{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,17]],"date-time":"2025-10-17T13:59:53Z","timestamp":1760709593129,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":40,"publisher":"ACM","license":[{"start":{"date-parts":[[2018,4,21]],"date-time":"2018-04-21T00:00:00Z","timestamp":1524268800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2018,4,21]]},"DOI":"10.1145\/3173574.3174160","type":"proceedings-article","created":{"date-parts":[[2018,4,20]],"date-time":"2018-04-20T15:38:35Z","timestamp":1524238715000},"page":"1-13","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":72,"title":["Squadbox"],"prefix":"10.1145","author":[{"given":"Kaitlin","family":"Mahar","sequence":"first","affiliation":[{"name":"Massachusetts Institute of Technology, Cambridge, MA, USA"}]},{"given":"Amy X.","family":"Zhang","sequence":"additional","affiliation":[{"name":"Massachusetts Institute of Technology, Cambridge, MA, USA"}]},{"given":"David","family":"Karger","sequence":"additional","affiliation":[{"name":"Massachusetts Institute of Technology, Cambridge, MA, USA"}]}],"member":"320","published-online":{"date-parts":[[2018,4,21]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Better discussions with imperfect models. (11","author":"Adams CJ","year":"2017","unstructured":"CJ Adams and Lucas Dixon. 2017. Better discussions with imperfect models. (11 September 2017). Retrieved January 3, 2018 from https:\/\/medium.com\/the-false-positive\/ better-discussions-with-imperfect-models-91558235d442"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/2858036.2858548"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-67256-4_32"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/3134659"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1177\/1079063213509411"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/3025453.3026018"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/2441776.2441831"},{"key":"e_1_3_2_1_8_1","volume-title":"The Pew Research Center. (11","author":"Duggan Maeve","year":"2017","unstructured":"Maeve Duggan. 2017. Online Harassment 2017. The Pew Research Center. (11 July 2017). Retrieved September 8, 2017 from http:\/\/www.pewinternet.org\/2017\/07\/11\/ online-harassment-2017\/"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1515\/popets-2018-0006"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.2139\/ssrn.2882824"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1177\/1461444816635778"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/W17-3013"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1080\/1369118X.2016.1153700"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/3091478.3091509"},{"key":"e_1_3_2_1_15_1","volume-title":"Good Game Auto Blocker. (2014). Retrieved","author":"Harper Randi Lee","year":"2017","unstructured":"Randi Lee Harper. 2014. Good Game Auto Blocker. (2014). Retrieved September 8, 2017 from https:\/\/github.com\/freebsdgirl\/ggautoblocker"},{"key":"e_1_3_2_1_16_1","volume-title":"Putting out the Twitter trashfire. Art + Marketing. (13","author":"Harper Randi Lee","year":"2016","unstructured":"Randi Lee Harper. 2016. Putting out the Twitter trashfire. Art + Marketing. (13 February 2016). Retrieved September 8, 2017 from https:\/\/artplusmarketing.com\/ putting-out-the-twitter-trashfire-3ac6cb1af3e"},{"key":"e_1_3_2_1_17_1","volume-title":"Retrieved","author":"Hoffman-Andrews Jacob","year":"2017","unstructured":"Jacob Hoffman-Andrews. 2017. BlockTogether. (2017). Retrieved September 8, 2017 from https:\/\/blocktogether.org\/"},{"key":"e_1_3_2_1_18_1","volume-title":"Deceiving Google's Perspective API Built for Detecting Toxic Comments. CoRR abs\/1702.08138","author":"Hosseini Hossein","year":"2017","unstructured":"Hossein Hosseini, Sreeram Kannan, Baosen Zhang, and Radha Poovendran. 2017. Deceiving Google's Perspective API Built for Detecting Toxic Comments. CoRR abs\/1702.08138 (2017). http:\/\/arxiv.org\/abs\/1702.08138"},{"key":"e_1_3_2_1_19_1","volume-title":"Retrieved","author":"Jigsaw Google","year":"2017","unstructured":"Google Jigsaw. 2017. Perspective API. (2017). Retrieved September 8, 2017 from https:\/\/www.perspectiveapi.com\/"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/W17-3011"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/3025453.3025954"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/2441776.2441922"},{"key":"e_1_3_2_1_23_1","volume-title":"Digital Abuse, and Cyberstalking in America. Data&Society. (18","author":"Lenhart Amanda","year":"2017","unstructured":"Amanda Lenhart, Michele Ybarra, Kathryn Zickuhr, and Myeshia Price-Feeney. 2017. Online Harassment, Digital Abuse, and Cyberstalking in America. Data&Society. (18 January 2017). Retrieved September 8, 2017 from https:\/\/datasociety.net\/blog\/2017\/01\/18\/ online-harassment-digital-abuse"},{"key":"e_1_3_2_1_24_1","volume-title":"Online harassment, defamation, and hateful speech: A primer of the legal landscape","author":"Marwick Alice E","year":"2014","unstructured":"Alice E Marwick and Ross W Miller. 2014. Online harassment, defamation, and hateful speech: A primer of the legal landscape. Fordham Center on Law and Information Policy Report, (10 June 2014). http:\/\/ssrn.com\/abstract=2447904"},{"key":"e_1_3_2_1_25_1","volume-title":"High Impact Questions and Opportunities for Online Harassment Research and Action. (August","author":"Matias J. Nathan","year":"2016","unstructured":"J. Nathan Matias. 2016. High Impact Questions and Opportunities for Online Harassment Research and Action. (August 2016). Retrieved September 8, 2017 from https:\/\/civic.mit.edu\/sites\/civic.mit.edu\/files\/ OnlineHarassmentWorkshopReport-08.2016.pdf"},{"key":"e_1_3_2_1_26_1","volume-title":"Brian Keegan, Jaclyn Friedman, and Charlie DeTar.","author":"Matias J Nathan","year":"2015","unstructured":"J Nathan Matias, Amy Johnson, Whitney Erin Boesel, Brian Keegan, Jaclyn Friedman, and Charlie DeTar. 2015. Reporting, reviewing, and responding to harassment on Twitter. Women, Action, and the Media, (13 May 2015). http:\/\/womenactionmedia.org\/twitter-report\/"},{"key":"e_1_3_2_1_27_1","volume-title":"Tweetment Effects on the Tweeted: Experimentally Reducing Racist Harassment. Political Behavior 39, 3 (01","author":"Munger Kevin","year":"2017","unstructured":"Kevin Munger. 2017. Tweetment Effects on the Tweeted: Experimentally Reducing Racist Harassment. Political Behavior 39, 3 (01 Sep 2017), 629--649."},{"key":"e_1_3_2_1_28_1","volume-title":"One-step and Two-step Classification for Abusive Language Detection on Twitter. CoRR abs\/1706.01206","author":"Park Ji Ho","year":"2017","unstructured":"Ji Ho Park and Pascale Fung. 2017. One-step and Two-step Classification for Abusive Language Detection on Twitter. CoRR abs\/1706.01206 (2017). http:\/\/arxiv.org\/abs\/1706.01206"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/2957276.2957297"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/2998181.2998277"},{"key":"e_1_3_2_1_31_1","volume-title":"Histories of Hating. Social Media + Society 1, 2","author":"Shepherd Tamara","year":"2015","unstructured":"Tamara Shepherd, Alison Harvey, Tim Jordan, Sam Srauy, and Kate Miltner. 2015. Histories of Hating. Social Media + Society 1, 2 (2015)."},{"key":"e_1_3_2_1_32_1","volume-title":"Crossing the Line: What Counts as Online Harassment? The Pew Research Center. (4","author":"Smith Aaron","year":"2018","unstructured":"Aaron Smith and Maeve Duggan. 2018. Crossing the Line: What Counts as Online Harassment? The Pew Research Center. (4 January 2018). Retrieved January 8, 2018 from http:\/\/www.pewinternet.org\/2018\/01\/04\/ crossing-the-line-what-counts-as-online-harassment\/"},{"key":"e_1_3_2_1_33_1","volume-title":"WHOA Comparison Statistics 2000--2013. (2013). Retrieved","author":"Halt Online Abuse Working","year":"2017","unstructured":"Working to Halt Online Abuse. 2013. WHOA Comparison Statistics 2000--2013. (2013). Retrieved September 8, 2017 from http:\/\/www.haltabuse.org\/ resources\/stats\/Cumulative2000--2013.pdf"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/2998181.2998337"},{"key":"e_1_3_2_1_35_1","volume-title":"Inside Twitter's 10-Year Failure To Stop Harassment. (11","author":"Warzel Charlie","year":"2016","unstructured":"Charlie Warzel. 2016. \"A Honeypot For Assholes\": Inside Twitter's 10-Year Failure To Stop Harassment. (11 August 2016). Retrieved September 8, 2017 from https:\/\/www.buzzfeed.com\/charliewarzel\/ a-honeypot-for-assholes-inside-twitters-10-year-failure-to-s"},{"key":"e_1_3_2_1_36_1","volume-title":"(17","author":"Warzel Charlie","year":"2017","unstructured":"Charlie Warzel. 2017. Twitter Is Still Dismissing Harassment Reports And Frustrating Victims. Buzzfeed. (17 July 2017). Retrieved September 8, 2017 from https:\/\/www.buzzfeed.com\/charliewarzel\/ twitter-is-still-dismissing-harassment-reports-and"},{"key":"e_1_3_2_1_37_1","volume-title":"Understanding Abuse: A Typology of Abusive Language Detection Subtasks.","author":"Waseem Zeerak","year":"2017","unstructured":"Zeerak Waseem, Thomas Davidson, Dana Warmsley, and Ingmar Weber. 2017. Understanding Abuse: A Typology of Abusive Language Detection Subtasks. (2017), 78--84. http:\/\/aclweb.org\/anthology\/W17-3012"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jadohealth.2007.08.019"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/3038912.3052591"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/2702123.2702194"}],"event":{"name":"CHI '18: CHI Conference on Human Factors in Computing Systems","sponsor":["SIGCHI ACM Special Interest Group on Computer-Human Interaction"],"location":"Montreal QC Canada","acronym":"CHI '18"},"container-title":["Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3173574.3174160","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3173574.3174160","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T01:39:12Z","timestamp":1750210752000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3173574.3174160"}},"subtitle":["A Tool to Combat Email Harassment Using Friendsourced Moderation"],"short-title":[],"issued":{"date-parts":[[2018,4,21]]},"references-count":40,"alternative-id":["10.1145\/3173574.3174160","10.1145\/3173574"],"URL":"https:\/\/doi.org\/10.1145\/3173574.3174160","relation":{},"subject":[],"published":{"date-parts":[[2018,4,21]]},"assertion":[{"value":"2018-04-21","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}