{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,13]],"date-time":"2026-04-13T23:16:40Z","timestamp":1776122200163,"version":"3.50.1"},"reference-count":86,"publisher":"Association for Computing Machinery (ACM)","issue":"CSCW1","license":[{"start":{"date-parts":[[2024,4,17]],"date-time":"2024-04-17T00:00:00Z","timestamp":1713312000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100006374","name":"NSF","doi-asserted-by":"publisher","award":["#IIP-2329976, #IIS-2333207, #CNS-1942610"],"award-info":[{"award-number":["#IIP-2329976, #IIS-2333207, #CNS-1942610"]}],"id":[{"id":"10.13039\/501100006374","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100006374","name":"William T. Grant Foundation","doi-asserted-by":"publisher","award":["187941"],"award-info":[{"award-number":["187941"]}],"id":[{"id":"10.13039\/501100006374","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["Proc. ACM Hum.-Comput. Interact."],"published-print":{"date-parts":[[2024,4,17]]},"abstract":"<jats:p>Research involving sensitive data often leads to valuable human-centered insights. Yet, the effects of participating in and conducting research about sensitive data with youth are poorly understood. We conducted meta-level research to improve our understanding of these effects. We did the following: (i) asked youth (aged 13-21) to share their private Instagram Direct Messages (DMs) and flag their unsafe DMs; (ii) interviewed 30 participants about the experience of reflecting on this sensitive data; (iii) interviewed research assistants (RAs, n=12) about their experience analyzing youth's data. We found that reflecting about DMs brought discomfort for participants and RAs, although both benefited from increasing their awareness about online risks, their behavior, and privacy and social media practices. Participants had high expectations for safeguarding their private data while their concerns were mitigated by the potential to improve online safety. We provide implications for ethical research practices and the development of reflective practices among participants and RAs through applying trauma-informed principles to HCI research.<\/jats:p>","DOI":"10.1145\/3637411","type":"journal-article","created":{"date-parts":[[2024,4,29]],"date-time":"2024-04-29T10:05:31Z","timestamp":1714385131000},"page":"1-31","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":12,"title":["Toward Trauma-Informed Research Practices with Youth in HCI: Caring for Participants and Research Assistants When Studying Sensitive Topics"],"prefix":"10.1145","volume":"8","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-5829-8004","authenticated-orcid":false,"given":"Afsaneh","family":"Razi","sequence":"first","affiliation":[{"name":"Drexel University, Philadelphia, PA, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3101-3686","authenticated-orcid":false,"given":"John S.","family":"Seberger","sequence":"additional","affiliation":[{"name":"Drexel University, Philadelphia, PA, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1569-9662","authenticated-orcid":false,"given":"Ashwaq","family":"Alsoubai","sequence":"additional","affiliation":[{"name":"Vanderbilt University, Nashville, TN, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7974-6742","authenticated-orcid":false,"given":"Nurun","family":"Naher","sequence":"additional","affiliation":[{"name":"University of Central Florida, Orlando, FL, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8939-264X","authenticated-orcid":false,"given":"Munmun","family":"De Choudhury","sequence":"additional","affiliation":[{"name":"Georgia Institute of Technology, Atlanta, GA, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6223-1029","authenticated-orcid":false,"given":"Pamela J.","family":"Wisniewski","sequence":"additional","affiliation":[{"name":"Vanderbilt University, Nashville, TN, USA"}]}],"member":"320","published-online":{"date-parts":[[2024,4,26]]},"reference":[{"key":"e_1_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/3334480.3383073"},{"key":"e_1_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/3491102.3501969"},{"key":"e_1_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/3579608"},{"key":"e_1_2_1_4_1","volume-title":"A conceptual analysis. Environment and behavior 8, 1","author":"Altman Irwin","year":"1976","unstructured":"Irwin Altman. 1976. A conceptual analysis. Environment and behavior 8, 1 (1976), 7--29."},{"key":"e_1_2_1_5_1","volume-title":"ACM Conference on Computer Supported Cooperative Work & Social Computing Workshop on Ethics for Studying Sociotechnical Systems in a Big Data World.","author":"Andalibi Nazanin","year":"2015","unstructured":"Nazanin Andalibi and Andrea Forte. 2015. Social computing researchers as vulnerable populations. In ACM Conference on Computer Supported Cooperative Work & Social Computing Workshop on Ethics for Studying Sociotechnical Systems in a Big Data World."},{"key":"e_1_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/3173574.3173732"},{"key":"e_1_2_1_7_1","unstructured":"Monica Anderson and Jingjing Jiang. 2018. Teens Social Media & Technology 2018 | Pew Research Center. http:\/\/www.pewinternet.org\/2018\/05\/31\/teens-social-media-technology-2018\/"},{"key":"e_1_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/3137107"},{"key":"e_1_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/3432930"},{"key":"e_1_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/2207676.2208347"},{"key":"e_1_2_1_11_1","volume-title":"The ?digital natives' debate: A critical review of the evidence. British journal of educational technology 39, 5","author":"Bennett Sue","year":"2008","unstructured":"Sue Bennett, Karl Maton, and Lisa Kervin. 2008. The ?digital natives' debate: A critical review of the evidence. British journal of educational technology 39, 5 (2008), 775--786."},{"key":"e_1_2_1_12_1","volume-title":"Memory Practices in the Sciences","author":"Bowker Geoffrey C.","unstructured":"Geoffrey C. Bowker. 2008. Memory Practices in the Sciences. MIT Press, Cambridge, MA."},{"key":"e_1_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1037\/13620-004"},{"key":"e_1_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/HICSS.2002.994089"},{"key":"e_1_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1002\/ajcp.12388"},{"key":"e_1_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/3359249"},{"key":"e_1_2_1_17_1","volume-title":"International Journal of Child-Computer Interaction","author":"Chatlani Neeraj","year":"2022","unstructured":"Neeraj Chatlani, Arianna Davis, Karla Badillo-Urquiola, Elizabeth Bonsignore, and Pamela Wisniewski. 2022. Teen as research-apprentice: A restorative justice approach for centering adolescents as the authority of their own online safety. International Journal of Child-Computer Interaction (2022), 100549."},{"key":"e_1_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/3491102.3517475"},{"key":"e_1_2_1_19_1","volume-title":"APA handbook of trauma psychology: Foundations in knowledge","author":"Dalenberg Constance J","unstructured":"Constance J Dalenberg, Elizabeth Straus, and Eve B Carlson. 2017. Defining trauma. In APA handbook of trauma psychology: Foundations in knowledge, Vol. 1. American Psychological Association, 15--33."},{"key":"e_1_2_1_20_1","volume-title":"Blurring boundaries in qualitative health research on sensitive topics. Qualitative health research 16, 6","author":"Dickson-Swift Virginia","year":"2006","unstructured":"Virginia Dickson-Swift, Erica L James, Sandra Kippen, and Pranee Liamputtong. 2006. Blurring boundaries in qualitative health research on sensitive topics. Qualitative health research 16, 6 (2006), 853--871."},{"key":"e_1_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/3415221"},{"key":"e_1_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/3491102.3501857"},{"key":"e_1_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/2901790.2901861"},{"key":"e_1_2_1_24_1","volume-title":"Graphesis: Visual forms of Knowledge Production","author":"Drucker Johanna","year":"2014","unstructured":"Johanna Drucker. 2014. Graphesis: Visual forms of Knowledge Production. Harvard University Press, Cambridge, MA."},{"key":"e_1_2_1_25_1","volume-title":"Assessing mental health in vulnerable adolescents. Nursing2020 50, 10","author":"Farley Holly R","year":"2020","unstructured":"Holly R Farley. 2020. Assessing mental health in vulnerable adolescents. Nursing2020 50, 10 (2020), 48--53."},{"key":"e_1_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/3491101.3503742"},{"key":"e_1_2_1_27_1","unstructured":"Center for Substance Abuse Treatment et al . 2014. Trauma-informed care in behavioral health services. https:\/\/www.ncbi.nlm.nih.gov\/books\/NBK207201\/"},{"key":"e_1_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/3173574.3174241"},{"key":"e_1_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/3491101.3516389"},{"key":"e_1_2_1_30_1","first-page":"1","article-title":"Building trauma-informed research competencies in social work education","volume":"41","author":"Goodwin Jordan","year":"2020","unstructured":"Jordan Goodwin and Emmy Tiderington. 2020. Building trauma-informed research competencies in social work education. Social Work Education 41, 2 (2020), 1--14.","journal-title":"Social Work Education"},{"key":"e_1_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/3449116"},{"key":"e_1_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/3462204.3481739"},{"key":"e_1_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/3290607.3311760"},{"key":"e_1_2_1_34_1","unstructured":"Larke N. Huang Rebecca Flatow Tenly Biggs Sara Afayee Kelley Smith Thomas Clark and Mary Blake. 2014. SAMHSA's Concept of Truama and Guidance for a Trauma-Informed Approach. http:\/\/hdl.handle.net\/10713\/18559 This manual introduces a concept of trauma and offers a framework for becoming a trauma-informed organization system or service sector. The manual provides a definition of trauma and a trauma-informed approach and offers 6 key principles and 10 implementation domains.."},{"key":"e_1_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/3472714.3473638"},{"key":"e_1_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1609\/icwsm.v15i1.18061"},{"key":"e_1_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11469-016-9693-z"},{"key":"e_1_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/2675133.2675154"},{"key":"e_1_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/3411764.3445178"},{"key":"e_1_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/2212776.2212714"},{"key":"e_1_2_1_41_1","volume-title":"Ethical considerations in sensitive suicide research reliant on non-clinical researchers. Research ethics 13, 3--4","author":"Mckenzie Sarah K","year":"2017","unstructured":"Sarah K Mckenzie, Cissy Li, Gabrielle Jenkin, and Sunny Collings. 2017. Ethical considerations in sensitive suicide research reliant on non-clinical researchers. Research ethics 13, 3--4 (2017), 173--183."},{"key":"e_1_2_1_42_1","volume-title":"Trauma studies in the digital age","author":"Menyh\u00e9rt Anna","unstructured":"Anna Menyh\u00e9rt. 2020. Trauma studies in the digital age. In The Routledge Companion to Literature and Trauma. Routledge, 241--256."},{"key":"e_1_2_1_43_1","volume-title":"Studying interpersonal interaction, B. M. Montgomery & S","author":"Metts Sandra","unstructured":"Sandra Metts, Susan Sprecher, and William R Cupach. 1991. Retrospective self-reports. In Studying interpersonal interaction, B. M. Montgomery & S. Duck (Ed.). Guilford Press, New York, NY, 162--178."},{"key":"e_1_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1007\/s12160-016-9830-8"},{"key":"e_1_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1037\/0022-006X.70.1.246"},{"key":"e_1_2_1_46_1","volume-title":"Privacy in Context: Technology, Policy, and the Integrity of Social Life","author":"Nissenbaum H.","unstructured":"H. Nissenbaum. 2009. Privacy in Context: Technology, Policy, and the Integrity of Social Life. Stanford University Press. https:\/\/books.google.com\/books?id=_NN1uGn1Jd8C"},{"key":"e_1_2_1_47_1","unstructured":"World Health Organization. 2021. Adolescence mental health. Retrieved 2022--12--11 from https:\/\/www.who.int\/news-room\/fact-sheets\/detail\/adolescent-mental-health\/"},{"key":"e_1_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1145\/2998181.2998224"},{"key":"e_1_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1145\/3491101.3519673"},{"key":"e_1_2_1_50_1","volume-title":"Implementing trauma-informed care in mental health services. Mental Health Practice 23, 3","author":"Portman-Thompson Kate","year":"2020","unstructured":"Kate Portman-Thompson. 2020. Implementing trauma-informed care in mental health services. Mental Health Practice 23, 3 (2020)."},{"key":"e_1_2_1_51_1","first-page":"215","article-title":"Neoliberal governance and ?responsibilization' of agents: reassessing the mechanisms of responsibility-shift in neoliberal discursive environments. Distinktion","volume":"18","author":"Pyysi\u00e4inen Jarkko","year":"2017","unstructured":"Jarkko Pyysi\u00e4inen, Darren Halpin, and Andrew Guilfoyle. 2017. Neoliberal governance and ?responsibilization' of agents: reassessing the mechanisms of responsibility-shift in neoliberal discursive environments. Distinktion: Journal of Social Theory 18, 2 (2017), 215--235.","journal-title":"Journal of Social Theory"},{"key":"e_1_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1145\/3363033"},{"key":"e_1_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1145\/3579522"},{"key":"e_1_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.1145\/3491101.3503569"},{"key":"e_1_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.1145\/3313831.3376400"},{"key":"e_1_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.1145\/3479609"},{"key":"e_1_2_1_57_1","volume-title":"Good Systems: Ethical AI for CSCW (The 22nd ACM Conference on Computer-Supported Cooperative Work and Social Computing).","author":"Razi Afsaneh","year":"2019","unstructured":"Afsaneh Razi, Seunghyun Kim, Munmun De Choudhury, and Pamela Wisniewski. 2019. Ethical considerations for adolescent online risk detection AI systems. In Good Systems: Ethical AI for CSCW (The 22nd ACM Conference on Computer-Supported Cooperative Work and Social Computing)."},{"key":"e_1_2_1_58_1","volume-title":"A synthesis of the literature on trauma-informed care. Issues in mental health nursing 36, 9","author":"Reeves Elizabeth","year":"2015","unstructured":"Elizabeth Reeves. 2015. A synthesis of the literature on trauma-informed care. Issues in mental health nursing 36, 9 (2015), 698--709."},{"key":"e_1_2_1_59_1","first-page":"88","article-title":"The right to be forgotten","volume":"64","author":"Rosen Jeffrey","year":"2011","unstructured":"Jeffrey Rosen. 2011. The right to be forgotten. Stan. L. Rev. Online 64 (2011), 88.","journal-title":"Stan. L. Rev. Online"},{"key":"e_1_2_1_60_1","doi-asserted-by":"publisher","DOI":"10.1145\/2818048.2819923"},{"key":"e_1_2_1_61_1","volume-title":"Understanding People's Use of and Perspectives on Mood-Tracking Apps: Interview Study. JMIR mental health 8, 8","author":"Schueller Stephen M","year":"2021","unstructured":"Stephen M Schueller, Martha Neary, Jocelyn Lai, and Daniel A Epstein. 2021. Understanding People's Use of and Perspectives on Mood-Tracking Apps: Interview Study. JMIR mental health 8, 8 (2021), e29368."},{"key":"e_1_2_1_62_1","doi-asserted-by":"publisher","DOI":"10.1145\/3544548.3581512"},{"key":"e_1_2_1_63_1","doi-asserted-by":"publisher","DOI":"10.1108\/JD-11--2020-0195"},{"key":"e_1_2_1_64_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00779-020-01513-0"},{"key":"e_1_2_1_65_1","doi-asserted-by":"publisher","DOI":"10.1145\/3411764.3445293"},{"key":"e_1_2_1_66_1","doi-asserted-by":"publisher","DOI":"10.1145\/3555586"},{"key":"e_1_2_1_67_1","doi-asserted-by":"publisher","DOI":"10.1145\/3491102.3502112"},{"key":"e_1_2_1_68_1","first-page":"8","article-title":"Chi-square test is statistically significant: Now what","volume":"20","author":"Sharpe Donald","year":"2015","unstructured":"Donald Sharpe. 2015. Chi-square test is statistically significant: Now what? Practical Assessment, Research, and Evaluation 20, 1 (2015), 8.","journal-title":"Practical Assessment, Research, and Evaluation"},{"key":"e_1_2_1_69_1","unstructured":"Mary Cipriano Silva. 1995. Ethical guidelines in the conduct dissemination and implementation of nursing research. (1995)."},{"key":"e_1_2_1_70_1","doi-asserted-by":"publisher","DOI":"10.1177\/1078390320970652"},{"key":"e_1_2_1_71_1","doi-asserted-by":"publisher","DOI":"10.1145\/2517899.2517908"},{"key":"e_1_2_1_72_1","doi-asserted-by":"publisher","DOI":"10.1145\/3290605.3300882"},{"key":"e_1_2_1_73_1","doi-asserted-by":"publisher","DOI":"10.3102\/0091732X18821123"},{"key":"e_1_2_1_74_1","doi-asserted-by":"publisher","DOI":"10.1145\/3411764.3445589"},{"key":"e_1_2_1_75_1","volume-title":"Youth-friendly primary-care services: how are we doing and what more needs to be done? The Lancet 369, 9572","author":"Tylee Andre","year":"2007","unstructured":"Andre Tylee, Dagmar M Haller, Tanya Graham, Rachel Churchill, and Lena A Sanci. 2007. Youth-friendly primary-care services: how are we doing and what more needs to be done? The Lancet 369, 9572 (2007), 1565--1573."},{"key":"e_1_2_1_76_1","first-page":"40","article-title":"Faking it: social desirability response bias in self-report research. Australian Journal of Advanced Nursing","volume":"25","author":"Van de Mortel Thea F","year":"2008","unstructured":"Thea F Van de Mortel. 2008. Faking it: social desirability response bias in self-report research. Australian Journal of Advanced Nursing, The 25, 4 (2008), 40--48.","journal-title":"The"},{"key":"e_1_2_1_77_1","doi-asserted-by":"publisher","DOI":"10.1145\/3517428.3544798"},{"key":"e_1_2_1_78_1","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/W19-3509"},{"key":"e_1_2_1_79_1","doi-asserted-by":"publisher","DOI":"10.1108\/JOE-09-2017-0041"},{"key":"e_1_2_1_80_1","doi-asserted-by":"publisher","DOI":"10.1145\/2818048.2820078"},{"key":"e_1_2_1_81_1","doi-asserted-by":"publisher","DOI":"10.1093\/swr\/svaa013"},{"key":"e_1_2_1_82_1","doi-asserted-by":"publisher","DOI":"10.1145\/3358904"},{"key":"e_1_2_1_83_1","doi-asserted-by":"publisher","DOI":"10.2307\/1321160"},{"key":"e_1_2_1_84_1","doi-asserted-by":"publisher","DOI":"10.1145\/2858036.2858317"},{"key":"e_1_2_1_85_1","doi-asserted-by":"publisher","DOI":"10.1145\/3173574.3173853"},{"key":"e_1_2_1_86_1","first-page":"43","article-title":"A Call for Scholar Activism","volume":"28","author":"Young Meg","year":"2021","unstructured":"Meg Young, PM Krafft, and Michael A Katell. 2021. A Call for Scholar Activism. AI Activism 28 (2021), 43.","journal-title":"AI Activism"}],"container-title":["Proceedings of the ACM on Human-Computer Interaction"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3637411","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3637411","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,22]],"date-time":"2025-08-22T17:22:52Z","timestamp":1755883372000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3637411"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,4,17]]},"references-count":86,"journal-issue":{"issue":"CSCW1","published-print":{"date-parts":[[2024,4,17]]}},"alternative-id":["10.1145\/3637411"],"URL":"https:\/\/doi.org\/10.1145\/3637411","relation":{},"ISSN":["2573-0142"],"issn-type":[{"value":"2573-0142","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,4,17]]},"assertion":[{"value":"2024-04-26","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}