{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,17]],"date-time":"2025-10-17T02:40:27Z","timestamp":1760668827833,"version":"build-2065373602"},"reference-count":134,"publisher":"Association for Computing Machinery (ACM)","issue":"7","funder":[{"name":"Notre Dame-IBM Tech Ethics lab","award":["W2481959"],"award-info":[{"award-number":["W2481959"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["Proc. ACM Hum.-Comput. Interact."],"published-print":{"date-parts":[[2025,10,18]]},"abstract":"<jats:p>Youth online safety research in HCI has historically centered on perspectives from the Global North, often overlooking the unique particularities and cultural contexts of regions in the Global South. This paper presents a systematic review of 66 youth online safety studies published between 2014 and 2024, specifically focusing on regions in the Global South. Our findings reveal a concentrated research focus in Asian countries and predominance of quantitative methods. We also found limited research on marginalized youth populations and a primary focus on risks related to cyberbullying. Our analysis underscores the critical role of cultural factors in shaping online safety, highlighting the need for educational approaches that integrate social dynamics and awareness. We propose methodological recommendations and a future research agenda that encourages the adoption of situated, culturally sensitive methodologies and youth-centered approaches to researching youth online safety regions in the Global South. This paper advocates for greater inclusivity in youth online safety research, emphasizing the importance of addressing varied sociocultural contexts to better understand and meet the online safety needs of youth in the Global South.<\/jats:p>","DOI":"10.1145\/3757639","type":"journal-article","created":{"date-parts":[[2025,10,16]],"date-time":"2025-10-16T16:59:10Z","timestamp":1760633950000},"page":"1-30","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Online Safety for All: Sociocultural Insights from a Systematic Review of Youth Online Safety in the Global South"],"prefix":"10.1145","volume":"9","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-2434-1400","authenticated-orcid":false,"given":"Ozioma Collins","family":"Oguine","sequence":"first","affiliation":[{"name":"University of Notre Dame, Notre Dame, Indiana, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5773-8239","authenticated-orcid":false,"given":"Oghenemaro","family":"Anuyah","sequence":"additional","affiliation":[{"name":"Microsoft, Redmond, WA, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6519-3742","authenticated-orcid":false,"given":"Zainab","family":"Agha","sequence":"additional","affiliation":[{"name":"San Francisco State University, San Francisco, CA, USA"}]},{"ORCID":"https:\/\/orcid.org\/0009-0001-7051-6497","authenticated-orcid":false,"given":"Iris","family":"Melgarez","sequence":"additional","affiliation":[{"name":"EveryMind, Baltimore, MD, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4230-3777","authenticated-orcid":false,"given":"Adriana","family":"Alvarado Garcia","sequence":"additional","affiliation":[{"name":"IBM Research, Yorktown Heights, New York, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1165-3619","authenticated-orcid":false,"given":"Karla","family":"Badillo-Urquiola","sequence":"additional","affiliation":[{"name":"University of Notre Dame, South Bend, Indiana, USA"}]}],"member":"320","published-online":{"date-parts":[[2025,10,16]]},"reference":[{"volume-title":"Conferences. https:\/\/sigchi.org\/conferences","key":"e_1_2_1_1_1","unstructured":"2024. Conferences. https:\/\/sigchi.org\/conferences"},{"key":"e_1_2_1_2_1","unstructured":"2024. Erikson's Stages of Development. https:\/\/www.simplypsychology.org\/erik-erikson.html"},{"volume-title":"The Convention on the Rights of the Child: The children's version. https:\/\/www.unicef.org\/child-rights-convention\/convention-text-childrens-version","key":"e_1_2_1_3_1","unstructured":"2024. The Convention on the Rights of the Child: The children's version. https:\/\/www.unicef.org\/child-rights-convention\/convention-text-childrens-version"},{"key":"e_1_2_1_4_1","unstructured":"2024. The EU's Digital Services Act. https:\/\/commission.europa.eu\/strategy-and-policy\/priorities-2019-2024\/europe-fit-digital-age\/digital-services-act_en"},{"key":"e_1_2_1_5_1","unstructured":"2024. What Does the Rise of the Global South Mean for the World? https:\/\/lkyspp.nus.edu.sg\/gia\/article\/what-does-the-rise-of-the-global-south-mean-for-the-world"},{"key":"e_1_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.heliyon.2022.e11813"},{"key":"e_1_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-19-2840-6_55"},{"key":"e_1_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/3047273.3047303"},{"key":"e_1_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/3579625"},{"key":"e_1_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/3613904.3642313"},{"key":"e_1_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.4103\/jfcm.JFCM_516_20"},{"key":"e_1_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/3427228.3427287"},{"key":"e_1_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/3491102.3501969"},{"key":"e_1_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1057\/s41599-022-01318-x"},{"key":"e_1_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCCS49678.2020.9277038"},{"key":"e_1_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/3544548"},{"key":"e_1_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/3628096.3629046"},{"key":"e_1_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.17576\/JKMJC-2019-3502-29"},{"key":"e_1_2_1_19_1","volume-title":"Networked individuals, gendered violence: A literature review of cyberviolence. Violence and gender 5, 3","author":"Backe Emma Louise","year":"2018","unstructured":"Emma Louise Backe, Pamela Lilleston, and Jennifer McCleary-Sills. 2018. Networked individuals, gendered violence: A literature review of cyberviolence. Violence and gender 5, 3 (2018), 135-146."},{"key":"e_1_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1177\/0743558419884692"},{"key":"e_1_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/3078072.3079724"},{"key":"e_1_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/3290605.3300497"},{"key":"e_1_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/3432930"},{"key":"e_1_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/3022198.3026314"},{"key":"e_1_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.3390\/bs12120478"},{"key":"e_1_2_1_26_1","doi-asserted-by":"crossref","unstructured":"Daniel A Bell and Thaddeus Metz. 2011. Confucianism and Ubuntu: Reflections on a dialogue between Chinese and African traditions. (2011).","DOI":"10.1111\/j.1540-6253.2012.01690.x"},{"key":"e_1_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/3617733.3617771"},{"key":"e_1_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1080\/0144929X.2015.1028448"},{"key":"e_1_2_1_29_1","volume-title":"Thematic Analysis: A Practical Guide","author":"Braun Virginia","year":"2021","unstructured":"Virginia Braun and Victoria Clarke. 2021. Thematic Analysis: A Practical Guide. SAGE Publications, London, England, UK. https:\/\/books.google.com\/books\/about\/Thematic_Analysis.html?id=mToqEAAAQBAJ"},{"key":"e_1_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00038-014-0638-7"},{"key":"e_1_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.abrep.2020.100288"},{"key":"e_1_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11192-022-04583-4"},{"key":"e_1_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.2147\/PRBM.S386968"},{"key":"e_1_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1177\/2055102920935747"},{"key":"e_1_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.4102\/td.v18i1.1256"},{"key":"e_1_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1002\/pits.22821"},{"key":"e_1_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1177\/1536504212436479"},{"key":"e_1_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/2858036.2858081"},{"key":"e_1_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.4102\/sajim.v21i1.925"},{"key":"e_1_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/3571884.3603756"},{"key":"e_1_2_1_41_1","unstructured":"Finance Center for South-South Cooperation. 2015. Global South Countries. http:\/\/www.fc-ssc.org\/en\/partnership_program\/south_south_countries"},{"key":"e_1_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.17398\/1695-288X.21.2.45"},{"key":"e_1_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1145\/3544548.3581128"},{"key":"e_1_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1080\/0312407X.2022.2162943"},{"key":"e_1_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.3389\/fpubh.2022.903206"},{"key":"e_1_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.32598\/ijpcp.24.4.416"},{"key":"e_1_2_1_47_1","volume-title":"Privacy perception and information technology utilization of high school students. Heliyon 5, 5","author":"Gogus Aytac","year":"2019","unstructured":"Aytac Gogus and Y\u00fccel Sayg?n. 2019. Privacy perception and information technology utilization of high school students. Heliyon 5, 5 (2019)."},{"key":"e_1_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1186\/s12888-023-04542-0"},{"key":"e_1_2_1_49_1","unstructured":"Courtney Gregoire. 2023. New Microsoft research illustrates the online risks and value of safety tools to keep kids safer in the digital environment - Microsoft On the Issues. https:\/\/blogs.microsoft.com\/on-the-issues\/2023\/02\/06\/safer-internet-day-global-online-safety-survey-2023\/#: :text=The%20research%20found%20that%20teens %E2%80%93%20a%2012%2Dpoint%20difference."},{"key":"e_1_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1145\/3359298"},{"key":"e_1_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1145\/3359318"},{"key":"e_1_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1145\/2930674.2930680"},{"key":"e_1_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1145\/3449116"},{"key":"e_1_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-45002-1_12"},{"key":"e_1_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-45002-1_12"},{"key":"e_1_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.1108\/ICS-11-2020-0183"},{"key":"e_1_2_1_57_1","doi-asserted-by":"publisher","DOI":"10.1145\/3512972"},{"key":"e_1_2_1_58_1","doi-asserted-by":"publisher","DOI":"10.1145\/3512972"},{"key":"e_1_2_1_59_1","doi-asserted-by":"publisher","DOI":"10.5114\/hpr.2020.99394"},{"key":"e_1_2_1_60_1","doi-asserted-by":"publisher","DOI":"10.1186\/s12889-021-10349-z"},{"key":"e_1_2_1_61_1","unstructured":"Julie Jargon. 2024. How to Use Parental Controls on YouTube TikTok Instagram and Snapchat. https:\/\/www.wsj.com\/articles\/how-to-use-parental-controls-on-youtube-tiktok-instagram-and-snapchat-11650065233"},{"key":"e_1_2_1_62_1","doi-asserted-by":"publisher","DOI":"10.51594\/ijmer.v6i1.695"},{"key":"e_1_2_1_63_1","doi-asserted-by":"publisher","DOI":"10.1145\/3411764.3445313"},{"key":"e_1_2_1_64_1","doi-asserted-by":"publisher","DOI":"10.1109\/icABCD54961.2022.9856017"},{"key":"e_1_2_1_65_1","doi-asserted-by":"publisher","DOI":"10.2196\/22946"},{"key":"e_1_2_1_66_1","doi-asserted-by":"publisher","DOI":"10.1145\/2750858.2804283"},{"key":"e_1_2_1_67_1","doi-asserted-by":"publisher","DOI":"10.1145\/3585088.3589375"},{"key":"e_1_2_1_68_1","doi-asserted-by":"publisher","DOI":"10.1136\/bmjopen-2023-081016"},{"key":"e_1_2_1_69_1","doi-asserted-by":"publisher","DOI":"10.1111\/jcpp.13245"},{"key":"e_1_2_1_70_1","doi-asserted-by":"publisher","DOI":"10.3389\/fpsyt.2023.959846"},{"key":"e_1_2_1_71_1","doi-asserted-by":"publisher","DOI":"10.7454\/hubs.asia.1010819"},{"key":"e_1_2_1_72_1","first-page":"13","article-title":"Online risk, harm and vulnerability: Reflections on the evidence base for child Internet safety policy","volume":"18","author":"Livingstone Sonia","year":"2013","unstructured":"Sonia Livingstone. 2013. Online risk, harm and vulnerability: Reflections on the evidence base for child Internet safety policy. ZER: Journal of Communication Studies 18, 35 (2013), 13-28.","journal-title":"ZER: Journal of Communication Studies"},{"key":"e_1_2_1_73_1","doi-asserted-by":"publisher","DOI":"10.1145\/3202185.3202729"},{"key":"e_1_2_1_74_1","doi-asserted-by":"publisher","DOI":"10.1145\/3410404.3414268"},{"key":"e_1_2_1_75_1","doi-asserted-by":"publisher","DOI":"10.17576\/JKMJC-2023-3901-19"},{"key":"e_1_2_1_76_1","doi-asserted-by":"publisher","DOI":"10.1145\/3283458.3283483"},{"key":"e_1_2_1_77_1","doi-asserted-by":"publisher","DOI":"10.1145\/3584931.3611281"},{"key":"e_1_2_1_78_1","doi-asserted-by":"publisher","DOI":"10.1145\/3359174"},{"key":"e_1_2_1_79_1","doi-asserted-by":"publisher","DOI":"10.1145\/3283458.3283482"},{"key":"e_1_2_1_80_1","first-page":"1","article-title":"Awareness of the Risks and Dangers of Social Networking: Exploration on Four Types of Malaysian Secondary Schools","volume":"36","author":"Ming Thang Siew","year":"2020","unstructured":"Thang Siew Ming, Lay Shi Ng, and Adzuhaidah M. Taha. 2020. Awareness of the Risks and Dangers of Social Networking: Exploration on Four Types of Malaysian Secondary Schools. Jurnal Komunikasi: Malaysian Journal of Communication 36, 1 (March 2020). https:\/\/ejournal.ukm.my\/mjc\/article\/view\/34287","journal-title":"Jurnal Komunikasi: Malaysian Journal of Communication"},{"key":"e_1_2_1_81_1","doi-asserted-by":"publisher","DOI":"10.3390\/healthcare10050856"},{"key":"e_1_2_1_82_1","doi-asserted-by":"crossref","unstructured":"David Moher Alessandro Liberati Jennifer Tetzlaff Douglas G Altman Prisma Group et al. 2010. Preferred reporting items for systematic reviews and meta-analyses: the PRISMA statement. International journal of surgery 8 5 (2010) 336-341.","DOI":"10.1016\/j.ijsu.2010.02.007"},{"key":"e_1_2_1_83_1","doi-asserted-by":"publisher","DOI":"10.1145\/3576915.3623087"},{"key":"e_1_2_1_84_1","doi-asserted-by":"publisher","DOI":"10.1136\/bmjgh-2023-014420"},{"key":"e_1_2_1_85_1","doi-asserted-by":"publisher","unstructured":"Joyce Samuel Ndalaye and George Anthony Giannoumis. 2022. Universal Design and Child Online Protection: Understanding Parental Information Literacy Online Risks and Safety Skills Awareness in Global South. https:\/\/doi.org\/10.2139\/ssrn.4252197","DOI":"10.2139\/ssrn.4252197"},{"key":"e_1_2_1_86_1","doi-asserted-by":"publisher","DOI":"10.1145\/2771839.2771917"},{"key":"e_1_2_1_87_1","doi-asserted-by":"publisher","DOI":"10.48550\/arXiv.2507.08914"},{"key":"e_1_2_1_88_1","doi-asserted-by":"publisher","DOI":"10.1145\/3678884.3681874"},{"key":"e_1_2_1_89_1","volume-title":"CHI'23: Workshop on Combating Toxicity, Harassment, and Abuse in Online Social Spaces","author":"Oguine Ozioma Collins","year":"2023","unstructured":"Ozioma Collins Oguine and Karla Badillo-Urquiola. 2023. You Don't Belong Here: Ableist Microaggressions on Adolescents with Disability (ies) and Special Needs in Social Virtual Reality (VR). In CHI'23: Workshop on Combating Toxicity, Harassment, and Abuse in Online Social Spaces, Hamburg, Germany."},{"key":"e_1_2_1_90_1","doi-asserted-by":"publisher","DOI":"10.1145\/3710995"},{"key":"e_1_2_1_91_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.chiabu.2015.04.001"},{"key":"e_1_2_1_92_1","doi-asserted-by":"publisher","DOI":"10.1080\/13691058.2014.931464"},{"key":"e_1_2_1_93_1","doi-asserted-by":"publisher","DOI":"10.1080\/17482798.2021.1969254"},{"key":"e_1_2_1_94_1","doi-asserted-by":"publisher","DOI":"10.18800\/psico.202301.009"},{"key":"e_1_2_1_95_1","volume-title":"The PRISMA 2020 statement: an updated guideline for reporting systematic reviews. International journal of surgery 88","author":"Page Matthew J","year":"2021","unstructured":"Matthew J Page, Joanne E McKenzie, Patrick M Bossuyt, Isabelle Boutron, Tammy C Hoffmann, Cynthia D Mulrow, Larissa Shamseer, Jennifer M Tetzlaff, Elie A Akl, Sue E Brennan, et al . 2021. The PRISMA 2020 statement: an updated guideline for reporting systematic reviews. International journal of surgery 88 (2021), 105906."},{"key":"e_1_2_1_96_1","doi-asserted-by":"publisher","DOI":"10.1344\/der.2020.37.49-63"},{"key":"e_1_2_1_97_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSEC.2024.3417804"},{"key":"e_1_2_1_98_1","doi-asserted-by":"publisher","DOI":"10.1145\/3078072.3079722"},{"key":"e_1_2_1_99_1","doi-asserted-by":"publisher","DOI":"10.1080\/02673843.2019.1617171"},{"key":"e_1_2_1_100_1","doi-asserted-by":"publisher","DOI":"10.1353\/mpq.2023.a928419"},{"key":"e_1_2_1_101_1","doi-asserted-by":"publisher","DOI":"10.1109\/SCCC51225.2020.9281253"},{"key":"e_1_2_1_102_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-60881-0_1"},{"key":"e_1_2_1_103_1","doi-asserted-by":"publisher","DOI":"10.46827\/ejes.v0i0.1017"},{"key":"e_1_2_1_104_1","doi-asserted-by":"publisher","DOI":"10.1145\/3313831.3376400"},{"key":"e_1_2_1_105_1","doi-asserted-by":"publisher","DOI":"10.1007\/s41134-024-00314-2"},{"key":"e_1_2_1_106_1","doi-asserted-by":"publisher","DOI":"10.46743\/2160-3715\/2021.4979"},{"key":"e_1_2_1_107_1","doi-asserted-by":"publisher","DOI":"10.1145\/3544548.3581138"},{"key":"e_1_2_1_108_1","doi-asserted-by":"publisher","DOI":"10.3916\/C46-2016-04"},{"key":"e_1_2_1_109_1","doi-asserted-by":"publisher","DOI":"10.1145\/3544548.3581020"},{"key":"e_1_2_1_110_1","unstructured":"Richard [d-Ct] Sen. Blumenthal. 2023. S.1409 - 118th Congress (2023-2024): Kids Online Safety Act. https:\/\/www.congress.gov\/bill\/118th-congress\/senate-bill\/1409"},{"key":"e_1_2_1_111_1","doi-asserted-by":"publisher","DOI":"10.1089\/cyber.2014.0095"},{"key":"e_1_2_1_112_1","doi-asserted-by":"publisher","DOI":"10.1145\/3091478.3091479"},{"key":"e_1_2_1_113_1","doi-asserted-by":"publisher","DOI":"10.3390\/ijerph17197122"},{"key":"e_1_2_1_114_1","doi-asserted-by":"publisher","DOI":"10.1145\/3173574.3174110"},{"key":"e_1_2_1_115_1","doi-asserted-by":"publisher","DOI":"10.1145\/3313831.3376458"},{"key":"e_1_2_1_116_1","doi-asserted-by":"publisher","DOI":"10.1007\/s12119-018-9522-6"},{"key":"e_1_2_1_117_1","unstructured":"David Thiel Melissa Stroebel and Rebecca Portnoff. 2023. Generative ML and CSAM: Implications and Mitigations."},{"key":"e_1_2_1_118_1","doi-asserted-by":"publisher","DOI":"10.7759\/cureus.66723"},{"key":"e_1_2_1_119_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2016.02.009"},{"key":"e_1_2_1_120_1","doi-asserted-by":"publisher","DOI":"10.1590\/1984-0462\/2022\/40\/2020420IN"},{"key":"e_1_2_1_121_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.compedu.2020.104026"},{"key":"e_1_2_1_122_1","doi-asserted-by":"publisher","DOI":"10.1089\/cyber.2019.0426"},{"key":"e_1_2_1_123_1","doi-asserted-by":"publisher","DOI":"10.3390\/ijerph19095501"},{"key":"e_1_2_1_124_1","doi-asserted-by":"publisher","DOI":"10.1145\/3491102.3502126"},{"key":"e_1_2_1_125_1","doi-asserted-by":"publisher","DOI":"10.7454\/hubs.asia.1161121"},{"key":"e_1_2_1_126_1","doi-asserted-by":"publisher","DOI":"10.23919\/ISTAFRICA.2017.8102292"},{"key":"e_1_2_1_127_1","doi-asserted-by":"publisher","DOI":"10.1145\/3491102.3517643"},{"key":"e_1_2_1_128_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2018.1870874"},{"key":"e_1_2_1_129_1","doi-asserted-by":"publisher","DOI":"10.1145\/2675133.2675293"},{"key":"e_1_2_1_130_1","unstructured":"Pamela Wisniewski Heng Xu Jack Carroll and Mary Beth Rosson. 2013. Grand challenges of researching adolescent online safety: A family systems approach. (2013)."},{"key":"e_1_2_1_131_1","doi-asserted-by":"publisher","DOI":"10.1145\/2998181.2998236"},{"key":"e_1_2_1_132_1","doi-asserted-by":"publisher","DOI":"10.1145\/2858036.2858317"},{"key":"e_1_2_1_133_1","doi-asserted-by":"publisher","DOI":"10.1145\/2907069"},{"key":"e_1_2_1_134_1","doi-asserted-by":"publisher","DOI":"10.1037\/cou0000710"}],"container-title":["Proceedings of the ACM on Human-Computer Interaction"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3757639","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,17]],"date-time":"2025-10-17T01:58:07Z","timestamp":1760666287000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3757639"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,10,16]]},"references-count":134,"journal-issue":{"issue":"7","published-print":{"date-parts":[[2025,10,18]]}},"alternative-id":["10.1145\/3757639"],"URL":"https:\/\/doi.org\/10.1145\/3757639","relation":{},"ISSN":["2573-0142"],"issn-type":[{"type":"electronic","value":"2573-0142"}],"subject":[],"published":{"date-parts":[[2025,10,16]]},"assertion":[{"value":"2025-10-16","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}