{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,13]],"date-time":"2026-04-13T18:20:54Z","timestamp":1776104454495,"version":"3.50.1"},"reference-count":82,"publisher":"Association for Computing Machinery (ACM)","issue":"2","license":[{"start":{"date-parts":[[2025,5,2]],"date-time":"2025-05-02T00:00:00Z","timestamp":1746144000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100006374","name":"National Science Foundation","doi-asserted-by":"publisher","award":["2112878"],"award-info":[{"award-number":["2112878"]}],"id":[{"id":"10.13039\/501100006374","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["Proc. ACM Hum.-Comput. Interact."],"published-print":{"date-parts":[[2025,5,2]]},"abstract":"<jats:p>\n            Social VR's focus on embodied and immersive experiences has led to intensified and more physicalized forms of harassment than other online contexts. Therefore, a growing body of HCI and CSCW work has explored multiple strategies and mechanisms to prevent and mitigate harassment risks in social VR. However, existing works have also highlighted a fundamental challenge in mitigating harassment in social VR - the apparent lack of consensus among social VR users on how to explicitly define harassment and what behaviors should be considered harassing in social VR. In this work, we aim to offer new knowledge on the uncertainty about how harassment is defined and perceived in social VR, particularly by learning from social VR users who have experienced\n            <jats:italic toggle=\"yes\">both sides of harassment accusations<\/jats:italic>\n            . Based on interviews with 12 participants with diverse identities who have both been harassed by others and been accused of harassing others in social VR, we unpack how people justify and reflect on their behavior given their prior experiences of both being victims of harassment and being called a harasser. We thus offer unique insights into the complexity of harassment in social VR by highlighting cases of \"gray areas\" and critical ethical implications in such harassment accusations, which are understudied in the existing literature. We also propose two high-level design principles for new strategies and approaches to foster safe social VR spaces based on people's unique experiences of both sides of harassment accusations in social VR.\n          <\/jats:p>","DOI":"10.1145\/3711005","type":"journal-article","created":{"date-parts":[[2025,5,20]],"date-time":"2025-05-20T11:36:19Z","timestamp":1747740979000},"page":"1-26","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":5,"title":["\"I Have Abused Someone Who Abused Me\": Understanding People Who Have Experienced Both Sides of Harassment Accusations in Social VR"],"prefix":"10.1145","volume":"9","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-5107-7794","authenticated-orcid":false,"given":"Guo","family":"Freeman","sequence":"first","affiliation":[{"name":"Clemson University, Clemson, SC, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8640-9936","authenticated-orcid":false,"given":"Lingyuan","family":"Li","sequence":"additional","affiliation":[{"name":"The University of Texas at Austin, Austin, TX, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1503-7872","authenticated-orcid":false,"given":"Kelsea","family":"Schulenberg","sequence":"additional","affiliation":[{"name":"Clemson University, Clemson, SC, USA"}]}],"member":"320","published-online":{"date-parts":[[2025,5,2]]},"reference":[{"key":"e_1_2_1_1_1","volume-title":"Flagging as a silencing tool: Exploring the relationship between de-platforming of sex and online abuse on Instagram and TikTok. new media & society","author":"Are Carolina","year":"2023","unstructured":"Carolina Are. 2023. Flagging as a silencing tool: Exploring the relationship between de-platforming of sex and online abuse on Instagram and TikTok. new media & society (2023), 14614448241228544."},{"key":"e_1_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/1978942.1979041"},{"key":"e_1_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/3411764.3445157"},{"key":"e_1_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1609\/icwsm.v12i1.15036"},{"key":"e_1_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/3134659"},{"key":"e_1_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/3359202"},{"key":"e_1_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/VR.2019.8798165"},{"key":"e_1_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/3170427.3170610"},{"key":"e_1_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/3025453.3025563"},{"key":"e_1_2_1_10_1","volume-title":"Using thematic analysis in psychology. Qualitative research in psychology 3, 2","author":"Braun Virginia","year":"2006","unstructured":"Virginia Braun and Victoria Clarke. 2006. Using thematic analysis in psychology. Qualitative research in psychology 3, 2 (2006), 77--101."},{"key":"e_1_2_1_11_1","volume-title":"Thematic analysis","author":"Braun Virginia","unstructured":"Virginia Braun and Victoria Clarke. 2012. Thematic analysis. American Psychological Association."},{"key":"e_1_2_1_12_1","volume-title":"Conference companion publication of the 2019 on computer supported cooperative work and social computing. 166--170","author":"Cai Jie","year":"2019","unstructured":"Jie Cai and Donghee Yvette Wohn. 2019. What are effective strategies of handling harassment on twitch? Users' perspectives. In Conference companion publication of the 2019 on computer supported cooperative work and social computing. 166--170."},{"key":"e_1_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/3491102.3517628"},{"key":"e_1_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/3452918.3458796"},{"key":"e_1_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/2858036.2858498"},{"key":"e_1_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/2818048.2819963"},{"key":"e_1_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/3490499"},{"key":"e_1_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.54097\/ehss.v23i.13140"},{"key":"e_1_2_1_19_1","first-page":"165","article-title":"Custodians of the internet: Platforms, content moderation, and the hidden decisions that shape social media","volume":"10","author":"\u00c7\u00f6mlek\u00e7i Fatih","year":"2019","unstructured":"Fatih \u00c7\u00f6mlek\u00e7i. 2019. Custodians of the internet: Platforms, content moderation, and the hidden decisions that shape social media. Communication Today 10, 1 (2019), 165--166.","journal-title":"Communication Today"},{"key":"e_1_2_1_20_1","unstructured":"U.S. Equal Employment Opportunity Commission. 2021. Harassment. https:\/\/www.eeoc.gov\/harassment"},{"key":"e_1_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/3290605.3300372"},{"key":"e_1_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/3613904.3642144"},{"key":"e_1_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/3585088.3589374"},{"key":"e_1_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/3531073.3534492"},{"key":"e_1_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2013.07.014"},{"key":"e_1_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/3452918.3458805"},{"key":"e_1_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/3555153"},{"key":"e_1_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/3492836"},{"key":"e_1_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/3432938"},{"key":"e_1_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/3491102.3502082"},{"key":"e_1_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10606-020-09386-w"},{"key":"e_1_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/3512932"},{"key":"e_1_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/3491102.3517517"},{"key":"e_1_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1111\/soc4.12458"},{"key":"e_1_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1177\/08912432211029393"},{"key":"e_1_2_1_36_1","volume-title":"Facebook while black: Users call it getting 'Zucked,'say talking about racism is censored as hate speech. Usa today 24","author":"Guynn Jessica","year":"2019","unstructured":"Jessica Guynn. 2019. Facebook while black: Users call it getting 'Zucked,'say talking about racism is censored as hate speech. Usa today 24 (2019)."},{"key":"e_1_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/3479610"},{"key":"e_1_2_1_38_1","volume-title":"Proceedings of the ACM on human-computer interaction 3, CSCW","author":"Jhaver Shagun","year":"2019","unstructured":"Shagun Jhaver, Darren Scott Appling, Eric Gilbert, and Amy Bruckman. 2019. \" Did you suspect the post would be removed?\" Understanding user reactions to content removals on Reddit. Proceedings of the ACM on human-computer interaction 3, CSCW (2019), 1--33."},{"key":"e_1_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/3359252"},{"key":"e_1_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/3185593"},{"key":"e_1_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/3359157"},{"key":"e_1_2_1_42_1","volume-title":"Proceedings of the ACM on Human-Computer Interaction 6, CSCW2","author":"Kim Haesoo","year":"2022","unstructured":"Haesoo Kim, HaeEun Kim, Juho Kim, and Jeong-woo Jang. 2022. When Does it Become Harassment? An Investigation of Online Criticism and Calling Out in Twitter. Proceedings of the ACM on Human-Computer Interaction 6, CSCW2 (2022), 1--32."},{"key":"e_1_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1145\/3476075"},{"key":"e_1_2_1_44_1","volume-title":"Characteristics of People Who Engage in Online Harassing Behavior. In CHI Conference on Human Factors in Computing Systems Extended Abstracts. 1--7.","author":"Lee Song Mi","year":"2022","unstructured":"Song Mi Lee, Cliff Lampe, JJ Prescott, and Sarita Schoenebeck. 2022. Characteristics of People Who Engage in Online Harassing Behavior. In CHI Conference on Human Factors in Computing Systems Extended Abstracts. 1--7."},{"key":"e_1_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1145\/3443686"},{"key":"e_1_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1145\/3544548.3581097"},{"key":"e_1_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1145\/3411764.3445733"},{"key":"e_1_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1145\/3411764.3445248"},{"key":"e_1_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1145\/3410404.3414266"},{"key":"e_1_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1109\/VRW50115.2020.00075"},{"key":"e_1_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1145\/3410404.3414268"},{"key":"e_1_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1177\/20563051211021378"},{"key":"e_1_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1145\/3290605.3300794"},{"key":"e_1_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.1080\/14680777.2021.1913432"},{"key":"e_1_2_1_55_1","unstructured":"Jessica Outlaw and Beth Duckles. 2018. Virtual Harassment: The Social Experience of 600 Regular Virtual Reality (VR) Users. https:\/\/virtualrealitypop.com\/virtual-harassment-the-social-experience-of-600-regular-virtual-reality-vrusers- 23b1b4ef884e"},{"key":"e_1_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11199-016-0678-y"},{"key":"e_1_2_1_57_1","doi-asserted-by":"publisher","DOI":"10.1145\/2957276.2957297"},{"key":"e_1_2_1_58_1","volume-title":"You are here: A field guide for navigating polarized speech, conspiracy theories, and our polluted media landscape","author":"Phillips Whitney","unstructured":"Whitney Phillips and Ryan M Milner. 2021. You are here: A field guide for navigating polarized speech, conspiracy theories, and our polluted media landscape. MIT Press."},{"key":"e_1_2_1_59_1","unstructured":"Sarah T Roberts. 2016. Commercial content moderation: Digital laborers' dirty work. (2016)."},{"key":"e_1_2_1_60_1","doi-asserted-by":"publisher","DOI":"10.1145\/3544548.3581329"},{"key":"e_1_2_1_61_1","doi-asserted-by":"publisher","DOI":"10.1145\/3025453.3025766"},{"key":"e_1_2_1_62_1","doi-asserted-by":"publisher","DOI":"10.1145\/3567557"},{"key":"e_1_2_1_63_1","doi-asserted-by":"publisher","DOI":"10.1145\/3610027"},{"key":"e_1_2_1_64_1","volume-title":"Proceedings of the 2023 CHI Confrence on Human Factors in Computing Systems.","author":"Schulenberg Kelsea","unstructured":"Kelsea Schulenberg, Lingyuan Li, Guo Freeman, Samaneh Zamanifard, and Nathan J. McNeese. 2023. Towards Leveraging AI-based Moderation to Address Emergent Harassment in Social Virtual Reality. In Proceedings of the 2023 CHI Confrence on Human Factors in Computing Systems."},{"key":"e_1_2_1_65_1","doi-asserted-by":"publisher","DOI":"10.1145\/3610172"},{"key":"e_1_2_1_66_1","doi-asserted-by":"publisher","DOI":"10.1177\/1461444818821316"},{"key":"e_1_2_1_67_1","volume-title":"All are welcome: Using VR ethnography to explore harassment behavior in immersive social virtual reality. In 2017 IEEE Virtual Reality (VR)","author":"Shriram Ketaki","unstructured":"Ketaki Shriram and Raz Schwartz. 2017. All are welcome: Using VR ethnography to explore harassment behavior in immersive social virtual reality. In 2017 IEEE Virtual Reality (VR). IEEE, 225--226."},{"key":"e_1_2_1_68_1","volume-title":"Henrik Ehrsson, and Maria V Sanchez-Vives.","author":"Slater Mel","year":"2009","unstructured":"Mel Slater, Daniel P\u00e9rez Marcos, Henrik Ehrsson, and Maria V Sanchez-Vives. 2009. Inducing illusory ownership of a virtual body. Frontiers in neuroscience (2009), 29."},{"key":"e_1_2_1_69_1","unstructured":"Weilun Soon. 2022. A researcher's avatar was sexually assaulted on a metaverse platform owned by Meta. https: \/\/www.businessinsider.com\/researcher-claims-her-avatar-was-raped-on-metas-metaverse-platform-2022--5"},{"key":"e_1_2_1_70_1","unstructured":"Hannah Sparks. 2021. Woman claims she was virtually 'groped' in Meta's VR metaverse. https:\/\/nypost.com\/2021\/12\/ 17\/woman-claims-she-was-virtually-groped-in-meta-vr-metaverse\/"},{"key":"e_1_2_1_71_1","doi-asserted-by":"publisher","DOI":"10.1177\/1461444819834317"},{"key":"e_1_2_1_72_1","volume-title":"Men's harassment behavior in online video games: Personality traits and game factors. Aggressive behavior 42, 6","author":"Tang Wai Yen","year":"2016","unstructured":"Wai Yen Tang and Jesse Fox. 2016. Men's harassment behavior in online video games: Personality traits and game factors. Aggressive behavior 42, 6 (2016), 513--521."},{"key":"e_1_2_1_73_1","volume-title":"Investigating sexual harassment in online video games: How personality and context factors are related to toxic sexual behaviors against fellow players. Aggressive behavior 46, 1","author":"Tang Wai Yen","year":"2020","unstructured":"Wai Yen Tang, Felix Reer, and Thorsten Quandt. 2020. Investigating sexual harassment in online video games: How personality and context factors are related to toxic sexual behaviors against fellow players. Aggressive behavior 46, 1 (2020), 127--135."},{"key":"e_1_2_1_74_1","volume-title":"Harassment Experiences of Women and LGBTQ Live Streamers and How They Handled Negativity. In ACM International Conference on Interactive Media Experiences. 7--19","author":"Uttarapong Jirassaya","year":"2021","unstructured":"Jirassaya Uttarapong, Jie Cai, and Donghee Yvette Wohn. 2021. Harassment Experiences of Women and LGBTQ Live Streamers and How They Handled Negativity. In ACM International Conference on Interactive Media Experiences. 7--19."},{"key":"e_1_2_1_75_1","first-page":"345","article-title":"Thinking before posting?","volume":"66","author":"Royen Kathleen Van","year":"2017","unstructured":"Kathleen Van Royen, Karolien Poels, Heidi Vandebosch, and Philippe Adam. 2017. \"Thinking before posting?\" Reducing cyber harassment on social networking sites through a reflective message. Computers in human behavior 66 (2017), 345--352.","journal-title":"Computers in human behavior"},{"key":"e_1_2_1_76_1","doi-asserted-by":"publisher","DOI":"10.1145\/2998181.2998337"},{"key":"e_1_2_1_77_1","doi-asserted-by":"publisher","DOI":"10.1177\/1077800414566686"},{"key":"e_1_2_1_78_1","doi-asserted-by":"publisher","DOI":"10.1162\/105474698565686"},{"key":"e_1_2_1_79_1","doi-asserted-by":"publisher","DOI":"10.1145\/3290605.3300390"},{"key":"e_1_2_1_80_1","doi-asserted-by":"publisher","DOI":"10.1145\/3579630"},{"key":"e_1_2_1_81_1","first-page":"1311","article-title":"Cultural differences in perceptions of and responses to sexual harassment","volume":"14","author":"Zimbroff Jennifer","year":"2007","unstructured":"Jennifer Zimbroff. 2007. Cultural differences in perceptions of and responses to sexual harassment. Duke J. Gender L. & Pol'y 14 (2007), 1311.","journal-title":"Duke J. Gender L. & Pol'y"},{"key":"e_1_2_1_82_1","doi-asserted-by":"publisher","DOI":"10.1109\/TVCG.2023.3247065"}],"container-title":["Proceedings of the ACM on Human-Computer Interaction"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3711005","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3711005","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,21]],"date-time":"2025-08-21T09:32:24Z","timestamp":1755768744000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3711005"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,5,2]]},"references-count":82,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2025,5,2]]}},"alternative-id":["10.1145\/3711005"],"URL":"https:\/\/doi.org\/10.1145\/3711005","relation":{},"ISSN":["2573-0142"],"issn-type":[{"value":"2573-0142","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,5,2]]},"assertion":[{"value":"2025-05-02","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}