{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,13]],"date-time":"2026-04-13T23:16:42Z","timestamp":1776122202854,"version":"3.50.1"},"reference-count":87,"publisher":"Association for Computing Machinery (ACM)","issue":"2","license":[{"start":{"date-parts":[[2025,5,2]],"date-time":"2025-05-02T00:00:00Z","timestamp":1746144000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100006374","name":"National Science Foundation","doi-asserted-by":"publisher","award":["1916096"],"award-info":[{"award-number":["1916096"]}],"id":[{"id":"10.13039\/501100006374","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["Proc. ACM Hum.-Comput. Interact."],"published-print":{"date-parts":[[2025,5,2]]},"abstract":"<jats:p>Researchers increasingly look to understand experiences of pain, harm, and marginalization via qualitative analysis. Such work is needed to understand and address social ills, but poses risks to researchers' well-being: sifting through volumes of data on painful human experiences risks incurring traumatic exposure in the researcher. In this paper, we explore how the principles of trauma-informed computing (TIC) can be applied to reimagine healthier tools and workflows for qualitative analysis. We apply TIC to create a design provocation called TIQA, a system for qualitative coding that leverages language modeling, semantic search, and recommendation systems to measure and mitigate an analyst's exposure to concepts they find traumatic. Through a formative study of TIQA with 15 participants, we illuminate the complexities of enacting TIC in qualitative knowledge infrastructure, and potential roles for machine assistance in mitigating researchers' trauma. To assist scholars in translating the high-level principles of TIC into sociotechnical system design, we argue for: (a) a conceptual shift from safety as exposure reduction towards safety as enablement; and (b) renewed attention to evaluating the trauma-informedness of design processes, in tandem with the outcomes of designed objects on users' well-being.<\/jats:p>","DOI":"10.1145\/3711035","type":"journal-article","created":{"date-parts":[[2025,5,3]],"date-time":"2025-05-03T01:35:05Z","timestamp":1746236105000},"page":"1-37","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":4,"title":["Mitigating Trauma in Qualitative Research Infrastructure: Roles for Machine Assistance and Trauma-Informed Design"],"prefix":"10.1145","volume":"9","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-1087-1101","authenticated-orcid":false,"given":"Emily","family":"Tseng","sequence":"first","affiliation":[{"name":"Cornell Tech, New York, NY, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8642-9558","authenticated-orcid":false,"given":"Thomas","family":"Ristenpart","sequence":"additional","affiliation":[{"name":"Cornell Tech, New York, NY, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6119-705X","authenticated-orcid":false,"given":"Nicola","family":"Dell","sequence":"additional","affiliation":[{"name":"Cornell Tech, New York, NY, USA"}]}],"member":"320","published-online":{"date-parts":[[2025,5,2]]},"reference":[{"key":"e_1_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.2196\/46842"},{"key":"e_1_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/3555531"},{"key":"e_1_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/3544548.3581032"},{"key":"e_1_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/3544548.3581239"},{"key":"e_1_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/3290605.3300233"},{"key":"e_1_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/3613905.3636301"},{"key":"e_1_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/1753326.1753521"},{"key":"e_1_2_1_8_1","volume-title":"Manual or electronic? The role of coding in qualitative data analysis. Educational research","author":"Basit Tehmina","year":"2003","unstructured":"Tehmina Basit. 2003. Manual or electronic? The role of coding in qualitative data analysis. Educational research, Vol. 45, 2 (2003), 143--154."},{"key":"e_1_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1002\/asi.23786"},{"key":"e_1_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1080\/07370024.2020.1734460"},{"key":"e_1_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/332040.332473"},{"key":"e_1_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/3544548.3581101"},{"key":"e_1_2_1_13_1","volume-title":"SoK: Safer Digital-Safety Research Involving At-Risk Users. IEEE Symposium on Security and Privacy (Oakland) (2024 (to appear)).","author":"Bellini Rosanna","year":"2024","unstructured":"Rosanna Bellini, Emily Tseng, Noel Warford, Alaa Daffalla, Tara Matthews, Sunny Consolvo, Jill Woelfer, Patrick G Kelley, Michelle Mazurek, Dana Cuomo, Nicola Dell, and Thomas Ristenpart. 2024 (to appear). SoK: Safer Digital-Safety Research Involving At-Risk Users. IEEE Symposium on Security and Privacy (Oakland) (2024 (to appear))."},{"key":"e_1_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/3544548.3580756"},{"key":"e_1_2_1_15_1","volume-title":"Proceedings of the ACM on Human-Computer Interaction","volume":"6","author":"Bhandari Aparajita","year":"2022","unstructured":"Aparajita Bhandari, Diana Freed, Tara Pilato, Faten Taki, Gunisha Kaur, Stephen Yale-Loehr, Jane Powers, Tao Long, and Natalya N Bazarova. 2022. Multi-stakeholder perspectives on digital tools for US asylum applicants seeking healthcare and legal information. Proceedings of the ACM on Human-Computer Interaction, Vol. 6, CSCW2 (2022), 1--21."},{"key":"e_1_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1162\/desi.2008.24.3.85"},{"key":"e_1_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1037\/trm0000161"},{"key":"e_1_2_1_18_1","volume-title":"Reflecting on reflexive thematic analysis. Qualitative research in sport, exercise and health","author":"Braun Virginia","year":"2019","unstructured":"Virginia Braun and Victoria Clarke. 2019. Reflecting on reflexive thematic analysis. Qualitative research in sport, exercise and health, Vol. 11, 4 (2019), 589--597."},{"key":"e_1_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1037\/qup0000196"},{"key":"e_1_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1177\/15248380221118968"},{"key":"e_1_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/3461564.3461589"},{"key":"e_1_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1002\/ajcp.12388"},{"key":"e_1_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/3491102.3517475"},{"key":"e_1_2_1_24_1","unstructured":"Patricia Hill Collins and Sirma Bilge. 2020. Intersectionality. John Wiley & Sons."},{"key":"e_1_2_1_25_1","volume-title":"32nd USENIX Security Symposium (USENIX Security 23)","author":"Daffalla Alaa","year":"2023","unstructured":"Alaa Daffalla, Marina Bohuk, Nicola Dell, Rosanna Bellini, and Thomas Ristenpart. 2023. Account Security Interfaces: Important, Unintuitive, and Untrustworthy. In 32nd USENIX Security Symposium (USENIX Security 23). 3601--3618."},{"key":"e_1_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1609\/hcomp.v8i1.7461"},{"key":"e_1_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/2901790.2901861"},{"key":"e_1_2_1_28_1","unstructured":"Paul N Edwards Steven J Jackson Melissa K Chalmers Geoffrey C Bowker Christine L Borgman David Ribes Matt Burton and Scout Calvert. 2013. Knowledge infrastructures: Intellectual frameworks and research challenges. (2013)."},{"key":"e_1_2_1_29_1","article-title":"Trauma-Informed Design: Leveraging Usability Heuristics on a Social Services Website","volume":"19","author":"Eggleston Melissa","year":"2024","unstructured":"Melissa Eggleston and Lesley-Ann Noel. 2024. Trauma-Informed Design: Leveraging Usability Heuristics on a Social Services Website. Journal of User Experience, Vol. 19, 3 (2024).","journal-title":"Journal of User Experience"},{"key":"e_1_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/3432231"},{"key":"e_1_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/3507695"},{"key":"e_1_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/3242587.3242596"},{"key":"e_1_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/3491101.3503742"},{"key":"e_1_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/3479856"},{"key":"e_1_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/3359304"},{"key":"e_1_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/3544548.3581352"},{"key":"e_1_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/3555088"},{"key":"e_1_2_1_38_1","volume-title":"Public figures, public rage: candidate abuse on social media","author":"Guerin C\u00e9cil","unstructured":"C\u00e9cil Guerin and Eisha Maharasingam-Shah. 2020. Public figures, public rage: candidate abuse on social media. Institute for Strategic Dialogue."},{"key":"e_1_2_1_39_1","volume-title":"Space, gender, knowledge: Feminist readings","author":"Haraway Donna","unstructured":"Donna Haraway. 2016. 'Situated Knowledges: The Science Question in Feminism and the Privilege of Partial Perspective'. In Space, gender, knowledge: Feminist readings. Routledge, 53--72."},{"key":"e_1_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/3526113.3545681"},{"key":"e_1_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/302979.303030"},{"key":"e_1_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1145\/3313831.3376548"},{"key":"e_1_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1609\/icwsm.v14i1.7298"},{"key":"e_1_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1145\/3491102.3517505"},{"key":"e_1_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1145\/3449168"},{"key":"e_1_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1609\/hcomp.v7i1.5270"},{"key":"e_1_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/2022.findings-emnlp.35"},{"key":"e_1_2_1_48_1","volume-title":"Trauma and public mental health: A focused review. Frontiers in psychiatry","author":"Kleber Rolf J","year":"2019","unstructured":"Rolf J Kleber. 2019. Trauma and public mental health: A focused review. Frontiers in psychiatry, Vol. 10 (2019), 451."},{"key":"e_1_2_1_49_1","volume-title":"Using the \"thinking-aloud\" method in cognitive interface design","author":"Lewis Clayton","unstructured":"Clayton Lewis. 1982. Using the \"thinking-aloud\" method in cognitive interface design. IBM TJ Watson Research Center Yorktown Heights, NY."},{"key":"e_1_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1145\/1753326.1753409"},{"key":"e_1_2_1_51_1","volume-title":"A multidimensional theory of burnout. Theories of organizational stress","author":"Maslach Christina","year":"1998","unstructured":"Christina Maslach. 1998. A multidimensional theory of burnout. Theories of organizational stress, Vol. 68, 85 (1998), 16."},{"key":"e_1_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1145\/3359174"},{"key":"e_1_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1177\/0049124117729703"},{"key":"e_1_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.1145\/3313831.3376392"},{"key":"e_1_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.1145\/3229434.3229463"},{"key":"e_1_2_1_56_1","volume-title":"Science","volume":"353","author":"Palen Leysia","year":"2016","unstructured":"Leysia Palen and Kenneth M Anderson. 2016. Crisis informatics\u2014New data for extraordinary times. Science, Vol. 353, 6296 (2016), 224--225."},{"key":"e_1_2_1_57_1","doi-asserted-by":"publisher","DOI":"10.2753\/MIS0742-1222240302"},{"key":"e_1_2_1_58_1","volume-title":"Potato: The portable text annotation tool. arXiv preprint arXiv:2212.08620","author":"Pei Jiaxin","year":"2022","unstructured":"Jiaxin Pei, Aparna Ananthasubramaniam, Xingyao Wang, Naitian Zhou, Jackson Sargent, Apostolos Dedeloudis, and David Jurgens. 2022. Potato: The portable text annotation tool. arXiv preprint arXiv:2212.08620 (2022)."},{"key":"e_1_2_1_59_1","doi-asserted-by":"publisher","DOI":"10.1145\/3544548.3580648"},{"key":"e_1_2_1_60_1","volume-title":"Navigating Traumatic Stress Reactions During Computer Security Interventions. In 33rd USENIX Security Symposium (USENIX Security 24)","author":"Ramjit Lana","year":"2024","unstructured":"Lana Ramjit, Natalie Dolci, Francesca Rossi, Ryan Garcia, Thomas Ristenpart, and Dana Cuomo. 2024. Navigating Traumatic Stress Reactions During Computer Security Interventions. In 33rd USENIX Security Symposium (USENIX Security 24). 2011--2028."},{"key":"e_1_2_1_61_1","doi-asserted-by":"publisher","DOI":"10.1080\/07370024.2020.1734931"},{"key":"e_1_2_1_62_1","doi-asserted-by":"publisher","DOI":"10.1145\/3544548.3581453"},{"key":"e_1_2_1_63_1","doi-asserted-by":"publisher","DOI":"10.1145\/3584931.3611277"},{"key":"e_1_2_1_64_1","doi-asserted-by":"publisher","DOI":"10.14778\/3157794.3157797"},{"key":"e_1_2_1_65_1","doi-asserted-by":"publisher","DOI":"10.1145\/3637411"},{"key":"e_1_2_1_66_1","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/D19-1410"},{"key":"e_1_2_1_67_1","volume-title":"Knowing what a user likes: A design science approach to interfaces that automatically adapt to culture. Mis Quarterly","author":"Reinecke Katharina","year":"2013","unstructured":"Katharina Reinecke and Abraham Bernstein. 2013. Knowing what a user likes: A design science approach to interfaces that automatically adapt to culture. Mis Quarterly (2013), 427--453."},{"key":"e_1_2_1_68_1","doi-asserted-by":"publisher","DOI":"10.1145\/3411763.3441352"},{"key":"e_1_2_1_69_1","volume-title":"Algorithmic Harms in Child Welfare: Uncertainties in Practice, Organization, and Street-level Decision-Making. ACM Journal on Responsible Computing","author":"Saxena Devansh","year":"2018","unstructured":"Devansh Saxena and Shion Guha. 2018. Algorithmic Harms in Child Welfare: Uncertainties in Practice, Organization, and Street-level Decision-Making. ACM Journal on Responsible Computing (2018)."},{"key":"e_1_2_1_70_1","volume-title":"Casey Randazzo, David Mimno, and Sarita Schoenebeck.","author":"Schroeder Hope","year":"2024","unstructured":"Hope Schroeder, Marianne Aubin Le Qu\u00e9r\u00e9, Casey Randazzo, David Mimno, and Sarita Schoenebeck. 2024. Large language models in qualitative research: Can we do the data justice? arXiv preprint arXiv:2410.07362 (2024)."},{"key":"e_1_2_1_71_1","doi-asserted-by":"publisher","DOI":"10.1145\/3544548.3581512"},{"key":"e_1_2_1_72_1","doi-asserted-by":"publisher","DOI":"10.1145\/3600211.3604673"},{"key":"e_1_2_1_73_1","doi-asserted-by":"publisher","DOI":"10.1145\/3544548.3581010"},{"key":"e_1_2_1_74_1","volume-title":"Qualitative literacy: A guide to evaluating ethnographic and interview research","author":"Small Mario Luis","unstructured":"Mario Luis Small and Jessica McCrory Calarco. 2022. Qualitative literacy: A guide to evaluating ethnographic and interview research. Univ of California Press."},{"key":"e_1_2_1_75_1","doi-asserted-by":"publisher","DOI":"10.1145\/3411764.3445092"},{"key":"e_1_2_1_76_1","doi-asserted-by":"publisher","DOI":"10.1109\/MPRV.2022.3182222"},{"key":"e_1_2_1_77_1","volume-title":"Learning general purpose distributed sentence representations via large scale multi-task learning. arXiv preprint arXiv:1804.00079","author":"Subramanian Sandeep","year":"2018","unstructured":"Sandeep Subramanian, Adam Trischler, Yoshua Bengio, and Christopher J Pal. 2018. Learning general purpose distributed sentence representations via large scale multi-task learning. arXiv preprint arXiv:1804.00079 (2018)."},{"key":"e_1_2_1_78_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP40001.2021.00028"},{"key":"e_1_2_1_79_1","volume-title":"The Dart Center style guide for trauma-informed journalism","author":"Thompson I","year":"2021","unstructured":"I Thompson. 2021. The Dart Center style guide for trauma-informed journalism. Dart Center for Journalism and Trauma. https:\/\/dartcenter. org\/resources\/dart-center-style-guide (2021)."},{"key":"e_1_2_1_80_1","volume-title":"29th USENIX security symposium (USENIX Security 20). 1893--1909.","author":"Tseng Emily","unstructured":"Emily Tseng, Rosanna Bellini, Nora McDonald, Matan Danos, Rachel Greenstadt, Damon McCoy, Nicola Dell, and Thomas Ristenpart. 2020a. The tools and tactics used in intimate partner surveillance: An analysis of online infidelity forums. In 29th USENIX security symposium (USENIX Security 20). 1893--1909."},{"key":"e_1_2_1_81_1","doi-asserted-by":"publisher","DOI":"10.1145\/3411764.3445589"},{"key":"e_1_2_1_82_1","doi-asserted-by":"publisher","DOI":"10.1145\/3313831.3376633"},{"key":"e_1_2_1_83_1","doi-asserted-by":"publisher","DOI":"10.1145\/3491102.3502038"},{"key":"e_1_2_1_84_1","doi-asserted-by":"publisher","DOI":"10.1145\/3313831.3376301"},{"key":"e_1_2_1_85_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11023-019-09513-7"},{"key":"e_1_2_1_86_1","doi-asserted-by":"publisher","DOI":"10.1145\/3613904.3642045"},{"key":"e_1_2_1_87_1","volume-title":"Ways of Knowing in HCI","author":"Zimmerman John","unstructured":"John Zimmerman and Jodi Forlizzi. 2014. Research through design in HCI. In Ways of Knowing in HCI. Springer, 167--189."}],"container-title":["Proceedings of the ACM on Human-Computer Interaction"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3711035","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3711035","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,21]],"date-time":"2025-08-21T00:52:24Z","timestamp":1755737544000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3711035"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,5,2]]},"references-count":87,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2025,5,2]]}},"alternative-id":["10.1145\/3711035"],"URL":"https:\/\/doi.org\/10.1145\/3711035","relation":{},"ISSN":["2573-0142"],"issn-type":[{"value":"2573-0142","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,5,2]]},"assertion":[{"value":"2025-05-02","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}