{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,13]],"date-time":"2026-04-13T20:59:58Z","timestamp":1776113998576,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":168,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,5,11]],"date-time":"2024-05-11T00:00:00Z","timestamp":1715385600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"National Science Foundation NSF","award":["IIP-2329976"],"award-info":[{"award-number":["IIP-2329976"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,5,11]]},"DOI":"10.1145\/3613904.3642315","type":"proceedings-article","created":{"date-parts":[[2024,5,11]],"date-time":"2024-05-11T08:37:41Z","timestamp":1715416661000},"page":"1-21","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":9,"title":["Systemization of Knowledge (SoK): Creating a Research Agenda for Human-Centered Real-Time Risk Detection on Social Media Platforms"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-1569-9662","authenticated-orcid":false,"given":"Ashwaq","family":"Alsoubai","sequence":"first","affiliation":[{"name":"Vanderbilt University, United States and King Abdulaziz University, Saudi Arabia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0804-832X","authenticated-orcid":false,"given":"Jinkyung","family":"Park","sequence":"additional","affiliation":[{"name":"Department of Computer Science, Vanderbilt University, United States"}]},{"ORCID":"https:\/\/orcid.org\/0009-0006-7962-5792","authenticated-orcid":false,"given":"Sarvech","family":"Qadir","sequence":"additional","affiliation":[{"name":"STIR LAB, Vanderbilt University, United States"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6162-578X","authenticated-orcid":false,"given":"Gianluca","family":"Stringhini","sequence":"additional","affiliation":[{"name":"Computer Science, Boston University, United States"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5829-8004","authenticated-orcid":false,"given":"Afsaneh","family":"Razi","sequence":"additional","affiliation":[{"name":"Department of Information Science, Drexel University, United States"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6223-1029","authenticated-orcid":false,"given":"Pamela J.","family":"Wisniewski","sequence":"additional","affiliation":[{"name":"Department of Computer Science, Vanderbilt University, United States"}]}],"member":"320","published-online":{"date-parts":[[2024,5,11]]},"reference":[{"key":"e_1_3_3_3_1_1","volume-title":"CHI Conference on Human Factors in Computing Systems Extended Abstracts. ACM, USA, 1\u20138.","author":"Agha Zainab","unstructured":"Zainab Agha, Zinan Zhang, Oluwatomisin Obajemu, Luke Shirley, and Pamela J.\u00a0Wisniewski. 2022. A case study on user experience bootcamps with teens to co-design real-time online safety interventions. In CHI Conference on Human Factors in Computing Systems Extended Abstracts. ACM, USA, 1\u20138."},{"key":"e_1_3_3_3_2_1","volume-title":"Social media for knowledge-sharing: A systematic literature review. Telematics and informatics 37","author":"Ahmed Yunis\u00a0Ali","year":"2019","unstructured":"Yunis\u00a0Ali Ahmed, Mohammad\u00a0Nazir Ahmad, Norasnita Ahmad, and Nor\u00a0Hidayati Zakaria. 2019. Social media for knowledge-sharing: A systematic literature review. Telematics and informatics 37 (2019), 72\u2013112."},{"key":"e_1_3_3_3_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/3593013.3594082"},{"key":"e_1_3_3_3_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2918354"},{"key":"e_1_3_3_3_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/3500868.3559710"},{"key":"e_1_3_3_3_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/3637391"},{"key":"e_1_3_3_3_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/3290605.3300233"},{"key":"e_1_3_3_3_8_1","volume-title":"Human-centered data science: an introduction","author":"Aragon Cecilia","unstructured":"Cecilia Aragon, Shion Guha, Marina Kogan, Michael Muller, and Gina Neff. 2022. Human-centered data science: an introduction. MIT Press, USA."},{"key":"e_1_3_3_3_9_1","doi-asserted-by":"publisher","DOI":"10.26735\/GBTV9013"},{"key":"e_1_3_3_3_10_1","volume-title":"41 of the most important social media marketing statistics for","author":"Barnhart Brent","year":"2022","unstructured":"Brent Barnhart. 2022. 41 of the most important social media marketing statistics for 2022. https:\/\/sproutsocial.com\/insights\/social-media-statistics\/"},{"key":"e_1_3_3_3_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/3313831.3376518"},{"key":"e_1_3_3_3_12_1","doi-asserted-by":"publisher","DOI":"10.1177\/2053951717718854"},{"key":"e_1_3_3_3_13_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.inffus.2015.08.005"},{"key":"e_1_3_3_3_14_1","volume-title":"Assessing risk, automating racism. Science 366, 6464","author":"Benjamin Ruha","year":"2019","unstructured":"Ruha Benjamin. 2019. Assessing risk, automating racism. Science 366, 6464 (2019), 421\u2013422."},{"key":"e_1_3_3_3_15_1","doi-asserted-by":"publisher","DOI":"10.2196\/24647"},{"key":"e_1_3_3_3_16_1","volume-title":"Thematic analysis","author":"Braun Virginia","unstructured":"Virginia Braun and Victoria Clarke. 2012. Thematic analysis.American Psychological Association, USA."},{"key":"e_1_3_3_3_17_1","volume-title":"Discourse analysis","author":"Brown Gillian","unstructured":"Gillian Brown and George Yule. 1983. Discourse analysis. Cambridge university press, UK."},{"key":"e_1_3_3_3_18_1","doi-asserted-by":"publisher","DOI":"10.1080\/1206212X.2003.11441712"},{"key":"e_1_3_3_3_19_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2019.05.023"},{"key":"e_1_3_3_3_20_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-13734-6_30"},{"key":"e_1_3_3_3_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/3359249"},{"key":"e_1_3_3_3_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/3555603"},{"key":"e_1_3_3_3_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/3343484"},{"key":"e_1_3_3_3_24_1","volume-title":"Countering online hate speech: An nlp perspective. arXiv preprint arXiv:2109.02941 1","author":"Chaudhary Mudit","year":"2021","unstructured":"Mudit Chaudhary, Chandni Saxena, and Helen Meng. 2021. Countering online hate speech: An nlp perspective. arXiv preprint arXiv:2109.02941 1 (2021), 12\u00a0pages."},{"key":"e_1_3_3_3_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/3448014"},{"key":"e_1_3_3_3_26_1","doi-asserted-by":"publisher","DOI":"10.1177\/1090198115579415"},{"key":"e_1_3_3_3_27_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-04503-6_4"},{"key":"e_1_3_3_3_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/3441141"},{"key":"e_1_3_3_3_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/3289600.3291037"},{"key":"e_1_3_3_3_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSP.2017.2709265"},{"key":"e_1_3_3_3_31_1","volume-title":"Weighted kappa: nominal scale agreement provision for scaled disagreement or partial credit.Psychological bulletin 70, 4","author":"Cohen Jacob","year":"1968","unstructured":"Jacob Cohen. 1968. Weighted kappa: nominal scale agreement provision for scaled disagreement or partial credit.Psychological bulletin 70, 4 (1968), 213."},{"key":"e_1_3_3_3_32_1","volume-title":"Congress.","year":"2023","unstructured":"[32] Congress. 2023. https:\/\/www.congress.gov\/bill\/118th-congress\/senate-bill\/1409\/text"},{"key":"e_1_3_3_3_33_1","volume-title":"Congress. 2023","year":"1865","unstructured":"[33] Congress. 2023. https:\/\/www.congress.gov\/bill\/115th-congress\/house-bill\/1865"},{"key":"e_1_3_3_3_34_1","doi-asserted-by":"publisher","DOI":"10.1177\/1077801211436365"},{"key":"e_1_3_3_3_35_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2019.00949"},{"key":"e_1_3_3_3_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/3447548.3467150"},{"key":"e_1_3_3_3_37_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ipm.2022.103219"},{"key":"e_1_3_3_3_38_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-16-8531-6_12"},{"key":"e_1_3_3_3_39_1","unstructured":"Rajendra\u00a0T Dodhiawala NS Sridharan Peter Raulefs and Cynthia Pickering. 1989. Real-Time AI Systems: A Definition and An Architecture.. In IJCAI. Citeseer USA 256\u2013264."},{"key":"e_1_3_3_3_40_1","volume-title":"Towards a rigorous science of interpretable machine learning. arXiv preprint 1702","author":"Doshi-Velez Finale","year":"2017","unstructured":"Finale Doshi-Velez and Been Kim. 2017. Towards a rigorous science of interpretable machine learning. arXiv preprint 1702 (2017), 13\u00a0pages."},{"key":"e_1_3_3_3_41_1","doi-asserted-by":"crossref","unstructured":"Suman Dowlagar and Radhika Mamidi. 2021. A survey of recent neural network models on code-mixed indian hate speech data. In Forum for Information Retrieval Evaluation. ACM USA 67\u201374.","DOI":"10.1145\/3503162.3503168"},{"key":"e_1_3_3_3_42_1","doi-asserted-by":"publisher","DOI":"10.1145\/3172944.3172961"},{"key":"e_1_3_3_3_43_1","unstructured":"V Elliott N Christopher A Deck and L Schwartz. 2021. The Facebook papers reveal staggering failures in the global South. Rest of world."},{"key":"e_1_3_3_3_44_1","doi-asserted-by":"publisher","DOI":"10.1609\/icwsm.v12i1.15041"},{"key":"e_1_3_3_3_45_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2017.07.040"},{"key":"e_1_3_3_3_46_1","unstructured":"[46] Facebook. 2023. https:\/\/about.fb.com\/news\/2018\/09\/inside-feed-suicide-prevention-and-ai\/"},{"key":"e_1_3_3_3_47_1","doi-asserted-by":"publisher","DOI":"10.1145\/3292522.3326028"},{"key":"e_1_3_3_3_48_1","doi-asserted-by":"crossref","unstructured":"Bharath Ganesh and Jonathan Bright. 2020. Countering extremists on social media: Challenges for strategic communication and content moderation. 6\u201319\u00a0pages.","DOI":"10.1002\/poi3.236"},{"key":"e_1_3_3_3_49_1","doi-asserted-by":"publisher","DOI":"10.1145\/3442381.3449828"},{"key":"e_1_3_3_3_50_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.copsyc.2022.101314"},{"key":"e_1_3_3_3_51_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cobeha.2017.07.005"},{"key":"e_1_3_3_3_52_1","doi-asserted-by":"publisher","DOI":"10.1145\/2814270.2814305"},{"key":"e_1_3_3_3_53_1","doi-asserted-by":"publisher","DOI":"10.1145\/2666356.2594324"},{"key":"e_1_3_3_3_54_1","doi-asserted-by":"publisher","DOI":"10.1145\/3351095.3372826"},{"key":"e_1_3_3_3_55_1","volume-title":"Fighting fake news in the COVID-19 era: policy insights from an equilibrium model. Policy sciences 53, 4","author":"Hartley Kris","year":"2020","unstructured":"Kris Hartley and Minh\u00a0Khuong Vu. 2020. Fighting fake news in the COVID-19 era: policy insights from an equilibrium model. Policy sciences 53, 4 (2020), 735\u2013758."},{"key":"e_1_3_3_3_56_1","unstructured":"Rex Hartson and Pardha\u00a0S Pyla. 2018. The UX book: Agile UX design for a quality user experience. Morgan Kaufmann USA."},{"key":"e_1_3_3_3_57_1","doi-asserted-by":"crossref","unstructured":"Yu He Jianxin Li Yangqiu Song Mutian He Hao Peng 2018. Time-evolving Text Classification with Deep Neural Networks.. In IJCAI Vol.\u00a018. IJCAI USA 2241\u20132247.","DOI":"10.24963\/ijcai.2018\/310"},{"key":"e_1_3_3_3_58_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICICET.2018.8533771"},{"key":"e_1_3_3_3_59_1","doi-asserted-by":"publisher","DOI":"10.1145\/3478905.3478985"},{"key":"e_1_3_3_3_60_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2946884"},{"key":"e_1_3_3_3_61_1","first-page":"1","article-title":"Survey of distributed stream processing for large stream sources","volume":"2","author":"Kamburugamuve Supun","year":"2013","unstructured":"Supun Kamburugamuve, Geoffrey Fox, David Leake, and Judy Qiu. 2013. Survey of distributed stream processing for large stream sources. Grids Ucs Indiana Edu 2 (2013), 1\u201316.","journal-title":"Grids Ucs Indiana Edu"},{"key":"e_1_3_3_3_62_1","doi-asserted-by":"publisher","DOI":"10.1145\/3351095.3372874"},{"key":"e_1_3_3_3_63_1","unstructured":"Rebecca Kern. 2022. Push to rein in social media sweeps the states. https:\/\/www.politico.com\/news\/2022\/07\/01\/social-media-sweeps-the-states-00043229"},{"key":"e_1_3_3_3_64_1","doi-asserted-by":"publisher","DOI":"10.1177\/20539517221092956"},{"key":"e_1_3_3_3_65_1","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/2022.socialnlp-1.3"},{"key":"e_1_3_3_3_66_1","doi-asserted-by":"publisher","DOI":"10.1145\/3476066"},{"key":"e_1_3_3_3_67_1","volume-title":"Real-time knowledge-based systems. AI magazine 9, 1","author":"Laffey J","year":"1988","unstructured":"Thomas\u00a0J Laffey, Preston\u00a0A Cox, James\u00a0L Schmidt, Simon\u00a0M Kao, and Jackson\u00a0Y Readk. 1988. Real-time knowledge-based systems. AI magazine 9, 1 (1988), 27\u201327."},{"key":"e_1_3_3_3_68_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-70284-1_34"},{"key":"e_1_3_3_3_69_1","first-page":"1","article-title":"Dynamic probabilistic graphical model for progressive fake news detection on social media platform","volume":"13","author":"Li Ke","year":"2022","unstructured":"Ke Li, Bin Guo, Jiaqi Liu, Jiangtao Wang, Haoyang Ren, Fei Yi, and Zhiwen Yu. 2022. Dynamic probabilistic graphical model for progressive fake news detection on social media platform. ACM Transactions on Intelligent Systems and Technology (TIST) 13, 5 (2022), 1\u201324.","journal-title":"ACM Transactions on Intelligent Systems and Technology (TIST)"},{"key":"e_1_3_3_3_70_1","doi-asserted-by":"publisher","DOI":"10.1145\/3511808.3557227"},{"key":"e_1_3_3_3_71_1","doi-asserted-by":"publisher","DOI":"10.1007\/11564096_24"},{"key":"e_1_3_3_3_72_1","volume-title":"Deep reinforcement learning: An overview. arXiv preprint arXiv:1701.07274 1","author":"Yuxi Li.","year":"2017","unstructured":"Yuxi Li. 2017. Deep reinforcement learning: An overview. arXiv preprint arXiv:1701.07274 1 (2017), 58\u00a0pages."},{"key":"e_1_3_3_3_73_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDMW53433.2021.00126"},{"key":"e_1_3_3_3_74_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2017.324"},{"key":"e_1_3_3_3_75_1","doi-asserted-by":"publisher","DOI":"10.1177\/070674370805300206"},{"key":"e_1_3_3_3_76_1","volume-title":"The mythos of model interpretability: In machine learning, the concept of interpretability is both important and slippery.Queue 16, 3","author":"Lipton C","year":"2018","unstructured":"Zachary\u00a0C Lipton. 2018. The mythos of model interpretability: In machine learning, the concept of interpretability is both important and slippery.Queue 16, 3 (2018), 31\u201357."},{"key":"e_1_3_3_3_77_1","doi-asserted-by":"publisher","DOI":"10.1109\/MDM.2016.33"},{"key":"e_1_3_3_3_78_1","doi-asserted-by":"crossref","unstructured":"Ping Liu Joshua Guberman Libby Hemphill and Aron Culotta. 2018. Forecasting the presence and intensity of hostility on Instagram using linguistic and social features. In Twelfth international aaai conference on web and social media. AAAI USA 10\u00a0pages.","DOI":"10.1609\/icwsm.v12i1.15022"},{"key":"e_1_3_3_3_79_1","doi-asserted-by":"publisher","DOI":"10.1145\/2806416.2806651"},{"key":"e_1_3_3_3_80_1","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v32i1.11268"},{"key":"e_1_3_3_3_81_1","doi-asserted-by":"publisher","DOI":"10.1145\/3386253"},{"key":"e_1_3_3_3_82_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2021.01.006"},{"key":"e_1_3_3_3_83_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-65813-1_30"},{"key":"e_1_3_3_3_84_1","volume-title":"CLEF","author":"Losada E","year":"2018","unstructured":"David\u00a0E Losada, Fabio Crestani, and Javier Parapar. 2018. Overview of eRisk: early risk prediction on the internet. In Experimental IR Meets Multilinguality, Multimodality, and Interaction: 9th International Conference of the CLEF Association, CLEF 2018, Avignon, France, Vol.\u00a09. Springer, USA, 343\u2013361\u00a0pages."},{"key":"e_1_3_3_3_85_1","volume-title":"Overview of eRisk at CLEF 2019: Early Risk Prediction on the Internet (extended overview).CLEF (Working Notes) 4","author":"Losada E","year":"2019","unstructured":"David\u00a0E Losada, Fabio Crestani, and Javier Parapar. 2019. Overview of eRisk at CLEF 2019: Early Risk Prediction on the Internet (extended overview).CLEF (Working Notes) 4 (2019), 21\u00a0pages."},{"key":"e_1_3_3_3_86_1","volume-title":"Overview of eRisk at CLEF 2020: Early Risk Prediction on the Internet (Extended Overview).CLEF (Working Notes) 1","author":"Losada E","year":"2020","unstructured":"David\u00a0E Losada, Fabio Crestani, and Javier Parapar. 2020. Overview of eRisk at CLEF 2020: Early Risk Prediction on the Internet (Extended Overview).CLEF (Working Notes) 1 (2020), 14\u00a0pages."},{"key":"e_1_3_3_3_87_1","doi-asserted-by":"publisher","DOI":"10.1109\/TASLP.2022.3140474"},{"key":"e_1_3_3_3_88_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-92307-5_33"},{"key":"e_1_3_3_3_89_1","doi-asserted-by":"publisher","DOI":"10.1145\/2806416.2806607"},{"key":"e_1_3_3_3_90_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.asoc.2022.109713"},{"key":"e_1_3_3_3_91_1","doi-asserted-by":"publisher","DOI":"10.1145\/3534678.3539161"},{"key":"e_1_3_3_3_92_1","doi-asserted-by":"publisher","DOI":"10.1145\/3457607"},{"key":"e_1_3_3_3_93_1","doi-asserted-by":"publisher","DOI":"10.1145\/3485447.3512163"},{"key":"e_1_3_3_3_94_1","volume-title":"Recurrent models of visual attention. Advances in neural information processing systems 27","author":"Mnih Volodymyr","year":"2014","unstructured":"Volodymyr Mnih, Nicolas Heess, Alex Graves, 2014. Recurrent models of visual attention. Advances in neural information processing systems 27 (2014), 9\u00a0pages."},{"key":"e_1_3_3_3_95_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jadohealth.2021.05.001"},{"key":"e_1_3_3_3_96_1","volume-title":"Statistical analysis with latent variables","author":"Muth\u00e9n Bengt","unstructured":"Bengt Muth\u00e9n and Bengt\u00a0O Muth\u00e9n. 2009. Statistical analysis with latent variables. Wiley New York, NY, USA."},{"key":"e_1_3_3_3_97_1","doi-asserted-by":"publisher","DOI":"10.1145\/3485447.3512000"},{"key":"e_1_3_3_3_98_1","doi-asserted-by":"publisher","DOI":"10.1109\/DSW.2019.8755598"},{"key":"e_1_3_3_3_99_1","doi-asserted-by":"publisher","DOI":"10.1525\/jer.2006.1.3.29"},{"key":"e_1_3_3_3_100_1","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134055"},{"key":"e_1_3_3_3_101_1","doi-asserted-by":"publisher","DOI":"10.1145\/3102980.3102998"},{"key":"e_1_3_3_3_102_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.appet.2017.10.016"},{"key":"e_1_3_3_3_103_1","doi-asserted-by":"publisher","DOI":"10.1145\/3287098.3287107"},{"key":"e_1_3_3_3_104_1","volume-title":"Applications of Artificial Intelligence II, Vol.\u00a0548","author":"O\u2019Reilly A","unstructured":"Cindy\u00a0A O\u2019Reilly and Andrew\u00a0S Cromarty. 1985. \" Fast\" Is Not\" Real-Time\": Designing Effective Real-Time AI Systems. In Applications of Artificial Intelligence II, Vol.\u00a0548. SPIE, USA, 249\u2013257."},{"key":"e_1_3_3_3_105_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jad.2012.05.030"},{"key":"e_1_3_3_3_106_1","volume-title":"Overview of eRisk at CLEF 2021: Early Risk Prediction on the Internet (Extended Overview).CLEF (Working Notes) 1","author":"Parapar Javier","year":"2021","unstructured":"Javier Parapar, Patricia Mart\u00edn-Rodilla, David\u00a0E Losada, and Fabio Crestani. 2021. Overview of eRisk at CLEF 2021: Early Risk Prediction on the Internet (Extended Overview).CLEF (Working Notes) 1 (2021), 864\u2013887."},{"key":"e_1_3_3_3_107_1","volume-title":"CLEF 2022, Bologna, Italy, September 5\u20138, 2022, Proceedings, Vol.\u00a013390","author":"Parapar Javier","year":"2022","unstructured":"Javier Parapar, Patricia Mart\u00edn-Rodilla, David\u00a0E Losada, and Fabio Crestani. 2022. Overview of erisk 2022: Early risk prediction on the internet. In Experimental IR Meets Multilinguality, Multimodality, and Interaction: 13th International Conference of the CLEF Association, CLEF 2022, Bologna, Italy, September 5\u20138, 2022, Proceedings, Vol.\u00a013390. Springer, USA, 233\u2013256."},{"key":"e_1_3_3_3_108_1","volume-title":"Fairness in Mobile Phone\u2013Based Mental Health Assessment Algorithms: Exploratory Study. JMIR formative research 6, 6","author":"Park Jinkyung","year":"2022","unstructured":"Jinkyung Park, Ramanathan Arunachalam, Vincent Silenzio, Vivek\u00a0K Singh, 2022. Fairness in Mobile Phone\u2013Based Mental Health Assessment Algorithms: Exploratory Study. JMIR formative research 6, 6 (2022), e34366."},{"key":"e_1_3_3_3_109_1","volume-title":"Toward Fairness in Misinformation Detection Algorithms. In Workshop Proceedings of the 16th International AAAI Conference on Web and Social Media, Vol.\u00a016","author":"Park Jinkyung","year":"2022","unstructured":"Jinkyung Park, Rahul Ellezhuthil, Ramanathan Arunachalam, Lauren Feldman, and Vivek Singh. 2022. Toward Fairness in Misinformation Detection Algorithms. In Workshop Proceedings of the 16th International AAAI Conference on Web and Social Media, Vol.\u00a016. AAAI, USA, 11\u00a0pages."},{"key":"e_1_3_3_3_110_1","doi-asserted-by":"publisher","DOI":"10.1145\/3578503.3583617"},{"key":"e_1_3_3_3_111_1","doi-asserted-by":"publisher","DOI":"10.1145\/3543873.3587607"},{"key":"e_1_3_3_3_112_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.hfh.2023.100042"},{"key":"e_1_3_3_3_113_1","volume-title":"Harmful Speech. In Proceedings of the 30th ACM International Conference on Information & Knowledge Management. ACM, USA, 1426\u20131436","author":"Petrescu Alexandru","year":"2021","unstructured":"Alexandru Petrescu, Ciprian-Octavian Truic\u0103, Elena-Simona Apostol, and Panagiotis Karras. 2021. Sparse Shield: Social Network Immunization vs. Harmful Speech. In Proceedings of the 30th ACM International Conference on Information & Knowledge Management. ACM, USA, 1426\u20131436."},{"key":"e_1_3_3_3_114_1","volume-title":"Using social media to predict the future: a systematic literature review. arXiv preprint arXiv:1706.06134 1","author":"Phillips Lawrence","year":"2017","unstructured":"Lawrence Phillips, Chase Dowling, Kyle Shaffer, Nathan Hodas, and Svitlana Volkova. 2017. Using social media to predict the future: a systematic literature review. arXiv preprint arXiv:1706.06134 1 (2017), 55\u00a0pages."},{"key":"e_1_3_3_3_115_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDMW.2014.170"},{"key":"e_1_3_3_3_116_1","doi-asserted-by":"publisher","DOI":"10.1145\/3167132.3167317"},{"key":"e_1_3_3_3_117_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-01437-7_1"},{"key":"e_1_3_3_3_118_1","first-page":"1","article-title":"A review on fake news detection 3T\u2019s: typology, time of detection, taxonomies","volume":"22","author":"Rastogi Shubhangi","year":"2022","unstructured":"Shubhangi Rastogi and Divya Bansal. 2022. A review on fake news detection 3T\u2019s: typology, time of detection, taxonomies. International Journal of Information Security 22 (2022), 1\u201336.","journal-title":"International Journal of Information Security"},{"key":"e_1_3_3_3_119_1","doi-asserted-by":"crossref","unstructured":"Afsaneh Razi Ashwaq AlSoubai Seunghyun Kim Nurun Naher Shiza Ali Gianluca Stringhini Munmun De\u00a0Choudhury and Pamela\u00a0J Wisniewski. 2022. Instagram Data Donation: A Case Study on Collecting Ecologically Valid Social Media Data for the Purpose of Adolescent Online Risk Detection. In CHI Conference on Human Factors in Computing Systems Extended Abstracts. ACM USA 1\u20139.","DOI":"10.1145\/3491101.3503569"},{"key":"e_1_3_3_3_120_1","doi-asserted-by":"publisher","DOI":"10.1145\/3479609"},{"key":"e_1_3_3_3_121_1","doi-asserted-by":"publisher","DOI":"10.1145\/3434780.3436665"},{"key":"e_1_3_3_3_122_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCSS.2021.3120138"},{"key":"e_1_3_3_3_123_1","doi-asserted-by":"publisher","DOI":"10.1145\/3366423.3380180"},{"key":"e_1_3_3_3_124_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-019-08291-9"},{"key":"e_1_3_3_3_125_1","volume-title":"Earlier detection of rumors in online social networks using certainty-factor-based convolutional neural networks. Social network analysis and mining 10","author":"Santhoshkumar S","year":"2020","unstructured":"S Santhoshkumar and LD Dhinesh\u00a0Babu. 2020. Earlier detection of rumors in online social networks using certainty-factor-based convolutional neural networks. Social network analysis and mining 10 (2020), 1\u201317."},{"key":"e_1_3_3_3_126_1","doi-asserted-by":"publisher","DOI":"10.1145\/3477495.3532068"},{"key":"e_1_3_3_3_127_1","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/2020.emnlp-main.619"},{"key":"e_1_3_3_3_128_1","volume-title":"Proceedings of the 2021 conference of the North American","author":"Sawhney Ramit","unstructured":"Ramit Sawhney, Harshit Joshi, Rajiv Shah, and Lucie Flek. 2021. Suicide ideation detection via social and temporal user representations using hyperbolic learning. In Proceedings of the 2021 conference of the North American Chapter of the Association for Computational Linguistics: human language technologies. Association for Computational Linguistics, USA, 2176\u20132190."},{"key":"e_1_3_3_3_129_1","doi-asserted-by":"publisher","DOI":"10.1145\/3313831.3376229"},{"key":"e_1_3_3_3_130_1","unstructured":"Rikki Schlott. 2023. China is hurting our kids with TikTok but protecting its own youth with Douyin. https:\/\/nypost.com\/2023\/02\/25\/china-is-hurting-us-kids-with-tiktok-but-protecting-its-own\/"},{"key":"e_1_3_3_3_131_1","doi-asserted-by":"publisher","DOI":"10.5465\/amr.2015.0425"},{"key":"e_1_3_3_3_132_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICTAI.2009.25"},{"key":"e_1_3_3_3_133_1","doi-asserted-by":"publisher","DOI":"10.1109\/5.259423"},{"key":"e_1_3_3_3_134_1","volume-title":"Optimal stopping rules. Vol.\u00a08","author":"Shiryaev N","unstructured":"Albert\u00a0N Shiryaev. 2007. Optimal stopping rules. Vol.\u00a08. Springer Science & Business Media, USA."},{"key":"e_1_3_3_3_135_1","doi-asserted-by":"publisher","DOI":"10.1145\/3419764"},{"key":"e_1_3_3_3_136_1","doi-asserted-by":"publisher","DOI":"10.1145\/3137597.3137600"},{"key":"e_1_3_3_3_137_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ipm.2021.102618"},{"key":"e_1_3_3_3_138_1","volume-title":"Julian Schrittwieser, Ioannis Antonoglou","author":"Silver David","year":"2016","unstructured":"David Silver, Aja Huang, Chris\u00a0J Maddison, Arthur Guez, Laurent Sifre, George Van Den\u00a0Driessche, Julian Schrittwieser, Ioannis Antonoglou, Veda Panneershelvam, Marc Lanctot, 2016. Mastering the game of Go with deep neural networks and tree search. nature 529, 7587 (2016), 484\u2013489."},{"key":"e_1_3_3_3_139_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2988796"},{"key":"e_1_3_3_3_140_1","volume-title":"2012 AAAI Spring Symposium Series. AAAI, USA, 6\u00a0pages.","author":"Sood Sara\u00a0Owsley","year":"2012","unstructured":"Sara\u00a0Owsley Sood, Judd Antin, and Elizabeth Churchill. 2012. Using crowdsourcing to improve profanity detection. In 2012 AAAI Spring Symposium Series. AAAI, USA, 6\u00a0pages."},{"key":"e_1_3_3_3_141_1","doi-asserted-by":"publisher","DOI":"10.1177\/20539517221115189"},{"key":"e_1_3_3_3_142_1","volume-title":"Predicting human behavior: The next frontiers. Science 355, 6324","author":"Subrahmanian VS","year":"2017","unstructured":"VS Subrahmanian and Srijan Kumar. 2017. Predicting human behavior: The next frontiers. Science 355, 6324 (2017), 489\u2013489."},{"key":"e_1_3_3_3_143_1","doi-asserted-by":"publisher","DOI":"10.1145\/3411764.3445088"},{"key":"e_1_3_3_3_144_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-22636-7_6"},{"key":"e_1_3_3_3_145_1","volume-title":"Suicide schema in schizophrenia: The effect of emotional reactivity, negative symptoms and schema elaboration. Behaviour research and therapy 45, 9","author":"Tarrier Nicholas","year":"2007","unstructured":"Nicholas Tarrier, Patricia Gooding, Lynsey Gregg, Judith Johnson, Richard Drake, Socrates\u00a0Trial Group, 2007. Suicide schema in schizophrenia: The effect of emotional reactivity, negative symptoms and schema elaboration. Behaviour research and therapy 45, 9 (2007), 2090\u20132097."},{"key":"e_1_3_3_3_146_1","doi-asserted-by":"publisher","DOI":"10.1145\/3398069"},{"key":"e_1_3_3_3_147_1","doi-asserted-by":"publisher","DOI":"10.1145\/3070644"},{"key":"e_1_3_3_3_148_1","doi-asserted-by":"crossref","unstructured":"Piyush Vyas Gitika Vyas Akhilesh Chauhan Romil Rawat Shrikant Telang and Madhu Gottumukkala. 2022. Anonymous Trading on the Dark Online Marketplace: An Exploratory Study. In Using Computational Intelligence for the Dark Web and Illicit Behavior Detection. IGI Global USA 272\u2013289.","DOI":"10.4018\/978-1-6684-6444-1.ch015"},{"key":"e_1_3_3_3_149_1","doi-asserted-by":"publisher","DOI":"10.1145\/3290605.3300831"},{"key":"e_1_3_3_3_150_1","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2013.32"},{"key":"e_1_3_3_3_151_1","first-page":"1","article-title":"QuickStop: A Markov optimal stopping approach for quickest misinformation detection","volume":"3","author":"Wei Honghao","year":"2019","unstructured":"Honghao Wei, Xiaohan Kang, Weina Wang, and Lei Ying. 2019. QuickStop: A Markov optimal stopping approach for quickest misinformation detection. Proceedings of the ACM on Measurement and Analysis of Computing Systems 3, 2 (2019), 1\u201325.","journal-title":"Proceedings of the ACM on Measurement and Analysis of Computing Systems"},{"key":"e_1_3_3_3_152_1","doi-asserted-by":"publisher","DOI":"10.1145\/2858036.2858317"},{"key":"e_1_3_3_3_153_1","doi-asserted-by":"publisher","DOI":"10.1145\/3301275.3302317"},{"key":"e_1_3_3_3_154_1","doi-asserted-by":"publisher","DOI":"10.1137\/1.9781611974973.12"},{"key":"e_1_3_3_3_155_1","doi-asserted-by":"publisher","DOI":"10.1145\/3292522.3326025"},{"key":"e_1_3_3_3_156_1","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/2020.emnlp-main.727"},{"key":"e_1_3_3_3_157_1","volume-title":"30th { USENIX} Security Symposium ({ USENIX} Security 21). USENIX, USA, 18\u00a0pages.","author":"Xu Teng","unstructured":"Teng Xu, Gerard Goossen, Huseyin\u00a0Kerem Cevahir, Sara Khodeir, Yingyezhe Jin, Frank Li, Shawn Shan, Sagar Patel, David Freeman, and Paul Pearce. 2021. Deep entity classification: Abusive account detection for online social networks. In 30th { USENIX} Security Symposium ({ USENIX} Security 21). USENIX, USA, 18\u00a0pages."},{"key":"e_1_3_3_3_158_1","doi-asserted-by":"publisher","DOI":"10.1145\/3488560.3498457"},{"key":"e_1_3_3_3_159_1","doi-asserted-by":"publisher","DOI":"10.2196\/46084"},{"key":"e_1_3_3_3_160_1","doi-asserted-by":"publisher","DOI":"10.1145\/3308558.3313462"},{"key":"e_1_3_3_3_161_1","doi-asserted-by":"publisher","DOI":"10.1145\/3110025.3123028"},{"key":"e_1_3_3_3_162_1","doi-asserted-by":"publisher","DOI":"10.1145\/3543507.3583873"},{"key":"e_1_3_3_3_163_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.osnem.2023.100250"},{"key":"e_1_3_3_3_164_1","doi-asserted-by":"publisher","DOI":"10.1145\/3428757.3429115"},{"key":"e_1_3_3_3_165_1","doi-asserted-by":"publisher","DOI":"10.1145\/3459637.3482313"},{"key":"e_1_3_3_3_166_1","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/N19-1163"},{"key":"e_1_3_3_3_167_1","doi-asserted-by":"publisher","DOI":"10.1145\/2740908.2742571"},{"key":"e_1_3_3_3_168_1","doi-asserted-by":"publisher","DOI":"10.1145\/3404835.3462938"}],"event":{"name":"CHI '24: CHI Conference on Human Factors in Computing Systems","location":"Honolulu HI USA","acronym":"CHI '24","sponsor":["SIGCHI ACM Special Interest Group on Computer-Human Interaction","SIGACCESS ACM Special Interest Group on Accessible Computing"]},"container-title":["Proceedings of the CHI Conference on Human Factors in Computing Systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3613904.3642315","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3613904.3642315","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T23:44:25Z","timestamp":1750290265000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3613904.3642315"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,5,11]]},"references-count":168,"alternative-id":["10.1145\/3613904.3642315","10.1145\/3613904"],"URL":"https:\/\/doi.org\/10.1145\/3613904.3642315","relation":{},"subject":[],"published":{"date-parts":[[2024,5,11]]},"assertion":[{"value":"2024-05-11","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}