skip to main content
10.1145/3544549.3577045acmconferencesArticle/Chapter ViewAbstractPublication PageschiConference Proceedingsconference-collections
extended-abstract

A Human-Centered Approach to Improving Adolescent Real-Time Online Risk Detection Algorithms

Published:19 April 2023Publication History

ABSTRACT

Computational approaches to detect the online risks that the youth encounter have presented promising potentials to protect them online. However, a major identified trend among these approaches is the lack of human-centered machine learning (HCML) aspect. It is necessary to move beyond the computational lens of the detection task to address the societal needs of such a vulnerable population. Therefore, I direct my attention in this dissertation to better understand youths’ risk experiences prior to enhancing the development of risk detection algorithms by 1) Examining youths’ (ages 13–17) public disclosures about sexual experiences and contextualizing these experiences based on the levels of consent (i.e., consensual, non-consensual, sexual abuse) and relationship types (i.e., stranger, dating/friend, family), 2) Moving beyond the sexual experiences to examine a broader array of risks within the private conversations of youth (N = 173) between 13 and 21 and contextualizing the dynamics of youth online and offline risks and the self-reports of risk experiences to the digital trace data, and 3) Building real-time machine learning models for risk detection by creating a contextualized framework. This dissertation provides a human-centered approach for improving automated real-time risk predictions that are derived from a contextualized understanding of the nuances relative to youths’ risk experiences.

Footnotes

References

  1. Zainab Agha, Reza Ghaiumy Anaraky, Karla Badillo-Urquiola, Bridget McHugh, and Pamela Wisniewski. 2021. ‘Just-in-time’parenting: A two-month examination of the bi-directional influences between parental mediation and adolescent online risk exposure. In International Conference on Human-computer interaction. Springer, 261–280.Google ScholarGoogle Scholar
  2. Nancy R Ahern, Jeanne Kemppainen, and Paige Thacker. 2016. Awareness and knowledge of child and adolescent risky behaviors: A parent’s perspective. Journal of Child and Adolescent Psychiatric Nursing 29, 1 (2016), 6–14.Google ScholarGoogle ScholarCross RefCross Ref
  3. Dana Aizenkot. 2020. Social networking and online self-disclosure as predictors of cyberbullying victimization among children and youth. Children and Youth Services Review 119 (2020), 105695.Google ScholarGoogle ScholarCross RefCross Ref
  4. Shiza Ali, Afsaneh Razi, Seunghyun Kim, Ashwaq Alsoubai, Joshua Gracie, Munmun De Choudhury, Pamela J Wisniewski, and Gianluca Stringhini. 2022. Understanding the Digital Lives of Youth: Analyzing Media Shared within Safe Versus Unsafe Private Conversations on Instagram. In CHI Conference on Human Factors in Computing Systems. 1–14.Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. Ashwaq Alsoubai, Xavier Caddle, Ryan Doherty, Alexandra Koehler, Estefania Sanchez, Munmun De Choudhury, and Pamela Wisniewski. 2022. MOSafely, Is that Sus? A Youth-Centric Online Risk Assessment Dashboard. CSCW’22 Companion (2022).Google ScholarGoogle Scholar
  6. Ashwaq Alsoubai, Jihye Song, Afsaneh Razi, Nurun Naher, Munmun De Choudhury, and Pamela J. Wisniewski. 2021. From ‘Friends with Benefits’ to ‘Sextortion:’ A Nuanced Investigation of Adolescents’ Online Sexual Risk Experiences. Proc. ACM Hum.-Comput. Interact. 5, CSCW2 (nov 2021). https://doi.org/10.1145/3555136Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. Monica Anderson, Jingjing Jiang, 2018. Teens, social media & technology 2018. Pew Research Center 31, 2018 (2018), 1673–1689.Google ScholarGoogle Scholar
  8. Randy P Auerbach and Casey K Gardiner. 2012. Moving beyond the trait conceptualization of self-esteem: The prospective effect of impulsiveness, coping, and risky behavior engagement. Behaviour research and therapy 50, 10 (2012), 596–603.Google ScholarGoogle Scholar
  9. Aboluwaji D Ayinmoro, Endurance Uzobo, Bodisere J Teibowei, and Joyce B Fred. 2020. Sexting and other risky sexual behaviour among female students in a Nigerian academic institution. Journal of Taibah University Medical Sciences 15, 2 (2020), 116–121.Google ScholarGoogle ScholarCross RefCross Ref
  10. Asia S Bishop, Christopher M Fleming, and Paula S Nurius. 2020. Substance use profiles among gang-involved youth: social ecology implications for service approaches. Children and youth services review 119 (2020), 105600.Google ScholarGoogle Scholar
  11. Patrick Bours and Halvor Kulsrud. 2019. Detection of Cyber Grooming in Online Conversation. In 2019 IEEE International Workshop on Information Forensics and Security (WIFS). 1–6. https://doi.org/10.1109/WIFS47025.2019.9035090 ISSN: 2157-4774.Google ScholarGoogle ScholarCross RefCross Ref
  12. Dawn Beverley Branley and Judith Covey. 2017. Is exposure to online content depicting risky behavior related to viewers’ own risky behavior offline?Computers in Human Behavior 75 (2017), 283–287.Google ScholarGoogle Scholar
  13. Dawn Beverley Branley and Judith Covey. 2018. Risky behavior via social media: The role of reasoned and social reactive pathways. Computers in human behavior 78 (2018), 183–191.Google ScholarGoogle Scholar
  14. Jonas Burén and Carolina Lunde. 2018. Sexting among adolescents: A nuanced and gendered online challenge for young people. Computers in Human Behavior 85 (2018), 210–217.Google ScholarGoogle ScholarCross RefCross Ref
  15. E Calvete, L Fernández-González, E Royuela-Colomer, A Morea, M Larrucea-Iruretagoyena, JM Machimbarrena, J Gónzalez-Cabrera, and I Orue. 2021. Moderating factors of the association between being sexually solicited by adults and active online sexual behaviors in adolescents. Computers in Human Behavior(2021), 106935.Google ScholarGoogle Scholar
  16. Pooja Chaudhary, Melissa Peskin, Jeff R Temple, Robert C Addy, Elizabeth Baumler, and Shegog Ross. 2017. Sexting and mental health: a school-based longitudinal study among youth in Texas.Journal of Applied Research on Children 8, 1 (2017), 11.Google ScholarGoogle Scholar
  17. Jacob Eisenstein, Amr Ahmed, and Eric P Xing. 2011. Sparse additive generative models of text. In Proceedings of the 28th international conference on machine learning (ICML-11). 1041–1048.Google ScholarGoogle Scholar
  18. Vaishali U Gongane, Mousami V Munot, and Alwin D Anuse. 2022. Detection and moderation of detrimental content on social media platforms: current status and future directions. Social Network Analysis and Mining 12, 1 (2022), 1–41.Google ScholarGoogle Scholar
  19. Naeemul Hassan, Amrit Poudel, Jason Hale, Claire Hubacek, Khandaker Tasnim Huq, Shubhra Kanti Karmaker Santu, and Syed Ishtiaque Ahmed. 2020. Towards Automated Sexual Violence Report Tracking. In Proceedings of the Int’l AAAI Conf. on Web and Social Media, Vol. 14. 250–259.Google ScholarGoogle ScholarCross RefCross Ref
  20. Sepp Hochreiter and Jürgen Schmidhuber. 1997. Long short-term memory. Neural computation 9, 8 (1997), 1735–1780.Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. Hsiu-Fang Hsieh and Sarah E Shannon. 2005. Three approaches to qualitative content analysis. Qualitative health research 15, 9 (2005), 1277–1288.Google ScholarGoogle Scholar
  22. Giacomo Inches and Fabio Crestani. 2012. Overview of the International Sexual Predator Identification Competition at PAN-2012.. In CLEF (Online working notes/labs/workshop), Vol. 30.Google ScholarGoogle Scholar
  23. Dylan B Jackson, Cashen M Boccio, and Wanda E Leal. 2020. Do youth who vape exhibit risky health lifestyles? Monitoring the future, 2017. Preventive medicine 136(2020), 106101.Google ScholarGoogle Scholar
  24. Alejandro Jaimes, Daniel Gatica-Perez, Nicu Sebe, and Thomas S Huang. 2007. Guest Editors’ Introduction: Human-Centered Computing–Toward a Human Revolution. Computer 40, 5 (2007), 30–34.Google ScholarGoogle ScholarDigital LibraryDigital Library
  25. Betul Keles, Niall McCrae, and Annmarie Grealish. 2020. A systematic review: the influence of social media on depression, anxiety and psychological distress in adolescents. International Journal of Adolescence and Youth 25, 1 (2020), 79–93.Google ScholarGoogle ScholarCross RefCross Ref
  26. Poco D Kernsmith, Bryan G Victor, and Joanne P Smith-Darden. 2018. Online, offline, and over the line: Coercive sexting among adolescent dating partners. Youth & Society 50, 7 (2018), 891–904.Google ScholarGoogle ScholarCross RefCross Ref
  27. Seunghyun Kim, Afsaneh Razi, Gianluca Stringhini, Pamela J. Wisniewski, and Munmun De Choudhury. 2021. A Human-Centered Systematic Literature Review of Cyberbullying Detection Algorithms. Proc. ACM Hum.-Comput. Interact. 5, CSCW2, Article 325 (oct 2021), 34 pages. https://doi.org/10.1145/3476066Google ScholarGoogle ScholarDigital LibraryDigital Library
  28. Seunghyun Kim, Afsaneh Razi, Gianluca Stringhini, Pamela J Wisniewski, and Munmun De Choudhury. 2021. You Don’t Know How I Feel: Insider-Outsider Perspective Gaps in Cyberbullying Risk Detection.. In ICWSM. 290–302.Google ScholarGoogle Scholar
  29. E David Klonsky and Catherine R Glenn. 2009. Assessing the functions of non-suicidal self-injury: Psychometric properties of the Inventory of Statements About Self-injury (ISAS). Journal of psychopathology and behavioral assessment 31, 3(2009), 215–219.Google ScholarGoogle ScholarCross RefCross Ref
  30. Sonia Livingstone and Ellen Helsper. 2010. Balancing opportunities and risks in teenagers’ use of the internet: the role of online skills and internet self-efficacy. New Media & Society 12, 2 (March 2010), 309–329. https://doi.org/10.1177/1461444809342697Google ScholarGoogle ScholarCross RefCross Ref
  31. Francesco Lupariello, Serena Maria Curti, Elena Coppo, Sara Simona Racalbuto, and Giancarlo Di Vella. 2019. Self-harm risk among adolescents and the phenomenon of the “Blue Whale Challenge”: case series and review of the literature. Journal of forensic sciences 64, 2 (2019), 638–642.Google ScholarGoogle ScholarCross RefCross Ref
  32. Kimberly J Mitchell, David Finkelhor, and Janis Wolak. 2007. Youth Internet users at risk for the most serious online sexual solicitations. American Journal of Preventive Medicine 32, 6 (2007), 532–537.Google ScholarGoogle ScholarCross RefCross Ref
  33. Kimberly J Mitchell and Lisa M Jones. 2011. Youth Internet Safety Study (YISS): Methodology Report.(2011).Google ScholarGoogle Scholar
  34. Bengt Muthén and Bengt O Muthén. 2009. Statistical analysis with latent variables. Wiley New York, NY.Google ScholarGoogle Scholar
  35. Anthony T Pinter, Pamela J Wisniewski, Heng Xu, Mary Beth Rosson, and Jack M Caroll. 2017. Adolescent online safety: Moving beyond formative evaluations to designing solutions for the future. In Proceedings of the 2017 Conference on Interaction Design and Children. 352–357.Google ScholarGoogle ScholarDigital LibraryDigital Library
  36. Afsaneh Razi, Ashwaq Alsoubai, Seunghyun Kim, Shiza Ali, Gianluca Stringhini, Munmun De Choudhury, and Pamela J. Wisniewski. 2023. Sliding into My DMs: Detecting Uncomfortable or Unsafe Sexual Risk Experiences within Instagram Direct Messages Grounded in the Perspective of Youth. Proc. ACM Hum.-Comput. Interact.CSCW2 (Accepted, but Not Published 2023).Google ScholarGoogle ScholarDigital LibraryDigital Library
  37. Afsaneh Razi, Ashwaq AlSoubai, Seunghyun Kim, Nurun Naher, Shiza Ali, Gianluca Stringhini, Munmun De Choudhury, and Pamela J Wisniewski. 2022. Instagram Data Donation: A Case Study on Collecting Ecologically Valid Social Media Data for the Purpose of Adolescent Online Risk Detection. In CHI Conference on Human Factors in Computing Systems Extended Abstracts. 1–9.Google ScholarGoogle Scholar
  38. Afsaneh Razi, Karla Badillo-Urquiola, and Pamela J Wisniewski. 2020. Let’s Talk about Sext: How Adolescents Seek Support and Advice about Their Online Sexual Experiences. In Proceedings of the 2020 CHI Conference on Human Factors in Computing Systems. 1–13.Google ScholarGoogle ScholarDigital LibraryDigital Library
  39. Afsaneh Razi, Seunghyun Kim, Ashwaq Alsoubai, Xavier Caddle, Shiza Ali, Gianluca Stringhini, Munmun De Choudhury, and Pamela Wisniewski. 2021. Teens at the Margin: Artificially Intelligent Technology for Promoting Adolescent Online Safety. In ACM Conference on Human Factors in Computing Systems (CHI 2021)/Artificially Intelligent Technology for the Margins: A Multidisciplinary Design Agenda Workshop.Google ScholarGoogle ScholarCross RefCross Ref
  40. Afsaneh Razi, Seunghyun Kim, Ashwaq Alsoubai, Gianluca Stringhini, Thamar Solorio, Munmun De Choudhury, and Pamela J. Wisniewski. 2021. A Human-Centered Systematic Literature Review of the Computational Approaches for Online Sexual Risk Detection. Proc. ACM Hum.-Comput. Interact. 5, CSCW2, Article 465 (oct 2021), 38 pages. https://doi.org/10.1145/3479609Google ScholarGoogle ScholarDigital LibraryDigital Library
  41. Tim Rocktäschel, Edward Grefenstette, Karl Moritz Hermann, Tomáš Kočiskỳ, and Phil Blunsom. 2015. Reasoning about entailment with neural attention. arXiv preprint arXiv:1509.06664(2015).Google ScholarGoogle Scholar
  42. Jennifer D. Shapka and Rose Maghsoudi. 2017. Examining the validity and reliability of the cyber-aggression and cyber-victimization scale. Computers in Human Behavior 69 (April 2017), 10–17. https://doi.org/10.1016/j.chb.2016.12.015Google ScholarGoogle ScholarDigital LibraryDigital Library
  43. Michael A Tarrant, Michael J Manfredo, Peter B Bayley, and Richard Hess. 1993. Effects of recall bias and nonresponse bias on self-report estimates of angling participation. North American Journal of Fisheries Management 13, 2(1993), 217–222.Google ScholarGoogle ScholarCross RefCross Ref
  44. Joris Van Ouytsel, Michel Walrave, Lieven De Marez, Bart Vanhaelewyn, and Koen Ponnet. 2020. A first investigation into gender minority adolescents’ sexting experiences. Journal of Adolescence 84 (2020), 213–218.Google ScholarGoogle ScholarCross RefCross Ref
  45. Sebastian Wachs, Michelle F Wright, Manuel Gámez-Guadix, and Nicola Döring. 2021. How are consensual, non-consensual, and pressured sexting linked to depression and self-harm? The moderating effects of demographic variables. Int’l journal of environmental research and public health 18, 5(2021), 2597.Google ScholarGoogle Scholar
  46. Pamela Wisniewski, Heng Xu, Mary Beth Rosson, Daniel F. Perkins, and John M. Carroll. 2016. Dear Diary: Teens Reflect on Their Weekly Online Risk Experiences. In Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems(CHI ’16). ACM, New York, NY, USA, 3919–3930. https://doi.org/10.1145/2858036.2858317 event-place: San Jose, California, USA.Google ScholarGoogle ScholarDigital LibraryDigital Library
  47. Janis Wolak, David Finkelhor, Wendy Walsh, and Leah Treitman. 2018. Sextortion of minors: Characteristics and dynamics. Journal of Adolescent Health 62, 1 (2018), 72–79.Google ScholarGoogle ScholarCross RefCross Ref
  48. Zichao Yang, Diyi Yang, Chris Dyer, Xiaodong He, Alex Smola, and Eduard Hovy. 2016. Hierarchical attention networks for document classification. In Proceedings of the 2016 conference of the North American chapter of the association for computational linguistics: human language technologies. 1480–1489.Google ScholarGoogle ScholarCross RefCross Ref
  49. Jianhua Yin and Jianyong Wang. 2014. A dirichlet multinomial mixture model-based approach for short text clustering. Proceedings of the 20th ACM SIGKDD international conference on Knowledge discovery and data mining(2014).Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. A Human-Centered Approach to Improving Adolescent Real-Time Online Risk Detection Algorithms

        Recommendations

        Comments

        Login options

        Check if you have access through your login credentials or your institution to get full access on this article.

        Sign in
        • Published in

          cover image ACM Conferences
          CHI EA '23: Extended Abstracts of the 2023 CHI Conference on Human Factors in Computing Systems
          April 2023
          3914 pages
          ISBN:9781450394222
          DOI:10.1145/3544549

          Copyright © 2023 Owner/Author

          Permission to make digital or hard copies of part or all of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for third-party components of this work must be honored. For all other uses, contact the Owner/Author.

          Publisher

          Association for Computing Machinery

          New York, NY, United States

          Publication History

          • Published: 19 April 2023

          Check for updates

          Qualifiers

          • extended-abstract
          • Research
          • Refereed limited

          Acceptance Rates

          Overall Acceptance Rate6,164of23,696submissions,26%

          Upcoming Conference

          CHI '24
          CHI Conference on Human Factors in Computing Systems
          May 11 - 16, 2024
          Honolulu , HI , USA

        PDF Format

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader

        Full Text

        View this article in Full Text.

        View Full Text

        HTML Format

        View this article in HTML Format .

        View HTML Format