{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,26]],"date-time":"2026-02-26T14:04:09Z","timestamp":1772114649334,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":73,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,7,22]],"date-time":"2020-07-22T00:00:00Z","timestamp":1595376000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,7,22]]},"DOI":"10.1145\/3400806.3400808","type":"proceedings-article","created":{"date-parts":[[2020,6,29]],"date-time":"2020-06-29T18:44:21Z","timestamp":1593456261000},"page":"5-13","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":6,"title":["Analyzing Hate Speech with Incel-Hunters\u2019 Critiques"],"prefix":"10.1145","author":[{"given":"Yisi","family":"Sang","sequence":"first","affiliation":[{"name":"Syracuse University"}]},{"given":"Jeffrey","family":"Stanton","sequence":"additional","affiliation":[{"name":"Syracuse University"}]}],"member":"320","published-online":{"date-parts":[[2020,7,22]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Proceedings of the 17th international conference on World Wide Web, 665\u2013674","author":"Adamic Lada A."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/2339530.2339665"},{"key":"e_1_3_2_1_3_1","volume-title":"Sixth International AAAI Conference on Weblogs and Social Media.","author":"Bandari Roja"},{"key":"e_1_3_2_1_4_1","volume-title":"Cultural Practices of Victimhood","author":"Blommaert Jan"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"crossref","unstructured":"Justus Bross Keven Richly Matthias Kohnen and Christoph Meinel. 2012. Identifying the top-dogs of the blogosphere. Social network analysis and mining 2 1: 53\u201367. Justus Bross Keven Richly Matthias Kohnen and Christoph Meinel. 2012. Identifying the top-dogs of the blogosphere. Social network analysis and mining 2 1: 53\u201367.","DOI":"10.1007\/s13278-011-0027-7"},{"key":"e_1_3_2_1_6_1","volume-title":"Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems, 3213\u20133226","author":"Chancellor Stevie"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/3025453.3026018"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1177\/1461444814543163"},{"key":"e_1_3_2_1_9_1","volume-title":"Bert: Pre-training of deep bidirectional transformers for language understanding. arXiv preprint arXiv:1810.04805.","author":"Devlin Jacob","year":"2018"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/1958824.1958844"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"crossref","unstructured":"Karthik Dinakar Birago Jones Catherine Havasi Henry Lieberman and Rosalind Picard. 2012. Common sense reasoning for detection prevention and mitigation of cyberbullying. ACM Transactions on Interactive Intelligent Systems (TiiS)2 3: 1\u201330. Karthik Dinakar Birago Jones Catherine Havasi Henry Lieberman and Rosalind Picard. 2012. Common sense reasoning for detection prevention and mitigation of cyberbullying. ACM Transactions on Interactive Intelligent Systems (TiiS)2 3: 1\u201330.","DOI":"10.1145\/2362394.2362400"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/2740908.2742760"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"crossref","unstructured":"Gunther Eysenbach John Powell Marina Englesakis Carlos Rizo and Anita Stern. 2004. Health related virtual communities and electronic support groups: systematic review of the effects of online peer to peer interactions. Bmj 328 7449: 1166. Gunther Eysenbach John Powell Marina Englesakis Carlos Rizo and Anita Stern. 2004. Health related virtual communities and electronic support groups: systematic review of the effects of online peer to peer interactions. Bmj 328 7449: 1166.","DOI":"10.1136\/bmj.328.7449.1166"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/i-Society18435.2011.5978461"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"crossref","volume-title":"Custodians of the Internet: Platforms, content moderation, and the hidden decisions that shape social media","author":"Gillespie Tarleton","DOI":"10.12987\/9780300235029"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1177\/1097184X17706401"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.14257\/ijmue.2015.10.4.21"},{"key":"e_1_3_2_1_18_1","first-page":"42","article-title":"The virtues of moderation","volume":"17","author":"Grimmelmann James","year":"2015","journal-title":"Yale JL & Tech."},{"key":"e_1_3_2_1_19_1","first-page":"1","article-title":"topicmodels: An R package for fitting topic models","volume":"40","author":"Hornik Kurt","year":"2011","journal-title":"Journal of statistical software"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1075\/jlac.00026.jak"},{"key":"e_1_3_2_1_21_1","first-page":"7","article-title":"Pirates of Silicon Valley: State of exception and dispossession in Web 2.0","volume":"15","author":"Jakobsson Peter","year":"2010","journal-title":"First Monday"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"crossref","unstructured":"Shagun Jhaver Iris Birman Eric Gilbert and Amy Bruckman. 2019. Human-machine collaboration for content regulation: The case of Reddit Automoderator. ACM Transactions on Computer-Human Interaction (TOCHI)26 5: 1\u201335. Shagun Jhaver Iris Birman Eric Gilbert and Amy Bruckman. 2019. Human-machine collaboration for content regulation: The case of Reddit Automoderator. ACM Transactions on Computer-Human Interaction (TOCHI)26 5: 1\u201335.","DOI":"10.1145\/3338243"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"crossref","unstructured":"Shagun Jhaver Sucheta Ghoshal Amy Bruckman and Eric Gilbert. 2018. Online harassment and content moderation: The case of blocklists. ACM Transactions on Computer-Human Interaction (TOCHI)25 2: 1\u201333. Shagun Jhaver Sucheta Ghoshal Amy Bruckman and Eric Gilbert. 2018. Online harassment and content moderation: The case of blocklists. ACM Transactions on Computer-Human Interaction (TOCHI)25 2: 1\u201333.","DOI":"10.1145\/3185593"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/2858036.2858356"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"crossref","unstructured":"Sara Kiesler Robert Kraut Paul Resnick and Aniket Kittur. 2012. Regulating behavior in online communities. Building successful online communities: Evidence-based social design: 125\u2013178. Sara Kiesler Robert Kraut Paul Resnick and Aniket Kittur. 2012. Regulating behavior in online communities. Building successful online communities: Evidence-based social design: 125\u2013178.","DOI":"10.7551\/mitpress\/8472.003.0005"},{"key":"e_1_3_2_1_26_1","first-page":"1598","article-title":"The new governors: The people, rules, and processes governing online speech","volume":"131","author":"Klonick Kate","year":"2017","journal-title":"Harv. L. Rev."},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v27i1.8539"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/985692.985761"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11518-009-5095-0"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1108\/JD-06-2012-0078"},{"key":"e_1_3_2_1_31_1","volume-title":"Bernstein","author":"Malone Thomas W.","year":"2015"},{"key":"e_1_3_2_1_32_1","volume-title":"Internet Politics and Policy conference","author":"Matias J. Nathan","year":"2016"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-45490-X_16"},{"key":"e_1_3_2_1_34_1","unstructured":"Aiden R. McGillicuddy Jean-Gregoire Bernard and Jocelyn Ann Cranefield. 2016. Controlling bad behavior in online communities: An examination of moderation work. Aiden R. McGillicuddy Jean-Gregoire Bernard and Jocelyn Ann Cranefield. 2016. Controlling bad behavior in online communities: An examination of moderation work."},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/W16-3638"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1467-8640.2012.00460.x"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-57351-9_6"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1109\/SocialCom.2010.185"},{"key":"e_1_3_2_1_39_1","volume-title":"Content Moderation Operations. Techdirt.Retrieved","author":"Jan","year":"2018"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/2872427.2883062"},{"key":"e_1_3_2_1_41_1","volume-title":"Hate speech. Encyclopedia of the American constitution 3, 2: 1277\u20131279","author":"Nockleby John T."},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1145\/2858036.2858389"},{"key":"e_1_3_2_1_43_1","volume-title":"Chi","author":"Paul Sharoda A.","year":"2012"},{"key":"e_1_3_2_1_44_1","volume-title":"Proceedings of the 2014 conference on empirical methods in natural language processing (EMNLP), 1532\u20131543","author":"Pennington Jeffrey"},{"key":"e_1_3_2_1_45_1","volume-title":"Theories of emotion","author":"Plutchik Robert"},{"key":"e_1_3_2_1_46_1","volume-title":"Online communities: Designing usability and supporting socialbilty","author":"Preece Jenny"},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0129703"},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1145\/2872518.2890096"},{"key":"e_1_3_2_1_49_1","volume-title":"Behind the screen: The hidden digital labor of commercial content moderation","author":"Roberts Sarah T."},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1145\/3292522.3326032"},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1145\/361219.361220"},{"key":"e_1_3_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1177\/1461444818821316"},{"key":"e_1_3_2_1_53_1","doi-asserted-by":"crossref","unstructured":"Dmitriy Selivanov and Qing Wang. 2016. text2vec: Modern text mining framework for R. Computer software manual](R package version 0.4. 0). Retrieved from https:\/\/CRAN. R-project. org\/package= text2vec. Dmitriy Selivanov and Qing Wang. 2016. text2vec: Modern text mining framework for R. Computer software manual](R package version 0.4. 0). Retrieved from https:\/\/CRAN. R-project. org\/package= text2vec.","DOI":"10.32614\/CRAN.package.text2vec"},{"key":"e_1_3_2_1_54_1","volume-title":"Tenth International AAAI Conference on Web and Social Media.","author":"Silva Leandro","year":"2016"},{"key":"e_1_3_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.1007\/s13278-016-0350-0"},{"key":"e_1_3_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.5555\/1304596.1304846"},{"key":"e_1_3_2_1_57_1","doi-asserted-by":"publisher","DOI":"10.1145\/2207676.2208610"},{"key":"e_1_3_2_1_58_1","volume-title":"Ninth International AAAI Conference on Web and Social Media.","author":"Stoddard Greg","year":"2015"},{"key":"e_1_3_2_1_59_1","doi-asserted-by":"publisher","DOI":"10.1145\/1553374.1553515"},{"key":"e_1_3_2_1_60_1","doi-asserted-by":"publisher","DOI":"10.5555\/2390374.2390377"},{"key":"e_1_3_2_1_61_1","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/N16-2013"},{"key":"e_1_3_2_1_62_1","doi-asserted-by":"publisher","DOI":"10.1007\/s13278-014-0173-9"},{"key":"e_1_3_2_1_63_1","doi-asserted-by":"publisher","DOI":"10.1145\/3290605.3300390"},{"key":"e_1_3_2_1_64_1","doi-asserted-by":"publisher","DOI":"10.1145\/3038912.3052591"},{"key":"e_1_3_2_1_65_1","volume-title":"The Baffler. Retrieved","year":"2020"},{"key":"e_1_3_2_1_66_1","first-page":"2016","volume-title":"Retrieved","author":"Zuckerberg","year":"2020"},{"key":"e_1_3_2_1_67_1","volume-title":"Retrieved","author":"Ohio Shooting","year":"2020"},{"key":"e_1_3_2_1_68_1","volume-title":"Retrieved","author":"The","year":"2020"},{"key":"e_1_3_2_1_69_1","volume-title":"Retrieved","author":"After Toronto","year":"2020"},{"key":"e_1_3_2_1_70_1","volume-title":"Retrieved","author":"Suspect Was Toronto","year":"2020"},{"key":"e_1_3_2_1_71_1","volume-title":"Retrieved","author":"Google","year":"2020"},{"key":"e_1_3_2_1_72_1","volume-title":"pushshift.io. Retrieved","author":"Statistics Reddit","year":"2020"},{"key":"e_1_3_2_1_73_1","volume-title":"reddit. Retrieved","year":"2020"}],"event":{"name":"SMSociety'20: International Conference on Social Media and Society","location":"Toronto ON Canada","acronym":"SMSociety'20"},"container-title":["International Conference on Social Media and Society"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3400806.3400808","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3400806.3400808","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T22:38:43Z","timestamp":1750199923000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3400806.3400808"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,7,22]]},"references-count":73,"alternative-id":["10.1145\/3400806.3400808","10.1145\/3400806"],"URL":"https:\/\/doi.org\/10.1145\/3400806.3400808","relation":{},"subject":[],"published":{"date-parts":[[2020,7,22]]},"assertion":[{"value":"2020-07-22","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}