{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,22]],"date-time":"2025-08-22T05:15:26Z","timestamp":1755839726590,"version":"3.44.0"},"publisher-location":"New York, NY, USA","reference-count":67,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,6,17]],"date-time":"2024-06-17T00:00:00Z","timestamp":1718582400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0\/"}],"funder":[{"name":"William T Foundation","award":["187941"],"award-info":[{"award-number":["187941"]}]},{"DOI":"10.13039\/501100006374","name":"National Science Foundation","doi-asserted-by":"publisher","award":["2329976, 2333207"],"award-info":[{"award-number":["2329976, 2333207"]}],"id":[{"id":"10.13039\/501100006374","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,6,17]]},"DOI":"10.1145\/3628516.3655799","type":"proceedings-article","created":{"date-parts":[[2024,6,14]],"date-time":"2024-06-14T12:32:46Z","timestamp":1718368366000},"page":"1-13","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":3,"title":["Personally Targeted Risk vs. Humor: How Online Risk Perceptions of Youth vs. Third-Party Annotators Differ based on Privately Shared Media on Instagram"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-0804-832X","authenticated-orcid":false,"given":"Jinkyung","family":"Park","sequence":"first","affiliation":[{"name":"Department of Computer Science, Vanderbilt University, United States"}]},{"ORCID":"https:\/\/orcid.org\/0009-0004-0658-7938","authenticated-orcid":false,"given":"Joshua","family":"Gracie","sequence":"additional","affiliation":[{"name":"University of Central Florida, United States"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1569-9662","authenticated-orcid":false,"given":"Ashwaq","family":"Alsoubai","sequence":"additional","affiliation":[{"name":"Vanderbilt University, United States"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5829-8004","authenticated-orcid":false,"given":"Afsaneh","family":"Razi","sequence":"additional","affiliation":[{"name":"Department of Information Science, Drexel University, United States"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6223-1029","authenticated-orcid":false,"given":"Pamela J.","family":"Wisniewski","sequence":"additional","affiliation":[{"name":"Department of Computer Science, Vanderbilt University, United States"}]}],"member":"320","published-online":{"date-parts":[[2024,6,17]]},"reference":[{"doi-asserted-by":"publisher","key":"e_1_3_2_1_1_1","DOI":"10.1145\/3585088.3593923"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_2_1","DOI":"10.1145\/3579608"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_3_1","DOI":"10.1145\/3500868.3559710"},{"key":"e_1_3_2_1_4_1","volume-title":"Proceedings of the ACM on Human-Computer Interaction 6, CSCW2","author":"Alsoubai Ashwaq","year":"2022","unstructured":"Ashwaq Alsoubai, Jihye Song, Afsaneh Razi, Nurun Naher, Munmun De\u00a0Choudhury, and Pamela\u00a0J Wisniewski. 2022. From\u2019Friends with Benefits\u2019 to\u2019Sextortion:\u2019A Nuanced Investigation of Adolescents\u2019 Online Sexual Risk Experiences. Proceedings of the ACM on Human-Computer Interaction 6, CSCW2 (2022), 1\u201332."},{"key":"e_1_3_2_1_5_1","volume-title":"Creativity and Drama: Teen Life on Social Media","author":"Anderson Monica","year":"2022","unstructured":"Monica Anderson, Emily\u00a0A Vogels, Andrew Perrin, and Lee Raine. 2022. Connection, Creativity and Drama: Teen Life on Social Media in 2022. https:\/\/www.pewresearch.org\/internet\/2022\/11\/16\/connection-creativity-and-drama-teen-life-on-social-media-in-2022\/"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_6_1","DOI":"10.1145\/3078072.3079724"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_7_1","DOI":"10.1145\/3432930"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_8_1","DOI":"10.1145\/3311927.3323133"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_9_1","DOI":"10.1016\/j.cose.2019.101710"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_10_1","DOI":"10.1145\/3290605.3300773"},{"key":"e_1_3_2_1_11_1","volume-title":"A developmental perspective on adolescent risk taking in contemporary America. New directions for child and adolescent development","author":"Baumrind Diana","year":"1987","unstructured":"Diana Baumrind. 1987. A developmental perspective on adolescent risk taking in contemporary America. New directions for child and adolescent development 1987, 37 (1987), 93\u2013125."},{"doi-asserted-by":"crossref","unstructured":"Danah Boyd Alice Marwick Parry Aftab and Maeve Koeltl. 2009. The conundrum of visibility: Youth safety and the Internet. (2009).","key":"e_1_3_2_1_12_1","DOI":"10.1080\/17482790903233465"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_13_1","DOI":"10.1016\/j.ijhcs.2022.102922"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_14_1","DOI":"10.1145\/3359249"},{"key":"e_1_3_2_1_15_1","volume-title":"The context of sexual violence: Situational predictors of self-protective actions. Violence and victims 18, 5","author":"Clay-Warner Jody","year":"2003","unstructured":"Jody Clay-Warner. 2003. The context of sexual violence: Situational predictors of self-protective actions. Violence and victims 18, 5 (2003), 543\u2013556."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_16_1","DOI":"10.1145\/3585088.3589387"},{"key":"e_1_3_2_1_17_1","volume-title":"The third-person effect in communication. Public opinion quarterly 47, 1","author":"Davison W\u00a0Phillips","year":"1983","unstructured":"W\u00a0Phillips Davison. 1983. The third-person effect in communication. Public opinion quarterly 47, 1 (1983), 1\u201315."},{"key":"e_1_3_2_1_18_1","volume-title":"Towards a rigorous science of interpretable machine learning. arXiv preprint arXiv:1702.08608","author":"Doshi-Velez Finale","year":"2017","unstructured":"Finale Doshi-Velez and Been Kim. 2017. Towards a rigorous science of interpretable machine learning. arXiv preprint arXiv:1702.08608 (2017)."},{"doi-asserted-by":"crossref","unstructured":"James\u00a0W Drisko and Tina Maschi. 2016. Content analysis. Pocket Guide to Social Work Re.","key":"e_1_3_2_1_19_1","DOI":"10.1093\/acprof:oso\/9780190215491.001.0001"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_20_1","DOI":"10.1002\/ejsp.2420250107"},{"volume-title":"Breakthroughs in statistics: Methodology and distribution","author":"Fisher Ronald\u00a0Aylmer","unstructured":"Ronald\u00a0Aylmer Fisher. 1970. Statistical methods for research workers. In Breakthroughs in statistics: Methodology and distribution. Springer, 66\u201370.","key":"e_1_3_2_1_21_1"},{"unstructured":"Jacklyn Friedman. 2017. Stop Telling Women We Need to Be Saved From Our Sexuality. https:\/\/time.com\/5015027\/stop-policing-womens-sexuality\/","key":"e_1_3_2_1_22_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_23_1","DOI":"10.1145\/3351095.3372862"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_24_1","DOI":"10.1111\/j.1460-2466.1995.tb00712.x"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_25_1","DOI":"10.1145\/3351095.3372826"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_26_1","DOI":"10.1016\/j.ijcci.2019.100146"},{"key":"e_1_3_2_1_27_1","volume-title":"Pic\u2019-Examining the Role of Peer Pressure in Adolescent Sexting. In Companion Publication of the 2021 Conference on Computer Supported Cooperative Work and Social Computing. 67\u201371","author":"Hartikainen Heidi","year":"2021","unstructured":"Heidi Hartikainen, Afsaneh Razi, and Pamela Wisniewski. 2021. \u2018If You Care About Me, You\u2019ll Send Me a Pic\u2019-Examining the Role of Peer Pressure in Adolescent Sexting. In Companion Publication of the 2021 Conference on Computer Supported Cooperative Work and Social Computing. 67\u201371."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_28_1","DOI":"10.1207\/S1532785XMEP0403_02"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_29_1","DOI":"10.1007\/978-3-319-27433-1_4"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_30_1","DOI":"10.1002\/ejsp.2420180507"},{"unstructured":"Instagram. 2021. Continuing to Make Instagram Safer for the Youngest Members of Our Community. https:\/\/about.instagram.com\/blog\/announcements\/continuing-to-make-instagram-safer-for-the-youngest-members-of-our-community","key":"e_1_3_2_1_31_1"},{"unstructured":"Instagram. 2021. Introducing Sensitive Content Control. https:\/\/about.instagram.com\/blog\/announcements\/introducing-sensitive-content-control","key":"e_1_3_2_1_32_1"},{"unstructured":"Instagram. 2022. Abuse and Spam. https:\/\/help.instagram.com\/165828726894770","key":"e_1_3_2_1_33_1"},{"key":"e_1_3_2_1_34_1","volume-title":"\u201cinfodemic\u201d: Is it masked by political ideology?Social Science & Medicine 317","author":"Juvalta Sibylle","year":"2023","unstructured":"Sibylle Juvalta, Camilla Speranza, Dominik Robin, Yassmeen El\u00a0Maohub, Julia Krasselt, Philipp Dreesen, Julia Dratva, and L\u00a0Suzanne Suggs. 2023. Young people\u2019s media use and adherence to preventive measures in the \u201cinfodemic\u201d: Is it masked by political ideology?Social Science & Medicine 317 (2023), 115596."},{"key":"e_1_3_2_1_35_1","volume-title":"Statistical notes for clinical researchers: Chi-squared test and Fisher\u2019s exact test. Restorative dentistry & endodontics 42, 2","author":"Kim Hae-Young","year":"2017","unstructured":"Hae-Young Kim. 2017. Statistical notes for clinical researchers: Chi-squared test and Fisher\u2019s exact test. Restorative dentistry & endodontics 42, 2 (2017), 152\u2013155."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_36_1","DOI":"10.1609\/icwsm.v15i1.18061"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_37_1","DOI":"10.1145\/3476066"},{"key":"e_1_3_2_1_38_1","volume-title":"Teenage social media usage statistics","author":"Laborde Susan","year":"2023","unstructured":"Susan Laborde. 2023. Teenage social media usage statistics in 2023. https:\/\/techreport.com\/statistics\/teenage-use-of-social-media-statistics\/"},{"doi-asserted-by":"crossref","unstructured":"Sonia Livingstone Lucyna Kirwil Cristina Ponte and Elisabeth Staksrud. 2014. In their own words: What bothers children online?European Journal of Communication 29 3 (2014) 271\u2013288.","key":"e_1_3_2_1_39_1","DOI":"10.1177\/0267323114521045"},{"key":"e_1_3_2_1_40_1","volume-title":"Slutpage use among US college students: the secret and social platforms of image-based sexual abuse. Archives of sexual behavior 50, 5","author":"Maas K","year":"2021","unstructured":"Megan\u00a0K Maas, Kyla\u00a0M Cary, Elizabeth\u00a0M Clancy, Bianca Klettke, Heather\u00a0L McCauley, and Jeff\u00a0R Temple. 2021. Slutpage use among US college students: the secret and social platforms of image-based sexual abuse. Archives of sexual behavior 50, 5 (2021), 2203\u20132214."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_41_1","DOI":"10.1111\/j.1460-2466.2001.tb02902.x"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_42_1","DOI":"10.1177\/009365097024002003"},{"key":"e_1_3_2_1_43_1","volume-title":"Influence of social media on alcohol use in adolescents and young adults. Alcohol research: current reviews 36, 1","author":"Moreno A","year":"2014","unstructured":"Megan\u00a0A Moreno and Jennifer\u00a0M Whitehill. 2014. Influence of social media on alcohol use in adolescents and young adults. Alcohol research: current reviews 36, 1 (2014), 91."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_44_1","DOI":"10.1145\/3411764.3445402"},{"unstructured":"Jennimaria Palomaki Olivia Rhinehart and Michael Tseng. 2018. A Case for a Range of Acceptable Annotations.. In SAD\/CrowdBias@ HCOMP. 19\u201331.","key":"e_1_3_2_1_45_1"},{"key":"e_1_3_2_1_46_1","volume-title":"Fairness in mobile phone\u2013based mental health assessment algorithms: Exploratory study. JMIR formative research 6, 6","author":"Park Jinkyung","year":"2022","unstructured":"Jinkyung Park, Ramanathan Arunachalam, Vincent Silenzio, Vivek\u00a0K Singh, 2022. Fairness in mobile phone\u2013based mental health assessment algorithms: Exploratory study. JMIR formative research 6, 6 (2022), e34366."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_47_1","DOI":"10.1145\/3578503.3583617"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_48_1","DOI":"10.1145\/3543873.3587607"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_49_1","DOI":"10.1162\/tacl_a_00293"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_50_1","DOI":"10.1145\/3579522"},{"doi-asserted-by":"crossref","unstructured":"Afsaneh Razi Ashwaq AlSoubai Seunghyun Kim Nurun Naher Shiza Ali Gianluca Stringhini Munmun De\u00a0Choudhury and Pamela\u00a0J Wisniewski. 2022. Instagram Data Donation: A Case Study on Collecting Ecologically Valid Social Media Data for the Purpose of Adolescent Online Risk Detection. In CHI Conference on Human Factors in Computing Systems Extended Abstracts. 1\u20139.","key":"e_1_3_2_1_51_1","DOI":"10.1145\/3491101.3503569"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_52_1","DOI":"10.1145\/3313831.3376400"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_53_1","DOI":"10.1145\/3479609"},{"key":"e_1_3_2_1_54_1","first-page":"1","article-title":"Instagram photos reveal predictive markers of depression","volume":"6","author":"Reece G","year":"2017","unstructured":"Andrew\u00a0G Reece and Christopher\u00a0M Danforth. 2017. Instagram photos reveal predictive markers of depression. EPJ Data Science 6 (2017), 1\u201312.","journal-title":"EPJ Data Science"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_55_1","DOI":"10.1177\/009365099026005001"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_56_1","DOI":"10.1145\/3313831.3376229"},{"key":"e_1_3_2_1_57_1","volume-title":"Integrating risk perception attitude framework and the theory of planned behavior to predict mental health promotion behaviors among young adults. Health communication","author":"Shi Jingyuan","year":"2019","unstructured":"Jingyuan Shi and Hye\u00a0Kyung Kim. 2019. Integrating risk perception attitude framework and the theory of planned behavior to predict mental health promotion behaviors among young adults. Health communication (2019)."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_58_1","DOI":"10.1109\/DCOSS.2013.59"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_59_1","DOI":"10.1145\/3027063.3053169"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_60_1","DOI":"10.1145\/3274433"},{"key":"e_1_3_2_1_61_1","volume-title":"Thematic analysis. The SAGE handbook of qualitative research in psychology 2","author":"Terry Gareth","year":"2017","unstructured":"Gareth Terry, Nikki Hayfield, Victoria Clarke, and Virginia Braun. 2017. Thematic analysis. The SAGE handbook of qualitative research in psychology 2 (2017), 17\u201337."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_62_1","DOI":"10.1109\/SP40001.2021.00028"},{"key":"e_1_3_2_1_63_1","volume-title":"Content analysis and thematic analysis: Implications for conducting a qualitative descriptive study. Nursing & health sciences 15, 3","author":"Vaismoradi Mojtaba","year":"2013","unstructured":"Mojtaba Vaismoradi, Hannele Turunen, and Terese Bondas. 2013. Content analysis and thematic analysis: Implications for conducting a qualitative descriptive study. Nursing & health sciences 15, 3 (2013), 398\u2013405."},{"key":"e_1_3_2_1_64_1","volume-title":"2020 19th IEEE International Conference on Machine Learning and Applications (ICMLA).","author":"Vishwamitra Nishant","year":"2021","unstructured":"Nishant Vishwamitra, Hongxin Hu, Feng Luo, and Long Cheng. 2021. Towards understanding and detecting cyberbullying in real-world images. In 2020 19th IEEE International Conference on Machine Learning and Applications (ICMLA)."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_65_1","DOI":"10.1016\/j.jvcir.2017.12.005"},{"key":"e_1_3_2_1_66_1","volume-title":"A systematic review of the current knowledge regarding revenge pornography and non-consensual sharing of sexually explicit media. Aggression and violent behavior 36","author":"Walker Kate","year":"2017","unstructured":"Kate Walker and Emma Sleath. 2017. A systematic review of the current knowledge regarding revenge pornography and non-consensual sharing of sexually explicit media. Aggression and violent behavior 36 (2017), 9\u201324."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_67_1","DOI":"10.1145\/2858036.2858317"}],"event":{"sponsor":["SIGCHI ACM Special Interest Group on Computer-Human Interaction"],"acronym":"IDC '24","name":"IDC '24: Interaction Design and Children","location":"Delft Netherlands"},"container-title":["Proceedings of the 23rd Annual ACM Interaction Design and Children Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3628516.3655799","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3628516.3655799","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,21]],"date-time":"2025-08-21T10:38:46Z","timestamp":1755772726000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3628516.3655799"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,6,17]]},"references-count":67,"alternative-id":["10.1145\/3628516.3655799","10.1145\/3628516"],"URL":"https:\/\/doi.org\/10.1145\/3628516.3655799","relation":{},"subject":[],"published":{"date-parts":[[2024,6,17]]},"assertion":[{"value":"2024-06-17","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}