Education of Children and Youth Who Are Neglected, Delinquent, or At-Risk (2011)."},{"key":"e_1_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1080\/0886571X.2019.1696263"},{"key":"e_1_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/3449116"},{"key":"e_1_2_1_36_1","volume-title":"Technology-facilitated sexual violence: A literature review of empirical research. Trauma, violence, & abuse 19, 2","author":"Henry Nicola","year":"2018","unstructured":"Nicola Henry and Anastasia Powell . 2018. Technology-facilitated sexual violence: A literature review of empirical research. Trauma, violence, & abuse 19, 2 ( 2018 ), 195--208. Nicola Henry and Anastasia Powell. 2018. Technology-facilitated sexual violence: A literature review of empirical research. Trauma, violence, & abuse 19, 2 (2018), 195--208."},{"key":"e_1_2_1_37_1","unstructured":"Kashmir Hill. 2020. Another Arrest and Jail Time Due to a Bad Facial Recognition Match. https:\/\/www.nytimes.com\/ 2020\/12\/29\/technology\/facial-recognition-misidentify-jail.html  Kashmir Hill. 2020. Another Arrest and Jail Time Due to a Bad Facial Recognition Match. https:\/\/www.nytimes.com\/ 2020\/12\/29\/technology\/facial-recognition-misidentify-jail.html"},{"key":"e_1_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/2818048.2819940"},{"key":"e_1_2_1_39_1","unstructured":"Raquel Monique Holguin and Athena Noel Barber. 2018. Social Service Workers Knowledge on the Use of Technology for Human Trafficking. (2018).  Raquel Monique Holguin and Athena Noel Barber. 2018. Social Service Workers Knowledge on the Use of Technology for Human Trafficking. (2018)."},{"key":"e_1_2_1_40_1","volume-title":"Recognising mental health problems in children and young people. Nursing Children and Young People 19, 8","author":"Honeyman Cheryl","year":"2007","unstructured":"Cheryl Honeyman . 2007. Recognising mental health problems in children and young people. Nursing Children and Young People 19, 8 ( 2007 ). Cheryl Honeyman. 2007. Recognising mental health problems in children and young people. Nursing Children and Young People 19, 8 (2007)."},{"key":"e_1_2_1_41_1","unstructured":"Charlotte Jee and William Douglas Heaven. 2021. The therapists using AI to make therapy better. https:\/\/www. technologyreview.com\/2021\/12\/06\/1041345\/ai-nlp-mental-health-better-therapists-psychology-cbt\/  Charlotte Jee and William Douglas Heaven. 2021. The therapists using AI to make therapy better. https:\/\/www. technologyreview.com\/2021\/12\/06\/1041345\/ai-nlp-mental-health-better-therapists-psychology-cbt\/"},{"key":"e_1_2_1_42_1","unstructured":"Mark Jones. 2022. The Next Evolution of Campus Security. https:\/\/campuslifesecurity.com\/articles\/2022\/05\/23\/thenext-evolution-of-campus-security.aspx  Mark Jones. 2022. The Next Evolution of Campus Security. https:\/\/campuslifesecurity.com\/articles\/2022\/05\/23\/thenext-evolution-of-campus-security.aspx"},{"key":"e_1_2_1_43_1","unstructured":"Bruce Kamradt. 2002. Funding Mental Health Services for Youth in the Juvenile Justice System: Challenges and Opportunities.  Bruce Kamradt. 2002. Funding Mental Health Services for Youth in the Juvenile Justice System: Challenges and Opportunities."},{"key":"e_1_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.3390\/socsci8100281"},{"key":"e_1_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.childyouth.2014.09.013"},{"key":"e_1_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1145\/3476066"},{"key":"e_1_2_1_47_1","volume-title":"Creating trauma-informed systems: Child welfare, education, first responders, health care, juvenile justice. Professional psychology: Research and practice 39, 4","author":"Ko Susan J","year":"2008","unstructured":"Susan J Ko , Julian D Ford , Nancy Kassam-Adams , Steven J Berkowitz , Charles Wilson , Marleen Wong , Melissa J Brymer , and Christopher M Layne . 2008. Creating trauma-informed systems: Child welfare, education, first responders, health care, juvenile justice. Professional psychology: Research and practice 39, 4 ( 2008 ), 396. Susan J Ko, Julian D Ford, Nancy Kassam-Adams, Steven J Berkowitz, Charles Wilson, Marleen Wong, Melissa J Brymer, and Christopher M Layne. 2008. Creating trauma-informed systems: Child welfare, education, first responders, health care, juvenile justice. Professional psychology: Research and practice 39, 4 (2008), 396."},{"key":"e_1_2_1_48_1","unstructured":"John Koetsier. 2022. Doctors Using AI Supercomputer To Predict And Prevent 50% Of Mental Illness. https:\/\/www.forbes.com\/sites\/johnkoetsier\/2022\/03\/02\/doctors-using-ai-supercomputer-to-predict-andprevent-50-of-mental-illness\/'sh=51b3dbf26bb7  John Koetsier. 2022. Doctors Using AI Supercomputer To Predict And Prevent 50% Of Mental Illness. https:\/\/www.forbes.com\/sites\/johnkoetsier\/2022\/03\/02\/doctors-using-ai-supercomputer-to-predict-andprevent-50-of-mental-illness\/'sh=51b3dbf26bb7"},{"key":"e_1_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1046\/j.1525-1497.2001.016009606.x"},{"volume-title":"A handbook of child welfare: Context, knowledge, and practice","author":"Laird Joan","key":"e_1_2_1_50_1","unstructured":"Joan Laird and Ann Hartman . 1985. A handbook of child welfare: Context, knowledge, and practice . Simon and Schuster . Joan Laird and Ann Hartman. 1985. A handbook of child welfare: Context, knowledge, and practice. Simon and Schuster."},{"key":"e_1_2_1_51_1","volume-title":"Jinjuan Heidi Feng, and Harry Hochheiser","author":"Lazar Jonathan","year":"2017","unstructured":"Jonathan Lazar , Jinjuan Heidi Feng, and Harry Hochheiser . 2017 . Research Methods in Human-Computer Interaction (2 ed.). Morgan Kaufmann , Cambridge, MA. https:\/\/www.safaribooksonline.com\/library\/view\/research-methodsin\/9780128093436\/ Jonathan Lazar, Jinjuan Heidi Feng, and Harry Hochheiser. 2017. Research Methods in Human-Computer Interaction (2 ed.). Morgan Kaufmann, Cambridge, MA. https:\/\/www.safaribooksonline.com\/library\/view\/research-methodsin\/9780128093436\/"},{"key":"e_1_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jaac.2013.03.012"},{"key":"e_1_2_1_53_1","unstructured":"Sonia Livingstone Magdalena Bober and Ellen Helsper. 2005. Internet literacy among children and young people: Findings from the UK Children Go Online Project. (2005).  Sonia Livingstone Magdalena Bober and Ellen Helsper. 2005. Internet literacy among children and young people: Findings from the UK Children Go Online Project. (2005)."},{"key":"e_1_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.1080\/08838150802437396"},{"key":"e_1_2_1_55_1","unstructured":"Jackie Loffell Merle Allsopp Eric Atmore and Jo Monson. 2008. Human resources needed to give effect to children's right to social services.  Jackie Loffell Merle Allsopp Eric Atmore and Jo Monson. 2008. Human resources needed to give effect to children's right to social services."},{"key":"e_1_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.1557\/mrs.2016.103"},{"key":"e_1_2_1_57_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.childyouth.2008.04.006"},{"key":"e_1_2_1_58_1","doi-asserted-by":"publisher","DOI":"10.1007\/978--3-030--82786--1_15"},{"key":"e_1_2_1_59_1","volume-title":"Ellen Hawley McWhirter, and Anna C McWhirter","author":"McWhirter J Jeffries","year":"2016","unstructured":"J Jeffries McWhirter , Benedict T McWhirter , Ellen Hawley McWhirter, and Anna C McWhirter . 2016 . At risk youth. Cengage Learning . J Jeffries McWhirter, Benedict T McWhirter, Ellen Hawley McWhirter, and Anna C McWhirter. 2016. At risk youth. Cengage Learning."},{"key":"e_1_2_1_60_1","doi-asserted-by":"publisher","DOI":"10.1089\/cyber.2015.0081"},{"key":"e_1_2_1_61_1","doi-asserted-by":"publisher","DOI":"10.1080\/10437797.2021.1912676"},{"key":"e_1_2_1_62_1","volume-title":"Department of Children and Families","author":"FL","year":"2014","unstructured":"FL : Department of Children and Families . 2014 . Baker Act . https:\/\/www.myflfamilies.com\/service-programs\/samh\/ crisis-services\/laws\/BakerActManual.pdf FL: Department of Children and Families. 2014. Baker Act. https:\/\/www.myflfamilies.com\/service-programs\/samh\/ crisis-services\/laws\/BakerActManual.pdf"},{"key":"e_1_2_1_63_1","unstructured":"US. Department of Justice. 2014. Predictive Analytics in Law Enforcement: A Report by the Department of Justice. https:\/\/epic.org\/wp-content\/uploads\/foia\/doj\/criminal-justice-algorithms\/EPIC-16-06--15-DOJ-FOIA-20200319  US. Department of Justice. 2014. Predictive Analytics in Law Enforcement: A Report by the Department of Justice. https:\/\/epic.org\/wp-content\/uploads\/foia\/doj\/criminal-justice-algorithms\/EPIC-16-06--15-DOJ-FOIA-20200319"},{"key":"e_1_2_1_64_1","volume-title":"Department of Juvenile Justice","author":"FL","year":"2021","unstructured":"FL : Department of Juvenile Justice . 2021 . Community Assessment Tool . https:\/\/www.djj.state.fl.us\/content\/download\/ 22467\/file\/human-trafficking-screening-tool.pdf FL: Department of Juvenile Justice. 2021. Community Assessment Tool. https:\/\/www.djj.state.fl.us\/content\/download\/ 22467\/file\/human-trafficking-screening-tool.pdf"},{"key":"e_1_2_1_65_1","volume-title":"Department of Juvenile Justice","author":"FL","year":"2021","unstructured":"FL : Department of Juvenile Justice . 2021 . Community Assessment Tool . https:\/\/www.djj.state.fl.us\/partners-providersstaff\/our-approach\/risk-assessment-tools\/community-assessment-tool FL: Department of Juvenile Justice. 2021. Community Assessment Tool. https:\/\/www.djj.state.fl.us\/partners-providersstaff\/our-approach\/risk-assessment-tools\/community-assessment-tool"},{"key":"e_1_2_1_66_1","unstructured":"International Federation of Social Workers. 2014. Global Definitions of Social Work. https:\/\/www.ifsw.org\/what-issocial-work\/global-definition-of-social-work\/  International Federation of Social Workers. 2014. Global Definitions of Social Work. https:\/\/www.ifsw.org\/what-issocial-work\/global-definition-of-social-work\/"},{"key":"e_1_2_1_67_1","unstructured":"Office of the Attorney General. 2022. California Consumer Privacy Act (CCPA). https:\/\/oag.ca.gov\/privacy\/ccpa (Accessed on 08\/15\/2022).  Office of the Attorney General. 2022. California Consumer Privacy Act (CCPA). https:\/\/oag.ca.gov\/privacy\/ccpa (Accessed on 08\/15\/2022)."},{"key":"e_1_2_1_68_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.childyouth"},{"key":"e_1_2_1_69_1","doi-asserted-by":"publisher","DOI":"10.1177\/1468017316654606"},{"key":"e_1_2_1_70_1","doi-asserted-by":"publisher","DOI":"10.1177\/1079063218800469"},{"key":"e_1_2_1_71_1","doi-asserted-by":"publisher","DOI":"10.1145\/3078072.3079722"},{"key":"e_1_2_1_72_1","volume-title":"Munmun De Choudhury, and Pamela J Wisniewski","author":"Razi Afsaneh","year":"2022","unstructured":"Afsaneh Razi , Ashwaq AlSoubai , Seunghyun Kim , Nurun Naher , Shiza Ali , Gianluca Stringhini , Munmun De Choudhury, and Pamela J Wisniewski . 2022 . Instagram Data Donation: A Case Study on Collecting Ecologically Valid Social Media Data for the Purpose of Adolescent Online Risk Detection. In CHI Conference on Human Factors in Computing Systems Extended Abstracts . 1--9. Afsaneh Razi, Ashwaq AlSoubai, Seunghyun Kim, Nurun Naher, Shiza Ali, Gianluca Stringhini, Munmun De Choudhury, and Pamela J Wisniewski. 2022. Instagram Data Donation: A Case Study on Collecting Ecologically Valid Social Media Data for the Purpose of Adolescent Online Risk Detection. In CHI Conference on Human Factors in Computing Systems Extended Abstracts. 1--9."},{"key":"e_1_2_1_73_1","doi-asserted-by":"publisher","DOI":"10.1145\/3313831.3376400"},{"key":"e_1_2_1_74_1","volume-title":"Munmun De Choudhury, and Pamela J Wisniewski","author":"Razi Afsaneh","year":"2021","unstructured":"Afsaneh Razi , Seunghyun Kim , Ashwaq Alsoubai , Gianluca Stringhini , Thamar Solorio , Munmun De Choudhury, and Pamela J Wisniewski . 2021 . A Human-Centered Systematic Literature Review of the Computational Approaches for Online Sexual Risk Detection. Proceedings of the ACM on Human-Computer Interaction 5, CSCW2 (2021), 1--38. Afsaneh Razi, Seunghyun Kim, Ashwaq Alsoubai, Gianluca Stringhini, Thamar Solorio, Munmun De Choudhury, and Pamela J Wisniewski. 2021. A Human-Centered Systematic Literature Review of the Computational Approaches for Online Sexual Risk Detection. Proceedings of the ACM on Human-Computer Interaction 5, CSCW2 (2021), 1--38."},{"key":"e_1_2_1_75_1","doi-asserted-by":"publisher","DOI":"10.1037\/h0080169"},{"key":"e_1_2_1_76_1","doi-asserted-by":"publisher","DOI":"10.1073\/pnas.1908630116"},{"key":"e_1_2_1_77_1","doi-asserted-by":"publisher","DOI":"10.1145\/3479517"},{"key":"e_1_2_1_78_1","volume-title":"The role of positive youth development practices in building resilience and enhancing wellbeing for at-risk youth. Child abuse & neglect 42","author":"Sanders Jackie","year":"2015","unstructured":"Jackie Sanders , Robyn Munford , Tewaporn Thimasarn-Anwar , Linda Liebenberg , and Michael Ungar . 2015. The role of positive youth development practices in building resilience and enhancing wellbeing for at-risk youth. Child abuse & neglect 42 ( 2015 ), 40--53. Jackie Sanders, Robyn Munford, Tewaporn Thimasarn-Anwar, Linda Liebenberg, and Michael Ungar. 2015. The role of positive youth development practices in building resilience and enhancing wellbeing for at-risk youth. Child abuse & neglect 42 (2015), 40--53."},{"key":"e_1_2_1_79_1","doi-asserted-by":"publisher","DOI":"10.1145\/3313831.3376229"},{"key":"e_1_2_1_80_1","doi-asserted-by":"publisher","DOI":"10.1145\/3476089"},{"volume-title":"Participatory design: Principles and practices","author":"Schuler Douglas","key":"e_1_2_1_81_1","unstructured":"Douglas Schuler and Aki Namioka . 1993. Participatory design: Principles and practices . CRC Press . Douglas Schuler and Aki Namioka. 1993. Participatory design: Principles and practices. CRC Press."},{"key":"e_1_2_1_82_1","doi-asserted-by":"publisher","DOI":"10.1177\/1461444815626612"},{"key":"e_1_2_1_83_1","volume-title":"Perceived reasons for the negative impact of cyberbullying and traditional bullying. European journal of developmental psychology 14, 3","author":"Slonje Robert","year":"2017","unstructured":"Robert Slonje , Peter K Smith , and Ann Fris\u00e9n . 2017. Perceived reasons for the negative impact of cyberbullying and traditional bullying. European journal of developmental psychology 14, 3 ( 2017 ), 295--310. Robert Slonje, Peter K Smith, and Ann Fris\u00e9n. 2017. Perceived reasons for the negative impact of cyberbullying and traditional bullying. European journal of developmental psychology 14, 3 (2017), 295--310."},{"key":"e_1_2_1_84_1","volume-title":"Shaping the \"at-risk youth': risk, governmentality and the Finn Report. Discourse: studies in the cultural politics of education 16, 1","author":"Tait Gordon","year":"1995","unstructured":"Gordon Tait . 1995. Shaping the \"at-risk youth': risk, governmentality and the Finn Report. Discourse: studies in the cultural politics of education 16, 1 ( 1995 ), 123--134 Gordon Tait. 1995. Shaping the \"at-risk youth': risk, governmentality and the Finn Report. Discourse: studies in the cultural politics of education 16, 1 (1995), 123--134"},{"key":"e_1_2_1_85_1","doi-asserted-by":"crossref","unstructured":"Elizabeth Thompson. 2021. U.S. technology company Clearview AI violated Canadian privacy law: report. https: \/\/www.cbc.ca\/news\/politics\/technology-clearview-facial-recognition-1.5899008  Elizabeth Thompson. 2021. U.S. technology company Clearview AI violated Canadian privacy law: report. https: \/\/www.cbc.ca\/news\/politics\/technology-clearview-facial-recognition-1.5899008","DOI":"10.1016\/S0969-4765(21)00062-X"},{"key":"e_1_2_1_86_1","volume-title":"Purposive sampling as a tool for informant selection. Ethnobotany Research and applications 5","author":"Tongco Ma Dolores C","year":"2007","unstructured":"Ma Dolores C Tongco . 2007. Purposive sampling as a tool for informant selection. Ethnobotany Research and applications 5 ( 2007 ), 147--158. Ma Dolores C Tongco. 2007. Purposive sampling as a tool for informant selection. Ethnobotany Research and applications 5 (2007), 147--158."},{"key":"e_1_2_1_87_1","doi-asserted-by":"publisher","DOI":"10.1093\/oso"},{"key":"e_1_2_1_88_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11469-021-00731-8"},{"key":"e_1_2_1_89_1","unstructured":"John C Ward Michael G Dow T Saunders S Halls Kathy F Penner Kristina A Musante and N Sachs-Ericcson. 2006. Children's functional assessment rating scale.  John C Ward Michael G Dow T Saunders S Halls Kathy F Penner Kristina A Musante and N Sachs-Ericcson. 2006. Children's functional assessment rating scale."},{"key":"e_1_2_1_90_1","doi-asserted-by":"publisher","DOI":"10.1177\/0022466913479141"},{"key":"e_1_2_1_91_1","doi-asserted-by":"publisher","DOI":"10.1145\/2998181.2998352"},{"key":"e_1_2_1_92_1","doi-asserted-by":"publisher","DOI":"10.1145\/2702123.2702240"},{"key":"e_1_2_1_93_1","doi-asserted-by":"publisher","DOI":"10.1007\/978--3-030--82786--1_14"},{"key":"e_1_2_1_94_1","doi-asserted-by":"publisher","DOI":"10.1145\/2531602.2531696"},{"key":"e_1_2_1_95_1","doi-asserted-by":"publisher","DOI":"10.1145\/2858036.2858317"},{"key":"e_1_2_1_96_1","unstructured":"Ben Wolford. 2018. What is GDPR the EU's new data protection law? https:\/\/gdpr.eu\/what-is-gdpr\/ (Accessed on 08\/15\/2022).  Ben Wolford. 2018. What is GDPR the EU's new data protection law? https:\/\/gdpr.eu\/what-is-gdpr\/ (Accessed on 08\/15\/2022)."},{"key":"e_1_2_1_97_1","doi-asserted-by":"publisher","DOI":"10.1145\/3491101"}],"container-title":["Proceedings of the ACM on Human-Computer Interaction"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3567556","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3567556","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3567556","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T22:43:47Z","timestamp":1750286627000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3567556"}},"subtitle":["The Challenges Social Service Providers Face When Charged with Keeping Youth Safe Online"],"short-title":[],"issued":{"date-parts":[[2022,12,29]]},"references-count":97,"journal-issue":{"issue":"GROUP","published-print":{"date-parts":[[2023,1]]}},"alternative-id":["10.1145\/3567556"],"URL":"https:\/\/doi.org\/10.1145\/3567556","relation":{},"ISSN":["2573-0142"],"issn-type":[{"type":"electronic","value":"2573-0142"}],"subject":[],"published":{"date-parts":[[2022,12,29]]},"assertion":[{"value":"2022-12-29","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}