{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,6]],"date-time":"2026-03-06T23:11:52Z","timestamp":1772838712730,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":21,"publisher":"ACM","license":[{"start":{"date-parts":[[2025,10,17]],"date-time":"2025-10-17T00:00:00Z","timestamp":1760659200000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"William T Grant","award":["187941"],"award-info":[{"award-number":["187941"]}]},{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["IIS-2333207"],"award-info":[{"award-number":["IIS-2333207"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2025,10,18]]},"DOI":"10.1145\/3715070.3757229","type":"proceedings-article","created":{"date-parts":[[2025,10,17]],"date-time":"2025-10-17T05:55:41Z","timestamp":1760680541000},"page":"528-531","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["SocialSim: An Open Source Platform for Conducting Behavioral Intervention Research on Social Media"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-6519-3742","authenticated-orcid":false,"given":"Zainab","family":"Agha","sequence":"first","affiliation":[{"name":"San Francisco State University, San Francisco, USA"}]},{"ORCID":"https:\/\/orcid.org\/0009-0000-9335-0170","authenticated-orcid":false,"given":"Matthew","family":"Martinez","sequence":"additional","affiliation":[{"name":"San Francisco State University, San Francisco, USA"}]},{"ORCID":"https:\/\/orcid.org\/0009-0006-4446-9689","authenticated-orcid":false,"given":"Naima Samreen","family":"Ali","sequence":"additional","affiliation":[{"name":"University of Michigan, Ann Arbor, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6039-1806","authenticated-orcid":false,"given":"Dominic","family":"DiFranzo","sequence":"additional","affiliation":[{"name":"Lehigh University, Bethlehem, Pennsylvania, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6223-1029","authenticated-orcid":false,"given":"Pamela J.","family":"Wisniewski","sequence":"additional","affiliation":[{"name":"Socio-Technical Interaction Research Lab, Orlando, Florida, USA"}]}],"member":"320","published-online":{"date-parts":[[2025,10,17]]},"reference":[{"key":"e_1_3_3_2_2_2","unstructured":"2023. https:\/\/socialmediasimulator.com\/"},{"key":"e_1_3_3_2_3_2","doi-asserted-by":"crossref","unstructured":"Zainab Agha Naima\u00a0Samreen Ali Jinkyung Park and Pamela\u00a0J Wisniewski. 2024. A systematic review on design-based nudges for adolescent online safety. International Journal of Child-Computer Interaction (2024) 100702.","DOI":"10.1016\/j.ijcci.2024.100702"},{"key":"e_1_3_3_2_4_2","doi-asserted-by":"crossref","unstructured":"Zainab Agha Karla Badillo-Urquiola and Pamela\u00a0J Wisniewski. 2023. \" Strike at the Root\": Co-designing Real-Time Social Media Interventions for Adolescent Online Risk Prevention. Proceedings of the ACM on Human-Computer Interaction 7 CSCW1 (2023) 1\u201332.","DOI":"10.1145\/3579625"},{"key":"e_1_3_3_2_5_2","doi-asserted-by":"publisher","DOI":"10.1145\/3584931.3606964"},{"key":"e_1_3_3_2_6_2","doi-asserted-by":"publisher","DOI":"10.1145\/3613904.3642313"},{"key":"e_1_3_3_2_7_2","doi-asserted-by":"crossref","unstructured":"Zhila Aghajari Eric\u00a0PS Baumer Jess Hohenstein Malte\u00a0F Jung and Dominic DiFranzo. 2023. Methodological Middle Spaces: Addressing the Need for Methodological Innovation to Achieve Simultaneous Realism Control and Scalability in Experimental Studies of AI-Mediated Communication. Proceedings of the ACM on Human-Computer Interaction 7 CSCW1 (2023) 1\u201328.","DOI":"10.1145\/3579506"},{"key":"e_1_3_3_2_8_2","unstructured":"Erinn Atwater Cecylia Bocovich Urs Hengartner and Ian Goldberg. [n. d.]. Netsim: Network simulation and hacking for high schoolers. ([n. d.])."},{"key":"e_1_3_3_2_9_2","doi-asserted-by":"publisher","DOI":"10.1145\/2037296.2037328"},{"key":"e_1_3_3_2_10_2","doi-asserted-by":"crossref","unstructured":"Ann DeSmet Katrien Van\u00a0Cleemput Sara Bastiaensens Karolien Poels Heidi Vandebosch Steven Malliet Ma\u00eft\u00e9 Verloigne Griet Vanwolleghem Lieze Mertens Greet Cardon et\u00a0al. 2016. Bridging behavior science and gaming theory: Using the Intervention Mapping Protocol to design a serious game against cyberbullying. Computers in Human behavior 56 (2016) 337\u2013351.","DOI":"10.1016\/j.chb.2015.11.039"},{"key":"e_1_3_3_2_11_2","doi-asserted-by":"publisher","DOI":"10.1145\/3290605.3300533"},{"key":"e_1_3_3_2_12_2","doi-asserted-by":"publisher","DOI":"10.1145\/3173574.3173785"},{"key":"e_1_3_3_2_13_2","doi-asserted-by":"crossref","unstructured":"Karthik Dinakar Birago Jones Catherine Havasi Henry Lieberman and Rosalind Picard. 2012. Common sense reasoning for detection prevention and mitigation of cyberbullying. ACM Transactions on Interactive Intelligent Systems (TiiS) 2 3 (2012) 1\u201330.","DOI":"10.1145\/2362394.2362400"},{"key":"e_1_3_3_2_14_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-53862-9_55"},{"key":"e_1_3_3_2_15_2","doi-asserted-by":"crossref","unstructured":"Ponnurangam Kumaraguru Steve Sheng Alessandro Acquisti Lorrie\u00a0Faith Cranor and Jason Hong. 2010. Teaching Johnny not to fall for phish. ACM Transactions on Internet Technology (TOIT) 10 2 (2010) 1\u201331.","DOI":"10.1145\/1754393.1754396"},{"key":"e_1_3_3_2_16_2","doi-asserted-by":"publisher","DOI":"10.1145\/1979742.1979621"},{"key":"e_1_3_3_2_17_2","doi-asserted-by":"publisher","DOI":"10.1145\/3313831.3376666"},{"key":"e_1_3_3_2_18_2","doi-asserted-by":"crossref","unstructured":"Hendrik M\u00fcller Aaron Sedley and Elizabeth Ferrall-Nunge. 2014. Survey research in HCI. Ways of Knowing in HCI (2014) 229\u2013266.","DOI":"10.1007\/978-1-4939-0378-8_10"},{"key":"e_1_3_3_2_19_2","doi-asserted-by":"crossref","unstructured":"Eyal Peer Serge Egelman Marian Harbach Nathan Malkin Arunesh Mathur and Alisa Frik. 2020. Nudge me right: Personalizing online security nudges to people\u2019s decision-making styles. Computers in Human Behavior 109 (2020) 106347.","DOI":"10.1016\/j.chb.2020.106347"},{"key":"e_1_3_3_2_20_2","doi-asserted-by":"publisher","DOI":"10.1145\/3078072.3079722"},{"key":"e_1_3_3_2_21_2","doi-asserted-by":"crossref","unstructured":"Afsaneh Razi Ashwaq AlSoubai Seunghyun Kim Shiza Ali Gianluca Stringhini Munmun De\u00a0Choudhury and Pamela\u00a0J Wisniewski. 2023. Sliding into My DMs: Detecting Uncomfortable or Unsafe Sexual Risk Experiences within Instagram Direct Messages Grounded in the Perspective of Youth. Proceedings of the ACM on Human-Computer Interaction 7 CSCW1 (2023) 1\u201329.","DOI":"10.1145\/3579522"},{"key":"e_1_3_3_2_22_2","doi-asserted-by":"crossref","unstructured":"Mark\u00a0A Schmuckler. 2001. What is ecological validity? A dimensional analysis. Infancy 2 4 (2001) 419\u2013436.","DOI":"10.1207\/S15327078IN0204_02"}],"event":{"name":"CSCW Companion '25: Companion of the Computer-Supported Cooperative Work and Social Computing","location":"Bergen Norway","acronym":"CSCW Companion '25","sponsor":["SIGCHI ACM Special Interest Group on Computer-Human Interaction"]},"container-title":["Companion Publication of the 2025 Conference on Computer-Supported Cooperative Work and Social Computing"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/abs\/10.1145\/3715070.3757229","content-type":"text\/html","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3715070.3757229","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3715070.3757229","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,1,9]],"date-time":"2026-01-09T17:49:18Z","timestamp":1767980958000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3715070.3757229"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,10,17]]},"references-count":21,"alternative-id":["10.1145\/3715070.3757229","10.1145\/3715070"],"URL":"https:\/\/doi.org\/10.1145\/3715070.3757229","relation":{},"subject":[],"published":{"date-parts":[[2025,10,17]]},"assertion":[{"value":"2025-10-17","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}