{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,2]],"date-time":"2025-08-02T19:12:59Z","timestamp":1754161979406,"version":"3.41.2"},"publisher-location":"New York, NY, USA","reference-count":67,"publisher":"ACM","funder":[{"DOI":"10.13039\/501100002081","name":"Irish Research Council","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100002081","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2025,6,23]]},"DOI":"10.1145\/3713043.3731485","type":"proceedings-article","created":{"date-parts":[[2025,6,23]],"date-time":"2025-06-23T09:14:36Z","timestamp":1750670076000},"page":"790-802","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["From Users to Co-Designers: Youth Participation in Understanding Cyberbullying"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-7172-4098","authenticated-orcid":false,"given":"Kanishk","family":"Verma","sequence":"first","affiliation":[{"name":"School of Computing, Dublin City University, Dublin, Ireland"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5759-2655","authenticated-orcid":false,"given":"Brian","family":"Davis","sequence":"additional","affiliation":[{"name":"School of Computing, Dublin City University, Dublin, Ireland"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1502-7479","authenticated-orcid":false,"given":"Tijana","family":"Milosevic","sequence":"additional","affiliation":[{"name":"School of Information and Communication Studies, University College Dublin, Dublin, Ireland"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4463-1096","authenticated-orcid":false,"given":"Rebecca","family":"Umbach","sequence":"additional","affiliation":[{"name":"Google, San Francisco, CA, USA"}]}],"member":"320","published-online":{"date-parts":[[2025,6,23]]},"reference":[{"key":"e_1_3_3_2_2_2","doi-asserted-by":"publisher","DOI":"10.1145\/3613904.3642313"},{"key":"e_1_3_3_2_3_2","doi-asserted-by":"crossref","unstructured":"Tasnim Ahmed Shahriar Ivan Mohsinul Kabir Hasan Mahmud and Kamrul Hasan. 2022. Performance analysis of transformer-based architectures and their ensembles to detect trait-based cyberbullying. Social Network Analysis and Mining 12 1 (2022) 99.","DOI":"10.1007\/s13278-022-00934-4"},{"key":"e_1_3_3_2_4_2","doi-asserted-by":"publisher","unstructured":"Icek Ajzen. 1991. The theory of planned behavior. Organizational Behavior and Human Decision Processes 50 2 (1991) 179\u2013211. 10.1016\/0749-5978(91)90020-T Theories of Cognitive Self-Regulation.","DOI":"10.1016\/0749-5978(91)90020-T"},{"key":"e_1_3_3_2_5_2","doi-asserted-by":"publisher","DOI":"10.1145\/2858036.2858548"},{"key":"e_1_3_3_2_6_2","doi-asserted-by":"publisher","DOI":"10.1145\/3311927.3323133"},{"key":"e_1_3_3_2_7_2","unstructured":"CR Baker Debbie Ging and M Brandt\u00a0Andreasen. 2024. Recommending toxicity: the role of algorithmic recommender functions on YouTube Shorts and TikTok in promoting male supremacist influencers. DCU Centre Dublin City University (2024) 2\u201333o."},{"key":"e_1_3_3_2_8_2","doi-asserted-by":"publisher","DOI":"10.1002\/9781119221685.ch4"},{"key":"e_1_3_3_2_9_2","volume-title":"Keeping Kids Safer Online. Online Safety Matters. Trends and Usage Report Academic Year 2022\/2023","author":"Beresford O.","year":"2023","unstructured":"O. Beresford, A. Cooney, A. Keogh, E. Flynn, and M. Messena. 2023. Keeping Kids Safer Online. Online Safety Matters. Trends and Usage Report Academic Year 2022\/2023. Technical Report. CyberSafeKids."},{"key":"e_1_3_3_2_10_2","doi-asserted-by":"publisher","unstructured":"Kellie\u00a0Giorgio Camelford and Christine Ebrahim. 2016. The Cyberbullying Virus: A Psychoeducational Intervention to Define and Discuss Cyberbullying Among High School Females. Journal of Creativity in Mental Health 11 3-4 (2016) 458\u2013468. 10.1080\/15401383.2016.1183545 arXiv:10.1080\/15401383.2016.1183545","DOI":"10.1080\/15401383.2016.1183545"},{"key":"e_1_3_3_2_11_2","doi-asserted-by":"crossref","unstructured":"Marilyn Campbell and Jenny Xu. 2022. Children and adolescents\u2019 understanding of traditional and cyberbullying. Children and youth services review 139 (2022) 106528.","DOI":"10.1016\/j.childyouth.2022.106528"},{"key":"e_1_3_3_2_12_2","unstructured":"Tommy\u00a0KH Chan Christy\u00a0MK Cheung Izak Benbasat Bo Xiao and Zach\u00a0WY Lee. 2022. Bystanders join in cyberbullying on social networking sites: the deindividuation and moral disengagement perspectives. Information Systems Research (2022)."},{"key":"e_1_3_3_2_13_2","doi-asserted-by":"crossref","unstructured":"Despoina Chatzakou Ilias Leontiadis Jeremy Blackburn Emiliano\u00a0De Cristofaro Gianluca Stringhini Athena Vakali and Nicolas Kourtellis. 2019. Detecting cyberbullying and cyberaggression in social media. ACM Transactions on the Web (TWEB) 13 3 (2019) 1\u201351.","DOI":"10.1145\/3343484"},{"key":"e_1_3_3_2_14_2","doi-asserted-by":"crossref","unstructured":"Hsin-Yu Chen and Cheng-Te Li. 2020. Henin: Learning heterogeneous neural interaction networks for explainable cyberbullying detection on social media. arXiv preprint arXiv:https:\/\/arXiv.org\/abs\/2010.04576 (2020).","DOI":"10.18653\/v1\/2020.emnlp-main.200"},{"key":"e_1_3_3_2_15_2","doi-asserted-by":"publisher","DOI":"10.1137\/1.9781611975673.27"},{"key":"e_1_3_3_2_16_2","first-page":"203","volume-title":"Classics in environmental criminology","author":"Cohen Lawrence\u00a0E","year":"2010","unstructured":"Lawrence\u00a0E Cohen and Marcus Felson. 2010. Social change and crime rate trends: A routine activity approach (1979). In Classics in environmental criminology. Routledge, 203\u2013232."},{"key":"e_1_3_3_2_17_2","unstructured":"CyberSafeKids Ireland [n. d.]. https:\/\/www.cybersafekids.ie\/wp-content\/uploads\/2024\/08\/CSK-TU-Report-23-24-Final.pdf Trends and Usage Report 2023-2024 CyberSafeKids Ireland."},{"key":"e_1_3_3_2_18_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-59065-9_20"},{"key":"e_1_3_3_2_19_2","doi-asserted-by":"crossref","unstructured":"Thomas Davidson Dana Warmsley Michael Macy and Ingmar Weber. 2017. Automated hate speech detection and the problem of offensive language. Proceedings of the international AAAI conference on web and social media 11 1 (2017) 512\u2013515.","DOI":"10.1609\/icwsm.v11i1.14955"},{"key":"e_1_3_3_2_20_2","doi-asserted-by":"publisher","DOI":"10.1145\/3173574.3173785"},{"key":"e_1_3_3_2_21_2","doi-asserted-by":"crossref","unstructured":"Chris Emmery Ben Verhoeven Guy De\u00a0Pauw Gilles Jacobs Cynthia Van\u00a0Hee Els Lefever Bart Desmet V\u00e9ronique Hoste and Walter Daelemans. 2021. Current limitations in cyberbullying detection: On evaluation criteria reproducibility and data scarcity. Language Resources and Evaluation 55 (2021) 597\u2013633.","DOI":"10.1007\/s10579-020-09509-1"},{"key":"e_1_3_3_2_22_2","doi-asserted-by":"publisher","DOI":"10.1145\/3613904.3642144"},{"key":"e_1_3_3_2_23_2","doi-asserted-by":"publisher","unstructured":"Antigoni Founta Constantinos Djouvas Despoina Chatzakou Ilias Leontiadis Jeremy Blackburn Gianluca Stringhini Athena Vakali Michael Sirivianos and Nicolas Kourtellis. 2018. Large scale crowdsourcing and characterization of twitter abusive behavior. Proceedings of the International AAAI Conference on Web and Social Media 12 1 (2018). 10.1609\/icwsm.v12i1.14991","DOI":"10.1609\/icwsm.v12i1.14991"},{"key":"e_1_3_3_2_24_2","doi-asserted-by":"crossref","unstructured":"Chiao\u00a0Ling Huang Sining Zhang and Shu\u00a0Ching Yang. 2020. How students react to different cyberbullying events: Past experience judgment perceived seriousness helping behavior and the effect of online disinhibition. Computers in human behavior 110 (2020) 106338.","DOI":"10.1016\/j.chb.2020.106338"},{"key":"e_1_3_3_2_25_2","doi-asserted-by":"crossref","unstructured":"Kana Imuta Sumin Song Julie\u00a0D Henry Ted Ruffman Candida Peterson and Virginia Slaughter. 2022. A meta-analytic review on the social\u2013emotional intelligence correlates of the six bullying roles: Bullies followers victims bully-victims defenders and outsiders. Psychological Bulletin 148 3-4 (2022) 199.","DOI":"10.1037\/bul0000364"},{"key":"e_1_3_3_2_26_2","doi-asserted-by":"publisher","DOI":"10.1145\/3491102.3502129"},{"key":"e_1_3_3_2_27_2","doi-asserted-by":"crossref","unstructured":"Stefan Johansson and G\u00f6ran Englund. 2021. Cyberbullying and its relationship with physical verbal and relational bullying: A structural equation modelling approach. Educational Psychology 41 3 (2021) 320\u2013337.","DOI":"10.1080\/01443410.2020.1769033"},{"key":"e_1_3_3_2_28_2","unstructured":"Cybersafe Kids. 2022. Academic Year in Review 2021 \u2013 2022. CyberSakeKids Ireland (2022). https:\/\/www.cybersafekids.ie\/wp-content\/uploads\/2022\/09\/CSK_YearInReview_2021-2022_FINAL.pdf"},{"key":"e_1_3_3_2_29_2","doi-asserted-by":"crossref","unstructured":"Hae-Young Kim. 2017. Statistical notes for clinical researchers: Chi-squared test and Fisher\u2019s exact test. Restorative dentistry & endodontics 42 2 (2017) 152\u2013155.","DOI":"10.5395\/rde.2017.42.2.152"},{"key":"e_1_3_3_2_30_2","doi-asserted-by":"publisher","unstructured":"Jette Kofoed and Elisabeth Staksrud. 2019. \u2018We always torment different people so by definition we are no bullies\u2019: The problem of definitions in cyberbullying research. New Media & Society 21 4 (2019) 1006\u20131020. 10.1177\/1461444818810026 arXiv:10.1177\/1461444818810026","DOI":"10.1177\/1461444818810026"},{"key":"e_1_3_3_2_31_2","doi-asserted-by":"crossref","unstructured":"Angel\u00a0NM Leung Natalie Wong and JoAnn\u00a0M Farver. 2018. You are what you read: The belief systems of cyber-bystanders on social networking sites. Frontiers in psychology 9 (2018) 365.","DOI":"10.3389\/fpsyg.2018.00365"},{"key":"e_1_3_3_2_32_2","doi-asserted-by":"crossref","unstructured":"Paul\u00a0Benjamin Lowry Gregory\u00a0D Moody and Sutirtha Chatterjee. 2017. Using IT design to prevent cyberbullying. Journal of management information systems 34 3 (2017) 863\u2013901.","DOI":"10.1080\/07421222.2017.1373012"},{"key":"e_1_3_3_2_33_2","doi-asserted-by":"publisher","DOI":"10.1145\/3477495.3531925"},{"key":"e_1_3_3_2_34_2","doi-asserted-by":"crossref","unstructured":"Krishanu Maity Sriparna Saha and Pushpak Bhattacharyya. 2022. Emoji Sentiment and Emotion Aided Cyberbullying Detection in Hinglish. IEEE Transactions on Computational Social Systems (2022).","DOI":"10.1109\/TCSS.2022.3183046"},{"key":"e_1_3_3_2_35_2","unstructured":"T Milosevic DA Laffan and J O\u2019Higgins\u00a0Norman. 2021. KiDiCoTi: Kids\u2019 digital lives in Covid-19 times: A study on digital practices safety and wellbeing. Key findings from Ireland."},{"key":"e_1_3_3_2_36_2","doi-asserted-by":"publisher","unstructured":"Tijana Milosevic Kanishk Verma Michael Carter Samantha Vigil Derek Laffan Brian Davis and James\u00a0O\u2019Higgins Norman. 2023. Effectiveness of Artificial Intelligence\u2013Based Cyberbullying Interventions From Youth Perspective. Social Media + Society 9 1 (2023) 20563051221147325. 10.1177\/20563051221147325 arXiv:10.1177\/20563051221147325","DOI":"10.1177\/20563051221147325"},{"key":"e_1_3_3_2_37_2","doi-asserted-by":"publisher","DOI":"10.1016\/B978-044481862-1.50077-7"},{"key":"e_1_3_3_2_38_2","doi-asserted-by":"publisher","DOI":"10.1109\/ISDA.2013.6920758"},{"key":"e_1_3_3_2_39_2","volume-title":"National Advisory Council for Online Safety: Report of a National Survey of Children, their Parents and Adults regarding Online Safety 2021","author":"Safety National Advisory Council for Online","year":"2021","unstructured":"National Advisory Council for Online Safety. 2021. National Advisory Council for Online Safety: Report of a National Survey of Children, their Parents and Adults regarding Online Safety 2021. Technical Report. Government of Ireland. https:\/\/assets.gov.ie\/204409\/b9ab5dbd-8fdc-4f97-abfc-a88afb2f6e6f.pdf"},{"key":"e_1_3_3_2_40_2","unstructured":"Beresford O. Cooney A. Keogh A. E. Flynn and Messena. 2023. Keeping Kids Safer Online. Online Safety Matters. Trends and Usage Report Academic Year 2022\/2023. https:\/\/www.cybersafekids.ie\/wp-content\/uploads\/2023\/09\/CSK_Data-Trends-Report-2023-V2-Web-Version.pdf."},{"key":"e_1_3_3_2_41_2","first-page":"867","volume-title":"Proceedings of the Thirteenth Language Resources and Evaluation Conference","author":"Ollagnier Ana\u00efs","year":"2022","unstructured":"Ana\u00efs Ollagnier, Elena Cabrio, Serena Villata, and Catherine Blaya. 2022. CyberAgressionAdo-v1: a Dataset of Annotated Online Aggressions in French Collected through a Role-playing Game. In Proceedings of the Thirteenth Language Resources and Evaluation Conference. European Language Resources Association, Marseille, France, 867\u2013875. https:\/\/aclanthology.org\/2022.lrec-1.91"},{"key":"e_1_3_3_2_42_2","doi-asserted-by":"crossref","unstructured":"Dan Olweus. 1994. Bullying at school: basic facts and effects of a school based intervention program. Journal of child psychology and psychiatry 35 7 (1994) 1171\u20131190.","DOI":"10.1111\/j.1469-7610.1994.tb01229.x"},{"key":"e_1_3_3_2_43_2","doi-asserted-by":"crossref","unstructured":"Justin\u00a0W Patchin and Sameer Hinduja. 2006. Bullies move beyond the schoolyard: A preliminary look at cyberbullying. Youth violence and juvenile justice 4 2 (2006) 148\u2013169.","DOI":"10.1177\/1541204006286288"},{"key":"e_1_3_3_2_44_2","doi-asserted-by":"crossref","unstructured":"Sayanta Paul and Sriparna Saha. 2022. CyberBERT: BERT for cyberbullying identification: BERT for cyberbullying identification. Multimedia Systems 28 6 (2022) 1897\u20131904.","DOI":"10.1007\/s00530-020-00710-4"},{"key":"e_1_3_3_2_45_2","doi-asserted-by":"publisher","unstructured":"Gregory D.\u00a0Moody Paul Benjamin\u00a0Lowry and Sutirtha Chatterjee. 2017. Using IT Design to Prevent Cyberbullying. Journal of Management Information Systems 34 3 (2017) 863\u2013901. 10.1080\/07421222.2017.1373012 arXiv:10.1080\/07421222.2017.1373012","DOI":"10.1080\/07421222.2017.1373012"},{"key":"e_1_3_3_2_46_2","doi-asserted-by":"publisher","DOI":"10.1109\/ECTI-CON51831.2021.9454848"},{"key":"e_1_3_3_2_47_2","doi-asserted-by":"crossref","unstructured":"Isabel Rodr\u00edguez-de Dios Johanna\u00a0MF van Oosten and Juan-Jos\u00e9 Igartua. 2018. A study of the relationship between parental mediation and adolescents\u2019 digital skills online risks and online opportunities. Computers in Human Behavior 82 (2018) 186\u2013198.","DOI":"10.1016\/j.chb.2018.01.012"},{"key":"e_1_3_3_2_48_2","doi-asserted-by":"crossref","unstructured":"Hugo Rosa N\u00e1dia Pereira Ricardo Ribeiro Paula\u00a0Costa Ferreira Joao\u00a0Paulo Carvalho Sofia Oliveira Lu\u00edsa Coheur Paula Paulino AM\u00a0Veiga Sim\u00e3o and Isabel Trancoso. 2019. Automatic cyberbullying detection: A systematic review. Computers in Human Behavior 93 (2019) 333\u2013345.","DOI":"10.1016\/j.chb.2018.12.021"},{"key":"e_1_3_3_2_49_2","doi-asserted-by":"crossref","unstructured":"Shivam Sharma Firoj Alam Md\u00a0Shad Akhtar Dimitar Dimitrov Giovanni Da\u00a0San Martino Hamed Firooz Alon Halevy Fabrizio Silvestri Preslav Nakov and Tanmoy Chakraborty. 2022. Detecting and understanding harmful memes: A survey. arXiv preprint arXiv:https:\/\/arXiv.org\/abs\/2205.04274 (2022).","DOI":"10.24963\/ijcai.2022\/781"},{"key":"e_1_3_3_2_50_2","doi-asserted-by":"crossref","unstructured":"Daniel\u00a0J Shaw Linda\u00a0K Kaye Nicola Ngombe Klaus Kessler and Charlotte\u00a0R Pennington. 2022. It\u2019s not what you do it\u2019s the way that you do it: An experimental task delineates among passive reactive and interactive styles of behaviour on social networking sites. Plos one 17 12 (2022) e0276765.","DOI":"10.1371\/journal.pone.0276765"},{"key":"e_1_3_3_2_51_2","doi-asserted-by":"crossref","unstructured":"Robert Slonje Peter\u00a0K Smith and Ann Fris\u00e9n. 2013. The nature of cyberbullying and strategies for prevention. Computers in human behavior 29 1 (2013) 26\u201332.","DOI":"10.1016\/j.chb.2012.05.024"},{"key":"e_1_3_3_2_52_2","doi-asserted-by":"crossref","unstructured":"Peter\u00a0K Smith Jess Mahdavi Manuel Carvalho Sonja Fisher Shanette Russell and Neil Tippett. 2008. Cyberbullying: Its nature and impact in secondary school pupils. Journal of child psychology and psychiatry 49 4 (2008) 376\u2013385.","DOI":"10.1111\/j.1469-7610.2007.01846.x"},{"key":"e_1_3_3_2_53_2","doi-asserted-by":"crossref","unstructured":"Jiyeon Song and Insoo Oh. 2018. Factors influencing bystanders\u2019 behavioral reactions in cyberbullying situations. Computers in Human Behavior 78 (2018) 273\u2013282.","DOI":"10.1016\/j.chb.2017.10.008"},{"key":"e_1_3_3_2_54_2","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/W18-5107"},{"key":"e_1_3_3_2_55_2","unstructured":"Mariya Stoilova Sonia Livingstone Rana Khazbak et\u00a0al. 2021. Investigating Risks and Opportunities for Children in a Digital World: A rapid review of the evidence on children\u2019s internet use and outcomes. UNICEF Office Of Research \u2013 INNOCENTI (2021)."},{"key":"e_1_3_3_2_56_2","doi-asserted-by":"crossref","unstructured":"Samuel\u00a0Hardman Taylor Dominic DiFranzo Yoon\u00a0Hyung Choi Shruti Sannon and Natalya\u00a0N Bazarova. 2019. Accountability and empathy by design: Encouraging bystander intervention to cyberbullying on social media. Proceedings of the ACM on Human-Computer Interaction 3 CSCW (2019) 1\u201326.","DOI":"10.1145\/3359220"},{"volume-title":"Responding to Online Threats: Minors\u2019 Perspectives on Disclosing, Reporting, and Blocking","year":"2021","key":"e_1_3_3_2_57_2","unstructured":"Thorn and Benenson Strategy Group. 2021. Responding to Online Threats: Minors\u2019 Perspectives on Disclosing, Reporting, and Blocking. Technical Report. Thorn. https:\/\/info.thorn.org\/hubfs\/Research\/Responding%20to%20Online%20Threats_2021-Full-Report.pdf Research conducted by Thorn in partnership with Benenson Strategy Group."},{"key":"e_1_3_3_2_58_2","doi-asserted-by":"crossref","unstructured":"Jatin\u00a0Karthik Tripathy S\u00a0Sibi Chakkaravarthy Suresh\u00a0Chandra Satapathy Madhulika Sahoo and V Vaidehi. 2022. ALBERT-based fine-tuning model for cyberbullying analysis. Multimedia Systems 28 6 (2022) 1941\u20131949.","DOI":"10.1007\/s00530-020-00690-5"},{"key":"e_1_3_3_2_59_2","doi-asserted-by":"publisher","DOI":"10.2760\/012329"},{"key":"e_1_3_3_2_60_2","first-page":"672","volume-title":"Proceedings of the international conference recent advances in natural language processing","author":"Van\u00a0Hee Cynthia","year":"2015","unstructured":"Cynthia Van\u00a0Hee, Els Lefever, Ben Verhoeven, Julie Mennes, Bart Desmet, Guy De\u00a0Pauw, Walter Daelemans, and V\u00e9ronique Hoste. 2015. Detection and fine-grained classification of cyberbullying events. In Proceedings of the international conference recent advances in natural language processing. 672\u2013680."},{"key":"e_1_3_3_2_61_2","first-page":"2264","volume-title":"Proceedings of the 2024 Joint International Conference on Computational Linguistics, Language Resources and Evaluation (LREC-COLING 2024)","author":"Verma Kanishk","year":"2024","unstructured":"Kanishk Verma, Kolawole\u00a0John Adebayo, Joachim Wagner, Megan Reynolds, Rebecca Umbach, Tijana Milosevic, and Brian Davis. 2024. Beyond Binary: Towards Embracing Complexities in Cyberbullying Detection and Intervention - a Position Paper. In Proceedings of the 2024 Joint International Conference on Computational Linguistics, Language Resources and Evaluation (LREC-COLING 2024), Nicoletta Calzolari, Min-Yen Kan, Veronique Hoste, Alessandro Lenci, Sakriani Sakti, and Nianwen Xue (Eds.). ELRA and ICCL, Torino, Italia, 2264\u20132284. https:\/\/aclanthology.org\/2024.lrec-main.203\/"},{"key":"e_1_3_3_2_62_2","doi-asserted-by":"crossref","unstructured":"Shuai Wang Abdul\u00a0Samad Shibghatullah Thirupattur\u00a0Javid Iqbal and Kay\u00a0Hooi Keoy. 2024. A review of multimodal-based emotion recognition techniques for cyberbullying detection in online social media platforms. Neural Computing and Applications 36 35 (2024) 21923\u201321956.","DOI":"10.1007\/s00521-024-10371-3"},{"key":"e_1_3_3_2_63_2","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/N16-2013"},{"key":"e_1_3_3_2_64_2","doi-asserted-by":"publisher","DOI":"10.1145\/3038912.3052591"},{"key":"e_1_3_3_2_65_2","doi-asserted-by":"publisher","DOI":"10.1109\/IJCNN48605.2020.9207640"},{"key":"e_1_3_3_2_66_2","doi-asserted-by":"publisher","DOI":"10.1145\/3461564.3461574"},{"key":"e_1_3_3_2_67_2","doi-asserted-by":"crossref","unstructured":"Wenting Zou Qian Yang Dominic DiFranzo Melissa Chen Winice Hui and Natalie\u00a0N Bazarova. 2024. Social Media Co-Pilot: Designing a Chatbot with Teens and Educators to Combat Cyberbullying. International Journal of Child-Computer Interaction (2024) 100680.","DOI":"10.1016\/j.ijcci.2024.100680"},{"key":"e_1_3_3_2_68_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-60913-8_28"}],"event":{"name":"IDC '25: Interaction Design and Children","sponsor":["SIGCHI ACM Special Interest Group on Computer-Human Interaction"],"location":"Reykjavik Iceland","acronym":"IDC '25"},"container-title":["Proceedings of the 24th Interaction Design and Children"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3713043.3731485","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,29]],"date-time":"2025-07-29T15:02:46Z","timestamp":1753801366000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3713043.3731485"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,6,23]]},"references-count":67,"alternative-id":["10.1145\/3713043.3731485","10.1145\/3713043"],"URL":"https:\/\/doi.org\/10.1145\/3713043.3731485","relation":{},"subject":[],"published":{"date-parts":[[2025,6,23]]},"assertion":[{"value":"2025-06-23","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}