skip to main content
research-article
Public Access

Conducting Risky Research with Teens: Co-designing for the Ethical Treatment and Protection of Adolescents

Published:05 January 2021Publication History
Skip Abstract Section

Abstract

The methods in which we study the online experiences of adolescents should be evidence-based and informed by youth. This is especially true when studying sensitive topics, such as the online risk behaviors of minors. We directly engaged 20 adolescents (ages 12-18) in the co-design of two different research methodologies (i.e., diary studies and analyzing social media trace data) for conducting adolescent online safety research. We also interviewed 13 of their parents to understand their perspectives. Overall, teens wanted to share their personal experiences and benefit society, while parents wanted researchers to tackle a topic that they felt was a prevalent problem for teens. Yet, they both had significant concerns regarding data privacy of the sensitive disclosures made by teens during such studies. Teens' feared getting in trouble. Participants emphasized the importance of developing a trusting relationship with the researcher to overcome these concerns. Participants also saw the potential for using the research study as a tool for risk-reporting and mitigation, where researchers could act as liaisons between the teens and other parties (e.g., counselors, law enforcement, parents) to share pertinent risk details and facilitate resources or even help teens directly by giving them strategies for mitigating online risks they encountered during the study. Our research delves into important ethical considerations for conducting risk-focused research with adolescents and uncovers the critical need for designing risk-based research for youth protection. We provide researchers with heuristic guidelines for conducting ethical research with vulnerable populations (i.e., adolescents) and keeping participants safe while doing so.

References

  1. Jeffrey Jensen Arnett. 2000. Emerging adulthood: A theory of development from the late teens through the twenties. American Psychologist 55, 5: 469--480. https://doi.org/10.1037/0003-066X.55.5.469Google ScholarGoogle Scholar
  2. Zahra Ashktorab and Jessica Vitak. 2016. Designing Cyberbullying Mitigation and Prevention Solutions through Participatory Design With Teenagers. In Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems (CHI '16), 3895--3905. https://doi.org/10.1145/2858036.2858548Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. Karla A. Badillo-Urquiola, Diva Smriti, Brenna McNally, Evan Golub, Elizabeth Bonsignore, and Pamela J. Wisniewski. 2019. Stranger Danger!: Social Media App Features Co-designed with Children to Keep Them Safe Online. In IDC. https://doi.org/10.1145/3311927.3323133Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. Karla Badillo-Urquiola, Chhaya Chouhan, Stevie Chancellor, Munmun De Choudhary, and Pamela Wisniewski. 2020. Beyond Parental Control: Designing Adolescent Online Safety Apps Using Value Sensitive Design. Journal of Adolescent Research 35, 1: 147--175. https://doi.org/10.1177/0743558419884692Google ScholarGoogle Scholar
  5. Karla Badillo-Urquiola, Xinru Page, and Pamela J. Wisniewski. 2019. Risk vs. Restriction: The Tension between Providing a Sense of Normalcy and Keeping Foster Teens Safe Online. In Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems (CHI '19), 1--14. https://doi.org/10.1145/3290605.3300497Google ScholarGoogle Scholar
  6. Jeanette Bell and Tuck Wah Leong. 2019. Collaborative Futures: Co-Designing Research Methods for Younger People Living with Dementia. In Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems (CHI '19), 1--13. https://doi.org/10.1145/3290605.3300582Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. Arpita Bhattacharya, Calvin Liang, Emily Y. Zeng, Kanishk Shukla, Miguel E. R. Wong, Sean A. Munson, and Julie A. Kientz. 2019. Engaging Teenagers in Asynchronous Online Groups to Design for Stress Management. In Proceedings of the 18th ACM International Conference on Interaction Design and Children (IDC '19), 26--37. https://doi.org/10.1145/3311927.3323140Google ScholarGoogle Scholar
  8. Elin A. Björling, Rachael Cicero, Aditya Sankar, and Anand Sekar. 2019. Thought Disposal: Co-Designing a virtual interaction to reduce stress in teens. In Proceedings of the 18th ACM International Conference on Interaction Design and Children (IDC '19), 562--567. https://doi.org/10.1145/3311927.3325313Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. Lindsay Blackwell, Emma Gardiner, and Sarita Schoenebeck. 2016. Managing Expectations: Technology Tensions among Parents and Teens. In Proceedings of the 19th ACM Conference on Computer-Supported Cooperative Work & Social Computing - CSCW '16, 1388--1399. https://doi.org/10.1145/2818048.2819928Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. Eva Brandt, Thomas Binder, and Elizabeth B.-N. Sanders. 2012. Tools and techniques. Routledge Handbooks Online. https://doi.org/10.4324/9780203108543.ch7Google ScholarGoogle Scholar
  11. Virginia Braun and Victoria Clarke. 2012. Thematic analysis. In APA handbook of research methods in psychology. 57--71.Google ScholarGoogle Scholar
  12. Margaret H. Buck and Rachel M. Magee. 2017. Teens Becoming Researchers: Pedagogical Considerations When Designing Coresearch. Library Trends 65, 4: 659--683. https://doi.org/10.1353/lib.2017.0023Google ScholarGoogle ScholarCross RefCross Ref
  13. Child Exploitation and Obscenity Section. Citizen's Guide To U.S. Federal Law On Child Pornography. U.S. Department of Justice. Retrieved May 14, 2020 from https://www.justice.gov/criminal-ceos/citizens-guide-us-federal-law-child-pornographyGoogle ScholarGoogle Scholar
  14. Child Welfare Information Gateway. Mandatory Reporters of Child Abuse and Neglect. State Statutes. Retrieved May 26, 2020 from https://www.childwelfare.gov/topics/systemwide/laws-policies/statutes/manda/Google ScholarGoogle Scholar
  15. W. Scott Comulada, Marguerita Lightfoot, Dallas Swendeman, Christine Grella, and Nancy Wu. 2015. Compliance to Cell Phone-Based EMA Among Latino Youth in Outpatient Treatment. Journal of Ethnicity in Substance Abuse 14, 3: 232--250. https://doi.org/10.1080/15332640.2014.986354Google ScholarGoogle ScholarCross RefCross Ref
  16. Ewa K. Czyz, Cheryl A. King, and Inbal Nahum-Shani. 2018. Ecological assessment of daily suicidal thoughts and attempts among suicidal teens after psychiatric hospitalization: Lessons about feasibility and acceptability. Psychiatry Research 267: 566--574. https://doi.org/10.1016/j.psychres.2018.06.031Google ScholarGoogle ScholarCross RefCross Ref
  17. Department of Health, Education, and Welfare and National Commission for the Protection of Human Subjects of Biomedical and Behavioral Research. 2014. The Belmont Report. Ethical principles and guidelines for the protection of human subjects of research. The Journal of the American College of Dentists 81, 3: 4--13.Google ScholarGoogle Scholar
  18. Stefan C. Dombrowski, John W. LeMasney, C. Emmanuel Ahia, and Shannon A. Dickson. 2004. Protecting Children From Online Sexual Predators: Technological, Psychoeducational, and Legal Considerations. Professional Psychology: Research and Practice 35, 1: 65--73. https://doi.org/10.1037/0735--7028.35.1.65Google ScholarGoogle ScholarCross RefCross Ref
  19. Jaco S. Dreyer. 1998. The Researcher': Engaged Participant or Detached Observer? Journal of Empirical Theology 11, 2: 5--22. https://doi.org/10.1163/157092598X00103Google ScholarGoogle ScholarCross RefCross Ref
  20. Allison Druin, Ben Bederson, Angela Boltman, Adrian Miura, Debby Knotts-Callahan, and Mark Platt. Chapter 3: Children as Our Technology Design Partners. 9.Google ScholarGoogle Scholar
  21. Jóhanna Einarsdóttir. 2007. Research with children: methodological and ethical challenges. European Early Childhood Education Research Journal 15, 2: 197--211. https://doi.org/10.1080/13502930701321477Google ScholarGoogle ScholarCross RefCross Ref
  22. Lee B. Erickson, Pamela Wisniewski, Heng Xu, John M. Carroll, Mary Beth Rosson, and Daniel F. Perkins. 2016. The boundaries between: Parental involvement in a teen's online world. Journal of the Association for Information Science and Technology 67, 6: 1384--1403. https://doi.org/10.1002/asi.23450Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. Casey Fiesler. 2019. Why (and how) academics should blog their papers. Medium. Retrieved May 28, 2020 from https://medium.com/@cfiesler/why-and-how-academics-should-blog-their-papers-e6869559b8eaGoogle ScholarGoogle Scholar
  24. Casey Fiesler and Nicholas Proferes. 2018. 'Participant' Perceptions of Twitter Research Ethics. Social Media + Society 4, 1: 2056305118763366. https://doi.org/10.1177/2056305118763366Google ScholarGoogle Scholar
  25. Casey Fiesler, Alyson Young, Tamara Peyton, Amy S. Bruckman, Mary Gray, Jeff Hancock, and Wayne Lutters. 2015. Ethics for Studying Online Sociotechnical Systems in a Big Data World. In Proceedings of the 18th ACM Conference Companion on Computer Supported Cooperative Work & Social Computing (CSCW'15 Companion), 289--292. https://doi.org/10.1145/2685553.2685558Google ScholarGoogle ScholarDigital LibraryDigital Library
  26. Robert J. Fisher. 1993. Social Desirability Bias and the Validity of Indirect Questioning. Journal of Consumer Research 20, 2: 303--315. https://doi.org/10.1086/209351Google ScholarGoogle ScholarCross RefCross Ref
  27. Rosie Flewitt*. 2005. Conducting research with young children: some ethical considerations. Early Child Development and Care 175, 6: 553--565. https://doi.org/10.1080/03004430500131338Google ScholarGoogle ScholarCross RefCross Ref
  28. J. Dennis Fortenberry and Devon J. Hensel. 2011. The association of sexual interest and sexual behaviors among adolescent women: A daily diary perspective. Hormones and Behavior 59, 5: 739--744. https://doi.org/10.1016/j.yhbeh.2011.03.003Google ScholarGoogle ScholarCross RefCross Ref
  29. Sarah Fox and Daniela K. Rosner. 2016. Continuing the Dialogue: Bringing Research Accounts Back into the Field. In Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems (CHI '16), 1426--1430. https://doi.org/10.1145/2858036.2858054Google ScholarGoogle ScholarDigital LibraryDigital Library
  30. Batya Friedman, Peter H. Kahn, and Alan Borning. 2006. Value Sensitive Design and Information Systems. In Human-Computer Interaction and Management Information Systems: Foundations. M.E. Sharpe, 348--372.Google ScholarGoogle Scholar
  31. Carolyn Garcia, Rachel R. Hardeman, Gyu Kwon, Elizabeth Lando-King, Lei Zhang, Therese Genis, Sonya S. Brady, and Elizabeth Kinder. 2014. Teenagers and Texting: Use of a Youth Ecological Momentary Assessment System in Trajectory Health Research With Latina Adolescents. JMIR mHealth and uHealth 2, 1: e3. https://doi.org/10.2196/mhealth.2576Google ScholarGoogle Scholar
  32. Arup Kumar Ghosh, Karla A. Badillo-Urquiola, Heng Xu, Mary Beth Rosson, John M. Carroll, and Pamela Wisniewski. 2017. Examining Parents? Technical Mediation of Teens? Mobile Devices. In Companion of the 2017 ACM Conference on Computer Supported Cooperative Work and Social Computing (CSCW '17 Companion), 179--182. https://doi.org/10.1145/3022198.3026306Google ScholarGoogle Scholar
  33. Arup Kumar Ghosh, Karla Badillo-Urquiola, Shion Guha, Joseph J. LaViola Jr, and Pamela J. Wisniewski. 2018. Safety vs. Surveillance: What Children Have to Say about Mobile Apps for Parental Control. In Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems - CHI '18, 1--14. https://doi.org/10.1145/3173574.3173698Google ScholarGoogle ScholarDigital LibraryDigital Library
  34. Arup Kumar Ghosh, Karla Badillo-Urquiola, Mary Beth Rosson, Heng Xu, John M. Carroll, and Pamela J. Wisniewski. 2018. A Matter of Control or Safety?: Examining Parental Use of Technical Monitoring Apps on Teens? Mobile Devices. In Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems - CHI '18, 1--14. https://doi.org/10.1145/3173574.3173768Google ScholarGoogle Scholar
  35. Arup Kumar Ghosh, Charles E. Hughes, and Pamela J. Wisniewski. 2020. Circle of Trust: A New Approach to Mobile Online Safety for Families. In Proceedings of the 2020 CHI Conference on Human Factors in Computing Systems (CHI '20), 1--14. https://doi.org/10.1145/3313831.3376747Google ScholarGoogle ScholarDigital LibraryDigital Library
  36. Amy A. Gorin and Alan A. Stone. 2001. Recall biases and cognitive errors in retrospective self reports: A call for momentary assessments. Retrieved May 26, 2020 from /paper/Recall-biases-and-cognitive-errors-in-retrospective-Gorin-Stone/5061d49f510d441955a4c3561db52a58db421c09Google ScholarGoogle Scholar
  37. Anne Graham, Mary Ann Powell, and Nicola Taylor. 2015. Ethical Research Involving Children: Encouraging Reflexive Engagement in Research with Children and Young People. Children & Society 29, 5: 331--343. https://doi.org/10.1111/chso.12089Google ScholarGoogle ScholarCross RefCross Ref
  38. Charles R. Hale. 2008. Engaging Contradictions: Theory, Politics, and Methods of Activist Scholarship. University of California Press.Google ScholarGoogle ScholarCross RefCross Ref
  39. Gillian R. Hayes. 2014. Knowing by Doing: Action Research as an Approach to HCI. In Ways of Knowing in HCI, Judith S. Olson and Wendy A. Kellogg (eds.). Springer, New York, NY, 49--68. https://doi.org/10.1007/978--1--4939-0378--8_3Google ScholarGoogle Scholar
  40. Marcia Hern, Margaret Miller, Marylin Sommers, and Janice Dyehouse. 1998. Sensitive topics and adolescents: making research about risk behaviors happen. Issues in Comprehensive Pediatric Nursing 21, 3: 173--186. https://doi.org/10.1080/014608698265483Google ScholarGoogle ScholarCross RefCross Ref
  41. Matthew K. Hong, Udaya Lakshmi, Kimberly Do, Sampath Prahalad, Thomas Olson, Rosa I. Arriaga, and Lauren Wilcox. 2020. Using Diaries to Probe the Illness Experiences of Adolescent Patients and Parental Caregivers. In Proceedings of the 2020 CHI Conference on Human Factors in Computing Systems (CHI '20), 1--16. https://doi.org/10.1145/3313831.3376426Google ScholarGoogle ScholarDigital LibraryDigital Library
  42. Simon Huang, Lynsey J. Martin, Calvin H. Yeh, Alvin Chin, Heather Murray, William B. Sanderson, Rohit Mohindra, Teresa M. Chan, and Brent Thoma. 2018. The effect of an infographic promotion on research dissemination and readership: A randomized controlled trial. Canadian Journal of Emergency Medicine 20, 6: 826--833. https://doi.org/10.1017/cem.2018.436Google ScholarGoogle ScholarCross RefCross Ref
  43. Lori G. Irwin and Joy Johnson. 2005. Interviewing young children: explicating our practices and dilemmas. Qualitative Health Research 15, 6: 821--831. https://doi.org/10.1177/1049732304273862Google ScholarGoogle ScholarCross RefCross Ref
  44. Shaeffer Katherine. Most U.S. teens who use cellphones do it to pass time, connect with others, learn new things. Pew Research Center. Retrieved May 28, 2020 from https://www.pewresearch.org/fact-tank/2019/08/23/most-u-s-teens-who-use-cellphones-do-it-to-pass-time-connect-with-others-learn-new-things/Google ScholarGoogle Scholar
  45. Sonia Livingstone, Kjartan Ólafsson, Ellen J. Helsper, Francisco Lupiáñez-Villanueva, Giuseppe A. Veltri, and Frans Folkvord. 2017. Maximizing Opportunities and Minimizing Risks for Children Online: The Role of Digital Skills in Emerging Strategies of Parental Mediation. Journal of Communication 67, 1: 82--105. https://doi.org/10.1111/jcom.12277Google ScholarGoogle Scholar
  46. I. Scott MacKenzie and Steven J. Castellucci. 2019. Empirical Research Methods for Human-Computer Interaction. In Extended Abstracts of the 2019 CHI Conference on Human Factors in Computing Systems (CHI EA '19), 1--3. https://doi.org/10.1145/3290607.3298803Google ScholarGoogle Scholar
  47. Hiroaki Masaki, Kengo Shibata, Shui Hoshino, Takahiro Ishihama, Nagayuki Saito, and Koji Yatani. 2020. Exploring Nudge Designs to Help Adolescent SNS Users Avoid Privacy and Safety Threats. In Proceedings of the 2020 CHI Conference on Human Factors in Computing Systems (CHI '20), 1--11. https://doi.org/10.1145/3313831.3376666Google ScholarGoogle ScholarDigital LibraryDigital Library
  48. Nora McDonald, Karla Badillo-Urquiola, Morgan G. Ames, Nicola Dell, Elizabeth Keneski, Manya Sleeper, and Pamela J. Wisniewski. 2020. Privacy and Power: Acknowledging the Importance of Privacy Research and Design for Vulnerable Populations. In Extended Abstracts of the 2020 CHI Conference on Human Factors in Computing Systems (CHI EA '20), 1--8. https://doi.org/10.1145/3334480.3375174Google ScholarGoogle ScholarDigital LibraryDigital Library
  49. Bridget Christine McHugh, Pamela J. Wisniewski, Mary Beth Rosson, Heng Xu, and John M. Carroll. 2017. Most Teens Bounce Back: Using Diary Methods to Examine How Quickly Teens Recover from Episodic Online Risk Exposure. Proceedings of the ACM on Human-Computer Interaction 1, CSCW: 76:1--76:19. https://doi.org/10.1145/3134711Google ScholarGoogle Scholar
  50. Bridget Christine McHugh, Pamela Wisniewski, Mary Beth Rosson, and John M. Carroll. 2018. When social media traumatizes teens: The roles of online risk exposure, coping, and post-traumatic stress. Internet Research 28, 5: 1169--1188. https://doi.org/10.1108/IntR-02--2017-0077Google ScholarGoogle ScholarCross RefCross Ref
  51. Dean McKay, Amy Przeworski, and Shannon O'Neill. 2016. Chapter 14 - Emerging Technologies for Clinical Practice. In Computer-Assisted and Web-Based Innovations in Psychology, Special Education, and Health, James K. Luiselli and Aaron J. Fischer (eds.). Academic Press, San Diego, 365--378. https://doi.org/10.1016/B978-0--12--802075--3.00014-0Google ScholarGoogle Scholar
  52. Brenna McNally, Priya Kumar, Chelsea Hordatt, Matthew Louis Mauriello, Shalmali Naik, Leyla Norooz, Alazandra Shorter, Evan Golub, and Allison Druin. 2018. Co-designing Mobile Online Safety Applications with Children. In Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems (CHI '18), 1--9. https://doi.org/10.1145/3173574.3174097Google ScholarGoogle ScholarDigital LibraryDigital Library
  53. Kimberly Mitchell and Lisa Jones. 2012. Youth Internet Safety Study (YISS): Methodology Report. Crimes Against Children Research Center. Retrieved from https://scholars.unh.edu/ccrc/51Google ScholarGoogle Scholar
  54. Kimberly Mitchell, Lisa Jones, David Finkelhor, and Janis Wolak. 2014. Trends in Unwanted Online Experiences and Sexting?: Final Report. Crimes Against Children Research Center. Retrieved from https://scholars.unh.edu/ccrc/49Google ScholarGoogle Scholar
  55. Hendrik Müller, Aaron Sedley, and Elizabeth Ferrall-Nunge. 2014. Survey Research in HCI. In Ways of Knowing in HCI, Judith S. Olson and Wendy A. Kellogg (eds.). Springer, New York, NY, 229--266. https://doi.org/10.1007/978--1--4939-0378--8_10Google ScholarGoogle Scholar
  56. Michael J. Muller and Sarah Kuhn. 1993. Participatory Design. Commun. ACM 36, 6: 24--28. https://doi.org/10.1145/153571.255960Google ScholarGoogle ScholarDigital LibraryDigital Library
  57. National Institutes of Health. 2020. Certificates of Confidentiality (CoC) - Human Subjects. U.S. Department of Health and Human Services. Retrieved May 13, 2020 from https://grants.nih.gov/policy/humansubjects/coc.htmGoogle ScholarGoogle Scholar
  58. Jennie G. Noll, Chad E. Shenk, Jaclyn E. Barnes, and Katherine J. Haralson. 2013. Association of Maltreatment With High-Risk Internet Behaviors and Offline Encounters. Pediatrics 131, 2: e510--e517. https://doi.org/10.1542/peds.2012--1281Google ScholarGoogle ScholarCross RefCross Ref
  59. Marije Nouwen, Maarten Van Mechelen, and Bieke Zaman. 2015. A value sensitive design approach to parental software for young children. In Proceedings of the 14th International Conference on Interaction Design and Children (IDC '15), 363--366. https://doi.org/10.1145/2771839.2771917Google ScholarGoogle ScholarDigital LibraryDigital Library
  60. Judith S. Olson and Wendy A. Kellogg (eds.). 2014. Ways of Knowing in HCI. Springer-Verlag, New York. https://doi.org/10.1007/978--1--4939-0378--8Google ScholarGoogle Scholar
  61. Anthony T. Pinter, Pamela J. Wisniewski, Heng Xu, Mary Beth Rosson, and Jack M. Caroll. 2017. Adolescent Online Safety: Moving Beyond Formative Evaluations to Designing Solutions for the Future. In Proceedings of the 2017 Conference on Interaction Design and Children - IDC '17, 352--357. https://doi.org/10.1145/3078072.3079722Google ScholarGoogle Scholar
  62. Erika S. Poole and Tamara Peyton. 2013. Interaction design research with adolescents: methodological challenges and best practices. In Proceedings of the 12th International Conference on Interaction Design and Children (IDC '13), 211--217. https://doi.org/10.1145/2485760.2485766Google ScholarGoogle ScholarDigital LibraryDigital Library
  63. Afsaneh Razi, Karla Badillo-Urquiola, and Pamela J. Wisniewski. 2020. Let's Talk about Sext: How Adolescents Seek Support and Advice about Their Online Sexual Experiences. In Proceedings of the 2020 CHI Conference on Human Factors in Computing Systems (CHI '20), 1--13. https://doi.org/10.1145/3313831.3376400Google ScholarGoogle ScholarDigital LibraryDigital Library
  64. Janet C. Read. 2018. Research Methods for Child Computer Interaction. In Extended Abstracts of the 2018 CHI Conference on Human Factors in Computing Systems (CHI EA '18), 1--4. https://doi.org/10.1145/3170427.3170656Google ScholarGoogle Scholar
  65. Janet C Read. 2018. Doing research with children: a child computer interaction perspective. In Proceedings of the 17th ACM Conference on Interaction Design and Children (IDC '18), 745--747. https://doi.org/10.1145/3202185.3205872Google ScholarGoogle ScholarDigital LibraryDigital Library
  66. Beate Rossler. 2004. The Value of Privacy. Polity Press, Cambridge, MA.Google ScholarGoogle Scholar
  67. Johanna Sam, Pamela Wisniewski, Heng Xu, Mary Beth Rosson, and John M. Carroll. 2017. How Are Social Capital and Parental Mediation Associated with Cyberbullying and Cybervictimization Among Youth in the United States? In HCI International 2017 -- Posters? Extended Abstracts (Communications in Computer and Information Science), 638--644. https://doi.org/10.1007/978--3--319--58753-0_90Google ScholarGoogle Scholar
  68. Saul Shiffman. 2009. Ecological momentary assessment (EMA) in studies of substance use. Psychological Assessment 21, 4: 486--497. https://doi.org/10.1037/a0017074Google ScholarGoogle ScholarCross RefCross Ref
  69. Vera Slavtcheva-Petkova, Victoria Jane Nash, and Monica Bulger. 2015. Evidence on the extent of harms experienced by children as a result of online risks: implications for policy and research. Information, Communication & Society 18, 1: 48--62. https://doi.org/10.1080/1369118X.2014.934387Google ScholarGoogle ScholarCross RefCross Ref
  70. Snap Inc. Snapstreaks. Retrieved May 28, 2020 from https://support.snapchat.com/en-GB/a/snapstreaksGoogle ScholarGoogle Scholar
  71. Clay Spinuzzi. 2005. The methodology of participatory design. Technical Communication 52, 2: 163--175.Google ScholarGoogle Scholar
  72. Hyewon Suh, Nina Shahriaree, Eric B. Hekler, and Julie A. Kientz. 2016. Developing and Validating the User Burden Scale: A Tool for Assessing User Burden in Computing Systems. In Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems (CHI '16), 3988--3999. https://doi.org/10.1145/2858036.2858448Google ScholarGoogle Scholar
  73. Robyn Taylor, Jocelyn Spence, Brendan Walker, Bettina Nissen, and Peter Wright. 2017. Performing Research: Four Contributions to HCI. In Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems (CHI '17), 4825--4837. https://doi.org/10.1145/3025453.3025751Google ScholarGoogle ScholarDigital LibraryDigital Library
  74. Sriyani Tidball, Mingying Zheng, and John W. Creswell. 2016. Buying Sex On-Line from Girls: NGO Representatives, Law Enforcement Officials, and Public Officials Speak out About Human Trafficking?A Qualitative Analysis. Gender Issues 33, 1: 53--68. https://doi.org/10.1007/s12147-015--9146--1Google ScholarGoogle ScholarCross RefCross Ref
  75. U.S. Department of Health and Human Services. Coronavirus Disease 2019 (COVID-19). Centers for Disease Control and Prevention. Retrieved May 28, 2020 from https://www.cdc.gov/coronavirus/2019-ncov/global-covid-19/index.htmlGoogle ScholarGoogle Scholar
  76. Ashley Walker, Yaxing Yao, Christine Geeng, Roberto Hoyle, and Pamela Wisniewski. 2019. Moving beyond 'one size fits all.' Interactions. Retrieved January 16, 2020 from https://dl.acm.org/doi/abs/10.1145/3358904Google ScholarGoogle Scholar
  77. Greg Walsh, Elizabeth Foss, Jason Yip, and Allison Druin. 2013. FACIT PD: A Framework for Analysis and Creation of Intergenerational Techniques for Participatory Design. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (CHI '13), 2893--2902. https://doi.org/10.1145/2470654.2481400Google ScholarGoogle ScholarDigital LibraryDigital Library
  78. Emily C Weinstein and Robert L Selman. 2016. Digital stress: Adolescents? personal accounts. New Media & Society 18, 3: 391--409. https://doi.org/10.1177/1461444814543989Google ScholarGoogle ScholarCross RefCross Ref
  79. Kasper Welbers, Elly A Konijn, Christian Burgers, Anna Bij de Vaate, Allison Eden, and Britta C Brugman. 2019. Gamification as a tool for engaging student learning: A field experiment with a gamified app. E-Learning and Digital Media 16, 2: 92--109. https://doi.org/10.1177/2042753018818342Google ScholarGoogle ScholarCross RefCross Ref
  80. Helen Whittle, Catherine Hamilton-Giachritsis, Anthony Beech, and Guy Collings. 2013. A review of online grooming: Characteristics and concerns. Aggression and Violent Behavior 18, 1: 62--70. https://doi.org/10.1016/j.avb.2012.09.003Google ScholarGoogle ScholarCross RefCross Ref
  81. Pamela Wisniewski. 2018. The Privacy Paradox of Adolescent Online Safety: A Matter of Risk Prevention or Risk Resilience? IEEE Security Privacy 16, 2: 86--90. https://doi.org/10.1109/MSP.2018.1870874Google ScholarGoogle Scholar
  82. Pamela Wisniewski, Arup Kumar Ghosh, Heng Xu, Mary Beth Rosson, and John M. Carroll. 2017. Parental Control vs. Teen Self-Regulation: Is There a Middle Ground for Mobile Online Safety? In Proceedings of the 2017 ACM Conference on Computer Supported Cooperative Work and Social Computing (CSCW '17), 51--69. https://doi.org/10.1145/2998181.2998352Google ScholarGoogle ScholarDigital LibraryDigital Library
  83. Pamela Wisniewski, Haiyan Jia, Na Wang, Saijing Zheng, Heng Xu, Mary Beth Rosson, and John M. Carroll. 2015. Resilience Mitigates the Negative Effects of Adolescent Internet Addiction and Online Risk Exposure. In Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems - CHI '15, 4029--4038. https://doi.org/10.1145/2702123.2702240Google ScholarGoogle Scholar
  84. Pamela Wisniewski, Heng Xu, Mary Beth Rossen, and John M. Carroll. 2017. Parents Just Don?t Understand: Why Teens Don?t Talk to Parents about Their Online Risk Experiences. In Proceedings of the 2017 ACM Conference on Computer Supported Cooperative Work and Social Computing (CSCW '17), 523--540. Retrieved from https://dl.acm.org/doi/abs/10.1145/2998181.2998236Google ScholarGoogle Scholar
  85. Pamela Wisniewski, Heng Xu, Mary Beth Rosson, Daniel F. Perkins, and John M. Carroll. 2016. Dear Diary: Teens Reflect on Their Weekly Online Risk Experiences. In Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems - CHI '16, 3919--3930. https://doi.org/10.1145/2858036.2858317Google ScholarGoogle Scholar
  86. Janis Wolak, David Finkelhor, Wendy Walsh, and Leah Treitman. 2018. Sextortion of Minors: Characteristics and Dynamics. Journal of Adolescent Health 62, 1: 72--79. https://doi.org/10.1016/j.jadohealth.2017.08.014Google ScholarGoogle Scholar
  87. Matthew Wood, Gavin Wood, and Madeline Balaam. 2017. Sex Talk: Designing for Sexual Health with Adolescents. In Proceedings of the 2017 Conference on Interaction Design and Children (IDC '17), 137--147. https://doi.org/10.1145/3078072.3079747Google ScholarGoogle ScholarDigital LibraryDigital Library
  88. Tyler B. Wray, Christopher W. Kahler, and Peter M. Monti. 2016. Using Ecological Momentary Assessment (EMA) to Study Sex Events Among Very High-Risk Men Who Have Sex with Men (MSM). AIDS and Behavior 20, 10: 2231--2242. https://doi.org/10.1007/s10461-015--1272-yGoogle ScholarGoogle ScholarCross RefCross Ref
  89. Sarita Yardi and Amy Bruckman. 2009. Teens as Designers of Social Networks. Communities and Technologies 2009 (C&T 2009): 3.Google ScholarGoogle Scholar
  90. Sarita Yardi and Amy Bruckman. 2011. Social and technical challenges in parenting teens? social media use. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (CHI '11), 3237--3246. https://doi.org/10.1145/1978942.1979422Google ScholarGoogle ScholarDigital LibraryDigital Library
  91. Svetlana Yarosh, Elizabeth Bonsignore, Sarah McRoberts, and Tamara Peyton. 2016. YouthTube: Youth Video Authorship on YouTube and Vine. In Proceedings of the 19th ACM Conference on Computer-Supported Cooperative Work & Social Computing (CSCW '16), 1423--1437. https://doi.org/10.1145/2818048.2819961Google ScholarGoogle ScholarDigital LibraryDigital Library
  92. Jason C. Yip, Kiley Sobel, Caroline Pitt, Kung Jin Lee, Sijin Chen, Kari Nasu, and Laura R. Pina. 2017. Examining Adult-Child Interactions in Intergenerational Participatory Design. In Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems (CHI '17), 5742--5754. https://doi.org/10.1145/3025453.3025787Google ScholarGoogle ScholarDigital LibraryDigital Library
  93. James Youniss and Jacqueline Smollar. 1985. Adolescent relations with mothers, fathers, and friends. University of Chicago Press, Chicago, IL, US.Google ScholarGoogle Scholar
  94. KidsTeam: Children & Adults Working as Design Partners -- HCIL. Retrieved May 30, 2020 from https://hcil.umd.edu/children-as-design-partners/Google ScholarGoogle Scholar
  95. KidsTeam at the University of Washington. University of Washington. Retrieved May 30, 2020 from https://www.kidsteam.ischool.uw.edu/kidsteam-projectsGoogle ScholarGoogle Scholar
  96. RAINN: The nation's largest anti-sexual violence organization. Retrieved May 28, 2020 from https://www.rainn.org/Google ScholarGoogle Scholar

Index Terms

  1. Conducting Risky Research with Teens: Co-designing for the Ethical Treatment and Protection of Adolescents

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in

    Full Access

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader
    About Cookies On This Site

    We use cookies to ensure that we give you the best experience on our website.

    Learn more

    Got it!