{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,15]],"date-time":"2025-11-15T11:03:06Z","timestamp":1763204586238,"version":"3.45.0"},"publisher-location":"New York, NY, USA","reference-count":59,"publisher":"ACM","funder":[{"DOI":"10.13039\/100008345","name":"Australian Communications Consumer Action Network","doi-asserted-by":"publisher","award":["2024020"],"award-info":[{"award-number":["2024020"]}],"id":[{"id":"10.13039\/100008345","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2025,11,29]]},"DOI":"10.1145\/3764687.3767275","type":"proceedings-article","created":{"date-parts":[[2025,11,15]],"date-time":"2025-11-15T09:15:38Z","timestamp":1763198138000},"page":"999-1006","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Advancing Interdisciplinary Approaches to Online Safety Research"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-1985-0227","authenticated-orcid":false,"given":"Senuri","family":"Wijenayake","sequence":"first","affiliation":[{"name":"School of Computing Technologies, RMIT University, Melbourne, Victoria, Australia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5425-4979","authenticated-orcid":false,"given":"Joanne","family":"Gray","sequence":"additional","affiliation":[{"name":"Faculty of Arts and Social Sciences, University of Sydney, Sydney, New South Wales, Australia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2051-030X","authenticated-orcid":false,"given":"Asangi","family":"Jayatilaka","sequence":"additional","affiliation":[{"name":"School of Computing Technologies, RMIT University, Melbourne, Victoria, Australia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6736-6977","authenticated-orcid":false,"given":"Louise","family":"La Sala","sequence":"additional","affiliation":[{"name":"Orygen, Centre for Youth Mental Health, University of Melbourne, Melbourne, Victoria, Australia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0059-0376","authenticated-orcid":false,"given":"Nalin","family":"Arachchilage","sequence":"additional","affiliation":[{"name":"School of Computing Technologies, RMIT University, Melbourne, Victoria, Australia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8773-6656","authenticated-orcid":false,"given":"Ryan M.","family":"Kelly","sequence":"additional","affiliation":[{"name":"School of Computing Technologies, RMIT University, Melbourne, Victoria, Australia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1299-7867","authenticated-orcid":false,"given":"Sanchari","family":"Das","sequence":"additional","affiliation":[{"name":"Department of Information Sciences and Technology, George Mason University, Fairfax, Virginia, USA"}]}],"member":"320","published-online":{"date-parts":[[2025,11,28]]},"reference":[{"key":"e_1_3_3_1_2_2","doi-asserted-by":"publisher","unstructured":"Dhruv Agarwal Farhana Shahid and Aditya Vashistha. 2024. Conversational Agents to Facilitate Deliberation on Harmful Content in WhatsApp Groups. Proceedings of the ACM on Human-Computer Interaction 8 CSCW2 (Nov. 2024) 1\u201332. 10.1145\/3687030Publisher: Association for Computing Machinery (ACM).","DOI":"10.1145\/3687030"},{"key":"e_1_3_3_1_3_2","doi-asserted-by":"publisher","DOI":"10.1145\/3585088.3593923"},{"key":"e_1_3_3_1_4_2","doi-asserted-by":"publisher","unstructured":"Zainab Agha Karla Badillo-Urquiola and Pamela\u00a0J. Wisniewski. 2023. \"Strike at the Root\": Co-designing Real-Time Social Media Interventions for Adolescent Online Risk Prevention. Proceedings of the ACM on Human-Computer Interaction 7 CSCW1 (April 2023) 1\u201332. 10.1145\/3579625Publisher: Association for Computing Machinery (ACM).","DOI":"10.1145\/3579625"},{"key":"e_1_3_3_1_5_2","doi-asserted-by":"publisher","DOI":"10.1145\/3613904.3642313"},{"key":"e_1_3_3_1_6_2","doi-asserted-by":"publisher","DOI":"10.1145\/3491101.3503563"},{"key":"e_1_3_3_1_7_2","doi-asserted-by":"publisher","DOI":"10.1145\/3643834.3660716"},{"key":"e_1_3_3_1_8_2","doi-asserted-by":"publisher","unstructured":"Hanan\u00a0Khalid Aljasim and Douglas Zytko. 2023. Foregrounding Women\u2019s Safety in Mobile Social Matching and Dating Apps: A Participatory Design Study. Proceedings of the ACM on Human-Computer Interaction 7 GROUP (Jan. 2023) 1\u201325. 10.1145\/3567559Publisher: Association for Computing Machinery (ACM).","DOI":"10.1145\/3567559"},{"key":"e_1_3_3_1_9_2","doi-asserted-by":"publisher","unstructured":"Rula\u00a0Odeh Alsawalqa and Maissa\u00a0N. Alrawashdeh. 2022. The role of patriarchal structure and gender stereotypes in cyber dating abuse: A qualitative examination of male perpetrators experiences. The British Journal of Sociology 73 3 (June 2022) 587\u2013606. 10.1111\/1468-4446.12946","DOI":"10.1111\/1468-4446.12946"},{"key":"e_1_3_3_1_10_2","doi-asserted-by":"publisher","unstructured":"Ashwaq Alsoubai Afsaneh Razi Zainab Agha Shiza Ali Gianluca Stringhini Munmun De\u00a0Choudhury and Pamela\u00a0J. Wisniewski. 2024. Profiling the Offline and Online Risk Experiences of Youth to Develop Targeted Interventions for Online Safety. Proc. ACM Hum.-Comput. Interact. 8 CSCW1 (April 2024) 114:1\u2013114:37. 10.1145\/3637391","DOI":"10.1145\/3637391"},{"key":"e_1_3_3_1_11_2","doi-asserted-by":"crossref","unstructured":"Nalin Asanka\u00a0Gamagedara Arachchilage and Steve Love. 2014. Security awareness of computer users: A phishing threat avoidance perspective. Computers in human behavior 38 (2014) 304\u2013312. https:\/\/www.sciencedirect.com\/science\/article\/pii\/S0747563214003331 Publisher: Elsevier.","DOI":"10.1016\/j.chb.2014.05.046"},{"key":"e_1_3_3_1_12_2","doi-asserted-by":"publisher","DOI":"10.1145\/3544548.3581101"},{"key":"e_1_3_3_1_13_2","doi-asserted-by":"publisher","DOI":"10.1145\/3411764.3445157"},{"key":"e_1_3_3_1_14_2","doi-asserted-by":"crossref","unstructured":"Nathan Beu Asangi Jayatilaka Manssoreh Zahedi Muhammad\u00a0Ali Babar Laura Hartley Winston Lewinsmith and Irina Baetu. 2023. Falling for phishing attempts: An investigation of individual differences that are associated with behavior in a naturalistic phishing simulation. Computers & Security 131 (2023) 103313. https:\/\/www.sciencedirect.com\/science\/article\/pii\/S0167404823002237 Publisher: Elsevier.","DOI":"10.1016\/j.cose.2023.103313"},{"key":"e_1_3_3_1_15_2","unstructured":"Youjin Choe Senuri Wijenayake Martin Tomko and Mohsen Kalantari. 2024. Mapping in harmony: Co-designing user interfaces for conflict management on OSM. International Journal of Human-Computer Studies 190 (2024) 103316. https:\/\/www.sciencedirect.com\/science\/article\/pii\/S1071581924001009?casa_token=0eVq2KoQyKkAAAAA:lWmcNuJq15KFqfTtba6hl_KRsk_TmRBqBhurTIV4OX22l8tqgEd0BR5Pvv43FopNwaoESyRbnYE Publisher: Elsevier."},{"key":"e_1_3_3_1_16_2","doi-asserted-by":"publisher","unstructured":"Isha Datey and Douglas Zytko. 2024. \"Just Like Risking Your Life Here\": Participatory Design of User Interactions with Risk Detection AI to Prevent Online-to-Offline Harm Through Dating Apps. Proceedings of the ACM on Human-Computer Interaction 8 CSCW2 (Nov. 2024) 1\u201341. 10.1145\/3686906Publisher: Association for Computing Machinery (ACM).","DOI":"10.1145\/3686906"},{"key":"e_1_3_3_1_17_2","unstructured":"eSafety Commissioner. 2022. Australians\u2019 negative online experiences 2022. https:\/\/www.esafety.gov.au\/research\/australians-negative-online-experiences-2022"},{"key":"e_1_3_3_1_18_2","unstructured":"eSafety Commissioner. 2025. Encounters with online hate. https:\/\/www.esafety.gov.au\/research\/encounters-with-online-hate"},{"key":"e_1_3_3_1_19_2","doi-asserted-by":"publisher","unstructured":"Diane Felmlee Paulina Inara\u00a0Rodis and Amy Zhang. 2020. Sexist Slurs: Reinforcing Feminine Stereotypes Online. Sex Roles 83 1-2 (July 2020) 16\u201328. 10.1007\/s11199-019-01095-z","DOI":"10.1007\/s11199-019-01095-z"},{"key":"e_1_3_3_1_20_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-83647-33"},{"key":"e_1_3_3_1_21_2","doi-asserted-by":"crossref","unstructured":"Asher Flynn Anastasia Powell and Sophie Hindes. 2024. An intersectional analysis of technology-facilitated abuse: Prevalence experiences and impacts of victimization. The British Journal of Criminology 64 3 (2024) 600\u2013619. https:\/\/academic.oup.com\/bjc\/article-abstract\/64\/3\/600\/7259611 Publisher: Oxford University Press UK.","DOI":"10.1093\/bjc\/azad044"},{"key":"e_1_3_3_1_22_2","doi-asserted-by":"crossref","unstructured":"Asher Flynn Anastasia Powell Adrian\u00a0J. Scott and Elena Cama. 2022. Deepfakes and digitally altered imagery abuse: A cross-country exploration of an emerging form of image-based sexual abuse. The British Journal of Criminology 62 6 (2022) 1341\u20131358. https:\/\/academic.oup.com\/bjc\/article-abstract\/62\/6\/1341\/6448791 Publisher: Oxford University Press UK.","DOI":"10.1093\/bjc\/azab111"},{"key":"e_1_3_3_1_23_2","volume-title":"Workplace technology-facilitated sexual harassment: perpetration, responses and prevention","author":"Flynn Asher","year":"2024","unstructured":"Asher Flynn, Anastasia Powell, and Lisa Wheildon. 2024. Workplace technology-facilitated sexual harassment: perpetration, responses and prevention. Australia\u2019s National Research Organisation for Women\u2019s Safety (ANROWS), Australia. https:\/\/apo.org.au\/node\/326578"},{"key":"e_1_3_3_1_24_2","doi-asserted-by":"publisher","DOI":"10.1145\/3613905.3636288"},{"key":"e_1_3_3_1_25_2","doi-asserted-by":"publisher","DOI":"10.1145\/3688828.3700747"},{"key":"e_1_3_3_1_26_2","doi-asserted-by":"publisher","DOI":"10.1145\/3491102.3517517"},{"key":"e_1_3_3_1_27_2","doi-asserted-by":"publisher","unstructured":"Catherine Han Anne Li Deepak Kumar and Zakir Durumeric. 2024. PressProtect: Helping Journalists Navigate Social Media in the Face of Online Harassment. Proceedings of the ACM on Human-Computer Interaction 8 CSCW2 (Nov. 2024) 1\u201334. 10.1145\/3687048Publisher: Association for Computing Machinery (ACM).","DOI":"10.1145\/3687048"},{"key":"e_1_3_3_1_28_2","doi-asserted-by":"publisher","DOI":"10.1145\/3411764.3445258"},{"key":"e_1_3_3_1_29_2","doi-asserted-by":"publisher","DOI":"10.1145\/3715275.3732107"},{"key":"e_1_3_3_1_30_2","doi-asserted-by":"publisher","DOI":"10.1108\/978-1-83982-848-520211054"},{"key":"e_1_3_3_1_31_2","doi-asserted-by":"publisher","DOI":"10.1145\/3584931.3606967"},{"key":"e_1_3_3_1_32_2","doi-asserted-by":"publisher","DOI":"10.1145\/3701716.3716878"},{"key":"e_1_3_3_1_33_2","doi-asserted-by":"publisher","unstructured":"Song\u00a0Mi Lee Andrea\u00a0K. Thomer and Cliff Lampe. 2022. The Use of Negative Interface Cues to Change Perceptions of Online Retributive Harassment. Proceedings of the ACM on Human-Computer Interaction 6 CSCW2 (Nov. 2022) 1\u201323. 10.1145\/3555226Publisher: Association for Computing Machinery (ACM).","DOI":"10.1145\/3555226"},{"key":"e_1_3_3_1_34_2","doi-asserted-by":"publisher","DOI":"10.1145\/3411764.3445248"},{"key":"e_1_3_3_1_35_2","doi-asserted-by":"publisher","unstructured":"Lisa\u00a0Mekioussa Malki Dilisha Patel and Aneesha Singh. 2024. \"The Headline Was So Wild That I Had To Check\": An Exploration of Women\u2019s Encounters With Health Misinformation on Social Media. Proceedings of the ACM on Human-Computer Interaction 8 CSCW1 (April 2024) 1\u201326. 10.1145\/3637405Publisher: Association for Computing Machinery (ACM).","DOI":"10.1145\/3637405"},{"key":"e_1_3_3_1_36_2","doi-asserted-by":"publisher","unstructured":"Tara Matthews Elie Bursztein Patrick\u00a0Gage Kelley Lea Kissner Andreas Kramm Andrew Oplinger Andreas Schou Manya Sleeper Stephan Somogyi Dalila Szostak Kurt Thomas Anna Turner Jill\u00a0Palzkill Woelfer Lawrence\u00a0L. You Izzie Zahorian and Sunny Consolvo. 2025. Supporting the Digital Safety of At-Risk Users: Lessons Learned from 9+ Years of Research and Training. ACM Trans. Comput.-Hum. Interact. 32 3 (June 2025) 22:1\u201322:39. 10.1145\/3716382","DOI":"10.1145\/3716382"},{"key":"e_1_3_3_1_37_2","doi-asserted-by":"publisher","DOI":"10.1145\/3706598.3713662"},{"key":"e_1_3_3_1_38_2","doi-asserted-by":"publisher","unstructured":"Oluwatomisin Obajemu Zainab Agha Farzana\u00a0A. Chowdhury and Pamela\u00a0J. Wisniewski. 2024. Towards Enforcing Good Digital Citizenship: Identifying Opportunities for Adolescent Online Safety Nudges. Proc. ACM Hum.-Comput. Interact. 8 CSCW1 (April 2024) 136:1\u2013136:37. 10.1145\/3637413","DOI":"10.1145\/3637413"},{"key":"e_1_3_3_1_39_2","doi-asserted-by":"crossref","unstructured":"Wei Peng Hee\u00a0Rin Lee and Sue Lim. 2024. Leveraging chatbots to combat health misinformation for older adults: Participatory design study. JMIR Formative Research 8 1 (2024) e60712. https:\/\/formative.jmir.org\/2024\/1\/e60712\/ Publisher: JMIR Publications Inc. Toronto Canada.","DOI":"10.2196\/60712"},{"key":"e_1_3_3_1_40_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-80286-71"},{"key":"e_1_3_3_1_41_2","doi-asserted-by":"publisher","unstructured":"Kaike Ping James Hawdon and Eugenia\u00a0H Rho. 2025. Perceiving and Countering Hate: The Role of Identity in Online Responses. Proceedings of the ACM on Human-Computer Interaction 9 2 (May 2025) 1\u201328. 10.1145\/3711045Publisher: Association for Computing Machinery (ACM).","DOI":"10.1145\/3711045"},{"key":"e_1_3_3_1_42_2","doi-asserted-by":"publisher","unstructured":"Li Qiwei Allison McDonald Oliver\u00a0L. Haimson Sarita Schoenebeck and Eric Gilbert. 2024. The Sociotechnical Stack: Opportunities for Social Computing Research in Non-Consensual Intimate Media. Proceedings of the ACM on Human-Computer Interaction 8 CSCW2 (Nov. 2024) 1\u201321. 10.1145\/3686914Publisher: Association for Computing Machinery (ACM).","DOI":"10.1145\/3686914"},{"key":"e_1_3_3_1_43_2","doi-asserted-by":"publisher","DOI":"10.1145\/3584931.3611277"},{"key":"e_1_3_3_1_44_2","doi-asserted-by":"publisher","unstructured":"Lubna Razaq Tallal Ahmad Samia Ibtasam Umer Ramzan and Shrirang Mare. 2021. \"We Even Borrowed Money From Our Neighbor\": Understanding Mobile-based Frauds Through Victims\u2019 Experiences. Proceedings of the ACM on Human-Computer Interaction 5 CSCW1 (April 2021) 1\u201330. 10.1145\/3449115Publisher: Association for Computing Machinery (ACM).","DOI":"10.1145\/3449115"},{"key":"e_1_3_3_1_45_2","doi-asserted-by":"publisher","unstructured":"Christian Reuter Amanda Lee\u00a0Hughes and Cody Buntain. 2024. Combating information warfare: state and trends in user-centred countermeasures against fake news and misinformation. Behaviour & Information Technology 44 13 (Dec. 2024) 1\u201314. 10.1080\/0144929x.2024.2442486Publisher: Informa UK Limited.","DOI":"10.1080\/0144929x.2024.2442486"},{"key":"e_1_3_3_1_46_2","doi-asserted-by":"publisher","DOI":"10.1145\/3706599.3706702"},{"key":"e_1_3_3_1_47_2","doi-asserted-by":"publisher","unstructured":"Louise\u00a0La Sala Amanda Sabo Maria Michail Pinar Thorn Michelle Lamblin Vivienne Browne and Jo Robinson. 2025. Online Safety When Considering Self-Harm and Suicide-Related Content: Qualitative Focus Group Study With Young People Policy Makers and Social Media Industry Professionals. Journal of Medical Internet Research 27 1 (March 2025) e66321. 10.2196\/66321","DOI":"10.2196\/66321"},{"key":"e_1_3_3_1_48_2","doi-asserted-by":"crossref","unstructured":"Orvila Sarker Asangi Jayatilaka Sherif Haggag Chelsea Liu and M.\u00a0Ali Babar. 2024. A Multi-vocal Literature Review on challenges and critical success factors of phishing education training and awareness. Journal of Systems and Software 208 (2024) 111899. https:\/\/www.sciencedirect.com\/science\/article\/pii\/S0164121223002947 Publisher: Elsevier.","DOI":"10.1016\/j.jss.2023.111899"},{"key":"e_1_3_3_1_49_2","doi-asserted-by":"publisher","unstructured":"Kelsea Schulenberg Guo Freeman Lingyuan Li and Catherine Barwulor. 2023. \"Creepy Towards My Avatar Body Creepy Towards My Body\": How Women Experience and Manage Harassment Risks in Social Virtual Reality. Proceedings of the ACM on Human-Computer Interaction 7 CSCW2 (Sept. 2023) 1\u201329. 10.1145\/3610027","DOI":"10.1145\/3610027"},{"key":"e_1_3_3_1_50_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-94-024-2282-59"},{"key":"e_1_3_3_1_51_2","doi-asserted-by":"publisher","unstructured":"Markus Trengove Emre Kazim Denise Almeida Airlie Hilliard Sara Zannone and Elizabeth Lomas. 2022. A critical review of the Online Safety Bill. Patterns 3 8 (Aug. 2022). 10.1016\/j.patter.2022.100544Publisher: Elsevier.","DOI":"10.1016\/j.patter.2022.100544"},{"key":"e_1_3_3_1_52_2","doi-asserted-by":"publisher","DOI":"10.1145\/3613904.3642382"},{"key":"e_1_3_3_1_53_2","unstructured":"Emily\u00a0A. Vogels. 2021. The State of Online Harassment. https:\/\/www.pewresearch.org\/internet\/2021\/01\/13\/the-state-of-online-harassment\/"},{"key":"e_1_3_3_1_54_2","doi-asserted-by":"publisher","DOI":"10.1145\/3678884.3681824"},{"key":"e_1_3_3_1_55_2","doi-asserted-by":"publisher","unstructured":"Senuri Wijenayake Danula Hettiachchi Simo Hosio Vassilis Kostakos and Jorge Goncalves. 2020. Effect of conformity on perceived trustworthiness of news in social media. IEEE Internet Computing 25 1 (2020) 12\u201319. 10.1109\/MIC.2020.3032410Publisher: IEEE.","DOI":"10.1109\/MIC.2020.3032410"},{"key":"e_1_3_3_1_56_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-85610-626"},{"key":"e_1_3_3_1_57_2","doi-asserted-by":"publisher","unstructured":"Senuri Wijenayake Niels Van\u00a0Berkel Vassilis Kostakos and Jorge Goncalves. 2019. Measuring the Effects of Gender on Online Social Conformity. Proceedings of the ACM on Human-Computer Interaction 3 CSCW (Nov. 2019) 1\u201324. 10.1145\/3359247","DOI":"10.1145\/3359247"},{"key":"e_1_3_3_1_58_2","doi-asserted-by":"crossref","unstructured":"Michelle\u00a0F. Wright and Sebastian Wachs. 2020. Adolescents\u2019 cyber victimization: The influence of technologies gender and gender stereotype traits. International journal of environmental research and public health 17 4 (2020) 1293. https:\/\/www.mdpi.com\/1660-4601\/17\/4\/1293 Publisher: MDPI.","DOI":"10.3390\/ijerph17041293"},{"key":"e_1_3_3_1_59_2","doi-asserted-by":"publisher","DOI":"10.1145\/3706598.3714423"},{"key":"e_1_3_3_1_60_2","doi-asserted-by":"publisher","DOI":"10.1145\/3544548.3581318"}],"event":{"name":"OZCHI '25: 37th Australian Conference on Human-Computer Interaction","acronym":"OZCHI '25","location":"Gadigal | Sydney Australia"},"container-title":["Proceedings of the 37th Australian Conference on Human-Computer Interaction"],"original-title":[],"deposited":{"date-parts":[[2025,11,15]],"date-time":"2025-11-15T11:00:22Z","timestamp":1763204422000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3764687.3767275"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,11,28]]},"references-count":59,"alternative-id":["10.1145\/3764687.3767275","10.1145\/3764687"],"URL":"https:\/\/doi.org\/10.1145\/3764687.3767275","relation":{},"subject":[],"published":{"date-parts":[[2025,11,28]]},"assertion":[{"value":"2025-11-28","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}