{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T05:04:53Z","timestamp":1750309493861,"version":"3.41.0"},"reference-count":92,"publisher":"Association for Computing Machinery (ACM)","issue":"1","license":[{"start":{"date-parts":[[2025,1,15]],"date-time":"2025-01-15T00:00:00Z","timestamp":1736899200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"North South University's Human-Computer Interaction team and Design Inclusion and Access Lab"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM J. Comput. Sustain. Soc."],"published-print":{"date-parts":[[2025,3,31]]},"abstract":"<jats:p>\n            Teens are vulnerable online, and their risk behaviors and possible support for safe online space are studied in the Western context but unexplored in developing countries. Considering the cultural context and research gaps, we interviewed\n            <jats:italic>n<\/jats:italic>\n            = 28 teens in urban Bangladesh to investigate their unique online activities, experiences, and strategies for protecting online accounts and knowledge. They are involved in several risk-taking behaviors, including communicating with strangers without being aware of possible vulnerabilities, uncovering their lack of online safety knowledge, and being unaware of online journeys from the beginning. These teens have negative online experiences; some coping techniques, such as hiding information, changing profile settings, and unfollowing the unknowns, help them without seeking additional support. We propose design interventions regarding knowledge and awareness increment, implementing co-learning and policy, which will help teens become aware and knowledgeable at the beginning of their online usage, reducing their negative experiences in the future.\n          <\/jats:p>","DOI":"10.1145\/3704813","type":"journal-article","created":{"date-parts":[[2025,1,15]],"date-time":"2025-01-15T12:12:59Z","timestamp":1736943179000},"page":"1-22","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Teens Online Behavior and Support Interventions in Bangladesh"],"prefix":"10.1145","volume":"3","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-5788-2145","authenticated-orcid":false,"given":"Rahat Jahangir","family":"Rony","sequence":"first","affiliation":[{"name":"School of Computer Science and Informatics, Cardiff University, Cardiff, United Kingdom of Great Britain and Northern Ireland"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7715-1742","authenticated-orcid":false,"given":"Nova","family":"Ahmed","sequence":"additional","affiliation":[{"name":"North South University, Dhaka, Bangladesh"}]}],"member":"320","published-online":{"date-parts":[[2025,1,15]]},"reference":[{"key":"e_1_3_2_2_2","first-page":"1390","volume-title":"Proceedings of the 19th ACM Conference on Computer-Supported Cooperative Work & Social Computing","author":"Blackwell L.","year":"2016","unstructured":"L. Blackwell, E. Gardiner, and S. Schoenebeck. 2016. Managing expectations: Technology tensions among parents and teens. In Proceedings of the 19th ACM Conference on Computer-Supported Cooperative Work & Social Computing. ACM, New York, NY, 1390\u20131401."},{"key":"e_1_3_2_3_2","article-title":"How teenagers deal with their privacy on social network sites? Results from a national survey in France","author":"Stenger T.","year":"2010","unstructured":"T. Stenger and A. Coutant. 2010. How teenagers deal with their privacy on social network sites? Results from a national survey in France. In Proceedings of the AAAI Spring Symposium Series.","journal-title":"Proceedings of the AAAI Spring Symposium Series"},{"key":"e_1_3_2_4_2","doi-asserted-by":"crossref","first-page":"302","DOI":"10.1145\/2675133.2675293","article-title":"Preventative\" vs.\" reactive\" how parental mediation influences teens' social media privacy behaviors","author":"Wisniewski P.","year":"2015","unstructured":"P. Wisniewski, H. Jia, H. Xu, M. B. Rosson, and J. M. Carroll. 2015. Preventative\" vs.\" reactive\" how parental mediation influences teens' social media privacy behaviors. In Proceedings of the 18th ACM Conference on Computer Supported Cooperative Work & Social Computing. 302\u2013316.","journal-title":"Proceedings of the 18th ACM Conference on Computer Supported Cooperative Work & Social Computing"},{"key":"e_1_3_2_5_2","first-page":"3919","article-title":"Dear diary: Teens reflect on their weekly online risk experiences","author":"Wisniewski P.","year":"2016","unstructured":"P. Wisniewski, H. Xu, M. B. Rosson, D. F. Perkins, and J. M. Carroll. 2016. Dear diary: Teens reflect on their weekly online risk experiences. In Proceedings of the CHI Conference on Human Factors in Computing Systems. 3919\u20133930.","journal-title":"Proceedings of the CHI Conference on Human Factors in Computing Systems"},{"key":"e_1_3_2_6_2","first-page":"28","article-title":"What do teens ask their online social networks? Social search practices among high school students","author":"Forte A.","year":"2014","unstructured":"A. Forte, M. Dickard, R. Magee, and D. E. Agosto. 2014. What do teens ask their online social networks? Social search practices among high school students. In Proceedings of the 17th ACM Conference on Computer Supported Cooperative Work & Social Computing. 28\u201337.","journal-title":"Proceedings of the 17th ACM Conference on Computer Supported Cooperative Work & Social Computing"},{"key":"e_1_3_2_7_2","doi-asserted-by":"publisher","DOI":"10.1145\/2207676.2208739"},{"key":"e_1_3_2_8_2","volume-title":"Proceedings of the 5th International AAAI Conference on Weblogs and Social Media (ICWSM)","author":"Yang J.","year":"2011","unstructured":"J. Yang, M. R. Morris, J. Teevan, L. A. Adamic, and M. S. Ackerman. 2011. Culture matters: A survey study of social Q&A behavior. In Proceedings of the 5th International AAAI Conference on Weblogs and Social Media (ICWSM). AAAI."},{"key":"e_1_3_2_9_2","doi-asserted-by":"crossref","first-page":"35","DOI":"10.1145\/2908131.2908160","article-title":"Teens are from mars, adults are from venus: Analyzing and predicting age groups with behavioral characteristics in instagram","author":"Han K.","year":"2016","unstructured":"K. Han, S. Lee, J. Y. Jang, Y. Jung, and D. Lee. 2016. Teens are from mars, adults are from venus: Analyzing and predicting age groups with behavioral characteristics in instagram. In Proceedings of the 8th ACM Conference on Web Science. 35\u201344.","journal-title":"Proceedings of the 8th ACM Conference on Web Science"},{"key":"e_1_3_2_10_2","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1002\/meet.14504701025","article-title":"High school seniors' social network and other ICT use preferences and concerns","author":"Agosto D. E.","year":"2010","unstructured":"D. E. Agosto and J. Abbas. 2010. High school seniors' social network and other ICT use preferences and concerns. In Proceedings of the American Society for Information Science and Technology. 1\u201310.","journal-title":"Proceedings of the American Society for Information Science and Technology"},{"key":"e_1_3_2_11_2","first-page":"2305","article-title":"This digital life: A neighborhood-based study of adolescents' lives online","author":"Pater J. A.","year":"2015","unstructured":"J. A. Pater, A. D. Miller, and E. D. Mynatt. 2015. This digital life: A neighborhood-based study of adolescents' lives online. In Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems. 2305\u20132314.","journal-title":"Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems"},{"issue":"1","key":"e_1_3_2_12_2","doi-asserted-by":"crossref","first-page":"201","DOI":"10.1111\/j.1467-8624.2006.00865.x","article-title":"Disclosure and secrecy in adolescent\u2013parent relationships","volume":"77","author":"Smetana J. G.","year":"2006","unstructured":"J. G. Smetana, A. Metzger, D. C. Gettman, and N. Campione-Barr. 2006. Disclosure and secrecy in adolescent\u2013parent relationships. Child Dev. 77, 1 (2006), 201\u2013217.","journal-title":"Child Dev"},{"key":"e_1_3_2_13_2","first-page":"1","volume-title":"Association for Computing Machinery","author":"Davis K.","year":"2019","unstructured":"K. Davis, A. Dinhopl, and A. Hiniker. 2019. Everything's the phone: Understanding the phone's supercharged role in parent-teen relationships. Association for Computing Machinery, New York, NY, USA, 1\u201314."},{"key":"e_1_3_2_14_2","first-page":"1","article-title":"Risk vs. restriction: The tension between providing a sense of normalcy and keeping foster teens safe online","author":"Badillo-Urquiola K.","year":"2019","unstructured":"K. Badillo-Urquiola, X. Page, and P. J. Wisniewski. 2019. Risk vs. restriction: The tension between providing a sense of normalcy and keeping foster teens safe online. In Proceedings of the CHI Conference on Human Factors in Computing Systems. 1\u201314.","journal-title":"Proceedings of the CHI Conference on Human Factors in Computing Systems"},{"key":"e_1_3_2_15_2","first-page":"1","article-title":"Let's talk about sext: How adolescents seek support and advice about their online sexual experiences","author":"Razi A.","year":"2020","unstructured":"A. Razi, K. Badillo-Urquiola, and P. J. Wisniewski. 2020. Let's talk about sext: How adolescents seek support and advice about their online sexual experiences. In Proceedings of the CHI Conference on Human Factors in Computing Systems. 1\u201313.","journal-title":"Proceedings of the CHI Conference on Human Factors in Computing Systems"},{"key":"e_1_3_2_16_2","article-title":"Understanding development and usage of social networking sites: The social software performance model","author":"Dwyer C.","year":"2008","unstructured":"C. Dwyer, S. R. Hiltz, and G. Widmeyer. 2008. Understanding development and usage of social networking sites: The social software performance model. In Proceedings of the 41st Hawaii International Conference on System Sciences.","journal-title":"Proceedings of the 41st Hawaii International Conference on System Sciences"},{"key":"e_1_3_2_17_2","doi-asserted-by":"publisher","DOI":"10.1145\/3134711"},{"key":"e_1_3_2_18_2","doi-asserted-by":"crossref","first-page":"1210","DOI":"10.1145\/2998181.2998279","article-title":"They basically like destroyed the school one day on newer app features and cyberbullying in schools","author":"Singh V. K.","year":"2017","unstructured":"V. K. Singh, M. L. Radford, Q. Huang, and S. Furrer. 2017. They basically like destroyed the school one day on newer app features and cyberbullying in schools. In Proceedings of the ACM Conference on Computer Supported Cooperative Work and Social Computing. 1210\u20131216.","journal-title":"Proceedings of the ACM Conference on Computer Supported Cooperative Work and Social Computing"},{"issue":"2","key":"e_1_3_2_19_2","doi-asserted-by":"crossref","first-page":"184","DOI":"10.1002\/aps.42","article-title":"The online disinhibition effect","volume":"2","author":"Suler J.","year":"2005","unstructured":"J. Suler. 2005. The online disinhibition effect. Int. J. Appl. Psychoanal. Stud. 2, 2 (2005), 184\u2013188.","journal-title":"Int. J. Appl. Psychoanal. Stud"},{"issue":"2","key":"e_1_3_2_20_2","doi-asserted-by":"crossref","first-page":"117","DOI":"10.1016\/j.jpag.2004.01.015","article-title":"Adolescent sexuality and the internet: The good, the bad, and the URL","volume":"17","author":"Kanuga M.","year":"2004","unstructured":"M. Kanuga and W. D. Rosenfeld. 2004. Adolescent sexuality and the internet: The good, the bad, and the URL. J. Pediatr. Adolesc. Gynecol. 17, 2 (2004), 117\u2013124.","journal-title":"J. Pediatr. Adolesc. Gynecol"},{"issue":"2","key":"e_1_3_2_21_2","article-title":"The evolution of virtual violence: how mobile screens provide windows to real violence","volume":"138","author":"Boyd R. W.","year":"2016","unstructured":"R. W. Boyd and W. S. Swanson. 2016. The evolution of virtual violence: how mobile screens provide windows to real violence. Pediatrics, 138, 2 (2016).","journal-title":"Pediatrics"},{"key":"e_1_3_2_22_2","first-page":"1187","article-title":"Feelbook: A social media app for teens designed to foster positive online behavior and prevent cyberbullying","author":"Fan M.","year":"2016","unstructured":"M. Fan, L. Yu, and L. Bowler. 2016. Feelbook: A social media app for teens designed to foster positive online behavior and prevent cyberbullying. In Proceedings of the CHI Conference Extended Abstracts on Human Factors in Computing Systems. 1187\u20131192.","journal-title":"Proceedings of the CHI Conference Extended Abstracts on Human Factors in Computing Systems"},{"key":"e_1_3_2_23_2","doi-asserted-by":"crossref","first-page":"523","DOI":"10.1145\/2998181.2998236","article-title":"Parents just don't understand: Why teens don't talk to parents about their online risk experiences","author":"Wisniewski P.","year":"2017","unstructured":"P. Wisniewski, H. Xu, M. B. Rosson, and J. M. Carroll. 2017. Parents just don't understand: Why teens don't talk to parents about their online risk experiences. In Proceedings of the ACM Conference on Computer Supported Cooperative Work and Social Computing. 523\u2013540.","journal-title":"Proceedings of the ACM Conference on Computer Supported Cooperative Work and Social Computing"},{"issue":"2","key":"e_1_3_2_24_2","article-title":"Silent listeners: The evolution of privacy and disclosure on facebook","volume":"4","author":"Stutzman F.","year":"2012","unstructured":"F. Stutzman, R. Gross, and A. Acquisti. 2012. Silent listeners: The evolution of privacy and disclosure on facebook. J. Priv. Confident. 4, 2 (2012)","journal-title":"J. Priv. Confident."},{"key":"e_1_3_2_25_2","volume-title":"Teens, Privacy, and Online Social Networks: How Teens Manage Their Online Identities and Personal Information in the Age of MySpace","author":"Lenhart A.","year":"2007","unstructured":"A. Lenhart and M. Madden. 2007. Teens, Privacy, and Online Social Networks: How Teens Manage Their Online Identities and Personal Information in the Age of MySpace. Pew Internet & American Life Project Report."},{"key":"e_1_3_2_26_2","doi-asserted-by":"crossref","first-page":"583","DOI":"10.1145\/2675133.2675287","article-title":"Risk-taking as a learning process for shaping teen's online information privacy behaviors","author":"Jia H.","year":"2015","unstructured":"H. Jia, P. J. Wisniewski, H. Xu, M. B. Rosson, and J. M. Carroll. 2015. Risk-taking as a learning process for shaping teen's online information privacy behaviors. In Proceedings of the 18th ACM Conference on Computer Supported Cooperative Work & Social Computing. 583\u2013599.","journal-title":"Proceedings of the 18th ACM Conference on Computer Supported Cooperative Work & Social Computing"},{"key":"e_1_3_2_27_2","first-page":"4029","article-title":"Resilience mitigates the negative effects of adolescent internet addiction and online risk exposure","author":"Wisniewski P.","year":"2015","unstructured":"P. Wisniewski, H. Jia, N. Wang, S. Zheng, H. Xu, M. B. Rosson, and J. M. Carroll. 2015. Resilience mitigates the negative effects of adolescent internet addiction and online risk exposure. In Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems. 4029\u20134038.","journal-title":"Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems"},{"key":"e_1_3_2_28_2","unstructured":"Adolescents and Young People of Bangladesh. Retrieved from https:\/\/www.thedailystar.net\/adolescents-and-young-people-of-bangladesh-54257"},{"key":"e_1_3_2_29_2","unstructured":"Massive Children's Presence on Net Alarming. Retrieved from https:\/\/en.prothomalo.com\/bangladesh\/news\/173386\/Massive-children-s-presence-on-net-alarming"},{"key":"e_1_3_2_30_2","unstructured":"Education Board Results. Retrieved March 2020 from http:\/\/www.educationboardresults.gov.bd."},{"key":"e_1_3_2_31_2","unstructured":"British Council Exam Cambridge. Retrieved March 2020 from https:\/\/www.britishcouncil.org.bd\/en\/exam\/cambridge"},{"key":"e_1_3_2_32_2","unstructured":"British Council Exam IGCSE-School. Retrieved March 2020 from https:\/\/www.britishcouncil.org.bd\/en\/exam\/igcse-school"},{"key":"e_1_3_2_33_2","unstructured":"ICT in Education: a2i. Retrieved from https:\/\/a2i.gov.bd\/wp-content\/uploads\/2017\/11\/33-ICT-in-Education_09_Janu_14.pdf"},{"key":"e_1_3_2_34_2","unstructured":"Interviewing Children: Guidelines for Journalists. Accessed from https:\/\/dartcenter.org\/content\/interviewing-children-guide-for-journalists"},{"key":"e_1_3_2_35_2","first-page":"211","article-title":"Interaction design research with adolescents: Methodological challenges and best practices","author":"Poole E. S.","year":"2013","unstructured":"E. S. Poole and T. Peyton. 2013. Interaction design research with adolescents: Methodological challenges and best practices. In Proceedings of the 12th International Conference on Interaction Design and Children. 211\u2013217.","journal-title":"Proceedings of the 12th International Conference on Interaction Design and Children"},{"key":"e_1_3_2_36_2","unstructured":"Why Is Bangladeshi School Education So Dependent on Coaching Centres? Retrieved from https:\/\/www.dhakatribune.com\/opinion\/special\/2017\/12\/25\/fault-coaching-centre-classes\/"},{"key":"e_1_3_2_37_2","unstructured":"Teachers Can't Take Coaching Classes. Retrieved from https:\/\/www.thedailystar.net\/country\/news\/teachers-cannot-run-coaching-classes-1698811"},{"key":"e_1_3_2_38_2","doi-asserted-by":"publisher","DOI":"10.4324\/9780203793206"},{"key":"e_1_3_2_39_2","doi-asserted-by":"publisher","DOI":"10.1191\/1478088706qp063oa"},{"key":"e_1_3_2_40_2","doi-asserted-by":"publisher","DOI":"10.1111\/j.1365-2648.2007.04569.x"},{"key":"e_1_3_2_41_2","doi-asserted-by":"crossref","first-page":"129","DOI":"10.1145\/2632048.2632107","article-title":"Intruders versus intrusiveness: Teens' and parents' perspectives on home-entryway surveillance","author":"Ur B.","year":"2014","unstructured":"B. Ur, J. Jung, and S. Schechter. 2014. Intruders versus intrusiveness: Teens' and parents' perspectives on home-entryway surveillance. In Proceedings of the ACM International Joint Conference on Pervasive and Ubiquitous Computing. 129\u2013139.","journal-title":"Proceedings of the ACM International Joint Conference on Pervasive and Ubiquitous Computing"},{"key":"e_1_3_2_42_2","doi-asserted-by":"crossref","first-page":"394","DOI":"10.1145\/3311927.3323133","article-title":"Stranger danger! Social media app features co-designed with children to keep them safe online","author":"Badillo-Urquiola K.","year":"2019","unstructured":"K. Badillo-Urquiola, D. Smriti, B. McNally, E. Golub, E. Bonsignore, and P. J. Wisniewski. 2019. Stranger danger! Social media app features co-designed with children to keep them safe online. In Proceedings of the 18th ACM International Conference on Interaction Design and Children. 394\u2013406.","journal-title":"Proceedings of the 18th ACM International Conference on Interaction Design and Children"},{"key":"e_1_3_2_43_2","article-title":"Mom thinks, technology is my enemy: A teen perspective","author":"Chowdhury A.","year":"2020","unstructured":"A. Chowdhury, A. Chowdhury, R. J. Rony, N. Ahmed, and M. Bhuiyan. 2020. Mom thinks, technology is my enemy: A teen perspective. In Proceedings of the CHI HCI across Borders Symposium (HCIxB\u201920).","journal-title":"Proceedings of the CHI HCI across Borders Symposium (HCIxB\u201920)"},{"key":"e_1_3_2_44_2","article-title":"Understanding teens online awareness and knowledge regarding cybersecurity in bangladesh","author":"Rony R. J.","year":"2020","unstructured":"R. J. Rony, P. A. Partho Anthony D' Costa, and N. Ahmed. 2020. Understanding teens online awareness and knowledge regarding cybersecurity in bangladesh. In Proceedings of the CHI HCI across Borders Symposium (HCIxB\u201920).","journal-title":"Proceedings of the CHI HCI across Borders Symposium (HCIxB\u201920)"},{"key":"e_1_3_2_45_2","first-page":"1","article-title":"Privacy vulnerabilities in public digital service centers in dhaka, bangladesh","author":"Haque S. T.","year":"2020","unstructured":"S. T. Haque, M. R. Haque, S. Nandy, P. Chandra, M. N. Al-Ameen, S. Guha, and S. I. Ahmed. 2020. Privacy vulnerabilities in public digital service centers in dhaka, bangladesh. In Proceedings of the International Conference on Information and Communication Technologies and Development. 1\u201312.","journal-title":"Proceedings of the International Conference on Information and Communication Technologies and Development"},{"key":"e_1_3_2_46_2","first-page":"4029","article-title":"Resilience mitigates the negative effects of adolescent internet addiction and online risk exposure","author":"Wisniewski P.","year":"2015","unstructured":"P. Wisniewski, H. Jia, N. Wang, S. Zheng, H. Xu, M. B. Rosson, and J. M. Carroll. 2015. Resilience mitigates the negative effects of adolescent internet addiction and online risk exposure. In Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems. 4029\u20134038.","journal-title":"Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems"},{"key":"e_1_3_2_47_2","first-page":"1","article-title":"Everyone has some personal stuff\" designing to support digital privacy with shared mobile phone use in bangladesh","author":"Ahmed S. I.","year":"2019","unstructured":"S. I. Ahmed, M. R. Haque, I. Haider, J. Chen, and N. Dell. 2019. Everyone has some personal stuff\" designing to support digital privacy with shared mobile phone use in bangladesh. In Proceedings of the CHI Conference on Human Factors in Computing Systems. 1\u201313.","journal-title":"Proceedings of the CHI Conference on Human Factors in Computing Systems"},{"key":"e_1_3_2_48_2","doi-asserted-by":"publisher","DOI":"10.1037\/0022-3514.86.2.320"},{"key":"e_1_3_2_49_2","doi-asserted-by":"publisher","DOI":"10.1146\/annurev.publhealth.26.021304.144357"},{"key":"e_1_3_2_50_2","article-title":"F.T.C. hits musical.ly with record fine for child privacy violation","author":"Kang Cecilia","year":"2019","unstructured":"Cecilia Kang. 2019. F.T.C. hits musical.ly with record fine for child privacy violation. The New York Times. Retrieved March 28, 2019 from https:\/\/www.nytimes.com\/2019\/02\/27\/technology\/ftc-tiktok-child-privacy-fine.html","journal-title":"The New York Times"},{"key":"e_1_3_2_51_2","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2018.1870874"},{"key":"e_1_3_2_52_2","doi-asserted-by":"crossref","first-page":"51","DOI":"10.1145\/2998181.2998352","article-title":"Parental control vs. teen self-regulation: Is there a middle ground for mobile online safety","author":"Wisniewski P.","year":"2017","unstructured":"P. Wisniewski, A. K. Ghosh, H. Xu, M. B. Rosson, and J. M. Carroll. 2017. Parental control vs. teen self-regulation: Is there a middle ground for mobile online safety? In Proceedings of the ACM Conference on Computer Supported Cooperative Work and Social Computing. 51\u201369.","journal-title":"Proceedings of the ACM Conference on Computer Supported Cooperative Work and Social Computing"},{"key":"e_1_3_2_53_2","doi-asserted-by":"publisher","DOI":"10.1108\/IntR-02-2017-0077"},{"key":"e_1_3_2_54_2","first-page":"1","article-title":"Risk vs. Restriction: The tension between providing a sense of normalcy and keeping foster teens safe online","author":"Badillo-Urquiola K.","year":"2019","unstructured":"K. Badillo-Urquiola, X. Page, and P. J. Wisniewski. 2019. Risk vs. Restriction: The tension between providing a sense of normalcy and keeping foster teens safe online. In Proceedings of the CHI Conference on Human Factors in Computing Systems. 1\u201314.","journal-title":"Proceedings of the CHI Conference on Human Factors in Computing Systems"},{"key":"e_1_3_2_55_2","first-page":"17","article-title":"Abandoned but not forgotten: Providing access while protecting foster youth from online risks","author":"Badillo-Urquiola K.","year":"2017","unstructured":"K. Badillo-Urquiola, S. Harpin, and P. Wisniewski. 2017. Abandoned but not forgotten: Providing access while protecting foster youth from online risks. In Proceedings of the Conference on Interaction Design and Children. 17\u201326.","journal-title":"Proceedings of the Conference on Interaction Design and Children"},{"key":"e_1_3_2_56_2","unstructured":"Introducing ICT in Primary Education. Retrieveded from https:\/\/www.dhakatribune.com\/opinion\/2017\/12\/09\/introducing-ict-primary-education"},{"key":"e_1_3_2_57_2","unstructured":"ICT in Education: Its Impact Analysis. Retrieved from https:\/\/www.daily-sun.com\/arcprint\/details\/380823\/ICT-in-education:-Its-impact-analysis\/2019-03-28"},{"key":"e_1_3_2_58_2","doi-asserted-by":"publisher","DOI":"10.1145\/3155050"},{"key":"e_1_3_2_59_2","first-page":"127","article-title":"Privacy is not for me, it's for those rich women: Performative privacy practices on mobile phones by women in south asia","author":"Sambasivan N.","year":"2018","unstructured":"N. Sambasivan, G. Checkley, A. Batool, N. Ahmed, D. Nemer, L. S. Gayt\u00e1n-Lugo, and E. Churchill. 2018. Privacy is not for me, it's for those rich women: Performative privacy practices on mobile phones by women in south asia. In Proceedings of the 14th Symposium on Usable Privacy and Security (SOUPS\u201918). 127\u2013142.","journal-title":"Proceedings of the 14th Symposium on Usable Privacy and Security (SOUPS\u201918)"},{"key":"e_1_3_2_60_2","volume-title":"Proceedings of the 10th International Conference on Information and Communication Technologies and Development","author":"Nova F. F.","year":"2019","unstructured":"F. F. Nova, M. D. Rifat, P. Saha, S. I. Ahmed, and S. Guha. 2019. Online sexual harassment over anonymous social media in Bangladesh. In Proceedings of the 10th International Conference on Information and Communication Technologies and Development. ACM, New York, NY."},{"key":"e_1_3_2_61_2","first-page":"437","article-title":"Residual mobilities: Infrastructural displacement and post-colonial computing in Bangladesh","author":"Ahmed S. I.","year":"2015","unstructured":"S. I. Ahmed, N. J. Mim, and S. J. Jackson. 2015. Residual mobilities: Infrastructural displacement and post-colonial computing in Bangladesh. In Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems. 437\u2013446.","journal-title":"Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems"},{"key":"e_1_3_2_62_2","doi-asserted-by":"publisher","DOI":"10.1145\/3134652"},{"key":"e_1_3_2_63_2","first-page":"906","article-title":"Privacy, security, and surveillance in the Global South: A study of biometric mobile SIM registration in Bangladesh","author":"Ahmed S. I.","year":"2017","unstructured":"S. I. Ahmed, M. R. Haque, S. Guha, M. R. Rifat, and N. Dell. 2017. Privacy, security, and surveillance in the Global South: A study of biometric mobile SIM registration in Bangladesh. In Proceedings of the CHI Conference on Human Factors in Computing Systems. 906\u2013918.","journal-title":"Proceedings of the CHI Conference on Human Factors in Computing Systems"},{"key":"e_1_3_2_64_2","first-page":"1","article-title":"Computing beyond gender-imposed limits","author":"Ahmed S. I.","year":"2016","unstructured":"S. I. Ahmed, N. Ahmed, F. Hussain, and N. Kumar. 2016. Computing beyond gender-imposed limits. In Proceedings of the 2nd Workshop on Computing within Limits. 1\u20137.","journal-title":"Proceedings of the 2nd Workshop on Computing within Limits"},{"key":"e_1_3_2_65_2","unstructured":"Times Now News. Retrieved from https:\/\/www.timesnownews.com\/mirror-now\/crime\/article\/tiktok-stunt-backfires-teen-suffocates-to-death-in-front-of-friends\/540827"},{"issue":"4","key":"e_1_3_2_66_2","doi-asserted-by":"crossref","first-page":"246","DOI":"10.1093\/inthealth\/ihy019","article-title":"Insufficient physical activity in combination with high screen time is associated with adolescents\u2019 psychosocial difficulties","volume":"10","author":"Khan A.","year":"2018","unstructured":"A. Khan, R. Uddin, and N. W. Burton. 2018. Insufficient physical activity in combination with high screen time is associated with adolescents\u2019 psychosocial difficulties. Int. Health 10, 4 (2018), 246\u2013251","journal-title":"Int. Health"},{"key":"e_1_3_2_67_2","doi-asserted-by":"publisher","DOI":"10.1111\/jora.12265"},{"issue":"2","key":"e_1_3_2_68_2","doi-asserted-by":"crossref","first-page":"55","DOI":"10.1111\/j.1467-8721.2007.00475.x","article-title":"Risk taking in adolescence: New perspectives from brain and behavioral science","volume":"16","author":"Steinberg L.","year":"2007","unstructured":"L. Steinberg. 2007. Risk taking in adolescence: New perspectives from brain and behavioral science. Curr. Direct. Psychol. Sci. 16, 2 (2007), 55\u201359.","journal-title":"Curr. Direct. Psychol. Sci."},{"issue":"3","key":"e_1_3_2_69_2","doi-asserted-by":"crossref","first-page":"1005","DOI":"10.1353\/sof.2002.0008","article-title":"Evaluating the role of \u201cnothing to lose\u201d attitudes on risky behavior in adolescence","volume":"80","author":"Harris K. M.","year":"2002","unstructured":"K. M. Harris, G. J. Duncan, and J. Boisjoly. 2002. Evaluating the role of \u201cnothing to lose\u201d attitudes on risky behavior in adolescence. Soc. Forces 80, 3 (2002), 1005\u20131039.","journal-title":"Soc. Forces"},{"issue":"8","key":"e_1_3_2_70_2","doi-asserted-by":"crossref","first-page":"1407","DOI":"10.1111\/risa.12369","article-title":"Adolescents\u2019 and young adults\u2019 online risk taking: The role of gist and verbatim representations","volume":"35","author":"White C. M.","year":"2015","unstructured":"C. M. White, M. Gummerum, and Y. Hanoch. 2015. Adolescents\u2019 and young adults\u2019 online risk taking: The role of gist and verbatim representations. Risk Anal. 35, 8 (2015), 1407\u20131422.","journal-title":"Risk Anal"},{"issue":"1","key":"e_1_3_2_71_2","article-title":"Conceptual approaches to adolescent online risk-taking","volume":"4","author":"Stamoulis K.","year":"2010","unstructured":"K. Stamoulis and F. Farley. 2010. Conceptual approaches to adolescent online risk-taking. Cyberpsychol.: J. Psychosoc. Res. Cyberspace 4, 1 (2010).","journal-title":"Cyberpsychol.: J. Psychosoc. Res. Cyberspace"},{"key":"e_1_3_2_72_2","first-page":"564","volume-title":"Proceedings of the IEEE 3rd International Conference on Communication Software and Networks","author":"Mohammad N.","year":"2011","unstructured":"N. Mohammad. 2011. Need to implement the communication technology law and policy to protect the human rights in Bangladesh: An approach for sustainble development. In Proceedings of the IEEE 3rd International Conference on Communication Software and Networks. IEEE, 564\u2013568."},{"key":"e_1_3_2_73_2","first-page":"1","article-title":"Digital silence and liberating stories: During a student-driven movement","author":"Ahmed N.","year":"2019","unstructured":"N. Ahmed, Z. Tasnim, and J. Jones. 2019. Digital silence and liberating stories: During a student-driven movement. In Extended Abstracts of the CHI Conference on Human Factors in Computing Systems. 1\u201310.","journal-title":"Extended Abstracts of the CHI Conference on Human Factors in Computing Systems"},{"key":"e_1_3_2_74_2","doi-asserted-by":"crossref","first-page":"78","DOI":"10.1515\/9783110659054-005","article-title":"5 From student activists to muktibahini: Students, mass violence and the bangladesh liberation war","author":"Christiansen S.","year":"2019","unstructured":"S. Christiansen. 2019. 5 From student activists to muktibahini: Students, mass violence and the bangladesh liberation war. In Genocide and Mass Violence in Asia. 78.","journal-title":"Genocide and Mass Violence in Asia"},{"issue":"4","key":"e_1_3_2_75_2","doi-asserted-by":"crossref","first-page":"543","DOI":"10.1080\/146235022000000463","article-title":"Atrocities against humanity during the liberation war in Bangladesh: A case of genocide","volume":"4","author":"Akmam W.","year":"2002","unstructured":"W. Akmam. 2002. Atrocities against humanity during the liberation war in Bangladesh: A case of genocide. J. Genocide Res. 4, 4 (2002), 543\u2013559.","journal-title":"J. Genocide Res."},{"key":"e_1_3_2_76_2","article-title":"Co-design of innovations with teachers: Definition and dynamics","author":"Roschelle J.","year":"2006","unstructured":"J. Roschelle, W. Penuel, and N. Shechtman. 2006. Co-design of innovations with teachers: Definition and dynamics. In Proceedings of the 7th International Conference on Learning Sciences (ICLS'06).","journal-title":"Proceedings of the 7th International Conference on Learning Sciences (ICLS'06)"},{"key":"e_1_3_2_77_2","first-page":"101","article-title":"Open coding","author":"Strauss A.","year":"1990","unstructured":"A. Strauss and J. Corbin. 1990. Open coding. In Basics of Qualitative Research: Grounded Theory Procedures and Techniques. 101\u2013121.","journal-title":"Basics of Qualitative Research: Grounded Theory Procedures and Techniques"},{"key":"e_1_3_2_78_2","volume-title":"Transforming Qualitative Information: Thematic Analysis and Code Development","author":"Boyatzis R. E.","year":"1998","unstructured":"R. E. Boyatzis. 1998. Transforming Qualitative Information: Thematic Analysis and Code Development. Sage."},{"key":"e_1_3_2_79_2","doi-asserted-by":"publisher","DOI":"10.1037\/a0026980"},{"key":"e_1_3_2_80_2","doi-asserted-by":"publisher","DOI":"10.1177\/1461444814543995"},{"key":"e_1_3_2_81_2","doi-asserted-by":"publisher","DOI":"10.1089\/cyber.2019.0764"},{"issue":"3","key":"e_1_3_2_82_2","first-page":"205630512110338","article-title":"How black teen girls navigate social media to form romantic relationships","volume":"7","author":"Weser V. U.","year":"2021","unstructured":"V. U. Weser, I. Opara, B. E. Sands, C. S. F. Fernandes, and K. D. Hieftje. 2021. How black teen girls navigate social media to form romantic relationships. Soc. Media Soc. 7, 3 (2021), 20563051211033823.","journal-title":"Soc. Media Soc."},{"key":"e_1_3_2_83_2","doi-asserted-by":"publisher","DOI":"10.1145\/3134711"},{"key":"e_1_3_2_84_2","unstructured":"British Council Cambridge International Exam Fees. Retrieved from https:\/\/www.britishcouncil.org.bd\/sites\/default\/files\/cambridge_international_-_exam_fees_for_june_2020.pdf"},{"issue":"6","key":"e_1_3_2_85_2","doi-asserted-by":"crossref","first-page":"518","DOI":"10.1037\/0003-066X","article-title":"Culture and social support","volume":"63","author":"Kim H. S.","year":"2008","unstructured":"H. S. Kim, D. K. Sherman, and S. E. Taylor. 2008. Culture and social support. Am. Psychol. 63, 6 (2008), 518.","journal-title":"Am. Psychol."},{"key":"e_1_3_2_86_2","unstructured":"Blogger Rajib Murder. Retrieved from https:\/\/www.thedailystar.net\/city\/blogger-rajib-murder-death-2-confirmed-1385122"},{"key":"e_1_3_2_87_2","unstructured":"All Results BD. Retrieved from https:\/\/allresultbd.com\/ssc-exam-form-fill-up-notice\/"},{"key":"e_1_3_2_88_2","doi-asserted-by":"crossref","first-page":"322","DOI":"10.1145\/3585088.3589387","article-title":"Supporting teens\u2019 intentional social media use through interaction design: An exploratory proof-of-concept study","author":"Davis K.","year":"2023","unstructured":"K. Davis, P. Slovak, R. Landesman, C. Pitt, A. Ghajar, J. L. Schleider, and N. S. Kuhn. 2023. Supporting teens\u2019 intentional social media use through interaction design: An exploratory proof-of-concept study. In Proceedings of the 22nd Annual ACM Interaction Design and Children Conference. 322\u2013334.","journal-title":"Proceedings of the 22nd Annual ACM Interaction Design and Children Conference"},{"key":"e_1_3_2_89_2","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0169839"},{"key":"e_1_3_2_90_2","first-page":"1","article-title":"\u2018shishushurokkha\u2019: A transformative justice approach for combating child sexual abuse in Bangladesh","author":"Sultana S.","year":"2022","unstructured":"S. Sultana, S. T. Pritha, R. Tasnim, A. Das, R. Akter, S. Hasan, and S. I. Ahmed. 2022. \u2018shishushurokkha\u2019: A transformative justice approach for combating child sexual abuse in Bangladesh. In Proceedings of the CHI Conference on Human Factors in Computing Systems. 1\u201323.","journal-title":"Proceedings of the CHI Conference on Human Factors in Computing Systems"},{"key":"e_1_3_2_91_2","doi-asserted-by":"publisher","DOI":"10.1145\/3555123"},{"key":"e_1_3_2_92_2","doi-asserted-by":"publisher","DOI":"10.1145\/3359143"},{"key":"e_1_3_2_93_2","unstructured":"Dhaka Tribune. 2024. Survey: Over 90% Adolescents Use Mobile Phones in Bangladesh. Retrieved from https:\/\/www.dhakatribune.com\/bangladesh\/238379\/survey-over-90%25-adolescents-use-mobile-phones-in"}],"container-title":["ACM Journal on Computing and Sustainable Societies"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3704813","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3704813","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T01:17:42Z","timestamp":1750295862000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3704813"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,1,15]]},"references-count":92,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2025,3,31]]}},"alternative-id":["10.1145\/3704813"],"URL":"https:\/\/doi.org\/10.1145\/3704813","relation":{},"ISSN":["2834-5533"],"issn-type":[{"type":"electronic","value":"2834-5533"}],"subject":[],"published":{"date-parts":[[2025,1,15]]},"assertion":[{"value":"2023-07-28","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2024-10-12","order":2,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2025-01-15","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}