{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,6]],"date-time":"2026-03-06T13:58:39Z","timestamp":1772805519368,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":116,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,7,1]],"date-time":"2024-07-01T00:00:00Z","timestamp":1719792000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,7]]},"DOI":"10.1145\/3643834.3660716","type":"proceedings-article","created":{"date-parts":[[2024,6,29]],"date-time":"2024-06-29T22:48:34Z","timestamp":1719701314000},"page":"1547-1565","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":7,"title":["Participatory Design to Address Disclosure-Based Cyberbullying"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-5090-920X","authenticated-orcid":false,"given":"Sadiq","family":"Aliyu","sequence":"first","affiliation":[{"name":"Department of Information Systems, University of Lausanne, Switzerland"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4290-584X","authenticated-orcid":false,"given":"Sushmita","family":"Khan","sequence":"additional","affiliation":[{"name":"Human Centered Computing\/HATLAB, Clemson University, United States"}]},{"ORCID":"https:\/\/orcid.org\/0009-0004-2473-6204","authenticated-orcid":false,"given":"Aminata N.","family":"Mbodj","sequence":"additional","affiliation":[{"name":"School of Computing, Clemson University, United States"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8406-9467","authenticated-orcid":false,"given":"Oluwafemi","family":"Osho","sequence":"additional","affiliation":[{"name":"HCC\/School of Computing, Clemson University, United States"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8640-9936","authenticated-orcid":false,"given":"Lingyuan","family":"Li","sequence":"additional","affiliation":[{"name":"HCC\/School of Computing, Clemson University, United States"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1341-0669","authenticated-orcid":false,"given":"Bart","family":"Knijnenburg","sequence":"additional","affiliation":[{"name":"School of Computing, Clemson University, United States"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1860-6110","authenticated-orcid":false,"given":"Mauro","family":"Cherubini","sequence":"additional","affiliation":[{"name":"University of Lausanne (UNIL), Switzerland"}]}],"member":"320","published-online":{"date-parts":[[2024,7]]},"reference":[{"key":"e_1_3_2_2_1_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11196-020-09697-7"},{"key":"e_1_3_2_2_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/3579625"},{"key":"e_1_3_2_2_3_1","unstructured":"Airbnb. 2023. Verifying your identity. https:\/\/www.airbnb.com\/help\/article\/1237#:\u00a0:text=We%20require%20listing%20Hosts%2C%20new government%20ID%20and%20a%20selfie."},{"key":"e_1_3_2_2_4_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.childyouth.2020.105695"},{"key":"e_1_3_2_2_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2918354"},{"key":"e_1_3_2_2_6_1","unstructured":"Kara Alaimo. 2023. This may be the only way to stop social media from harming our kids. https:\/\/edition.cnn.com\/2023\/01\/25\/opinions\/uk-online-safety-bill-social-media-alaimo\/index.html"},{"key":"e_1_3_2_2_7_1","doi-asserted-by":"crossref","unstructured":"Shiza Ali Afsaneh Razi Seunghyun Kim Ashwaq Alsoubai Joshua Gracie Munmun De\u00a0Choudhury Pamela\u00a0J Wisniewski and Gianluca Stringhini. 2022. Understanding the Digital Lives of Youth: Analyzing Media Shared within Safe Versus Unsafe Private Conversations on Instagram. 3\u201310\u00a0pages.","DOI":"10.1145\/3491102.3501969"},{"key":"e_1_3_2_2_8_1","first-page":"16","article-title":"On the Extent to which Cyberbullying is Fueled by the Disclosure of Personal Information","volume":"2023","author":"Aliyu Sadiq","year":"2023","unstructured":"Sadiq Aliyu, Kavous\u00a0Salehzadeh Niksirat, K\u00e9vin Huguenin, and Mauro Cherubini. 2023. On the Extent to which Cyberbullying is Fueled by the Disclosure of Personal Information. Proceedings on Privacy Enhancing Technologies (PoPETs) 2023, 4 (2023), 16.","journal-title":"Proceedings on Privacy Enhancing Technologies (PoPETs)"},{"key":"e_1_3_2_2_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2947163"},{"key":"e_1_3_2_2_10_1","unstructured":"Amazon. 2022. Return Centers. https:\/\/www.amazon.com\/returns"},{"key":"e_1_3_2_2_11_1","unstructured":"Amazon. 2023. Chatbots in Calls centers. https:\/\/aws.amazon.com\/chatbots-in-call-centers\/"},{"key":"e_1_3_2_2_12_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10578-010-0176-3"},{"key":"e_1_3_2_2_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/3091478.3091499"},{"key":"e_1_3_2_2_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/2858036.2858548"},{"key":"e_1_3_2_2_15_1","unstructured":"American\u00a0Library Association. 2023. Toolkit Creation Guide. https:\/\/www.ala.org\/yalsa\/sites\/ala.org.yalsa\/files\/content\/ToolkitCreationGuide.pdf"},{"key":"e_1_3_2_2_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/3432930"},{"key":"e_1_3_2_2_17_1","volume-title":"A networked self","author":"Boyd Danah","unstructured":"Danah Boyd. 2010. Social network sites as networked publics: Affordances, dynamics, and implications. In A networked self. Routledge, 47\u201366."},{"key":"e_1_3_2_2_18_1","volume-title":"Using thematic analysis in psychology. Qualitative research in psychology 3, 2","author":"Braun Virginia","year":"2006","unstructured":"Virginia Braun and Victoria Clarke. 2006. Using thematic analysis in psychology. Qualitative research in psychology 3, 2 (2006), 77\u2013101."},{"key":"e_1_3_2_2_19_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.tele.2021.101568"},{"key":"e_1_3_2_2_20_1","unstructured":"Help Center. 2023. Graphic Content. https:\/\/www.facebook.com\/help\/adsmanagerbuiltin\/814083248683500"},{"key":"e_1_3_2_2_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/3449127"},{"key":"e_1_3_2_2_22_1","volume-title":"Online offensive behaviour in socialmedia: Detection approaches, comprehensive review and future directions. Entertainment Computing","author":"Chinivar Sneha","year":"2022","unstructured":"Sneha Chinivar, MS Roopa, JS Arunalatha, and KR Venugopal. 2022. Online offensive behaviour in socialmedia: Detection approaches, comprehensive review and future directions. Entertainment Computing (2022), 100544."},{"key":"e_1_3_2_2_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/3193120"},{"key":"e_1_3_2_2_24_1","unstructured":"Parent control. 2023. What Is Vanish Mode on Facebook Messenger and How to Use It. https:\/\/www.airdroid.com\/parent-control\/what-is-vanish-mode-on-messenger\/#:\u00a0:text=Vanish%20mode%20is%20a%20new privacy%20and%20discretion%20in%20conversations."},{"key":"e_1_3_2_2_25_1","unstructured":"Sam Cook. 2023. Cyberbullying statistics and facts for 2021-2022. https:\/\/www.comparitech.com\/internet-providers\/cyberbullying-statistics\/. Accessed: 2023-08-08."},{"key":"e_1_3_2_2_26_1","doi-asserted-by":"publisher","DOI":"10.1177\/1461444814543163"},{"key":"e_1_3_2_2_27_1","unstructured":"laws cyberbullying. 2016. Bullying laws and cyberbullying laws across america. https:\/\/cyberbullying.org\/bullying-laws"},{"key":"e_1_3_2_2_28_1","unstructured":"laws cyberbullying. 2016. Cyberbullying pushed Texas teen to commit suicide family says. https:\/\/www.cbsnews.com\/news\/cyberbullying-pushed-texas-teen-commit-suicide-family\/"},{"key":"e_1_3_2_2_29_1","unstructured":"Cybersmile. 2023. ThE Cybersmile Foundation. https:\/\/www.cybersmile.org\/our-supporters"},{"key":"e_1_3_2_2_30_1","first-page":"1","article-title":"Cyberbullying among young people","volume":"1","author":"Dalla\u00a0Pozza Virginia","year":"2012","unstructured":"Virginia Dalla\u00a0Pozza, Anna Di\u00a0Pietro, Sophie Morel, and Emma Psaila. 2012. Cyberbullying among young people. Policy Commons 1, 6 (2012), 1\u20135.","journal-title":"Policy Commons"},{"key":"e_1_3_2_2_31_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11036-011-0325-3"},{"key":"e_1_3_2_2_32_1","volume-title":"IFIPTM 2010, Morioka, Japan, June 16-18, 2010. Proceedings 4. Springer, 17\u201331","author":"del Alamo M","year":"2010","unstructured":"Jose\u00a0M del Alamo, Miguel\u00a0A Monjas, Juan\u00a0C Yelmo, Beatriz\u00a0San Miguel, Ruben Trapero, and Antonio\u00a0M Fernandez. 2010. Self-service privacy: User-centric privacy for network-centric identity. In Trust Management IV: 4th IFIP WG 11.11 International Conference, IFIPTM 2010, Morioka, Japan, June 16-18, 2010. Proceedings 4. Springer, 17\u201331."},{"key":"e_1_3_2_2_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/3173574.3173785"},{"key":"e_1_3_2_2_34_1","unstructured":"Stacy Dixon. 2023. Internet Social Media and User Generated Content. https:\/\/www.statista.com\/statistics\/1381489\/global-snapchatsubscribers\/#:\u00a0:text=In%20June%202022%2C%20social%20media million%20users%20in%20April%202023"},{"key":"e_1_3_2_2_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/3145472"},{"key":"e_1_3_2_2_36_1","unstructured":"eBay. 2023. Dispute Resolution Overview. https:\/\/pages.ebay.com\/services\/buyandsell\/disputeres.html"},{"key":"e_1_3_2_2_37_1","volume-title":"Cyberbullying victimization, self-esteem and suicidal ideation in adolescence: Does emotional intelligence play a buffering role?Frontiers in psychology 9","author":"Extremera Natalio","year":"2018","unstructured":"Natalio Extremera, Cirenia Quintana-Orts, Sergio M\u00e9rida-L\u00f3pez, and Lourdes Rey. 2018. Cyberbullying victimization, self-esteem and suicidal ideation in adolescence: Does emotional intelligence play a buffering role?Frontiers in psychology 9 (2018), 367."},{"key":"e_1_3_2_2_38_1","unstructured":"FBI. 2021. Scam and Safety: How we can help you. https:\/\/www.fbi.gov\/how-we-can-help-you\/safety-resources\/scams-and-safety\/common-scams-and-crimes\/romance-scams#:\u00a0:text=Romance%20scams%20occur%20when%20a or%20steal%20from%20the%20victim."},{"key":"e_1_3_2_2_39_1","volume-title":"Consumer Protection: Romance scammers","author":"Fletcher Emma","year":"2023","unstructured":"Emma Fletcher. 2023. Consumer Protection: Romance scammers\u2019 favorite lies exposed. https:\/\/www.ftc.gov\/news-events\/data-visualizations\/data-spotlight\/2023\/02\/romance-scammers-favorite-lies-exposed"},{"key":"e_1_3_2_2_40_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.invent.2015.05.002"},{"key":"e_1_3_2_2_41_1","doi-asserted-by":"publisher","DOI":"10.1080\/15710882.2011.587013"},{"key":"e_1_3_2_2_42_1","first-page":"42","article-title":"Supervised machine learning for the detection of troll profiles in twitter social network: Application to a real case of cyberbullying","volume":"24","author":"Gal\u00e1n-Garc\u00eda Patxi","year":"2016","unstructured":"Patxi Gal\u00e1n-Garc\u00eda, Jos\u00e9 Gaviria de\u00a0la Puerta, Carlos\u00a0Laorden G\u00f3mez, Igor Santos, and Pablo\u00a0Garc\u00eda Bringas. 2016. Supervised machine learning for the detection of troll profiles in twitter social network: Application to a real case of cyberbullying. Logic Journal of the IGPL 24, 1 (2016), 42\u201353.","journal-title":"Logic Journal of the IGPL"},{"key":"e_1_3_2_2_43_1","volume-title":"The impact of cyberbullying on substance use and mental health in a multiethnic sample. Maternal and child health journal 15","author":"Goebert Deborah","year":"2011","unstructured":"Deborah Goebert, Iwalani Else, Courtenay Matsu, Jane Chung-Do, and Janice\u00a0Y Chang. 2011. The impact of cyberbullying on substance use and mental health in a multiethnic sample. Maternal and child health journal 15 (2011), 1282\u20131286."},{"key":"e_1_3_2_2_44_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.leaqua.2020.101384"},{"key":"e_1_3_2_2_45_1","doi-asserted-by":"publisher","DOI":"10.1145\/3491102.3502032"},{"key":"e_1_3_2_2_46_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.compedu.2014.11.013"},{"key":"e_1_3_2_2_47_1","volume-title":"International journal of environmental research and public health 17, 1","author":"Hellfeldt Karin","year":"2020","unstructured":"Karin Hellfeldt, Laura L\u00f3pez-Romero, and Henrik Andershed. 2020. Cyberbullying and psychological well-being in young adolescence: the potential protective mediation effects of social support from family, friends, and teachers. International journal of environmental research and public health 17, 1 (2020), 45."},{"key":"e_1_3_2_2_48_1","volume-title":"Cultivating youth resilience to prevent bullying and cyberbullying victimization. Child abuse & neglect 73","author":"Hinduja Sameer","year":"2017","unstructured":"Sameer Hinduja and Justin\u00a0W Patchin. 2017. Cultivating youth resilience to prevent bullying and cyberbullying victimization. Child abuse & neglect 73 (2017), 51\u201362."},{"key":"e_1_3_2_2_49_1","volume-title":"CHI Conference 52","author":"Humbert Mathias","year":"2019","unstructured":"Mathias Humbert, Benjamin Trubert, and K\u00e9vin Huguenin. 2019. A survey on interdependent privacy. CHI Conference 52, 6 (2019), 1\u201340."},{"key":"e_1_3_2_2_50_1","doi-asserted-by":"publisher","DOI":"10.1145\/3411764.3445282"},{"key":"e_1_3_2_2_51_1","doi-asserted-by":"publisher","DOI":"10.1177\/0004867419846393"},{"key":"e_1_3_2_2_52_1","doi-asserted-by":"publisher","DOI":"10.1108\/IGDR-10-2019-0110"},{"key":"e_1_3_2_2_53_1","unstructured":"Kidas. 2023. Online games that teaches kids about privacy. https:\/\/getkidas.com\/online-games-that-teach-kids-about-online-safety\/#:\u00a0:text=Cyber%20Legends%20%E2%80%93%20Cyber%20Legends%20is children%20will%20use%20online%20forever."},{"key":"e_1_3_2_2_54_1","doi-asserted-by":"publisher","DOI":"10.1145\/3476066"},{"key":"e_1_3_2_2_55_1","doi-asserted-by":"publisher","DOI":"10.1145\/2499670"},{"key":"e_1_3_2_2_56_1","volume-title":"Cyberbullying","author":"Kowalski Robin","unstructured":"Robin Kowalski. 2018. Cyberbullying. In The Routledge international handbook of human aggression. Routledge, 131\u2013142."},{"key":"e_1_3_2_2_57_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2022.107200"},{"key":"e_1_3_2_2_58_1","volume-title":"Cyberbullying: The challenge to define. Cyberpsychology, behavior, and social networking 15, 6","author":"Langos Colette","year":"2012","unstructured":"Colette Langos. 2012. Cyberbullying: The challenge to define. Cyberpsychology, behavior, and social networking 15, 6 (2012), 285\u2013289."},{"key":"e_1_3_2_2_59_1","volume-title":"Response to Digital Challenges. Computers and Education Open","author":"Lee Y","year":"2023","unstructured":"Angela\u00a0Y Lee and Jeffrey\u00a0T Hancock. 2023. Developing Digital Resilience: An Educational Intervention Improves Elementary Students\u2019 Response to Digital Challenges. Computers and Education Open (2023), 100144."},{"key":"e_1_3_2_2_60_1","doi-asserted-by":"publisher","DOI":"10.1145\/1358628.1358721"},{"key":"e_1_3_2_2_61_1","doi-asserted-by":"publisher","DOI":"10.1145\/3011141.3011182"},{"key":"e_1_3_2_2_62_1","unstructured":"Tessa Lyons. 2017. San Diego Restorative Justice Mediation Program. https:\/\/about.fb.com\/news\/2017\/12\/news-feed-fyi-updates-in-our-fight-against-misinformation\/"},{"key":"e_1_3_2_2_63_1","unstructured":"Duggan M. 2017. Online Harassment. http:\/\/www.pewinternet.org\/2017\/07\/11\/online-harassment-2017\/"},{"key":"e_1_3_2_2_64_1","doi-asserted-by":"publisher","DOI":"10.1145\/2468356.2468517"},{"key":"e_1_3_2_2_65_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2021.107032"},{"key":"e_1_3_2_2_66_1","doi-asserted-by":"publisher","DOI":"10.1145\/3173574.3174160"},{"key":"e_1_3_2_2_67_1","unstructured":"Bernard Marr. 2023. The Dark Side Of Technology: Navigating The Threat Of Digital Impersonation. https:\/\/www.ftc.gov\/news-events\/data-visualizations\/data-spotlight\/2023\/02\/romance-scammers-favorite-lies-exposed"},{"key":"e_1_3_2_2_68_1","volume-title":"Networked privacy: How teenagers negotiate context in social media. New media & society 16, 7","author":"Marwick E","year":"2014","unstructured":"Alice\u00a0E Marwick and Danah Boyd. 2014. Networked privacy: How teenagers negotiate context in social media. New media & society 16, 7 (2014), 1051\u20131067."},{"key":"e_1_3_2_2_69_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.vaccine.2022.02.059"},{"key":"e_1_3_2_2_70_1","volume-title":"The development of emotion regulation: an fMRI study of cognitive reappraisal in children, adolescents and young adults. Social cognitive and affective neuroscience 7, 1","author":"McRae Kateri","year":"2012","unstructured":"Kateri McRae, James\u00a0J Gross, Jochen Weber, Elaine\u00a0R Robertson, Peter Sokol-Hessner, Rebecca\u00a0D Ray, John\u00a0DE Gabrieli, and Kevin\u00a0N Ochsner. 2012. The development of emotion regulation: an fMRI study of cognitive reappraisal in children, adolescents and young adults. Social cognitive and affective neuroscience 7, 1 (2012), 11\u201322."},{"key":"e_1_3_2_2_71_1","unstructured":"Meta. 2023. Bullying and Harrasment. https:\/\/transparency.fb.com\/policies\/community-standards\/bullying-harassment\/"},{"key":"e_1_3_2_2_72_1","unstructured":"Dan Milmo. 2023. Social media apps will have to shield children from dangerous stunts. https:\/\/www.theguardian.com\/media\/2023\/jun\/30\/social-media-apps-will-have-to-shield-children-from-dangerous-stunts"},{"key":"e_1_3_2_2_73_1","doi-asserted-by":"publisher","DOI":"10.1145\/1240624.1240832"},{"key":"e_1_3_2_2_74_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-13731-5_69"},{"key":"e_1_3_2_2_75_1","unstructured":"United Nations. 2021. The promotion Protection and Enjoyment of Human Rights on the Internet. https:\/\/www.article19.org\/resources\/un-human-rights-council-adopts-resolution-on-human-rights-on-the-internet\/"},{"key":"e_1_3_2_2_76_1","unstructured":"The\u00a0National News. 2023. AI chatbot to \u2019change education for ever\u2019 CEO says at Davos. https:\/\/www.thenationalnews.com\/business\/2023\/01\/17\/davos-2023-ai-chatbot-to-change-education-forever-within-six-months\/"},{"key":"e_1_3_2_2_77_1","volume-title":"Fight Multiparty Privacy Conflicts in Online Social Networks. In Designing Interactive Systems Conference (DIS), Vol.\u00a05. ACM, 1\u201336","author":"Niksirat Kavous\u00a0Salehzadeh","year":"2021","unstructured":"Kavous\u00a0Salehzadeh Niksirat, Evanne Anthoine-Milhomme, Samuel Randin, K\u00e9vin Huguenin, and Mauro Cherubini. 2021. \u201cI thought you were okay\u201d: Participatory Design with Young Adults to Fight Multiparty Privacy Conflicts in Online Social Networks. In Designing Interactive Systems Conference (DIS), Vol.\u00a05. ACM, 1\u201336."},{"key":"e_1_3_2_2_78_1","volume-title":"Enhancement of coping skills with cyberbullying of students through integrative group counseling. Ph.\u00a0D. Dissertation","author":"Nitinunnaruemit Anaecharphan","unstructured":"Anaecharphan Nitinunnaruemit, Patcharaporn Srisawat, 2021. Enhancement of coping skills with cyberbullying of students through integrative group counseling. Ph.\u00a0D. Dissertation. Srinakharinwirot University."},{"key":"e_1_3_2_2_79_1","doi-asserted-by":"publisher","DOI":"10.29103\/ijevs.v4i1.6818"},{"key":"e_1_3_2_2_80_1","volume-title":"commenting, and tagging: Effects of sharing news stories on Facebook. Computers in human behavior 44","author":"Oeldorf-Hirsch Anne","year":"2015","unstructured":"Anne Oeldorf-Hirsch and S\u00a0Shyam Sundar. 2015. Posting, commenting, and tagging: Effects of sharing news stories on Facebook. Computers in human behavior 44 (2015), 240\u2013249."},{"key":"e_1_3_2_2_81_1","volume-title":"Cyberbullying: What Is It?https:\/\/www.stopbullying.gov\/cyberbullying\/what-is-it. Accessed: 2023-08-08.","author":"U.S.\u00a0Department of Health and Human Services.","year":"2023","unstructured":"U.S.\u00a0Department of Health and Human Services. 2023. Cyberbullying: What Is It?https:\/\/www.stopbullying.gov\/cyberbullying\/what-is-it. Accessed: 2023-08-08."},{"key":"e_1_3_2_2_82_1","doi-asserted-by":"publisher","DOI":"10.3389\/fpsyg.2020.543388"},{"key":"e_1_3_2_2_83_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.avb.2015.05.013"},{"key":"e_1_3_2_2_84_1","volume-title":"Communication privacy management theory: What do we know about family privacy regulation?Journal of family theory & review 2, 3","author":"Petronio Sandra","year":"2010","unstructured":"Sandra Petronio. 2010. Communication privacy management theory: What do we know about family privacy regulation?Journal of family theory & review 2, 3 (2010), 175\u2013196."},{"key":"e_1_3_2_2_85_1","unstructured":"Privacy and safety center. 2023. Privacy and safety hub. https:\/\/values.snap.com\/safety\/safety-center"},{"key":"e_1_3_2_2_86_1","unstructured":"Restorative Justice\u00a0Mediation Program. 2023. San Diego Restorative Justice Mediation Program. https:\/\/sdrjmp.org\/about-rjmp"},{"key":"e_1_3_2_2_87_1","unstructured":"NYC public schools. 2016. Digital Citizenship. https:\/\/www.schools.nyc.gov\/school-life\/school-environment\/digital-citizenship"},{"key":"e_1_3_2_2_88_1","volume-title":"Cyberbullying on social media: An analysis of teachers","author":"Rajbhandari Jyotshna","year":"2022","unstructured":"Jyotshna Rajbhandari and Karna Rana. 2022. Cyberbullying on social media: An analysis of teachers\u2019 unheard voices and coping strategies in Nepal. International journal of bullying prevention 17, 10 (2022), 1\u201313."},{"key":"e_1_3_2_2_89_1","unstructured":"Press Release. 2019. Standing Up or Standing By: Understanding Bystanders\u2019 Proactive Reporting Responses to Social Media Harassment. https:\/\/www.adl.org\/news\/press-releases\/more-than-one-third-of-americans-experience-severe-online-hate-and-harassment"},{"key":"e_1_3_2_2_90_1","doi-asserted-by":"publisher","DOI":"10.1145\/3357236.3395470"},{"key":"e_1_3_2_2_91_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jbi.2007.10.004"},{"key":"e_1_3_2_2_92_1","volume-title":"Fight Multiparty Privacy Conflicts in Online Social Networks. In Designing Interactive Systems Conference","author":"Salehzadeh\u00a0Niksirat Kavous","year":"2021","unstructured":"Kavous Salehzadeh\u00a0Niksirat, Evanne Anthoine-Milhomme, Samuel Randin, K\u00e9vin Huguenin, and Mauro Cherubini. 2021. \u201cI thought you were okay\u201d: Participatory Design with Young Adults to Fight Multiparty Privacy Conflicts in Online Social Networks. In Designing Interactive Systems Conference 2021. 104\u2013124."},{"key":"e_1_3_2_2_93_1","doi-asserted-by":"publisher","DOI":"10.1145\/3544548.3580848"},{"key":"e_1_3_2_2_94_1","doi-asserted-by":"publisher","DOI":"10.1145\/3579618"},{"key":"e_1_3_2_2_95_1","doi-asserted-by":"publisher","DOI":"10.1145\/3449076"},{"key":"e_1_3_2_2_96_1","volume-title":"gender and culturally diverse interpretations of cyberbullying. new media & society 1, 26","author":"Sheanoda Veronica","year":"2021","unstructured":"Veronica Sheanoda, Kay Bussey, and Tiffany Jones. 2021. Sexuality, gender and culturally diverse interpretations of cyberbullying. new media & society 1, 26 (2021), 14614448211055366."},{"key":"e_1_3_2_2_97_1","doi-asserted-by":"publisher","DOI":"10.1145\/3274433"},{"key":"e_1_3_2_2_98_1","doi-asserted-by":"publisher","DOI":"10.1017\/jgc.2021.20"},{"key":"e_1_3_2_2_99_1","doi-asserted-by":"publisher","DOI":"10.1145\/985692.985753"},{"key":"e_1_3_2_2_100_1","volume-title":"Cyberbullying prevention and intervention programs in schools: A systematic review. School psychology international 39, 1","author":"Tanrikulu Ibrahim","year":"2018","unstructured":"Ibrahim Tanrikulu. 2018. Cyberbullying prevention and intervention programs in schools: A systematic review. School psychology international 39, 1 (2018), 74\u201391."},{"key":"e_1_3_2_2_101_1","volume-title":"Panel report: the dark side of the digitization of the individual. Internet research 29, 2","author":"Turel Ofir","year":"2019","unstructured":"Ofir Turel, Christian Matt, Manuel Trenz, Christy\u00a0MK Cheung, John D\u2019Arcy*, Hamed Qahri-Saremi*, and Monideepa Tarafdar*. 2019. Panel report: the dark side of the digitization of the individual. Internet research 29, 2 (2019), 274\u2013288."},{"key":"e_1_3_2_2_102_1","volume-title":"BNAIC 2010: 22rd Benelux Conference on Artificial Intelligence","author":"Van\u00a0der Zwaan JM","year":"2010","unstructured":"JM Van\u00a0der Zwaan, MV Dignum, and CM Jonker. 2010. Simulating peer support for victims of cyberbullying. In BNAIC 2010: 22rd Benelux Conference on Artificial Intelligence, Luxembourg, 25-26 October 2010."},{"key":"e_1_3_2_2_103_1","doi-asserted-by":"publisher","DOI":"10.3390\/electronics11081238"},{"key":"e_1_3_2_2_104_1","unstructured":"Sher Vogel. 2021. Co-creation a more equitable world: The transfomative benefits of participatory design. https:\/\/d-lab.mit.edu\/news-blog\/blog\/co-creating-more-equitable-world-transformative-benefits-participatory-design"},{"key":"e_1_3_2_2_105_1","doi-asserted-by":"publisher","DOI":"10.1089\/cyber.2019.0146"},{"key":"e_1_3_2_2_106_1","unstructured":"WhatsApp. 2023. About View Once. https:\/\/faq.whatsapp.com\/1077018839582332"},{"key":"e_1_3_2_2_107_1","volume-title":"Online social networking and the experience of cyber-bullying. Annual review of cybertherapy and telemedicine","author":"Wiederhold BK","year":"2012","unstructured":"BK Wiederhold and G Riva. 2012. Online social networking and the experience of cyber-bullying. Annual review of cybertherapy and telemedicine (2012), 212\u2013217."},{"key":"e_1_3_2_2_108_1","doi-asserted-by":"publisher","DOI":"10.1287\/isre.2020.0983"},{"key":"e_1_3_2_2_109_1","doi-asserted-by":"publisher","DOI":"10.1080\/13632752.2018.1530497"},{"key":"e_1_3_2_2_110_1","first-page":"35","article-title":"Cyberbullying: Using virtual scenarios to educate and raise awareness","volume":"26","author":"Wright H","year":"2009","unstructured":"Vivian\u00a0H Wright, Joy\u00a0J Burnham, T\u00a0Inman Christopher, and N\u00a0Ogorchock Heather. 2009. Cyberbullying: Using virtual scenarios to educate and raise awareness. Journal of Computing in Teacher Education 26, 1 (2009), 35\u201342.","journal-title":"Journal of Computing in Teacher Education"},{"key":"e_1_3_2_2_111_1","doi-asserted-by":"publisher","DOI":"10.1145\/3491102.3517614"},{"key":"e_1_3_2_2_112_1","first-page":"1","article-title":"Investigating Privacy Decision-Making Processes Among Nigerian Men and Women","volume":"7","author":"Yisa Victor","year":"2024","unstructured":"Victor Yisa, Reza\u00a0Ghaiumy Anaraky, Bart\u00a0P Knijnenburg, and Rita Orji. 2024. Investigating Privacy Decision-Making Processes Among Nigerian Men and Women. Proceedings on Privacy Enhancing Technologies 7, 1 (2024), 1\u201312.","journal-title":"Proceedings on Privacy Enhancing Technologies"},{"key":"e_1_3_2_2_113_1","doi-asserted-by":"publisher","DOI":"10.1080\/10447318.2024.2327200"},{"key":"e_1_3_2_2_114_1","unstructured":"Youtube. 2020. Its Gets Better. https:\/\/www.youtube.com\/user\/itgetsbetterproject"},{"key":"e_1_3_2_2_115_1","doi-asserted-by":"publisher","DOI":"10.1145\/3544548.3581019"},{"key":"e_1_3_2_2_116_1","volume-title":"11th Australasian Data Mining Conference (AusDM","author":"Zhao Yanchang","year":"2013","unstructured":"Yanchang Zhao. 2013. Analysing twitter data with text mining and social network analysis. In 11th Australasian Data Mining Conference (AusDM 2013). 41\u201347."}],"event":{"name":"DIS '24: Designing Interactive Systems Conference","location":"Copenhagen Denmark","acronym":"DIS '24","sponsor":["SIGCHI ACM Special Interest Group on Computer-Human Interaction"]},"container-title":["Designing Interactive Systems Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3643834.3660716","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3643834.3660716","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T00:03:08Z","timestamp":1750291388000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3643834.3660716"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,7]]},"references-count":116,"alternative-id":["10.1145\/3643834.3660716","10.1145\/3643834"],"URL":"https:\/\/doi.org\/10.1145\/3643834.3660716","relation":{},"subject":[],"published":{"date-parts":[[2024,7]]},"assertion":[{"value":"2024-07-01","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}