{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,20]],"date-time":"2025-11-20T13:01:54Z","timestamp":1763643714427,"version":"3.41.0"},"reference-count":89,"publisher":"Association for Computing Machinery (ACM)","issue":"GROUP","license":[{"start":{"date-parts":[[2022,12,29]],"date-time":"2022-12-29T00:00:00Z","timestamp":1672272000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["Proc. ACM Hum.-Comput. Interact."],"published-print":{"date-parts":[[2023,1]]},"abstract":"<jats:p>Communication technologies, from social media to video conferencing, are used by billions of people globally and contribute to shaping relationships between people. As these technologies become increasingly ubiquitous, the tech workers building them are increasingly making product decisions that can have far-reaching interpersonal ramifications. At the same time, few workplace tools and support exist to help tech workers understand and navigate these potential ramifications, and tech worker perspectives on such tools are not fully understood. In this work, we explore the needs, challenges, and opportunities encountered by tech workers in thinking through the interpersonal implications of their products. To do this, we ran a semi-structured interview study with 10 diverse tech workers. To ground the discussion, study participants interacted with a design probe prototype, InterAct, which provides research-grounded information about interpersonal implications of product features. Our findings suggest a desire by tech workers to consider the social implications of the technologies they build, and the potential for structured tooling to help provide the required knowledge and build organizational support. Based on these findings, we provide design considerations for creating future workplace tools to support thinking about the social implications of technologies.<\/jats:p>","DOI":"10.1145\/3567566","type":"journal-article","created":{"date-parts":[[2022,12,29]],"date-time":"2022-12-29T21:22:29Z","timestamp":1672348949000},"page":"1-22","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":5,"title":["Tech Worker Perspectives on Considering the Interpersonal Implications of Communication Technologies"],"prefix":"10.1145","volume":"7","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-8560-4940","authenticated-orcid":false,"given":"Elena","family":"Maris","sequence":"first","affiliation":[{"name":"University of Illinois at Chicago, Chicago, IL, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9969-6188","authenticated-orcid":false,"given":"Kelly B.","family":"Wagman","sequence":"additional","affiliation":[{"name":"University of Chicago, Chicago, IL, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4590-0753","authenticated-orcid":false,"given":"Rachel","family":"Bergmann","sequence":"additional","affiliation":[{"name":"Stanford University, Palo Alto, CA, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7846-3481","authenticated-orcid":false,"given":"Danielle","family":"Bragg","sequence":"additional","affiliation":[{"name":"Microsoft Research, Cambridge, MA, USA"}]}],"member":"320","published-online":{"date-parts":[[2022,12,29]]},"reference":[{"key":"e_1_2_1_1_1","unstructured":"Adobe. 2015. Captivate Prime. https:\/\/www.adobe.com\/products\/captivateprime.html  Adobe. 2015. Captivate Prime. https:\/\/www.adobe.com\/products\/captivateprime.html"},{"volume-title":"Desperately seeking the audience","author":"Ang Ien","key":"e_1_2_1_2_1","unstructured":"Ien Ang . 1991. Desperately seeking the audience . Routledge . Ien Ang. 1991. Desperately seeking the audience. Routledge."},{"key":"e_1_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/1753326.1753653"},{"key":"e_1_2_1_4_1","unstructured":"Atlassian. 2008. Bitbucket. https:\/\/bitbucket.org\/product  Atlassian. 2008. Bitbucket. https:\/\/bitbucket.org\/product"},{"key":"e_1_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/1753326.1753521"},{"volume-title":"Personal connections in the digital age","author":"Baym Nancy K","key":"e_1_2_1_6_1","unstructured":"Nancy K Baym . 2015. Personal connections in the digital age . John Wiley & Sons . Nancy K Baym. 2015. Personal connections in the digital age. John Wiley & Sons."},{"key":"e_1_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1177\/1461444807080339"},{"key":"e_1_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1468-2958.2008.00322.x"},{"key":"e_1_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/3290605.3300769"},{"key":"e_1_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1093\/jcmc\/zmy020"},{"key":"e_1_2_1_11_1","article-title":"Dicing with deception: People with disabilities' strategies for managing safety and identity online","volume":"8","author":"Bowker Natilene","year":"2003","unstructured":"Natilene Bowker and Keith Tuffin . 2003 . Dicing with deception: People with disabilities' strategies for managing safety and identity online . Journal of Computer-Mediated Communication , Vol. 8 , 2 (2003). Natilene Bowker and Keith Tuffin. 2003. Dicing with deception: People with disabilities' strategies for managing safety and identity online. Journal of Computer-Mediated Communication , Vol. 8, 2 (2003).","journal-title":"Journal of Computer-Mediated Communication"},{"volume-title":"A networked self","author":"Boyd Danah","key":"e_1_2_1_12_1","unstructured":"Danah Boyd . 2010. Social network sites as networked publics: Affordances, dynamics, and implications . In A networked self . Routledge , 47--66. Danah Boyd. 2010. Social network sites as networked publics: Affordances, dynamics, and implications. In A networked self. Routledge, 47--66."},{"key":"e_1_2_1_13_1","unstructured":"Sketch B.V. 2010. Sketch. https:\/\/www.sketch.com\/  Sketch B.V. 2010. Sketch. https:\/\/www.sketch.com\/"},{"key":"e_1_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1460-2466.2005.tb03019.x"},{"key":"e_1_2_1_15_1","article-title":"The language of online intercultural community formation","volume":"10","author":"Cassell Justine","year":"2005","unstructured":"Justine Cassell and Dona Tversky . 2005 . The language of online intercultural community formation . Journal of Computer-Mediated Communication , Vol. 10 , 2 (2005). Justine Cassell and Dona Tversky. 2005. The language of online intercultural community formation. Journal of Computer-Mediated Communication , Vol. 10, 2 (2005).","journal-title":"Journal of Computer-Mediated Communication"},{"key":"e_1_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/2984511.2984512"},{"key":"e_1_2_1_17_1","volume-title":"Surveying the Landscape of Ethics-Focused Design Methods. arXiv preprint arXiv:2102.08909","author":"Chivukula Shruthi Sai","year":"2021","unstructured":"Shruthi Sai Chivukula , Ziqing Li , Anne C Pivonka , Jingning Chen , and Colin M Gray . 2021. Surveying the Landscape of Ethics-Focused Design Methods. arXiv preprint arXiv:2102.08909 ( 2021 ). Shruthi Sai Chivukula, Ziqing Li, Anne C Pivonka, Jingning Chen, and Colin M Gray. 2021. Surveying the Landscape of Ethics-Focused Design Methods. arXiv preprint arXiv:2102.08909 (2021)."},{"key":"e_1_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/1073943.1073950"},{"key":"e_1_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.7551\/mitpress\/12255.001.0001"},{"key":"e_1_2_1_20_1","volume-title":"Social Distancing and Social Biosensing: Intersubjectivity from Afar. Computer Supported Cooperative Work (CSCW)","author":"Curran Max T","year":"2022","unstructured":"Max T Curran and John Chuang . 2022. Social Distancing and Social Biosensing: Intersubjectivity from Afar. Computer Supported Cooperative Work (CSCW) ( 2022 ), 1--34. Max T Curran and John Chuang. 2022. Social Distancing and Social Biosensing: Intersubjectivity from Afar. Computer Supported Cooperative Work (CSCW) (2022), 1--34."},{"key":"e_1_2_1_21_1","volume-title":"Context collapse: Theorizing context collusions and collisions. Information, communication & society","author":"Davis Jenny L","year":"2014","unstructured":"Jenny L Davis and Nathan Jurgenson . 2014. Context collapse: Theorizing context collusions and collisions. Information, communication & society , Vol. 17 , 4 ( 2014 ), 476--485. Jenny L Davis and Nathan Jurgenson. 2014. Context collapse: Theorizing context collusions and collisions. Information, communication & society , Vol. 17, 4 (2014), 476--485."},{"key":"e_1_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2004.11.013"},{"key":"e_1_2_1_23_1","unstructured":"Docebo. 2017. Docebo LMS. https:\/\/learningpool.com\/solutions\/learning-experience-platform-stream\/  Docebo. 2017. Docebo LMS. https:\/\/learningpool.com\/solutions\/learning-experience-platform-stream\/"},{"volume-title":"Communities in Cyberspace,","author":"Donath Judith","key":"e_1_2_1_24_1","unstructured":"Judith Donath . 1999. Identity and deception in the virtual community . In Communities in Cyberspace, , Marc A Smith and Peter Kollock (Eds.). Routledge , 29--59. Judith Donath. 1999. Identity and deception in the virtual community. In Communities in Cyberspace, , Marc A Smith and Peter Kollock (Eds.). Routledge, 29--59."},{"volume-title":"Making futures: marginal notes on innovation, design, and democracy","author":"Ehn Pelle","key":"e_1_2_1_25_1","unstructured":"Pelle Ehn , Elisabet M Nilsson , and Richard Topgaard . 2014. Making futures: marginal notes on innovation, design, and democracy . The MIT Press . Pelle Ehn, Elisabet M Nilsson, and Richard Topgaard. 2014. Making futures: marginal notes on innovation, design, and democracy. The MIT Press."},{"key":"e_1_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1177\/1461444810385389"},{"key":"e_1_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/642611.642690"},{"volume-title":"Critical discourse analysis: The critical study of language","author":"Fairclough Norman","key":"e_1_2_1_28_1","unstructured":"Norman Fairclough . 2013. Critical discourse analysis: The critical study of language . Routledge . Norman Fairclough. 2013. Critical discourse analysis: The critical study of language. Routledge."},{"key":"e_1_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/242485.242493"},{"volume-title":"Value sensitive design: Shaping technology with moral imagination","author":"Friedman Batya","key":"e_1_2_1_30_1","unstructured":"Batya Friedman and David G Hendry . 2019. Value sensitive design: Shaping technology with moral imagination . The MIT Press . Batya Friedman and David G Hendry. 2019. Value sensitive design: Shaping technology with moral imagination. The MIT Press."},{"volume-title":"Social media: A critical introduction","author":"Fuchs Christian","key":"e_1_2_1_31_1","unstructured":"Christian Fuchs . 2014. Social media: A critical introduction . SAGE Publications Limited . Christian Fuchs. 2014. Social media: A critical introduction. SAGE Publications Limited."},{"volume-title":"Checklist manifesto, the (HB)","author":"Gawande Atul","key":"e_1_2_1_32_1","unstructured":"Atul Gawande . 2010. Checklist manifesto, the (HB) . Penguin Books India . Atul Gawande. 2010. Checklist manifesto, the (HB). Penguin Books India."},{"key":"e_1_2_1_33_1","volume-title":"Hanna Wallach, Hal Daume\u00e9 III, and Kate Crawford.","author":"Gebru Timnit","year":"2018","unstructured":"Timnit Gebru , Jamie Morgenstern , Briana Vecchione , Jennifer Wortman Vaughan , Hanna Wallach, Hal Daume\u00e9 III, and Kate Crawford. 2018 . Datasheets for datasets. arXiv preprint arXiv:1803.09010 (2018). Timnit Gebru, Jamie Morgenstern, Briana Vecchione, Jennifer Wortman Vaughan, Hanna Wallach, Hal Daume\u00e9 III, and Kate Crawford. 2018. Datasheets for datasets. arXiv preprint arXiv:1803.09010 (2018)."},{"key":"e_1_2_1_34_1","unstructured":"Inc. GitHub. 2008. GitHub. https:\/\/github.com\/  Inc. GitHub. 2008. GitHub. https:\/\/github.com\/"},{"volume-title":"The discovery of grounded theory: Strategies for qualitative research","author":"Glaser Barney G","key":"e_1_2_1_35_1","unstructured":"Barney G Glaser and Anselm L Strauss . 2017. The discovery of grounded theory: Strategies for qualitative research . Routledge . Barney G Glaser and Anselm L Strauss. 2017. The discovery of grounded theory: Strategies for qualitative research. Routledge."},{"key":"e_1_2_1_36_1","unstructured":"Erving Goffman et al. 1978. The presentation of self in everyday life. Harmondsworth London.  Erving Goffman et al. 1978. The presentation of self in everyday life. Harmondsworth London."},{"key":"e_1_2_1_37_1","unstructured":"Google. 2012. Google Drive. https:\/\/drive.google.com\/  Google. 2012. Google Drive. https:\/\/drive.google.com\/"},{"key":"e_1_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1083-6101.2009.01498.x"},{"key":"e_1_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/3290605.3300408"},{"key":"e_1_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.24251\/HICSS.2019.258"},{"key":"e_1_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jcrc.2006.06.002"},{"key":"e_1_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1145\/985692.985709"},{"key":"e_1_2_1_43_1","article-title":"Getting to know you: Exploring the development of relational intimacy in computer-mediated communication","volume":"9","author":"Hian Lee Bee","year":"2004","unstructured":"Lee Bee Hian , Sim Li Chuan , Tan Mon Kiat Trevor , and Benjamin H Detenber . 2004 . Getting to know you: Exploring the development of relational intimacy in computer-mediated communication . Journal of Computer-Mediated Communication , Vol. 9 , 3 (2004). Lee Bee Hian, Sim Li Chuan, Tan Mon Kiat Trevor, and Benjamin H Detenber. 2004. Getting to know you: Exploring the development of relational intimacy in computer-mediated communication. Journal of Computer-Mediated Communication , Vol. 9, 3 (2004).","journal-title":"Journal of Computer-Mediated Communication"},{"key":"e_1_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1145\/1254960.1254980"},{"key":"e_1_2_1_45_1","article-title":"Hazing as a process of boundary maintenance in an online community","volume":"10","author":"Honeycutt Courtenay","year":"2005","unstructured":"Courtenay Honeycutt . 2005 . Hazing as a process of boundary maintenance in an online community . Journal of computer-mediated communication , Vol. 10 , 2 (2005). Courtenay Honeycutt. 2005. Hazing as a process of boundary maintenance in an online community. Journal of computer-mediated communication , Vol. 10, 2 (2005).","journal-title":"Journal of computer-mediated communication"},{"key":"e_1_2_1_46_1","unstructured":"Figma Inc. 2016. Figma. https:\/\/www.figma.com\/  Figma Inc. 2016. Figma. https:\/\/www.figma.com\/"},{"key":"e_1_2_1_47_1","unstructured":"InVisionApp. 2011. InVision. https:\/\/www.invisionapp.com\/  InVisionApp. 2011. InVision. https:\/\/www.invisionapp.com\/"},{"key":"e_1_2_1_48_1","first-page":"2050","article-title":"Negotiating for Space?: Collaborative Work Using a Wall Display with Mouse and Touch Input","volume":"16","author":"Jakobsen Mikkel R","year":"2016","unstructured":"Mikkel R Jakobsen and Kasper Hornb\u00e6k . 2016 . Negotiating for Space?: Collaborative Work Using a Wall Display with Mouse and Touch Input .. In CHI , Vol. 16. 2050 -- 2061 . Mikkel R Jakobsen and Kasper Hornb\u00e6k. 2016. Negotiating for Space?: Collaborative Work Using a Wall Display with Mouse and Touch Input.. In CHI, Vol. 16. 2050--2061.","journal-title":"CHI"},{"key":"e_1_2_1_49_1","volume-title":"Applied Computer Science","volume":"15","author":"Karasek Aneta","year":"2019","unstructured":"Aneta Karasek . 2019 . IT tools supporting employee management in a high-tech enterprise . Applied Computer Science , Vol. 15 , 1 (2019). Aneta Karasek. 2019. IT tools supporting employee management in a high-tech enterprise. Applied Computer Science , Vol. 15, 1 (2019)."},{"key":"e_1_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1145\/3430524.3440634"},{"key":"e_1_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.giq.2013.11.005"},{"key":"e_1_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1109\/38.511853"},{"key":"e_1_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1007\/s12122-003-1001-6"},{"key":"e_1_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.1145\/3332165.3347894"},{"key":"e_1_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.1177\/2056305116633482"},{"key":"e_1_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.1145\/3332165.3347908"},{"key":"e_1_2_1_57_1","volume-title":"20 Top Social Media Sites to Consider for Your Brand","author":"Lua Alfred","year":"2022","unstructured":"Alfred Lua . 2022. 20 Top Social Media Sites to Consider for Your Brand in 2022 . https:\/\/buffer.com\/library\/social-media-sites\/ Alfred Lua. 2022. 20 Top Social Media Sites to Consider for Your Brand in 2022. https:\/\/buffer.com\/library\/social-media-sites\/"},{"key":"e_1_2_1_58_1","doi-asserted-by":"publisher","DOI":"10.1145\/3313831.3376445"},{"key":"e_1_2_1_59_1","doi-asserted-by":"publisher","DOI":"10.29173\/irie87"},{"key":"e_1_2_1_61_1","volume-title":"I tweet passionately: Twitter users, context collapse, and the imagined audience. New media & society","author":"Marwick Alice E","year":"2011","unstructured":"Alice E Marwick and danah boyd. 2011. I tweet honestly , I tweet passionately: Twitter users, context collapse, and the imagined audience. New media & society , Vol. 13 , 1 ( 2011 ), 114--133. Alice E Marwick and danah boyd. 2011. I tweet honestly, I tweet passionately: Twitter users, context collapse, and the imagined audience. New media & society, Vol. 13, 1 (2011), 114--133."},{"key":"e_1_2_1_62_1","doi-asserted-by":"publisher","DOI":"10.1073\/pnas.1813486116"},{"key":"e_1_2_1_63_1","doi-asserted-by":"publisher","DOI":"10.1353\/sor.2019.0022"},{"key":"e_1_2_1_64_1","unstructured":"Microsoft. 2007. OneDrive. https:\/\/www.microsoft.com\/en-us\/microsoft-365\/onedrive\/online-cloud-storage  Microsoft. 2007. OneDrive. https:\/\/www.microsoft.com\/en-us\/microsoft-365\/onedrive\/online-cloud-storage"},{"key":"e_1_2_1_65_1","unstructured":"Microsoft. 2017. Teams. https:\/\/www.microsoft.com\/en-us\/microsoft-teams\/group-chat-software  Microsoft. 2017. Teams. https:\/\/www.microsoft.com\/en-us\/microsoft-teams\/group-chat-software"},{"key":"e_1_2_1_66_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10606-004-8127-9"},{"volume-title":"Algorithms of Oppression: How Search Engines Reinforce Racism","author":"Noble Safiya","key":"e_1_2_1_67_1","unstructured":"Safiya Noble . 2018. Algorithms of Oppression: How Search Engines Reinforce Racism . NYU Press . Safiya Noble. 2018. Algorithms of Oppression: How Search Engines Reinforce Racism. NYU Press."},{"key":"e_1_2_1_68_1","unstructured":"Pattie Odgers. 1997. The Information Workplace: Training the InfoTech Worker. Issues and Instructional Delivery Examined. (1997).  Pattie Odgers. 1997. The Information Workplace: Training the InfoTech Worker. Issues and Instructional Delivery Examined. (1997)."},{"key":"e_1_2_1_69_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10606-019-09345-0"},{"key":"e_1_2_1_70_1","volume-title":"The duality of technology: Rethinking the concept of technology in organizations","author":"Orlikowski Wanda J","year":"1992","unstructured":"Wanda J Orlikowski . 1992. The duality of technology: Rethinking the concept of technology in organizations . Organization science, Vol. 3 , 3 ( 1992 ), 398--427. Wanda J Orlikowski. 1992. The duality of technology: Rethinking the concept of technology in organizations. Organization science, Vol. 3, 3 (1992), 398--427."},{"key":"e_1_2_1_71_1","unstructured":"Learning Pool. 2015. Stream LXP. https:\/\/learningpool.com\/solutions\/learning-experience-platform-stream\/  Learning Pool. 2015. Stream LXP. https:\/\/learningpool.com\/solutions\/learning-experience-platform-stream\/"},{"key":"e_1_2_1_72_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1083-6101.2005.tb00276.x"},{"key":"e_1_2_1_73_1","doi-asserted-by":"publisher","DOI":"10.1145\/2468356.2468391"},{"key":"e_1_2_1_74_1","doi-asserted-by":"publisher","DOI":"10.1017\/S0890060409000249"},{"key":"e_1_2_1_75_1","doi-asserted-by":"publisher","DOI":"10.1145\/3357236.3395556"},{"key":"e_1_2_1_76_1","volume-title":"I'm not a sexist': Fired Google engineer stands behind controversial memo. Washington Post","author":"Schmidt Samantha","year":"2017","unstructured":"Samantha Schmidt . 2017. ` I'm not a sexist': Fired Google engineer stands behind controversial memo. Washington Post ( 2017 ). https:\/\/www.washingtonpost.com\/news\/morning-mix\/wp\/2017\/08\/10\/im-not-a-sexist-fired-google-engineer-stands-behind-controversial-memo\/ Samantha Schmidt. 2017. `I'm not a sexist': Fired Google engineer stands behind controversial memo. Washington Post (2017). https:\/\/www.washingtonpost.com\/news\/morning-mix\/wp\/2017\/08\/10\/im-not-a-sexist-fired-google-engineer-stands-behind-controversial-memo\/"},{"key":"e_1_2_1_77_1","volume-title":"Seth Frey, Joshua Z Tan, and Amy X Zhang.","author":"Schneider Nathan","year":"2021","unstructured":"Nathan Schneider , Primavera De Filippi , Seth Frey, Joshua Z Tan, and Amy X Zhang. 2021 . Modular Politics : Toward a Governance Layer for Online Communities . arXiv preprint arXiv:2005.13701 (2021). Nathan Schneider, Primavera De Filippi, Seth Frey, Joshua Z Tan, and Amy X Zhang. 2021. Modular Politics: Toward a Governance Layer for Online Communities. arXiv preprint arXiv:2005.13701 (2021)."},{"key":"e_1_2_1_78_1","unstructured":"Michael Scriven. 2000. The logic and methodology of checklists. http:\/\/citeseerx.ist.psu.edu\/viewdoc\/download?doi=10.1.1.588.7093&rep=rep1&type=pdf. Accessed: 2021-03--15.  Michael Scriven. 2000. The logic and methodology of checklists. http:\/\/citeseerx.ist.psu.edu\/viewdoc\/download?doi=10.1.1.588.7093&rep=rep1&type=pdf. Accessed: 2021-03--15."},{"key":"e_1_2_1_79_1","doi-asserted-by":"publisher","DOI":"10.1177\/0162243912436985"},{"key":"e_1_2_1_80_1","unstructured":"Janet Sternberg. 2012. Misbehavior in cyber places: The regulation of online conduct in virtual communities on the Internet. Rowman & Littlefield.  Janet Sternberg. 2012. Misbehavior in cyber places: The regulation of online conduct in virtual communities on the Internet. Rowman & Littlefield."},{"key":"e_1_2_1_81_1","doi-asserted-by":"publisher","DOI":"10.1145\/302979.303064"},{"key":"e_1_2_1_82_1","unstructured":"Balsamiq Studios. 2008. Balsamiq Wireframes. https:\/\/balsamiq.com\/  Balsamiq Studios. 2008. Balsamiq Wireframes. https:\/\/balsamiq.com\/"},{"key":"e_1_2_1_83_1","unstructured":"Adobe Systems. 2016. Adobe XD. https:\/\/www.adobe.com\/products\/xd.html  Adobe Systems. 2016. Adobe XD. https:\/\/www.adobe.com\/products\/xd.html"},{"key":"e_1_2_1_84_1","unstructured":"Slack Technologies. 2013. Slack. https:\/\/slack.com\/  Slack Technologies. 2013. Slack. https:\/\/slack.com\/"},{"key":"e_1_2_1_85_1","volume-title":"Antisocial Media: How Facebook Disconnects Us and Undermines Democracy","author":"Vaidhyanathan Siva","year":"2018","unstructured":"Siva Vaidhyanathan . 2018 . Antisocial Media: How Facebook Disconnects Us and Undermines Democracy . Oxford University Press . Siva Vaidhyanathan. 2018. Antisocial Media: How Facebook Disconnects Us and Undermines Democracy. Oxford University Press."},{"key":"e_1_2_1_86_1","doi-asserted-by":"publisher","DOI":"10.1177\/1354856512457548"},{"key":"e_1_2_1_87_1","doi-asserted-by":"publisher","DOI":"10.1146\/annurev.soc.22.1.213"},{"key":"e_1_2_1_88_1","doi-asserted-by":"publisher","DOI":"10.1093\/jcmc\/zmaa004"},{"key":"e_1_2_1_89_1","unstructured":"Zoom. 2020a. 90-Day Security Plan Progress Report: April 22. https:\/\/blog.zoom.us\/90-day-security-plan-progress-report-april-22\/  Zoom. 2020a. 90-Day Security Plan Progress Report: April 22. https:\/\/blog.zoom.us\/90-day-security-plan-progress-report-april-22\/"},{"key":"e_1_2_1_90_1","unstructured":"Zoom. 2020b. A Message to Our Users. https:\/\/blog.zoom.us\/a-message-to-our-users\/ io  Zoom. 2020b. A Message to Our Users. https:\/\/blog.zoom.us\/a-message-to-our-users\/ io"}],"container-title":["Proceedings of the ACM on Human-Computer Interaction"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3567566","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3567566","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T17:51:12Z","timestamp":1750182672000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3567566"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,12,29]]},"references-count":89,"journal-issue":{"issue":"GROUP","published-print":{"date-parts":[[2023,1]]}},"alternative-id":["10.1145\/3567566"],"URL":"https:\/\/doi.org\/10.1145\/3567566","relation":{},"ISSN":["2573-0142"],"issn-type":[{"type":"electronic","value":"2573-0142"}],"subject":[],"published":{"date-parts":[[2022,12,29]]},"assertion":[{"value":"2022-12-29","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}