{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,13]],"date-time":"2026-04-13T18:04:41Z","timestamp":1776103481393,"version":"3.50.1"},"reference-count":82,"publisher":"Association for Computing Machinery (ACM)","issue":"CSCW2","license":[{"start":{"date-parts":[[2021,10,13]],"date-time":"2021-10-13T00:00:00Z","timestamp":1634083200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["Proc. ACM Hum.-Comput. Interact."],"published-print":{"date-parts":[[2021,10,13]]},"abstract":"<jats:p>Individuals interact with algorithms in various ways. Users even game and circumvent algorithms so as to achieve favorable outcomes. This study aims to come to an understanding of how various stakeholders interact with each other in tricking algorithms, with a focus towards online review communities. We employed a mixed-method approach in order to explore how and why users write machine non-translatable reviews as well as how those encrypted messages are perceived by those receiving them. We found that users are able to find tactics to trick the algorithms in order to avoid censoring, to mitigate interpersonal burden, to protect privacy, and to provide authentic information for enabling the formation of informative review communities. They apply several linguistic and social strategies in this regard. Furthermore, users perceive encrypted messages as both more trustworthy and authentic. Based on these findings, we discuss implications for online review community and content moderation algorithms.<\/jats:p>","DOI":"10.1145\/3476085","type":"journal-article","created":{"date-parts":[[2021,10,19]],"date-time":"2021-10-19T02:30:11Z","timestamp":1634610611000},"page":"1-24","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":6,"title":["Trkic G00gle: Why and How Users Game Translation Algorithms"],"prefix":"10.1145","volume":"5","author":[{"given":"Soomin","family":"Kim","sequence":"first","affiliation":[{"name":"Seoul National University, Seoul, Republic of Korea"}]},{"given":"Changhoon","family":"Oh","sequence":"additional","affiliation":[{"name":"Carnegie Mellon University, Pittsburgh, PA, USA"}]},{"given":"Won Ik","family":"Cho","sequence":"additional","affiliation":[{"name":"Seoul National University, Seoul, Republic of Korea"}]},{"given":"Donghoon","family":"Shin","sequence":"additional","affiliation":[{"name":"Seoul National University, Seoul, Republic of Korea"}]},{"given":"Bongwon","family":"Suh","sequence":"additional","affiliation":[{"name":"Seoul National University, Seoul, Republic of Korea"}]},{"given":"Joonhwan","family":"Lee","sequence":"additional","affiliation":[{"name":"Seoul National University, Seoul, Republic of Korea"}]}],"member":"320","published-online":{"date-parts":[[2021,10,18]]},"reference":[{"key":"e_1_2_1_1_1","unstructured":"Airbnb. 2020. Can I remove or respond to a review I disagree with? - Airbnb Help Center. https:\/\/www.airbnb.com\/help\/article\/32\/can-i-remove-or-respond-to-a-review-i-disagree-with?_set_bev_on_new_domain=1609918482_OTYxODRmODUwMGNm"},{"key":"e_1_2_1_2_1","volume-title":"What drives guests to misreport their experiences on Airbnb? A structural equation modelling approach. Current Issues in Tourism","author":"Baute-D\u00edaz Nisamar","year":"2020","unstructured":"Nisamar Baute-D\u00edaz, Desiderio Guti\u00e9rrez-Tano, and Ricardo J D\u00edaz-Armas. 2020. What drives guests to misreport their experiences on Airbnb? A structural equation modelling approach. Current Issues in Tourism (2020), 1--18."},{"key":"e_1_2_1_3_1","volume-title":"Managing visibility on YouTube through algorithmic gossip. New media & society 21, 11--12","author":"Bishop Sophie","year":"2019","unstructured":"Sophie Bishop. 2019. Managing visibility on YouTube through algorithmic gossip. New media & society 21, 11--12 (2019), 2589--2606."},{"key":"e_1_2_1_4_1","volume-title":"Game geek's goss: linguistic creativity in young males within an online university forum (94\/\\\/\\3 933k'5 9055oneone). Australian journal of emerging technologies and society 3, 2","author":"Blashki Katherine","year":"2005","unstructured":"Katherine Blashki and Sophie Nichol. 2005. Game geek's goss: linguistic creativity in young males within an online university forum (94\/\\\/\\3 933k'5 9055oneone). Australian journal of emerging technologies and society 3, 2 (2005), 71--80."},{"key":"e_1_2_1_5_1","volume-title":"Using thematic analysis in psychology. Qualitative research in psychology 3, 2","author":"Braun Virginia","year":"2006","unstructured":"Virginia Braun and Victoria Clarke. 2006. Using thematic analysis in psychology. Qualitative research in psychology 3, 2 (2006), 77--101."},{"key":"e_1_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1080\/13683500.2016.1267113"},{"key":"e_1_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/3359240"},{"key":"e_1_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1287\/mnsc.2017.2852"},{"key":"e_1_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1080\/016909699386167"},{"key":"e_1_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1177\/1461444818815684"},{"key":"e_1_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1093\/oxrep\/grx043"},{"key":"e_1_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/3301275.3302262"},{"key":"e_1_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/3313831.3376232"},{"key":"e_1_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/2858036.2858494"},{"key":"e_1_2_1_15_1","doi-asserted-by":"crossref","unstructured":"Motahhare Eslami Kristen Vaccaro Karrie Karahalios and Kevin Hamilton. 2017. \"Be Careful; Things Can Be Worse than They Appear\": Understanding Biased Algorithms and Users' Behavior Around Them in Rating Platforms.. In ICWSM. 62--71.","DOI":"10.1609\/icwsm.v11i1.14898"},{"key":"e_1_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1609\/icwsm.v11i1.14898"},{"key":"e_1_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/3290605.3300724"},{"key":"e_1_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.annals.2015.12.019"},{"key":"e_1_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jretai.2014.04.004"},{"key":"e_1_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1080\/14640748708401785"},{"key":"e_1_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/2470654.2470719"},{"key":"e_1_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/2531602.2531702"},{"key":"e_1_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/2488608.2488667"},{"key":"e_1_2_1_24_1","unstructured":"Oliver Gee. 2019. Should foreigners steer clear of France's 'backwards language' Verlan? https:\/\/www.thelocal.fr\/20190510\/should-foreigners-steer-clear-of-frances-backwards-language"},{"key":"e_1_2_1_25_1","volume-title":"Algorithmically recognizable: Santorum's Google problem, and Google's Santorum problem. Information, communication & society 20, 1","author":"Gillespie Tarleton","year":"2017","unstructured":"Tarleton Gillespie. 2017. Algorithmically recognizable: Santorum's Google problem, and Google's Santorum problem. Information, communication & society 20, 1 (2017), 63--80."},{"key":"e_1_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1080\/01690960701579722"},{"key":"e_1_2_1_27_1","volume-title":"Gaming Algorithmic Hate-Speech Detection: Stakes, Parties, and Moves. Social Media+ Society 6, 2","author":"Haapoja Jesse","year":"2020","unstructured":"Jesse Haapoja, Salla-Maaria Laaksonen, and Airi Lampinen. 2020. Gaming Algorithmic Hate-Speech Detection: Stakes, Parties, and Moves. Social Media+ Society 6, 2 (2020), 2056305120924778."},{"key":"e_1_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.3115\/1118759.1118765"},{"key":"e_1_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1093\/jcmc\/zmz022"},{"key":"e_1_2_1_30_1","unstructured":"Eric Donald Hirsch Joseph F Kett and James S Trefil. 2002. The new dictionary of cultural literacy. Houghton Mifflin Harcourt."},{"key":"e_1_2_1_31_1","doi-asserted-by":"crossref","unstructured":"Chaya Hiruncharoenvate Zhiyuan Lin and Eric Gilbert. 2015. Algorithmically Bypassing Censorship on Sina Weibo with Nondeterministic Homophone Substitutions.. In ICWSM. Citeseer 150--158.","DOI":"10.1609\/icwsm.v9i1.14637"},{"key":"e_1_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10489-018-1361-5"},{"key":"e_1_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/2046684.2046692"},{"key":"e_1_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/3173574.3173869"},{"key":"e_1_2_1_35_1","doi-asserted-by":"crossref","unstructured":"Matthew Hutson. 2018. Hackers easily fool artificial intelligences.","DOI":"10.1126\/science.361.6399.215"},{"key":"e_1_2_1_36_1","volume-title":"Conference of Content Moderation & Removal at Scale. https:\/\/law.scu.edu\/event\/content-moderation-removal-at-scale\/","author":"High Tech Law Institute","year":"2018","unstructured":"High Tech Law Institute. 2018. Conference of Content Moderation & Removal at Scale. https:\/\/law.scu.edu\/event\/content-moderation-removal-at-scale\/"},{"key":"e_1_2_1_37_1","unstructured":"iProperty Management & Investments. 2020. Airbnb Statistics 2020: User & Market Growth Data. https:\/\/ipropertymanagement.com\/research\/airbnb-statistics"},{"key":"e_1_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/3290605.3300469"},{"key":"e_1_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.2753\/MIS0742-1222300109"},{"key":"e_1_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/3173574.3173995"},{"key":"e_1_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/2470654.2481368"},{"key":"e_1_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1177\/014616728172007"},{"key":"e_1_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1145\/3313831.3376785"},{"key":"e_1_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1145\/3359181"},{"key":"e_1_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1145\/3359314"},{"key":"e_1_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.intmar.2014.02.001"},{"key":"e_1_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1145\/2470654.2466263"},{"key":"e_1_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1145\/3290605.3300717"},{"key":"e_1_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1145\/3025453.3025515"},{"key":"e_1_2_1_50_1","volume-title":"On actor-network theory: A few clarifications. Soziale welt","author":"Latour Bruno","year":"1996","unstructured":"Bruno Latour. 1996. On actor-network theory: A few clarifications. Soziale welt (1996), 369--381."},{"key":"e_1_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2019.106188"},{"key":"e_1_2_1_52_1","first-page":"312","article-title":"Verlan: talking backwards in French","volume":"63","author":"Lefkowitz Natalie J","year":"1989","unstructured":"Natalie J Lefkowitz. 1989. Verlan: talking backwards in French. The French Review 63, 2 (1989), 312--322.","journal-title":"The French Review"},{"key":"e_1_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1145\/3432953"},{"key":"e_1_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.1145\/3313831.3376261"},{"key":"e_1_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.1145\/3173574.3173791"},{"key":"e_1_2_1_56_1","article-title":"A comparison of anonymous versus identifiable e-peer review on college student writing performance and the extent of critical feedback","volume":"6","author":"Lu Ruiling","year":"2007","unstructured":"Ruiling Lu and Linda Bol. 2007. A comparison of anonymous versus identifiable e-peer review on college student writing performance and the extent of critical feedback. Journal of Interactive Online Learning 6, 2 (2007).","journal-title":"Journal of Interactive Online Learning"},{"key":"e_1_2_1_57_1","volume-title":"Com (March 15","author":"Luca Michael","year":"2016","unstructured":"Michael Luca. 2016. Reviews, reputation, and revenue: The case of Yelp. com. Com (March 15, 2016). Harvard Business School NOM Unit Working Paper 12-016 (2016)."},{"key":"e_1_2_1_58_1","doi-asserted-by":"publisher","DOI":"10.1086\/688845"},{"key":"e_1_2_1_59_1","doi-asserted-by":"publisher","DOI":"10.1287\/mnsc.2015.2304"},{"key":"e_1_2_1_60_1","doi-asserted-by":"publisher","DOI":"10.1145\/3290605.3300297"},{"key":"e_1_2_1_61_1","doi-asserted-by":"publisher","DOI":"10.1145\/2998181.2998269"},{"key":"e_1_2_1_62_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPC.2014.2373891"},{"key":"e_1_2_1_63_1","series-title":"March 2019","volume-title":"Who Forgoes Screening in Online Markets and When? Evidence from Airbnb. Evidence from Airbnb","author":"Mayya Raveesh","year":"2019","unstructured":"Raveesh Mayya, Shun Ye, Siva Viswanathan, and Rajshree Agarwal. 2019. Who Forgoes Screening in Online Markets and When? Evidence from Airbnb. Evidence from Airbnb (March 2019) (2019)."},{"key":"e_1_2_1_64_1","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/2020.socialnlp-1.4"},{"key":"e_1_2_1_65_1","unstructured":"Alfred Ng. 2020. Teens have figured out how to mess with Instagram's tracking algorithm. https:\/\/www.cnet.com\/news\/teens-have-figured-out-how-to-mess-with-instagrams-tracking-algorithm\/"},{"key":"e_1_2_1_66_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.futures.2019.102442"},{"key":"e_1_2_1_67_1","doi-asserted-by":"publisher","DOI":"10.1145\/3025453.3025539"},{"key":"e_1_2_1_68_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.intmar.2011.01.002"},{"key":"e_1_2_1_69_1","doi-asserted-by":"publisher","DOI":"10.1145\/2998181.2998304"},{"key":"e_1_2_1_70_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jml.2004.05.005"},{"key":"e_1_2_1_71_1","unstructured":"Sherisse Pham. 2018. Chinese censors are scanning WeChat images to block banned words. https:\/\/money.cnn.com\/2018\/03\/01\/technology\/china-wechat-censorship-ai\/index.html"},{"key":"e_1_2_1_72_1","unstructured":"Rob Price. 2019. People are slipping fake baby and marriage announcements into Facebook posts to trick the algorithm into boosting their posts. https:\/\/businessinsider.com\/facebook-users-claim-pregnant-married-trick-algorithm-boost-posts-2019--11"},{"key":"e_1_2_1_73_1","doi-asserted-by":"publisher","DOI":"10.1145\/2702123.2702174"},{"key":"e_1_2_1_74_1","volume-title":"Behind the screen: Content moderation in the shadows of social media","author":"Roberts Sarah T","unstructured":"Sarah T Roberts. 2019. Behind the screen: Content moderation in the shadows of social media. Yale University Press."},{"key":"e_1_2_1_75_1","volume-title":"Robsut wrod reocginiton via semi-character recurrent neural network. arXiv preprint arXiv:1608.02214","author":"Sakaguchi Keisuke","year":"2016","unstructured":"Keisuke Sakaguchi, Kevin Duh, Matt Post, and Benjamin Van Durme. 2016. Robsut wrod reocginiton via semi-character recurrent neural network. arXiv preprint arXiv:1608.02214 (2016)."},{"key":"e_1_2_1_76_1","unstructured":"Jeanette Si. 2018. The Chinese Language as a Weapon: How China's Netizens Fight Censorship. https:\/\/medium.com\/berkman-klein-center\/the-chinese-language-as-a-weapon-how-chinas-netizens-fight-censorship-8389516ed1a6"},{"key":"e_1_2_1_77_1","volume-title":"Qualitative research and translation dilemmas. Qualitative research 4, 2","author":"Temple Bogusia","year":"2004","unstructured":"Bogusia Temple and Alys Young. 2004. Qualitative research and translation dilemmas. Qualitative research 4, 2 (2004), 161--178."},{"key":"e_1_2_1_78_1","volume-title":"The culture of connectivity: A critical history of social media","author":"Dijck Jos\u00e9 Van","unstructured":"Jos\u00e9 Van Dijck. 2013. The culture of connectivity: A critical history of social media. Oxford University Press."},{"key":"e_1_2_1_79_1","doi-asserted-by":"publisher","DOI":"10.1145\/3313831.3376877"},{"key":"e_1_2_1_80_1","doi-asserted-by":"publisher","DOI":"10.1515\/applirev-2015-0005"},{"key":"e_1_2_1_81_1","doi-asserted-by":"publisher","DOI":"10.3727\/109830508788403114"},{"key":"e_1_2_1_82_1","volume-title":"Rethinking gaming: The ethical work of optimization in web search engines. Social studies of science 49, 5","author":"Ziewitz Malte","year":"2019","unstructured":"Malte Ziewitz. 2019. Rethinking gaming: The ethical work of optimization in web search engines. Social studies of science 49, 5 (2019), 707--731."}],"container-title":["Proceedings of the ACM on Human-Computer Interaction"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3476085","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3476085","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,14]],"date-time":"2025-07-14T04:56:18Z","timestamp":1752468978000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3476085"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,10,13]]},"references-count":82,"journal-issue":{"issue":"CSCW2","published-print":{"date-parts":[[2021,10,13]]}},"alternative-id":["10.1145\/3476085"],"URL":"https:\/\/doi.org\/10.1145\/3476085","relation":{},"ISSN":["2573-0142"],"issn-type":[{"value":"2573-0142","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,10,13]]},"assertion":[{"value":"2021-10-18","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}