{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,13]],"date-time":"2026-04-13T21:54:30Z","timestamp":1776117270847,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":55,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,5,2]],"date-time":"2024-05-02T00:00:00Z","timestamp":1714608000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/https:\/\/doi.org\/10.13039\/100001143","name":"William T. Grant Foundation","doi-asserted-by":"publisher","award":["#187941"],"award-info":[{"award-number":["#187941"]}],"id":[{"id":"10.13039\/https:\/\/doi.org\/10.13039\/100001143","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/https:\/\/doi.org\/10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["#IIP-2329976 #IIS-2333207"],"award-info":[{"award-number":["#IIP-2329976 #IIS-2333207"]}],"id":[{"id":"10.13039\/https:\/\/doi.org\/10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,5,2]]},"DOI":"10.1145\/3613905.3651019","type":"proceedings-article","created":{"date-parts":[[2024,5,11]],"date-time":"2024-05-11T08:15:21Z","timestamp":1715415321000},"page":"1-10","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":5,"title":["Towards a Safer Digital Future: Exploring Stakeholder Perspectives on Creating a Sustainable Youth Online Safety Community"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0006-7962-5792","authenticated-orcid":false,"given":"Sarvech","family":"Qadir","sequence":"first","affiliation":[{"name":"Department of Computer Science, Vanderbilt University, United States"}]},{"ORCID":"https:\/\/orcid.org\/0009-0000-9118-5589","authenticated-orcid":false,"given":"Andy","family":"Niser","sequence":"additional","affiliation":[{"name":"Vanderbilt University, United States"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8632-2283","authenticated-orcid":false,"given":"Xavier V","family":"Caddle","sequence":"additional","affiliation":[{"name":"Department of Computer Science, University of Central Florida, United States"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1569-9662","authenticated-orcid":false,"given":"Ashwaq","family":"Alsoubai","sequence":"additional","affiliation":[{"name":"Vanderbilt University, United States"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0804-832X","authenticated-orcid":false,"given":"Jinkyung Katie","family":"Park","sequence":"additional","affiliation":[{"name":"Department of Computer Science, Vanderbilt University, United States"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6223-1029","authenticated-orcid":false,"given":"Pamela J.","family":"Wisniewski","sequence":"additional","affiliation":[{"name":"Department of Computer Science, Vanderbilt University, United States"}]}],"member":"320","published-online":{"date-parts":[[2024,5,11]]},"reference":[{"key":"e_1_3_3_3_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/3579625"},{"key":"e_1_3_3_3_2_1","doi-asserted-by":"publisher","DOI":"10.1002\/asi.21540"},{"key":"e_1_3_3_3_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/3544549.3577045"},{"key":"e_1_3_3_3_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/3500868.3559710"},{"key":"e_1_3_3_3_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/3500868.3559710"},{"key":"e_1_3_3_3_6_1","volume-title":"Proceedings of the ACM on Human-Computer Interaction 6, CSCW2","author":"Alsoubai Ashwaq","year":"2022","unstructured":"Ashwaq Alsoubai, Jihye Song, Afsaneh Razi, Nurun Naher, Munmun De\u00a0Choudhury, and Pamela\u00a0J Wisniewski. 2022. From\u2019Friends with Benefits\u2019 to\u2019Sextortion:\u2019A Nuanced Investigation of Adolescents\u2019 Online Sexual Risk Experiences. Proceedings of the ACM on Human-Computer Interaction 6, CSCW2 (2022), 1\u201332."},{"key":"e_1_3_3_3_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/3078072.3079724"},{"key":"e_1_3_3_3_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/3022198.3026314"},{"key":"e_1_3_3_3_9_1","volume-title":"Nassereldin Abdel\u00a0Qadir Osman, and Alexey Mikhaylov","author":"Nabil Abdul\u00a0Azim Badr Amal Mohammed","year":"2022","unstructured":"Amal Mohammed Nabil Abdul\u00a0Azim Badr, Tarek\u00a0Ismail Mohamed, Nassereldin Abdel\u00a0Qadir Osman, and Alexey Mikhaylov. 2022. A review of social media website users\u2019 interaction paths with governmental accounts during the COVID-19 pandemic. In Informatics, Vol.\u00a09. MDPI, 50."},{"key":"e_1_3_3_3_10_1","volume-title":"Thematic analysis","author":"Braun Virginia","unstructured":"Virginia Braun and Victoria Clarke. 2012. Thematic analysis.American Psychological Association."},{"key":"e_1_3_3_3_11_1","doi-asserted-by":"publisher","DOI":"10.1080\/17513057.2016.1120849"},{"key":"e_1_3_3_3_12_1","volume-title":"ACM Conference on Human Factors in Computing Systems (CHI 2021)\/Social Media as a Design and Research Site in HCI: Mapping Out Opportunities and Envisioning Future Uses Workshop.","author":"Caddle Xavier","year":"2021","unstructured":"Xavier Caddle, Ashwaq Alsoubai, Afsaneh Razi, Seunghyun Kim, Shiza Ali, Gianluca Stringhini, Munmun\u00a0De Choudhury, and Pamela Wisniewski. 2021. Instagram data donation: A case for partnering with social media platforms to protect adolescents online. In ACM Conference on Human Factors in Computing Systems (CHI 2021)\/Social Media as a Design and Research Site in HCI: Mapping Out Opportunities and Envisioning Future Uses Workshop."},{"key":"e_1_3_3_3_13_1","unstructured":"Xavier Caddle Jinkyung\u00a0Katie Park and Pamela\u00a0J Wisniewski. [n. d.]. A Stakeholders\u2019 Analysis of the Sociotechnical Approaches for Protecting Youth Online. ([n. d.])."},{"key":"e_1_3_3_3_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/3567556"},{"key":"e_1_3_3_3_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/3462204.3481731"},{"key":"e_1_3_3_3_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/3595879"},{"key":"e_1_3_3_3_17_1","doi-asserted-by":"publisher","DOI":"10.1111\/isj.12215"},{"key":"e_1_3_3_3_18_1","volume-title":"Social media as an engagement tool for schools and colleges of pharmacy. American journal of pharmaceutical education 82, 4","author":"Chen Emily","year":"2018","unstructured":"Emily Chen and Margarita DiVall. 2018. Social media as an engagement tool for schools and colleges of pharmacy. American journal of pharmaceutical education 82, 4 (2018), 6562."},{"key":"e_1_3_3_3_19_1","volume-title":"Instagram versus Snapchat: Self-expression and privacy concern on social media. Telematics and informatics 35, 8","author":"Choi Tae\u00a0Rang","year":"2018","unstructured":"Tae\u00a0Rang Choi and Yongjun Sung. 2018. Instagram versus Snapchat: Self-expression and privacy concern on social media. Telematics and informatics 35, 8 (2018), 2289\u20132298."},{"key":"e_1_3_3_3_20_1","volume-title":"Young children\u2019s everyday concepts of the internet: A platform for cyber-safety education in the early years. British journal of educational technology 49, 1","author":"Edwards Susan","year":"2018","unstructured":"Susan Edwards, Andrea Nolan, Michael Henderson, Ana Mantilla, Lydia Plowman, and Helen Skouteris. 2018. Young children\u2019s everyday concepts of the internet: A platform for cyber-safety education in the early years. British journal of educational technology 49, 1 (2018), 45\u201355."},{"key":"e_1_3_3_3_21_1","doi-asserted-by":"publisher","DOI":"10.1002\/asi.23450"},{"key":"e_1_3_3_3_22_1","doi-asserted-by":"publisher","DOI":"10.5437\/08956308X5603936"},{"key":"e_1_3_3_3_23_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.technovation.2020.102125"},{"key":"e_1_3_3_3_24_1","volume-title":"Design: cultural probes. interactions 6, 1","author":"Gaver Bill","year":"1999","unstructured":"Bill Gaver, Tony Dunne, and Elena Pacenti. 1999. Design: cultural probes. interactions 6, 1 (1999), 21\u201329."},{"key":"e_1_3_3_3_25_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-44939-0_7"},{"key":"e_1_3_3_3_26_1","volume-title":"Adoption of Open Source Software: The role of social identification. Decision support systems 51, 1","author":"Gwebu L","year":"2011","unstructured":"Kholekile\u00a0L Gwebu and Jing Wang. 2011. Adoption of Open Source Software: The role of social identification. Decision support systems 51, 1 (2011), 220\u2013229."},{"key":"e_1_3_3_3_27_1","doi-asserted-by":"publisher","DOI":"10.1177\/1556264617742238"},{"key":"e_1_3_3_3_28_1","doi-asserted-by":"publisher","DOI":"10.1111\/fare.12813"},{"key":"e_1_3_3_3_29_1","volume-title":"Why not ask them? Mapping and promoting youth participation. Children and Youth services review 33, 4","author":"Head W","year":"2011","unstructured":"Brian\u00a0W Head. 2011. Why not ask them? Mapping and promoting youth participation. Children and Youth services review 33, 4 (2011), 541\u2013547."},{"key":"e_1_3_3_3_30_1","doi-asserted-by":"publisher","DOI":"10.3390\/children10081415"},{"key":"e_1_3_3_3_31_1","doi-asserted-by":"publisher","DOI":"10.1177\/1529100620946707"},{"key":"e_1_3_3_3_32_1","doi-asserted-by":"publisher","DOI":"10.1111\/isj.12113"},{"key":"e_1_3_3_3_33_1","doi-asserted-by":"publisher","DOI":"10.1111\/jcpp.12197"},{"key":"e_1_3_3_3_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/3411764.3445224"},{"key":"e_1_3_3_3_35_1","doi-asserted-by":"publisher","DOI":"10.1080\/13632752.2010.480883"},{"key":"e_1_3_3_3_36_1","volume-title":"Social media use among the youth and working class: Conditions for remediating globalization and cultural space. Media in the global context: Applications and interventions","author":"Ngwainmbi K","year":"2019","unstructured":"Emmanuel\u00a0K Ngwainmbi. 2019. Social media use among the youth and working class: Conditions for remediating globalization and cultural space. Media in the global context: Applications and interventions (2019), 49\u201393."},{"key":"e_1_3_3_3_37_1","volume-title":"Towards Resilience and Autonomy-Based Approaches for Adolescents Online Safety. Available at SSRN 4608406","author":"Park Jinkyung","year":"2023","unstructured":"Jinkyung Park, Mamtaj Akter, Naima\u00a0Samreen Ali, Zainab Agha, Ashwaq Alsoubai, and Pamela Wisniewski. 2023. Towards Resilience and Autonomy-Based Approaches for Adolescents Online Safety. Available at SSRN 4608406 (2023)."},{"key":"e_1_3_3_3_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/3543873.3587607"},{"key":"e_1_3_3_3_39_1","volume-title":"Supporting Youth Mental and Sexual Health Information Seeking in the Era of Artificial Intelligence (AI) based Conversational Agents: Current Landscape and Future Directions. Available at SSRN 4601555","author":"Park Jinkyung","year":"2023","unstructured":"Jinkyung Park, Vivek Singh, and Pamela Wisniewski. 2023. Supporting Youth Mental and Sexual Health Information Seeking in the Era of Artificial Intelligence (AI) based Conversational Agents: Current Landscape and Future Directions. Available at SSRN 4601555 (2023)."},{"key":"e_1_3_3_3_40_1","volume-title":"Going farther together: The impact of social capital on sustained participation in open source. In 2019 ieee\/acm 41st international conference on software engineering (icse)","author":"Qiu Huilian\u00a0Sophie","unstructured":"Huilian\u00a0Sophie Qiu, Alexander Nolte, Anita Brown, Alexander Serebrenik, and Bogdan Vasilescu. 2019. Going farther together: The impact of social capital on sustained participation in open source. In 2019 ieee\/acm 41st international conference on software engineering (icse). IEEE, 688\u2013699."},{"key":"e_1_3_3_3_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/3579522"},{"key":"e_1_3_3_3_42_1","first-page":"23","article-title":"Planning for Cyber Security in Schools","volume":"27","author":"Richardson D","year":"2020","unstructured":"Michael\u00a0D Richardson, Pamela\u00a0A Lemoine, Walter\u00a0E Stephens, and Robert\u00a0E Waller. 2020. Planning for Cyber Security in Schools: The Human Factor.Educational Planning 27, 2 (2020), 23\u201339.","journal-title":"The Human Factor.Educational Planning"},{"key":"e_1_3_3_3_43_1","doi-asserted-by":"publisher","DOI":"10.1145\/3479517"},{"key":"e_1_3_3_3_44_1","doi-asserted-by":"publisher","DOI":"10.1109\/TR.2015.2500367"},{"key":"e_1_3_3_3_45_1","doi-asserted-by":"publisher","DOI":"10.1287\/isre.2016.0646"},{"key":"e_1_3_3_3_46_1","doi-asserted-by":"publisher","DOI":"10.1109\/FLOSS.2009.5071352"},{"key":"e_1_3_3_3_47_1","volume-title":"The effects of trust, security and privacy in social networking: A security-based approach to understand the pattern of adoption. Interacting with computers 22, 5","author":"Shin Dong-Hee","year":"2010","unstructured":"Dong-Hee Shin. 2010. The effects of trust, security and privacy in social networking: A security-based approach to understand the pattern of adoption. Interacting with computers 22, 5 (2010), 428\u2013438."},{"key":"e_1_3_3_3_48_1","volume-title":"Ten simple rules for helping newcomers become contributors to open projects. PLoS computational biology 15, 9","author":"Sholler Dan","year":"2019","unstructured":"Dan Sholler, Igor Steinmacher, Denae Ford, Mara Averick, Mike Hoye, and Greg Wilson. 2019. Ten simple rules for helping newcomers become contributors to open projects. PLoS computational biology 15, 9 (2019), e1007296."},{"key":"e_1_3_3_3_49_1","doi-asserted-by":"publisher","DOI":"10.1142\/S0219622015500364"},{"key":"e_1_3_3_3_50_1","doi-asserted-by":"publisher","DOI":"10.1145\/2675133.2675215"},{"key":"e_1_3_3_3_51_1","doi-asserted-by":"publisher","DOI":"10.1145\/2884781.2884806"},{"key":"e_1_3_3_3_52_1","doi-asserted-by":"publisher","DOI":"10.58948\/2331-3528.1770"},{"key":"e_1_3_3_3_53_1","volume-title":"Reimagining youth suicide prevention. Critical suicidology: Transforming suicide research and prevention for the 21st century","author":"White Jennifer","year":"2016","unstructured":"Jennifer White. 2016. Reimagining youth suicide prevention. Critical suicidology: Transforming suicide research and prevention for the 21st century (2016), 244\u2013263."},{"key":"e_1_3_3_3_54_1","doi-asserted-by":"publisher","DOI":"10.1145\/2998181.2998352"},{"key":"e_1_3_3_3_55_1","volume-title":"Understanding and promoting effective engagement with digital behavior change interventions. American journal of preventive medicine 51, 5","author":"Yardley Lucy","year":"2016","unstructured":"Lucy Yardley, Bonnie\u00a0J Spring, Heleen Riper, Leanne\u00a0G Morrison, David\u00a0H Crane, Kristina Curtis, Gina\u00a0C Merchant, Felix Naughton, and Ann Blandford. 2016. Understanding and promoting effective engagement with digital behavior change interventions. American journal of preventive medicine 51, 5 (2016), 833\u2013842."}],"event":{"name":"CHI '24: CHI Conference on Human Factors in Computing Systems","location":"Honolulu HI USA","acronym":"CHI '24","sponsor":["SIGCHI ACM Special Interest Group on Computer-Human Interaction","SIGACCESS ACM Special Interest Group on Accessible Computing"]},"container-title":["Extended Abstracts of the CHI Conference on Human Factors in Computing Systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3613905.3651019","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3613905.3651019","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T23:56:53Z","timestamp":1750291013000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3613905.3651019"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,5,2]]},"references-count":55,"alternative-id":["10.1145\/3613905.3651019","10.1145\/3613905"],"URL":"https:\/\/doi.org\/10.1145\/3613905.3651019","relation":{},"subject":[],"published":{"date-parts":[[2024,5,2]]},"assertion":[{"value":"2024-05-11","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}