{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,13]],"date-time":"2026-04-13T18:04:46Z","timestamp":1776103486054,"version":"3.50.1"},"reference-count":103,"publisher":"Association for Computing Machinery (ACM)","issue":"CSCW1","license":[{"start":{"date-parts":[[2024,4,17]],"date-time":"2024-04-17T00:00:00Z","timestamp":1713312000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-sa\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100006374","name":"Ministry of Science and Technology","doi-asserted-by":"publisher","award":["2021-0-01347"],"award-info":[{"award-number":["2021-0-01347"]}],"id":[{"id":"10.13039\/501100006374","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["Proc. ACM Hum.-Comput. Interact."],"published-print":{"date-parts":[[2024,4,17]]},"abstract":"<jats:p>Online harassment, especially networked harassment at scale, has become an increasingly serious issue that pervades many social media platforms. In this study, we investigated the nature and harms of networked harassment on Twitter through design workshops (n = 11) and developed a set of design goals focusing on empowering the individual to fight back against harassment. We designed Re:SPect, an anti-harassment tool promoting scalable and active responses to networked harassment. We evaluated Re:SPect through a simulated scenario-based study with Twitter users (n = 18) who had directly or indirectly experienced networked harassment. Our findings reveal that users felt safer and more empowered as Re:SPect enabled them to manage interactions with a larger audience. Users felt less anxious about the potential of being harassed, while the summarization features of Re:SPect allowed users to perceive the situation more objectively. Based on the findings, we discuss how Re:SPect's features could be utilized in promoting healthier online discussion, as well as theoretical implications in designing such systems.<\/jats:p>","DOI":"10.1145\/3637394","type":"journal-article","created":{"date-parts":[[2024,4,29]],"date-time":"2024-04-29T10:05:31Z","timestamp":1714385131000},"page":"1-30","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":5,"title":["ReSPect: Enabling Active and Scalable Responses to Networked Online Harassment"],"prefix":"10.1145","volume":"8","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-7028-4294","authenticated-orcid":false,"given":"Haesoo","family":"Kim","sequence":"first","affiliation":[{"name":"Cornell University &amp; KAIST, Ithaca, NY, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0796-4227","authenticated-orcid":false,"given":"Juhoon","family":"Lee","sequence":"additional","affiliation":[{"name":"KAIST, Daejeon, Republic of Korea"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5145-1192","authenticated-orcid":false,"given":"Jeong-Woo","family":"Jang","sequence":"additional","affiliation":[{"name":"KAIST, Daejeon, Republic of Korea"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6348-4127","authenticated-orcid":false,"given":"Juho","family":"Kim","sequence":"additional","affiliation":[{"name":"KAIST, Daejeon, Republic of Korea"}]}],"member":"320","published-online":{"date-parts":[[2024,4,26]]},"reference":[{"key":"e_1_2_1_1_1","first-page":"364","article-title":"From academic freedom to cancel culture: Silencing black women in the legal academy","volume":"68","author":"Allen Renee Nicole","year":"2021","unstructured":"Renee Nicole Allen. 2021. From academic freedom to cancel culture: Silencing black women in the legal academy. UCLA L. Rev. , Vol. 68 (2021), 364.","journal-title":"UCLA L. Rev."},{"key":"e_1_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/3543507.3583487"},{"key":"e_1_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/1978942.1979041"},{"key":"e_1_2_1_4_1","unstructured":"Jenae Barnes. 2023. Twitter Ends Its Free API: Here's Who Will Be Affected. https:\/\/www.forbes.com\/sites\/jenaebarnes\/2023\/02\/03\/twitter-ends-its-free-api-heres-who-will-be-affected\/ Section: Business."},{"key":"e_1_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/2470654.2470658"},{"key":"e_1_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1093\/jcmc\/zmab007"},{"key":"e_1_2_1_7_1","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3530901","article-title":"Toxicity in the decentralized web and the potential for model sharing","volume":"6","author":"Zia Haris Bin","year":"2022","unstructured":"Haris Bin Zia, Aravindh Raman, Ignacio Castro, Ishaku Hassan Anaobi, Emiliano De Cristofaro, Nishanth Sastry, and Gareth Tyson. 2022. Toxicity in the decentralized web and the potential for model sharing. Proceedings of the ACM on Measurement and Analysis of Computing Systems, Vol. 6, 2 (2022), 1--25.","journal-title":"Proceedings of the ACM on Measurement and Analysis of Computing Systems"},{"key":"e_1_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1609\/icwsm.v12i1.15036"},{"key":"e_1_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/3134659"},{"key":"e_1_2_1_10_1","volume-title":"Digital protest, hashtag ethnography, and the racial politics of social media in the United States. American ethnologist","author":"Bonilla Yarimar","year":"2015","unstructured":"Yarimar Bonilla and Jonathan Rosa. 2015. #Ferguson: Digital protest, hashtag ethnography, and the racial politics of social media in the United States. American ethnologist, Vol. 42, 1 (2015), 4--17."},{"key":"e_1_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.dcm.2020.100431"},{"key":"e_1_2_1_12_1","volume-title":"Why youth (heart) social network sites: The role of networked publics in teenage social life","year":"2008","unstructured":"danah boyd. 2008. Why youth (heart) social network sites: The role of networked publics in teenage social life. YOUTH, IDENTITY, AND DIGITAL MEDIA, David Buckingham, ed., The John D. and Catherine T. MacArthur Foundation Series on Digital Media and Learning, The MIT Press, Cambridge, MA, Vol. 2007--16, 1 (2008), 119--142."},{"key":"e_1_2_1_13_1","volume-title":"Media Research, and Mastodon: Notes on the Future. Digital Journalism","author":"Braun Joshua","year":"2023","unstructured":"Joshua Braun. 2023. Journalism, Media Research, and Mastodon: Notes on the Future. Digital Journalism (2023), 1--8."},{"key":"e_1_2_1_14_1","volume-title":"Distributed Blackness: African American Cybercultures","author":"Jr Andr\u00e9 Brock","year":"2020","unstructured":"Andr\u00e9 Brock Jr. 2020. Distributed Blackness: African American Cybercultures. NYU Press."},{"key":"e_1_2_1_15_1","first-page":"0","article-title":"Bystander Intervention in Cyberbullying and Online Harassment: The Role of Expectancy Violations","volume":"15","author":"Brody Nicholas","year":"2021","unstructured":"Nicholas Brody. 2021. Bystander Intervention in Cyberbullying and Online Harassment: The Role of Expectancy Violations. International Journal of Communication, Vol. 15, 0 (Jan. 2021), 21. https:\/\/ijoc.org\/index.php\/ijoc\/article\/view\/14169 Number: 0.","journal-title":"International Journal of Communication"},{"key":"e_1_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1080\/03637751.2015.1044256"},{"key":"e_1_2_1_17_1","volume-title":"Cyberbullying and online harassment: Reconceptualizing the victimization of adolescent girls. Female crime victims: Reality reconsidered","author":"Burgess-Proctor Amanda","year":"2009","unstructured":"Amanda Burgess-Proctor, Justin W Patchin, and Sameer Hinduja. 2009. Cyberbullying and online harassment: Reconceptualizing the victimization of adolescent girls. Female crime victims: Reality reconsidered (2009), 153--175."},{"key":"e_1_2_1_18_1","volume-title":"Fundamental challenges to global peace and security: The future of humanity","author":"Caelin Derek","unstructured":"Derek Caelin. 2022. Decentralized networks vs the trolls. In Fundamental challenges to global peace and security: The future of humanity. Springer, 143--168."},{"key":"e_1_2_1_19_1","volume-title":"Conference companion publication of the 2019 on computer supported cooperative work and social computing. 166--170","author":"Cai Jie","year":"2019","unstructured":"Jie Cai and Donghee Yvette Wohn. 2019. What are Effective Strategies of Handling Harassment on Twitch? Users' Perspectives. In Conference companion publication of the 2019 on computer supported cooperative work and social computing. 166--170."},{"key":"e_1_2_1_20_1","volume-title":"International journal of communication","author":"Chadha Kalyani","year":"2020","unstructured":"Kalyani Chadha, Linda Steiner, Jessica Vitak, and Zahra Ashktorab. 2020. Women's responses to online harassment. International journal of communication , Vol. 14 (2020), 19."},{"key":"e_1_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/2998181.2998213"},{"key":"e_1_2_1_22_1","volume-title":"Proceedings of the international aaai conference on web and social media","volume":"9","author":"Cheng Justin","year":"2015","unstructured":"Justin Cheng, Cristian Danescu-Niculescu-Mizil, and Jure Leskovec. 2015. Antisocial behavior in online discussion communities. In Proceedings of the international aaai conference on web and social media, Vol. 9. 61--70."},{"key":"e_1_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1177\/2057047320961562"},{"key":"e_1_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/3173574.3173785"},{"key":"e_1_2_1_25_1","article-title":"A systematic literature review of factors that moderate bystanders' actions in cyberbullying. Cyberpsychology","volume":"12","author":"Dom'inguez-Hern\u00e1ndez Fernando","year":"2018","unstructured":"Fernando Dom'inguez-Hern\u00e1ndez, Lars Bonell, and Alejandro Mart'inez-Gonz\u00e1lez. 2018. A systematic literature review of factors that moderate bystanders' actions in cyberbullying. Cyberpsychology: Journal of Psychosocial Research on Cyberspace, Vol. 12, 4 (2018), bibinfonumpages19 pages.","journal-title":"Journal of Psychosocial Research on Cyberspace"},{"key":"e_1_2_1_26_1","volume-title":"Online harassment","author":"Duggan Maeve","year":"2017","unstructured":"Maeve Duggan. 2017. Online harassment 2017. (2017)."},{"key":"e_1_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1365-2648.2007.04569.x"},{"key":"e_1_2_1_28_1","volume-title":"Annual Symposium of the Global Internet Governance Academic Network (GigaNet).","author":"Ermoshina Ksenia","year":"2022","unstructured":"Ksenia Ermoshina and Francesca Musiani. 2022. Safer spaces by design? Federated architectures and alternative socio-technical models for content moderation. In Annual Symposium of the Global Internet Governance Academic Network (GigaNet)."},{"key":"e_1_2_1_29_1","volume-title":"TrollBusters: Fighting online harassment of women journalists. Mediating misogyny: Gender, technology, and harassment","author":"Ferrier Michelle","year":"2018","unstructured":"Michelle Ferrier and Nisha Garud-Patkar. 2018. TrollBusters: Fighting online harassment of women journalists. Mediating misogyny: Gender, technology, and harassment (2018), 311--332."},{"key":"e_1_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/2858036.2858409"},{"key":"e_1_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1177\/0886260503262083"},{"key":"e_1_2_1_32_1","unstructured":"Johnathan Flowers. 2022. The Whiteness of Mastodon. https:\/\/techpolicy.press\/the-whiteness-of-mastodon\/"},{"key":"e_1_2_1_33_1","volume-title":"Women's experiences with general and sexual harassment in online video games: Rumination, organizational responsiveness, withdrawal, and coping strategies. New media & society","author":"Fox Jesse","year":"2017","unstructured":"Jesse Fox and Wai Yen Tang. 2017. Women's experiences with general and sexual harassment in online video games: Rumination, organizational responsiveness, withdrawal, and coping strategies. New media & society, Vol. 19, 8 (2017), 1290--1307."},{"key":"e_1_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/2908131.2908170"},{"key":"e_1_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1080\/1369118X.2016.1153700"},{"key":"e_1_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1177\/1461444818776611"},{"key":"e_1_2_1_37_1","doi-asserted-by":"crossref","unstructured":"Tarleton Gillespie. 2018. Custodians of the internet: Platforms content moderation and the hidden decisions that shape social media.","DOI":"10.12987\/9780300235029"},{"key":"e_1_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/3091478.3091509"},{"key":"e_1_2_1_39_1","first-page":"3","article-title":"Blockbotting dissent\": Publics, counterpublics, and algorithmic public sphere (s). Stream","volume":"10","author":"Gosse Chandell Enid","year":"2018","unstructured":"Chandell Enid Gosse and Victoria Jane O'Meara. 2018. Blockbotting dissent\": Publics, counterpublics, and algorithmic public sphere (s). Stream: Inspiring Critical Thought, Vol. 10, 1 (2018), 3--11.","journal-title":"Inspiring Critical Thought"},{"key":"e_1_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/2818052.2869107"},{"key":"e_1_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/3479610"},{"key":"e_1_2_1_42_1","volume-title":"feminism dominated Twitter","author":"MeToo Yim","year":"2018","unstructured":"Yim Hyun-su. 2018. #MeToo, feminism dominated Twitter in 2018. https:\/\/www.koreaherald.com\/view.php?ud=20181206000775"},{"key":"e_1_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1145\/3411764.3445778"},{"key":"e_1_2_1_44_1","volume-title":"Exploring Platform Migration Patterns between Twitter and Mastodon: A User Behavior Study. arXiv preprint arXiv:2305.09196","author":"Jeong Ujun","year":"2023","unstructured":"Ujun Jeong, Paras Sheth, Anique Tahir, Faisal Alatawi, H Russell Bernard, and Huan Liu. 2023. Exploring Platform Migration Patterns between Twitter and Mastodon: A User Behavior Study. arXiv preprint arXiv:2305.09196 (2023)."},{"key":"e_1_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.5210\/fm.v23i2.8232"},{"key":"e_1_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1145\/3185593"},{"key":"e_1_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1093\/jcmc\/zmy005"},{"key":"e_1_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/W17-3011"},{"key":"e_1_2_1_49_1","first-page":"19","article-title":"Digital Feminism and Affective Splintering: South Korean Twitter Discourse on 500 Yemeni Refugees","volume":"14","author":"Donna Kim Do Own","year":"2020","unstructured":"Do Own Donna Kim, Nathaniel Ming Curran, and Hyun Tae Calvin Kim. 2020. Digital Feminism and Affective Splintering: South Korean Twitter Discourse on 500 Yemeni Refugees. International Journal of Communication , Vol. 14 (2020), 19.","journal-title":"International Journal of Communication"},{"key":"e_1_2_1_50_1","volume-title":"Kyung Je Jo, and Juho Kim","author":"Kim Hyunwoo","year":"2021","unstructured":"Hyunwoo Kim, Haesoo Kim, Kyung Je Jo, and Juho Kim. 2021. StarryThoughts: Facilitating Diverse Opinion Exploration on Social Issues. Proceedings of the ACM on Human-Computer Interaction, Vol. 5, CSCW1 (2021), 1--29."},{"key":"e_1_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1145\/3555575"},{"key":"e_1_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1145\/2212776.2212790"},{"key":"e_1_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1145\/2145204.2145249"},{"key":"e_1_2_1_54_1","volume-title":"Proceedings of the SIGCHI Conference on Human Factors in Computing Systems. Association for Computing Machinery","author":"Kriplean Travis","year":"2012","unstructured":"Travis Kriplean, Michael Toomim, Jonathan Morgan, Alan Borning, and Amy Ko. 2012b. Is this what you meant? Promoting listening on the web with reflect. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems. Association for Computing Machinery, New York, NY, USA, 1559--1568."},{"key":"e_1_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.1089\/cyber.2011.0588"},{"key":"e_1_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.4018\/jgim.2014070103"},{"key":"e_1_2_1_57_1","doi-asserted-by":"publisher","DOI":"10.1145\/3555226"},{"key":"e_1_2_1_58_1","volume-title":"Building Consentful Tech","author":"Lee Una","year":"2017","unstructured":"Una Lee and Dann Toliver. 2017. Building Consentful Tech. 2017. http:\/\/www.consentfultech.io\/wp-content\/uploads\/2019\/10\/Building-Consentful-Tech.pdf"},{"key":"e_1_2_1_59_1","volume-title":"Online harassment, digital abuse, and cyberstalking in America","author":"Lenhart Amanda","unstructured":"Amanda Lenhart, Michele Ybarra, Kathryn Zickuhr, and Myeshia Price-Feeney. 2016. Online harassment, digital abuse, and cyberstalking in America. Data and Society Research Institute."},{"key":"e_1_2_1_60_1","doi-asserted-by":"publisher","DOI":"10.1177\/0002764221989781"},{"key":"e_1_2_1_61_1","doi-asserted-by":"publisher","DOI":"10.1287\/isre.2016.0671"},{"key":"e_1_2_1_62_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.adolescence.2011.06.007"},{"key":"e_1_2_1_63_1","doi-asserted-by":"publisher","DOI":"10.1145\/3173574.3174160"},{"key":"e_1_2_1_64_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICONIC.2018.8601278"},{"key":"e_1_2_1_65_1","doi-asserted-by":"publisher","DOI":"10.1177\/20563051211021378"},{"key":"e_1_2_1_66_1","doi-asserted-by":"publisher","DOI":"10.1080\/14680777.2018.1450568"},{"key":"e_1_2_1_67_1","first-page":"63","volume-title":"Brian Keegan, Jaclyn Friedman, and Charlie DeTar.","author":"Matias J Nathan","year":"2015","unstructured":"J Nathan Matias, Amy Johnson, Whitney Erin Boesel, Brian Keegan, Jaclyn Friedman, and Charlie DeTar. 2015. Reporting, reviewing, and responding to harassment on Twitter. arXiv preprint arXiv:1505.03359 (2015), bibinfonumpages63 pages."},{"key":"e_1_2_1_68_1","doi-asserted-by":"publisher","DOI":"10.1177\/20563051231179696"},{"key":"e_1_2_1_69_1","volume-title":"Tackling online abuse: A survey of automated abuse detection methods. arXiv preprint arXiv:1908.06024","author":"Mishra Pushkar","year":"2019","unstructured":"Pushkar Mishra, Helen Yannakoudakis, and Ekaterina Shutova. 2019. Tackling online abuse: A survey of automated abuse detection methods. arXiv preprint arXiv:1908.06024 (2019)."},{"key":"e_1_2_1_70_1","doi-asserted-by":"publisher","DOI":"10.1145\/3359243"},{"key":"e_1_2_1_71_1","volume-title":"Skill and Marginalized Hijra Identity in Bangladesh. Proceedings of the ACM on Human-Computer Interaction","volume":"5","author":"Nova Fayika Farhat","year":"2021","unstructured":"Fayika Farhat Nova, Michael Ann DeVito, Pratyasha Saha, Kazi Shohanur Rashid, Shashwata Roy Turzo, Sadia Afrin, and Shion Guha. 2021. \" Facebook Promotes More Harassment\" Social Media Ecosystem, Skill and Marginalized Hijra Identity in Bangladesh. Proceedings of the ACM on Human-Computer Interaction, Vol. 5, CSCW1 (2021), 1--35."},{"key":"e_1_2_1_72_1","doi-asserted-by":"publisher","DOI":"10.1145\/2957276.2957297"},{"key":"e_1_2_1_73_1","doi-asserted-by":"publisher","DOI":"10.1145\/2660460.2660467"},{"key":"e_1_2_1_74_1","volume-title":"This is why we can't have nice things: Mapping the relationship between online trolling and mainstream culture","author":"Phillips Whitney","unstructured":"Whitney Phillips. 2015. This is why we can't have nice things: Mapping the relationship between online trolling and mainstream culture. Mit Press."},{"key":"e_1_2_1_75_1","volume-title":"Musk's Twitter has dissolved its Trust and Safety Council. NPR (Dec","author":"Press The Associated","year":"2022","unstructured":"The Associated Press. 2022. Musk's Twitter has dissolved its Trust and Safety Council. NPR (Dec. 2022). https:\/\/www.npr.org\/2022\/12\/12\/1142399312\/twitter-trust-and-safety-council-elon-musk"},{"key":"e_1_2_1_76_1","first-page":"563","article-title":"Cyber-Victimization and Perceived Depression: Serial Mediation of Self-Esteem and Learned-Helplessness","volume":"8","author":"Prihadi Kususanto","year":"2019","unstructured":"Kususanto Prihadi, Yen Ling Hui, Melissa Chua, and Calvin KW Chang. 2019. Cyber-Victimization and Perceived Depression: Serial Mediation of Self-Esteem and Learned-Helplessness. International Journal of Evaluation and Research in Education, Vol. 8, 4 (2019), 563--574.","journal-title":"International Journal of Evaluation and Research in Education"},{"key":"e_1_2_1_77_1","volume-title":"Platformed antisemitism on Twitter: Anti-Jewish rhetoric in political discourse surrounding the 2018 US midterm election. new media & society","author":"Riedl Martin J","year":"2022","unstructured":"Martin J Riedl, Katie Joseff, Stu Soorholtz, and Samuel Woolley. 2022. Platformed antisemitism on Twitter: Anti-Jewish rhetoric in political discourse surrounding the 2018 US midterm election. new media & society (2022), 14614448221082122."},{"key":"e_1_2_1_78_1","volume-title":"Behind the Screen: Content Moderation in the Shadows of Social Media","author":"Roberts Sarah","unstructured":"Sarah Roberts. 2019. Behind the Screen: Content Moderation in the Shadows of Social Media. Yale University Press."},{"key":"e_1_2_1_79_1","unstructured":"Sarah T Roberts. 2016. Commercial content moderation: Digital laborers' dirty work. (2016)."},{"key":"e_1_2_1_80_1","volume-title":"So You've Been Publicly Shamed","author":"Ronson Jon","unstructured":"Jon Ronson. 2016. So You've Been Publicly Shamed. Riverhead Books."},{"key":"e_1_2_1_81_1","doi-asserted-by":"crossref","unstructured":"Alan Z Rozenshtein. 2022. Moderating the Fediverse: Content Moderation on Distributed Social Media. (2022).","DOI":"10.2139\/ssrn.4213674"},{"key":"e_1_2_1_82_1","doi-asserted-by":"publisher","DOI":"10.1145\/3579526"},{"key":"e_1_2_1_83_1","first-page":"225","article-title":"Justice and revenge in online counter-publics: Emerging responses to sexual violence in the age of social media. Crime, Media","volume":"9","author":"Salter Michael","year":"2013","unstructured":"Michael Salter. 2013. Justice and revenge in online counter-publics: Emerging responses to sexual violence in the age of social media. Crime, Media, Culture, Vol. 9, 3 (2013), 225--242.","journal-title":"Culture"},{"key":"e_1_2_1_84_1","volume-title":"seek the just\": Social media and social justice. Telecommunications policy","author":"Schejter Amit M","year":"2015","unstructured":"Amit M Schejter and Noam Tirosh. 2015. ?Seek the meek, seek the just\": Social media and social justice. Telecommunications policy, Vol. 39, 9 (2015), 796--803."},{"key":"e_1_2_1_85_1","doi-asserted-by":"publisher","DOI":"10.1177\/1461444820913122"},{"key":"e_1_2_1_86_1","doi-asserted-by":"publisher","DOI":"10.1177\/20563051231157297"},{"key":"e_1_2_1_87_1","doi-asserted-by":"publisher","DOI":"10.1145\/3449076"},{"key":"e_1_2_1_88_1","doi-asserted-by":"publisher","DOI":"10.1145\/3415178"},{"key":"e_1_2_1_89_1","doi-asserted-by":"publisher","DOI":"10.1145\/3290605.3300836"},{"key":"e_1_2_1_90_1","volume-title":"Learned helplessness. Annual review of medicine","author":"Seligman Martin EP","year":"1972","unstructured":"Martin EP Seligman. 1972. Learned helplessness. Annual review of medicine, Vol. 23, 1 (1972), 407--412."},{"key":"e_1_2_1_91_1","doi-asserted-by":"publisher","DOI":"10.1145\/3411764.3445092"},{"key":"e_1_2_1_92_1","doi-asserted-by":"publisher","DOI":"10.1145\/3134920"},{"key":"e_1_2_1_93_1","doi-asserted-by":"publisher","DOI":"10.1145\/3411764.3445154"},{"key":"e_1_2_1_94_1","volume-title":"How Twitter's new drastic changes will affect what users can view on the site. The Guardian (July","author":"Taylor Josh","year":"2023","unstructured":"Josh Taylor and Dan Milmo. 2023. How Twitter's new drastic changes will affect what users can view on the site. The Guardian (July 2023). https:\/\/www.theguardian.com\/technology\/2023\/jul\/03\/how-twitter-new-changes-will-affect-users-rate-limited-limit-exceeded-restrictions"},{"key":"e_1_2_1_95_1","doi-asserted-by":"publisher","DOI":"10.1145\/3359220"},{"key":"e_1_2_1_96_1","volume-title":"Antonialli Dennys Marcelo, and Alessandra Gomes","author":"Thiago Dias Oliva","year":"2021","unstructured":"Dias Oliva Thiago, Antonialli Dennys Marcelo, and Alessandra Gomes. 2021. Fighting hate speech, silencing drag queens? artificial intelligence in content moderation and risks to lgbtq voices online. Sexuality & culture, Vol. 25, 2 (2021), 700--732."},{"key":"e_1_2_1_97_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-60410-3"},{"key":"e_1_2_1_98_1","doi-asserted-by":"publisher","DOI":"10.1145\/2998181.2998337"},{"key":"e_1_2_1_99_1","unstructured":"Kurt Wagner. 2023. Twitter cuts workers addressing hate speech and trust and safety as Elon Musk's chaotic revamp continues. https:\/\/fortune.com\/2023\/01\/07\/twitter-cuts-workers-hate-speech-trust-safety-elon-musk-revamp\/"},{"key":"e_1_2_1_100_1","doi-asserted-by":"crossref","unstructured":"Magdalena Wojcieszak Andreu Casas Xudong Yu Jonathan Nagler and Joshua A Tucker. 2021. Echo chambers revisited: The (overwhelming) sharing of in-group politicians pundits and media on Twitter. (2021).","DOI":"10.31219\/osf.io\/xwc79"},{"key":"e_1_2_1_101_1","doi-asserted-by":"publisher","DOI":"10.1287\/isre.2020.0983"},{"key":"e_1_2_1_102_1","volume-title":"Duen Horng Chau, and Diyi Yang","author":"Wright Austin P","year":"2021","unstructured":"Austin P Wright, Omar Shaikh, Haekyu Park, Will Epperson, Muhammed Ahmed, Stephane Pinel, Duen Horng Chau, and Diyi Yang. 2021. RECAST: Enabling User Recourse and Interpretability of Toxicity Detection Models with Interactive Visualization. Proceedings of the ACM on Human-Computer Interaction, Vol. 5, CSCW1 (2021), 1--26."},{"key":"e_1_2_1_103_1","volume-title":"Flocking to mastodon: Tracking the great twitter migration. arXiv preprint arXiv:2302.14294","author":"Zia Haris Bin","year":"2023","unstructured":"Haris Bin Zia, Jiahui He, Aravindh Raman, Ignacio Castro, Nishanth Sastry, and Gareth Tyson. 2023. Flocking to mastodon: Tracking the great twitter migration. arXiv preprint arXiv:2302.14294 (2023). io"}],"container-title":["Proceedings of the ACM on Human-Computer Interaction"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3637394","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3637394","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,22]],"date-time":"2025-08-22T17:19:52Z","timestamp":1755883192000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3637394"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,4,17]]},"references-count":103,"journal-issue":{"issue":"CSCW1","published-print":{"date-parts":[[2024,4,17]]}},"alternative-id":["10.1145\/3637394"],"URL":"https:\/\/doi.org\/10.1145\/3637394","relation":{},"ISSN":["2573-0142"],"issn-type":[{"value":"2573-0142","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,4,17]]},"assertion":[{"value":"2024-04-26","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}