{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,13]],"date-time":"2026-04-13T21:04:31Z","timestamp":1776114271148,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":76,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,4,27]],"date-time":"2022-04-27T00:00:00Z","timestamp":1651017600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022,4,27]]},"DOI":"10.1145\/3491102.3501879","type":"proceedings-article","created":{"date-parts":[[2022,4,28]],"date-time":"2022-04-28T17:09:36Z","timestamp":1651165776000},"page":"1-15","source":"Crossref","is-referenced-by-count":56,"title":["\u201cIt\u2019s common and a part of being a content creator\u201d: Understanding How Creators Experience and Cope with Hate and Harassment Online"],"prefix":"10.1145","author":[{"given":"Kurt","family":"Thomas","sequence":"first","affiliation":[{"name":"Google, United States"}]},{"given":"Patrick Gage","family":"Kelley","sequence":"additional","affiliation":[{"name":"Google, United States"}]},{"given":"Sunny","family":"Consolvo","sequence":"additional","affiliation":[{"name":"Google, United States"}]},{"given":"Patrawat","family":"Samermit","sequence":"additional","affiliation":[{"name":"Google, United States"}]},{"given":"Elie","family":"Bursztein","sequence":"additional","affiliation":[{"name":"Google, United States"}]}],"member":"320","published-online":{"date-parts":[[2022,4,28]]},"reference":[{"key":"e_1_3_2_2_1_1","volume-title":"Support Digital Privacy with Shared Mobile Phone Use in Bangladesh. In The 2019 CHI Conference on Human Factors in Computing Systems.","author":"Ahmed Syed\u00a0Ishtiaque","year":"2019","unstructured":"Syed\u00a0Ishtiaque Ahmed , Md.\u00a0 Romael Haque , Irtaza Haider , Jay Chen , and Nicola Dell . 2019 . \u201d Everyone Has Some Personal Stuff\u201d: Designing to Support Digital Privacy with Shared Mobile Phone Use in Bangladesh. In The 2019 CHI Conference on Human Factors in Computing Systems. Syed\u00a0Ishtiaque Ahmed, Md.\u00a0Romael Haque, Irtaza Haider, Jay Chen, and Nicola Dell. 2019. \u201dEveryone Has Some Personal Stuff\u201d: Designing to Support Digital Privacy with Shared Mobile Phone Use in Bangladesh. In The 2019 CHI Conference on Human Factors in Computing Systems."},{"key":"e_1_3_2_2_2_1","volume-title":"Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems.","author":"Ahmed Tousif","year":"2019","unstructured":"Tousif Ahmed , Roberto Hoyle , Kay Connelly , David Crandall , and Apu Kapadia . 2019 . Privacy Concerns and Behaviors of People with Visual Impairments. In CHI \u201915 : Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems. Tousif Ahmed, Roberto Hoyle, Kay Connelly, David Crandall, and Apu Kapadia. 2019. Privacy Concerns and Behaviors of People with Visual Impairments. In CHI \u201915: Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems."},{"key":"e_1_3_2_2_3_1","volume-title":"Proceedings of the 29th USENIX Security Symposium.","author":"Akter Taslima","year":"2020","unstructured":"Taslima Akter , Bryan Dosono , Tousif Ahmed , Apu Kapadia , and Bryan Semaan . 2020 . \u201d I am uncomfortable sharing what I can\u2019t see\u201d: Privacy Concerns of the Visually Impaired with Camera Based Assistive Applications . In Proceedings of the 29th USENIX Security Symposium. Taslima Akter, Bryan Dosono, Tousif Ahmed, Apu Kapadia, and Bryan Semaan. 2020. \u201dI am uncomfortable sharing what I can\u2019t see\u201d: Privacy Concerns of the Visually Impaired with Camera Based Assistive Applications. In Proceedings of the 29th USENIX Security Symposium."},{"key":"e_1_3_2_2_4_1","volume-title":"YouTube drafting \u2018creator-on-creator harassment","author":"Alexander Julia","year":"2019","unstructured":"Julia Alexander . 2019. YouTube drafting \u2018creator-on-creator harassment \u2019 rules after Steven Crowder incident. https:\/\/www.theverge.com\/ 2019 \/7\/11\/20691123\/youtube-creator-harassment-vidcon-carlos-maza-steven-crowder-neal-mohan. Julia Alexander. 2019. YouTube drafting \u2018creator-on-creator harassment\u2019 rules after Steven Crowder incident. https:\/\/www.theverge.com\/2019\/7\/11\/20691123\/youtube-creator-harassment-vidcon-carlos-maza-steven-crowder-neal-mohan."},{"key":"e_1_3_2_2_5_1","unstructured":"Dennys Antonialli. 2019. Drag Queen vs. David Duke: Whose Tweets Are More \u2018Toxic\u2019?https:\/\/www.wired.com\/story\/drag-queens-vs-far-right-toxic-tweets\/. Dennys Antonialli. 2019. Drag Queen vs. David Duke: Whose Tweets Are More \u2018Toxic\u2019?https:\/\/www.wired.com\/story\/drag-queens-vs-far-right-toxic-tweets\/."},{"key":"e_1_3_2_2_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/2858036.2858548"},{"key":"e_1_3_2_2_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/3411764.3445378"},{"key":"e_1_3_2_2_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/3134659"},{"key":"e_1_3_2_2_9_1","unstructured":"Block Together. 2019. A web app intended to help cope with harassment and abuse on Twitter.https:\/\/blocktogether.org\/. Block Together. 2019. A web app intended to help cope with harassment and abuse on Twitter.https:\/\/blocktogether.org\/."},{"key":"e_1_3_2_2_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/3311957.3359478"},{"key":"e_1_3_2_2_11_1","doi-asserted-by":"publisher","DOI":"10.5555\/3361338.3361346"},{"key":"e_1_3_2_2_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/3411764.3445276"},{"key":"e_1_3_2_2_13_1","volume-title":"Proceedings of the 30th USENIX Security Symposium.","author":"Consolvo Sunny","year":"2021","unstructured":"Sunny Consolvo , Patrick\u00a0Gage Kelley , Tara Matthews , Kurt Thomas , Lee Dunn , and Elie Bursztein . 2021 . \u201d Why wouldn\u2019t someone think of democracy as a target?\u201d: Security practices & challenges of people involved with U.S. political campaigns . In Proceedings of the 30th USENIX Security Symposium. Sunny Consolvo, Patrick\u00a0Gage Kelley, Tara Matthews, Kurt Thomas, Lee Dunn, and Elie Bursztein. 2021. \u201dWhy wouldn\u2019t someone think of democracy as a target?\u201d: Security practices & challenges of people involved with U.S. political campaigns. In Proceedings of the 30th USENIX Security Symposium."},{"key":"e_1_3_2_2_14_1","doi-asserted-by":"publisher","DOI":"10.1177\/1461444814543163"},{"key":"e_1_3_2_2_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP40001.2021.00055"},{"key":"e_1_3_2_2_16_1","unstructured":"Data & Society. 2016. ONLINE HARASSMENT DIGITAL ABUSE AND CYBERSTALKING IN AMERICA. https:\/\/datasociety.net\/output\/online-harassment-digital-abuse-cyberstalking\/. Data & Society. 2016. ONLINE HARASSMENT DIGITAL ABUSE AND CYBERSTALKING IN AMERICA. https:\/\/datasociety.net\/output\/online-harassment-digital-abuse-cyberstalking\/."},{"key":"e_1_3_2_2_17_1","unstructured":"Discord. 2021. Developing server rules. https:\/\/discord.com\/moderation\/1500000176081-203:-Developing-Server-Rules. Discord. 2021. Developing server rules. https:\/\/discord.com\/moderation\/1500000176081-203:-Developing-Server-Rules."},{"key":"e_1_3_2_2_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/3278721.3278729"},{"key":"e_1_3_2_2_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/3290605.3300372"},{"key":"e_1_3_2_2_20_1","volume-title":"Straight Talk: New Yorkers on Mobile Messaging and Implications for Privacy. Technical Report. Simply Sedure. https:\/\/simplysecure.org\/resources\/techreports\/NYC15-MobMsg.pdf","author":"Elliott Ame","year":"2015","unstructured":"Ame Elliott and Sara Brody . 2015 . Straight Talk: New Yorkers on Mobile Messaging and Implications for Privacy. Technical Report. Simply Sedure. https:\/\/simplysecure.org\/resources\/techreports\/NYC15-MobMsg.pdf Ame Elliott and Sara Brody. 2015. Straight Talk: New Yorkers on Mobile Messaging and Implications for Privacy. Technical Report. Simply Sedure. https:\/\/simplysecure.org\/resources\/techreports\/NYC15-MobMsg.pdf"},{"key":"e_1_3_2_2_21_1","unstructured":"Facebook. 2019. Community Standards Enforcement Report. https:\/\/transparency.facebook.com\/community-standards-enforcement. Facebook. 2019. Community Standards Enforcement Report. https:\/\/transparency.facebook.com\/community-standards-enforcement."},{"key":"e_1_3_2_2_22_1","volume-title":"Digital Technologies and Intimate Partner Violence: A Qualitative Analysis with Multiple Stakeholders. PACM: Human-Computer Interaction: Computer-Supported Cooperative Work and Social Computing (CSCW)","author":"Freed Diana","unstructured":"Diana Freed , Jackeline Palmer , Diana Minchala , Karen Levy , Thomas Ristenpart , and Nicola Dell . 2017. Digital Technologies and Intimate Partner Violence: A Qualitative Analysis with Multiple Stakeholders. PACM: Human-Computer Interaction: Computer-Supported Cooperative Work and Social Computing (CSCW) Vol. 1 , No. 2 (2017), Article 46. Diana Freed, Jackeline Palmer, Diana Minchala, Karen Levy, Thomas Ristenpart, and Nicola Dell. 2017. Digital Technologies and Intimate Partner Violence: A Qualitative Analysis with Multiple Stakeholders. PACM: Human-Computer Interaction: Computer-Supported Cooperative Work and Social Computing (CSCW) Vol. 1, No. 2 (2017), Article 46."},{"key":"e_1_3_2_2_23_1","volume-title":"Proceedings of the Fifteenth Symposium on Usable Privacy and Security.","author":"Frik Alisa","year":"2019","unstructured":"Alisa Frik , Leysan Nurgalieva , Julia Bernd , Joyce Lee , Florian Schaub , and Serge Egelman . 2019 . Privacy and Security Threat Models and Mitigation Strategies of Older Adults . In Proceedings of the Fifteenth Symposium on Usable Privacy and Security. Alisa Frik, Leysan Nurgalieva, Julia Bernd, Joyce Lee, Florian Schaub, and Serge Egelman. 2019. Privacy and Security Threat Models and Mitigation Strategies of Older Adults. In Proceedings of the Fifteenth Symposium on Usable Privacy and Security."},{"key":"e_1_3_2_2_24_1","volume-title":"The Disagreement Deconvolution: Bringing Machine Learning Performance Metrics In Line With Reality. In ACM CHI Conferences on Human Factors in Computing Systems.","author":"Gordon L","year":"2021","unstructured":"Mitchell\u00a0 L Gordon , Kaitlyn Zhou , Kayur Patel , Tatsunori Hashimoto , and Michael\u00a0 S Bernstein . 2021 . The Disagreement Deconvolution: Bringing Machine Learning Performance Metrics In Line With Reality. In ACM CHI Conferences on Human Factors in Computing Systems. Mitchell\u00a0L Gordon, Kaitlyn Zhou, Kayur Patel, Tatsunori Hashimoto, and Michael\u00a0S Bernstein. 2021. The Disagreement Deconvolution: Bringing Machine Learning Performance Metrics In Line With Reality. In ACM CHI Conferences on Human Factors in Computing Systems."},{"key":"e_1_3_2_2_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/3173574.3173688"},{"key":"e_1_3_2_2_26_1","unstructured":"Hatebase. 2019. The world\u2019s largest structured repository of regionalized multilingual hate speech. https:\/\/hatebase.org\/. Hatebase. 2019. The world\u2019s largest structured repository of regionalized multilingual hate speech. https:\/\/hatebase.org\/."},{"key":"e_1_3_2_2_27_1","volume-title":"Proceedings of the USENIX Security Symposium.","author":"Havron Sam","year":"2019","unstructured":"Sam Havron , Diana Freed , Rahul Chatterjee , Damon McCoy , Nicola Dell , and Thomas Ristenpart . 2019 . Clinical computer security for victims of intimate partner violence . In Proceedings of the USENIX Security Symposium. Sam Havron, Diana Freed, Rahul Chatterjee, Damon McCoy, Nicola Dell, and Thomas Ristenpart. 2019. Clinical computer security for victims of intimate partner violence. In Proceedings of the USENIX Security Symposium."},{"key":"e_1_3_2_2_28_1","volume-title":"Proceedings of the Fifteenth Symposium on Usable Privacy and Security.","author":"Hayes Jordan","year":"2019","unstructured":"Jordan Hayes , Smirity Kaushik , Charlotte\u00a0Emily Price , and Yang Wang . 2019 . Cooperative Privacy and Security: Learning from People with Visual Impairments and Their Allies . In Proceedings of the Fifteenth Symposium on Usable Privacy and Security. Jordan Hayes, Smirity Kaushik, Charlotte\u00a0Emily Price, and Yang Wang. 2019. Cooperative Privacy and Security: Learning from People with Visual Impairments and Their Allies. In Proceedings of the Fifteenth Symposium on Usable Privacy and Security."},{"key":"e_1_3_2_2_29_1","unstructured":"Donald Hicks and David Gasca. 2019. A healthier Twitter: Progress and more to do. https:\/\/blog.twitter.com\/en_us\/topics\/company\/2019\/health-update.html. Donald Hicks and David Gasca. 2019. A healthier Twitter: Progress and more to do. https:\/\/blog.twitter.com\/en_us\/topics\/company\/2019\/health-update.html."},{"key":"e_1_3_2_2_30_1","volume-title":"Proceedings of the 2020 CHI Conference on Human Factors in Computing Systems.","author":"Jeong Rebecca","year":"2020","unstructured":"Rebecca Jeong and Sonia Chiasson . 2020 . \u2019Lime\u2019, \u2019Open Lock \u2019, and \u2019Blocked\u2019: Children\u2019s Perception of Colors, Symbols, and Words in Cybersecurity Warnings. In Proceedings of the 2020 CHI Conference on Human Factors in Computing Systems. Rebecca Jeong and Sonia Chiasson. 2020. \u2019Lime\u2019, \u2019Open Lock\u2019, and \u2019Blocked\u2019: Children\u2019s Perception of Colors, Symbols, and Words in Cybersecurity Warnings. In Proceedings of the 2020 CHI Conference on Human Factors in Computing Systems."},{"key":"e_1_3_2_2_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/3338243"},{"key":"e_1_3_2_2_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/3185593"},{"key":"e_1_3_2_2_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/3359157"},{"key":"e_1_3_2_2_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/3411764.3445279"},{"key":"e_1_3_2_2_35_1","volume-title":"Proceedings of the Symposium on Usable Privacy and Security.","author":"Kumar Deepak","year":"2021","unstructured":"Deepak Kumar , Patrick\u00a0Gage Kelley , Sunny Consolvo , Joshua Mason , Elie Bursztein , Zakir Durumeric , Kurt Thomas , and Michael Bailey . 2021 . Designing Toxic Content Classification for a Diversity of Perspectives . In Proceedings of the Symposium on Usable Privacy and Security. Deepak Kumar, Patrick\u00a0Gage Kelley, Sunny Consolvo, Joshua Mason, Elie Bursztein, Zakir Durumeric, Kurt Thomas, and Michael Bailey. 2021. Designing Toxic Content Classification for a Diversity of Perspectives. In Proceedings of the Symposium on Usable Privacy and Security."},{"key":"e_1_3_2_2_36_1","unstructured":"Michael Lee. 2021. Twitch Streamer Nate Hill Swatted While Streaming Fortnite. https:\/\/gamerant.com\/twitch-faze-nate-hill-swatted\/. Michael Lee. 2021. Twitch Streamer Nate Hill Swatted While Streaming Fortnite. https:\/\/gamerant.com\/twitch-faze-nate-hill-swatted\/."},{"key":"e_1_3_2_2_37_1","volume-title":"Privacy and Activism in the Transgender Community. In 2020 CHI Conference on Human Factors in Computing Systems. ACM.","author":"Lerner Ada","year":"2020","unstructured":"Ada Lerner , Helen\u00a0Yuxun He , Anna Kawakami , Silvia\u00a0Catherine Zeamer , and Roberto Hoyle . 2020 . Privacy and Activism in the Transgender Community. In 2020 CHI Conference on Human Factors in Computing Systems. ACM. Ada Lerner, Helen\u00a0Yuxun He, Anna Kawakami, Silvia\u00a0Catherine Zeamer, and Roberto Hoyle. 2020. Privacy and Activism in the Transgender Community. In 2020 CHI Conference on Human Factors in Computing Systems. ACM."},{"key":"e_1_3_2_2_38_1","doi-asserted-by":"publisher","DOI":"10.1093\/cybsec\/tyaa006"},{"key":"e_1_3_2_2_39_1","unstructured":"Taylor Lorenz. 2021. Facebook plans to pay creators $1 billion to use its products.https:\/\/www.nytimes.com\/2021\/07\/14\/technology\/facebook-payments-creators.html. Taylor Lorenz. 2021. Facebook plans to pay creators $1 billion to use its products.https:\/\/www.nytimes.com\/2021\/07\/14\/technology\/facebook-payments-creators.html."},{"key":"e_1_3_2_2_40_1","unstructured":"Taylor Lorenz. 2021. Young Creators Are Burning Out and Breaking Down. https:\/\/www.nytimes.com\/2021\/06\/08\/style\/creator-burnout-social-media.html. Taylor Lorenz. 2021. Young Creators Are Burning Out and Breaking Down. https:\/\/www.nytimes.com\/2021\/06\/08\/style\/creator-burnout-social-media.html."},{"key":"e_1_3_2_2_41_1","unstructured":"Taylor Lorenz. 2021. YouTube begins paying out $100 million to creators using its short-form video feature.https:\/\/www.nytimes.com\/live\/2021\/08\/03\/business\/economy-stock-market-news\/youtube-begins-paying-out-100-million-to-creators-using-its-short-form-video-feature. Taylor Lorenz. 2021. YouTube begins paying out $100 million to creators using its short-form video feature.https:\/\/www.nytimes.com\/live\/2021\/08\/03\/business\/economy-stock-market-news\/youtube-begins-paying-out-100-million-to-creators-using-its-short-form-video-feature."},{"key":"e_1_3_2_2_42_1","doi-asserted-by":"publisher","DOI":"10.1145\/3173574.3174160"},{"key":"e_1_3_2_2_43_1","doi-asserted-by":"publisher","DOI":"10.1145\/3359309"},{"key":"e_1_3_2_2_44_1","volume-title":"Proceedings of the Thirteenth Symposium on Usable Privacy and Security.","author":"Marne Sonali\u00a0Tukaram","year":"2017","unstructured":"Sonali\u00a0Tukaram Marne , Mahdi\u00a0Nasullah Al-Ameen , and Matthew Wright . 2017 . Learning System-assigned Passwords: A Preliminary Study on the People with Learning Disabilities . In Proceedings of the Thirteenth Symposium on Usable Privacy and Security. Sonali\u00a0Tukaram Marne, Mahdi\u00a0Nasullah Al-Ameen, and Matthew Wright. 2017. Learning System-assigned Passwords: A Preliminary Study on the People with Learning Disabilities. In Proceedings of the Thirteenth Symposium on Usable Privacy and Security."},{"key":"e_1_3_2_2_45_1","unstructured":"Louise Matsakis. 2021. TikTok Is Paying Creators. Not All of Them Are Happy. https:\/\/www.wired.com\/story\/tiktok-creators-fund-revenue-sharing-complaints\/. Louise Matsakis. 2021. TikTok Is Paying Creators. Not All of Them Are Happy. https:\/\/www.wired.com\/story\/tiktok-creators-fund-revenue-sharing-complaints\/."},{"key":"e_1_3_2_2_46_1","doi-asserted-by":"publisher","DOI":"10.1145\/3025453.3025875"},{"key":"e_1_3_2_2_47_1","volume-title":"Practices Online. In Proceedings of the 30th USENIX Security Symposium.","author":"McDonald Allison","year":"2021","unstructured":"Allison McDonald , Catherine Barwulor , Michelle\u00a0 L. Mazurek , Florian Schaub , and Elissa\u00a0 M. Redmiles . 2021 . \u201c It\u2019s stressful having all these phones\u201d: Investigating Sex Workers\u2019 Safety Goals, Risks, and Practices Online. In Proceedings of the 30th USENIX Security Symposium. Allison McDonald, Catherine Barwulor, Michelle\u00a0L. Mazurek, Florian Schaub, and Elissa\u00a0M. Redmiles. 2021. \u201cIt\u2019s stressful having all these phones\u201d: Investigating Sex Workers\u2019 Safety Goals, Risks, and Practices Online. In Proceedings of the 30th USENIX Security Symposium."},{"key":"e_1_3_2_2_48_1","doi-asserted-by":"publisher","DOI":"10.5555\/2831143.2831169"},{"key":"e_1_3_2_2_49_1","doi-asserted-by":"publisher","DOI":"10.1515\/popets-2016-0048"},{"key":"e_1_3_2_2_50_1","doi-asserted-by":"publisher","DOI":"10.1145\/3025453.3025861"},{"key":"e_1_3_2_2_51_1","doi-asserted-by":"publisher","DOI":"10.1145\/3290605.3300573"},{"key":"e_1_3_2_2_52_1","doi-asserted-by":"publisher","DOI":"10.1177\/1461444818773059"},{"key":"e_1_3_2_2_53_1","doi-asserted-by":"publisher","DOI":"10.1145\/2957276.2957297"},{"key":"e_1_3_2_2_54_1","volume-title":"Online harassment","author":"PEW Research Center","year":"2017","unstructured":"PEW Research Center . 2017. Online harassment 2017 . https:\/\/www.pewinternet.org\/2017\/07\/11\/online-harassment-2017\/. PEW Research Center. 2017. Online harassment 2017. https:\/\/www.pewinternet.org\/2017\/07\/11\/online-harassment-2017\/."},{"key":"e_1_3_2_2_55_1","unstructured":"Reddit. 2015. Subreddit rules now available for all subreddits. https:\/\/www.reddit.com\/r\/modnews\/comments\/42o2i0\/moderators_subreddit_rules_now_available_for_all\/. Reddit. 2015. Subreddit rules now available for all subreddits. https:\/\/www.reddit.com\/r\/modnews\/comments\/42o2i0\/moderators_subreddit_rules_now_available_for_all\/."},{"key":"e_1_3_2_2_56_1","doi-asserted-by":"publisher","DOI":"10.1145\/3290605.3300232"},{"key":"e_1_3_2_2_57_1","volume-title":"Women in South Asia. In Fourteenth Symposium on Usable Privacy and Security.","author":"Sambasivan Nithya","year":"2018","unstructured":"Nithya Sambasivan , Garen\u00a0Checkley Checkley , Nova Ahmed , Amna Batool , David Nemer , Laura\u00a0Sanely Gayt\u00e1n-Lugo , Tara Matthews , Sunny Consolvo , and Elizabeth Churchill . 2018 . \u201d Privacy is not for me, it\u2019s for those rich women\u201d: Performative Privacy Practices on Mobile Phones by Women in South Asia. In Fourteenth Symposium on Usable Privacy and Security. Nithya Sambasivan, Garen\u00a0Checkley Checkley, Nova Ahmed, Amna Batool, David Nemer, Laura\u00a0Sanely Gayt\u00e1n-Lugo, Tara Matthews, Sunny Consolvo, and Elizabeth Churchill. 2018. \u201dPrivacy is not for me, it\u2019s for those rich women\u201d: Performative Privacy Practices on Mobile Phones by Women in South Asia. In Fourteenth Symposium on Usable Privacy and Security."},{"key":"e_1_3_2_2_58_1","doi-asserted-by":"publisher","DOI":"10.1145\/3274424"},{"key":"e_1_3_2_2_59_1","unstructured":"Anna Silman. 2016. A Timeline of Leslie Jones\u2019s Horrific Online Abuse. https:\/\/www.thecut.com\/2016\/08\/a-timeline-of-leslie-joness-horrific-online-abuse.html. Anna Silman. 2016. A Timeline of Leslie Jones\u2019s Horrific Online Abuse. https:\/\/www.thecut.com\/2016\/08\/a-timeline-of-leslie-joness-horrific-online-abuse.html."},{"key":"e_1_3_2_2_60_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2018.00023"},{"key":"e_1_3_2_2_61_1","doi-asserted-by":"publisher","DOI":"10.1145\/3290605.3300319"},{"key":"e_1_3_2_2_62_1","doi-asserted-by":"publisher","DOI":"10.1145\/3290605.3300882"},{"key":"e_1_3_2_2_63_1","doi-asserted-by":"publisher","DOI":"10.1145\/2858036.2858153"},{"key":"e_1_3_2_2_64_1","doi-asserted-by":"crossref","unstructured":"Kurt Thomas Devdatta Akhawe Michael Bailey Dan Boneh Elie Bursztein Sunny Consolvo Nicola Dell Zakir Durumeric Patrick\u00a0Gage Kelley Deepak Kumar Damon McCoy Sarah Meiklejohn Thomas Ristenpart and Gianluca Stringhini (Eds.). 2021. SoK: Hate Harassment and the Changing Landscape of Online Abuse. Kurt Thomas Devdatta Akhawe Michael Bailey Dan Boneh Elie Bursztein Sunny Consolvo Nicola Dell Zakir Durumeric Patrick\u00a0Gage Kelley Deepak Kumar Damon McCoy Sarah Meiklejohn Thomas Ristenpart and Gianluca Stringhini (Eds.). 2021. SoK: Hate Harassment and the Changing Landscape of Online Abuse.","DOI":"10.1109\/SP40001.2021.00028"},{"key":"e_1_3_2_2_65_1","volume-title":"Proceedings of the 29th USENIX Security Symposium.","author":"Tseng Emily","year":"2020","unstructured":"Emily Tseng , Rosanna Bellini , Nora McDonald , Matan Danos , Rachel Greenstadt , Damon McCoy , Nicola Dell , and Thomas Ristenpart . 2020 . The Tools and Tactics Used in Intimate Partner Surveillance: An Analysis of Online Infidelity Forums . In Proceedings of the 29th USENIX Security Symposium. Emily Tseng, Rosanna Bellini, Nora McDonald, Matan Danos, Rachel Greenstadt, Damon McCoy, Nicola Dell, and Thomas Ristenpart. 2020. The Tools and Tactics Used in Intimate Partner Surveillance: An Analysis of Online Infidelity Forums. In Proceedings of the 29th USENIX Security Symposium."},{"key":"e_1_3_2_2_66_1","doi-asserted-by":"publisher","DOI":"10.1145\/3411764.3445589"},{"key":"e_1_3_2_2_67_1","doi-asserted-by":"publisher","DOI":"10.1145\/2998181.2998337"},{"key":"e_1_3_2_2_68_1","doi-asserted-by":"publisher","DOI":"10.1145\/3274445"},{"key":"e_1_3_2_2_69_1","doi-asserted-by":"crossref","unstructured":"Noel Warford Tara Matthews Kaitlyn Yang Omer Akgul Sunny Consolvo Patrick\u00a0Gage Kelley Nathan Malkin Michelle\u00a0L. Mazurek Manya Sleeper and Kurt Thomas. 2021. SoK: A Framework for Unifying At-Risk User Research. arxiv:2112.07047\u00a0[cs.CY] Noel Warford Tara Matthews Kaitlyn Yang Omer Akgul Sunny Consolvo Patrick\u00a0Gage Kelley Nathan Malkin Michelle\u00a0L. Mazurek Manya Sleeper and Kurt Thomas. 2021. SoK: A Framework for Unifying At-Risk User Research. arxiv:2112.07047\u00a0[cs.CY]","DOI":"10.1109\/SP46214.2022.9833643"},{"key":"e_1_3_2_2_70_1","doi-asserted-by":"publisher","DOI":"10.1145\/3290605.3300390"},{"key":"e_1_3_2_2_71_1","doi-asserted-by":"publisher","DOI":"10.1145\/3038912.3052591"},{"key":"e_1_3_2_2_72_1","unstructured":"YouTube. 2021. Learn about comment settings. https:\/\/support.google.com\/youtube\/answer\/9483359. YouTube. 2021. Learn about comment settings. https:\/\/support.google.com\/youtube\/answer\/9483359."},{"key":"e_1_3_2_2_73_1","unstructured":"YouTube. 2021. Moderate live chat. https:\/\/support.google.com\/youtube\/answer\/9826490. YouTube. 2021. Moderate live chat. https:\/\/support.google.com\/youtube\/answer\/9826490."},{"key":"e_1_3_2_2_74_1","doi-asserted-by":"publisher","DOI":"10.1145\/3290605.3300336"},{"key":"e_1_3_2_2_75_1","doi-asserted-by":"publisher","DOI":"10.1145\/2858036.2858333"},{"key":"e_1_3_2_2_76_1","volume-title":"Proceedings of the 30th USENIX Security Symposium.","author":"Zou Yixin","year":"2021","unstructured":"Yixin Zou , Allison McDonald , Julia Narakornpichit , Nicola Dell , Thomas Ristenpart , Kevin Roundy , Florian Schaub , and Acar Tamersoy . 2021 . The Role of Computer Security Customer Support in Helping Survivors of Intimate Partner Violence . In Proceedings of the 30th USENIX Security Symposium. Yixin Zou, Allison McDonald, Julia Narakornpichit, Nicola Dell, Thomas Ristenpart, Kevin Roundy, Florian Schaub, and Acar Tamersoy. 2021. The Role of Computer Security Customer Support in Helping Survivors of Intimate Partner Violence. In Proceedings of the 30th USENIX Security Symposium."}],"event":{"name":"CHI '22: CHI Conference on Human Factors in Computing Systems","location":"New Orleans LA USA","acronym":"CHI '22","sponsor":["SIGCHI ACM Special Interest Group on Computer-Human Interaction"]},"container-title":["CHI Conference on Human Factors in Computing Systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3491102.3501879","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3491102.3501879","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T19:30:53Z","timestamp":1750188653000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3491102.3501879"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,4,27]]},"references-count":76,"alternative-id":["10.1145\/3491102.3501879","10.1145\/3491102"],"URL":"https:\/\/doi.org\/10.1145\/3491102.3501879","relation":{},"subject":[],"published":{"date-parts":[[2022,4,27]]}}}