{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,13]],"date-time":"2026-04-13T20:14:29Z","timestamp":1776111269428,"version":"3.50.1"},"reference-count":67,"publisher":"Association for Computing Machinery (ACM)","issue":"CSCW1","license":[{"start":{"date-parts":[[2024,4,17]],"date-time":"2024-04-17T00:00:00Z","timestamp":1713312000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100006374","name":"National Science Foundation","doi-asserted-by":"publisher","award":["2016061"],"award-info":[{"award-number":["2016061"]}],"id":[{"id":"10.13039\/501100006374","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["Proc. ACM Hum.-Comput. Interact."],"published-print":{"date-parts":[[2024,4,17]]},"abstract":"<jats:p>Online harassment remains a prevalent problem for internet users. Its impact is made orders of magnitude worse when multiple harassers coordinate to conduct networked attacks. This paper presents an analysis of 231 threads in Kiwi Farms, a notorious online harassment community. We find that networked online harassment campaigns consists of three phases: target introduction, network decision, and network response. The first stage consists of the initial narrative elements, that are approved or not in stage two and expanded in stage three. Narrative building is a common element of all three stages. The network plays a key role in narrative building, adding elements to the narrative in at least 80 % of the threads, resulting in sustained harassment. This finding is central to our model of Continuous Narrative Escalation (CNE), that has two parts: (1) narrative continuation, the action of repeatedly adding new information to the existing narrative and (2) escalation, the aggravation of harassment that occurs as a consequence.<\/jats:p>\n          <jats:p>In addition, we present insights from our analysis of 100 takedown requests threads, discussing received abuse reports. We find that these takedown requests are misused by the community and are used as elements to further fuel the narrative. We use our findings and framework to come up with a set of recommendations, that can inform harassment interventions and make online spaces safer.<\/jats:p>","DOI":"10.1145\/3641015","type":"journal-article","created":{"date-parts":[[2024,4,29]],"date-time":"2024-04-29T10:05:31Z","timestamp":1714385131000},"page":"1-23","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["Stoking the Flames: Understanding Escalation in an Online Harassment Community"],"prefix":"10.1145","volume":"8","author":[{"ORCID":"https:\/\/orcid.org\/0009-0004-1915-1834","authenticated-orcid":false,"given":"Kejsi","family":"Take","sequence":"first","affiliation":[{"name":"New York University, Brooklyn, NY, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9300-3005","authenticated-orcid":false,"given":"Victoria","family":"Zhong","sequence":"additional","affiliation":[{"name":"New York University, Brooklyn, NY, USA"}]},{"ORCID":"https:\/\/orcid.org\/0009-0009-6813-2302","authenticated-orcid":false,"given":"Chris","family":"Geeng","sequence":"additional","affiliation":[{"name":"New York University, Brooklyn, NY, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6466-0882","authenticated-orcid":false,"given":"Emmi","family":"Bevensee","sequence":"additional","affiliation":[{"name":"Open Measures, New York, NY, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7386-7260","authenticated-orcid":false,"given":"Damon","family":"McCoy","sequence":"additional","affiliation":[{"name":"New York University, Brooklyn, NY, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1831-1785","authenticated-orcid":false,"given":"Rachel","family":"Greenstadt","sequence":"additional","affiliation":[{"name":"New York University, Brooklyn, NY, USA"}]}],"member":"320","published-online":{"date-parts":[[2024,4,26]]},"reference":[{"key":"e_1_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/3487552.3487852"},{"key":"e_1_2_1_2_1","unstructured":"PEN America. 2023. Online Harassment Field Manual - PEN America. https:\/\/onlineharassmentfieldmanual.pen.org\/."},{"key":"e_1_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/2858036.2858096"},{"key":"e_1_2_1_4_1","volume-title":"Proceedings of the ACM on Human-Computer Interaction","volume":"4","author":"Bellini Rosanna","year":"2021","unstructured":"Rosanna Bellini, Emily Tseng, Nora McDonald, Rachel Greenstadt, Damon McCoy, Thomas Ristenpart, and Nicola Dell. 2021. \" So-called privacy breeds evil\" Narrative Justifications for Intimate Partner Surveillance in Online Forums. Proceedings of the ACM on Human-Computer Interaction, Vol. 4, CSCW3 (2021), 1--27."},{"key":"e_1_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1533-8525.1993.tb00387.x"},{"key":"e_1_2_1_6_1","volume-title":"Framing processes and social movements: An overview and assessment. Annual review of sociology","author":"Benford Robert D","year":"2000","unstructured":"Robert D Benford and David A Snow. 2000. Framing processes and social movements: An overview and assessment. Annual review of sociology , Vol. 26, 1 (2000), 611--639."},{"key":"e_1_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1609\/icwsm.v5i1.14134"},{"key":"e_1_2_1_8_1","volume-title":"Workshop Proceedings of the 14th International AAAI Conference on Web and Social Media","volume":"14","author":"Bevensee Emmi","year":"2020","unstructured":"Emmi Bevensee, Maxwell Aliapoulios, Quinn Dougherty, Jason Baumgartner, Damon Mccoy, and Jeremy Blackburn. 2020. SMAT: The social media analysis toolkit. Workshop Proceedings of the 14th International AAAI Conference on Web and Social Media , Vol. 14 (2020). https:\/\/workshop-proceedings.icwsm.org\/pdf\/2020_18.pdf"},{"key":"e_1_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1609\/icwsm.v12i1.15036"},{"key":"e_1_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/3134659"},{"key":"e_1_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/3359202"},{"key":"e_1_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1021\/ed063p873"},{"key":"e_1_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1037\/13620-004"},{"key":"e_1_2_1_14_1","doi-asserted-by":"crossref","unstructured":"Taina Bucher Anne Helmond et al. 2018. The affordances of social media platforms. The SAGE handbook of social media Vol. 1 (2018) 233--254.","DOI":"10.4135\/9781473984066.n14"},{"key":"e_1_2_1_15_1","unstructured":"Drop Kiwi Farms Campaign. 2022. #DropKiwiFarms Official Site. https:\/\/www.dropkiwifarms.net\/."},{"key":"e_1_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/3134666"},{"key":"e_1_2_1_17_1","volume-title":"BERT: Pre-training of Deep Bidirectional Transformers for Language Understanding. CoRR","author":"Devlin Jacob","year":"2018","unstructured":"Jacob Devlin, Ming-Wei Chang, Kenton Lee, and Kristina Toutanova. 2018. BERT: Pre-training of Deep Bidirectional Transformers for Language Understanding. CoRR , Vol. abs\/1810.04805 (2018). http:\/\/arxiv.org\/abs\/1810.04805"},{"key":"e_1_2_1_18_1","unstructured":"Maeve Duggan. 2017. Online Harassment 2017 | Pew Research Center. https:\/\/www.pewresearch.org\/internet\/2017\/07\/11\/online-harassment-2017\/."},{"key":"e_1_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1460-2466.1993.tb01304.x"},{"key":"e_1_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/3512932"},{"key":"e_1_2_1_21_1","volume-title":"Usable Sexurity: Studying Peopletextquoterights Concerns and Strategies When Sexting. In Sixteenth Symposium on Usable Privacy and Security (SOUPS 2020","author":"Geeng Christine","year":"2020","unstructured":"Christine Geeng, Jevan Hutson, and Franziska Roesner. 2020. Usable Sexurity: Studying Peopletextquoterights Concerns and Strategies When Sexting. In Sixteenth Symposium on Usable Privacy and Security (SOUPS 2020). USENIX Association, 127--144. https:\/\/www.usenix.org\/conference\/soups2020\/presentation\/geeng"},{"key":"e_1_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1093\/oso\/9780195118254.001.0001"},{"key":"e_1_2_1_23_1","unstructured":"David Gilbert. 2022. Inside Keffals' Battle to Bring Down Kiwi Farms. https:\/\/www.vice.com\/en\/article\/xgyagd\/keffals-kiwi-farms"},{"key":"e_1_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/3491102.3517517"},{"key":"e_1_2_1_25_1","unstructured":"NZ Herald. 2019. Christchurch mosque shootings: Website Kiwi Farms refuses to surrender data linked to accused. https:\/\/www.nzherald.co.nz\/nz\/christchurch-mosque-shootings-website-kiwi-farms-refuses-to-surrender-data-linked-to-accused\/YYMW2OF5GE3C7EYAMJAPSDANKI\/."},{"key":"e_1_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/2695577.2695582"},{"key":"e_1_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1609\/icwsm.v11i1.14893"},{"key":"e_1_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/3555775"},{"key":"e_1_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.2307\/3097009"},{"key":"e_1_2_1_30_1","volume-title":"The view from the other side: The border between controversial speech and harassment on Kotaku in Action. arXiv preprint arXiv:1712.05851","author":"Jhaver Shagun","year":"2017","unstructured":"Shagun Jhaver, Larry Chan, and Amy Bruckman. 2017. The view from the other side: The border between controversial speech and harassment on Kotaku in Action. arXiv preprint arXiv:1712.05851 (2017)."},{"key":"e_1_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/3359157"},{"key":"e_1_2_1_32_1","volume-title":"Online hate and harassment: The American experience","author":"League Anti Defamation","year":"2022","unstructured":"Anti Defamation League. 2022. Online hate and harassment: The American experience 2022. https:\/\/www.adl.org\/resources\/report\/online-hate-and-harassment-american-experience-2022"},{"key":"e_1_2_1_33_1","unstructured":"Amanda Lenhart Michele Ybarra and Myeshia Price-Feeney. 2016. Nonconsensual image sharing: one in 25 Americans has been a victim of \"revenge porn\". (2016)."},{"key":"e_1_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1177\/0002764221989781"},{"key":"e_1_2_1_35_1","first-page":"939","article-title":"When whispers enter the cloud: Evaluating technology to prevent and report sexual assault","volume":"31","author":"Liu Heidi","year":"2017","unstructured":"Heidi Liu. 2017. When whispers enter the cloud: Evaluating technology to prevent and report sexual assault. Harv. JL & Tech. , Vol. 31 (2017), 939.","journal-title":"Harv. JL & Tech."},{"key":"e_1_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1177\/20563051211021378"},{"key":"e_1_2_1_37_1","volume-title":"Brian Keegan, Jaclyn Friedman, and Charlie DeTar.","author":"Matias J Nathan","year":"2015","unstructured":"J Nathan Matias, Amy Johnson, Whitney Erin Boesel, Brian Keegan, Jaclyn Friedman, and Charlie DeTar. 2015. Reporting, reviewing, and responding to harassment on Twitter. arXiv preprint arXiv:1505.03359 (2015)."},{"key":"e_1_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/3359174"},{"key":"e_1_2_1_39_1","unstructured":"Open Measures. 2024. https:\/\/openmeasures.io\/"},{"key":"e_1_2_1_40_1","unstructured":"Joseph Menn and Taylor Lorenz. 2022. Under pressure security firm Cloudflare drops Kiwi Farms website. https:\/\/www.washingtonpost.com\/technology\/2022\/09\/03\/cloudflare-drops-kiwifarms\/"},{"key":"e_1_2_1_41_1","volume-title":"Proceedings of the ACM on Human-Computer Interaction","volume":"5","author":"Moitra Aparna","year":"2021","unstructured":"Aparna Moitra, Syed Ishtiaque Ahmed, and Priyank Chandra. 2021. Parsing the'Me'in# MeToo: Sexual Harassment, Social Media, and Justice Infrastructures. Proceedings of the ACM on Human-Computer Interaction, Vol. 5, CSCW1 (2021), 1--34."},{"key":"e_1_2_1_42_1","unstructured":"Don Norman. 2013. The design of everyday things: Revised and expanded edition. Basic books."},{"key":"e_1_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1145\/3287098.3287107"},{"key":"e_1_2_1_44_1","volume-title":"Towards Understanding Privacy and Trust in Online Reporting of Sexual Assault. In Sixteenth Symposium on Usable Privacy and Security (SOUPS 2020","author":"Obada-Obieh Borke","year":"2020","unstructured":"Borke Obada-Obieh, Lucrezia Spagnolo, and Konstantin Beznosov. 2020. Towards Understanding Privacy and Trust in Online Reporting of Sexual Assault. In Sixteenth Symposium on Usable Privacy and Security (SOUPS 2020). USENIX Association, 145--164. https:\/\/www.usenix.org\/conference\/soups2020\/presentation\/obada-obieh"},{"key":"e_1_2_1_45_1","unstructured":"Klepek Patrick. 2021. What I Learned From Near an Emulation Legend and Real Person. https:\/\/www.vice.com\/en\/article\/pkbz4b\/what-i-learned-from-near-an-emulation-legend-and-real-person"},{"key":"e_1_2_1_46_1","unstructured":"Margaret Pless. 2016. Kiwi Farms the web's biggest community of stalkers. https:\/\/nymag.com\/intelligencer\/2016\/07\/kiwi-farms-the-webs-biggest-community-of-stalkers.html"},{"key":"e_1_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1145\/3097983.3098082"},{"key":"e_1_2_1_48_1","unstructured":"The Trevor Project. 2019. Protect your space and well-being on Instagram. The Trevor Project https:\/\/www.thetrevorproject.org\/wp-content\/uploads\/2019\/06\/IG-x-Trevor-Project_LGBTQ-Safety-Guide.pdf."},{"key":"e_1_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1145\/3290605.3300232"},{"key":"e_1_2_1_50_1","volume-title":"Master frames and cycles of protest. Frontiers in social movement theory","author":"Snow David A","year":"1992","unstructured":"David A Snow and Robert D Benford. 1992. Master frames and cycles of protest. Frontiers in social movement theory , Vol. 133 (1992), 155."},{"key":"e_1_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1023\/A:1006975321345"},{"key":"e_1_2_1_52_1","unstructured":"Rich Stim. 2021. Fair use. https:\/\/fairuse.stanford.edu\/overview\/fair-use\/"},{"key":"e_1_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1145\/3411764.3445154"},{"key":"e_1_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.56553\/popets-2022-0067"},{"key":"e_1_2_1_55_1","unstructured":"Kat Tenbarge Jason Abbruzzese and Ben Collins. 2022. Internet services company Cloudflare blocks fringe message board Kiwi Farms citing 'targeted threats'. https:\/\/www.nbcnews.com\/tech\/tech-news\/cloudflare-provided-security-services-kiwi-farms-blocks-website-rcna46219"},{"key":"e_1_2_1_56_1","volume-title":"Deepak Kumar, Damon McCoy, Sarah Meiklejohn, Thomas Ristenpart, and Gianluca Stringhini (Eds.).","author":"Thomas Kurt","year":"2021","unstructured":"Kurt Thomas, Devdatta Akhawe, Michael Bailey, Dan Boneh, Elie Bursztein, Sunny Consolvo, Nicola Dell, Zakir Durumeric, Patrick Gage Kelley, Deepak Kumar, Damon McCoy, Sarah Meiklejohn, Thomas Ristenpart, and Gianluca Stringhini (Eds.). 2021. SoK: Hate, Harassment, and the Changing Landscape of Online Abuse."},{"key":"e_1_2_1_57_1","doi-asserted-by":"publisher","DOI":"10.1145\/3491102.3501879"},{"key":"e_1_2_1_58_1","volume-title":"Proceedings of the Seventh Conference on Natural Language Learning at HLT-NAACL","author":"Erik","year":"2003","unstructured":"Erik F. Tjong Kim Sang and Fien De Meulder. 2003. Introduction to the CoNLL-2003 Shared Task: Language-Independent Named Entity Recognition. In Proceedings of the Seventh Conference on Natural Language Learning at HLT-NAACL 2003. 142--147."},{"key":"e_1_2_1_59_1","unstructured":"UNESCO. 2021. Practical guide for women journalists on how to respond to online harassment - UNESCO Digital Library. https:\/\/unesdoc.unesco.org\/ark:\/48223\/pf0000379909."},{"key":"e_1_2_1_60_1","unstructured":"Viktorya Vilk and Kat Lo. 2023. Shouting into the Void: Why Reporting Abuse to Social Media Platforms Is So Hard and How to Fix It. PEN America https:\/\/pen.org\/report\/shouting-into-the-void\/."},{"key":"e_1_2_1_61_1","doi-asserted-by":"publisher","DOI":"10.1145\/2998181.2998337"},{"key":"e_1_2_1_62_1","unstructured":"Emily A. Vogels. 2021. The State of Online Harassment | Pew Research Center. https:\/\/www.pewresearch.org\/internet\/2021\/01\/13\/the-state-of-online-harassment\/."},{"key":"e_1_2_1_63_1","volume-title":"No Easy Way Out: The Effectiveness of Deplatforming an Extremist Forum to Suppress Hate and Harassment. arXiv preprint arXiv:2304.07037","author":"Vu Anh V","year":"2023","unstructured":"Anh V Vu, Alice Hutchings, and Ross Anderson. 2023. No Easy Way Out: The Effectiveness of Deplatforming an Extremist Forum to Suppress Hate and Harassment. arXiv preprint arXiv:2304.07037 (2023)."},{"key":"e_1_2_1_64_1","doi-asserted-by":"publisher","DOI":"10.1196\/annals.1385.023"},{"key":"e_1_2_1_65_1","doi-asserted-by":"publisher","DOI":"10.1145\/3544548.3581229"},{"key":"e_1_2_1_66_1","first-page":"517","article-title":"A review of constructivism: understanding and using a relatively new theory","volume":"25","author":"Whitman N","year":"1993","unstructured":"N Whitman. 1993. A review of constructivism: understanding and using a relatively new theory. Family Medicine, Vol. 25, 8 (1993), 517--521.","journal-title":"Family Medicine"},{"key":"e_1_2_1_67_1","volume-title":"The abuse of technology in domestic violence and stalking. Violence against women","author":"Woodlock Delanie","year":"2017","unstructured":"Delanie Woodlock. 2017. The abuse of technology in domestic violence and stalking. Violence against women , Vol. 23, 5 (2017), 584--602. io"}],"container-title":["Proceedings of the ACM on Human-Computer Interaction"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3641015","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3641015","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,22]],"date-time":"2025-08-22T17:29:10Z","timestamp":1755883750000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3641015"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,4,17]]},"references-count":67,"journal-issue":{"issue":"CSCW1","published-print":{"date-parts":[[2024,4,17]]}},"alternative-id":["10.1145\/3641015"],"URL":"https:\/\/doi.org\/10.1145\/3641015","relation":{},"ISSN":["2573-0142"],"issn-type":[{"value":"2573-0142","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,4,17]]},"assertion":[{"value":"2024-04-26","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}