{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,3]],"date-time":"2026-04-03T06:57:56Z","timestamp":1775199476926,"version":"3.50.1"},"reference-count":84,"publisher":"Association for Computing Machinery (ACM)","issue":"CSCW2","license":[{"start":{"date-parts":[[2020,10,14]],"date-time":"2020-10-14T00:00:00Z","timestamp":1602633600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"National Science Foundation","award":["1704369,1936741"],"award-info":[{"award-number":["1704369,1936741"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["Proc. ACM Hum.-Comput. Interact."],"published-print":{"date-parts":[[2020,10,14]]},"abstract":"<jats:p>Within online communities, social norms that both set expectations for and regulate behavior can be vital to the overall welfare of the community--particularly in the context of the privacy and safety of its members. For communities where the cost of regulatory failure can be high, it is important to understand both the conditions under which norms might be effective, and when they might fail. As a case study, we consider transformative fandom, a creative community dedicated to reimagining existing media in often subversive ways. In part due to the marginalized status of many members, there are strong, longstanding norms to protect the community. Through an interview study with 25 fandom participants, we investigate social norms that have been largely effective over time at maintaining member privacy and safety, but also break down under certain circumstances. Catalysts for these breakdowns include tensions between sub-communities and an increasing presence of outsiders, though most prominently, we identify a disconnect between the norms the community needs to support and the design of the platforms they occupy.<\/jats:p>","DOI":"10.1145\/3415226","type":"journal-article","created":{"date-parts":[[2020,10,15]],"date-time":"2020-10-15T22:27:49Z","timestamp":1602800869000},"page":"1-24","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":47,"title":["Social Norm Vulnerability and its Consequences for Privacy and Safety in an Online Community"],"prefix":"10.1145","volume":"4","author":[{"given":"Brianna","family":"Dym","sequence":"first","affiliation":[{"name":"University of Colorado Boulder, Boulder, CO, USA"}]},{"given":"Casey","family":"Fiesler","sequence":"additional","affiliation":[{"name":"University of Colorado Boulder, Boulder, CO, USA"}]}],"member":"320","published-online":{"date-parts":[[2020,10,15]]},"reference":[{"key":"e_1_2_1_1_1","volume-title":"Proceedings of the ACM on Human-Computer Interaction 3, CSCW","author":"Allison Kimberley R","year":"2019"},{"key":"e_1_2_1_2_1","volume-title":"Personal Space, Territory, and Crowding.","author":"Altman Irwin","year":"1975"},{"key":"e_1_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/2818048.2819927"},{"key":"e_1_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/3359237"},{"key":"e_1_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/3173574.3173732"},{"key":"e_1_2_1_6_1","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3241044","article-title":"Responding to sensitive disclosures on social media: a decision-making framework","volume":"25","author":"Andalibi Nazanin","year":"2018","journal-title":"ACM Transactions on Computer-Human Interaction (TOCHI)"},{"key":"e_1_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/3234942"},{"key":"e_1_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/3274288"},{"key":"e_1_2_1_9_1","volume-title":"Enterprising Women: Television Fandom and the Creation of Popular Myth","author":"Bacon-Smith Camille","year":"1992"},{"key":"e_1_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1177\/1043463102014002003"},{"key":"e_1_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1177\/1086296X18820659"},{"key":"e_1_2_1_12_1","volume-title":"Twelfth International AAAI Conference on Web and Social Media.","author":"Blackwell Lindsay","year":"2018"},{"key":"e_1_2_1_13_1","volume-title":"Social steganography: Privacy in networked publics","author":"Boyd Danah","year":"2011"},{"key":"e_1_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1191\/1478088706qp063oa"},{"key":"e_1_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1215\/23289252-8143407"},{"key":"e_1_2_1_16_1","volume-title":"Fan Culture: Theory\/Practice","author":"Busse Kristina"},{"key":"e_1_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/2818048.2819934"},{"key":"e_1_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/3173574.3173824"},{"key":"e_1_2_1_19_1","unstructured":"Centrumlumina. 2013. AO3 Census Masterpost. http:\/\/centrumlumina.tumblr.com\/post\/63208278796\/ ao3-census-masterpost  Centrumlumina. 2013. AO3 Census Masterpost. http:\/\/centrumlumina.tumblr.com\/post\/63208278796\/ ao3-census-masterpost"},{"key":"e_1_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/3173574.3174240"},{"key":"e_1_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/3134666"},{"key":"e_1_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/3274301"},{"key":"e_1_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1177\/1461444817744784"},{"key":"e_1_2_1_24_1","unstructured":"Robert B Cialdini and Melanie R Trost. 1998. Social influence: Social norms conformity and compliance. (1998).  Robert B Cialdini and Melanie R Trost. 1998. Social influence: Social norms conformity and compliance. (1998)."},{"key":"e_1_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1080\/15295036.2015.1130846"},{"key":"e_1_2_1_26_1","volume-title":"Simblr famous and SimSecret infamous: Performance, community norms, and shaming among fans of The Sims. Transformative Works and Cultures 18","author":"Deller Ruth A","year":"2015"},{"key":"e_1_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/3274313"},{"key":"e_1_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/3359256"},{"key":"e_1_2_1_29_1","volume-title":"Transformative Works and Cultures 28","author":"Dym Brianna","year":"2018"},{"key":"e_1_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/3272973.3274089"},{"key":"e_1_2_1_31_1","volume-title":"but You Don't Exist With It?: Strategic Anonymity in the Social Lives of Adolescents. Social Media+ Society 2, 4","author":"Ellison Nicole B","year":"2016"},{"key":"e_1_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/2998181.2998342"},{"key":"e_1_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/3359328"},{"key":"e_1_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/3361122"},{"key":"e_1_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/3392847"},{"key":"e_1_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1609\/icwsm.v12i1.15033"},{"key":"e_1_2_1_37_1","volume-title":"Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems - CHI '16. 2574--2585","author":"Fiesler Casey"},{"key":"e_1_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.lisr.2019.01.001"},{"key":"e_1_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/3134682"},{"key":"e_1_2_1_40_1","unstructured":"James Paul Gee. 2005. Semiotic social spaces and affinity spaces. In Beyond communities of practice language power and social context. 214--232.  James Paul Gee. 2005. Semiotic social spaces and affinity spaces. In Beyond communities of practice language power and social context. 214--232."},{"key":"e_1_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/3392822"},{"key":"e_1_2_1_42_1","volume-title":"shipping, and boundary regulation in fandom. Transformative Works and Cultures 22","author":"Gonzalez Victoria M","year":"2016"},{"key":"e_1_2_1_43_1","volume-title":"How many interviews are enough? An experiment with data saturation and variability. Field methods 18, 1","author":"Guest Greg","year":"2006"},{"key":"e_1_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1145\/3274332"},{"key":"e_1_2_1_45_1","volume-title":"Tumblr was a trans technology: the meaning, importance, history, and future of trans technologies. Feminist Media Studies","author":"Haimson Oliver L","year":"2019"},{"key":"e_1_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1145\/2598510.2600887"},{"key":"e_1_2_1_47_1","volume-title":"Social identity, self-categorization, and the communication of group norms. Communication theory 16, 1","author":"Hogg Michael A","year":"2006"},{"key":"e_1_2_1_48_1","volume-title":"The enforcement of norms: Group cohesion and meta-norms. Social psychology quarterly","author":"Horne Christine","year":"2001"},{"key":"e_1_2_1_49_1","volume-title":"Textual Poachers: Television Fans and Participatory Culture","author":"Jenkins Henry","year":"1992"},{"key":"e_1_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1145\/3338243"},{"key":"e_1_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1145\/3359252"},{"key":"e_1_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1145\/2207676.2208552"},{"key":"e_1_2_1_53_1","volume-title":"Twelfth International AAAI Conference on Web and Social Media.","author":"Kasunic Anna","year":"2018"},{"key":"e_1_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.1145\/3359146"},{"key":"e_1_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.1145\/2858036.2858356"},{"key":"e_1_2_1_56_1","volume-title":"Building successful online communities: Evidence-based social design","author":"Kraut Robert E"},{"key":"e_1_2_1_57_1","doi-asserted-by":"publisher","DOI":"10.1145\/3134699"},{"key":"e_1_2_1_58_1","doi-asserted-by":"publisher","DOI":"10.1002\/asi.22800"},{"key":"e_1_2_1_59_1","doi-asserted-by":"publisher","DOI":"10.1177\/1367877912459132"},{"key":"e_1_2_1_60_1","doi-asserted-by":"publisher","DOI":"10.1145\/3359179"},{"key":"e_1_2_1_61_1","doi-asserted-by":"publisher","DOI":"10.1080\/00380237.2018.1544514"},{"key":"e_1_2_1_62_1","doi-asserted-by":"publisher","DOI":"10.1145\/3359309"},{"key":"e_1_2_1_63_1","doi-asserted-by":"publisher","DOI":"10.1080\/1369118X.2011.641993"},{"key":"e_1_2_1_64_1","doi-asserted-by":"publisher","DOI":"10.1073\/pnas.1813486116"},{"key":"e_1_2_1_65_1","doi-asserted-by":"publisher","DOI":"10.1145\/3313831.3376167"},{"key":"e_1_2_1_66_1","volume-title":"Proceedings of the 19th ACM conference on computer-supported cooperative work & social computing. 848--859","author":"Morioka Tsubasa","year":"2016"},{"key":"e_1_2_1_67_1","first-page":"119","article-title":"Privacy as contextual integrity","volume":"79","author":"Nissenbaum Helen","year":"2004","journal-title":"Wash. L. Rev."},{"key":"e_1_2_1_68_1","volume-title":"Disturbing hegemonic discourse: Nonbinary gender and sexual orientation labeling on Tumblr. Social Media+ Society 2, 3","author":"Oakley Abigail","year":"2016"},{"key":"e_1_2_1_69_1","doi-asserted-by":"publisher","DOI":"10.1257\/jep.14.3.137"},{"key":"e_1_2_1_70_1","volume-title":"Proceedings of the International AAAI Conference on Web and Social Media","volume":"13","author":"Redmiles Elissa M","year":"2019"},{"key":"e_1_2_1_71_1","doi-asserted-by":"publisher","DOI":"10.1145\/3274424"},{"key":"e_1_2_1_72_1","doi-asserted-by":"publisher","DOI":"10.1145\/3274425"},{"key":"e_1_2_1_73_1","volume-title":"Seventh International AAAI Conference on Weblogs and Social Media.","author":"Schoenebeck Sarita Yardi","year":"2013"},{"key":"e_1_2_1_74_1","doi-asserted-by":"publisher","DOI":"10.1145\/2998181.2998277"},{"key":"e_1_2_1_75_1","volume-title":"Proceedings of the ACM Conference on Computer-Supported Cooperative Work and Social Computing (CSCW'18)","author":"Seering Joseph","year":"2018"},{"key":"e_1_2_1_76_1","unstructured":"Irving Seidman. 2006. Interviewing as qualitative research: A guide for researchers in education and the social sciences. Teachers college press.  Irving Seidman. 2006. Interviewing as qualitative research: A guide for researchers in education and the social sciences. Teachers college press."},{"key":"e_1_2_1_77_1","doi-asserted-by":"publisher","DOI":"10.1080\/15295036.2012.755053"},{"key":"e_1_2_1_78_1","volume-title":"The interface as discourse: The production of norms through web design. New media & society 17, 7","author":"Stanfill Mel","year":"2015"},{"key":"e_1_2_1_79_1","volume-title":"The unbearable whiteness of fandom and fan studies. A Companion to Media Fandom and Fan Studies","author":"Stanfill Mel","year":"2018"},{"key":"e_1_2_1_80_1","unstructured":"John Tulloch Henry Jenkins etal 1995. Science fiction audiences: watching Doctor Who and Star Trek. Routledge.  John Tulloch Henry Jenkins et al. 1995. Science fiction audiences: watching Doctor Who and Star Trek. Routledge."},{"key":"e_1_2_1_81_1","doi-asserted-by":"publisher","DOI":"10.1145\/3313831.3376497"},{"key":"e_1_2_1_82_1","first-page":"166","article-title":"Privacy and freedom","volume":"25","author":"Westin Alan F","year":"1968","journal-title":"Washington and Lee Law Review"},{"key":"e_1_2_1_83_1","doi-asserted-by":"publisher","DOI":"10.1145\/2858036.2858317"},{"key":"e_1_2_1_84_1","doi-asserted-by":"publisher","DOI":"10.1145\/2470654.2466468"}],"container-title":["Proceedings of the ACM on Human-Computer Interaction"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3415226","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3415226","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3415226","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T22:03:11Z","timestamp":1750197791000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3415226"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,10,14]]},"references-count":84,"journal-issue":{"issue":"CSCW2","published-print":{"date-parts":[[2020,10,14]]}},"alternative-id":["10.1145\/3415226"],"URL":"https:\/\/doi.org\/10.1145\/3415226","relation":{},"ISSN":["2573-0142"],"issn-type":[{"value":"2573-0142","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,10,14]]},"assertion":[{"value":"2020-10-15","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}