{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,13]],"date-time":"2026-04-13T21:00:23Z","timestamp":1776114023443,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":22,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,6,19]],"date-time":"2023-06-19T00:00:00Z","timestamp":1687132800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"William T Grant","award":["187941"],"award-info":[{"award-number":["187941"]}]},{"DOI":"10.13039\/100000001","name":"NSF (National Science Foundation)","doi-asserted-by":"publisher","award":["CHS-184488"],"award-info":[{"award-number":["CHS-184488"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,6,19]]},"DOI":"10.1145\/3585088.3593923","type":"proceedings-article","created":{"date-parts":[[2023,6,14]],"date-time":"2023-06-14T04:06:08Z","timestamp":1686715568000},"page":"760-763","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":8,"title":["To Nudge or Not to Nudge: Co-Designing and Evaluating the Effectiveness of Adolescent Online Safety Nudges"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-6519-3742","authenticated-orcid":false,"given":"Zainab","family":"Agha","sequence":"first","affiliation":[{"name":"Department of Computer Science, Vanderbilt University, United States"}]}],"member":"320","published-online":{"date-parts":[[2023,6,19]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"CHI Conference on Human Factors in Computing Systems Extended Abstracts. 1\u20138.","author":"Agha Zainab","unstructured":"Zainab Agha, Zinan Zhang, Oluwatomisin Obajemu, Luke Shirley, and Pamela J.\u00a0Wisniewski. 2022. A Case Study on User Experience Bootcamps with Teens to Co-Design Real-Time Online Safety Interventions. In CHI Conference on Human Factors in Computing Systems Extended Abstracts. 1\u20138."},{"key":"e_1_3_2_1_2_1","volume-title":"Is that Sus? A Youth-Centric Online Risk Assessment Dashboard. CSCW\u201922 Companion","author":"Alsoubai Ashwaq","year":"2022","unstructured":"Ashwaq Alsoubai, Xavier Caddle, Ryan Doherty, Alexandra Koehler, Estefania Sanchez, Munmun De\u00a0Choudhury, and Pamela Wisniewski. 2022. MOSafely, Is that Sus? A Youth-Centric Online Risk Assessment Dashboard. CSCW\u201922 Companion (2022)."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/1710035.1710070"},{"key":"e_1_3_2_1_4_1","unstructured":"Monica Anderson. 2018. A majority of teens have experienced some form of cyberbullying. (2018)."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/2858036.2858548"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/3432930"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1111\/josh.13137"},{"key":"e_1_3_2_1_8_1","volume-title":"Solicitations to Mutual Sexting with Friends: Understanding Youth\u2019s Online Sexual Risks in Instagram Private Conversations. CSCW\u201922 Companion","author":"Dev Prema","year":"2022","unstructured":"Prema Dev, Jessica Medina, Zainab Agha, Munmun De\u00a0Choudhury, Afsaneh Razi, and Pamela Wisniewski. 2022. From Ignoring Strangers\u2019 Solicitations to Mutual Sexting with Friends: Understanding Youth\u2019s Online Sexual Risks in Instagram Private Conversations. CSCW\u201922 Companion (2022)."},{"key":"e_1_3_2_1_9_1","volume-title":"How to cope and build online resilience?","author":"Haenens Leen","year":"2013","unstructured":"Leen d\u2019Haenens, Sofie Vandoninck, and Ver\u00f3nica Donoso. 2013. How to cope and build online resilience? (2013)."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1741-3729.2012.00709.x"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-53862-9_55"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1002\/9781444316568.wiem02057"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0256822"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/3313831.3376666"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/3173574.3174097"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/3078072.3079722"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2015.07.062"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1162\/DESI_a_00207"},{"key":"e_1_3_2_1_19_1","volume-title":"Nudge: Improving decisions about health, wealth, and happiness","author":"Thaler H","year":"2009","unstructured":"Richard\u00a0H Thaler and Cass\u00a0R Sunstein. 2009. Nudge: Improving decisions about health, wealth, and happiness. Penguin."},{"key":"e_1_3_2_1_20_1","volume-title":"social media and technology","author":"Vogels A","year":"2022","unstructured":"Emily\u00a0A Vogels, Risa Gelles-Watnick, and Navid Massarat. 2022. Teens, social media and technology 2022. (2022)."},{"key":"e_1_3_2_1_21_1","volume-title":"The privacy paradox of adolescent online safety: A matter of risk prevention or risk resilience?IEEE Security & Privacy 16, 2","author":"Wisniewski Pamela","year":"2018","unstructured":"Pamela Wisniewski. 2018. The privacy paradox of adolescent online safety: A matter of risk prevention or risk resilience?IEEE Security & Privacy 16, 2 (2018), 86\u201390."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/2702123.2702240"}],"event":{"name":"IDC '23: Interaction Design and Children","location":"Chicago IL USA","acronym":"IDC '23","sponsor":["SIGCHI ACM Special Interest Group on Computer-Human Interaction"]},"container-title":["Proceedings of the 22nd Annual ACM Interaction Design and Children Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3585088.3593923","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/abs\/10.1145\/3585088.3593923","content-type":"text\/html","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3585088.3593923","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3585088.3593923","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T16:37:55Z","timestamp":1750178275000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3585088.3593923"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,6,19]]},"references-count":22,"alternative-id":["10.1145\/3585088.3593923","10.1145\/3585088"],"URL":"https:\/\/doi.org\/10.1145\/3585088.3593923","relation":{},"subject":[],"published":{"date-parts":[[2023,6,19]]},"assertion":[{"value":"2023-06-19","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}