{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,14]],"date-time":"2026-02-14T06:42:02Z","timestamp":1771051322775,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":74,"publisher":"ACM","license":[{"start":{"date-parts":[[2017,2,25]],"date-time":"2017-02-25T00:00:00Z","timestamp":1487980800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"University of Maryland ADVANCE Grant"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2017,2,25]]},"DOI":"10.1145\/2998181.2998337","type":"proceedings-article","created":{"date-parts":[[2017,2,14]],"date-time":"2017-02-14T13:43:23Z","timestamp":1487079803000},"page":"1231-1245","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":129,"title":["Identifying Women's Experiences With and Strategies for Mitigating Negative Effects of Online Harassment"],"prefix":"10.1145","author":[{"given":"Jessica","family":"Vitak","sequence":"first","affiliation":[{"name":"University of Maryland, College Park, MD, USA"}]},{"given":"Kalyani","family":"Chadha","sequence":"additional","affiliation":[{"name":"University of Maryland, College Park, MD, USA"}]},{"given":"Linda","family":"Steiner","sequence":"additional","affiliation":[{"name":"University of Maryland, College Park, MD, USA"}]},{"given":"Zahra","family":"Ashktorab","sequence":"additional","affiliation":[{"name":"University of Maryland, College Park, MD, USA"}]}],"member":"320","published-online":{"date-parts":[[2017,2,25]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/2858036.2858548"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/2470654.2470658"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1037\/1076-8998.13.2.137"},{"key":"e_1_3_2_1_4_1","volume-title":"Gender Trouble: Feminism and the Subversion of Identity","author":"Butler Judith","year":"2006","unstructured":"Judith Butler. 2006. Gender Trouble: Feminism and the Subversion of Identity. Routledge, New York."},{"key":"e_1_3_2_1_5_1","first-page":"99","article-title":"Bodily vulnerability, coalitions, and street politics","volume":"37","author":"Butler Judith","year":"2014","unstructured":"Judith Butler. 2014. Bodily vulnerability, coalitions, and street politics. Critical Studies 37: 99--119.","journal-title":"Critical Studies"},{"key":"e_1_3_2_1_6_1","article-title":"There's no comparing male and female harassment online","author":"Chemaly Soraya","year":"2014","unstructured":"Soraya Chemaly. 2014. There's no comparing male and female harassment online. Time Magazine. Retrieved May 27, 2016 from http:\/\/time.com\/3305466\/male-female-harassmentonline\/","journal-title":"Time Magazine. Retrieved"},{"key":"e_1_3_2_1_7_1","first-page":"373","article-title":"law's expressive value in combating cyber gender harassment","volume":"108","author":"Citron Danielle Keats","year":"2009","unstructured":"Danielle Keats Citron. 2009. law's expressive value in combating cyber gender harassment. Michigan Law Review 108, 3: 373--415.","journal-title":"Michigan Law Review"},{"key":"e_1_3_2_1_8_1","volume-title":"Hate Crimes in Cyberspace","author":"Citron Danielle Keats","unstructured":"Danielle Keats Citron. 2014. Hate Crimes in Cyberspace. Harvard University Press."},{"key":"e_1_3_2_1_9_1","volume-title":"Women feel less safe than men in many developed countries","author":"Crabtree Steve","year":"2016","unstructured":"Steve Crabtree and Faith Nsubuga. 2012. Women feel less safe than men in many developed countries. Gallup Inc., Washington, D.C. Retrieved August 8, 2016 from http:\/\/www.gallup.com\/poll\/155402\/Women-FeelLess-Safe-Men-Developed-Countries.aspx"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.5555\/295080.295086"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/2441776.2441831"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/2362394.2362400"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1089\/cyber.2012.0231"},{"key":"e_1_3_2_1_14_1","volume-title":"Online harassment","author":"Duggan Maeve","year":"2016","unstructured":"Maeve Duggan. 2014. Online harassment. Pew Internet Project, Washington, D.C. Retrieved August 8, 2016 from http:\/\/www.pewinternet.org\/2014\/10\/22\/onlineharassment\/"},{"key":"e_1_3_2_1_15_1","volume-title":"Ellison and Jessica Vitak","author":"Nicole","year":"2015","unstructured":"Nicole B. Ellison and Jessica Vitak. 2015. Social network site affordances and their relationship to social capital processes. In The Handbook of the Psychology of Communication Technology, S. Shyam Sundar (ed.). Wiley & Sons, Boston, MA, 205--227."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1111\/jcc4.12078"},{"key":"e_1_3_2_1_17_1","volume-title":"Sexual Shakedown: The Sexual Harassment of Women on the Job","author":"Farley Lin","year":"1978","unstructured":"Lin Farley. 1978. Sexual Shakedown: The Sexual Harassment of Women on the Job. McGraw-Hill, New York."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1177\/0886260503262083"},{"key":"e_1_3_2_1_19_1","volume-title":"in press. Women's experiences with general and sexual harassment in online video games","author":"Fox Jesse","unstructured":"Jesse Fox and Wai Yen Tang. in press. Women's experiences with general and sexual harassment in online video games. New Media & Society."},{"key":"e_1_3_2_1_20_1","volume-title":"Passing By: Gender and Public Harassment","author":"Gardner Carol Brooks","year":"1995","unstructured":"Carol Brooks Gardner. 1995. Passing By: Gender and Public Harassment. University of California Press."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/2818052.2869107"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1177\/0004865814524218"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/2695577.2695582"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1080\/019722499128466"},{"key":"e_1_3_2_1_25_1","volume-title":"Herring and Sharon Stoerger","author":"Susan","year":"2014","unstructured":"Susan C. Herring and Sharon Stoerger. 2014. Gender and (a)nonymity in computer-mediated communication. In The Handbook of Language, Gender, and Sexuality, Susan Ehrlich, Miriam Meyerhoff and Janet Holmes (eds.). John Wiley & Sons, 567--586."},{"key":"e_1_3_2_1_26_1","article-title":"Why women aren't welcome on the internet","author":"Hess Amanda","year":"2014","unstructured":"Amanda Hess. 2014. Why women aren't welcome on the internet. Pacific Standard Magazine. Retrieved May 27, 2016 from https:\/\/psmag.com\/why-womenaren-t-welcome-on-the-internet-aa21fdbc8d6","journal-title":"Pacific Standard Magazine. Retrieved"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1080\/13811118.2010.494133"},{"key":"e_1_3_2_1_28_1","volume-title":"Cortina","author":"Holland Kathryn J.","year":"2013","unstructured":"Kathryn J. Holland and Lilia M. Cortina. 2013. When sexism and feminism collide: The sexual harassment of feminist working women. Psychology of Women Quarterly: 0361684313482873."},{"key":"e_1_3_2_1_29_1","first-page":"231","article-title":"Cyberharrasment: Striking a balance between free speech and privacy","volume":"17","author":"Jameson Sarah","year":"2008","unstructured":"Sarah Jameson. 2008. Cyberharrasment: Striking a balance between free speech and privacy. CommLaw Conspectus: Journal of Communications Law and Policy 17: 231.","journal-title":"CommLaw Conspectus: Journal of Communications Law and Policy"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1080\/14680777.2012.741073"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1080\/10304312.2016.1166560"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/2464464.2464499"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2012.07.014"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10551-013-1806-z"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/1978942.1979420"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1080\/1369118X.2012.674959"},{"key":"e_1_3_2_1_37_1","unstructured":"Julia R. Lippman. in press. I did it because I never stopped loving you: The effects of media portrayals of persistent pursuit on beliefs about stalking. Communication Research."},{"key":"e_1_3_2_1_38_1","volume-title":"Sexual Harassment of Working Women: A Case of Sex Discrimination","author":"MacKinnon Catharine A.","unstructured":"Catharine A. MacKinnon. 1979. Sexual Harassment of Working Women: A Case of Sex Discrimination. Yale University Press."},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.5040\/9798400656026"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1177\/1461444810365313"},{"key":"e_1_3_2_1_41_1","volume-title":"Cyberstalking in the United Kingdom: Analysis of the ECHO pilot survey","author":"Maple Carsten","year":"2016","unstructured":"Carsten Maple, Emma Short, and Antony Brown. 2011. Cyberstalking in the United Kingdom: Analysis of the ECHO pilot survey. The National Centre for Cyberstalking Research, University of Bedfordshire. Retrieved May 28, 2016 from http:\/\/www.beds.ac.uk\/researchref\/computing\/?a=190288"},{"key":"e_1_3_2_1_42_1","volume-title":"Brian Keegan, Jaclyn Friedman, and Charlie DeTar.","author":"Matias J. Nathan","year":"2015","unstructured":"J. Nathan Matias, Amy Johnson, Whitney Erin Boesel, Brian Keegan, Jaclyn Friedman, and Charlie DeTar. 2015. Reporting, Reviewing, and Responding to Harassment on Twitter. Women, Action, and the Media, Rochester, NY. Retrieved August 2, 2016 from http:\/\/papers.ssrn.com\/abstract=2602018"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"crossref","unstructured":"Jessica Megarry. 2014. Online incivility or sexual harassment? Conceptualising women's experiences in the digital age. Women's Studies International Forum 47 Part A: 46--55.","DOI":"10.1016\/j.wsif.2014.07.012"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2006.12"},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"crossref","unstructured":"Torill Elvira Mortensen. 2016.Anger fear and games the long event of #GamerGate. Games and Culture.","DOI":"10.1177\/1555412016640408"},{"key":"e_1_3_2_1_46_1","volume-title":"Instagram's new stories are a near-perfect copy of Snapchat stories. The Verge. Retrieved","author":"Newton Casey","year":"2016","unstructured":"Casey Newton. 2016. Instagram's new stories are a near-perfect copy of Snapchat stories. The Verge. Retrieved August 5, 2016 from http:\/\/www.theverge.com\/2016\/8\/2\/12348354\/instagra m-stories-announced-snapchat-kevin-systrominterview"},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1177\/1541204006286288"},{"key":"e_1_3_2_1_48_1","first-page":"221","article-title":"Hey girls, did you know: Slutshaming on the internet needs to stop","volume":"48","author":"Poole Emily","year":"2013","unstructured":"Emily Poole. 2013. Hey girls, did you know: Slutshaming on the internet needs to stop. University of San Francisco Law Review 48: 221--260.","journal-title":"University of San Francisco Law Review"},{"key":"e_1_3_2_1_49_1","volume-title":"Retrieved","author":"Rainie Lee","year":"2015","unstructured":"Lee Rainie and Mary Madden. 2015. Americans' privacy strategies post-Snowden. Pew Internet Project, Washington, D.C. Retrieved May 27, 2016 from http:\/\/www.pewinternet.org\/2015\/03\/16\/americansprivacy-strategies-post-snowden\/"},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICMLA.2011.152"},{"key":"e_1_3_2_1_51_1","volume-title":"Society and the Adolescent Self-Image","author":"Rosenberg Morris","unstructured":"Morris Rosenberg. 1965. Society and the Adolescent Self-Image. Princeton University Press, Princeton, N.J."},{"key":"e_1_3_2_1_52_1","volume-title":"Facebook's privacy checkup helps you figure out who's seeing what. CNET. Retrieved","author":"Rosenblatt Seth","year":"2016","unstructured":"Seth Rosenblatt. 2014. Facebook's privacy checkup helps you figure out who's seeing what. CNET. Retrieved August 8, 2016 from http:\/\/www.cnet.com\/news\/facebook-launches-itsprivacy-checkup\/"},{"key":"e_1_3_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1207\/s15327752jpa6601_2"},{"key":"e_1_3_2_1_54_1","volume-title":"in press. Privates in the online public: Sex(ting) and reputation on social media","author":"Salter Michael","unstructured":"Michael Salter. in press. Privates in the online public: Sex(ting) and reputation on social media. New Media & Society."},{"key":"e_1_3_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.1080\/15388220.2011.630310"},{"key":"e_1_3_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1467-9507.2011.00609.x"},{"key":"e_1_3_2_1_57_1","first-page":"1229","article-title":"Communicative affordances of mobile media: Portability, availability, locatability, and multimediality","volume":"9","author":"Schrock Andrew Richard","year":"2015","unstructured":"Andrew Richard Schrock. 2015. Communicative affordances of mobile media: Portability, availability, locatability, and multimediality. International Journal of Communication 9: 1229--1246.","journal-title":"International Journal of Communication"},{"key":"e_1_3_2_1_58_1","doi-asserted-by":"publisher","DOI":"10.1080\/14680777.2011.537041"},{"key":"e_1_3_2_1_59_1","doi-asserted-by":"publisher","DOI":"10.1080\/10683160701340528"},{"key":"e_1_3_2_1_60_1","doi-asserted-by":"publisher","DOI":"10.1080\/17405629.2011.643170"},{"key":"e_1_3_2_1_61_1","doi-asserted-by":"publisher","DOI":"10.1145\/2145204.2145320"},{"key":"e_1_3_2_1_62_1","doi-asserted-by":"publisher","DOI":"10.1089\/1094931041291295"},{"key":"e_1_3_2_1_63_1","unstructured":"Wai Yen Tang and Jesse Fox. in press. Men's harassment behavior in online video games: Personality traits and game factors. Aggressive Behavior."},{"key":"e_1_3_2_1_64_1","volume-title":"Retrieved","author":"Tiku Nitasha","year":"2015","unstructured":"Nitasha Tiku. 2015. Twitter CEO: \"We suck at dealing with abuse.\" The Verge. Retrieved May 27, 2016 from http:\/\/www.theverge.com\/2015\/2\/4\/7982099\/twitterceo-sent-memo-taking-personal-responsibility-for-the"},{"key":"e_1_3_2_1_65_1","doi-asserted-by":"publisher","DOI":"10.1080\/23808985.2013.11679130"},{"key":"e_1_3_2_1_66_1","doi-asserted-by":"publisher","DOI":"10.1145\/2775441.2775471"},{"key":"e_1_3_2_1_67_1","doi-asserted-by":"publisher","DOI":"10.5271\/sjweh.588"},{"key":"e_1_3_2_1_68_1","doi-asserted-by":"publisher","DOI":"10.1080\/08838151.2012.732140"},{"key":"e_1_3_2_1_69_1","doi-asserted-by":"publisher","DOI":"10.1145\/2531602.2531672"},{"key":"e_1_3_2_1_70_1","volume-title":"The challenges of building a compassionate robot. Molly White's Blog. Retrieved","author":"White Molly","year":"2016","unstructured":"Molly White. 2014. The challenges of building a compassionate robot. Molly White's Blog. Retrieved August 8, 2016 from http:\/\/blog.mollywhite.net\/thechallenges-of-building-a-compassionate-robot\/"},{"key":"e_1_3_2_1_71_1","doi-asserted-by":"publisher","DOI":"10.1145\/2207676.2207761"},{"key":"e_1_3_2_1_72_1","unstructured":"Working to Halt Abuse Online. 2013. Comparison Statistics 2000--2013. Retrieved from http:\/\/www.haltabuse.org\/resources\/stats\/Cumulative20 00--2013.pdf"},{"key":"e_1_3_2_1_73_1","doi-asserted-by":"publisher","DOI":"10.1080\/14680777.2014.882373"},{"key":"e_1_3_2_1_74_1","volume-title":"PR Newswire. Retrieved","year":"2016","unstructured":"Oxygen\/Markle Pulse poll finds: Harassment of women on the street is rampant. 2010. PR Newswire. Retrieved May 25, 2016 from http:\/\/www.prnewswire.com\/newsreleases\/oxygenmarkle-pulse-poll-finds-harassment-ofwomen-on-the-street-is-rampant-87-of-americanwomen-report-being-harassed-on-the-street-by-a-malestranger-73669892.html"}],"event":{"name":"CSCW '17: Computer Supported Cooperative Work and Social Computing","location":"Portland Oregon USA","acronym":"CSCW '17","sponsor":["SIGCHI ACM Special Interest Group on Computer-Human Interaction"]},"container-title":["Proceedings of the 2017 ACM Conference on Computer Supported Cooperative Work and Social Computing"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2998181.2998337","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2998181.2998337","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:23:39Z","timestamp":1750220619000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2998181.2998337"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,2,25]]},"references-count":74,"alternative-id":["10.1145\/2998181.2998337","10.1145\/2998181"],"URL":"https:\/\/doi.org\/10.1145\/2998181.2998337","relation":{},"subject":[],"published":{"date-parts":[[2017,2,25]]},"assertion":[{"value":"2017-02-25","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}