{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,30]],"date-time":"2026-03-30T18:37:29Z","timestamp":1774895849271,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":112,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,5,21]],"date-time":"2022-05-21T00:00:00Z","timestamp":1653091200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"name":"NSF GRFP","award":["DGE1745016, DGE2140739"],"award-info":[{"award-number":["DGE1745016, DGE2140739"]}]},{"name":"NSF","award":["1901311, 2107298"],"award-info":[{"award-number":["1901311, 2107298"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,5,21]]},"DOI":"10.1145\/3510003.3510111","type":"proceedings-article","created":{"date-parts":[[2022,7,5]],"date-time":"2022-07-05T22:42:59Z","timestamp":1657060979000},"page":"710-722","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":56,"title":["\"Did you miss my comment or what?\""],"prefix":"10.1145","author":[{"given":"Courtney","family":"Miller","sequence":"first","affiliation":[{"name":"Carnegie Mellon University"}]},{"given":"Sophie","family":"Cohen","sequence":"additional","affiliation":[{"name":"Wesleyan University"}]},{"given":"Daniel","family":"Klug","sequence":"additional","affiliation":[{"name":"Carnegie Mellon University"}]},{"given":"Bogdan","family":"Vasilescu","sequence":"additional","affiliation":[{"name":"Carnegie Mellon University"}]},{"given":"Christian","family":"KaUstner","sequence":"additional","affiliation":[{"name":"Wesleyan University"}]}],"member":"320","published-online":{"date-parts":[[2022,7,5]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/1242572.1242608"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/MS.2020.3045817"},{"key":"e_1_3_2_1_3_1","unstructured":"Anonymous. 2014. Leaving Toxic Open Source Communities. https:\/\/modelviewculture.com\/pieces\/leaving-toxic-open-source-communities."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICPC.2016.7503718"},{"key":"e_1_3_2_1_5_1","volume-title":"Detecting the Presence of Cyberbullying Using Computer Software","author":"Bayzick Jennifer","unstructured":"Jennifer Bayzick, April Kontostathis, and Lynne Edwards. 2011. Detecting the Presence of Cyberbullying Using Computer Software. Ursinus College."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/2950290.2950325"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/ESEM.2019.8870179"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1191\/1478088706qp063oa"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/D19-1176"},{"key":"e_1_3_2_1_10_1","unstructured":"Peter Burnap and Matthew Leighton Williams. 2014. Hate Speech Machine Classification and Statistical Modelling of Information Flows on Twitter: Interpretation and communication for policy decision making. In Internet Policy & Politics."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/3134666"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSR.2019.00075"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/3091478.3091487"},{"key":"e_1_3_2_1_14_1","volume-title":"Bastin Tony Roy Savarimuthu, and Stephen Cranefield","author":"Cheriyan Jithin","year":"2020","unstructured":"Jithin Cheriyan, Bastin Tony Roy Savarimuthu, and Stephen Cranefield. 2020. Norm Violation in Online Communities-A Study of Stack Overflow Comments. arXiv preprint arXiv:2004.05589."},{"key":"e_1_3_2_1_15_1","volume-title":"Bastin Tony Roy Savarimuthu, and Stephen Cranefield","author":"Cheriyan Jithin","year":"2021","unstructured":"Jithin Cheriyan, Bastin Tony Roy Savarimuthu, and Stephen Cranefield. 2021. Towards Offensive Language Detection and Reduction in Four Software Engineering Communities. In Evaluation and Assessment in Softw. Eng. 254--259."},{"key":"e_1_3_2_1_16_1","series-title":"Social Media Critical Research Series","volume-title":"A Critical Appraisal of the Twitter-verse","author":"Chohan Usman W","unstructured":"Usman W Chohan and Aron D'Souza. 2020. A Critical Appraisal of the Twitter-verse. Social Media Critical Research Series."},{"key":"e_1_3_2_1_17_1","volume-title":"Dong Wang, Patanamon Thongtanunam, Mohamed Wiem Mkaouer, and Kenichi Matsumoto.","author":"Chouchen Moataz","year":"2021","unstructured":"Moataz Chouchen, Ali Ouni, Raula Gaikovina Kula, Dong Wang, Patanamon Thongtanunam, Mohamed Wiem Mkaouer, and Kenichi Matsumoto. 2021. Anti-Patterns in Modern Code Review: Symptoms and Prevalence. In Int'l Conf. Software Analysis, Evolution and Reengineering (SANER). IEEE, 531--535."},{"key":"e_1_3_2_1_18_1","volume-title":"Qualitative Inquiry and Research Design: Choosing Among Five Approaches","author":"Creswell John W","unstructured":"John W Creswell and Cheryl N Poth. 2016. Qualitative Inquiry and Research Design: Choosing Among Five Approaches. Sage publications."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/2089125.2089127"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1609\/icwsm.v13i01.3217"},{"key":"e_1_3_2_1_21_1","volume-title":"Hate Me Not: Hate Speech Detection on Facebook. In First Italian Conference on Cybersecurity (ITASEC). 86--95","author":"Fabio Del","year":"2017","unstructured":"Fabio Del Vigna12, Andrea Cimino23, Felice Dell'Orletta, Marinella Petrocchi, and Maurizio Tesconi. 2017. Hate Me, Hate Me Not: Hate Speech Detection on Facebook. In First Italian Conference on Cybersecurity (ITASEC). 86--95."},{"key":"e_1_3_2_1_22_1","volume-title":"The Sage Handbook of Qualitative Research","author":"Denzin Norman K","unstructured":"Norman K Denzin and Yvonna S Lincoln. 2011. The Sage Handbook of Qualitative Research. Sage."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.7717\/peerj-cs.73"},{"key":"e_1_3_2_1_24_1","unstructured":"Alan Diggs. 2021. 'Windows is sh*t:' Linux Users and The Technical Superiority Problem. https:\/\/medium.com\/linuxforeveryone\/windows-is-sh-t-linux-users-and-the-technical-superiority-problem-196a597aa860. Accessed: 2021-08-19."},{"key":"e_1_3_2_1_25_1","volume-title":"Measuring and Mitigating Unintended Bias in Text Classification. In AAAI\/ACM Conference on AI, Ethics, and Society. 67--73","author":"Dixon Lucas","year":"2018","unstructured":"Lucas Dixon, John Li, Jeffrey Sorensen, Nithum Thain, and Lucy Vasserman. 2018. Measuring and Mitigating Unintended Bias in Text Classification. In AAAI\/ACM Conference on AI, Ethics, and Society. 67--73."},{"key":"e_1_3_2_1_26_1","unstructured":"Maeve Duggan. 2014. Online Harassment. https:\/\/www.pewresearch.org\/internet\/2014\/10\/22\/online-harassment\/."},{"key":"e_1_3_2_1_27_1","volume-title":"Predicting Developers' Negative Feelings About Code Review. In IEEE\/ACM 42nd International Conference on Software Engineering (ICSE). IEEE, 174--185","author":"Egelman Carolyn D","year":"2020","unstructured":"Carolyn D Egelman, Emerson Murphy-Hill, Elizabeth Kammer, Margaret Morrow Hodges, Collin Green, Ciera Jaspan, and James Lin. 2020. Predicting Developers' Negative Feelings About Code Review. In IEEE\/ACM 42nd International Conference on Software Engineering (ICSE). IEEE, 174--185."},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/3479497"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"crossref","first-page":"e333","DOI":"10.1002\/pra2.333","article-title":"Successful Trolling on Reddit: A Comparison Across Subreddits in Entertainment, Health, Politics, and Religion","volume":"57","author":"Fichman Pnina","year":"2020","unstructured":"Pnina Fichman and Samantha Sharp. 2020. Successful Trolling on Reddit: A Comparison Across Subreddits in Entertainment, Health, Politics, and Religion. Proc. Assoc. Information Science and Technology 57, 1, e333.","journal-title":"Proc. Assoc. Information Science and Technology"},{"key":"e_1_3_2_1_30_1","volume-title":"National Commission for the Protection of Human Subjects of Biomedical and Behavioral Research","author":"United States.","year":"1978","unstructured":"United States. National Commission for the Protection of Human Subjects of Biomedical and Behavioral Research. 1978. The Belmont Report: Ethical Principles and Guidelines for the Protection of Human Subjects of Research. Vol. 2. The Commission."},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/3173574.3174182"},{"key":"e_1_3_2_1_32_1","volume-title":"Exploring Causes of Frustration for Software Developers. In International Workshop on Cooperative and Human Aspects of Software Engineering (CHASE). IEEE, 115--116","author":"Ford Denae","year":"2015","unstructured":"Denae Ford and Chris Parnin. 2015. Exploring Causes of Frustration for Software Developers. In International Workshop on Cooperative and Human Aspects of Software Engineering (CHASE). IEEE, 115--116."},{"key":"e_1_3_2_1_33_1","volume-title":"Paradise Unplugged: Identifying Barriers for Female Participation on Stack Overflow. In Joint Meeting on the Foundations of Software Engineering (ESEC\/FSE). 846--857","author":"Ford Denae","year":"2016","unstructured":"Denae Ford, Justin Smith, Philip J Guo, and Chris Parnin. 2016. Paradise Unplugged: Identifying Barriers for Female Participation on Stack Overflow. In Joint Meeting on the Foundations of Software Engineering (ESEC\/FSE). 846--857."},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"crossref","unstructured":"Daviti Gachechiladze Filippo Lanubile Nicole Novielli and Alexander Serebrenik. 2017. Anger and its Direction in Collaborative Software Development. In Int'l Conf. Software Eng.: New Ideas and Emerging Results (ICSE-NIER). 11--14.","DOI":"10.1109\/ICSE-NIER.2017.18"},{"key":"e_1_3_2_1_35_1","volume-title":"Countering Online Hate Speech","author":"Gagliardone Iginio","unstructured":"Iginio Gagliardone, Danit Gal, Thiago Alves, and Gabriela Martinez. 2015. Countering Online Hate Speech. Unesco Publishing."},{"key":"e_1_3_2_1_36_1","volume-title":"ACM Conference on Computer Supported Cooperative Work (CSCW). 117--126","author":"Stuart Geiger R","year":"2010","unstructured":"R Stuart Geiger and David Ribes. 2010. The Work of Sustaining Order in Wikipedia: The Banning of a Vandal. In ACM Conference on Computer Supported Cooperative Work (CSCW). 117--126."},{"key":"e_1_3_2_1_37_1","volume-title":"Int'l Conf. Mining Software Repositories (MSR)","author":"Gousios Georgios","unstructured":"Georgios Gousios and Diomidis Spinellis. 2012. GHTorrent: GitHub's Data From a Firehose. In Int'l Conf. Mining Software Repositories (MSR). IEEE, 12--21."},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2018.02.041"},{"key":"e_1_3_2_1_39_1","volume-title":"Quantifying Toxicity and Verbal Violence on Twitter. In ACM Conference on Computer Supported Cooperative Work & Social Computing (CSCW) Companion. 277--280","author":"Guberman Joshua","year":"2016","unstructured":"Joshua Guberman, Carol Schmitz, and Libby Hemphill. 2016. Quantifying Toxicity and Verbal Violence on Twitter. In ACM Conference on Computer Supported Cooperative Work & Social Computing (CSCW) Companion. 277--280."},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/2491411.2494578"},{"key":"e_1_3_2_1_41_1","unstructured":"Jay Hanlon. 2018. Stack Overflow Isn't Very Welcoming. It's Time for That to Change. https:\/\/stackoverflow.blog\/2018\/04\/26\/stack-overflow-isnt-very-welcoming-its-time-for-that-to-change\/."},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1515\/jplr.2010.011"},{"key":"e_1_3_2_1_43_1","volume-title":"Research Methods in Social Relations","author":"Hoyle Rick H","unstructured":"Rick H Hoyle, Monica J Harris, and Charles M Judd. 2002. Research Methods in Social Relations. Wadsworth Fort Worth, TX."},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"crossref","unstructured":"Amanda Lee Hughes and Leysia Palen. 2009. Twitter Adoption and Use in Mass Convergence and Emergency Events. International journal of emergency management 6 3--4 248--260.","DOI":"10.1504\/IJEM.2009.031564"},{"key":"e_1_3_2_1_45_1","unstructured":"Bryan Hughes. 2017. Why I'm Leaving The Node.js Project. https:\/\/medium.com\/@nebrius\/why-im-leaving-the-node-js-project-bff946845a77. Accessed: 2021-08-23."},{"key":"e_1_3_2_1_46_1","volume-title":"2009 42nd Hawaii International Conference on System Sciences. IEEE, 1--10","author":"Izquierdo-Cortazar Daniel","year":"2009","unstructured":"Daniel Izquierdo-Cortazar, Gregorio Robles, Felipe Ortega, and Jesus M Gonzalez-Barahona. 2009. Using Software Archaeology to Measure Knowledge Loss in Software Projects Due to Developer Turnover. In 2009 42nd Hawaii International Conference on System Sciences. IEEE, 1--10."},{"key":"e_1_3_2_1_47_1","unstructured":"Schykle Jason Evangelho Alan Diggs. 2020. Linux + Coffee #4: Tribalism and Toxicity. Podcast. https:\/\/player.fm\/series\/series-2567058\/linux-coffee-4-tribalism-and-toxicity"},{"key":"e_1_3_2_1_48_1","unstructured":"Jigsaw. 2017. Perspective API: Using Machine Learning to Reduce Toxicity Online. https:\/\/www.perspectiveapi.com\/."},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1145\/3375197"},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1521\/suli.2008.38.2.166"},{"key":"e_1_3_2_1_51_1","volume-title":"Cyberbullying: Bullying in the Digital Age","author":"Kowalski Robin M","year":"2012","unstructured":"Robin M Kowalski, Susan P Limber, and Patricia W Agatston. 2012. Cyberbullying: Bullying in the Digital Age. John Wiley & Sons."},{"key":"e_1_3_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1145\/3178876.3186141"},{"key":"e_1_3_2_1_53_1","volume-title":"Analyzing Firestorms on Twitter. In International Conference on Advances in Social Networks Analysis and Mining (ASONAM). IEEE, 17--24","author":"Lamba Hemank","year":"2015","unstructured":"Hemank Lamba, Momin M Malik, and Jurgen Pfeffer. 2015. A Tempest in a Teacup? Analyzing Firestorms on Twitter. In International Conference on Advances in Social Networks Analysis and Mining (ASONAM). IEEE, 17--24."},{"key":"e_1_3_2_1_54_1","unstructured":"Nolan Lawson. 2017. What it Feels Like to be an Open-Source Maintainer. https:\/\/nolanlawson.com\/2017\/03\/05\/. Accessed: 2021-08-17."},{"key":"e_1_3_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.1145\/3449093"},{"key":"e_1_3_2_1_56_1","doi-asserted-by":"crossref","unstructured":"Yvonna S Lincoln and Egon G Guba. 1985. Naturalistic Inquiry. Sage.","DOI":"10.1016\/0147-1767(85)90062-8"},{"key":"e_1_3_2_1_57_1","doi-asserted-by":"publisher","DOI":"10.1609\/icwsm.v8i1.14508"},{"key":"e_1_3_2_1_58_1","volume-title":"Brian Keegan, Jaclyn Friedman, and Charlie DeTar.","author":"Matias J","year":"2015","unstructured":"J Matias, Amy Johnson, Whitney Erin Boesel, Brian Keegan, Jaclyn Friedman, and Charlie DeTar. 2015. Reporting, Reviewing, and Responding to Harassment on Twitter. Available at SSRN 2602018."},{"key":"e_1_3_2_1_59_1","unstructured":"Aline Maya. 2019. Hated in the Nation and #DeathTo: What are the Consequences of Trial by Twitter? Black Mirror and Philosophy: Dark Refl."},{"key":"e_1_3_2_1_60_1","volume-title":"Interrater Reliability: The Kappa Statistic. Biochemia medica 22, 3, 276--282.","author":"McHugh Mary L","year":"2012","unstructured":"Mary L McHugh. 2012. Interrater Reliability: The Kappa Statistic. Biochemia medica 22, 3, 276--282."},{"key":"e_1_3_2_1_61_1","volume-title":"Fundamentals of Qualitative Data Analysis","author":"Miles Matthew B","unstructured":"Matthew B Miles, A Michael Huberman, and Johnny Saldana. 2014. Fundamentals of Qualitative Data Analysis. Sage Los Angeles, CA."},{"key":"e_1_3_2_1_62_1","volume-title":"Christian K\u00e4stner, and Bogdan Vasilescu.","author":"Miller Courtney","year":"2019","unstructured":"Courtney Miller, David Gray Widder, Christian K\u00e4stner, and Bogdan Vasilescu. 2019. Why Do People Give Up Flossing? A Study of Contributor Disengagement in Open Source. In IFIP Int'l Conf. Open Source Systems. Springer, 116--129."},{"key":"e_1_3_2_1_63_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2015.334"},{"key":"e_1_3_2_1_64_1","doi-asserted-by":"crossref","unstructured":"Alessandro Murgia Parastou Tourani Bram Adams and Marco Ortu. 2014. Do Developers Feel Emotions? An Exploratory Analysis of Emotions in Software Artifacts. In Int'l Conf. Mining Software Repositories (MSR). 262--271.","DOI":"10.1145\/2597073.2597086"},{"key":"e_1_3_2_1_65_1","doi-asserted-by":"publisher","DOI":"10.1145\/2568225.2568226"},{"key":"e_1_3_2_1_66_1","doi-asserted-by":"publisher","DOI":"10.1177\/1461444811422887"},{"key":"e_1_3_2_1_67_1","volume-title":"Current Perspectives: The Impact of Cyberbullying on Adolescent Health. Adolescent health, medicine and therapeutics 5, 143.","author":"Nixon Charisse L","year":"2014","unstructured":"Charisse L Nixon. 2014. Current Perspectives: The Impact of Cyberbullying on Adolescent Health. Adolescent health, medicine and therapeutics 5, 143."},{"key":"e_1_3_2_1_68_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-021-09960-w"},{"key":"e_1_3_2_1_69_1","doi-asserted-by":"publisher","DOI":"10.1177\/1609406917733847"},{"key":"e_1_3_2_1_70_1","volume-title":"Aggressive Behavior","author":"Olweus Dan","unstructured":"Dan Olweus. 1994. Bullying at School. In Aggressive Behavior. Springer, 97--130."},{"key":"e_1_3_2_1_71_1","volume-title":"Int'l Conf. Mining Software Repositories (MSR)","author":"Ortu Marco","unstructured":"Marco Ortu, Alessandro Murgia, Giuseppe Destefanis, Parastou Tourani, Roberto Tonelli, Michele Marchesi, and Bram Adams. 2016. The Emotional Side of Software Developers in JIRA. In Int'l Conf. Mining Software Repositories (MSR). IEEE, 480--483."},{"key":"e_1_3_2_1_72_1","doi-asserted-by":"publisher","DOI":"10.1145\/3379597.3387494"},{"key":"e_1_3_2_1_73_1","doi-asserted-by":"publisher","DOI":"10.1080\/13527266.2013.797778"},{"key":"e_1_3_2_1_74_1","volume-title":"Automatic Vandalism Detection in Wikipedia. In European Conf. Inf. Retrieval. Springer, 663--668","author":"Potthast Martin","year":"2008","unstructured":"Martin Potthast, Benno Stein, and Robert Gerling. 2008. Automatic Vandalism Detection in Wikipedia. In European Conf. Inf. Retrieval. Springer, 663--668."},{"key":"e_1_3_2_1_75_1","doi-asserted-by":"publisher","DOI":"10.1145\/1316624.1316663"},{"key":"e_1_3_2_1_76_1","doi-asserted-by":"publisher","DOI":"10.1145\/3359224"},{"key":"e_1_3_2_1_77_1","volume-title":"Going Farther Together: The Impact of Social Capital on Sustained Participation in Open Source. In IEEE\/ACM International Conference on Software Engineering (ICSE). 688--699","author":"Qiu Huilian Sophie","year":"2019","unstructured":"Huilian Sophie Qiu, Alexander Nolte, Anita Brown, Alexander Serebrenik, and Bogdan Vasilescu. 2019. Going Farther Together: The Impact of Social Capital on Sustained Participation in Open Source. In IEEE\/ACM International Conference on Software Engineering (ICSE). 688--699."},{"key":"e_1_3_2_1_78_1","unstructured":"Md Mustafizur Rahman Dinesh Balakrishnan Dhiraj Murthy Mucahid Kutlu. and Matthew Lease. 2021. An Information Retrieval Approach to Building Datasets for Hate Speech Detection. arXiv preprint arXiv:2106.09775."},{"key":"e_1_3_2_1_79_1","volume-title":"International Conference on Software Engineering: New Ideas and Emerging Results (ICSE-NIER). 57--60","author":"Raman Naveen","year":"2020","unstructured":"Naveen Raman, Minxuan Cao, Yulia Tsvetkov, Christian K\u00e4stner, and Bogdan Vasilescu. 2020. Stress and Burnout in Open Source: Toward Finding, Understanding, and Mitigating Unhealthy Interactions. In International Conference on Software Engineering: New Ideas and Emerging Results (ICSE-NIER). 57--60."},{"key":"e_1_3_2_1_80_1","doi-asserted-by":"crossref","unstructured":"Sam Ransbotham and Gerald C Kane. 2011. Membership Turnover and Collaboration Success in Online Communities: Explaining Rises and Falls from Grace in Wikipedia. Mis Quarterly 613--627.","DOI":"10.2307\/23042799"},{"key":"e_1_3_2_1_81_1","doi-asserted-by":"crossref","unstructured":"Reddit. 2015. Promote Ideas Protect People https:\/\/redditblog.com\/2015\/05\/14\/promote-ideas-protect-people\/.","DOI":"10.12968\/cypn.2015.8.14"},{"key":"e_1_3_2_1_82_1","volume-title":"Reddit","year":"2015","unstructured":"Reddit. 2015. Reddit March 2015 Survey. https:\/\/docs.google.com\/document\/u\/1\/d\/1QJBPZt0oa3UCkL6QGBHp6vITXs3f1bYcCyA5xIQcFZw\/pub."},{"key":"e_1_3_2_1_83_1","unstructured":"Lena Reinhard. 2014. This is Bigger Than Us: Building a Future for Open Source. JSConf EU. https:\/\/www.youtube.com\/watch?v=-thLNvxFUu4"},{"key":"e_1_3_2_1_84_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICMLA.2011.152"},{"key":"e_1_3_2_1_85_1","unstructured":"Jim Salter. 2021. The Perl Foundation is Fragmenting Over Code of Conduct Enforcement. https:\/\/arstechnica.com\/gadgets\/2021\/08\/the-perl-foundation-is-fragmenting-over-code-of-conduct-enforcement\/."},{"key":"e_1_3_2_1_86_1","doi-asserted-by":"publisher","DOI":"10.1109\/APSEC51365.2020.00030"},{"key":"e_1_3_2_1_87_1","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/W17-1101"},{"key":"e_1_3_2_1_88_1","volume-title":"Qualitative Content Analysis in Practice","author":"Schreier Margrit","unstructured":"Margrit Schreier. 2012. Qualitative Content Analysis in Practice. Sage publications."},{"key":"e_1_3_2_1_89_1","doi-asserted-by":"publisher","DOI":"10.1177\/0165551510365390"},{"key":"e_1_3_2_1_90_1","doi-asserted-by":"publisher","DOI":"10.4324\/9780203425497"},{"key":"e_1_3_2_1_91_1","doi-asserted-by":"crossref","unstructured":"Lin Shi Xiao Chen Ye Yang Hanzhi Jiang Ziyou Jiang Nan Niu and Qing Wang. 2021. A First Look at Developers' Live Chat on Gitter. arXiv preprint arXiv:2107.05823.","DOI":"10.1145\/3462292"},{"key":"e_1_3_2_1_92_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1469-7610.2007.01846.x"},{"key":"e_1_3_2_1_93_1","doi-asserted-by":"publisher","DOI":"10.1145\/3180155.3180208"},{"key":"e_1_3_2_1_94_1","volume-title":"Ana Paula Chaves, and Marco Aur\u00e9lio Gerosa","author":"Steinmacher Igor","year":"2013","unstructured":"Igor Steinmacher, Igor Wiese, Ana Paula Chaves, and Marco Aur\u00e9lio Gerosa. 2013. Why Do Newcomers Abandon Open Source Software Projects?. In Int'l Workshop Cooperative and Human Aspects of Softw. Eng. (CHASE). 25--32."},{"key":"e_1_3_2_1_95_1","doi-asserted-by":"publisher","DOI":"10.4018\/IJT.2017070101"},{"key":"e_1_3_2_1_96_1","volume-title":"Conference on Human Factors in Computing Systems. 1--18","author":"Sharifa","unstructured":"Sharifa Sultana et al. 2021. 'Unmochon': A Tool to Combat Online Sexual Harassment over Facebook Messenger. In Conference on Human Factors in Computing Systems. 1--18."},{"key":"e_1_3_2_1_97_1","unstructured":"Wikimedia Support & Safety Team. 2015. Harassment Survey 2015 Results Report. https:\/\/upload.wikimedia.org\/wikipedia\/commons\/5\/52\/Harassment_Survey_2015_-_Results_Report.pdf."},{"key":"e_1_3_2_1_98_1","volume-title":"Code of Conduct in Open Source Projects. In International Conference on Software Analysis, Evolution and Reengineering (SANER). IEEE, 24--33","author":"Tourani Parastou","year":"2017","unstructured":"Parastou Tourani, Bram Adams, and Alexander Serebrenik. 2017. Code of Conduct in Open Source Projects. In International Conference on Software Analysis, Evolution and Reengineering (SANER). IEEE, 24--33."},{"key":"e_1_3_2_1_99_1","volume-title":"Perceptions of Diversity on GitHub: A User Survey. In International Workshop on Cooperative and Human Aspects of Software Engineering (CHASE). IEEE, 50--56","author":"Vasilescu Bogdan","year":"2015","unstructured":"Bogdan Vasilescu, Vladimir Filkov, and Alexander Serebrenik. 2015. Perceptions of Diversity on GitHub: A User Survey. In International Workshop on Cooperative and Human Aspects of Software Engineering (CHASE). IEEE, 50--56."},{"key":"e_1_3_2_1_100_1","doi-asserted-by":"publisher","DOI":"10.1145\/2531602.2531659"},{"key":"e_1_3_2_1_101_1","unstructured":"Dmitry Vinnik. 2019. Kindness Engineering. DevRelCon. https:\/\/www.danskebank.com\/en-uk\/ir\/Documents\/2015\/Q4\/PresentationQ42015-Press.pdf"},{"key":"e_1_3_2_1_102_1","doi-asserted-by":"publisher","DOI":"10.1145\/2998181.2998337"},{"key":"e_1_3_2_1_103_1","doi-asserted-by":"publisher","DOI":"10.1080\/15388220.2014.949377"},{"key":"e_1_3_2_1_104_1","doi-asserted-by":"publisher","DOI":"10.1037\/a0033657"},{"key":"e_1_3_2_1_105_1","unstructured":"Wikipedia. 2012. Wikipedia:Counter-Vandalism Unit\/Vandalism Studies. https:\/\/en.wikipedia.org\/wiki\/Wikipedia:Counter-Vandalism_Unit\/Vandalism_studies."},{"key":"e_1_3_2_1_106_1","doi-asserted-by":"publisher","DOI":"10.1145\/3038912.3052591"},{"key":"e_1_3_2_1_107_1","unstructured":"Sawyer X. 2016. A Pumpking is Born. http:\/\/blogs.perl.org\/users\/sawyer_x\/2016\/04\/a-pumpking-is-born.html."},{"key":"e_1_3_2_1_108_1","unstructured":"Sawyer X. 2021. I Am Stepping Down from PSC and Core Effective Immediately. https:\/\/perl.topicbox.com\/groups\/perl-core\/T7a4f1bf9e069641f."},{"key":"e_1_3_2_1_109_1","doi-asserted-by":"publisher","DOI":"10.1145\/3415179"},{"key":"e_1_3_2_1_110_1","doi-asserted-by":"publisher","DOI":"10.1145\/2396761.2398556"},{"key":"e_1_3_2_1_111_1","volume-title":"Proc. Conf. North American Chapter of the ACL: Human language technologies. 656--666","author":"Xu Jun-Ming","year":"2012","unstructured":"Jun-Ming Xu, Kwang-Sung Jun, Xiaojin Zhu, and Amy Bellmore. 2012. Learning from Bullying Traces in Social Media. In Proc. Conf. North American Chapter of the ACL: Human language technologies. 656--666."},{"key":"e_1_3_2_1_112_1","doi-asserted-by":"publisher","DOI":"10.1109\/MS.2020.3038765"}],"event":{"name":"ICSE '22: 44th International Conference on Software Engineering","location":"Pittsburgh Pennsylvania","acronym":"ICSE '22","sponsor":["SIGSOFT ACM Special Interest Group on Software Engineering","IEEE CS"]},"container-title":["Proceedings of the 44th International Conference on Software Engineering"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3510003.3510111","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3510003.3510111","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3510003.3510111","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T18:10:24Z","timestamp":1750183824000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3510003.3510111"}},"subtitle":["understanding toxicity in open source discussions"],"short-title":[],"issued":{"date-parts":[[2022,5,21]]},"references-count":112,"alternative-id":["10.1145\/3510003.3510111","10.1145\/3510003"],"URL":"https:\/\/doi.org\/10.1145\/3510003.3510111","relation":{},"subject":[],"published":{"date-parts":[[2022,5,21]]},"assertion":[{"value":"2022-07-05","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}