{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,13]],"date-time":"2026-04-13T18:27:59Z","timestamp":1776104879543,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":79,"publisher":"ACM","content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2025,11,4]]},"DOI":"10.1145\/3757232.3757244","type":"proceedings-article","created":{"date-parts":[[2025,11,4]],"date-time":"2025-11-04T12:13:01Z","timestamp":1762258381000},"page":"151-164","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["`Teens Need to Be Educated on the Dangers\u2019: Digital Access, Online Risks, and Safety Practices Among Nigerian Adolescents"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0007-3441-7014","authenticated-orcid":false,"given":"Munachimso","family":"Oguine","sequence":"first","affiliation":[{"name":"National Open University of Nigeria, Abuja, Nigeria"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2434-1400","authenticated-orcid":false,"given":"Ozioma","family":"Oguine","sequence":"additional","affiliation":[{"name":"University of Notre Dame, Notre Dame, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1165-3619","authenticated-orcid":false,"given":"Karla","family":"Badillo-Urquiola","sequence":"additional","affiliation":[{"name":"University of Notre Dame, Notre Dame, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1625-8749","authenticated-orcid":false,"given":"Oluwasogo","family":"Okunade","sequence":"additional","affiliation":[{"name":"National Open University of Nigeria, Abuja, Nigeria"}]}],"member":"320","published-online":{"date-parts":[[2025,11,4]]},"reference":[{"key":"e_1_3_3_2_2_2","unstructured":"2023. Youth Employment Statistics in Africa in 2023 | Matsh - Empowering Youth Women and Professionals. https:\/\/www.matsh.co\/en\/youth-employment-statistics-in-africa"},{"key":"e_1_3_3_2_3_2","unstructured":"2024. 81% of U.S. adults \u2013 versus 46% of teens \u2013 favor parental consent for minors to use social media. https:\/\/www.pewresearch.org\/short-reads\/2023\/10\/31\/81-of-us-adults-versus-46-of-teens-favor-parental-consent-for-minors-to-use-social-media [Online; accessed 31. Jan. 2025]."},{"key":"e_1_3_3_2_4_2","unstructured":"2024. Nigeria must tackle corruption to improve its cyber security. https:\/\/blogs.lse.ac.uk\/africaatlse\/2024\/10\/09\/nigeria-must-tackle-corruption-to-improve-its-cyber-security [Online; accessed 31. Jan. 2025]."},{"key":"e_1_3_3_2_5_2","unstructured":"2024. Opinion: As a mother and teacher I\u2019ve seen the harmful effects of social media on our children. Tech companies must be held accountable.https:\/\/www.sltrib.com\/opinion\/commentary\/2024\/08\/16\/opinion-tech-companies-must-be [Online; accessed 31. Jan. 2025]."},{"key":"e_1_3_3_2_6_2","unstructured":"2024. Social media networks made for children to learn how to interact safely. https:\/\/www.internetmatters.org\/resources\/social-media-networks-made-for-kids"},{"key":"e_1_3_3_2_7_2","unstructured":"2025. Africa Has Become The First Region in The World to Implement a Child Online Safety and Empowerment Policy | African Union. https:\/\/au.int\/en\/pressreleases\/20240523\/child-online-safety-and-empowerment-policy-africa-union"},{"key":"e_1_3_3_2_8_2","unstructured":"2025. The Internet and Adolescent Safety: Peer Influence and Gender Difference as Potential Risk-Factors of Cyberbullying among Nigerian Secondary School Adolescents. https:\/\/cyberleninka.ru\/article\/n\/the-internet-and-adolescent-safety-peer-influence-and-gender-difference-as-potential-risk-factors-of-cyberbullying-among-nigerian\/viewer [Online; accessed 30. Jan. 2025]."},{"key":"e_1_3_3_2_9_2","doi-asserted-by":"crossref","unstructured":"Anita\u00a0S Acharya Anupam Prakash Pikee Saxena and Aruna Nigam. 2013. Sampling: Why and how of it. Indian journal of medical specialties 4 2 (2013) 330\u2013333.","DOI":"10.7713\/ijms.2013.0032"},{"key":"e_1_3_3_2_10_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-19-2840-655"},{"key":"e_1_3_3_2_11_2","doi-asserted-by":"publisher","unstructured":"Ifeanyi Adigwe and Thomas van\u00a0der Walt. 2020. Parental mediation of online media activities of children in Nigeria: A parent-child approach. Computers in Human Behavior Reports 2 (Aug. 2020) 100041. 10.1016\/j.chbr.2020.100041","DOI":"10.1016\/j.chbr.2020.100041"},{"key":"e_1_3_3_2_12_2","doi-asserted-by":"publisher","DOI":"10.1145\/3585088.3593923"},{"key":"e_1_3_3_2_13_2","doi-asserted-by":"crossref","unstructured":"S Ahola\u00a0Kohut C LeBlanc K O\u2019leary AC McPherson E McCarthy C Nguyen and J Stinson. 2018. The internet as a source of support for youth with chronic conditions: A qualitative study. Child: care health and development 44 2 (2018) 212\u2013220.","DOI":"10.1111\/cch.12535"},{"key":"e_1_3_3_2_14_2","doi-asserted-by":"crossref","unstructured":"Bolanle\u00a0Nafisat Akeusola. 2023. Social media and the incidence of cyberbullying in Nigeria: Implications for creating a safer online environment. NIU Journal of Humanities 8 3 (2023) 125\u2013137.","DOI":"10.58709\/niujhu.v8i3.1701"},{"key":"e_1_3_3_2_15_2","doi-asserted-by":"publisher","DOI":"10.1145\/3544549.3585904"},{"key":"e_1_3_3_2_16_2","doi-asserted-by":"publisher","DOI":"10.1145\/3544549.3585904"},{"key":"e_1_3_3_2_17_2","doi-asserted-by":"crossref","unstructured":"Ashwaq Alsoubai Jihye Song Afsaneh Razi Nurun Naher Munmun De\u00a0Choudhury and Pamela\u00a0J Wisniewski. 2022. From\u2019Friends with Benefits\u2019 to\u2019Sextortion:\u2019A Nuanced Investigation of Adolescents\u2019 Online Sexual Risk Experiences. Proceedings of the ACM on Human-Computer Interaction 6 CSCW2 (2022) 1\u201332.","DOI":"10.1145\/3555136"},{"key":"e_1_3_3_2_18_2","doi-asserted-by":"crossref","unstructured":"N Anaemejeh G Bachmann J Hutchinson-Colas and K Alshowaikh. 2022. Sexual Health Education-Using Animated Videos to Teach Teenagers and Young Adults. The Journal of Sexual Medicine 19 8 (2022) S23.","DOI":"10.1016\/j.jsxm.2022.05.050"},{"key":"e_1_3_3_2_19_2","doi-asserted-by":"publisher","DOI":"10.1145\/3544548.3581221"},{"key":"e_1_3_3_2_20_2","doi-asserted-by":"crossref","unstructured":"Sanjay Asthana. 2017. Translation and localization of children\u2019s rights in youth-produced digital media in the Global South: A hermeneutic exploration. new media & society 19 5 (2017) 686\u2013700.","DOI":"10.1177\/1461444816686320"},{"key":"e_1_3_3_2_21_2","unstructured":"Abdullahi Bello. 2025. Child Online Protection. https:\/\/ncc.gov.ng\/technical-regulation\/internet\/child-online-protection [Online; accessed 31. Jan. 2025]."},{"key":"e_1_3_3_2_22_2","doi-asserted-by":"crossref","unstructured":"Neeraj Chatlani Arianna Davis Karla Badillo-Urquiola Elizabeth Bonsignore and Pamela Wisniewski. 2023. Teen as research-apprentice: A restorative justice approach for centering adolescents as the authority of their own online safety. International Journal of Child-Computer Interaction 35 (2023) 100549.","DOI":"10.1016\/j.ijcci.2022.100549"},{"key":"e_1_3_3_2_23_2","doi-asserted-by":"crossref","unstructured":"Baldreck Chipangura and Gustave Dtendjo-Ndjindja. 2022. Securing the cybersafety of South African online high school learners beyond COVID-19. Journal for Transdisciplinary Research in Southern Africa 18 1 (Dec. 2022) 8. https:\/\/td-sa.net\/index.php\/td\/article\/view\/1256\/2274","DOI":"10.4102\/td.v18i1.1256"},{"key":"e_1_3_3_2_24_2","doi-asserted-by":"crossref","unstructured":"Victoria Clarke and Virginia Braun. 2017. Thematic analysis. The journal of positive psychology 12 3 (2017) 297\u2013298.","DOI":"10.1080\/17439760.2016.1262613"},{"key":"e_1_3_3_2_25_2","doi-asserted-by":"crossref","unstructured":"Lenka Dedkova and Vojt\u011bch M\u00fdlek. 2023. Parental mediation of online interactions and its relation to adolescents\u2019 contacts with new people online: the role of risk perception. Information Communication & Society (Dec. 2023). https:\/\/www.tandfonline.com\/doi\/full\/10.1080\/1369118X.2022.2146985","DOI":"10.1080\/1369118X.2022.2146985"},{"key":"e_1_3_3_2_26_2","doi-asserted-by":"crossref","unstructured":"Debra Dudek Lelia Green and Giselle Woodley. 2025. \u201cWe were just havin\u2019a bit of fun\u201d: Teenagers and Porn in Sex Education. Sex Education: School\u2019s Out for Netflix (2025) 209.","DOI":"10.5040\/9798765107348.ch-012"},{"key":"e_1_3_3_2_27_2","doi-asserted-by":"crossref","unstructured":"Rebecca Eynon and L-E Malmberg. 2012. Understanding the online information-seeking behaviours of young people: the role of networks of support. Journal of Computer Assisted Learning 28 6 (2012) 514\u2013529.","DOI":"10.1111\/j.1365-2729.2011.00460.x"},{"key":"e_1_3_3_2_28_2","unstructured":"Favour Femi-Oyewole. 2024. Nigeria\u2019s Cybersecurity Challenge: Four Steps To Curb Cybercrime. Forbes (Aug. 2024). https:\/\/www.forbes.com\/councils\/forbestechcouncil\/2024\/02\/06\/nigerias-cybersecurity-challenge-four-steps-to-curb-cybercrime"},{"key":"e_1_3_3_2_29_2","doi-asserted-by":"publisher","DOI":"10.1145\/3544548.3581128"},{"key":"e_1_3_3_2_30_2","doi-asserted-by":"publisher","unstructured":"Heidi Hartikainen Afsaneh Razi and Pamela Wisniewski. 2021. Safe Sexting: The Advice and Support Adolescents Receive from Peers regarding Online Sexual Risks. Proc. ACM Hum.-Comput. Interact. 5 CSCW1 Article 42 (April 2021) 31\u00a0pages. 10.1145\/3449116","DOI":"10.1145\/3449116"},{"key":"e_1_3_3_2_31_2","doi-asserted-by":"publisher","DOI":"10.1145\/3544548.3581328"},{"key":"e_1_3_3_2_32_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-45002-112"},{"key":"e_1_3_3_2_33_2","doi-asserted-by":"crossref","unstructured":"Veronika Kalmus Marit Sukk and Kadri Soo. 2022. Towards more active parenting: Trends in parental mediation of children\u2019s internet use in European countries. Children & Society 36 5 (2022) 1026\u20131042.","DOI":"10.1111\/chso.12553"},{"key":"e_1_3_3_2_34_2","unstructured":"Mercy King\u2019Ori. 2025. Nigeria\u2019s New Data Protection Act Explained - Future of Privacy Forum. https:\/\/fpf.org\/blog\/nigerias-new-data-protection-act-explained [Online; accessed 31. Jan. 2025]."},{"key":"e_1_3_3_2_35_2","doi-asserted-by":"crossref","unstructured":"Ellen\u00a0A Knowles and BreAnne\u00a0A Danzi. 2025. The Role of Online Social Support in Mental Health: Comparing Rural and Urban Youth. Children 12 2 (2025) 113.","DOI":"10.3390\/children12020113"},{"key":"e_1_3_3_2_36_2","doi-asserted-by":"publisher","DOI":"10.1109\/SAI.2015.7237303"},{"key":"e_1_3_3_2_37_2","first-page":"1617","volume-title":"2024 2nd International Conference on Intelligent Data Communication Technologies and Internet of Things (IDCIoT)","author":"Kumar Pramod","year":"2024","unstructured":"Pramod Kumar, Ankitha Katkar, Manyatha Kanukuntla, Jeevana Bodakunta, Karthik Yarraboina, and Srinath Jamalapuri. 2024. Smart Device for Child Safety with Parental Alerts. In 2024 2nd International Conference on Intelligent Data Communication Technologies and Internet of Things (IDCIoT). IEEE, 1617\u20131623."},{"key":"e_1_3_3_2_38_2","doi-asserted-by":"publisher","DOI":"10.1145\/3290605.3300537"},{"key":"e_1_3_3_2_39_2","unstructured":"Michael Kunnuji. 2012. Online sexual activities and sexual risk-taking among adolescents and young adults in Lagos Metropolis Nigeria. African journal of reproductive health 16 2 (2012) 207\u2013218."},{"key":"e_1_3_3_2_40_2","unstructured":"Sonia Livingstone Anulekha Nandi Shakuntala Banaji and Mariya Stoilova. 2017. Young adolescents and digital media: uses risks and opportunities in low- and middle-income countries: a rapid evidence review. Gage (2017). https:\/\/eprints.lse.ac.uk\/83753"},{"key":"e_1_3_3_2_41_2","unstructured":"Amia Luthfia Daru Wibowo Maria\u00a0Anggia Widyakusumastuti and Mia Angeline. 2021. The role of digital literacy on online opportunity and online risk in Indonesian youth. Asian Journal for Public Opinion Research 9 2 (2021) 142\u2013160."},{"key":"e_1_3_3_2_42_2","doi-asserted-by":"publisher","DOI":"10.1145\/3283458.3283483"},{"key":"e_1_3_3_2_43_2","unstructured":"Christine Marsden. 2023. Age-Verification Laws in the Era of Digital Privacy. Nat\u2019l Sec. LJ 10 (2023) 210."},{"key":"e_1_3_3_2_44_2","doi-asserted-by":"crossref","unstructured":"Alice Marwick Claire Fontaine and Danah Boyd. 2017. \u201cNobody sees it nobody gets mad\u201d: Social media privacy and personal responsibility among low-SES youth. Social Media+ Society 3 2 (2017) 2056305117710455.","DOI":"10.1177\/2056305117710455"},{"key":"e_1_3_3_2_45_2","doi-asserted-by":"crossref","unstructured":"Benjamin\u00a0A Mason Daniel\u00a0B Hajovsky Luke\u00a0A McCune and Joshua\u00a0J Turek. 2017. Conflict closeness and academic skills: A longitudinal examination of the teacher\u2013student relationship. School Psychology Review 46 2 (2017) 177\u2013189.","DOI":"10.17105\/SPR-2017-0020.V46-2"},{"key":"e_1_3_3_2_46_2","doi-asserted-by":"crossref","unstructured":"Sarah Masud Sahajpreet Singh Viktor Hangya Alexander Fraser and Tanmoy Chakraborty. 2024. Hate Personified: Investigating the role of LLMs in content moderation. arXiv preprint arXiv:https:\/\/arXiv.org\/abs\/2410.02657 (2024).","DOI":"10.18653\/v1\/2024.emnlp-main.886"},{"key":"e_1_3_3_2_47_2","doi-asserted-by":"crossref","unstructured":"Bridget\u00a0Christine McHugh Pamela\u00a0J Wisniewski Mary\u00a0Beth Rosson Heng Xu and John\u00a0M Carroll. 2017. Most teens bounce back: Using diary methods to examine how quickly teens recover from episodic online risk exposure. Proceedings of the ACM on Human-Computer Interaction 1 CSCW (2017) 1\u201319.","DOI":"10.1145\/3134711"},{"key":"e_1_3_3_2_48_2","doi-asserted-by":"publisher","DOI":"10.1145\/3283458.3283482"},{"key":"e_1_3_3_2_49_2","doi-asserted-by":"publisher","unstructured":"Ogochukwu\u00a0W. Odeigah Ogbemudia\u00a0P. Michael and Adeola\u00a0G. Adeoye. 2025. Age verification and underage accessibility of official alcohol companies\u2019 websites and brand pages on Facebook and Instagram. International Journal of Drug Policy 136 (Feb. 2025) 104689. 10.1016\/j.drugpo.2024.104689","DOI":"10.1016\/j.drugpo.2024.104689"},{"key":"e_1_3_3_2_50_2","doi-asserted-by":"publisher","unstructured":"Ozioma\u00a0C. Oguine Oghenemaro Anuyah Zainab Agha Iris Melgarez Adriana\u00a0Alvarado Garcia and Karla Badillo-Urquiola. 2025. Online Safety for All: Sociocultural Insights from a Systematic Review of Youth Online Safety in the Global South. arXiv (April 2025). 10.48550\/arXiv.2504.20308 arXiv:https:\/\/arXiv.org\/abs\/2504.20308","DOI":"10.48550\/arXiv.2504.20308"},{"key":"e_1_3_3_2_51_2","doi-asserted-by":"publisher","DOI":"10.1145\/3678884.3681874"},{"key":"e_1_3_3_2_52_2","unstructured":"Ozioma\u00a0Collins Oguine and Karla Badillo-Urquiola. 2023. You Don\u2019t Belong Here: Ableist Microaggressions on Adolescents with Disability(ies) and Special Needs in Social Virtual Reality (VR). https:\/\/papers.ssrn.com\/sol3\/papers.cfm?abstract_id=4381787"},{"key":"e_1_3_3_2_53_2","doi-asserted-by":"publisher","unstructured":"Ozioma\u00a0C Oguine Jinkyung\u00a0Katie Park Mamtaj Akter Johanna Olesk Abdulmalik Alluhidan Pamela Wisniewski and Karla Badillo-Urquiola. 2025. How the Internet Facilitates Adverse Childhood Experiences for Youth Who Self-Identify as in Need of Services. Proc. ACM Hum.-Comput. Interact. 9 CSCW097 (apr 2025) 39\u00a0pages. 10.1145\/3710995","DOI":"10.1145\/3710995"},{"key":"e_1_3_3_2_54_2","doi-asserted-by":"publisher","unstructured":"Timo\u00a0Tapani Ojanen Pimpawun Boonmongkon Ronnapoom Samakkeekarom Nattharat Samoh Mudjalin Cholratana and Thomas\u00a0Ebanan Guadamuz. 2015. Connections Between Online Harassment and Offline Violence among Youth in Central Thailand. Child Abuse Negl. 44 (April 2015) 159. 10.1016\/j.chiabu.2015.04.001","DOI":"10.1016\/j.chiabu.2015.04.001"},{"key":"e_1_3_3_2_55_2","doi-asserted-by":"publisher","unstructured":"Ong\u2019ong\u2019a\u00a0Daniel Oloo. 2022. Online digital platform use by adolescents in Kenya. Journal of Children and Media (April 2022). 10.1080\/17482798.2021.1969254","DOI":"10.1080\/17482798.2021.1969254"},{"key":"e_1_3_3_2_56_2","unstructured":"Daniel\u00a0Oloo Ong\u2019ong\u2019a LL Mukhongo and S Chebii. 2017. Utilization of digital communication technologies in Kenya: How children aged 12\u201314 years report cyber bullying in school. IOSR Journal of humanities and Social Science 22 8 (2017) 49\u201356."},{"key":"e_1_3_3_2_57_2","doi-asserted-by":"publisher","unstructured":"Jinkyung\u00a0Katie Park Mamtaj Akter Pamela Wisniewski and Karla Badillo-Urquiola. 2024. It\u2019s Still Complicated: From Privacy-Invasive Parental Control to Teen-Centric Solutions for Digital Resilience. IEEE Security & Privacy 22 05 (Sept. 2024) 52\u201362. 10.1109\/MSEC.2024.3417804","DOI":"10.1109\/MSEC.2024.3417804"},{"key":"e_1_3_3_2_58_2","doi-asserted-by":"crossref","unstructured":"Alanna Peebles and Y\u00a0Anthony Chen. 2024. Parental Internet practices in the family system: Restrictive mediation problematic Internet use and adolescents\u2019 age-related variations in perceptions of parent-child relationship quality. Journal of Social and Personal Relationships 41 6 (2024) 1347\u20131369.","DOI":"10.1177\/02654075231221581"},{"key":"e_1_3_3_2_59_2","doi-asserted-by":"crossref","unstructured":"Yelena Petrykina Hadas Schwartz-Chassidim and Eran Toch. 2021. Nudging users towards online safety using gamified environments. Computers & Security 108 (2021) 102270.","DOI":"10.1016\/j.cose.2021.102270"},{"key":"e_1_3_3_2_60_2","doi-asserted-by":"publisher","DOI":"10.1145\/3078072.3079722"},{"key":"e_1_3_3_2_61_2","doi-asserted-by":"crossref","unstructured":"Gina Porter Kate Hampshire Albert Abane Alister Munthali Elsbeth Robson Ariane De\u00a0Lannoy Augustine Tanle and Samuel Owusu. 2020. Mobile phones gender and female empowerment in sub-Saharan Africa: studies with African youth. Information Technology for Development (Jan. 2020). https:\/\/www.tandfonline.com\/doi\/full\/10.1080\/02681102.2019.1622500","DOI":"10.1080\/02681102.2019.1622500"},{"key":"e_1_3_3_2_62_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-60881-01"},{"key":"e_1_3_3_2_63_2","unstructured":"Matjorie Rachoene and Toks Oyedemi. 2015. From self-expression to social aggression: Cyberbullying culture among South African youth on Facebook. Communicatio (July 2015). https:\/\/www.tandfonline.com\/doi\/pdf\/10.1080\/02500167.2015.1093325?casa_token=O_QqEv_TIvUAAAAA:cnVdjj5c41EYq0jUPfT_TfldWSogyRGFeOSkBCS1Gm2DrKyi4M4Y_TK-ycu4ZUjvZoQu54R4pR4b"},{"key":"e_1_3_3_2_64_2","doi-asserted-by":"publisher","DOI":"10.1145\/3313831.3376400"},{"key":"e_1_3_3_2_65_2","unstructured":"Kira\u00a0A. Regan. 2017. Socially Marginalized Youths\u2019 Experiences with Social Media and its Impact on their Relationships. Scholarship@Western (2017). https:\/\/ir.lib.uwo.ca\/etd\/4476\/?utm_source=ir.lib.uwo.ca%2Fetd%2F4476&utm_medium=PDF&utm_campaign=PDFCoverPages"},{"key":"e_1_3_3_2_66_2","doi-asserted-by":"publisher","unstructured":"Wei Ren and Xiaowen Zhu. 2022. Parental Mediation and Adolescents\u2019 Internet Use: The Moderating Role of Parenting Style. Journal of Youth and Adolescence 51 8 (April 2022) 1483. 10.1007\/s10964-022-01600-w","DOI":"10.1007\/s10964-022-01600-w"},{"key":"e_1_3_3_2_67_2","unstructured":"Omotola Saba. 2024. Must-Watch African Animated Series and Films. Marmalade Collective (Feb. 2024). https:\/\/www.marmaladecollective.com\/must-watch-african-animated-series-and-films"},{"key":"e_1_3_3_2_68_2","doi-asserted-by":"publisher","DOI":"10.1145\/3544548.3581538"},{"key":"e_1_3_3_2_69_2","doi-asserted-by":"crossref","unstructured":"Shwadhin Sharma and Ching\u00a0Yee Lee. 2024. Parental mediation and preferences for regulation regarding children\u2019s digital media use: role of protection motivation and theory of planned behaviour. Behaviour & Information Technology 43 8 (2024) 1499\u20131517.","DOI":"10.1080\/0144929X.2023.2217275"},{"key":"e_1_3_3_2_70_2","unstructured":"Aminu Shehu. [n. d.]. FCT Secondary Education Board. https:\/\/www.fctseb.gov.ng\/sch_statistics.php [Online; accessed 2025-04-17]."},{"key":"e_1_3_3_2_71_2","unstructured":"Aminu Shehu. 2025. FCT Secondary Education Board. https:\/\/www.fctseb.gov.ng"},{"key":"e_1_3_3_2_72_2","unstructured":"Fatima Shittu Adesina\u00a0Simon Sodiya and Orunsolu Abdul. 2025. A NIN-BASED MODEL FOR SOCIAL MEDIA SECURITY IN NIGERIA \u2013 Digital Library. https:\/\/library.ncs.org.ng\/download\/a-nin-based-model-for-social-media-security-in-nigeria"},{"key":"e_1_3_3_2_73_2","doi-asserted-by":"crossref","unstructured":"Elizabeth\u00a0A Sweigart Jinkyung\u00a0Katie Park and Pamela\u00a0J Wisniewski. 2025. It Takes a Village: Youth Online Safety Research Highlights Need for Interdisciplinary Multistakeholder Solutions. Journal of Advances in Information Technology 16 1 (2025).","DOI":"10.12720\/jait.16.1.121-129"},{"key":"e_1_3_3_2_74_2","doi-asserted-by":"crossref","unstructured":"\u0141ukasz Tomczyk and Katarzyna Potyra\u0142a. 2021. Parents\u2019 knowledge and skills about the risks of the digital world. South African Journal of Education 41 1 (2021).","DOI":"10.15700\/saje.v41n1a1833"},{"key":"e_1_3_3_2_75_2","doi-asserted-by":"crossref","unstructured":"Hsin-yi\u00a0Sandy Tsai Mengtian Jiang Saleem Alhabash Robert LaRose Nora\u00a0J Rifon and Shelia\u00a0R Cotten. 2016. Understanding online safety behaviors: A protection motivation theory perspective. Computers & Security 59 (2016) 138\u2013150.","DOI":"10.1016\/j.cose.2016.02.009"},{"key":"e_1_3_3_2_76_2","unstructured":"Kimani-Kariuki\u00a0Lucy Wanjiru. 2010. A Study on the Uses and Gratification of Facebook among the Youth in Kenya. Ph.\u00a0D. Dissertation. University of Nairobi Kenya."},{"key":"e_1_3_3_2_77_2","doi-asserted-by":"publisher","DOI":"10.1145\/3491102.3517643"},{"key":"e_1_3_3_2_78_2","doi-asserted-by":"publisher","DOI":"10.1145\/2998181.2998352"},{"key":"e_1_3_3_2_79_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-69362-555"},{"key":"e_1_3_3_2_80_2","doi-asserted-by":"publisher","DOI":"10.1145\/2531602.2531696"}],"event":{"name":"Africhi 2025: The 5th Biennial African Human Computer Interaction Conference","location":"Cairo Egypt","acronym":"Africhi 2025"},"container-title":["Proceedings of the Fifth Biennial African Human-Computer Interaction Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3757232.3757244","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,4]],"date-time":"2025-11-04T13:50:22Z","timestamp":1762264222000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3757232.3757244"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,11,4]]},"references-count":79,"alternative-id":["10.1145\/3757232.3757244","10.1145\/3757232"],"URL":"https:\/\/doi.org\/10.1145\/3757232.3757244","relation":{},"subject":[],"published":{"date-parts":[[2025,11,4]]},"assertion":[{"value":"2025-11-04","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}