{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,8]],"date-time":"2025-09-08T05:56:42Z","timestamp":1757311002866,"version":"3.44.0"},"publisher-location":"New York, NY, USA","reference-count":37,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,5,13]],"date-time":"2024-05-13T00:00:00Z","timestamp":1715558400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,5,13]]},"DOI":"10.1145\/3589334.3648142","type":"proceedings-article","created":{"date-parts":[[2024,5,8]],"date-time":"2024-05-08T07:08:13Z","timestamp":1715152093000},"page":"4544-4554","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["Triage of Messages and Conversations in a Large-Scale Child Victimization Corpus"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0002-3246-5198","authenticated-orcid":false,"given":"Prasanna Lakkur","family":"Subramanyam","sequence":"first","affiliation":[{"name":"University of Massachusetts Amherst, Amherst, MA, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7340-0804","authenticated-orcid":false,"given":"Mohit","family":"Iyyer","sequence":"additional","affiliation":[{"name":"University of Massachusetts Amherst, Amherst, MA, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2262-0617","authenticated-orcid":false,"given":"Brian N.","family":"Levine","sequence":"additional","affiliation":[{"name":"University of Massachusetts Amherst, Amherst, MA, USA"}]}],"member":"320","published-online":{"date-parts":[[2024,5,13]]},"reference":[{"key":"e_1_3_2_2_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/3359190"},{"key":"e_1_3_2_2_2_1","doi-asserted-by":"crossref","unstructured":"Pamela J Black Melissa Wollis Michael Woodworth and Jeffrey T Hancock. 2015. A linguistic analysis of grooming strategies of online child sex offenders: Implications for our understanding of predatory sexual behavior in an increasingly computer-mediated world. Child abuse & neglect Vol. 44 (2015) 140--149.","DOI":"10.1016\/j.chiabu.2014.12.004"},{"key":"e_1_3_2_2_3_1","doi-asserted-by":"publisher","DOI":"10.5555\/944919.944937"},{"key":"e_1_3_2_2_4_1","volume-title":"Exploring high-level features for detecting cyberpedophilia. Computer speech & language","author":"Bogdanova Dasha","year":"2014","unstructured":"Dasha Bogdanova, Paolo Rosso, and Thamar Solorio. 2014. Exploring high-level features for detecting cyberpedophilia. Computer speech & language, Vol. 28, 1 (2014), 108--120."},{"key":"e_1_3_2_2_5_1","doi-asserted-by":"publisher","DOI":"10.1177\/1079063213509411"},{"key":"e_1_3_2_2_6_1","doi-asserted-by":"publisher","DOI":"10.1177\/1079063210384275"},{"key":"e_1_3_2_2_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/3308558.3313482"},{"key":"e_1_3_2_2_8_1","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/N19--1423"},{"key":"e_1_3_2_2_9_1","doi-asserted-by":"publisher","DOI":"10.1080\/14789949.2017.1291707"},{"key":"e_1_3_2_2_10_1","first-page":"51","article-title":"Understanding Student Language: An Unsupervised Dialogue Act Classification Approach","volume":"7","author":"Ezen-Can Aysu","year":"2015","unstructured":"Aysu Ezen-Can and Kristy Elizabeth Boyer. 2015. Understanding Student Language: An Unsupervised Dialogue Act Classification Approach. Journal of Educational Data Mining, Vol. 7, 1 (2015), 51--78.","journal-title":"Journal of Educational Data Mining"},{"key":"e_1_3_2_2_11_1","volume-title":"Child Abuse & Neglect","volume":"98","author":"Gewirtz-Meydan Ateret","year":"2019","unstructured":"Ateret Gewirtz-Meydan, Yael Lahav, Wendy Walsh, and David Finkelhor. 2019. Psychopathology among adult survivors of child pornography. Child Abuse & Neglect , Vol. 98 (Dec 2019), 104189."},{"key":"e_1_3_2_2_12_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.chiabu.2018.03.031"},{"key":"e_1_3_2_2_13_1","volume-title":"Characterizing pedophile conversations on the internet using online grooming. arXiv preprint arXiv:1208.4324","author":"Gupta Aditi","year":"2012","unstructured":"Aditi Gupta, Ponnurangam Kumaraguru, and Ashish Sureka. 2012. Characterizing pedophile conversations on the internet using online grooming. arXiv preprint arXiv:1208.4324 (2012)."},{"volume-title":"Clustering and Summarization of Chat Dialogues: To understand a company's customer base. Master's thesis","author":"Hid\u00e9n Oskar","key":"e_1_3_2_2_14_1","unstructured":"Oskar Hid\u00e9n and David Bj\u00f6relind. 2021. Clustering and Summarization of Chat Dialogues: To understand a company's customer base. Master's thesis. Link\u00f6ping University, Department of Computer and Information Science, https:\/\/liu.diva-portal.org\/smash\/get\/diva2:1576483\/FULLTEXT01.pdf."},{"volume-title":"CLEF (Online working notes\/labs\/workshop)","author":"Inches Giacomo","key":"e_1_3_2_2_15_1","unstructured":"Giacomo Inches and Fabio Crestani. 2012. Overview of the International Sexual Predator Identification Competition at PAN-2012.. In CLEF (Online working notes\/labs\/workshop), Vol. 30."},{"key":"e_1_3_2_2_16_1","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/N16-1180"},{"volume-title":"Proc. Conference on Empirical Methods in Natural Language Processing and Intl. Joint Conference on Natural Language Processing (EMNLP-IJCNLP). 3342----3349","author":"Kann Katharina","key":"e_1_3_2_2_17_1","unstructured":"Katharina Kann, Kyunghyun Cho, and Samuel R. Bowman. 2019. Towards Realistic Practices In Low-Resource Natural Language Processing: The Development Set. In Proc. Conference on Empirical Methods in Natural Language Processing and Intl. Joint Conference on Natural Language Processing (EMNLP-IJCNLP). 3342----3349."},{"key":"e_1_3_2_2_18_1","doi-asserted-by":"publisher","DOI":"10.1177\/1079063217720927"},{"key":"e_1_3_2_2_19_1","volume-title":"ChatCoder: Toward the Tracking and Categorization of Internet Predators. In In Proc. Text Mining Workshop, held in conjunction with the SIAM International Conference on Data Mining.","author":"Kontostathis April","year":"2009","unstructured":"April Kontostathis, Lynne Edwards, and Amanda Leatherman. 2009. ChatCoder: Toward the Tracking and Categorization of Internet Predators. In In Proc. Text Mining Workshop, held in conjunction with the SIAM International Conference on Data Mining."},{"key":"e_1_3_2_2_20_1","unstructured":"Brian N. Levine. 2022. Report to Congress: Increasing the Efficacy of Investigations of Online Child Sexual Exploitation. Technical Report NCJ Number 301590. National Institute of Justice. https:\/\/www.ojp.gov\/library\/publications\/increasing-efficacy-investigations-online-child-sexual-exploitation-report"},{"key":"e_1_3_2_2_21_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.dcm.2016.02.004"},{"key":"e_1_3_2_2_22_1","volume-title":"Proc. Australasian Language Technology Association Workshop. 157--165","author":"Rahman Miah Md Waliur","year":"2011","unstructured":"Md Waliur Rahman Miah, John Yearwood, and Sid Kulkarni. 2011. Detection of child exploiting chats from a mixed chat dataset as a text classification task. In Proc. Australasian Language Technology Association Workshop. 157--165."},{"key":"e_1_3_2_2_23_1","volume-title":"Proc. Intl. Conf. on Learning Representations (ICLR).","author":"Mikolov Tomas","year":"2013","unstructured":"Tomas Mikolov, Kai Chen, Greg Corrado, and Jeffrey Dean. 2013. Efficient estimation of word representations in vector space. Proc. Intl. Conf. on Learning Representations (ICLR)."},{"key":"e_1_3_2_2_24_1","volume-title":"Tackling online abuse: A survey of automated abuse detection methods. arXiv preprint arXiv:1908.06024","author":"Mishra Pushkar","year":"2019","unstructured":"Pushkar Mishra, Helen Yannakoudakis, and Ekaterina Shutova. 2019. Tackling online abuse: A survey of automated abuse detection methods. arXiv preprint arXiv:1908.06024 (2019)."},{"key":"e_1_3_2_2_25_1","unstructured":"Rachel O'Connell. 2003. A typology of child cybersexploitation and online grooming practices. Technical Report. Cyberspace Research Unit University of Central Lancashire http:\/\/image.guardian.co.uk\/sys-files\/Society\/documents\/2003\/07\/24\/Netpaedoreport.pdf."},{"key":"e_1_3_2_2_26_1","unstructured":"Perverted Justice Foundation Inc. 2023. http:\/\/www.perverted-justice.com\/."},{"key":"e_1_3_2_2_27_1","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/D19-1410"},{"key":"e_1_3_2_2_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/SMC.2019.8914528"},{"key":"e_1_3_2_2_29_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11896-017-9248-7"},{"key":"e_1_3_2_2_30_1","doi-asserted-by":"publisher","DOI":"10.1177\/1043986210377103"},{"key":"e_1_3_2_2_31_1","unstructured":"U.S. Department of Justice. 2022. CY 2022 Report to the Committees on Appropriations National Center for Missing and Exploited Children (NCMEC) Transparency https:\/\/www.missingkids.org\/content\/dam\/missingkids\/pdfs\/OJJDP-NCMEC-Transparency_2022-Calendar-Year.pdf."},{"key":"e_1_3_2_2_32_1","unstructured":"USDOJ. 2016. The National Strategy for Child Exploitation Prevention and Interdiction: A Report to Congress. https:\/\/www.justice.gov\/psc\/file\/842411\/download."},{"key":"e_1_3_2_2_33_1","unstructured":"USDOJ. 2019. Windsor Man Sentenced to 18 Years in Federal Prison for Enticing Minor to Engage in Sex. U.S. Attorney's Office District of Connecticut https:\/\/www.justice.gov\/usao-ct\/pr\/windsor-man-sentenced-18-years-federal-prison-enticing-minor-engage-sex."},{"key":"e_1_3_2_2_34_1","unstructured":"USDOJ. 2020a. Local man sentenced for attempting to entice a minor to engage in unlawful sexual activity. U.S. Attorney's Office Southern District of Texas https:\/\/www.justice.gov\/usao-sdtx\/pr\/local-man-sentenced-attempting-entice-minor-engage-unlawful-sexual-activity."},{"key":"e_1_3_2_2_35_1","unstructured":"USDOJ. 2020b. Louisiana Man to Federal Prison for Sexually Enticing an Iowa Child. U.S. Attorney's Office Northern District of Iowa https:\/\/www.justice.gov\/usao-ndia\/pr\/louisiana-man-federal-prison-sexually-enticing-iowa-child."},{"key":"e_1_3_2_2_36_1","unstructured":"USDOJ. 2021. Child Predator and Cyberterrorist Buster Hernandez aka \"BrianKil \" is Sentenced to 75 years in Federal Prison. U.S. Attorney's Office Southern District of Indiana https:\/\/www.justice.gov\/usao-sdtx\/pr\/local-man-sentenced-attempting-entice-minor-engage-unlawful-sexual-activity."},{"key":"e_1_3_2_2_37_1","volume-title":"Mitchell","author":"Wolak Janis","year":"2009","unstructured":"Janis Wolak and Kimberly J. Mitchell. 2009. Work Exposure to Child Pornography in ICAC Task Forces and Affiliates. Technical Report. Crimes Against Children Research Center tech report. http:\/\/www.unh.edu\/ccrc\/pdf\/Law Enforcement Work Exposure to CP.pdf. io"}],"event":{"name":"WWW '24: The ACM Web Conference 2024","sponsor":["SIGWEB ACM Special Interest Group on Hypertext, Hypermedia, and Web"],"location":"Singapore Singapore","acronym":"WWW '24"},"container-title":["Proceedings of the ACM Web Conference 2024"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3589334.3648142","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3589334.3648142","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,22]],"date-time":"2025-08-22T00:28:47Z","timestamp":1755822527000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3589334.3648142"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,5,13]]},"references-count":37,"alternative-id":["10.1145\/3589334.3648142","10.1145\/3589334"],"URL":"https:\/\/doi.org\/10.1145\/3589334.3648142","relation":{},"subject":[],"published":{"date-parts":[[2024,5,13]]},"assertion":[{"value":"2024-05-13","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}