{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,14]],"date-time":"2026-04-14T00:50:28Z","timestamp":1776127828007,"version":"3.50.1"},"reference-count":51,"publisher":"Association for Computing Machinery (ACM)","issue":"CSCW","license":[{"start":{"date-parts":[[2017,12,6]],"date-time":"2017-12-06T00:00:00Z","timestamp":1512518400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100005959","name":"Knight Foundation","doi-asserted-by":"crossref","id":[{"id":"10.13039\/100005959","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["Proc. ACM Hum.-Comput. Interact."],"published-print":{"date-parts":[[2017,12,6]]},"abstract":"<jats:p>Online harassment is a pervasive and pernicious problem. Techniques like natural language processing and machine learning are promising approaches for identifying abusive language, but they fail to address structural power imbalances perpetuated by automated labeling and classification. Similarly, platform policies and reporting tools are designed for a seemingly homogenous user base and do not account for individual experiences and systems of social oppression. This paper describes the design and evaluation of HeartMob, a platform built by and for people who are disproportionately affected by the most severe forms of online harassment. We conducted interviews with 18 HeartMob users, both targets and supporters, about their harassment experiences and their use of the site. We examine systems of classification enacted by technical systems, platform policies, and users to demonstrate how 1) labeling serves to validate (or invalidate) harassment experiences; 2) labeling motivates bystanders to provide support; and 3) labeling content as harassment is critical for surfacing community norms around appropriate user behavior. We discuss these results through the lens of Bowker and Star's classification theories and describe implications for labeling and classifying online abuse. Finally, informed by intersectional feminist theory, we argue that fully addressing online harassment requires the ongoing integration of vulnerable users' needs into the design and moderation of online platforms.<\/jats:p>","DOI":"10.1145\/3134659","type":"journal-article","created":{"date-parts":[[2017,12,6]],"date-time":"2017-12-06T21:23:15Z","timestamp":1512595395000},"page":"1-19","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":208,"title":["Classification and Its Consequences for Online Harassment"],"prefix":"10.1145","volume":"1","author":[{"given":"Lindsay","family":"Blackwell","sequence":"first","affiliation":[{"name":"University of Michigan, Ann Arbor, MI, USA"}]},{"given":"Jill","family":"Dimond","sequence":"additional","affiliation":[{"name":"Sassafras Tech Collective, Ann Arbor, MI, USA"}]},{"given":"Sarita","family":"Schoenebeck","sequence":"additional","affiliation":[{"name":"University of Michigan, Ann Arbor, MI, USA"}]},{"given":"Cliff","family":"Lampe","sequence":"additional","affiliation":[{"name":"University of Michigan, Ann Arbor, MI, USA"}]}],"member":"320","published-online":{"date-parts":[[2017,12,6]]},"reference":[{"key":"e_1_2_1_1_1","volume-title":"Living a Feminist Life","author":"Ahmed Sara"},{"key":"e_1_2_1_2_1","unstructured":"Julia Angwin. 2017. Facebook's Secret Censorship Rules Protect White Men from Hate Speech But Not Black Children. ProPublica.  Julia Angwin. 2017. Facebook's Secret Censorship Rules Protect White Men from Hate Speech But Not Black Children. ProPublica."},{"key":"e_1_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/2858036.2858548"},{"key":"e_1_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/1978942.1979041"},{"key":"e_1_2_1_5_1","volume-title":"The Free Press 9","author":"Becker Howard","year":"1982"},{"key":"e_1_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/2858036.2858342"},{"key":"e_1_2_1_7_1","volume-title":"Bowker and Susan Leigh Star","author":"Geoffrey","year":"2000"},{"key":"e_1_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/1125451.1125458"},{"key":"e_1_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/3025453.3026018"},{"key":"e_1_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/2998181.2998213"},{"key":"e_1_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11336-006-1560-6"},{"key":"e_1_2_1_12_1","volume-title":"Criminalizing Revenge Porn. Social Science Research Network","author":"Citron Danielle Keats"},{"key":"e_1_2_1_13_1","unstructured":"Rep Katherine Clark. 2015. Online Violence Against Trans Women Perpetuates Dangerous Cycle. Huffington Post.  Rep Katherine Clark. 2015. Online Violence Against Trans Women Perpetuates Dangerous Cycle. Huffington Post."},{"key":"e_1_2_1_14_1","unstructured":"Keith Collins. 2017. Tech is overwhelmingly white and male and white men are just fine with that. Quartz.  Keith Collins. 2017. Tech is overwhelmingly white and male and white men are just fine with that. Quartz."},{"key":"e_1_2_1_15_1","unstructured":"Patricia Hill Collins. 1993. Black feminist thought in the matrix of domination. Social theory: The multicultural and classic readings: 615--625.  Patricia Hill Collins. 1993. Black feminist thought in the matrix of domination. Social theory: The multicultural and classic readings: 615--625."},{"key":"e_1_2_1_16_1","doi-asserted-by":"crossref","unstructured":"Kimberle Crenshaw. 1991. Mapping the margins: Intersectionality identity politics and violence against women of color. Stanford law review: 1241--1299.  Kimberle Crenshaw. 1991. Mapping the margins: Intersectionality identity politics and violence against women of color. Stanford law review: 1241--1299.","DOI":"10.2307\/1229039"},{"key":"e_1_2_1_17_1","unstructured":"Julian Dibbell. 1993. A Rape in Cyberspace. Village Voice XXXVIII 51.  Julian Dibbell. 1993. A Rape in Cyberspace. Village Voice XXXVIII 51."},{"key":"e_1_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/2441776.2441831"},{"key":"e_1_2_1_19_1","volume-title":"Identity and Deception in the Virtual Community. Communities in cyberspace","author":"Donath Judith"},{"key":"e_1_2_1_20_1","unstructured":"Maeve Duggan. 2014. Online Harassment. Pew Research Center.  Maeve Duggan. 2014. Online Harassment. Pew Research Center."},{"key":"e_1_2_1_21_1","unstructured":"Maeve Duggan 2017. Online Harassment 2017. Pew Research Center.  Maeve Duggan 2017. Online Harassment 2017. Pew Research Center."},{"key":"e_1_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1086\/586910"},{"key":"e_1_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1080\/0267837031000071438"},{"key":"e_1_2_1_24_1","first-page":"437","article-title":"Rethinking standpoint epistemology: What is \"strong objectivity","volume":"36","author":"Harding Sandra","year":"1992","journal-title":"The Centennial Review"},{"key":"e_1_2_1_25_1","volume-title":"Feminism is for everybody: Passionate politics","author":"Hooks Bell"},{"key":"e_1_2_1_26_1","unstructured":"Hossein Hosseini Sreeram Kannan Baosen Zhang and Radha Poovendran. 2017. Deceiving Google's Perspective API Built for Detecting Toxic Comments. arXiv:1702.08138 {cs}.  Hossein Hosseini Sreeram Kannan Baosen Zhang and Radha Poovendran. 2017. Deceiving Google's Perspective API Built for Detecting Toxic Comments. arXiv:1702.08138 {cs}."},{"key":"e_1_2_1_27_1","volume-title":"Regulating behavior in online communities. Building Successful Online Communities: Evidence-Based Social Design","author":"Kiesler Sara"},{"key":"e_1_2_1_28_1","volume-title":"Gamification and social media. The Gameful world: Approaches, issues, applications","author":"Lampe Cliff"},{"key":"e_1_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/985692.985761"},{"key":"e_1_2_1_30_1","volume-title":"Digital Abuse, and Cyberstalking in America","author":"Lenhart Amanda"},{"key":"e_1_2_1_31_1","doi-asserted-by":"crossref","unstructured":"Eden Litt and Eszter Hargittai. 2016. The imagined audience on social network sites. Social Media + Society 2 1: 2056305116633482.  Eden Litt and Eszter Hargittai. 2016. The imagined audience on social network sites. Social Media + Society 2 1: 2056305116633482.","DOI":"10.1177\/2056305116633482"},{"key":"e_1_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.24908\/ss.v9i4.4342"},{"key":"e_1_2_1_33_1","volume-title":"The communist manifesto","author":"Marx Karl","year":"1848"},{"key":"e_1_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/642611.642635"},{"key":"e_1_2_1_35_1","first-page":"180","article-title":"Cyber stalking: An analysis of online harassment and intimidation","volume":"1","author":"Pittaro Michael L.","year":"2007","journal-title":"International Journal of Cyber Criminology"},{"key":"e_1_2_1_36_1","volume-title":"Trolls, Anonymity and Fake News Online","author":"Rainie Lee"},{"key":"e_1_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/2818048.2819923"},{"key":"e_1_2_1_38_1","unstructured":"Michael D. Shear. 2016. Trump as Cyberbully in Chief? Twitter Attack on Union Boss Draws Fire. The New York Times.  Michael D. Shear. 2016. Trump as Cyberbully in Chief? Twitter Attack on Union Boss Draws Fire. The New York Times."},{"key":"e_1_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1469-7610.2007.01846.x"},{"key":"e_1_2_1_40_1","volume-title":"Kiesler","author":"Sproull Lee","year":"1992"},{"key":"e_1_2_1_41_1","volume-title":"Griesemer","author":"Star Susan Leigh","year":"1989"},{"key":"e_1_2_1_42_1","volume-title":"A general inductive approach for analyzing qualitative evaluation data. American journal of evaluation, 27(2), 237--246","author":"D.","year":"2006"},{"key":"e_1_2_1_43_1","volume-title":"Current Population Survey: Detailed occupation by sex and race","author":"U. S. Department of Labor. 2015."},{"key":"e_1_2_1_44_1","first-page":"20","article-title":"Balancing Audience and Privacy Tensions on Social Network Sites: Strategies of Highly Engaged Users","volume":"9","author":"Vitak Jessica","year":"2015","journal-title":"International Journal of Communication"},{"key":"e_1_2_1_45_1","volume-title":"Parks","author":"Walther Joseph B.","year":"2002"},{"key":"e_1_2_1_46_1","unstructured":"Christina Warren. 2017. Twitter's New Abuse Filter Works Great If Your Name Is Mike Pence. Gizmodo.  Christina Warren. 2017. Twitter's New Abuse Filter Works Great If Your Name Is Mike Pence. Gizmodo."},{"key":"e_1_2_1_47_1","unstructured":"Jeffrey Weeks. 1999. Discourse desire and sexual deviance: some problems in a history of homosexuality. Culture society and sexuality. A reader: 119--42.  Jeffrey Weeks. 1999. Discourse desire and sexual deviance: some problems in a history of homosexuality. Culture society and sexuality. A reader: 119--42."},{"key":"e_1_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1145\/1753846.1753857"},{"key":"e_1_2_1_49_1","unstructured":"Rhiannon Williams. 2014. Facebook's 71 gender options come to UK users. The Telegraph.  Rhiannon Williams. 2014. Facebook's 71 gender options come to UK users. The Telegraph."},{"key":"e_1_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1145\/3038912.3052591"},{"key":"e_1_2_1_51_1","first-page":"1","article-title":"Detection of harassment on web 2.0","volume":"2","author":"Yin Dawei","year":"2009","journal-title":"Proceedings of the Content Analysis in the WEB"}],"container-title":["Proceedings of the ACM on Human-Computer Interaction"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3134659","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3134659","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T02:11:24Z","timestamp":1750212684000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3134659"}},"subtitle":["Design Insights from HeartMob"],"short-title":[],"issued":{"date-parts":[[2017,12,6]]},"references-count":51,"journal-issue":{"issue":"CSCW","published-print":{"date-parts":[[2017,12,6]]}},"alternative-id":["10.1145\/3134659"],"URL":"https:\/\/doi.org\/10.1145\/3134659","relation":{},"ISSN":["2573-0142"],"issn-type":[{"value":"2573-0142","type":"electronic"}],"subject":[],"published":{"date-parts":[[2017,12,6]]},"assertion":[{"value":"2017-12-06","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}