{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,17]],"date-time":"2026-03-17T00:08:27Z","timestamp":1773706107730,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":45,"publisher":"ACM","license":[{"start":{"date-parts":[[2017,5,7]],"date-time":"2017-05-07T00:00:00Z","timestamp":1494115200000},"content-version":"vor","delay-in-days":365,"URL":"http:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"DARPA","award":["DARPA-W911NF-12-1-0043"],"award-info":[{"award-number":["DARPA-W911NF-12-1-0043"]}]},{"DOI":"10.13039\/100000002","name":"National Institutes of Health","doi-asserted-by":"publisher","award":["1R01GM11269701"],"award-info":[{"award-number":["1R01GM11269701"]}],"id":[{"id":"10.13039\/100000002","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2016,5,7]]},"DOI":"10.1145\/2858036.2858248","type":"proceedings-article","created":{"date-parts":[[2016,5,5]],"date-time":"2016-05-05T10:08:22Z","timestamp":1462442902000},"page":"1157-1162","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":65,"title":["\"This Post Will Just Get Taken Down\""],"prefix":"10.1145","author":[{"given":"Stevie","family":"Chancellor","sequence":"first","affiliation":[{"name":"Georgia Institute of Technology, Atlanta, GA, USA"}]},{"given":"Zhiyuan (Jerry)","family":"Lin","sequence":"additional","affiliation":[{"name":"Georgia Institute of Technology, Atlanta, GA, USA"}]},{"given":"Munmun","family":"De Choudhury","sequence":"additional","affiliation":[{"name":"Georgia Tech, Atlanta, GA, USA"}]}],"member":"320","published-online":{"date-parts":[[2016,5,7]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Jan Paul Acton. 1973. Evaluating public programs to save lives. (1973)."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.5555\/1964750.1964776"},{"key":"e_1_3_2_1_3_1","unstructured":"Ronald L Akers. 1977. Deviant behavior: A social learning approach. (1977)."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/2441776.2441878"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/2212776.2212403"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1080\/17512786.2011.648988"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"crossref","unstructured":"Jonathan Bishop. 2013. Examining the Concepts Issues and Implications of Internet Trolling. IGI Global.","DOI":"10.4018\/978-1-4666-2803-8"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/2566486.2567987"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/259963.260231"},{"key":"e_1_3_2_1_10_1","volume-title":"Trolls just want to have fun. Personality and individual Differences 67","author":"Buckels Erin E","year":"2014","unstructured":"Erin E Buckels, Paul D Trapnell, and Delroy L Paulhus. 2014. Trolls just want to have fun. Personality and individual Differences 67 (2014), 97--102."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/1753326.1753613"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/2818048.2819973"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/2818048.2819963"},{"key":"e_1_3_2_1_14_1","volume-title":"Antisocial Behavior in Online Discussion Communities. In International Conference on Weblogs and Social Media (ICWSM). AAAI.","author":"Cheng Justin","year":"2015","unstructured":"Justin Cheng, Cristian Danescu-Niculescu-Mizil, and Jure Leskovec. 2015. Antisocial Behavior in Online Discussion Communities. In International Conference on Weblogs and Social Media (ICWSM). AAAI."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1609\/icwsm.v8i1.14574"},{"key":"e_1_3_2_1_16_1","volume-title":"Social factors and psychopathology: Stress, social support, and coping processes. Annual review of psychology 42, 1","author":"Coyne James C","year":"1991","unstructured":"James C Coyne and Geraldine Downey. 1991. Social factors and psychopathology: Stress, social support, and coping processes. Annual review of psychology 42, 1 (1991), 401--425."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/2750511.2750515"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/2470654.2466447"},{"key":"e_1_3_2_1_19_1","volume-title":"Identity and deception in the virtual community. Communities in cyberspace 1996","author":"Donath Judith S","year":"1999","unstructured":"Judith S Donath and others. 1999. Identity and deception in the virtual community. Communities in cyberspace 1996 (1999), 29--59."},{"key":"e_1_3_2_1_20_1","volume-title":"Evaluating Online Safety Programs","author":"Emmens T","year":"2011","unstructured":"T Emmens and A Phippen. 2010. Evaluating Online Safety Programs. Harvard Berkman Center for Internet and Society.{23 July 2011} (2010)."},{"key":"e_1_3_2_1_21_1","volume-title":"Eating disorders. The Lancet 361, 9355","author":"Fairburn Christopher G","year":"2003","unstructured":"Christopher G Fairburn and Paul J Harrison. 2003. Eating disorders. The Lancet 361, 9355 (2003), 407--416."},{"key":"e_1_3_2_1_22_1","volume-title":"Constructing identities in cyberspace: The case of eating disorders. British journal of social psychology 45, 3","author":"Giles David","year":"2006","unstructured":"David Giles. 2006. Constructing identities in cyberspace: The case of eating disorders. British journal of social psychology 45, 3 (2006), 463--477."},{"key":"e_1_3_2_1_23_1","volume-title":"Proceedings of Cybersociety","author":"Hall Lynne","year":"1999","unstructured":"Lynne Hall and Carlisle E George. 1999. Law and Punishment in Virtual Communities. Proceedings of Cybersociety (1999)."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/2702613.2732908"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1515\/jplr.2010.011"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1080\/01972240290108186"},{"key":"e_1_3_2_1_27_1","volume-title":"Bullying beyond the schoolyard: Preventing and responding to cyberbullying","author":"Hinduja Sameer","unstructured":"Sameer Hinduja and Justin W Patchin. 2014. Bullying beyond the schoolyard: Preventing and responding to cyberbullying. Corwin Press."},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/2038558.2038573"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jbi.2011.08.017"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/2531602.2531720"},{"key":"e_1_3_2_1_31_1","unstructured":"Danielle Lawson. 2008. Negotiating social and moral order in internet relay chat. (2008)."},{"key":"e_1_3_2_1_32_1","volume-title":"Using Historical Twitter Data for Research: Ethical Challenges of Tweet Deletions. In CSCW 2015 Workshop on Ethics for Studying Sociotechnical Systems in a Big Data World. ACM.","author":"Maddock Jim","year":"2015","unstructured":"Jim Maddock, Robert Mason, and Kate Starbird. 2015. Using Historical Twitter Data for Research: Ethical Challenges of Tweet Deletions. In CSCW 2015 Workshop on Ethics for Studying Sociotechnical Systems in a Big Data World. ACM."},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/2818048.2820030"},{"key":"e_1_3_2_1_34_1","volume-title":"LOLing at tragedy: Facebook trolls, memorial","author":"Phillips Whitney","year":"2011","unstructured":"Whitney Phillips. 2011. LOLing at tragedy: Facebook trolls, memorial pages and resistance to grief online. First Monday 16, 12 (2011)."},{"key":"e_1_3_2_1_35_1","volume-title":"A Qualitative Examination of Cyberbullying and On-Line Aggression in a College Sample. Deviant behavior 35, 5","author":"Rafferty Rebecca","year":"2014","unstructured":"Rebecca Rafferty and Thomas Vander Ven. 2014. \u00e2 \"AIJI Hate Everything About You: A Qualitative Examination of Cyberbullying and On-Line Aggression in a College Sample. Deviant behavior 35, 5 (2014), 364--377."},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1177\/0165551510365390"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/2470654.2466448"},{"key":"e_1_3_2_1_38_1","first-page":"53","article-title":"Virtual misbehavior: breaking rules of conduct in online environments","volume":"1","author":"Sternberg Janet","year":"2000","unstructured":"Janet Sternberg. 2000. Virtual misbehavior: breaking rules of conduct in online environments. In Proceedings of the Media Ecology Association, Vol. 1. 53--60.","journal-title":"Proceedings of the Media Ecology Association"},{"key":"e_1_3_2_1_39_1","unstructured":"Janet Sternberg. 2012. Misbehavior in cyber places: The regulation of online conduct in virtual communities on the Internet. Rowman & Littlefield."},{"key":"e_1_3_2_1_40_1","volume-title":"The online disinhibition effect. Cyberpsychology & behavior 7, 3","author":"Suler John","year":"2004","unstructured":"John Suler. 2004. The online disinhibition effect. Cyberpsychology & behavior 7, 3 (2004), 321--326."},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1089\/cpb.1998.1.275"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1145\/2531602.2531734"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.5555\/1873781.1873910"},{"key":"e_1_3_2_1_44_1","unstructured":"Jun-Ming Xu Benjamin Burchfiel Xiaojin Zhu and Amy Bellmore. 2013. An Examination of Regret in Bullying Tweets.. In HLT-NAACL. 697--702."},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.2196\/jmir.2239"}],"event":{"name":"CHI'16: CHI Conference on Human Factors in Computing Systems","location":"San Jose California USA","acronym":"CHI'16","sponsor":["SIGCHI ACM Special Interest Group on Computer-Human Interaction"]},"container-title":["Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2858036.2858248","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2858036.2858248","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2858036.2858248","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,18]],"date-time":"2025-11-18T09:51:13Z","timestamp":1763459473000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2858036.2858248"}},"subtitle":["Characterizing Removed Pro-Eating Disorder Social Media Content"],"short-title":[],"issued":{"date-parts":[[2016,5,7]]},"references-count":45,"alternative-id":["10.1145\/2858036.2858248","10.1145\/2858036"],"URL":"https:\/\/doi.org\/10.1145\/2858036.2858248","relation":{},"subject":[],"published":{"date-parts":[[2016,5,7]]},"assertion":[{"value":"2016-05-07","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}