{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,25]],"date-time":"2025-06-25T04:09:32Z","timestamp":1750824572817,"version":"3.41.0"},"reference-count":131,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2025,4,22]],"date-time":"2025-04-22T00:00:00Z","timestamp":1745280000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0"},{"start":{"date-parts":[[2025,4,22]],"date-time":"2025-04-22T00:00:00Z","timestamp":1745280000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Sci Eng Ethics"],"DOI":"10.1007\/s11948-025-00533-4","type":"journal-article","created":{"date-parts":[[2025,4,22]],"date-time":"2025-04-22T15:09:26Z","timestamp":1745334566000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Threads and Needles: A Value-Sensitive Design Approach to Online Toxicity"],"prefix":"10.1007","volume":"31","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-9935-2994","authenticated-orcid":false,"given":"Ryan","family":"Jenkins","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,4,22]]},"reference":[{"key":"533_CR1","unstructured":"4chan. 2024. \u201cRules - 4chan.\u201d 4chan. 2024. https:\/\/www.4chan.org\/rules."},{"issue":"1","key":"533_CR2","doi-asserted-by":"publisher","first-page":"76","DOI":"10.1111\/hypa.12456","volume":"34","author":"K Adkins","year":"2019","unstructured":"Adkins, K. (2019). When shaming is shameful: Double standards in online shame backlashes. Hypatia, 34(1), 76\u201397.","journal-title":"Hypatia"},{"key":"533_CR3","doi-asserted-by":"publisher","unstructured":"Ali, S., Saeed M. H., Aldreabi, E., Blackburn, J., De Cristofaro, E., Zannettou, S., & Stringhini, G. (2021) Understanding the effect of deplatforming on social networks. In 13th ACM web science conference 2021, (pp. 187\u201395). Virtual Event United Kingdom. ACM. https:\/\/doi.org\/10.1145\/3447535.3462637.","DOI":"10.1145\/3447535.3462637"},{"key":"533_CR4","doi-asserted-by":"publisher","unstructured":"Allison, K. R. (2018). Social norms in online communities. In Extended abstracts of the 2018 CHI conference on human factors in computing systems. ACM. https:\/\/doi.org\/10.1145\/3170427.3173032.","DOI":"10.1145\/3170427.3173032"},{"key":"533_CR5","doi-asserted-by":"publisher","first-page":"106824","DOI":"10.1016\/j.infsof.2022.106824","volume":"145","author":"AR Amna","year":"2022","unstructured":"Amna, A. R., & Poels, G. (2022a). Ambiguity in user stories: A systematic literature review. Information and Software Technology, 145, 106824. https:\/\/doi.org\/10.1016\/j.infsof.2022.106824","journal-title":"Information and Software Technology"},{"key":"533_CR6","doi-asserted-by":"publisher","first-page":"51723","DOI":"10.1109\/ACCESS.2022.3173745","volume":"10","author":"AR Amna","year":"2022","unstructured":"Amna, A. R., & Poels, G. (2022b). Systematic literature mapping of user story research. IEEE Access, 10, 51723\u201351746.","journal-title":"IEEE Access"},{"issue":"3","key":"533_CR8","doi-asserted-by":"publisher","first-page":"373","DOI":"10.1111\/jcc4.12009","volume":"19","author":"AA Anderson","year":"2014","unstructured":"Anderson, A. A., Brossard, D., Scheufele, D. A., Xenos, M. A., & Ladwig, P. (2014). The \u2018Nasty Effect:\u2019 Online incivility and risk perceptions of emerging technologies: Crude comments and concern. Journal of Computer-Mediated Communication, 19(3), 373\u2013387. https:\/\/doi.org\/10.1111\/jcc4.12009","journal-title":"Journal of Computer-Mediated Communication"},{"issue":"11","key":"533_CR9","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0164286","volume":"11","author":"A Antoci","year":"2016","unstructured":"Antoci, A., Delfino, A., Paglieri, F., Panebianco, F., & Sabatini, F. (2016). Civility versus incivility in online social interactions: An evolutionary approach. PLoS ONE, 11(11), e0164286. https:\/\/doi.org\/10.1371\/journal.pone.0164286","journal-title":"PLoS ONE"},{"key":"533_CR122","unstructured":"Association for Computing Machinery. (2018). ACM code of ethics and professional conduct. Association for Computing Machinery. https:\/\/www.acm.org\/code-of-ethics"},{"key":"533_CR121","unstructured":"Apodaca, T., & Uzc\u00e1tegui-Liggett, N. (2024). How automated content moderation works (even when it doesn\u2019t). The Markup. https:\/\/themarkup.org\/automated-censorship\/2024\/03\/01\/how-automated-contentmoderation-works-even-when-it-doesnt-work"},{"key":"533_CR10","unstructured":"Argyle, L. P., Busby, E. Ronald, Gubler, J., Bail, C., Howe, T., Rytting, C. M., & Wingate, D. (2023). AI chat assistants can improve conversations about divisive topics. ArXiv abs\/2302.07268."},{"key":"533_CR11","unstructured":"Aristotle. (2021). Nicomachean ethics. W. D. Ross (Transl.). Nicomachean ethics (Ross)\/Book Two - Wikisource, the Free Online Library. Accessed September 30, 2024. https:\/\/en.wikisource.org\/wiki\/Nicomachean_Ethics_(Ross)\/Book_Two. Accessed 30 September 2024."},{"issue":"8008","key":"533_CR123","doi-asserted-by":"publisher","first-page":"582","DOI":"10.1038\/s41586-024-07229-y","volume":"628","author":"M Avalle","year":"2024","unstructured":"Avalle, M., Di Marco, N., Etta, G., Sangiorgio, E., Alipour, S., Bonetti, A., Alvisi, L., Scala, A., Baronchelli, A., Cinelli, M., & Quattrociocchi, W. (2024). Persistent interaction patterns across social media platforms and over time. Nature, 628(8008), 582\u2013589. https:\/\/doi.org\/10.1038\/s41586-024-07229-y","journal-title":"Nature"},{"key":"533_CR126","unstructured":"Buchanan, A. (1978). Autonomy and categories of expression: a reply to professor scanlon. Principles of expression and restriction: a first amendment symposium. University of Pittsburgh Law Review, 40(4), 551\u2013560"},{"issue":"2","key":"533_CR124","first-page":"251","volume":"27","author":"CE Baker","year":"2010","unstructured":"Baker, C. E. (2010). Autonomy and free speech symposium: Individual autonomy and free speech. Constitutional\nCommentary, 27(2), 251\u2013282.","journal-title":"Constitutional Commentary"},{"issue":"2","key":"533_CR12","doi-asserted-by":"publisher","first-page":"70","DOI":"10.1037\/a0034335","volume":"4","author":"CP Barlett","year":"2015","unstructured":"Barlett, C. P. (2015). Anonymously hurting others online: The effect of anonymity on cyberbullying frequency. Psychology of Popular Media Culture, 4(2), 70\u201379. https:\/\/doi.org\/10.1037\/a0034335","journal-title":"Psychology of Popular Media Culture"},{"key":"533_CR13","unstructured":"Basu, T. (2021). The metaverse has a groping problem already. https:\/\/www.technologyreview.com\/2021\/12\/16\/1042516\/the-metaverse-has-a-groping-problem\/."},{"key":"533_CR14","doi-asserted-by":"publisher","unstructured":"Baym, N., Shifman, L., Persaud, C., & Wagman, K. (2019). Intelligent failures: Clippy memes and the limits of digital assistants. AoIR selected papers of internet research 2019 (October). https:\/\/doi.org\/10.5210\/spir.v2019i0.10923.","DOI":"10.5210\/spir.v2019i0.10923"},{"key":"533_CR15","doi-asserted-by":"publisher","unstructured":"Bergstrom, K. (2011). \"Don\u2019t Feed the Troll\": Shutting down debate about community expectations on Reddit.Com. First Monday, July. https:\/\/doi.org\/10.5210\/fm.v16i8.3498.","DOI":"10.5210\/fm.v16i8.3498"},{"key":"533_CR16","doi-asserted-by":"publisher","unstructured":"Blackwell, L., Dimond, J., Schoenebeck, S., & Lampe, C. (2017). Classification and its consequences for online harassment: Design insights from HeartMob. Proceedings of the ACM on human-computer interaction 1 (CSCW), 1\u201319. https:\/\/doi.org\/10.1145\/3134659.","DOI":"10.1145\/3134659"},{"key":"533_CR17","doi-asserted-by":"publisher","unstructured":"Brown, N. (2021). Regulatory Goldilocks: Finding the just and right fit for content moderation on social platforms. Texas A&M Law Review 8(3), 451\u2013494. https:\/\/doi.org\/10.37419\/LR.V8.I3.1.","DOI":"10.37419\/LR.V8.I3.1"},{"issue":"CSCW1","key":"533_CR18","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3449085","volume":"5","author":"C Buntain","year":"2021","unstructured":"Buntain, C., Bonneau, R., Nagler, J., & Tucker, J. A. (2021). YouTube recommendations and effects on sharing across online social platforms. Proceedings of the ACM on Human-Computer Interaction, 5(CSCW1), 1\u201326. https:\/\/doi.org\/10.1145\/3449085","journal-title":"Proceedings of the ACM on Human-Computer Interaction"},{"issue":"2","key":"533_CR19","doi-asserted-by":"publisher","first-page":"127","DOI":"10.1111\/j.1467-9760.2004.00194.x","volume":"12","author":"C Calhoun","year":"2004","unstructured":"Calhoun, C. (2004). An apology for moral shame. Journal of Political Philosophy, 12(2), 127\u2013146. https:\/\/doi.org\/10.1111\/j.1467-9760.2004.00194.x","journal-title":"Journal of Political Philosophy"},{"key":"533_CR20","unstructured":"Campbell, D. R. (2023) Cancel culture, then and now: A platonic approach to the shaming of people and the exclusion of ideas. Journal of Cyberspace Studies, 7(2), 147-166."},{"key":"533_CR21","doi-asserted-by":"publisher","unstructured":"Cheriyan, J., Savarimuthu, B. T. R., & Cranefield, S. (2021). Norm violation in online communities \u2013 a study of stack overflow comments. In Coordination, organizations, institutions, norms, and ethics for governance of multi-agent systems XIII, (pp. 20\u201334). Springer. https:\/\/doi.org\/10.1007\/978-3-030-72376-7_2.","DOI":"10.1007\/978-3-030-72376-7_2"},{"key":"533_CR22","doi-asserted-by":"publisher","DOI":"10.1184\/R1\/6472058.V1","author":"D Cho","year":"2013","unstructured":"Cho, D., & Acquisti, A. (2013). The more social cues, the less trolling? An empirical study of online commenting behavior. Carnegie Mellon University. https:\/\/doi.org\/10.1184\/R1\/6472058.V1","journal-title":"Carnegie Mellon University"},{"issue":"6","key":"533_CR24","doi-asserted-by":"publisher","first-page":"3038","DOI":"10.1016\/j.chb.2006.09.001","volume":"23","author":"KM Christopherson","year":"2007","unstructured":"Christopherson, K. M. (2007). The positive and negative implications of anonymity in internet social interactions: \u2018On the Internet, Nobody Knows You\u2019re a Dog.\u2019 Computers in Human Behavior, 23(6), 3038\u20133056. https:\/\/doi.org\/10.1016\/j.chb.2006.09.001","journal-title":"Computers in Human Behavior"},{"key":"533_CR127","doi-asserted-by":"publisher","unstructured":"Chandrasekharan, E., Pavalanathan, U., Srinivasan, A., Glynn, A., Eisenstein, J., & Gilbert, E. (2017). You can\u2019t stay here: the efficacy of Reddit\u2019s 2015 ban examined through hate speech. Proceedings of the ACM on Human- Computer Interaction, 1(CSCW), pp. 1\u201322. https:\/\/doi.org\/10.1145\/3134666","DOI":"10.1145\/3134666"},{"issue":"4","key":"533_CR26","doi-asserted-by":"publisher","first-page":"658","DOI":"10.1111\/jcom.12104","volume":"64","author":"K Coe","year":"2014","unstructured":"Coe, K., Kenski, K., & Rains, S. A. (2014). Online and uncivil? Patterns and determinants of incivility in newspaper website comments. Journal of Communication, 64(4), 658\u2013679. https:\/\/doi.org\/10.1111\/jcom.12104","journal-title":"Journal of Communication"},{"key":"533_CR200","unstructured":"Coleman, J. (2023). AI\u2019s Climate Impact Goes beyond Its Emissions. Scientific American.https:\/\/www.scientificamerican.com\/article\/ais-climate-impact-goes-beyond-its-emissions\/"},{"key":"533_CR27","unstructured":"Cohn, Mike. (2004). User stories applied: For agile software development. Addison-Wesley Professional."},{"key":"533_CR28","unstructured":"Conger, K., & Davey, A. (2020, May 27). Twitter comes under attack from Trump\u2019s supporters. The New York Times, sec. Technology. https:\/\/www.nytimes.com\/2020\/05\/27\/technology\/trump-twitter.html."},{"key":"533_CR29","doi-asserted-by":"publisher","unstructured":"Courchesne, L., Ilhardt, J., & Shapiro, J. N. (2021). Review of social science research on the impact of countermeasures against influence operations. Harvard Kennedy School Misinformation Review, September. https:\/\/doi.org\/10.37016\/mr-2020-79.","DOI":"10.37016\/mr-2020-79"},{"issue":"1","key":"533_CR30","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1521\/jscp.22.1.1.22765","volume":"22","author":"MV Covert","year":"2003","unstructured":"Covert, M. V., Tangney, J. P., Maddux, J. E., & Heleno, N. M. (2003). Shame-proneness, guilt-proneness, and interpersonal problem solving: A social cognitive analysis. Journal of Social and Clinical Psychology, 22(1), 1\u201312. https:\/\/doi.org\/10.1521\/jscp.22.1.1.22765","journal-title":"Journal of Social and Clinical Psychology"},{"issue":"4","key":"533_CR31","doi-asserted-by":"publisher","first-page":"701","DOI":"10.1007\/s11948-006-0065-0","volume":"12","author":"ML Cummings","year":"2006","unstructured":"Cummings, M. L. (2006). Integrating ethics in design through the value-sensitive design approach. Science and Engineering Ethics, 12(4), 701\u2013715. https:\/\/doi.org\/10.1007\/s11948-006-0065-0","journal-title":"Science and Engineering Ethics"},{"key":"533_CR32","doi-asserted-by":"crossref","unstructured":"Davis, J., & Nathan, L P. (2015). Value sensitive design: Applications, adaptations, and critiques. In Handbook of ethics, values, and technological design: Sources, theory, values and application domains, (pp. 11\u201340).","DOI":"10.1007\/978-94-007-6970-0_3"},{"issue":"7","key":"533_CR33","doi-asserted-by":"publisher","first-page":"1160","DOI":"10.1037\/0022-3514.37.7.1160","volume":"37","author":"E Diener","year":"1979","unstructured":"Diener, E. (1979). Deindividuation, self-awareness, and disinhibition. Journal of Personality and Social Psychology, 37(7), 1160\u20131171. https:\/\/doi.org\/10.1037\/0022-3514.37.7.1160","journal-title":"Journal of Personality and Social Psychology"},{"key":"533_CR34","doi-asserted-by":"crossref","unstructured":"Doorn, N., & Hansson, S. O. (2015) Design for the value of safety. In Van den Hoven, J., Vermaas, P., van de Poel, I., (Eds.) Handbook of ethics, values and technological design (pp. 491\u2013511).","DOI":"10.1007\/978-94-007-6970-0_19"},{"key":"533_CR35","doi-asserted-by":"publisher","DOI":"10.4324\/9780203887936","volume-title":"On the Internet","author":"HL Dreyfus","year":"2008","unstructured":"Dreyfus, H. L. (2008). On the internet. Routledge."},{"key":"533_CR36","unstructured":"Dwoskin, E., & Timberg, C. (2021, January 16). Misinformation dropped dramatically the week after Twitter banned Trump and some allies. Washington Post. https:\/\/www.washingtonpost.com\/technology\/2021\/01\/16\/misinformation-trump-twitter\/."},{"key":"533_CR128","unstructured":"Foucault, M. (1995). Discipline and punish: the birth of the prison In A. Sheridan (ED.), Trans Second Vintage Books edition. Vintage Books, a division of Random House, Inc"},{"key":"533_CR37","doi-asserted-by":"publisher","DOI":"10.7551\/mitpress\/7585.001.0001","volume-title":"Value sensitive design: shaping technology with moral imagination","author":"B Friedman","year":"2019","unstructured":"Friedman, B., & Hendry, D. (2019). Value sensitive design: Shaping technology with moral imagination. The MIT Press."},{"key":"533_CR38","first-page":"348","volume-title":"Human-computer interaction in management information systems: Foundations, chapter value sensitive design and information systems","author":"B Friedman","year":"2006","unstructured":"Friedman, B., Kahn, P., & Borning, A. (2006). Human-computer interaction in management information systems: Foundations, chapter value sensitive design and information systems (pp. 348\u2013372). Armonk."},{"key":"533_CR39","doi-asserted-by":"publisher","unstructured":"Friedman, B., Hendry, D. G. & Borning, A. (2017). A survey of value sensitive design methods. Foundations and Trends\u00ae in Human\u2013Computer Interaction 11(2), 63\u2013125. https:\/\/doi.org\/10.1561\/1100000015.","DOI":"10.1561\/1100000015"},{"issue":"1","key":"533_CR129","doi-asserted-by":"publisher","first-page":"195","DOI":"10.17645\/mac.v9i1.3360","volume":"9","author":"L Frischlich","year":"2021","unstructured":"Frischlich, L., Schatto-Eckrodt, T., Boberg, S., & Wintterlin, F. (2021). Roots of incivility: how personality, media use, and online experiences shape uncivil participation. Media and Communication, 9(1), 195\u2013208. https:\/\/doi.org\/10.17645\/mac.v9i1.3360","journal-title":"Media and Communication"},{"key":"533_CR201","unstructured":"Gallucci, M. (2016). Elon Musk unveils new safety upgrades to Tesla\u2019s Autopilot system. Mashable. https:\/\/mashable.com\/article\/elon-musk-tesla-motors-autopilot-upgrades"},{"issue":"2","key":"533_CR40","doi-asserted-by":"publisher","first-page":"26","DOI":"10.1007\/s10676-023-09700-2","volume":"25","author":"A Gerdes","year":"2023","unstructured":"Gerdes, A., & Frandsen, T. F. (2023). A systematic review of almost three decades of value sensitive design (VSD): What happened to the technical investigations? Ethics and Information Technology, 25(2), 26. https:\/\/doi.org\/10.1007\/s10676-023-09700-2","journal-title":"Ethics and Information Technology"},{"issue":"2","key":"533_CR41","doi-asserted-by":"publisher","first-page":"167","DOI":"10.1080\/19331681.2014.997416","volume":"12","author":"BT Gervais","year":"2015","unstructured":"Gervais, B. T. (2015). Incivility online: Affective and behavioral reactions to uncivil political posts in a web-based experiment. Journal of Information Technology & Politics, 12(2), 167\u2013185. https:\/\/doi.org\/10.1080\/19331681.2014.997416","journal-title":"Journal of Information Technology & Politics"},{"key":"533_CR42","unstructured":"Google. (2024). About the API - attributes and languages. Perspective. https:\/\/developers.perspectiveapi.com\/s\/about-the-api-attributes-and-languages?language=en_US."},{"issue":"5","key":"533_CR43","doi-asserted-by":"publisher","first-page":"713","DOI":"10.1016\/0191-8869(94)90149-x","volume":"17","author":"K Goss","year":"1994","unstructured":"Goss, K., Gilbert, P., & Allan, S. (1994). An exploration of shame measures\u2014i: The other as shamer scale. Personality and Individual Differences, 17(5), 713\u2013717. https:\/\/doi.org\/10.1016\/0191-8869(94)90149-x","journal-title":"Personality and Individual Differences"},{"key":"533_CR44","doi-asserted-by":"publisher","DOI":"10.1080\/15205436.2016.1274763","author":"J Graf","year":"2017","unstructured":"Graf, J., Erba, J., & Harn, R.-W. (2017). The role of civility and anonymity on perceptions of online comments. Mass Communication and Society. https:\/\/doi.org\/10.1080\/15205436.2016.1274763","journal-title":"Mass Communication and Society"},{"key":"533_CR45","unstructured":"Gralla, P. (2005). Internet annoyances: How to fix the most annoying things about going online. (1st edn.). O\u2019Reilly."},{"issue":"1","key":"533_CR46","doi-asserted-by":"publisher","first-page":"48","DOI":"10.1111\/isj.12242","volume":"30","author":"KH Guo","year":"2020","unstructured":"Guo, K. H., & Yu, X. (2020). The anonymous online Self: toward an understanding of the tension between discipline and online anonymity. Information Systems Journal, 30(1), 48\u201369. https:\/\/doi.org\/10.1111\/isj.12242","journal-title":"Information Systems Journal"},{"issue":"1","key":"533_CR130","doi-asserted-by":"publisher","first-page":"48","DOI":"10.1111\/isj.12242","volume":"30","author":"KH Guo","year":"2020","unstructured":"Guo, K. H., & Yu, X. (2020). The anonymous online self: Toward an understanding of the tension between discipline and online anonymity. Information Systems Journal, 30(1), 48\u201369. https:\/\/doi.org\/10.1111\/isj.12242","journal-title":"Information Systems Journal"},{"key":"533_CR47","doi-asserted-by":"crossref","unstructured":"Habermas, J. (1996). Between facts and norms: Contributions to a discourse theory of law and democracy. The MIT Press.","DOI":"10.7551\/mitpress\/1564.001.0001"},{"issue":"7","key":"533_CR48","doi-asserted-by":"publisher","first-page":"1090","DOI":"10.1080\/1369118X.2016.1218526","volume":"20","author":"KN Hampton","year":"2017","unstructured":"Hampton, K. N., Shin, I., & Lu, W. (2017). Social media and political discussion: When online presence silences offline conversation. Information, Communication & Society, 20(7), 1090\u20131107. https:\/\/doi.org\/10.1080\/1369118X.2016.1218526","journal-title":"Information, Communication &amp; Society"},{"key":"533_CR49","unstructured":"Hasen, R. L. (2017). Cheap speech and what it has done (to American democracy), 33."},{"key":"533_CR131","unstructured":"Horwitz, J., & Seetharaman, D. (2020). Facebook executives shut down efforts to make the site less divisive. Wall Street Journal."},{"key":"533_CR50","doi-asserted-by":"publisher","unstructured":"Haskell, S. (2021) Cancel culture: A qualitative analysis of the social media practice of canceling. In Master of arts in communication. Boise State University. https:\/\/doi.org\/10.18122\/td.1851.boisestate.","DOI":"10.18122\/td.1851.boisestate"},{"key":"533_CR51","unstructured":"Hern, A. (2021, May 14). WhatsApp to force users to accept changes to terms of service. The Guardian, sec. Technology. https:\/\/www.theguardian.com\/technology\/2021\/may\/14\/whatsapp-to-force-users-to-accept-changes-to-terms-of-service."},{"issue":"1","key":"533_CR52","doi-asserted-by":"publisher","first-page":"143","DOI":"10.1007\/s11948-011-9277-z","volume":"18","author":"V Den Hoven","year":"2012","unstructured":"Den Hoven, V., Jeroen, G.-J., & Van de Poel, I. (2012). Engineering and the problem of moral overload. Science and Engineering Ethics, 18(1), 143\u2013155. https:\/\/doi.org\/10.1007\/s11948-011-9277-z","journal-title":"Science and Engineering Ethics"},{"key":"533_CR125","doi-asserted-by":"crossref","unstructured":"Gelber, K., & Brison, S. J. (2019). Digital dualism and the \u201cspeech as thought\" paradox. _Free speech in the digital age_, 12","DOI":"10.1093\/oso\/9780190883591.003.0002"},{"key":"533_CR132","unstructured":"IEEE (2020). IEEE Code of Ethics. IEEE. https:\/\/www.ieee.org\/about\/corporate\/governance\/p7-8.html"},{"issue":"1","key":"533_CR53","doi-asserted-by":"publisher","first-page":"15","DOI":"10.1016\/j.im.2018.05.015","volume":"56","author":"K Ivaturi","year":"2019","unstructured":"Ivaturi, K., & Chua, C. (2019). Framing norms in online communities. Information & Management, 56(1), 15\u201327. https:\/\/doi.org\/10.1016\/j.im.2018.05.015","journal-title":"Information & Management"},{"issue":"3","key":"533_CR54","doi-asserted-by":"publisher","first-page":"281","DOI":"10.1111\/j.1088-4963.2005.00034.x","volume":"33","author":"A James","year":"2005","unstructured":"James, A. (2005). Constructing justice for existing practice: Rawls and the status quo. Philosophy & Public Affairs, 33(3), 281\u2013316.","journal-title":"Philosophy &amp; Public Affairs"},{"issue":"4","key":"533_CR133","doi-asserted-by":"publisher","first-page":"345","DOI":"10.1093\/joc\/jqz023","volume":"69","author":"K Jaidka","year":"2019","unstructured":"Jaidka, K., Zhou, A., & Lelkes, Y. (2019). Brevity is the soul of twitter: The constraint affordance and political discussion. Journal of Communication, 69(4), 345\u2013372. https:\/\/doi.org\/10.1093\/joc\/jqz023","journal-title":"Journal of Communication"},{"key":"533_CR55","doi-asserted-by":"publisher","first-page":"89","DOI":"10.2143\/EP.29.1.3290737","volume":"1","author":"J Janssens","year":"2022","unstructured":"Janssens, J., & Spreeuwenberg, L. (2022). The moral implications of cancel culture. Ethical Perspectives, 1, 89\u2013114. https:\/\/doi.org\/10.2143\/EP.29.1.3290737","journal-title":"Ethical Perspectives,"},{"key":"533_CR56","doi-asserted-by":"publisher","DOI":"10.5210\/fm.v24i12.10266","author":"E Jardine","year":"2019","unstructured":"Jardine, E. (2019). Online content moderation and the dark web: Policy responses to radicalizing hate speech and malicious content on the darknet. First Monday. https:\/\/doi.org\/10.5210\/fm.v24i12.10266","journal-title":"First Monday"},{"key":"533_CR57","doi-asserted-by":"publisher","DOI":"10.1007\/s00146-022-01417-y","author":"R Jenkins","year":"2022","unstructured":"Jenkins, R., Hammond, K., Spurlock, S., & Gilpin, L. (2022). Separating facts and evaluation: Motivation, account, and learnings from a novel approach to evaluating the human impacts of machine learning. AI & Society. https:\/\/doi.org\/10.1007\/s00146-022-01417-y","journal-title":"AI & Society"},{"issue":"4","key":"533_CR58","doi-asserted-by":"publisher","first-page":"16","DOI":"10.1109\/MNET.2006.1668399","volume":"20","author":"RB Jennings","year":"2006","unstructured":"Jennings, R. B., Nahum, E. M., Olshefski, D. P., Saha, D., Shae, Z.-Y., & Waters, C. (2006). A study of internet instant messaging and chat protocols. IEEE Network, 20(4), 16\u201321. https:\/\/doi.org\/10.1109\/MNET.2006.1668399","journal-title":"IEEE Network"},{"key":"533_CR59","doi-asserted-by":"publisher","unstructured":"Jhaver, S., Boylston, C., Yang, D., & Bruckman, A. (2021). Evaluating the effectiveness of deplatforming as a moderation strategy on Twitter. Proceedings of the ACM on Human-Computer Interaction 5 (CSCW2), 381:1\u2013381:30. https:\/\/doi.org\/10.1145\/3479525.","DOI":"10.1145\/3479525"},{"issue":"10","key":"533_CR60","doi-asserted-by":"publisher","first-page":"1123","DOI":"10.1037\/0003-066X.39.10.1123","volume":"39","author":"S Kiesler","year":"1984","unstructured":"Kiesler, S., Siegel, J., & McGuire, T. W. (1984). Social psychological aspects of computer-mediated communication. American Psychologist, 39(10), 1123\u20131134. https:\/\/doi.org\/10.1037\/0003-066X.39.10.1123","journal-title":"American Psychologist"},{"issue":"6","key":"533_CR61","doi-asserted-by":"publisher","first-page":"922","DOI":"10.1093\/joc\/jqab034","volume":"71","author":"JW Kim","year":"2021","unstructured":"Kim, J. W., Guess, A., Nyhan, B., & Reifler, J. (2021). The distorting prism of social media: How self-selection and exposure to incivility fuel online comment toxicity. Journal of Communication, 71(6), 922\u2013946. https:\/\/doi.org\/10.1093\/joc\/jqab034","journal-title":"Journal of Communication"},{"key":"533_CR62","unstructured":"Kimball, W. (2021, September 7). WhatsApp moderators can read your messages. Gizmodo. https:\/\/gizmodo.com\/whatsapp-moderators-can-read-your-messages-1847629241."},{"key":"533_CR134","doi-asserted-by":"publisher","DOI":"10.54501\/jots.v1i4.54","author":"J Kim","year":"2022","unstructured":"Kim, J., McDonald, C., Meosky, P., Katsaros, M., & Tyler, T. (2022). Promoting online civility through platform architecture. Journal of Online Trust and Safety. https:\/\/doi.org\/10.54501\/jots.v1i4.54","journal-title":"Journal of Online Trust and Safety"},{"issue":"4","key":"533_CR202","first-page":"1029","volume":"75","author":"K Klonick","year":"2016","unstructured":"Klonick, K. (2016). Re-shaming the debate: social norms, shame, and regulation in an internet age. Maryland Law Review, 75(4), 1029\u20131065.","journal-title":"Maryland Law Review"},{"issue":"1","key":"533_CR63","doi-asserted-by":"publisher","first-page":"140","DOI":"10.1111\/j.2044-8309.2011.02061.x","volume":"52","author":"D Leeming","year":"2011","unstructured":"Leeming, D., & Boyle, M. (2011). Managing shame: An interpersonal perspective. British Journal of Social Psychology, 52(1), 140\u2013160. https:\/\/doi.org\/10.1111\/j.2044-8309.2011.02061.x","journal-title":"British Journal of Social Psychology"},{"key":"533_CR64","unstructured":"LouisBalfour82. (2021). Abuse of the \u2018suicide or self harm\u2019 report button. www.reddit.com\/r\/ModSupport\/comments\/p3kxe0\/abuse_of_the_suicide_or_self_harm_report_button\/."},{"key":"533_CR65","doi-asserted-by":"crossref","unstructured":"Lucassen, G., Dalpiaz, F., Van der Werf, J. M. E. M. & Brinkkemper, S. (2016) The use and effectiveness of user stories in practice. In Requirements engineering: Foundation for software quality: 22nd international working conference (REFSQ 2016), Gothenburg, Sweden, March 14\u201317, 2016, Proceedings 22, (pp. 205\u2013222). Springer.","DOI":"10.1007\/978-3-319-30282-9_14"},{"issue":"4","key":"533_CR66","doi-asserted-by":"publisher","first-page":"909","DOI":"10.1016\/s0191-8869(02)00307-0","volume":"35","author":"N Lutwak","year":"2003","unstructured":"Lutwak, N., Panish, J., & Ferrari, J. (2003). Shame and guilt: Characterological versus behavioral self-blame and their relationship to fear of intimacy. Personality and Individual Differences, 35(4), 909\u2013916. https:\/\/doi.org\/10.1016\/s0191-8869(02)00307-0","journal-title":"Personality and Individual Differences"},{"key":"533_CR135","unstructured":"Levy, S. (2020). Facebook: The inside story. Penguin UK"},{"key":"533_CR68","unstructured":"Magarian, G. P. (2021). How cheap speech underserves and overheats democracy. Scholarship@WashULaw. 266. https:\/\/openscholarship.wustl.edu\/law_scholarship\/266"},{"issue":"10","key":"533_CR71","doi-asserted-by":"publisher","first-page":"951","DOI":"10.1136\/archdischild-2019-318716","volume":"105","author":"A Mateu","year":"2020","unstructured":"Mateu, A., Pascual-S\u00e1nchez, A., Martinez-Herves, M., Hickey, N., Nicholls, D., & Kramer, T. (2020). Cyberbullying and post-traumatic stress symptoms in UK adolescents. Archives of Disease in Childhood, 105(10), 951\u2013956. https:\/\/doi.org\/10.1136\/archdischild-2019-318716","journal-title":"Archives of Disease in Childhood"},{"key":"533_CR136","unstructured":"Merriam Webster. (2024). Definition of FRICTION. Merriam Webster. https:\/\/www.merriamwebster. com\/dictionary\/friction"},{"key":"533_CR73","unstructured":"Meta. n.d.b. (2024). Bullying and harassment | transparency center. Meta transparency center. Accessed September 16. https:\/\/transparency.meta.com\/policies\/community-standards\/bullying-harassment\/."},{"key":"533_CR74","doi-asserted-by":"publisher","DOI":"10.1080\/03623319.2021.1949552","author":"TS Mueller","year":"2021","unstructured":"Mueller, T. S. (2021). Blame, then shame? Psychological predictors in cancel culture behavior. The Social Science Journal. https:\/\/doi.org\/10.1080\/03623319.2021.1949552","journal-title":"The Social Science Journal"},{"issue":"1","key":"533_CR137","doi-asserted-by":"publisher","first-page":"53","DOI":"10.1057\/s41599-020-00550-7","volume":"7","author":"L Munn","year":"2020","unstructured":"Munn, L. (2020). Angry by design: Toxic communication and technical architectures. Humanities and Social Sciences Communications, 7(1), 53. https:\/\/doi.org\/10.1057\/s41599-020-00550-7","journal-title":"Humanities and Social Sciences Communications"},{"key":"533_CR145","unstructured":"Meta. n.d.a. (2024). Facebook community standards | transparency center. Meta transparency center. Accessed September 16.https:\/\/transparency.meta.com\/policies\/community-standards\/"},{"key":"533_CR138","unstructured":"National Society of Professional Engineers. (2019). NSPE Code of Ethics for Engineers. https:\/\/www.nspe.org\/career-growth\/nspe-code-ethics-engineers"},{"key":"533_CR139","unstructured":"Newton, C. (2019). The secret lives of Facebook moderators in America. The Verge. https:\/\/www.theverge.com\/2019\/2\/25\/18229714\/cognizant-facebook-content-moderator-interviews-trauma-workingconditions-arizona"},{"issue":"6","key":"533_CR75","doi-asserted-by":"publisher","first-page":"621","DOI":"10.1177\/1527476420918828","volume":"21","author":"E Ng","year":"2020","unstructured":"Ng, E. (2020). No grand pronouncements here...: Reflections on cancel culture and digital media participation. Television & New Media, 21(6), 621\u2013627. https:\/\/doi.org\/10.1177\/1527476420918828","journal-title":"Television &amp; New Media"},{"key":"533_CR76","doi-asserted-by":"publisher","first-page":"187","DOI":"10.5840\/socphiltoday201762343","volume":"33","author":"K Norlock","year":"2017","unstructured":"Norlock, K. (2017). Online shaming. Social Philosophy Today, 33, 187\u2013197.","journal-title":"Social Philosophy Today"},{"issue":"1","key":"533_CR77","doi-asserted-by":"publisher","first-page":"145","DOI":"10.1177\/00323217211037023","volume":"71","author":"P Norris","year":"2023","unstructured":"Norris, P. (2023). Cancel culture: Myth or reality? Political Studies, 71(1), 145\u2013174. https:\/\/doi.org\/10.1177\/00323217211037023","journal-title":"Political Studies"},{"issue":"2","key":"533_CR78","doi-asserted-by":"publisher","first-page":"131","DOI":"10.1504\/ijwbc.2016.077254","volume":"12","author":"M Nycyk","year":"2016","unstructured":"Nycyk, M. (2016). Enforcing community guidelines in web-based communities: The case of flame comments on YouTube. International Journal of Web Based Communities, 12(2), 131. https:\/\/doi.org\/10.1504\/ijwbc.2016.077254","journal-title":"International Journal of Web Based Communities"},{"key":"533_CR79","doi-asserted-by":"publisher","unstructured":"Omernick, E., & Sood, S. O. (2013). The impact of anonymity in online communities. In 2013 International conference on social computing. https:\/\/doi.org\/10.1109\/socialcom.2013.80.","DOI":"10.1109\/socialcom.2013.80"},{"issue":"2","key":"533_CR80","doi-asserted-by":"publisher","first-page":"259","DOI":"10.1177\/1461444804041444","volume":"6","author":"Z Papacharissi","year":"2004","unstructured":"Papacharissi, Z. (2004). Democracy online: Civility, politeness, and the democratic potential of online political discussion groups. New Media & Society, 6(2), 259\u2013283. https:\/\/doi.org\/10.1177\/1461444804041444","journal-title":"New Media & Society"},{"key":"533_CR82","doi-asserted-by":"publisher","first-page":"89","DOI":"10.1007\/978-94-007-6970-0_5","volume-title":"Handbook of ethics, values, and technological design: Sources, theory, values and application domains","author":"I van de Poel","year":"2015","unstructured":"van de Poel, I. (2015). Conflicting values in design for values. In J. van den Hoven, P. E. Vermaas, & I. van de Poel (Eds.), Handbook of ethics, values, and technological design: Sources, theory, values and application domains (pp. 89\u2013116). Springer. https:\/\/doi.org\/10.1007\/978-94-007-6970-0_5"},{"key":"533_CR140","first-page":"576","volume-title":"Political liberalism: Expanded edition","author":"J Rawls","year":"2005","unstructured":"Rawls, J. (2005). Political liberalism: Expanded edition (p. 576). Columbia University Press."},{"key":"533_CR84","doi-asserted-by":"publisher","DOI":"10.1017\/9781108870665","volume-title":"The ethics of social punishment: The enforcement of morality in everyday life","author":"L Radzik","year":"2020","unstructured":"Radzik, L., Bennett, C., Pettigrove, G., & Sher, G. (2020). The ethics of social punishment: The enforcement of morality in everyday life. Cambridge University Press."},{"key":"533_CR85","doi-asserted-by":"publisher","DOI":"10.2139\/ssrn.3867818","author":"A Rauchfleisch","year":"2021","unstructured":"Rauchfleisch, A., & Kaiser, J. (2021). Deplatforming the far-right: An analysis of Youtube and BitChute. SSRN Electronic Journal. https:\/\/doi.org\/10.2139\/ssrn.3867818","journal-title":"SSRN Electronic Journal"},{"key":"533_CR86","doi-asserted-by":"publisher","first-page":"303","DOI":"10.1093\/ojls\/11.3.303","volume":"11","author":"J Raz","year":"1991","unstructured":"Raz, J. (1991). Free expression and personal identification. Oxford Journal Legal Studies, 11, 303.","journal-title":"Oxford J. Legal Stud."},{"key":"533_CR87","unstructured":"Reddit. (2020, July 13). Promoting hate based on identity or vulnerability. Reddit Help. https:\/\/support.reddithelp.com\/hc\/en-us\/articles\/360045715951-Promoting-Hate-Based-on-Identity-or-Vulnerability."},{"key":"533_CR88","unstructured":"Reddit. (2024, August 15). Do not threaten, harass, or bully. Reddit help. https:\/\/support.reddithelp.com\/hc\/en-us\/articles\/360043071072-Do-not-threaten-harass-or-bully."},{"issue":"1","key":"533_CR89","doi-asserted-by":"publisher","first-page":"92328","DOI":"10.1525\/collabra.92328","volume":"10","author":"Y Reusser","year":"2024","unstructured":"Reusser, Y., Alison, I., Veit, K. M., Gassin, E. A., & Case, J. P. (2024). Responding to online toxicity: Which strategies make others feel freer to contribute, believe that toxicity will decrease, and believe that justice has been restored? Simine Vazire (Ed.). Collabra: Psychology, 10(1), 92328. https:\/\/doi.org\/10.1525\/collabra.92328","journal-title":"Collabra: Psychology"},{"issue":"2S","key":"533_CR90","doi-asserted-by":"publisher","first-page":"43","DOI":"10.1353\/ken.2017.0025","volume":"27","author":"R Rini","year":"2017","unstructured":"Rini, R. (2017). Fake news and partisan epistemology. Kennedy Institute of Ethics Journal, 27(2S), 43\u201364. https:\/\/doi.org\/10.1353\/ken.2017.0025","journal-title":"Kennedy Institute of Ethics Journal"},{"key":"533_CR91","unstructured":"Ronson, J. (2015). So you\u2019ve been publicly shamed. Riverhead Books"},{"key":"533_CR142","unstructured":"Rose-Stockwell, T. (2018). Facebook\u2019s problems can be solved with design. Quartz. https:\/\/qz.com\/1264547\/facebooks-problems-can-be-solved-with-design"},{"issue":"3","key":"533_CR93","doi-asserted-by":"publisher","first-page":"399","DOI":"10.1177\/0093650220921314","volume":"49","author":"P Rossini","year":"2022","unstructured":"Rossini, P. (2022). Beyond incivility: Understanding patterns of uncivil and intolerant discourse in online political talk. Communication Research, 49(3), 399\u2013425. https:\/\/doi.org\/10.1177\/0093650220921314","journal-title":"Communication Research"},{"key":"533_CR94","doi-asserted-by":"crossref","unstructured":"Rossini, P. (2020) Beyond toxicity in the online public sphere: Understanding incivility in online political talk. In W. H. Dutton (Ed.) A research agenda for digital politics, (pp. 160-170). Series Elgar research agendas. Edward Elgar Publishing. Accepted manuscript. Available online at https:\/\/eprints.gla.ac.uk\/272725\/.","DOI":"10.4337\/9781789903096.00026"},{"issue":"6","key":"533_CR95","doi-asserted-by":"publisher","first-page":"e0155923","DOI":"10.1371\/journal.pone.0155923","volume":"11","author":"K Rost","year":"2016","unstructured":"Rost, K., Stahel, L., & Frey, B. S. (2016). Digital social norm enforcement: Online firestorms in social media. PLoS ONE, 11(6), e0155923. https:\/\/doi.org\/10.1371\/journal.pone.0155923","journal-title":"PLoS ONE"},{"key":"533_CR98","unstructured":"Sedighimornani, N. (2015). Inquiry into shame: Exploring mindfulness, self-compassion, acceptance, and mind-wandering as methods of shame management. Doctor of Philosophy, University of Bath. https:\/\/purehost.bath.ac.uk\/ws\/files\/187944850\/Sedighimornani_Neda_PhD_Thesis_09_09_2015_Copy.pdf"},{"issue":"3","key":"533_CR141","doi-asserted-by":"publisher","first-page":"321","DOI":"10.1089\/1094931041291295","volume":"7","author":"J Suler","year":"2004","unstructured":"Suler, J. (2004). The online disinhibition effect. CyberPsychology & Behavior, 7(3), 321\u2013326. https:\/\/doi.org\/10.1089\/1094931041291295","journal-title":"CyberPsychology & Behavior"},{"key":"533_CR100","unstructured":"Singhal, M., Ling C., Paudel P., Poojitha T., Kumarswamy, N., Stringhini G., & Nilizadeh S. (2023). SoK: Content moderation in social media, from guidelines to enforcement, and research to practice. arXiv, March 1. http:\/\/arxiv.org\/abs\/2206.14855."},{"issue":"4","key":"533_CR101","doi-asserted-by":"publisher","first-page":"765","DOI":"10.1007\/s12553-022-00671-w","volume":"12","author":"M Smits","year":"2022","unstructured":"Smits, M., van Goor, H., Kallewaard, J. W., Verbeek, P. P., & Ludden, G. D. S. (2022). Evaluating value mediation in patients with chronic low-back pain using virtual reality: Contributions for empirical research in value sensitive design. Health and Technology, 12(4), 765\u2013778. https:\/\/doi.org\/10.1007\/s12553-022-00671-w","journal-title":"Health Technol (Berl)"},{"key":"533_CR103","doi-asserted-by":"publisher","first-page":"zma035","DOI":"10.1093\/jcmc\/zmac035","volume":"28","author":"DJ Sude","year":"2023","unstructured":"Sude, D. J., & Dvir-Gvirsman, S. (2023). Different platforms, different uses: Testing the effect of platforms and individual differences on perception of incivility and self-reported uncivil behavior. Journal of Computer-Mediated Communication, 28, zma035.","journal-title":"Journal of Computer-Mediated Communication"},{"issue":"November","key":"533_CR105","doi-asserted-by":"publisher","DOI":"10.3389\/fpos.2021.741605","volume":"3","author":"Q Sun","year":"2021","unstructured":"Sun, Q., Wojcieszak, M., & Davidson, S. (2021). Over-time trends in incivility on social media: Evidence from political, non-political, and mixed sub-Reddits over 11\u00a0years. Frontiers in Political Science, 3(November), 741605. https:\/\/doi.org\/10.3389\/fpos.2021.741605","journal-title":"Frontiers in Political Science"},{"key":"533_CR106","unstructured":"Thaler, R. & Sunstein, C. (2009). Nudge: Improving decisions about health, wealth, and happiness: Thaler, R. H., Sunstein, C. R.: 8580001056876: Amazon.Com: Books. Penguin Books. https:\/\/www.amazon.com\/Nudge-Improving-Decisions-Health-Happiness\/dp\/014311526X."},{"issue":"2","key":"533_CR108","doi-asserted-by":"publisher","first-page":"157","DOI":"10.1007\/s10676-009-9202-1","volume":"12","author":"S Vallor","year":"2010","unstructured":"Vallor, S. (2010). Social networking technology and the virtues. Ethics and Information Technology, 12(2), 157\u2013170. https:\/\/doi.org\/10.1007\/s10676-009-9202-1","journal-title":"Ethics and Information Technology"},{"key":"533_CR109","doi-asserted-by":"publisher","DOI":"10.1093\/acprof:oso\/9780190498511.001.0001","volume-title":"Technology and the virtues: A philosophical guide to a future worth wanting","author":"S Vallor","year":"2016","unstructured":"Vallor, S. (2016). Technology and the virtues: A philosophical guide to a future worth wanting. Oxford University Press."},{"key":"533_CR110","unstructured":"Van Boom, D. (2022). The metaverse needs to figure out how to deal with sexual assault. https:\/\/www.cnet.com\/personal-finance\/crypto\/the-metaverse-needs-to-figure-out-how-to-deal-with-sexual-assault\/."},{"key":"533_CR111","doi-asserted-by":"publisher","DOI":"10.21659\/rupkatha.v12n5.rioc1s21n2","author":"JC Velasco","year":"2020","unstructured":"Velasco, J. C. (2020). You are cancelled: Virtual collective consciousness and the emergence of cancel culture as ideological purging. Rupkatha Journal on Interdisciplinary Studies in Humanities. https:\/\/doi.org\/10.21659\/rupkatha.v12n5.rioc1s21n2","journal-title":"Rupkatha Journal on Interdisciplinary Studies in Humanities"},{"key":"533_CR113","unstructured":"Vogels, E. A., Perrin, A. & Anderson, M. (2020, August 19). Most Americans think social media sites censor political viewpoints, Pew Research Center: Internet, Science & Tech (blog). https:\/\/www.pewresearch.org\/internet\/2020\/08\/19\/most-americans-think-social-media-sites-censor-political-viewpoints\/."},{"key":"533_CR114","unstructured":"Vogels, E. A. (2021a, 13 January). The state of online harassment, Pew Research Center: Internet, Science & Tech (blog). https:\/\/www.pewresearch.org\/internet\/2021\/01\/13\/the-state-of-online-harassment\/."},{"key":"533_CR115","unstructured":"Vogels, E. A. (2021b, February 16). Online harassment occurs most often on social media, but strikes in other places, too. Pew Research Center (blog). https:\/\/www.pewresearch.org\/short-reads\/2021\/02\/16\/online-harassment-occurs-most-often-on-social-media-but-strikes-in-other-places-too\/."},{"key":"533_CR116","doi-asserted-by":"publisher","first-page":"48","DOI":"10.2307\/797032","volume":"104","author":"E Volokh","year":"1995","unstructured":"Volokh, E. (1995). Cheap speech and what it will do. The Yale Law Journal, 104, 48.","journal-title":"The Yale Law Journal"},{"issue":"6380","key":"533_CR143","doi-asserted-by":"publisher","first-page":"1146","DOI":"10.1126\/science.aap9559","volume":"359","author":"S Vosoughi","year":"2018","unstructured":"Vosoughi, S., Roy, D., & Aral, S. (2018). The spread of true and false news online. Science, 359(6380), 1146\u20131151. https:\/\/doi.org\/10.1126\/science.aap9559","journal-title":"Science"},{"key":"533_CR117","doi-asserted-by":"publisher","unstructured":"Warnock, M., (ed.) (2003). Utilitarianism and on liberty: Including Mill\u2019s \u2018Essay on Bentham\u2019 and selections from the writings of Jeremy Bentham and John Austin. (1st edn.). Wiley. https:\/\/doi.org\/10.1002\/9780470776018.","DOI":"10.1002\/9780470776018"},{"issue":"4","key":"533_CR144","doi-asserted-by":"publisher","first-page":"555","DOI":"10.1007\/s10677-023-10409-w","volume":"26","author":"S Whitten","year":"2023","unstructured":"Whitten, S. (2023). A republican conception of counterspeech. Ethical Theory and Moral Practice, 26(4), 555\u2013575. https:\/\/doi.org\/10.1007\/s10677-023-10409-w","journal-title":"Ethical Theory and Moral Practice"},{"issue":"1","key":"533_CR118","doi-asserted-by":"publisher","first-page":"17","DOI":"10.1007\/s10676-018-9476-2","volume":"23","author":"T Winkler","year":"2021","unstructured":"Winkler, T., & Spiekermann, S. (2021). Twenty years of value sensitive design: A review of methodological practices in VSD projects. Ethics and Information Technology, 23(1), 17\u201321. https:\/\/doi.org\/10.1007\/s10676-018-9476-2","journal-title":"Ethics and Information Technology"},{"key":"533_CR119","unstructured":"YouTube. (2024b). Hate speech policy - YouTube Help. YouTube Help. https:\/\/support.google.com\/youtube\/answer\/2801939?hl=en&ref_topic=9282436"},{"key":"533_CR120","unstructured":"YouTube. (2024a). Harassment & cyberbullying policies - YouTube Help. YouTube Help. https:\/\/support.google.com\/youtube\/answer\/2802268?hl=en&ref_topic=9282436"}],"container-title":["Science and Engineering Ethics"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11948-025-00533-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11948-025-00533-4\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11948-025-00533-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,24]],"date-time":"2025-06-24T15:51:33Z","timestamp":1750780293000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11948-025-00533-4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,4,22]]},"references-count":131,"journal-issue":{"issue":"3","published-online":{"date-parts":[[2025,6]]}},"alternative-id":["533"],"URL":"https:\/\/doi.org\/10.1007\/s11948-025-00533-4","relation":{},"ISSN":["1471-5546"],"issn-type":[{"type":"electronic","value":"1471-5546"}],"subject":[],"published":{"date-parts":[[2025,4,22]]},"assertion":[{"value":"17 June 2023","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"25 February 2025","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"22 April 2025","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The author has no competing interests to declare that are relevant to the content of this article. The paper that forms the foundation of this work was presented at the Dartmouth Workshop on Ethics and Information Technology in August, 2022, where travel and accommodations were provided for speakers. Other than that, this project has received no previous support.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}],"article-number":"12"}}