{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,24]],"date-time":"2025-06-24T04:03:45Z","timestamp":1750737825401,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":42,"publisher":"ACM","content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2025,6,23]]},"DOI":"10.1145\/3713043.3731530","type":"proceedings-article","created":{"date-parts":[[2025,6,23]],"date-time":"2025-06-23T13:14:36Z","timestamp":1750684476000},"page":"1056-1063","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Understanding Teen\u2019s Expectations and Challenges to Seek Help in Social Media"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-3840-9015","authenticated-orcid":false,"given":"Rizu","family":"Paudel","sequence":"first","affiliation":[{"name":"Department of Computer Science, Utah State University, Logan, Utah, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5764-2253","authenticated-orcid":false,"given":"Mahdi Nasrullah","family":"Al-Ameen","sequence":"additional","affiliation":[{"name":"Department of Computer Science, Utah State University, Logan, Utah, USA"}]}],"member":"320","published-online":{"date-parts":[[2025,6,23]]},"reference":[{"key":"e_1_3_3_2_2_2","doi-asserted-by":"crossref","unstructured":"Zainab Agha Karla Badillo-Urquiola and Pamela\u00a0J Wisniewski. 2023. \" Strike at the Root\": Co-designing Real-Time Social Media Interventions for Adolescent Online Risk Prevention. Proceedings of the ACM on Human-Computer Interaction 7 CSCW1 (2023) 1\u201332.","DOI":"10.1145\/3579625"},{"key":"e_1_3_3_2_3_2","doi-asserted-by":"publisher","DOI":"10.1145\/3584931.3606964"},{"key":"e_1_3_3_2_4_2","doi-asserted-by":"crossref","unstructured":"Mamtaj Akter Amy\u00a0J Godfrey Jess Kropczynski Heather\u00a0R Lipford and Pamela\u00a0J Wisniewski. 2022. From parental control to joint family oversight: Can parents and teens manage mobile online safety and privacy as equals? Proceedings of the ACM on Human-Computer Interaction 6 CSCW1 (2022) 1\u201328.","DOI":"10.1145\/3512904"},{"key":"e_1_3_3_2_5_2","doi-asserted-by":"publisher","DOI":"10.1145\/3427228.3427287"},{"key":"e_1_3_3_2_6_2","doi-asserted-by":"crossref","unstructured":"Kendra Allison Robin\u00a0M Dawson DeAnne K\u00a0Hilfinger Messias Joan\u00a0M Culley and Nancy Brown. 2024. Early Adolescent Online Sexual Risks on Smartphones and Social Media: Parental Awareness and Protective Practices. The Journal of Early Adolescence 44 7 (2024) 882\u2013908.","DOI":"10.1177\/02724316231212560"},{"key":"e_1_3_3_2_7_2","doi-asserted-by":"publisher","DOI":"10.1145\/1710035.1710070"},{"key":"e_1_3_3_2_8_2","unstructured":"Monica Anderson. 2018. A majority of teens have experienced some form of cyberbullying. (2018)."},{"key":"e_1_3_3_2_9_2","unstructured":"Monica Anderson and Jingjing Jiang. 2018. Teens social media & technology 2018. (2018)."},{"key":"e_1_3_3_2_10_2","volume-title":"Understanding Your Users: A Practical Guide to User Research Methods (2 ed.)","author":"Baxter Kathy","year":"2015","unstructured":"Kathy Baxter, Catherine Courage, and Kelly Caine. 2015. Understanding Your Users: A Practical Guide to User Research Methods (2 ed.). Morgan Kaufmann Publishers Inc., San Francisco, CA, USA."},{"key":"e_1_3_3_2_11_2","doi-asserted-by":"crossref","unstructured":"Gabriella Borca Manuela Bina Peggy\u00a0S Keller Lauren\u00a0R Gilbert and Tatiana Begotti. 2015. Internet use and developmental tasks: Adolescents\u2019 point of view. Computers in Human Behavior 52 (2015) 49\u201358.","DOI":"10.1016\/j.chb.2015.05.029"},{"key":"e_1_3_3_2_12_2","volume-title":"Transforming qualitative information: Thematic analysis and code development","author":"Boyatzis Richard\u00a0E","year":"1998","unstructured":"Richard\u00a0E Boyatzis. 1998. Transforming qualitative information: Thematic analysis and code development. sage, Thousand Oaks, CA, USA."},{"key":"e_1_3_3_2_13_2","doi-asserted-by":"crossref","unstructured":"Virginia Braun and Victoria Clarke. 2006. Using thematic analysis in psychology. Qualitative research in psychology 3 2 (2006) 77\u2013101.","DOI":"10.1191\/1478088706qp063oa"},{"key":"e_1_3_3_2_14_2","doi-asserted-by":"crossref","unstructured":"Virginia Braun and Victoria Clarke. 2021. One size fits all? What counts as quality practice in (reflexive) thematic analysis? Qualitative research in psychology 18 3 (2021) 328\u2013352.","DOI":"10.1080\/14780887.2020.1769238"},{"key":"e_1_3_3_2_15_2","first-page":"19","volume-title":"10th Symposium On Usable Privacy and Security (SOUPS 2014)","author":"Cranor Lorrie\u00a0Faith","year":"2014","unstructured":"Lorrie\u00a0Faith Cranor, Adam\u00a0L Durity, Abigail Marsh, and Blase Ur. 2014. { Parents\u2019} and { Teens\u2019} Perspectives on Privacy In a { Technology-Filled} World. In 10th Symposium On Usable Privacy and Security (SOUPS 2014). 19\u201335."},{"key":"e_1_3_3_2_16_2","doi-asserted-by":"crossref","unstructured":"David\u00a0C DeAndrea. 2015. Testing the proclaimed affordances of online support groups in a nationally representative sample of adults seeking mental health assistance. Journal of health communication 20 2 (2015) 147\u2013156.","DOI":"10.1080\/10810730.2014.914606"},{"key":"e_1_3_3_2_17_2","unstructured":"Leen d\u2019Haenens Sofie Vandoninck and Ver\u00f3nica Donoso. 2013. How to cope and build online resilience? (2013)."},{"key":"e_1_3_3_2_18_2","doi-asserted-by":"publisher","DOI":"10.1145\/3173574.3173698"},{"key":"e_1_3_3_2_19_2","doi-asserted-by":"publisher","DOI":"10.1145\/3022198.3026306"},{"key":"e_1_3_3_2_20_2","doi-asserted-by":"publisher","DOI":"10.1145\/2818048.2819940"},{"key":"e_1_3_3_2_21_2","doi-asserted-by":"publisher","DOI":"10.1145\/3544548.3581233"},{"key":"e_1_3_3_2_22_2","doi-asserted-by":"publisher","DOI":"10.1145\/3585088.3589359"},{"key":"e_1_3_3_2_23_2","doi-asserted-by":"publisher","DOI":"10.1145\/3584931.3606967"},{"key":"e_1_3_3_2_24_2","doi-asserted-by":"crossref","unstructured":"Jazette Johnson Rebecca\u00a0W Black and Gillian\u00a0R Hayes. 2020. Roles in the discussion: an analysis of social support in an online forum for people with dementia. Proceedings of the ACM on Human-Computer Interaction 4 CSCW2 (2020) 1\u201330.","DOI":"10.1145\/3415198"},{"key":"e_1_3_3_2_25_2","unstructured":"Amanda Lenhart Maeve Duggan Andrew Perrin Renee Stepler Harrison Rainie Kim Parker et\u00a0al. 2015. Teens social media & technology overview 2015. Pew Research Center [Internet & American Life Project] USA N\/A N\/A (2015)."},{"key":"e_1_3_3_2_26_2","doi-asserted-by":"crossref","unstructured":"Rose Maghsoudi Jennifer Shapka and Pamela Wisniewski. 2020. Examining how online risk exposure and online social capital influence adolescent psychological stress. Computers in Human Behavior 113 (2020) 106488.","DOI":"10.1016\/j.chb.2020.106488"},{"key":"e_1_3_3_2_27_2","doi-asserted-by":"publisher","DOI":"10.1145\/2531602.2531603"},{"key":"e_1_3_3_2_28_2","doi-asserted-by":"publisher","DOI":"10.1145\/3025453.3025587"},{"key":"e_1_3_3_2_29_2","doi-asserted-by":"crossref","unstructured":"Rick Murphy. 2022. How children make sense of their permanent exclusion: a thematic analysis from semi-structured interviews. Emotional and Behavioural Difficulties 27 1 (2022) 43\u201357.","DOI":"10.1080\/13632752.2021.2012962"},{"key":"e_1_3_3_2_30_2","doi-asserted-by":"crossref","unstructured":"Oluwatomisin Obajemu Zainab Agha Farzana\u00a0A Chowdhury and Pamela\u00a0J Wisniewski. 2024. Towards Enforcing Good Digital Citizenship: Identifying Opportunities for Adolescent Online Safety Nudges. Proceedings of the ACM on Human-Computer Interaction 8 CSCW1 (2024) 1\u201337.","DOI":"10.1145\/3637413"},{"key":"e_1_3_3_2_31_2","doi-asserted-by":"publisher","DOI":"10.1145\/3678884.3681888"},{"key":"e_1_3_3_2_32_2","doi-asserted-by":"crossref","unstructured":"Rizu Paudel and Mahdi\u00a0Nasrullah Al-Ameen. 2024. Leveraging the power of storytelling to encourage and empower children towards strong passwords. Proceedings of the ACM on Human-Computer Interaction 8 CSCW2 (2024) 1\u201327.","DOI":"10.1145\/3687043"},{"key":"e_1_3_3_2_33_2","doi-asserted-by":"crossref","unstructured":"Rizu Paudel and Mahdi\u00a0Nasrullah Al-Ameen. 2024. Priming through Persuasion: Towards Secure Password Behavior. Proceedings of the ACM on Human-Computer Interaction 8 CSCW1 (2024) 1\u201327.","DOI":"10.1145\/3637387"},{"key":"e_1_3_3_2_34_2","doi-asserted-by":"crossref","unstructured":"Rizu Paudel and Mahdi\u00a0Nasrullah Al-Ameen. 2025. \u201cIt\u2019s Definitely New and Different\u2026 It\u2019s Really Engaging\u201d: Understanding the Power of Storytelling Towards Secure Password Creation. International Journal of Human\u2013Computer Interaction (2025) 1\u201321.","DOI":"10.1080\/10447318.2024.2444046"},{"key":"e_1_3_3_2_35_2","unstructured":"Anthony\u00a0T Pinter Arup\u00a0Kumar Ghosh and Pamela\u00a0J Wisniewski. 2022. Going beyond cyberbullying: Adolescent online safety and digital risks. Cyberbullying and Digital Safety: Applying Global Research to Youth in India (2022)."},{"key":"e_1_3_3_2_36_2","doi-asserted-by":"crossref","unstructured":"Stephen\u00a0A Rains and Kevin\u00a0B Wright. 2016. Social support and computer-mediated communication: A state-of-the-art review and agenda for future research. Communication Yearbook 40 (2016) 175\u2013212.","DOI":"10.1080\/23808985.2015.11735260"},{"key":"e_1_3_3_2_37_2","doi-asserted-by":"crossref","unstructured":"Amy Rayland and Jacob Andrews. 2023. From social network to peer support network: opportunities to explore mechanisms of online peer support for mental health. JMIR mental health 10 (2023) e41855.","DOI":"10.2196\/41855"},{"key":"e_1_3_3_2_38_2","doi-asserted-by":"crossref","unstructured":"Wonsun Shin and Hyunjin Kang. 2016. Adolescents\u2019 privacy concerns and information disclosure online: The role of parents and the Internet. Computers in Human Behavior 54 (2016) 114\u2013123.","DOI":"10.1016\/j.chb.2015.07.062"},{"key":"e_1_3_3_2_39_2","doi-asserted-by":"crossref","unstructured":"Eleni\u00a0C Tzavela Chryssoula Karakitsou Michael Dreier Foteini Mavromati Klaus W\u00f6lfling Eva Halapi George Macarie Szymon W\u00f3jcik Lydian Veldhuis and Artemis\u00a0K Tsitsika. 2015. Processes discriminating adaptive and maladaptive Internet use among European adolescents highly engaged online. Journal of adolescence 40 (2015) 34\u201347.","DOI":"10.1016\/j.adolescence.2014.12.003"},{"key":"e_1_3_3_2_40_2","doi-asserted-by":"crossref","first-page":"520","DOI":"10.1145\/3311927.3325334","volume-title":"Proceedings of the 18th ACM international conference on interaction design and children","author":"Van\u00a0Mechelen Maarten","year":"2019","unstructured":"Maarten Van\u00a0Mechelen, Alice Schut, Mathieu Gielen, and Antonia\u00a0Clasina S\u00f6dergren. 2019. Children\u2019s assessment of co-design skills: creativity, empathy and collaboration. In Proceedings of the 18th ACM international conference on interaction design and children. 520\u2013526."},{"key":"e_1_3_3_2_41_2","doi-asserted-by":"crossref","unstructured":"Ge Wang Jun Zhao Max Van\u00a0Kleek and Nigel Shadbolt. 2021. Protection or punishment? relating the design space of parental control apps and perceptions about them to support parenting for online safety. Proceedings of the ACM on Human-Computer Interaction 5 CSCW2 (2021) 1\u201326.","DOI":"10.1145\/3476084"},{"key":"e_1_3_3_2_42_2","doi-asserted-by":"publisher","DOI":"10.1145\/2998181.2998352"},{"key":"e_1_3_3_2_43_2","doi-asserted-by":"publisher","DOI":"10.1145\/2702123.2702240"}],"event":{"name":"IDC '25: Interaction Design and Children","location":"Reykjavik Iceland","acronym":"IDC '25","sponsor":["SIGCHI ACM Special Interest Group on Computer-Human Interaction"]},"container-title":["Proceedings of the 24th Interaction Design and Children"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3713043.3731530","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,23]],"date-time":"2025-06-23T13:19:34Z","timestamp":1750684774000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3713043.3731530"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,6,23]]},"references-count":42,"alternative-id":["10.1145\/3713043.3731530","10.1145\/3713043"],"URL":"https:\/\/doi.org\/10.1145\/3713043.3731530","relation":{},"subject":[],"published":{"date-parts":[[2025,6,23]]},"assertion":[{"value":"2025-06-23","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}