{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,1]],"date-time":"2026-04-01T06:06:57Z","timestamp":1775023617827,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":70,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,11,11]],"date-time":"2024-11-11T00:00:00Z","timestamp":1731283200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100006374","name":"National Science Foundation","doi-asserted-by":"publisher","award":["2112878"],"award-info":[{"award-number":["2112878"]}],"id":[{"id":"10.13039\/501100006374","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,11,11]]},"DOI":"10.1145\/3678884.3681865","type":"proceedings-article","created":{"date-parts":[[2024,11,13]],"date-time":"2024-11-13T18:38:08Z","timestamp":1731523088000},"page":"288-295","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":3,"title":["Understanding and Mitigating New Harms in Immersive and Embodied Virtual Spaces: A Speculative Dystopian Design Fiction Approach"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-5107-7794","authenticated-orcid":false,"given":"Guo","family":"Freeman","sequence":"first","affiliation":[{"name":"Clemson University, Clemson, SC, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8783-7783","authenticated-orcid":false,"given":"Julian","family":"Frommel","sequence":"additional","affiliation":[{"name":"Utrecht University, Utrecht, Netherlands"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0772-6616","authenticated-orcid":false,"given":"Regan L","family":"Mandryk","sequence":"additional","affiliation":[{"name":"University of Victoria, Victoria, BC, Canada"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6466-3845","authenticated-orcid":false,"given":"Jan","family":"Gugenheimer","sequence":"additional","affiliation":[{"name":"TU-Darmstadt\/Telecom Paris, Darmstadt, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8640-9936","authenticated-orcid":false,"given":"Lingyuan","family":"Li","sequence":"additional","affiliation":[{"name":"The University of Texas at Austin, Austin, TX, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1088-3460","authenticated-orcid":false,"given":"Daniel","family":"Johnson","sequence":"additional","affiliation":[{"name":"Queensland University of Technology, Brisbane, QLD, Australia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9502-0965","authenticated-orcid":false,"given":"Cecilia","family":"Aragon","sequence":"additional","affiliation":[{"name":"University of Washington, Seattle, WA, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6187-8832","authenticated-orcid":false,"given":"Syed Ali","family":"Asif","sequence":"additional","affiliation":[{"name":"University of Delaware, Delaware, DE, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3506-2362","authenticated-orcid":false,"given":"Jakki","family":"Bailey","sequence":"additional","affiliation":[{"name":"The University of Texas at Austin, Austin, TX, USA"}]},{"ORCID":"https:\/\/orcid.org\/0009-0004-4361-1706","authenticated-orcid":false,"given":"Meryem","family":"Barkallah","sequence":"additional","affiliation":[{"name":"University of Michigan-Flint, Flint, MI, USA"}]},{"ORCID":"https:\/\/orcid.org\/0009-0003-2741-1010","authenticated-orcid":false,"given":"Braeden","family":"Burger","sequence":"additional","affiliation":[{"name":"University of Michigan-Flint, Flint, MI, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4555-6187","authenticated-orcid":false,"given":"Sebastian","family":"Cmentowski","sequence":"additional","affiliation":[{"name":"University of Waterloo, Waterloo, ON, Canada"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4007-6563","authenticated-orcid":false,"given":"Jamie","family":"Hancock","sequence":"additional","affiliation":[{"name":"The Alan Turing Institute, London, United Kingdom"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4550-8460","authenticated-orcid":false,"given":"Leanne","family":"Hides","sequence":"additional","affiliation":[{"name":"The University of Queensland, Brisbane, QLD, Australia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8710-247X","authenticated-orcid":false,"given":"Hongxin","family":"Hu","sequence":"additional","affiliation":[{"name":"University at Buffalo, Buffalo, NY, USA"}]},{"ORCID":"https:\/\/orcid.org\/0009-0006-4375-9860","authenticated-orcid":false,"given":"Yang","family":"Hu","sequence":"additional","affiliation":[{"name":"Clemson University, Clemson, SC, USA"}]},{"ORCID":"https:\/\/orcid.org\/0009-0002-1098-4261","authenticated-orcid":false,"given":"Wangfan","family":"Li","sequence":"additional","affiliation":[{"name":"Clemson University, Clemson, SC, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6552-6239","authenticated-orcid":false,"given":"Ruchi","family":"Panchanadikar","sequence":"additional","affiliation":[{"name":"Clemson University, Clemson, SC, USA"}]},{"ORCID":"https:\/\/orcid.org\/0009-0008-7639-9739","authenticated-orcid":false,"given":"Niloofar","family":"Sayadi","sequence":"additional","affiliation":[{"name":"University of Notre Dame, South Bend, IN, USA"}]},{"ORCID":"https:\/\/orcid.org\/0009-0003-7736-569X","authenticated-orcid":false,"given":"Devin","family":"Tebbe","sequence":"additional","affiliation":[{"name":"University of Michigan-Flint, Flint, MI, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8771-916X","authenticated-orcid":false,"given":"Leslie","family":"W\u00f6hler","sequence":"additional","affiliation":[{"name":"The University of Tokyo, Tokyo, Japan"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4956-147X","authenticated-orcid":false,"given":"Xinyue","family":"You","sequence":"additional","affiliation":[{"name":"The University of Texas at Austin, Austin, TX, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2720-9114","authenticated-orcid":false,"given":"Zinan","family":"Zhang","sequence":"additional","affiliation":[{"name":"The Pennsylvania State University, State College, PA, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6854-5336","authenticated-orcid":false,"given":"Douglas","family":"Zytko","sequence":"additional","affiliation":[{"name":"University of Michigan-Flint, Flint, MI, USA"}]}],"member":"320","published-online":{"date-parts":[[2024,11,13]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/3491101.3516382"},{"key":"e_1_3_2_1_2_1","unstructured":"Julia Alexander. 2018. 'Ugandan Knuckles' is overtaking VRChat. https:\/\/www.polygon.com\/2018\/1\/8\/16863932\/ugandan-knuckles-meme-vrchat"},{"key":"e_1_3_2_1_3_1","volume-title":"Hate is no game: Harassment and positive social experiences in online games","author":"League Anti-Defamation","year":"2021","unstructured":"Anti-Defamation League. 2021. Hate is no game: Harassment and positive social experiences in online games 2021. https:\/\/www.adl.org\/hateisnogame#executive-summary"},{"key":"e_1_3_2_1_4_1","volume-title":"A great and troubling beauty'': cognitive speculation and ubiquitous computing. Personal and ubiquitous computing 18","author":"Bardzell Jeffrey","year":"2014","unstructured":"Jeffrey Bardzell and Shaowen Bardzell. 2014. ''A great and troubling beauty'': cognitive speculation and ubiquitous computing. Personal and ubiquitous computing 18 (2014), 779--794."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/3514094.3534145"},{"key":"e_1_3_2_1_6_1","volume-title":"CyberPolice: Classification of Cyber Sexual Harassment. In EPIA Conference on Artificial Intelligence. Springer, 701--714","author":"Basu Priyam","year":"2021","unstructured":"Priyam Basu, Tiasa Singha Roy, Soham Tiwari, and Saksham Mehta. 2021. CyberPolice: Classification of Cyber Sexual Harassment. In EPIA Conference on Artificial Intelligence. Springer, 701--714."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/3411764.3445157"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/3134659"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/3359202"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/VR.2019.8798165"},{"key":"e_1_3_2_1_11_1","volume-title":"Design fiction: A short essay on design, science, fact, and fiction. Machine learning and the city: Applications in architecture and urban design","author":"Bleecker Julian","year":"2022","unstructured":"Julian Bleecker. 2022. Design fiction: A short essay on design, science, fact, and fiction. Machine learning and the city: Applications in architecture and urban design (2022), 561--578."},{"key":"e_1_3_2_1_12_1","first-page":"41","article-title":"Automation in moderation","volume":"53","author":"Bloch-Wehba Hannah","year":"2020","unstructured":"Hannah Bloch-Wehba. 2020. Automation in moderation. Cornell Int'l LJ 53 (2020), 41.","journal-title":"Cornell Int'l LJ"},{"key":"e_1_3_2_1_13_1","volume-title":"The hitchhiker's guide to ubicomp: using techniques from literary and critical theory to reframe scientific agendas. Personal and ubiquitous computing 18","author":"Blythe Mark","year":"2014","unstructured":"Mark Blythe. 2014. The hitchhiker's guide to ubicomp: using techniques from literary and critical theory to reframe scientific agendas. Personal and ubiquitous computing 18 (2014), 795--808."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/3544548.3580988"},{"key":"e_1_3_2_1_15_1","volume-title":"Ethics of emerging technology. The ethics of technology: Methods and approaches","author":"Brey Philip","year":"2017","unstructured":"Philip Brey. 2017. Ethics of emerging technology. The ethics of technology: Methods and approaches (2017), 175--191."},{"key":"e_1_3_2_1_16_1","volume-title":"Hate Raids on Twitch: Understanding Real-Time Human-Bot Coordinated Attacks in Live Streaming Communities. arXiv preprint arXiv:2305.16248","author":"Cai Jie","year":"2023","unstructured":"Jie Cai, Sagnik Chowdhury, Hongyang Zhou, and Donghee Yvette Wohn. 2023. Hate Raids on Twitch: Understanding Real-Time Human-Bot Coordinated Attacks in Live Streaming Communities. arXiv preprint arXiv:2305.16248 (2023)."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10209-023-00969-0"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/2187980.2187995"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"crossref","unstructured":"Julian Dibbell. 1993. A Rape in Cyberspace: or How an Evil Clown a Haitian Trickster Spirit Two Wizards and a Cast of Dozens Turned a Database Into a Society. http:\/\/www.juliandibbell.com\/texts\/bungle_vv.html","DOI":"10.1215\/9780822396765-012"},{"key":"e_1_3_2_1_20_1","volume-title":"Proceedings of the International AAAI Conference on Web and Social Media","volume":"5","author":"Dinakar Karthik","year":"2011","unstructured":"Karthik Dinakar, Roi Reichart, and Henry Lieberman. 2011. Modeling the detection of textual cyberbullying. In Proceedings of the International AAAI Conference on Web and Social Media, Vol. 5. 11--17."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/3491101.3516504"},{"key":"e_1_3_2_1_22_1","volume-title":"Resistance is futile?: reading science fiction alongside ubiquitous computing. Personal and ubiquitous computing 18","author":"Dourish Paul","year":"2014","unstructured":"Paul Dourish and Genevieve Bell. 2014. ''Resistance is futile?: reading science fiction alongside ubiquitous computing. Personal and ubiquitous computing 18 (2014), 769--778."},{"key":"e_1_3_2_1_23_1","volume-title":"With a new preface by the authors: Design, Fiction, and Social Dreaming","author":"Dunne Anthony","unstructured":"Anthony Dunne and Fiona Raby. 2024. Speculative Everything, With a new preface by the authors: Design, Fiction, and Social Dreaming. MIT press."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/3585088.3589374"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/3531073.3534492"},{"key":"e_1_3_2_1_26_1","volume-title":"Black Mirror","author":"Fiesler Casey","unstructured":"Casey Fiesler. 2018. Black Mirror, Light Mirror: Teaching Technology Ethics Through Speculation. https:\/\/cfiesler.medium.com\/the-black-mirror-writers-room-teaching-technology-ethics-through-speculation-f1a9e2deccf4."},{"key":"e_1_3_2_1_27_1","volume-title":"Novel Approaches for Understanding and Mitigating Emerging New Harms in Immersive and Embodied Virtual Spaces: A Workshop at CHI","author":"Freeman Guo","year":"2024","unstructured":"Guo Freeman, Julian Frommel, Regan L Mandryk, Jan Gugenheimer, Lingyuan Li, and Daniel Johnson. 2024. Novel Approaches for Understanding and Mitigating Emerging New Harms in Immersive and Embodied Virtual Spaces: A Workshop at CHI 2024. In Extended Abstracts of the CHI Conference on Human Factors in Computing Systems. 1--7."},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/3432938"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/3512932"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.chbr.2023.100302"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/3491102.3517517"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1080\/13614568.2012.746740"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/3491101.3503741"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/3579609"},{"key":"e_1_3_2_1_35_1","volume-title":"The Effects of Machine-powered Content Modereation: An Empirical Study on Reddit. In 55th Hawaii International Conference on System Sciences (HICSS).","author":"He Qinglai","year":"2022","unstructured":"Qinglai He, Yili Kevin Hong, and TS Raghu. 2022. The Effects of Machine-powered Content Modereation: An Empirical Study on Reddit. In 55th Hawaii International Conference on System Sciences (HICSS)."},{"key":"e_1_3_2_1_36_1","volume-title":"Designing Word Filter Tools for Creator-led Comment Moderation. In CHI Conference on Human Factors in Computing Systems. 1--21","author":"Jhaver Shagun","year":"2022","unstructured":"Shagun Jhaver, Quan Ze Chen, Detlef Knauss, and Amy X Zhang. 2022. Designing Word Filter Tools for Creator-led Comment Moderation. In CHI Conference on Human Factors in Computing Systems. 1--21."},{"key":"e_1_3_2_1_37_1","volume-title":"Anticipating impacts: using large-scale scenario-writing to explore diverse implications of generative AI in the news environment. AI and Ethics","author":"Kieslich Kimon","year":"2024","unstructured":"Kimon Kieslich, Nicholas Diakopoulos, and Natali Helberger. 2024. Anticipating impacts: using large-scale scenario-writing to explore diverse implications of generative AI in the news environment. AI and Ethics (2024), 1--23."},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1177\/0306312709338325"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/3563657.3595960"},{"key":"e_1_3_2_1_40_1","volume-title":"Audrey Desjardins, and Ron Wakkary.","author":"Linehan Conor","year":"2014","unstructured":"Conor Linehan, Ben J Kirman, Stuart Reeves, Mark A Blythe, Theresa Jean Tanenbaum, Audrey Desjardins, and Ron Wakkary. 2014. Alternate endings: using fiction to explore design futures. In CHI'14 Extended Abstracts on Human Factors in Computing Systems. 45--48."},{"key":"e_1_3_2_1_41_1","volume-title":"Paddy Leerssen, and Jaron Harambam.","author":"Llans\u00f3 Emma","year":"2020","unstructured":"Emma Llans\u00f3, Joris Van Hoboken, Paddy Leerssen, and Jaron Harambam. 2020. Artificial intelligence, content moderation, and freedom of expression. (2020)."},{"key":"e_1_3_2_1_42_1","article-title":"Speculative design and technological fluency","volume":"3","author":"Lukens Jonathan","year":"2012","unstructured":"Jonathan Lukens and Carl DiSalvo. 2012. Speculative design and technological fluency. International Journal of Learning and Media 3, 4 (2012).","journal-title":"International Journal of Learning and Media"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1145\/3290605.3300794"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1177\/14614448221103534"},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"crossref","unstructured":"Lisa Nakamura Hanah Stiverson and Kyle Lindsey. 2021. Racist Zoombombing. Routledge.","DOI":"10.4324\/9781003157328"},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1080\/01436590701371702"},{"key":"e_1_3_2_1_47_1","unstructured":"Jessica Outlaw and Beth Duckles. 2018. Virtual Harassment: The Social Experience of 600 Regular Virtual Reality (VR) Users. https:\/\/virtualrealitypop.com\/virtual-harassment-the-social-experience-of-600-regular-virtual-reality-vr-users-23b1b4ef884e"},{"key":"e_1_3_2_1_48_1","volume-title":"Redirected walking","author":"Razzaque Sharif","unstructured":"Sharif Razzaque. 2005. Redirected walking. The University of North Carolina at Chapel Hill."},{"key":"e_1_3_2_1_49_1","volume-title":"For whom the troll trolls: A day in the life of a Reddit moderator. Business Insider","author":"Renfro Kim","year":"2016","unstructured":"Kim Renfro. 2016. For whom the troll trolls: A day in the life of a Reddit moderator. Business Insider (2016)."},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICMLA.2011.152"},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1145\/3544548.3581329"},{"key":"e_1_3_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1145\/3610027"},{"key":"e_1_3_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1145\/3544548.3581090"},{"key":"e_1_3_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.1145\/3610172"},{"key":"e_1_3_2_1_55_1","volume-title":"All are welcome: Using VR ethnography to explore harassment behavior in immersive social virtual reality. In 2017 IEEE Virtual Reality (VR)","author":"Shriram Ketaki","unstructured":"Ketaki Shriram and Raz Schwartz. 2017. All are welcome: Using VR ethnography to explore harassment behavior in immersive social virtual reality. In 2017 IEEE Virtual Reality (VR). IEEE, 225--226."},{"key":"e_1_3_2_1_56_1","unstructured":"Slate. 2012. Sci-Fi Writer Bruce Sterling Explains the Intriguing New Concept of Design Fiction. https:\/\/slate.com\/technology\/2012\/03\/bruce-sterling-on-design-fictions.html"},{"key":"e_1_3_2_1_57_1","volume-title":"Henrik Ehrsson, and Maria V Sanchez-Vives.","author":"Slater Mel","year":"2009","unstructured":"Mel Slater, Daniel P\u00e9rez Marcos, Henrik Ehrsson, and Maria V Sanchez-Vives. 2009. Inducing illusory ownership of a virtual body. Frontiers in neuroscience(2009), 29."},{"key":"e_1_3_2_1_58_1","unstructured":"Weilun Soon. 2022. A researcher's avatar was sexually assaulted on a metaverse platform owned by Meta. https:\/\/www.businessinsider.com\/researcher-claims-her-avatar-was-raped-on-metas-metaverse-platform-2022--5"},{"key":"e_1_3_2_1_59_1","unstructured":"Hannah Sparks. 2021. Woman claims she was virtually 'groped' in Meta's VR metaverse. https:\/\/nypost.com\/2021\/12\/17\/woman-claims-she-was-virtually-groped-in-meta-vr-metaverse\/"},{"key":"e_1_3_2_1_60_1","doi-asserted-by":"publisher","DOI":"10.1145\/2648414"},{"key":"e_1_3_2_1_61_1","doi-asserted-by":"publisher","DOI":"10.1145\/3392828"},{"key":"e_1_3_2_1_62_1","volume-title":"Racism and resilience of pandemic proportions: online harassment of Asian Americans during COVID-19. Journal of Applied Communication Research","author":"Tong Stephanie Tom","year":"2022","unstructured":"Stephanie Tom Tong, Elizabeth Stoycheff, and Rahul Mitra. 2022. Racism and resilience of pandemic proportions: online harassment of Asian Americans during COVID-19. Journal of Applied Communication Research (2022), 1--18."},{"key":"e_1_3_2_1_63_1","doi-asserted-by":"publisher","DOI":"10.1145\/3491102.3517728"},{"key":"e_1_3_2_1_64_1","doi-asserted-by":"publisher","DOI":"10.1145\/2998181.2998337"},{"key":"e_1_3_2_1_65_1","doi-asserted-by":"publisher","DOI":"10.1145\/3531146.3533147"},{"key":"e_1_3_2_1_66_1","doi-asserted-by":"publisher","DOI":"10.1080\/21670811.2020.1851279"},{"key":"e_1_3_2_1_67_1","doi-asserted-by":"publisher","DOI":"10.1145\/3573382.3616068"},{"key":"e_1_3_2_1_68_1","doi-asserted-by":"publisher","DOI":"10.1162\/105474698565686"},{"key":"e_1_3_2_1_69_1","doi-asserted-by":"publisher","DOI":"10.1145\/3597638.3608388"},{"key":"e_1_3_2_1_70_1","doi-asserted-by":"publisher","DOI":"10.1145\/3579630"}],"event":{"name":"CSCW '24: The 27th ACM Conference on Computer-Supported Cooperative Work and Social Computing","location":"San Jose Costa Rica","acronym":"CSCW '24","sponsor":["SIGCHI ACM Special Interest Group on Computer-Human Interaction"]},"container-title":["Companion Publication of the 2024 Conference on Computer-Supported Cooperative Work and Social Computing"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3678884.3681865","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3678884.3681865","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,15]],"date-time":"2026-03-15T01:57:35Z","timestamp":1773539855000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3678884.3681865"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,11,11]]},"references-count":70,"alternative-id":["10.1145\/3678884.3681865","10.1145\/3678884"],"URL":"https:\/\/doi.org\/10.1145\/3678884.3681865","relation":{},"subject":[],"published":{"date-parts":[[2024,11,11]]},"assertion":[{"value":"2024-11-13","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}