{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,8]],"date-time":"2025-10-08T00:32:33Z","timestamp":1759883553820,"version":"build-2065373602"},"publisher-location":"New York, NY, USA","reference-count":53,"publisher":"ACM","content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2025,5,8]]},"DOI":"10.1145\/3701716.3716879","type":"proceedings-article","created":{"date-parts":[[2025,6,23]],"date-time":"2025-06-23T14:10:32Z","timestamp":1750687832000},"page":"2772-2775","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["Inclusive and Accessible Bystander Interventions for Technology Facilitated Sexual Violence"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-0924-3661","authenticated-orcid":false,"given":"Yimin","family":"Chen","sequence":"first","affiliation":[{"name":"School of Computing Technologies, Royal Melbourne Institute of Technology, Melbourne, VIC, Australia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7522-1842","authenticated-orcid":false,"given":"Dana","family":"McKay","sequence":"additional","affiliation":[{"name":"School of Computing Technologies, Royal Melbourne Institute of Technology, Melbourne, VIC, Australia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2747-0865","authenticated-orcid":false,"given":"Kate","family":"Anderson","sequence":"additional","affiliation":[{"name":"School of Computing Technologies, Royal Melbourne Institute of Technology, Melbourne, VIC, Australia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2625-1572","authenticated-orcid":false,"given":"Ronny","family":"Andrade","sequence":"additional","affiliation":[{"name":"School of Computing Technologies, Royal Melbourne Institute of Technology, Melbourne, VIC, Australia"}]}],"member":"320","published-online":{"date-parts":[[2025,5,23]]},"reference":[{"doi-asserted-by":"publisher","key":"e_1_3_2_2_1_1","DOI":"10.1126\/sciadv.abm2463"},{"doi-asserted-by":"publisher","key":"e_1_3_2_2_2_1","DOI":"10.1002\/jcop.10078"},{"doi-asserted-by":"publisher","key":"e_1_3_2_2_3_1","DOI":"10.1145\/3134659"},{"doi-asserted-by":"publisher","key":"e_1_3_2_2_4_1","DOI":"10.5210\/fm.v24i10.9593"},{"key":"e_1_3_2_2_5_1","article-title":"Women's Responses to Online Harassment","volume":"14","author":"Chadha Kalyani","year":"2020","unstructured":"Kalyani Chadha, Linda Steiner, Jessica Vitak, and Zahra Ashktorab. 2020. Women's Responses to Online Harassment. International Journal of Communication 14, 0 (2020). https:\/\/ijoc.org\/index.php\/ijoc\/article\/view\/11683","journal-title":"International Journal of Communication"},{"doi-asserted-by":"publisher","unstructured":"Yimin Chen Kaitlynn Mendes Chandell Gosse Jaigris Hodson and George Veletsianos. 0. Canadian Gender-Based Violence Prevention Programs: Gaps and Opportunities. Violence Against Women 0 0 (0). doi:10.1177\/10778012241259727 PMID: 38859753.","key":"e_1_3_2_2_6_1","DOI":"10.1177\/10778012241259727"},{"volume-title":"Machinery of dominance: Women, men and technical know-how. London","author":"Cockburn Cynthia","unstructured":"Cynthia Cockburn. 1985. Machinery of dominance: Women, men and technical know-how. London; Dover, NH: Pluto Press.","key":"e_1_3_2_2_7_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_2_8_1","DOI":"10.1177\/15344843211040734"},{"doi-asserted-by":"publisher","key":"e_1_3_2_2_9_1","DOI":"10.18061\/dsq.v38i4.5991"},{"doi-asserted-by":"publisher","key":"e_1_3_2_2_10_1","DOI":"10.1037\/h0025589"},{"doi-asserted-by":"publisher","key":"e_1_3_2_2_11_1","DOI":"10.1145\/3173574.3173785"},{"volume-title":"Technology-Facilitated Gender-Based Violence: An Overview","author":"Dunn Suzie","unstructured":"Suzie Dunn. 2020. Technology-Facilitated Gender-Based Violence: An Overview. Centre for International Governance Innovation, Waterloo, ON, Canada. https:\/\/www.cigionline.org\/publications\/technology-facilitated-gender-based-violence-overview\/","key":"e_1_3_2_2_12_1"},{"unstructured":"eSafety Commissioner. 2024. Being a young man online: Tensions complexities and possibilities . Technical Report. Australian Government Canberra ACT. https:\/\/www.esafety.gov.au\/sites\/default\/files\/2024-06\/Being-a-young-man-online-June-2024.pdf?v=1738552312249","key":"e_1_3_2_2_13_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_2_14_1","DOI":"10.1177\/14614448231154825"},{"key":"e_1_3_2_2_15_1","volume-title":"Retrieved","author":"Figures Facts","year":"2023","unstructured":"Facts & Figures. 2023. The Gender Digital Divide. Retrieved January 31, 2025 from https:\/\/www.itu.int\/itu-d\/reports\/statistics\/2023\/10\/10\/ff23-the-gender-digital-divide\/"},{"doi-asserted-by":"publisher","key":"e_1_3_2_2_16_1","DOI":"10.1080\/09687599.2023.2279932"},{"doi-asserted-by":"publisher","key":"e_1_3_2_2_17_1","DOI":"10.1080\/14680777.2018.1447345"},{"doi-asserted-by":"publisher","key":"e_1_3_2_2_18_1","DOI":"10.1108\/978-1-83982-848-520211003"},{"key":"e_1_3_2_2_19_1","volume-title":"Retrieved","author":"Government Victorian","year":"2022","unstructured":"Victorian Government. 2022. Co-design with People with Disability. Retrieved January 20, 2025 from https:\/\/www.vic.gov.au\/state-disability-plan\/systemic-reform-commitments-actions-and-accountability\/co-design-people"},{"doi-asserted-by":"publisher","key":"e_1_3_2_2_20_1","DOI":"10.1111\/ssqu.12270"},{"doi-asserted-by":"publisher","key":"e_1_3_2_2_21_1","DOI":"10.1080\/14680777.2021.1998185"},{"doi-asserted-by":"publisher","key":"e_1_3_2_2_22_1","DOI":"10.1177\/1077801219875821"},{"doi-asserted-by":"publisher","key":"e_1_3_2_2_23_1","DOI":"10.1609\/icwsm.v15i1.18053"},{"key":"e_1_3_2_2_24_1","volume-title":"Casey","author":"Hoxmeier Jill C.","year":"2022","unstructured":"Jill C. Hoxmeier and Erin A. Casey. 2022. Chapter 12 -Engaging boys and men as allies in prevention: The efficacy of bystander program approaches for boys and men. In Engaging Boys and Men in Sexual Assault Prevention, Lindsay M. Orchowski and Alan D. Berkowitz (Eds.). Academic Press, 285--309. doi:10.1016\/ B978-0-12-819202-3.00010-9"},{"key":"e_1_3_2_2_25_1","volume-title":"Retrieved","author":"Royal Commission into Violence Abuse Neglect & Exploitation of People with Disability.","year":"2023","unstructured":"Royal Commission into Violence Abuse Neglect & Exploitation of People with Disability. 2023. Final Report. Retrieved January 20, 2025 from https:\/\/disability.royalcommission.gov.au\/publications\/final-report"},{"doi-asserted-by":"publisher","key":"e_1_3_2_2_26_1","DOI":"10.21580\/sa.v16i2.8132"},{"doi-asserted-by":"publisher","key":"e_1_3_2_2_27_1","DOI":"10.1080\/14719037.2019.1619810"},{"doi-asserted-by":"publisher","key":"e_1_3_2_2_28_1","DOI":"10.1080\/14680777"},{"doi-asserted-by":"publisher","key":"e_1_3_2_2_29_1","DOI":"10.1002\/9781119429128.iegmc080"},{"key":"e_1_3_2_2_30_1","volume-title":"Retrieved","author":"Jetson Freya","year":"2025","unstructured":"Freya Jetson. 2025. LGBTQ advocates alarmed by Meta's hateful conduct policy changes. Retrieved January 22, 2025 from https:\/\/www.abc.net.au\/news\/2025-01-10\/meta-hateful-conduct-policy-changes-alarm-lgbtq-advocates\/104800042"},{"doi-asserted-by":"publisher","key":"e_1_3_2_2_31_1","DOI":"10.1080\/07448481.2018.1431906"},{"doi-asserted-by":"publisher","key":"e_1_3_2_2_32_1","DOI":"10.1177\/089124300014002003"},{"doi-asserted-by":"publisher","key":"e_1_3_2_2_33_1","DOI":"10.1080\/0144929X.2022.2027013"},{"doi-asserted-by":"publisher","key":"e_1_3_2_2_34_1","DOI":"10.1177\/13684302211035437"},{"doi-asserted-by":"publisher","key":"e_1_3_2_2_35_1","DOI":"10.1108\/978-1-83982-848-520211052"},{"doi-asserted-by":"publisher","key":"e_1_3_2_2_36_1","DOI":"10.1177\/15248380221079660"},{"doi-asserted-by":"publisher","key":"e_1_3_2_2_37_1","DOI":"10.1177\/0964663920947791"},{"doi-asserted-by":"publisher","key":"e_1_3_2_2_38_1","DOI":"10.1145\/3627508.3638321"},{"key":"e_1_3_2_2_39_1","first-page":"205630512412746","article-title":"Online Disinhibition, Normative Hostility, and Banal Toxicity: Young People's Negative Online Gaming Conduct","volume":"10","author":"Meril\u00e4inen Mikko","year":"2024","unstructured":"Mikko Meril\u00e4inen and Maria Ruotsalainen. 2024. Online Disinhibition, Normative Hostility, and Banal Toxicity: Young People's Negative Online Gaming Conduct. Social Media Society 10, 3 (2024), 20563051241274669. doi:10.1177\/ 20563051241274669","journal-title":"Social Media Society"},{"volume-title":"Retrieved","year":"2024","unstructured":"Microsoft. 2024. Global Online Safety Survey Results. Retrieved January 22, 2025 from https:\/\/www.microsoft.com\/en-us\/digitalsafety\/research\/global-online-safety-survey","key":"e_1_3_2_2_40_1"},{"key":"e_1_3_2_2_41_1","first-page":"62","article-title":"FCJ-156 Hacking the Social: Internet Memes, Identity Antagonism, and the Logic of Lulz","volume":"22","author":"Milner Ryan M.","year":"2013","unstructured":"Ryan M. Milner. 2013. FCJ-156 Hacking the Social: Internet Memes, Identity Antagonism, and the Logic of Lulz. The Fibreculture Journal 22 (2013), 62--92. https:\/\/twentytwo.fibreculturejournal.org\/fcj-156-hacking-the-social-Internet-memes-identity-antagonism-and-the-logic-of-lulz\/","journal-title":"The Fibreculture Journal"},{"doi-asserted-by":"publisher","key":"e_1_3_2_2_42_1","DOI":"10.1111\/soc4.12577"},{"doi-asserted-by":"publisher","key":"e_1_3_2_2_43_1","DOI":"10.1007\/s11199-024-01514-w"},{"key":"e_1_3_2_2_44_1","volume-title":"Retrieved","author":"Australian Institute of Health and WellFare.","year":"2024","unstructured":"Australian Institute of Health and WellFare. 2024. People with Disability in Australia. Retrieved January 20, 2025 from https:\/\/www.aihw.gov.au\/ reports\/disability\/people-with-disability-in-australia\/contents\/people-with-disability\/prevalence-of-disability"},{"volume-title":"Computers Helping People with Special Needs","author":"Petrie Helen","unstructured":"Helen Petrie, Stefan Carmien, and Andrew Lewis. 2018. Assistive Technology Abandonment: Research Realities and Potentials. In Computers Helping People with Special Needs, Klaus Miesenberger and Georgios Kouroupetroglou (Eds.). Springer International Publishing, Cham, 532--540.","key":"e_1_3_2_2_45_1"},{"unstructured":"Anastasia Powell Asher Flynn and Sophie Hindes. 2022. Technology-facilitated abuse: National survey of Australian adults' experiences. Technical Report. ANROWS Sydney NSW. https:\/\/www.anrows.org.au\/publication\/technology-facilitated-abuse-national-survey-of-australian-adults-experiences\/","key":"e_1_3_2_2_46_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_2_47_1","DOI":"10.1080\/13600869.2024.2324540"},{"volume-title":"Technology and Women's Voices (1 ed.)","author":"Turkle Sherry","unstructured":"Sherry Turkle. 1988. Computational reticence: why women fear the intimate machine. In Technology and Women's Voices (1 ed.), Cheris Kramarae (Ed.). Routledge, New York, 17 pages.","key":"e_1_3_2_2_48_1"},{"volume-title":"Critical Cy-berculture Studies: Current Terrains","author":"Turner Fred","unstructured":"Fred Turner. 2006. How digital technology found utopian ideology. In Critical Cy-berculture Studies: Current Terrains, Future Directions, David Silver and Adrienne Massanari (Eds.). New York University Press, NY, 257--269.","key":"e_1_3_2_2_49_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_2_50_1","DOI":"10.1080\/0142159X.2024.2316849"},{"doi-asserted-by":"publisher","key":"e_1_3_2_2_51_1","DOI":"10.1177\/1461444818781324"},{"unstructured":"Emyly A. Vogels. 2021. The State of Online Harassment. Technical Report. Pew Research Center. https:\/\/www.pewresearch.org\/internet\/2021\/01\/13\/the-state-of-online-harassment\/","key":"e_1_3_2_2_52_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_2_53_1","DOI":"10.1177\/2056305118762444"}],"event":{"sponsor":["SIGWEB ACM Special Interest Group on Hypertext, Hypermedia, and Web"],"acronym":"WWW '25","name":"WWW '25: The ACM Web Conference 2025","location":"Sydney NSW Australia"},"container-title":["Companion Proceedings of the ACM on Web Conference 2025"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3701716.3716879","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,7]],"date-time":"2025-10-07T18:26:03Z","timestamp":1759861563000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3701716.3716879"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,5,8]]},"references-count":53,"alternative-id":["10.1145\/3701716.3716879","10.1145\/3701716"],"URL":"https:\/\/doi.org\/10.1145\/3701716.3716879","relation":{},"subject":[],"published":{"date-parts":[[2025,5,8]]},"assertion":[{"value":"2025-05-23","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}