{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,13]],"date-time":"2026-04-13T21:20:02Z","timestamp":1776115202793,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":96,"publisher":"ACM","license":[{"start":{"date-parts":[[2025,4,25]],"date-time":"2025-04-25T00:00:00Z","timestamp":1745539200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"Google Cyber NYC Grant"},{"name":"PCCW Grant","award":["F533163"],"award-info":[{"award-number":["F533163"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2025,4,26]]},"DOI":"10.1145\/3706598.3713997","type":"proceedings-article","created":{"date-parts":[[2025,4,24]],"date-time":"2025-04-24T04:24:56Z","timestamp":1745468696000},"page":"1-18","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":10,"title":["\"Ignorance is not Bliss\": Designing Personalized Moderation to Address Ableist Hate on Social Media"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-1147-301X","authenticated-orcid":false,"given":"Sharon","family":"Heung","sequence":"first","affiliation":[{"name":"Information Science, Cornell Tech, New York, New York, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9582-9468","authenticated-orcid":false,"given":"Lucy","family":"Jiang","sequence":"additional","affiliation":[{"name":"Human Centered Design and Engineering, University of Washington, Seattle, Washington, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6701-4066","authenticated-orcid":false,"given":"Shiri","family":"Azenkot","sequence":"additional","affiliation":[{"name":"Information Science, Cornell Tech, New York, New York, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5693-3326","authenticated-orcid":false,"given":"Aditya","family":"Vashistha","sequence":"additional","affiliation":[{"name":"Cornell University, Ithaca, New York, USA"}]}],"member":"320","published-online":{"date-parts":[[2025,4,25]]},"reference":[{"key":"e_1_3_3_3_2_2","unstructured":"2021. (2021). https:\/\/about.instagram.com\/blog\/announcements\/introducing-sensitive-content-control"},{"key":"e_1_3_3_3_3_2","unstructured":"2021. Using machine learning to reduce toxicity online. https:\/\/perspectiveapi.com\/. Accessed: September 10 2024."},{"key":"e_1_3_3_3_4_2","unstructured":"2023. r\/AutoModerator. https:\/\/www.reddit.com\/r\/AutoModerator\/wiki\/can_do\/. Accessed: September 10th 2024."},{"key":"e_1_3_3_3_5_2","unstructured":"2023. Social Media and News Fact Sheet. https:\/\/www.pewresearch.org\/journalism\/fact-sheet\/social-media-and-news-fact-sheet\/ [Accessed 11-09-2024]."},{"key":"e_1_3_3_3_6_2","unstructured":"2024. Bodyguard. https:\/\/www.bodyguard.ai\/en"},{"key":"e_1_3_3_3_7_2","unstructured":"2024. How Do I Report Something I See on Facebook? https:\/\/www.facebook.com\/help\/814083248683500. Accessed: September 10 2024."},{"key":"e_1_3_3_3_8_2","unstructured":"2024. How to block accounts on X. https:\/\/help.x.com\/en\/using-x\/blocking-and-unblocking-accounts. Accessed: September 10 2024."},{"key":"e_1_3_3_3_9_2","unstructured":"2024. How to Use AutoMod. https:\/\/help.twitch.tv\/s\/article\/how-to-use-automod?language=en_US [Accessed 11-09-2024]."},{"key":"e_1_3_3_3_10_2","unstructured":"2024. Tune (experimental). https:\/\/chromewebstore.google.com\/detail\/tune-experimental\/gdfknffdmmjakmlikbpdngpcpbbfhbnp?pli=1"},{"key":"e_1_3_3_3_11_2","unstructured":"2024. What happens when you block someone on Instagram. https:\/\/www.facebook.com\/help\/447613741984126. Accessed: September 10 2024."},{"key":"e_1_3_3_3_12_2","unstructured":"Kathryn Zickuhr Myeshia Price-Feeney Amanda\u00a0Lenhart Michele\u00a0Ybarra. 2024. Online Harassment Digital Abuse and Cyberstalking. https:\/\/datasociety.net\/library\/online-harassment-digital-abuse-cyberstalking\/. Accessed: September 10 2024."},{"key":"e_1_3_3_3_13_2","doi-asserted-by":"publisher","unstructured":"Cynthia\u00a0L. Bennett and Os Keyes. 2020. What is the point of fairness? disability AI and the complexity of justice. SIGACCESS Access. Comput.125 Article 5 (mar 2020) 1\u00a0pages. 10.1145\/3386296.3386301","DOI":"10.1145\/3386296.3386301"},{"key":"e_1_3_3_3_14_2","doi-asserted-by":"publisher","DOI":"10.1145\/3677117.3685005"},{"key":"e_1_3_3_3_15_2","doi-asserted-by":"publisher","DOI":"10.1109\/RESPECT49803.2020.9272466"},{"key":"e_1_3_3_3_16_2","doi-asserted-by":"publisher","DOI":"10.1145\/3462204.3481784"},{"key":"e_1_3_3_3_17_2","doi-asserted-by":"publisher","unstructured":"V. Braun and V. Clarke. 2006. Using Thematic Analysis in Psychology. Qualitative Research in Psychology 3 2 (2006) 77\u2013101. 10.1191\/1478088706qp063oa","DOI":"10.1191\/1478088706qp063oa"},{"key":"e_1_3_3_3_18_2","doi-asserted-by":"publisher","unstructured":"Victoria M.\u00a0E. Bridgland Payton\u00a0J. Jones and Benjamin\u00a0W. Bellet. 2024. A Meta-Analysis of the Efficacy of Trigger Warnings Content Warnings and Content Notes. Clinical Psychological Science 12 4 (2024) 751\u2013771. 10.1177\/21677026231186625 arXiv:10.1177\/21677026231186625","DOI":"10.1177\/21677026231186625"},{"key":"e_1_3_3_3_19_2","doi-asserted-by":"publisher","unstructured":"F.\u00a0K. Campbell. 2008. Refusing Able(ness): A Preliminary Conversation about Ableism. M\/C Journal 11 3 (2008). 10.5204\/mcj.46","DOI":"10.5204\/mcj.46"},{"key":"e_1_3_3_3_20_2","doi-asserted-by":"publisher","unstructured":"Fiona\u00a0Kumari Campbell. 2010. Contours of Ableism: The Production of Disability and Abledness. (01 2010). 10.1057\/9780230245181","DOI":"10.1057\/9780230245181"},{"key":"e_1_3_3_3_21_2","doi-asserted-by":"publisher","DOI":"10.1145\/3491102.3517574"},{"key":"e_1_3_3_3_22_2","doi-asserted-by":"publisher","DOI":"10.1145\/3511095.3536369"},{"key":"e_1_3_3_3_23_2","unstructured":"Maeve Duggan. 2017. Online Harassment 2017. Pew Research Center (2017). https:\/\/www.pewresearch.org\/internet\/2017\/07\/11\/online-harassment-2017\/"},{"key":"e_1_3_3_3_24_2","unstructured":"Dana Dunn. 2021. Understanding ableism and negative reactions to disability. https:\/\/www.apa.org\/ed\/precollege\/psychology-teacher-network\/introductory-psychology\/ableism-negative-reactions-disability"},{"key":"e_1_3_3_3_25_2","unstructured":"Samantha Dunn. 2023. Blacklist & Whitelist: Terms To Avoid. Splunk (2023). https:\/\/www.splunk.com\/en_us\/blog\/learn\/blacklist-whitelist-inclusivity.html"},{"key":"e_1_3_3_3_26_2","doi-asserted-by":"publisher","DOI":"10.1145\/3411764.3445303"},{"key":"e_1_3_3_3_27_2","doi-asserted-by":"publisher","DOI":"10.1145\/3597638.3608400"},{"key":"e_1_3_3_3_28_2","unstructured":"Maggie Engler. 2022. Middleware and the Customization of Content Moderation. (2022). https:\/\/integrityinstitute.org\/blog\/middleware-and-the-customization"},{"key":"e_1_3_3_3_29_2","doi-asserted-by":"publisher","unstructured":"Casey Fiesler Jialun Jiang Joshua McCann Kyle Frye and Jed Brubaker. 2018. Reddit Rules! Characterizing an Ecosystem of Governance. Proceedings of the International AAAI Conference on Web and Social Media 12 1 (Jun. 2018). 10.1609\/icwsm.v12i1.15033","DOI":"10.1609\/icwsm.v12i1.15033"},{"key":"e_1_3_3_3_30_2","unstructured":"Ashish Goel Roberta R. Katz A. Douglas Melamed Marietje\u00a0Schaake Francis\u00a0Fukuyama Barak\u00a0Richman. [n. d.]. MIDDLEWARE FOR DOMINANT DIGITAL PLATFORMS: A TECHNOLOGICAL SOLUTION TO A THREAT TO DEMOCRACY. Stanford Cyber Policy Center ([n. d.])."},{"key":"e_1_3_3_3_31_2","doi-asserted-by":"crossref","unstructured":"Carli Friedman and Aleksa Owen. 2017. Defining Disability: Understandings of and Attitudes Towards Ableism and Disability. Disability Studies Quarterly 37 (2017). https:\/\/api.semanticscholar.org\/CorpusID:151902189","DOI":"10.18061\/dsq.v37i1.5061"},{"key":"e_1_3_3_3_32_2","doi-asserted-by":"publisher","unstructured":"Tanmay Garg Sarah Masud Tharun Suresh and Tanmoy Chakraborty. 2023. Handling Bias in Toxic Speech Detection: A Survey. ACM Comput. Surv. 55 13s Article 264 (jul 2023) 32\u00a0pages. 10.1145\/3580494","DOI":"10.1145\/3580494"},{"key":"e_1_3_3_3_33_2","doi-asserted-by":"publisher","DOI":"10.12987\/9780300235029"},{"key":"e_1_3_3_3_34_2","doi-asserted-by":"publisher","unstructured":"Tarleton Gillespie. 2020. Content moderation AI and the question of scale. Big Data & Society 7 2 (2020) 2053951720943234. 10.1177\/2053951720943234 arXiv:10.1177\/2053951720943234","DOI":"10.1177\/2053951720943234"},{"key":"e_1_3_3_3_35_2","doi-asserted-by":"publisher","unstructured":"Nitesh Goyal Ian\u00a0D. Kivlichan Rachel Rosen and Lucy Vasserman. 2022. Is Your Toxicity My Toxicity? Exploring the Impact of Rater Identity on Toxicity Annotation. Proc. ACM Hum.-Comput. Interact. 6 CSCW2 Article 363 (nov 2022) 28\u00a0pages. 10.1145\/3555088","DOI":"10.1145\/3555088"},{"key":"e_1_3_3_3_36_2","unstructured":"James Grimmelmann. 2015. The Virtues of Moderation. Yale Journal of Law & Technology 17 (2015) 42."},{"key":"e_1_3_3_3_37_2","doi-asserted-by":"publisher","unstructured":"Oliver\u00a0L. Haimson Justin Buss Zu Weinger Denny\u00a0L. Starks Dykee Gorrell and Briar\u00a0Sweetbriar Baron. 2020. Trans Time: Safety Privacy and Content Warnings on a Transgender-Specific Social Media Site. Proc. ACM Hum.-Comput. Interact. 4 CSCW2 Article 124 (oct 2020) 27\u00a0pages. 10.1145\/3415195","DOI":"10.1145\/3415195"},{"key":"e_1_3_3_3_38_2","doi-asserted-by":"publisher","DOI":"10.5555\/504800.504807"},{"key":"e_1_3_3_3_39_2","doi-asserted-by":"publisher","unstructured":"Catherine Han Joseph Seering Deepak Kumar Jeffrey\u00a0T. Hancock and Zakir Durumeric. 2023. Hate Raids on Twitch: Echoes of the Past New Modalities and Implications for Platform Governance. Proc. ACM Hum.-Comput. Interact. 7 CSCW1 Article 133 (apr 2023) 28\u00a0pages. 10.1145\/3579609","DOI":"10.1145\/3579609"},{"key":"e_1_3_3_3_40_2","doi-asserted-by":"publisher","unstructured":"Camille Harris Amber\u00a0Gayle Johnson Sadie Palmer Diyi Yang and Amy Bruckman. 2023. \"Honestly I Think TikTok has a Vendetta Against Black Creators\": Understanding Black Content Creator Experiences on TikTok. Proc. ACM Hum.-Comput. Interact. 7 CSCW2 Article 320 (oct 2023) 31\u00a0pages. 10.1145\/3610169","DOI":"10.1145\/3610169"},{"key":"e_1_3_3_3_41_2","doi-asserted-by":"crossref","unstructured":"Saad Hassan Matt Huenerfauth and Cecilia\u00a0Ovesdotter Alm. 2021. Unpacking the Interdependent Systems of Discrimination: Ableist Bias in NLP Systems through an Intersectional Lens. ArXiv abs\/2110.00521 (2021). https:\/\/api.semanticscholar.org\/CorpusID:238253456","DOI":"10.18653\/v1\/2021.findings-emnlp.267"},{"key":"e_1_3_3_3_42_2","unstructured":"Thomas Hehir. 2007. Confronting Ableism. Educational Leadership (01 2007)."},{"key":"e_1_3_3_3_43_2","doi-asserted-by":"publisher","DOI":"10.1145\/3613904.3641949"},{"key":"e_1_3_3_3_44_2","doi-asserted-by":"publisher","DOI":"10.1145\/3517428.3544801"},{"key":"e_1_3_3_3_45_2","doi-asserted-by":"publisher","DOI":"10.1145\/3313831.3376750"},{"key":"e_1_3_3_3_46_2","doi-asserted-by":"publisher","DOI":"10.1145\/3491102.3517505"},{"key":"e_1_3_3_3_47_2","doi-asserted-by":"publisher","unstructured":"Shagun Jhaver Sucheta Ghoshal Amy Bruckman and Eric Gilbert. 2018. Online Harassment and Content Moderation: The Case of Blocklists. ACM Trans. Comput.-Hum. Interact. 25 2 Article 12 (mar 2018) 33\u00a0pages. 10.1145\/3185593","DOI":"10.1145\/3185593"},{"key":"e_1_3_3_3_48_2","doi-asserted-by":"publisher","unstructured":"Shagun Jhaver Alice\u00a0Qian Zhang Quan\u00a0Ze Chen Nikhila Natarajan Ruotong Wang and Amy\u00a0X. Zhang. 2023. Personalizing Content Moderation on Social Media: User Perspectives on Moderation Choices Interface Design and Labor. Proc. ACM Hum.-Comput. Interact. 7 CSCW2 Article 289 (oct 2023) 33\u00a0pages. 10.1145\/3610080","DOI":"10.1145\/3610080"},{"key":"e_1_3_3_3_49_2","doi-asserted-by":"publisher","unstructured":"Shagun Jhaver and Amy\u00a0X. Zhang. 2023. Do users want platform moderation or individual control? Examining the role of third-person effects and free speech support in shaping moderation preferences. New Media & Society 0 0 (2023) 14614448231217993. 10.1177\/14614448231217993 arXiv:10.1177\/14614448231217993","DOI":"10.1177\/14614448231217993"},{"key":"e_1_3_3_3_50_2","doi-asserted-by":"publisher","unstructured":"Jialun\u00a0Aaron Jiang Peipei Nie Jed\u00a0R. Brubaker and Casey Fiesler. 2023. A Trade-off-centered Framework of Content Moderation. ACM Trans. Comput.-Hum. Interact. 30 1 Article 3 (mar 2023) 34\u00a0pages. 10.1145\/3534929","DOI":"10.1145\/3534929"},{"key":"e_1_3_3_3_51_2","doi-asserted-by":"publisher","unstructured":"Jialun\u00a0Aaron Jiang Morgan\u00a0Klaus Scheuerman Casey Fiesler and Jed\u00a0R Brubaker. 2021. Understanding international perceptions of the severity of harmful content online. PLOS ONE 16 8 (August 2021) 1\u201322. 10.1371\/journal.pone.0256","DOI":"10.1371\/journal.pone.0256"},{"key":"e_1_3_3_3_52_2","unstructured":"Jigsaw. 2019. Tune: Control the comments you see. https:\/\/medium.com\/jigsaw\/tune-control-the-comments-you-see-b10cc807a171 [Accessed 11-09-2024]."},{"key":"e_1_3_3_3_53_2","doi-asserted-by":"publisher","unstructured":"Mark\u00a0R. Johnson. 2019. Inclusion and exclusion in the digital economy: disability and mental health as a live streamer on Twitch.tv. Information Communication & Society 22 4 (March 2019) 506\u2013520. 10.1080\/1369118X.2018.1476575 Publisher: Routledge _eprint: https:\/\/doi.org\/10.1080\/1369118X.2018.1476575.","DOI":"10.1080\/1369118X.2018.1476575"},{"key":"e_1_3_3_3_54_2","doi-asserted-by":"publisher","unstructured":"Nadia Karizat Dan Delmonaco Motahhare Eslami and Nazanin Andalibi. 2021. Algorithmic Folk Theories and Identity: How TikTok Users Co-Produce Knowledge of Identity and Engage in Algorithmic Resistance. Proc. ACM Hum.-Comput. Interact. 5 CSCW2 Article 305 (oct 2021) 44\u00a0pages. 10.1145\/3476046","DOI":"10.1145\/3476046"},{"key":"e_1_3_3_3_55_2","doi-asserted-by":"publisher","DOI":"10.1145\/3613904.3642737"},{"key":"e_1_3_3_3_56_2","unstructured":"R.M. Keller and Corinne Galgay. 2010. Microaggressions experienced by people with disabilities in US society. Microaggressions and marginality: Manifestation dynamics and impact (01 2010) 241\u2013268."},{"key":"e_1_3_3_3_57_2","doi-asserted-by":"publisher","DOI":"10.1145\/3411764.3445570"},{"key":"e_1_3_3_3_58_2","volume-title":"Working Definition of Ableism - January 2022 Update","author":"Lewis T.\u00a0A.","year":"2022","unstructured":"T.\u00a0A. Lewis. 2022. Working Definition of Ableism - January 2022 Update. https:\/\/www.talilalewis.com\/blog\/workingdefinition-of-ableism-january-2022-update Accessed: 2024-12-03."},{"key":"e_1_3_3_3_59_2","doi-asserted-by":"publisher","unstructured":"Lingyao Li Lizhou Fan Shubham Atreja and Libby Hemphill. 2024. \u201cHOT\u201d ChatGPT: The Promise of ChatGPT in Detecting and Discriminating Hateful Offensive and Toxic Comments on Social Media. ACM Trans. Web 18 2 Article 30 (mar 2024) 36\u00a0pages. 10.1145\/3643829","DOI":"10.1145\/3643829"},{"key":"e_1_3_3_3_60_2","doi-asserted-by":"publisher","unstructured":"Yao Lyu and John\u00a0M. Carroll. 2024. \"Because Some Sighted People They Don\u2019t Know What the Heck You\u2019re Talking About:\" A Study of Blind Tokers\u2019 Infrastructuring Work to Build Independence. Proc. ACM Hum.-Comput. Interact. 8 CSCW1 Article 20 (apr 2024) 30\u00a0pages. 10.1145\/3637297","DOI":"10.1145\/3637297"},{"key":"e_1_3_3_3_61_2","doi-asserted-by":"publisher","unstructured":"Renkai Ma and Yubo Kou. 2023. \"Defaulting to boilerplate answers they didn\u2019t engage in a genuine conversation\": Dimensions of Transparency Design in Creator Moderation. Proc. ACM Hum.-Comput. Interact. 7 CSCW1 Article 44 (apr 2023) 26\u00a0pages. 10.1145\/3579477","DOI":"10.1145\/3579477"},{"key":"e_1_3_3_3_62_2","doi-asserted-by":"publisher","unstructured":"Abdurahman Maarouf Nicolas Pr\u00f6llochs and Stefan Feuerriegel. 2024. The Virality of Hate Speech on Social Media. Proc. ACM Hum.-Comput. Interact. 8 CSCW1 Article 186 (apr 2024) 22\u00a0pages. 10.1145\/3641025","DOI":"10.1145\/3641025"},{"key":"e_1_3_3_3_63_2","unstructured":"Kate Manne. 2015. Why I Use Trigger Warnings. The New York Times (2015). https:\/\/www.nytimes.com\/2015\/09\/20\/opinion\/sunday\/why-i-use-trigger-warnings.html"},{"key":"e_1_3_3_3_64_2","doi-asserted-by":"publisher","unstructured":"A McGillicuddy Jean-Gregoire Bernard and Jocelyn Cranefield. 2016. Controlling Bad Behavior in Online Communities: An Examination of Moderation Work. (1 2016). 10.26686\/wgtn.12910085.v1","DOI":"10.26686\/wgtn.12910085.v1"},{"key":"e_1_3_3_3_65_2","doi-asserted-by":"publisher","DOI":"10.1145\/3441852.3471216"},{"key":"e_1_3_3_3_66_2","doi-asserted-by":"publisher","DOI":"10.1145\/3597638.3608416"},{"key":"e_1_3_3_3_67_2","doi-asserted-by":"publisher","DOI":"10.1145\/3565066.3608705"},{"key":"e_1_3_3_3_68_2","doi-asserted-by":"publisher","DOI":"10.1145\/3491102.3517608"},{"key":"e_1_3_3_3_69_2","unstructured":"Richard Nieva. 2024. Here\u2019s How Facebook Uses Artificial Intelligence to Take Down Abusive Posts. https:\/\/www.cnet.com\/tech\/tech-industry\/heres-how-facebook-uses-artificial-intelligence-to-take-down-abusive-posts-f8\/. Accessed: September 10 2024."},{"key":"e_1_3_3_3_70_2","doi-asserted-by":"publisher","unstructured":"Shuo Niu Li Liu and Yali Bian. 2024. Please Understand My Disability: An Analysis of YouTubers\u2019 Discourse on Disability Challenges. Proc. ACM Hum.-Comput. Interact. 8 CSCW2 Article 407 (Nov. 2024) 25\u00a0pages. 10.1145\/3686946","DOI":"10.1145\/3686946"},{"key":"e_1_3_3_3_71_2","doi-asserted-by":"publisher","unstructured":"Thiago Oliva. 2021. Fighting Hate Speech Silencing Drag Queens? Artificial Intelligence in Content Moderation and Risks to LGBTQ Voices Online. Sexuality & Culture (04 2021). 10.1007\/s12119-020-09790-w","DOI":"10.1007\/s12119-020-09790-w"},{"key":"e_1_3_3_3_72_2","doi-asserted-by":"publisher","DOI":"10.1145\/2957276.2957297"},{"key":"e_1_3_3_3_73_2","unstructured":"Jon Porter. 2021. Today I learned about Intel\u2019s AI sliders that filter online gaming abuse. https:\/\/www.theverge.com\/2021\/4\/8\/22373290\/intel-bleep-ai-powered-abuse-toxicity-gaming-filters"},{"key":"e_1_3_3_3_74_2","doi-asserted-by":"publisher","DOI":"10.4324\/9781003196457-15"},{"key":"e_1_3_3_3_75_2","doi-asserted-by":"publisher","unstructured":"Kathryn\u00a0E. Ringland. 2019. \u201cAutsome\u201d: Fostering an Autistic Identity in an Online Minecraft Community for Youth with Autism. Information in Contemporary Society : 14th International Conference iConference 2019 Washington DC USA March 31-April 3 2019 Proceedings. iConference (Conference) (14th : 2019 : Washington D.C.) 11420 (April 2019) 132\u2013143. 10.1007\/978-3-030-15742-512","DOI":"10.1007\/978-3-030-15742-512"},{"key":"e_1_3_3_3_76_2","doi-asserted-by":"publisher","DOI":"10.1145\/3308561.3353785"},{"key":"e_1_3_3_3_77_2","doi-asserted-by":"publisher","DOI":"10.1145\/3532106.3533514"},{"key":"e_1_3_3_3_78_2","doi-asserted-by":"publisher","unstructured":"Jim Rudd Ken Stern and Scott Isensee. 1996. Low vs. high-fidelity prototyping debate. Interactions 3 1 (jan 1996) 76\u201385. 10.1145\/223500.223514","DOI":"10.1145\/223500.223514"},{"key":"e_1_3_3_3_79_2","first-page":"5629","volume-title":"32nd USENIX Security Symposium (USENIX Security 23)","author":"Samermit Patrawat","year":"2023","unstructured":"Patrawat Samermit, Anna Turner, Patrick\u00a0Gage Kelley, Tara Matthews, Vanessia Wu, Sunny Consolvo, and Kurt Thomas. 2023. \u201cMillions of people are watching you\u201d: Understanding the Digital-Safety Needs and Practices of Creators. In 32nd USENIX Security Symposium (USENIX Security 23). USENIX Association, Anaheim, CA, 5629\u20135645. https:\/\/www.usenix.org\/conference\/usenixsecurity23\/presentation\/samermit"},{"key":"e_1_3_3_3_80_2","doi-asserted-by":"publisher","DOI":"10.1145\/3544548.3581333"},{"key":"e_1_3_3_3_81_2","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/P19-1163"},{"key":"e_1_3_3_3_82_2","doi-asserted-by":"publisher","DOI":"10.1145\/3563657.3596119"},{"key":"e_1_3_3_3_83_2","doi-asserted-by":"publisher","unstructured":"Morgan\u00a0Klaus Scheuerman Stacy\u00a0M. Branham and Foad Hamidi. 2018. Safe Spaces and Safe Places: Unpacking Technology-Mediated Experiences of Safety and Harm with Transgender People. Proc. ACM Hum.-Comput. Interact. 2 CSCW Article 155 (nov 2018) 27\u00a0pages. 10.1145\/3274424","DOI":"10.1145\/3274424"},{"key":"e_1_3_3_3_84_2","doi-asserted-by":"publisher","unstructured":"Morgan\u00a0Klaus Scheuerman Jialun\u00a0Aaron Jiang Casey Fiesler and Jed\u00a0R. Brubaker. 2021. A Framework of Severity for Harmful Content Online. Proc. ACM Hum.-Comput. Interact. 5 CSCW2 Article 368 (oct 2021) 33\u00a0pages. 10.1145\/3479512","DOI":"10.1145\/3479512"},{"key":"e_1_3_3_3_85_2","doi-asserted-by":"publisher","DOI":"10.1145\/3544548.3581020"},{"key":"e_1_3_3_3_86_2","doi-asserted-by":"publisher","DOI":"10.1145\/3544548.3581512"},{"key":"e_1_3_3_3_87_2","doi-asserted-by":"publisher","DOI":"10.1145\/3544548.3581538"},{"key":"e_1_3_3_3_88_2","doi-asserted-by":"publisher","unstructured":"Ellen Simpson Samantha Dalal and Bryan Semaan. 2023. \"Hey Can You Add Captions?\": The Critical Infrastructuring Practices of Neurodiverse People on TikTok. Proc. ACM Hum.-Comput. Interact. 7 CSCW1 Article 57 (apr 2023) 27\u00a0pages. 10.1145\/3579490","DOI":"10.1145\/3579490"},{"key":"e_1_3_3_3_89_2","volume-title":"SoK: Hate, Harassment, and the Changing Landscape of Online Abuse","author":"Thomas Kurt","year":"2021","unstructured":"Kurt Thomas, Devdatta Akhawe, Michael Bailey, Dan Boneh, Elie Bursztein, Sunny Consolvo, Nicola Dell, Zakir Durumeric, Patrick\u00a0Gage Kelley, Deepak Kumar, Damon McCoy, Sarah Meiklejohn, Thomas Ristenpart, and Gianluca Stringhini (Eds.). 2021. SoK: Hate, Harassment, and the Changing Landscape of Online Abuse."},{"key":"e_1_3_3_3_90_2","volume-title":"\"It\u2019s common and a part of being a content creator\u201d: Understanding How Creators Experience and Cope with Hate and Harassment Online","author":"Thomas Kurt","year":"2022","unstructured":"Kurt Thomas, Patrick\u00a0Gage Kelley, Sunny Consolvo, Patrawat Samermit, and Elie Bursztein (Eds.). 2022. \"It\u2019s common and a part of being a content creator\u201d: Understanding How Creators Experience and Cope with Hate and Harassment Online."},{"key":"e_1_3_3_3_91_2","doi-asserted-by":"publisher","DOI":"10.1145\/3411764.3445590"},{"key":"e_1_3_3_3_92_2","doi-asserted-by":"publisher","unstructured":"Pranav\u00a0Narayanan Venkit Mukund Srinath and Shomir Wilson. 2023. Automated Ableism: An Exploration of Explicit Disability Biases in Sentiment and Toxicity Analysis Models. CoRR abs\/2307.09209 (2023). 10.48550\/ARXIV.2307.09209 arXiv:https:\/\/arXiv.org\/abs\/2307.09209","DOI":"10.48550\/ARXIV.2307.09209"},{"key":"e_1_3_3_3_93_2","doi-asserted-by":"publisher","DOI":"10.1145\/2470654.2466473"},{"key":"e_1_3_3_3_94_2","doi-asserted-by":"publisher","DOI":"10.1145\/3584931.3606995"},{"key":"e_1_3_3_3_95_2","unstructured":"Mark Warner Angelika Strohmayer Matthew Higgs and Lynne Coventry. 2024. A Critical Reflection on the Use of Toxicity Detection Algorithms in Proactive Content Moderation Systems. arxiv:https:\/\/arXiv.org\/abs\/2401.10629\u00a0[cs.HC] https:\/\/arxiv.org\/abs\/2401.10629"},{"key":"e_1_3_3_3_96_2","doi-asserted-by":"publisher","unstructured":"Gregor Wolbring. 2008. The Politics of Ableism. Development 51 2 (2008) 252\u2013258. 10.1057\/dev.2008.17","DOI":"10.1057\/dev.2008.17"},{"key":"e_1_3_3_3_97_2","unstructured":"Lana Zhang and Ravisha SK. 2023. Flag Harmful Content: Using Amazon Comprehend for Toxicity Detection. https:\/\/aws.amazon.com\/blogs\/machine-learning\/flag-harmful-content-using-amazon-comprehend-toxicity-detection\/. Accessed: September 10 2024."}],"event":{"name":"CHI 2025: CHI Conference on Human Factors in Computing Systems","location":"Yokohama Japan","acronym":"CHI '25","sponsor":["SIGCHI ACM Special Interest Group on Computer-Human Interaction"]},"container-title":["Proceedings of the 2025 CHI Conference on Human Factors in Computing Systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3706598.3713997","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3706598.3713997","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,4]],"date-time":"2025-07-04T05:14:56Z","timestamp":1751606096000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3706598.3713997"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,4,25]]},"references-count":96,"alternative-id":["10.1145\/3706598.3713997","10.1145\/3706598"],"URL":"https:\/\/doi.org\/10.1145\/3706598.3713997","relation":{},"subject":[],"published":{"date-parts":[[2025,4,25]]},"assertion":[{"value":"2025-04-25","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}