{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,22]],"date-time":"2025-08-22T05:11:03Z","timestamp":1755839463222,"version":"3.41.0"},"reference-count":79,"publisher":"Association for Computing Machinery (ACM)","issue":"GROUP","license":[{"start":{"date-parts":[[2022,12,29]],"date-time":"2022-12-29T00:00:00Z","timestamp":1672272000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["1763297, 1552503"],"award-info":[{"award-number":["1763297, 1552503"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["Proc. ACM Hum.-Comput. Interact."],"published-print":{"date-parts":[[2023,1]]},"abstract":"<jats:p>Online harassment is pervasive. While substantial research has examined the nature of online harassment and how to moderate it, little work has explored how social media users evaluate the profiles of online harassers. This is important for helping people who may be experiencing or observing harassment to quickly and efficiently evaluate the user doing the harassing. We conducted a lab experiment (N=45) that eye-tracked participants while they viewed profiles of users who engaged in online harassment on mock Facebook, Twitter, and Instagram profiles. We evaluated what profile elements they looked at and for how long relative to a control group, and their qualitative attitudes about harasser profiles. Results showed that participants look at harassing users' post history more quickly than non-harassing users. They are also somewhat more likely to recall harassing profiles than non-harassing profiles. However, they do not spend more time on harassing profiles. Understanding what users pay attention to and recall may offer new design opportunities for supporting people who experience or observe harassment online.<\/jats:p>","DOI":"10.1145\/3567557","type":"journal-article","created":{"date-parts":[[2022,12,29]],"date-time":"2022-12-29T21:22:29Z","timestamp":1672348949000},"page":"1-14","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["Evaluating the Social Media Profiles of Online Harassers"],"prefix":"10.1145","volume":"7","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-8688-1595","authenticated-orcid":false,"given":"Sarita","family":"Schoenebeck","sequence":"first","affiliation":[{"name":"University of Michigan, Ann Arbor, MI, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4381-9046","authenticated-orcid":false,"given":"Yu Yin","family":"Shen","sequence":"additional","affiliation":[{"name":"University of Michigan, Ann Arbor, MI, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9678-1002","authenticated-orcid":false,"given":"Jill","family":"Davidson","sequence":"additional","affiliation":[{"name":"University of Michigan, Ann Arbor, MI, USA"}]}],"member":"320","published-online":{"date-parts":[[2022,12,29]]},"reference":[{"key":"e_1_2_1_1_1","unstructured":"ND. MediaLab and DirectRT Psychology Software. (ND). \"http:\/\/www.empirisoft.com\/medialab.aspx\"  ND. MediaLab and DirectRT Psychology Software. (ND). \"http:\/\/www.empirisoft.com\/medialab.aspx\""},{"key":"e_1_2_1_2_1","volume-title":"Invisible Threats: Online Hate Speech Against Human Rights Defenders in Guatemala","author":"Abbas Muna","year":"2019","unstructured":"Muna Abbas , Elaf Al-Wohaibi , Jonathan Donovan , Emma Hale , Tatyana Marugg , Jon B Sykes , Molly K Land , and Richard Ashby Wilson . 2019 . Invisible Threats: Online Hate Speech Against Human Rights Defenders in Guatemala . American Bar Association Center for Human Rights ( 2019). Muna Abbas, Elaf Al-Wohaibi, Jonathan Donovan, Emma Hale, Tatyana Marugg, JonB Sykes, Molly K Land, and Richard Ashby Wilson. 2019. Invisible Threats: Online Hate Speech Against Human Rights Defenders in Guatemala. American Bar Association Center for Human Rights (2019)."},{"key":"e_1_2_1_3_1","volume-title":"Culpable control and the psychology of blame. Psychological bulletin 126, 4","author":"Alicke Mark D","year":"2000","unstructured":"Mark D Alicke . 2000. Culpable control and the psychology of blame. Psychological bulletin 126, 4 ( 2000 ), 556. Mark D Alicke. 2000. Culpable control and the psychology of blame. Psychological bulletin 126, 4 (2000), 556."},{"key":"e_1_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.5840\/jphil20111081238"},{"volume-title":"First impressions","author":"Ambady Nalini","key":"e_1_2_1_5_1","unstructured":"Nalini Ambady and John Joseph Skowronski . 2008. First impressions . Guilford Press . Nalini Ambady and John Joseph Skowronski. 2008. First impressions. Guilford Press."},{"key":"e_1_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/2145204.2145277"},{"key":"e_1_2_1_7_1","volume-title":"The Shadowban Cycle: an autoethnography of pole dancing, nudity and censorship on Instagram. Feminist Media Studies","author":"Are Carolina","year":"2021","unstructured":"Carolina Are . 2021. The Shadowban Cycle: an autoethnography of pole dancing, nudity and censorship on Instagram. Feminist Media Studies ( 2021 ), 1--18. Carolina Are. 2021. The Shadowban Cycle: an autoethnography of pole dancing, nudity and censorship on Instagram. Feminist Media Studies (2021), 1--18."},{"key":"e_1_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2017.04.056"},{"key":"e_1_2_1_9_1","volume-title":"Proceedings of the International AAAI Conference on Web and Social Media","volume":"5","author":"Backstrom Lars","year":"2011","unstructured":"Lars Backstrom , Eytan Bakshy , Jon Kleinberg , Thomas Lento , and Itamar Rosenn . 2011 . Center of attention: How facebook users allocate attention across friends . In Proceedings of the International AAAI Conference on Web and Social Media , Vol. 5 . 34--41. Lars Backstrom, Eytan Bakshy, Jon Kleinberg, Thomas Lento, and Itamar Rosenn. 2011. Center of attention: How facebook users allocate attention across friends. In Proceedings of the International AAAI Conference on Web and Social Media, Vol. 5. 34--41."},{"key":"e_1_2_1_10_1","volume-title":"Exposure to ideologically diverse news and opinion on Facebook. Science 348, 6239","author":"Bakshy Eytan","year":"2015","unstructured":"Eytan Bakshy , Solomon Messing , and Lada A Adamic . 2015. Exposure to ideologically diverse news and opinion on Facebook. Science 348, 6239 ( 2015 ), 1130--1132. Eytan Bakshy, Solomon Messing, and Lada A Adamic. 2015. Exposure to ideologically diverse news and opinion on Facebook. Science 348, 6239 (2015), 1130--1132."},{"key":"e_1_2_1_11_1","volume-title":"Collecting retrospective data: accuracy of recall after 50 years judged against historical records. Social science & medicine 45, 10","author":"Berney Lee R","year":"1997","unstructured":"Lee R Berney and David B Blane . 1997. Collecting retrospective data: accuracy of recall after 50 years judged against historical records. Social science & medicine 45, 10 ( 1997 ), 1519--1525. Lee R Berney and David B Blane. 1997. Collecting retrospective data: accuracy of recall after 50 years judged against historical records. Social science & medicine 45, 10 (1997), 1519--1525."},{"key":"e_1_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/2470654.2470658"},{"key":"e_1_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1609\/icwsm.v12i1.15036"},{"key":"e_1_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/3134659"},{"key":"e_1_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1016\/0005-7916(94)90063-9"},{"key":"e_1_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/3274294"},{"key":"e_1_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/2441776.2441936"},{"key":"e_1_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/1753326.1753613"},{"key":"e_1_2_1_19_1","volume-title":"Mechanisms of emotional arousal and lasting declarative memory. Trends in neurosciences 21, 7","author":"Cahill Larry","year":"1998","unstructured":"Larry Cahill and James L McGaugh . 1998. Mechanisms of emotional arousal and lasting declarative memory. Trends in neurosciences 21, 7 ( 1998 ), 294--299. Larry Cahill and James L McGaugh. 1998. Mechanisms of emotional arousal and lasting declarative memory. Trends in neurosciences 21, 7 (1998), 294--299."},{"key":"e_1_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1177\/2056305120936636"},{"key":"e_1_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/3274301"},{"key":"e_1_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/3025453.3026018"},{"key":"e_1_2_1_23_1","unstructured":"Robert B Cialdini and Melanie R Trost. 1998. Social influence: Social norms conformity and compliance. (1998).  Robert B Cialdini and Melanie R Trost. 1998. Social influence: Social norms conformity and compliance. (1998)."},{"key":"e_1_2_1_24_1","first-page":"1035","article-title":"Extremist speech, compelled conformity, and censorship creep","volume":"93","author":"Citron Danielle Keats","year":"2017","unstructured":"Danielle Keats Citron . 2017 . Extremist speech, compelled conformity, and censorship creep . Notre Dame L. Rev. 93 (2017), 1035 . Danielle Keats Citron. 2017. Extremist speech, compelled conformity, and censorship creep. Notre Dame L. Rev. 93 (2017), 1035.","journal-title":"Notre Dame L. Rev."},{"key":"e_1_2_1_25_1","volume-title":"Proceedings of the International AAAI Conference on Web and Social Media","volume":"5","author":"Counts Scott","year":"2011","unstructured":"Scott Counts and Kristie Fisher . 2011 . Taking it all in? visual attention in microblog consumption . In Proceedings of the International AAAI Conference on Web and Social Media , Vol. 5 . 97--104. Scott Counts and Kristie Fisher. 2011. Taking it all in? visual attention in microblog consumption. In Proceedings of the International AAAI Conference on Web and Social Media, Vol. 5. 97--104."},{"key":"e_1_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/2531602.2531675"},{"key":"e_1_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1083-6101.2007.00394.x"},{"key":"e_1_2_1_28_1","first-page":"759","article-title":"Governing online speech: From\" posts-as-trumps\" to proportionality and probability","volume":"121","author":"Douek Evelyn","year":"2021","unstructured":"Evelyn Douek . 2021 . Governing online speech: From\" posts-as-trumps\" to proportionality and probability . Colum. L. Rev. 121 (2021), 759 . Evelyn Douek. 2021. Governing online speech: From\" posts-as-trumps\" to proportionality and probability. Colum. L. Rev. 121 (2021), 759.","journal-title":"Colum. L. Rev."},{"key":"e_1_2_1_29_1","volume-title":"Online harassment","author":"Duggan Maeve","year":"2017","unstructured":"Maeve Duggan . 2017. Online harassment 2017 . (2017). Maeve Duggan. 2017. Online harassment 2017. (2017)."},{"key":"e_1_2_1_30_1","volume-title":"Profile as promise: A framework for conceptualizing veracity in online dating self-presentations. New media & society 14, 1","author":"Ellison Nicole B","year":"2012","unstructured":"Nicole B Ellison , Jeffrey T Hancock , and Catalina L Toma . 2012. Profile as promise: A framework for conceptualizing veracity in online dating self-presentations. New media & society 14, 1 ( 2012 ), 45--62. Nicole B Ellison, Jeffrey T Hancock, and Catalina L Toma. 2012. Profile as promise: A framework for conceptualizing veracity in online dating self-presentations. New media & society 14, 1 (2012), 45--62."},{"key":"e_1_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1093\/jcmc\/zmaa013"},{"volume-title":"Attention and arousal: Cognition and performance","author":"Eysenck Michael","key":"e_1_2_1_32_1","unstructured":"Michael Eysenck . 2012. Attention and arousal: Cognition and performance . Springer Science & Business Media . Michael Eysenck. 2012. Attention and arousal: Cognition and performance. Springer Science & Business Media."},{"key":"e_1_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.3390\/soc10030051"},{"key":"e_1_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1037\/xge0000132"},{"key":"e_1_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1080\/10584609.2018.1477506"},{"volume-title":"Custodians of the Internet: Platforms, content moderation, and the hidden decisions that shape social media","author":"Gillespie Tarleton","key":"e_1_2_1_36_1","unstructured":"Tarleton Gillespie . 2018. Custodians of the Internet: Platforms, content moderation, and the hidden decisions that shape social media . Yale University Press . Tarleton Gillespie. 2018. Custodians of the Internet: Platforms, content moderation, and the hidden decisions that shape social media. Yale University Press."},{"key":"e_1_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1177\/20563051221117552"},{"key":"e_1_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1037\/0278-7393.27.5.1131"},{"volume-title":"Stalkers, Pervs, and Trolls","author":"Goldberg Carrie","key":"e_1_2_1_39_1","unstructured":"Carrie Goldberg . 2019. Nobody's Victim: Fighting Psychos , Stalkers, Pervs, and Trolls . Penguin . Carrie Goldberg. 2019. Nobody's Victim: Fighting Psychos, Stalkers, Pervs, and Trolls. Penguin."},{"key":"e_1_2_1_40_1","first-page":"1","article-title":"Content Moderation Remedies","volume":"28","author":"Goldman Eric","year":"2021","unstructured":"Eric Goldman . 2021 . Content Moderation Remedies . Mich. Tech. L. Rev. 28 (2021), 1 . Eric Goldman. 2021. Content Moderation Remedies. Mich. Tech. L. Rev. 28 (2021), 1.","journal-title":"Mich. Tech. L. Rev."},{"volume-title":"Moral panics: The social construction of deviance","author":"Goode Erich","key":"e_1_2_1_41_1","unstructured":"Erich Goode and Nachman Ben-Yehuda . 2010. Moral panics: The social construction of deviance . John Wiley & Sons . Erich Goode and Nachman Ben-Yehuda. 2010. Moral panics: The social construction of deviance. John Wiley & Sons."},{"key":"e_1_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1080\/1369118X.2011.642401"},{"key":"e_1_2_1_43_1","volume-title":"Black Gamers' Resistance. Race and Media: Critical Approaches","author":"Gray Kishonna L","year":"2020","unstructured":"Kishonna L Gray . 2020. Black Gamers' Resistance. Race and Media: Critical Approaches ( 2020 ), 241--51. Kishonna L Gray. 2020. Black Gamers' Resistance. Race and Media: Critical Approaches (2020), 241--51."},{"key":"e_1_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1145\/3479610"},{"key":"e_1_2_1_45_1","volume-title":"Deceiving google's perspective api built for detecting toxic comments. arXiv preprint arXiv:1702.08138","author":"Hosseini Hossein","year":"2017","unstructured":"Hossein Hosseini , Sreeram Kannan , Baosen Zhang , and Radha Poovendran . 2017. Deceiving google's perspective api built for detecting toxic comments. arXiv preprint arXiv:1702.08138 ( 2017 ). Hossein Hosseini, Sreeram Kannan, Baosen Zhang, and Radha Poovendran. 2017. Deceiving google's perspective api built for detecting toxic comments. arXiv preprint arXiv:1702.08138 (2017)."},{"key":"e_1_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1145\/3359252"},{"key":"e_1_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0256762"},{"key":"e_1_2_1_48_1","doi-asserted-by":"crossref","unstructured":"M Just and P Carpenter. 1976. Eye fixations and cognitive processes. Cognitive Psychology. (1976).  M Just and P Carpenter. 1976. Eye fixations and cognitive processes. Cognitive Psychology. (1976).","DOI":"10.1016\/0010-0285(76)90015-3"},{"key":"e_1_2_1_49_1","first-page":"1598","article-title":"The new governors: The people, rules, and processes governing online speech","volume":"131","author":"Klonick Kate","year":"2017","unstructured":"Kate Klonick . 2017 . The new governors: The people, rules, and processes governing online speech . Harv. L. Rev. 131 (2017), 1598 . Kate Klonick. 2017. The new governors: The people, rules, and processes governing online speech. Harv. L. Rev. 131 (2017), 1598.","journal-title":"Harv. L. Rev."},{"key":"e_1_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1468-2958.2004.tb00738.x"},{"volume-title":"Online harassment, digital abuse, and cyberstalking in America","author":"Lenhart Amanda","key":"e_1_2_1_51_1","unstructured":"Amanda Lenhart , Michele Ybarra , Kathryn Zickuhr , and Myeshia Price-Feeney . 2016. Online harassment, digital abuse, and cyberstalking in America . Data and Society Research Institute . Amanda Lenhart, Michele Ybarra, Kathryn Zickuhr, and Myeshia Price-Feeney. 2016. Online harassment, digital abuse, and cyberstalking in America. Data and Society Research Institute."},{"key":"e_1_2_1_52_1","volume-title":"Algorithmic misogynoir in content moderation practice","author":"Marshall Brandeis","year":"2021","unstructured":"Brandeis Marshall . 2021. Algorithmic misogynoir in content moderation practice . Heinrich-B\u00f6ll-Stiftung European Union ( 2021 ). Brandeis Marshall. 2021. Algorithmic misogynoir in content moderation practice. Heinrich-B\u00f6ll-Stiftung European Union (2021)."},{"key":"e_1_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1177\/20563051211021378"},{"key":"e_1_2_1_54_1","volume-title":"How Reddit's algorithm, governance, and culture support toxic technocultures. New media & society 19, 3","author":"Massanari Adrienne","year":"2017","unstructured":"Adrienne Massanari . 2017. # Gamergate and The Fappening : How Reddit's algorithm, governance, and culture support toxic technocultures. New media & society 19, 3 ( 2017 ), 329--346. Adrienne Massanari. 2017. # Gamergate and The Fappening: How Reddit's algorithm, governance, and culture support toxic technocultures. New media & society 19, 3 (2017), 329--346."},{"key":"e_1_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.1073\/pnas.1813486116"},{"key":"e_1_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.1145\/3134715"},{"key":"e_1_2_1_57_1","doi-asserted-by":"publisher","DOI":"10.1145\/2145204.2145274"},{"volume-title":"Handbook of perception and action.","author":"Neumann Odmar","key":"e_1_2_1_58_1","unstructured":"Odmar Neumann . 1996. Theories of attention . In Handbook of perception and action. Vol. 3 . Elsevier , 389--446. Odmar Neumann. 1996. Theories of attention. In Handbook of perception and action. Vol. 3. Elsevier, 389--446."},{"key":"e_1_2_1_59_1","doi-asserted-by":"publisher","DOI":"10.1145\/332040.332409"},{"key":"e_1_2_1_60_1","unstructured":"Donald A Norman. 1976. Memory and attention: An introduction to human information processing. (1976).  Donald A Norman. 1976. Memory and attention: An introduction to human information processing. (1976)."},{"key":"e_1_2_1_61_1","volume-title":"Your post is embarrassing me: Face threats, identity, and the audience on Facebook. Computers in human behavior 73","author":"Oeldorf-Hirsch Anne","year":"2017","unstructured":"Anne Oeldorf-Hirsch , Jeremy Birnholtz , and Jeffrey T Hancock . 2017. Your post is embarrassing me: Face threats, identity, and the audience on Facebook. Computers in human behavior 73 ( 2017 ), 92--99. Anne Oeldorf-Hirsch, Jeremy Birnholtz, and Jeffrey T Hancock. 2017. Your post is embarrassing me: Face threats, identity, and the audience on Facebook. Computers in human behavior 73 (2017), 92--99."},{"key":"e_1_2_1_62_1","doi-asserted-by":"publisher","DOI":"10.1145\/2470654.2481281"},{"volume-title":"Behind the screen","author":"Roberts Sarah T","key":"e_1_2_1_63_1","unstructured":"Sarah T Roberts . 2019. Behind the screen . Yale University Press . Sarah T Roberts. 2019. Behind the screen. Yale University Press."},{"key":"e_1_2_1_64_1","doi-asserted-by":"publisher","DOI":"10.1145\/3479512"},{"key":"e_1_2_1_65_1","first-page":"113","article-title":"Reimagining social media governance: Harm, accountability, and repair","volume":"23","author":"Schoenebeck Sarita","year":"2020","unstructured":"Sarita Schoenebeck and Lindsay Blackwell . 2020 . Reimagining social media governance: Harm, accountability, and repair . Yale JL & Tech. 23 (2020), 113 . Sarita Schoenebeck and Lindsay Blackwell. 2020. Reimagining social media governance: Harm, accountability, and repair. Yale JL & Tech. 23 (2020), 113.","journal-title":"Yale JL & Tech."},{"key":"e_1_2_1_66_1","volume-title":"Drawing from justice theories to support targets of online harassment. new media & society 23, 5","author":"Schoenebeck Sarita","year":"2021","unstructured":"Sarita Schoenebeck , Oliver L Haimson , and Lisa Nakamura . 2021. Drawing from justice theories to support targets of online harassment. new media & society 23, 5 ( 2021 ), 1278--1300. Sarita Schoenebeck, Oliver L Haimson, and Lisa Nakamura. 2021. Drawing from justice theories to support targets of online harassment. new media & society 23, 5 (2021), 1278--1300."},{"key":"e_1_2_1_67_1","volume-title":"Retrospective and concurrent self-reports: The rationale for real-time data capture. The science of real-time data capture: Self-reports in health research 11","author":"Schwarz Norbert","year":"2007","unstructured":"Norbert Schwarz . 2007. Retrospective and concurrent self-reports: The rationale for real-time data capture. The science of real-time data capture: Self-reports in health research 11 ( 2007 ), 26. Norbert Schwarz. 2007. Retrospective and concurrent self-reports: The rationale for real-time data capture. The science of real-time data capture: Self-reports in health research 11 (2007), 26."},{"key":"e_1_2_1_68_1","doi-asserted-by":"publisher","DOI":"10.1177\/1461444818821316"},{"key":"e_1_2_1_69_1","volume-title":"IConference 2014 proceedings","author":"Starbird Kate","year":"2014","unstructured":"Kate Starbird , Jim Maddock , Mania Orand , Peg Achterman , and Robert M Mason . 2014 . Rumors, false flags, and digital vigilantes: Misinformation on twitter after the 2013 boston marathon bombing . IConference 2014 proceedings (2014). Kate Starbird, Jim Maddock, Mania Orand, Peg Achterman, and Robert M Mason. 2014. Rumors, false flags, and digital vigilantes: Misinformation on twitter after the 2013 boston marathon bombing. IConference 2014 proceedings (2014)."},{"key":"e_1_2_1_70_1","doi-asserted-by":"publisher","DOI":"10.1145\/3411764.3445154"},{"key":"e_1_2_1_71_1","volume-title":"A feature-integration theory of attention. Cognitive psychology 12, 1","author":"Treisman Anne M","year":"1980","unstructured":"Anne M Treisman and Garry Gelade . 1980. A feature-integration theory of attention. Cognitive psychology 12, 1 ( 1980 ), 97--136. Anne M Treisman and Garry Gelade. 1980. A feature-integration theory of attention. Cognitive psychology 12, 1 (1980), 97--136."},{"key":"e_1_2_1_72_1","doi-asserted-by":"crossref","unstructured":"Oren Tsur Dmitry Davidov and Ari Rappoport. 2010. ICWSM-a great catchy name: Semi-supervised recognition of sarcastic sentences in online product reviews. In fourth international AAAI conference on weblogs and social media.  Oren Tsur Dmitry Davidov and Ari Rappoport. 2010. ICWSM-a great catchy name: Semi-supervised recognition of sarcastic sentences in online product reviews. In fourth international AAAI conference on weblogs and social media.","DOI":"10.1609\/icwsm.v4i1.14018"},{"key":"e_1_2_1_73_1","volume-title":"Twitter makes it worse: Political journalists, gendered echo chambers, and the amplification of gender bias. The international journal of press\/politics 23, 3","author":"Usher Nikki","year":"2018","unstructured":"Nikki Usher , Jesse Holcomb , and Justin Littman . 2018. Twitter makes it worse: Political journalists, gendered echo chambers, and the amplification of gender bias. The international journal of press\/politics 23, 3 ( 2018 ), 324--344. Nikki Usher, Jesse Holcomb, and Justin Littman. 2018. Twitter makes it worse: Political journalists, gendered echo chambers, and the amplification of gender bias. The international journal of press\/politics 23, 3 (2018), 324--344."},{"key":"e_1_2_1_74_1","volume-title":"Relational communication in computer-mediated interaction. Human communication research 19, 1","author":"Walther Joseph B","year":"1992","unstructured":"Joseph B Walther and Judee K Burgoon . 1992. Relational communication in computer-mediated interaction. Human communication research 19, 1 ( 1992 ), 50--88. Joseph B Walther and Judee K Burgoon. 1992. Relational communication in computer-mediated interaction. Human communication research 19, 1 (1992), 50--88."},{"key":"e_1_2_1_75_1","volume-title":"Cues filtered out, cues filtered in: Computer-mediated communication and relationships. Handbook of interpersonal communication 3","author":"Walther Joseph B","year":"2002","unstructured":"Joseph B Walther and Malcolm R Parks . 2002. Cues filtered out, cues filtered in: Computer-mediated communication and relationships. Handbook of interpersonal communication 3 ( 2002 ), 529--563. Joseph B Walther and Malcolm R Parks. 2002. Cues filtered out, cues filtered in: Computer-mediated communication and relationships. Handbook of interpersonal communication 3 (2002), 529--563."},{"key":"e_1_2_1_76_1","volume-title":"Lauren M Hamel, and Hillary C Shulman.","author":"Walther Joseph B","year":"2009","unstructured":"Joseph B Walther , Brandon Van Der Heide , Lauren M Hamel, and Hillary C Shulman. 2009 . Self-generated versus other-generated statements and impressions in computer-mediated communication: A test of warranting theory using Facebook. Communication research 36, 2 (2009), 229--253. Joseph B Walther, Brandon Van Der Heide, Lauren M Hamel, and Hillary C Shulman. 2009. Self-generated versus other-generated statements and impressions in computer-mediated communication: A test of warranting theory using Facebook. Communication research 36, 2 (2009), 229--253."},{"key":"e_1_2_1_77_1","volume-title":"Eye fixations on advertisements and memory for brands: A model and findings. Marketing science 19, 4","author":"Wedel Michel","year":"2000","unstructured":"Michel Wedel and Rik Pieters . 2000. Eye fixations on advertisements and memory for brands: A model and findings. Marketing science 19, 4 ( 2000 ), 297--312. Michel Wedel and Rik Pieters. 2000. Eye fixations on advertisements and memory for brands: A model and findings. Marketing science 19, 4 (2000), 297--312."},{"key":"e_1_2_1_78_1","doi-asserted-by":"crossref","unstructured":"Michel Wedel Rik Pieters etal 2008. Eye tracking for visual marketing. Foundations and Trends\u00ae in Marketing 1 4 (2008) 231--320.  Michel Wedel Rik Pieters et al. 2008. Eye tracking for visual marketing. Foundations and Trends\u00ae in Marketing 1 4 (2008) 231--320.","DOI":"10.1561\/1700000011"},{"key":"e_1_2_1_79_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jesp.2008.12.009"}],"container-title":["Proceedings of the ACM on Human-Computer Interaction"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3567557","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3567557","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3567557","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T22:43:47Z","timestamp":1750286627000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3567557"}},"subtitle":["An Experimental Study of Attention and Attitudes"],"short-title":[],"issued":{"date-parts":[[2022,12,29]]},"references-count":79,"journal-issue":{"issue":"GROUP","published-print":{"date-parts":[[2023,1]]}},"alternative-id":["10.1145\/3567557"],"URL":"https:\/\/doi.org\/10.1145\/3567557","relation":{},"ISSN":["2573-0142"],"issn-type":[{"type":"electronic","value":"2573-0142"}],"subject":[],"published":{"date-parts":[[2022,12,29]]},"assertion":[{"value":"2022-12-29","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}