{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,13]],"date-time":"2026-04-13T21:54:59Z","timestamp":1776117299194,"version":"3.50.1"},"reference-count":74,"publisher":"Association for Computing Machinery (ACM)","issue":"CSCW2","license":[{"start":{"date-parts":[[2022,10,18]],"date-time":"2022-10-18T00:00:00Z","timestamp":1666051200000},"content-version":"vor","delay-in-days":370,"URL":"http:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["2016061, 1942610, 2114407, 2016058, 2114411"],"award-info":[{"award-number":["2016061, 1942610, 2114407, 2016058, 2114411"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100014013","name":"UKRI","doi-asserted-by":"crossref","award":["EP\/V011189\/1"],"award-info":[{"award-number":["EP\/V011189\/1"]}],"id":[{"id":"10.13039\/100014013","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["Proc. ACM Hum.-Comput. Interact."],"published-print":{"date-parts":[[2021,10,13]]},"abstract":"<jats:p>While the Internet has dramatically increased the exposure that research can receive, it has also facilitated harassment against scholars. To understand the impact that these attacks can have on the work of researchers, we perform a series of systematic interviews with researchers including academics, journalists, and activists, who have experienced targeted, Internet-facilitated harassment. We provide a framework for understanding the types of harassers that target researchers, the harassment that ensues, and the personal and professional impact on individuals and academic freedom. We then study preventative and remedial strategies available, and the institutions that prevent some of these strategies from being more effective. Finally, we discuss the ethical structures that could facilitate more equitable access to participating in research without serious personal suffering.<\/jats:p>","DOI":"10.1145\/3476082","type":"journal-article","created":{"date-parts":[[2021,10,19]],"date-time":"2021-10-19T02:32:07Z","timestamp":1634610727000},"page":"1-32","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":32,"title":["\"I'm a Professor, which isn't usually a dangerous job\": Internet-facilitated Harassment and Its Impact on Researchers"],"prefix":"10.1145","volume":"5","author":[{"given":"Periwinkle","family":"Doerfler","sequence":"first","affiliation":[{"name":"New York University Tandon School of Engineering, Brooklyn, NY, USA"}]},{"given":"Andrea","family":"Forte","sequence":"additional","affiliation":[{"name":"Drexel University, Philadelphia, PA, USA"}]},{"given":"Emiliano","family":"De Cristofaro","sequence":"additional","affiliation":[{"name":"University College London, London, United Kingdom"}]},{"given":"Gianluca","family":"Stringhini","sequence":"additional","affiliation":[{"name":"Boston University, Boston, MA, USA"}]},{"given":"Jeremy","family":"Blackburn","sequence":"additional","affiliation":[{"name":"Binghamton University, Binghamton, NY, USA"}]},{"given":"Damon","family":"McCoy","sequence":"additional","affiliation":[{"name":"New York University, New York, NY, USA"}]}],"member":"320","published-online":{"date-parts":[[2021,10,18]]},"reference":[{"key":"e_1_2_1_1_1","unstructured":"[n.d.]. Trint Transcription. https:\/\/trint.com\/technology"},{"key":"e_1_2_1_2_1","unstructured":"2020. A Letter on Justice and Open Debate. https:\/\/harpers.org\/a-letter-on-justice-and-open-debate\/"},{"key":"e_1_2_1_3_1","unstructured":"2021. Alex Jones. https:\/\/en.wikipedia.org\/wiki\/Alex_Jones"},{"key":"e_1_2_1_4_1","unstructured":"2021. David Duke. https:\/\/en.wikipedia.org\/wiki\/David_Duke"},{"key":"e_1_2_1_5_1","unstructured":"Samuel J Abrams. 2018. One of the Most Liberal Groups in America. https:\/\/www.insidehighered.com\/views\/2018\/11\/08\/college-administrators-are-more-liberal-other-groups-including-faculty-members"},{"key":"e_1_2_1_6_1","unstructured":"Samuel J Abrams. 2019. When a student mob came for my job my college did not support me. https:\/\/spectator.us\/viewpoint-diversity-sarah-lawrence\/"},{"key":"e_1_2_1_7_1","unstructured":"Michael Bernstein Andr\u00e9s Monroy-Hern\u00e1ndez Drew Harry Paul Andr\u00e9 Katrina Panovich and Greg Vargas. 2011. 4chan and \/b: An Analysis of Anonymity and Ephemerality in a Large Online Community. In ICWSM."},{"key":"e_1_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1177\/004912418101000205"},{"key":"e_1_2_1_9_1","doi-asserted-by":"crossref","unstructured":"Jeremy Blackburn and Haewoon Kwak. 2014. STFU NOOB! predicting crowdsourced decisions on toxic behavior in online games. In WWW.","DOI":"10.1145\/2566486.2567987"},{"key":"e_1_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1609\/icwsm.v12i1.15036"},{"key":"e_1_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/3134659"},{"key":"e_1_2_1_12_1","doi-asserted-by":"crossref","unstructured":"Virginia Braun and Victoria Clarke. 2012. Thematic analysis. (2012).","DOI":"10.1037\/13620-004"},{"key":"e_1_2_1_13_1","article-title":"Cyber Bullying: An Old Problem in a New Guise","volume":"15","author":"Campbell Marilyn","year":"2005","unstructured":"Marilyn Campbell. 2005. Cyber Bullying: An Old Problem in a New Guise? Journal of Psychologists and Counsellors in Schools, Vol. 15, 1 (2005).","journal-title":"Journal of Psychologists and Counsellors in Schools"},{"key":"e_1_2_1_14_1","volume-title":"Gianluca Stringhini, and Athena Vakali.","author":"Chatzakou Despoina","year":"2017","unstructured":"Despoina Chatzakou, Nicolas Kourtellis, Jeremy Blackburn, Emiliano De Cristofaro, Gianluca Stringhini, and Athena Vakali. 2017. Mean Birds: Detecting Aggression and Bullying on Twitter. In ACM WebSci (WebSci '17). 10 pages."},{"key":"e_1_2_1_15_1","doi-asserted-by":"crossref","unstructured":"Ying Chen Yilu Zhou Sencun Zhu and Heng Xu. 2012. Detecting Offensive Language in Social Media to Protect Adolescent Online Safety. In PASSAT and SocialCom.","DOI":"10.1109\/SocialCom-PASSAT.2012.55"},{"key":"e_1_2_1_16_1","unstructured":"CNN. 2020. A teacher is beheaded and France's war over secularism freedom of speech and religious equality reignites. https:\/\/www.cnn.com\/2020\/10\/21\/europe\/france-secularism-macron-samuel-paty-intl\/index.html."},{"key":"e_1_2_1_17_1","volume-title":"Unequal profession: race and gender in legal academia","author":"Deo Meera E.","unstructured":"Meera E. Deo. 2019. Unequal profession: race and gender in legal academia .Stanford University Press."},{"key":"e_1_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2018.02.010"},{"key":"e_1_2_1_19_1","volume-title":"The Social Mobile Web","volume":"11","author":"Dinakar Karthik","year":"2011","unstructured":"Karthik Dinakar, Roi Reichart, and Henry Lieberman. 2011. Modeling the detection of Textual Cyberbullying. The Social Mobile Web, Vol. 11 (2011)."},{"key":"e_1_2_1_20_1","volume-title":"Ethics and Information Technology","volume":"18","author":"Douglas David M.","year":"2016","unstructured":"David M. Douglas. 2016. Doxing: A Conceptual Analysis. Ethics and Information Technology, Vol. 18, 3 (2016)."},{"key":"e_1_2_1_21_1","volume-title":"Switzerland, the United Kingdom, and the United States","author":"Eckert Stine","year":"2018","unstructured":"Stine Eckert. 2018. Fighting for recognition: Online abuse of women bloggers in Germany, Switzerland, the United Kingdom, and the United States. New Media & Society, Vol. 20, 4 (2018)."},{"key":"e_1_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1007\/s40653-018-0207-y"},{"key":"e_1_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1016\/0001-8791(88)90012-7"},{"key":"e_1_2_1_24_1","unstructured":"Colleen Flaherty. 2020. Scholars pledge not to speak at Ole Miss until it reinstates a colleague. https:\/\/www.insidehighered.com\/news\/2020\/12\/17\/scholars-pledge-not-speak-ole-miss-until-it-reinstates-colleague"},{"key":"e_1_2_1_25_1","doi-asserted-by":"crossref","unstructured":"Claudia Flores-Saviaga Brian Keegan and Saiph Savage. 2018. Mobilizing the trump train: Understanding collective action in a political trolling community. In ICWSM.","DOI":"10.1609\/icwsm.v12i1.15024"},{"key":"e_1_2_1_26_1","unstructured":"ADF Center for Academic Freedom Staff. 2020. A University Effectively Fired This Professor after He Spoke at a Conservative Think Tank. https:\/\/centerforacademicfreedom.org\/a-university-effectively-fired-this-professor-after-he-spoke-at-a-conservative-think-tank\/"},{"key":"e_1_2_1_27_1","unstructured":"Antigoni-Maria Founta Constantinos Djouvas Despoina Chatzakou Ilias Leontiadis Jeremy Blackburn Gianluca Stringhini Athena Vakali Michael Sirivianos and Nicolas Kourtellis. 2018. Large Scale Crowdsourcing and Characterization of Twitter Abusive Behavior. In ICWSM."},{"key":"e_1_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1080\/14680777.2018.1447334"},{"key":"e_1_2_1_29_1","volume-title":"The hidden costs of connectivity: nature and effects of scholars' online harassment. Learning, Media and Technology","author":"Gosse Chandell","year":"2021","unstructured":"Chandell Gosse, George Veletsianos, Jaigris Hodson, Shandell Houlden, Tonia A Dousay, Patrick R Lowenthal, and Nathan Hall. 2021. The hidden costs of connectivity: nature and effects of scholars' online harassment. Learning, Media and Technology (2021), 1--17."},{"key":"e_1_2_1_30_1","first-page":"143","article-title":"Cyber-aggression: Definition and concept of cyberbullying","volume":"20","author":"Grigg Dorothy Wunmi","year":"2010","unstructured":"Dorothy Wunmi Grigg. 2010. Cyber-aggression: Definition and concept of cyberbullying. Journal of Psychologists and Counsellors in Schools, Vol. 20, 2 (2010), 143--156.","journal-title":"Journal of Psychologists and Counsellors in Schools"},{"key":"e_1_2_1_31_1","unstructured":"Karen Hao. 2020. We read the paper that forced Timnit Gebru out of Google. Here's what it says. https:\/\/www.technologyreview.com\/2020\/12\/04\/1013294\/google-ai-ethics-research-paper-forced-out-timnit-gebru\/"},{"key":"e_1_2_1_32_1","unstructured":"Shuang Hao Kevin Borgolte Nick Nikiforakis Gianluca Stringhini Manuel Egele Michael Eubanks Brian Krebs and Giovanni Vigna. 2015. Drops for Stuff: An Analysis of Reshipping Mule Scams. In ACM CCS."},{"key":"e_1_2_1_33_1","volume-title":"Nicolas Kourtellis, Ilias Leontiadis, Riginos Samaras, Gianluca Stringhini, and Jeremy Blackburn.","author":"Hine Gabriel Emile","year":"2016","unstructured":"Gabriel Emile Hine, Jeremiah Onaolapo, Emiliano De Cristofaro, Nicolas Kourtellis, Ilias Leontiadis, Riginos Samaras, Gianluca Stringhini, and Jeremy Blackburn. 2016. A Longitudinal Measurement Study of 4chan's Politically Incorrect Forum and its Effect on the Web. In ICWSM."},{"key":"e_1_2_1_34_1","volume-title":"\u201cTroll Culture","author":"Hodge Edwin","year":"2019","unstructured":"Edwin Hodge and Helga Hallgrimsdottir. 2019. Networks of Hate: The Alt-right, \u201cTroll Culture\u201d, and the Cultural Geography of Social Movement Spaces Online. Journal of Borderlands Studies (2019)."},{"key":"e_1_2_1_35_1","volume-title":"Rahat Ibn Rafiq, Richard Han, Qin Lv, and Shivakant Mishra.","author":"Hosseinmardi Homa","year":"2015","unstructured":"Homa Hosseinmardi, Sabrina Arredondo Mattson, Rahat Ibn Rafiq, Richard Han, Qin Lv, and Shivakant Mishra. 2015. Analyzing Labeled Cyberbullying Incidents on the Instagram Social Network. In SocInfo."},{"key":"e_1_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1080\/03075079.2014.929102"},{"key":"e_1_2_1_37_1","volume-title":"The social media response to Black Lives Matter: how Twitter users interact with Black Lives Matter through hashtag use. Ethnic and racial studies","author":"Ince Jelani","year":"2017","unstructured":"Jelani Ince, Fabio Rojas, and Clayton A Davis. 2017. The social media response to Black Lives Matter: how Twitter users interact with Black Lives Matter through hashtag use. Ethnic and racial studies, Vol. 40, 11 (2017)."},{"key":"e_1_2_1_38_1","volume-title":"Nicolas Kourtellis, and Michael Sirivianos.","author":"Ioannou Andri","year":"2018","unstructured":"Andri Ioannou, Jeremy Blackburn, Gianluca Stringhini, Emiliano De Cristofaro, Nicolas Kourtellis, and Michael Sirivianos. 2018. From risk factors to detection and intervention: a practical proposal for future work on cyberbullying. Behaviour & Information Technology, Vol. 37, 3 (2018)."},{"key":"e_1_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/3359252"},{"key":"e_1_2_1_40_1","article-title":"Online Harassment and Content Moderation: The Case of Blocklists","volume":"25","author":"Jhaver Shagun","year":"2018","unstructured":"Shagun Jhaver, Sucheta Ghoshal, Amy Bruckman, and Eric Gilbert. 2018. Online Harassment and Content Moderation: The Case of Blocklists. ACM Transactions on Computer-Human Interactions, Vol. 25, 2 (2018).","journal-title":"ACM Transactions on Computer-Human Interactions"},{"key":"e_1_2_1_41_1","volume-title":"Benya","author":"Johnson Paula A.","year":"2018","unstructured":"Paula A. Johnson, Sheila E. Widnall, and Frazier F. Benya. 2018. Sexual Harassment of Women: Climate, Culture, and Consequences in Academic Sciences, Engineering, and Medicine .The National Academies Press, Washington, DC. https:\/\/www.nap.edu\/catalog\/24994\/sexual-harassment-of-women-climate-culture-and-consequences-in-academic"},{"key":"e_1_2_1_42_1","volume-title":"Professors Are Targets In Online Culture Wars","author":"Kamenetz Anya","year":"2018","unstructured":"Anya Kamenetz. 2018. Professors Are Targets In Online Culture Wars; Some Fight Back. https:\/\/www.npr.org\/sections\/ed\/2018\/04\/04\/590928008\/professor-harassment."},{"key":"e_1_2_1_43_1","doi-asserted-by":"crossref","unstructured":"Cliff Lampe and Paul Resnick. 2004. Slash(Dot) and Burn: Distributed Moderation in a Large Online Conversation Space. In ACM CHI.","DOI":"10.1145\/985692.985761"},{"key":"e_1_2_1_44_1","unstructured":"Issie Lapowsky. 2021. How tech giants court and crush the people who study them. https:\/\/www.protocol.com\/nyu-facebook-researchers-scraping"},{"key":"e_1_2_1_45_1","volume-title":"Click Trajectories: End-to-End Analysis of the Spam Value Chain. In IEEE Symposium on Security & Privacy.","author":"Levchenko K.","unstructured":"K. Levchenko, A. Pitsillidis, N. Chachra, B. Enright, M. Felegyhazi, C. Grier, T. Halvorson, C. Kanich, C. Kreibich, H. Liu, D. McCoy, N. Weaver, V. Paxson, G. M. Voelker, and S. Savage. 2011. Click Trajectories: End-to-End Analysis of the Spam Value Chain. In IEEE Symposium on Security & Privacy."},{"key":"e_1_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1080\/21670811.2020.1811743"},{"key":"e_1_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP40001.2021.00061"},{"key":"e_1_2_1_48_1","volume-title":"Nicolas Kourtellis, Ilias Leontiadis, Jordi Luque Serrano, and Gianluca Stringhini.","author":"Mariconti Enrico","year":"2019","unstructured":"Enrico Mariconti, Guillermo Suarez-Tangil, Jeremy Blackburn, Emiliano De Cristofaro, Nicolas Kourtellis, Ilias Leontiadis, Jordi Luque Serrano, and Gianluca Stringhini. 2019. \u201cYou Know What to Do\u201d: Proactive Detection of YouTube Videos Targeted by Coordinated Hate Attacks. Proceedings of the ACM on Human-Computer Interaction, Vol. 3, CSCW (2019)."},{"key":"e_1_2_1_49_1","doi-asserted-by":"crossref","unstructured":"Alice Marwick. 2020. Cancelled: How Morally Motivated Networked Harassment Reinforces Norms. Fracturing Democracy: The Erosion of Civil Society in a Shifting Communication Ecology Symposium https:\/\/fractureddemocracy.journalism.wisc.edu\/uwcccr\/alice-e-marwick\/.","DOI":"10.1177\/20563051211021378"},{"key":"e_1_2_1_50_1","volume-title":"Morally motivated networked harassment as normative reinforcement. Social Media+Society","author":"Marwick Alice E","year":"2021","unstructured":"Alice E Marwick. 2021. Morally motivated networked harassment as normative reinforcement. Social Media+Society, Vol. 7, 2 (2021), 20563051211021378."},{"key":"e_1_2_1_51_1","volume-title":"Best practices for conducting risky research and protecting yourself from online harassment","author":"Marwick Alice E","year":"2016","unstructured":"Alice E Marwick, Lindsay Blackwell, and Katherine Lo. 2016. Best practices for conducting risky research and protecting yourself from online harassment (Data & Society Guide). New York: Data and Society Institute (2016)."},{"key":"e_1_2_1_52_1","volume-title":"How Reddit's algorithm, governance, and culture support toxic technocultures","author":"Massanari Adrienne","year":"2017","unstructured":"Adrienne Massanari. 2017. #Gamergate and The Fappening: How Reddit's algorithm, governance, and culture support toxic technocultures. New Media & Society, Vol. 19, 3 (2017)."},{"key":"e_1_2_1_53_1","volume-title":"Gaze. Social Media+Society","author":"Massanari Adrienne L.","year":"2018","unstructured":"Adrienne L. Massanari. 2018. Rethinking Research Ethics, Power, and the Risk of Visibility in the Era of the \u201cAlt-Right\u201d Gaze. Social Media+Society, Vol. 4, 2 (2018)."},{"key":"e_1_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382285"},{"key":"e_1_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.1177\/1555412016640408"},{"key":"e_1_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.1080\/14789940802197074"},{"key":"e_1_2_1_57_1","unstructured":"National Center for Education Statistics. 2021. NCES Fast Facts Tool. https:\/\/nces.ed.gov\/fastfacts\/display.asp?id=61."},{"key":"e_1_2_1_58_1","doi-asserted-by":"crossref","unstructured":"Chikashi Nobata Joel Tetreault Achint Thomas Yashar Mehdad and Yi Chang. 2016. Abusive Language Detection in Online User Content. In WWW.","DOI":"10.1145\/2872427.2883062"},{"key":"e_1_2_1_59_1","unstructured":"Zoe Quinn. 2017. Crash override: How Gamergate (nearly) destroyed my life and how we can win the fight against online hate. Hachette UK."},{"key":"e_1_2_1_60_1","doi-asserted-by":"publisher","DOI":"10.1300\/J013v28n02_03"},{"key":"e_1_2_1_61_1","volume-title":"Freyd","author":"Rosenthal Marina N.","year":"2016","unstructured":"Marina N. Rosenthal, Alec M. Smidt, and Jennifer J. Freyd. 2016. Still Second Class: Sexual Harassment of Graduate Students. Psychology of Women Quarterly, Vol. 40, 3 (2016)."},{"key":"e_1_2_1_62_1","first-page":"247","article-title":"From geek masculinity to Gamergate: the technological rationality of online abuse. Crime, Media","volume":"14","author":"Salter Michael","year":"2018","unstructured":"Michael Salter. 2018. From geek masculinity to Gamergate: the technological rationality of online abuse. Crime, Media, Culture, Vol. 14, 2 (2018), 247--264.","journal-title":"Culture"},{"key":"e_1_2_1_63_1","doi-asserted-by":"publisher","DOI":"10.1145\/3274424"},{"key":"e_1_2_1_64_1","volume-title":"Drawing from justice theories to support targets of online harassment. new media & society","author":"Schoenebeck Sarita","year":"2020","unstructured":"Sarita Schoenebeck, Oliver L Haimson, and Lisa Nakamura. 2020. Drawing from justice theories to support targets of online harassment. new media & society (2020), 1461444820913122."},{"key":"e_1_2_1_65_1","volume-title":"The phenomenology of the social world","author":"Schutz Alfred","unstructured":"Alfred Schutz. 1972. The phenomenology of the social world .Northwestern University Press."},{"key":"e_1_2_1_66_1","doi-asserted-by":"publisher","DOI":"10.1515\/for-2016-0009"},{"key":"e_1_2_1_67_1","volume-title":"Philip PHILIP SLEE, Yohji MORITA, and DAN OLWEUS.","author":"Smith Peter K","year":"1999","unstructured":"Peter K Smith, Richard Catalano, Josine JOSINE JUNGER-TAS, Philip PHILIP SLEE, Yohji MORITA, and DAN OLWEUS. 1999. The nature of school bullying: A cross-national perspective .Psychology Press."},{"key":"e_1_2_1_68_1","doi-asserted-by":"crossref","unstructured":"Peter Snyder Periwinkle Doerfler Chris Kanich and Damon McCoy. 2017. Fifteen Minutes of Unwanted Fame: Detecting and Characterizing Doxing. In ACM IMC.","DOI":"10.1145\/3131365.3131385"},{"key":"e_1_2_1_69_1","volume-title":"How to deal with researcher harassment in the social sciences. Nature Human Behaviour","author":"Stein Jan-Philipp","year":"2020","unstructured":"Jan-Philipp Stein and Markus Appel. 2020. How to deal with researcher harassment in the social sciences. Nature Human Behaviour (2020)."},{"key":"e_1_2_1_70_1","unstructured":"Emily Stewart. 2019. 8chan a nexus of radicalization explained. https:\/\/www.vox.com\/recode\/2019\/5\/3\/18527214\/8chan-walmart-el-paso-shooting-cloudflare-white-nationalism"},{"key":"e_1_2_1_71_1","volume-title":"The Underground Economy of Fake Antivirus Software. Economics of Information Security and Privacy III","author":"Stone-Gross Brett","year":"2012","unstructured":"Brett Stone-Gross, Ryan Abman, Richard A. Kemmerer, Christopher Kruegel, Douglas G. Steigerwald, and Giovanni Vigna. 2012. The Underground Economy of Fake Antivirus Software. Economics of Information Security and Privacy III (2012)."},{"key":"e_1_2_1_72_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP40001.2021.00028"},{"key":"e_1_2_1_73_1","volume-title":"the Creator","author":"Tyler","year":"2012","unstructured":"Tyler, the Creator. 2012. \"Hahahahahahahaha How The Fuck Is Cyber Bullying Real Hahahaha Nigga Just Walk Away From The Screen Like Nigga Close Your Eyes Haha\". https:\/\/web.archive.org\/web\/20210112175535\/https:\/\/twitter.com\/tylerthecreator\/status\/285670822264307712."},{"key":"e_1_2_1_74_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.avb.2015.05.015"}],"container-title":["Proceedings of the ACM on Human-Computer Interaction"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3476082","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3476082","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3476082","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,14]],"date-time":"2025-07-14T04:57:21Z","timestamp":1752469041000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3476082"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,10,13]]},"references-count":74,"journal-issue":{"issue":"CSCW2","published-print":{"date-parts":[[2021,10,13]]}},"alternative-id":["10.1145\/3476082"],"URL":"https:\/\/doi.org\/10.1145\/3476082","relation":{},"ISSN":["2573-0142"],"issn-type":[{"value":"2573-0142","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,10,13]]},"assertion":[{"value":"2021-10-18","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}