{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,30]],"date-time":"2026-01-30T04:41:38Z","timestamp":1769748098205,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":41,"publisher":"ACM","funder":[{"DOI":"10.13039\/501100000266","name":"Engineering and Physical Sciences Research Council","doi-asserted-by":"publisher","award":["EP\/S021817\/1"],"award-info":[{"award-number":["EP\/S021817\/1"]}],"id":[{"id":"10.13039\/501100000266","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2025,10,18]]},"DOI":"10.1145\/3715070.3748292","type":"proceedings-article","created":{"date-parts":[[2025,10,17]],"date-time":"2025-10-17T05:55:41Z","timestamp":1760680541000},"page":"138-143","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["Reflexivity &amp; Reflection (R&amp;R) for Sociotechnical Safety: Creating a Space for Collective Learning"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-1609-5257","authenticated-orcid":false,"given":"Jessica","family":"McClearn","sequence":"first","affiliation":[{"name":"Information Security Group, Royal Holloway University of London, London, United Kingdom"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7925-7620","authenticated-orcid":false,"given":"Lucy","family":"Qin","sequence":"additional","affiliation":[{"name":"Georgetown University, Washington D.C., USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1087-1101","authenticated-orcid":false,"given":"Emily","family":"Tseng","sequence":"additional","affiliation":[{"name":"Microsoft Research, New York, USA and University of Washington, Seattle, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2539-0730","authenticated-orcid":false,"given":"Miranda","family":"Wei","sequence":"additional","affiliation":[{"name":"Princeton University, Princeton, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6546-6723","authenticated-orcid":false,"given":"Rikke Bjerg","family":"Jensen","sequence":"additional","affiliation":[{"name":"Information Security Group, Royal Holloway University of London, London, United Kingdom"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0216-5573","authenticated-orcid":false,"given":"Nora","family":"McDonald","sequence":"additional","affiliation":[{"name":"George Mason University, Fairfax, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3930-8128","authenticated-orcid":false,"given":"Elissa M.","family":"Redmiles","sequence":"additional","affiliation":[{"name":"Computer Science, Georgetown University, Washington D.C., USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6049-3965","authenticated-orcid":false,"given":"Morgan Klaus","family":"Scheuerman","sequence":"additional","affiliation":[{"name":"Sony AI, Boulder, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8470-056X","authenticated-orcid":false,"given":"Reem","family":"Talhouk","sequence":"additional","affiliation":[{"name":"School of Design, Northumbria University, Newcastle-upon-Tyne, United Kingdom"}]}],"member":"320","published-online":{"date-parts":[[2025,10,17]]},"reference":[{"key":"e_1_3_3_2_2_2","doi-asserted-by":"publisher","unstructured":"Zainab Agha Karla Badillo-Urquiola and Pamela\u00a0J. Wisniewski. 2023. \"Strike at the Root\": Co-designing Real-Time Social Media Interventions for Adolescent Online Risk Prevention. Proc. ACM Hum.-Comput. Interact. 7 CSCW1 Article 149 (apr 2023) 32\u00a0pages. 10.1145\/3579625","DOI":"10.1145\/3579625"},{"key":"e_1_3_3_2_3_2","doi-asserted-by":"publisher","unstructured":"Rosanna Bellini Emily Tseng Noel Warford Alaa Daffalla Tara Matthews Sunny Consolvo Jill\u00a0Palzkill Woelfer Patrick\u00a0Gage Kelley Michelle\u00a0L. Mazurek Dana Cuomo Nicola Dell and Thomas Ristenpart. 2024. SoK: Safer Digital-Safety Research Involving At-Risk Users. IEEE Computer Society 74\u201374. 10.1109\/SP54263.2024.00071ISSN: 2375-1207.","DOI":"10.1109\/SP54263.2024.00071"},{"key":"e_1_3_3_2_4_2","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSPW55150.2022.00065"},{"key":"e_1_3_3_2_5_2","doi-asserted-by":"crossref","unstructured":"Pernille Bj\u00f8rn and Nina Boulus-R\u00f8dje. 2015. The multiple intersecting sites of design in CSCW research. Computer Supported Cooperative Work (CSCW) 24 (2015) 319\u2013351.","DOI":"10.1007\/s10606-015-9227-4"},{"key":"e_1_3_3_2_6_2","unstructured":"Lynn\u00a0Weber Cannon. 1990. Fostering Positive Race Class and Gender Dynamics in the Classroom. Women\u2019s Studies Quarterly 18 1\/2 (1990) 126\u2013134. jstor:40004032"},{"key":"e_1_3_3_2_7_2","doi-asserted-by":"publisher","unstructured":"Periwinkle Doerfler Andrea Forte Emiliano De\u00a0Cristofaro Gianluca Stringhini Jeremy Blackburn and Damon McCoy. 2021. \"I\u2019m a Professor which isn\u2019t usually a dangerous job\": Internet-facilitated Harassment and Its Impact on Researchers. Proceedings of the ACM on Human-Computer Interaction 5 CSCW2 (Oct. 2021) 341:1\u2013341:32. 10.1145\/3476082","DOI":"10.1145\/3476082"},{"key":"e_1_3_3_2_8_2","unstructured":"Brier Dudley. 2022. Harassment public-records requests bombard UW truth seeker after Jan. 6 hearings cameo. https:\/\/www.seattletimes.com\/opinion\/harassment-public-records-requests-bombard-uw-truth-seeker-after-jan-6-hearings-cameo\/"},{"key":"e_1_3_3_2_9_2","doi-asserted-by":"publisher","unstructured":"Brianna Dym and Casey Fiesler. 2020. Social Norm Vulnerability and its Consequences for Privacy and Safety in an Online Community. Proceedings of the ACM on Human-Computer Interaction 4 CSCW2 (Oct. 2020) 1\u201324. 10.1145\/3415226","DOI":"10.1145\/3415226"},{"key":"e_1_3_3_2_10_2","doi-asserted-by":"publisher","DOI":"10.1145\/3706599.3706747"},{"key":"e_1_3_3_2_11_2","doi-asserted-by":"publisher","DOI":"10.1145\/3491101.3503742"},{"key":"e_1_3_3_2_12_2","doi-asserted-by":"publisher","DOI":"10.1145\/3491101.3503742"},{"key":"e_1_3_3_2_13_2","doi-asserted-by":"publisher","DOI":"10.1145\/3290605.3300799"},{"key":"e_1_3_3_2_14_2","doi-asserted-by":"crossref","unstructured":"Douglas\u00a0E Foley. 2002. Critical ethnography: The reflexive turn. International journal of qualitative studies in education 15 4 (2002) 469\u2013490.","DOI":"10.1080\/09518390210145534"},{"key":"e_1_3_3_2_15_2","first-page":"374","volume-title":"Toward a sociology of education","author":"Freire Paulo","year":"2020","unstructured":"Paulo Freire. 2020. Pedagogy of the oppressed. In Toward a sociology of education. Routledge, 374\u2013386."},{"key":"e_1_3_3_2_16_2","doi-asserted-by":"publisher","unstructured":"J George. 2017. Medical Morbidity and Mortality Conferences: Past Present and Future. Postgraduate Medical Journal 93 1097 (March 2017) 148\u2013152. 10.1136\/postgradmedj-2016-134103","DOI":"10.1136\/postgradmedj-2016-134103"},{"key":"e_1_3_3_2_17_2","doi-asserted-by":"publisher","unstructured":"Oliver\u00a0L. Haimson Justin Buss Zu Weinger Denny\u00a0L. Starks Dykee Gorrell and Briar\u00a0Sweetbriar Baron. 2020. Trans Time: Safety Privacy and Content Warnings on a Transgender-Specific Social Media Site. Proc. ACM Hum.-Comput. Interact. 4 CSCW2 Article 124 (oct 2020) 27\u00a0pages. 10.1145\/3415195","DOI":"10.1145\/3415195"},{"key":"e_1_3_3_2_18_2","unstructured":"Kata Issari. 2024. Lecture notes in SOC 582 Intimate Partner Violence & Trauma."},{"key":"e_1_3_3_2_19_2","unstructured":"Seny Kamara. 2020. Crypto for the People. Invited talk at CRYPTO."},{"key":"e_1_3_3_2_20_2","unstructured":"Tadayoshi Kohno Yasemin Acar and Wulf Loh. 2023. Ethical Frameworks and Computer Security Trolley Problems: Foundations for Conversations."},{"key":"e_1_3_3_2_21_2","doi-asserted-by":"crossref","unstructured":"Sarah Kuhn and Michael\u00a0J Muller. 1993. Participatory design. Commun. ACM 36 6 (1993) 24\u201329.","DOI":"10.1145\/153571.255960"},{"key":"e_1_3_3_2_22_2","doi-asserted-by":"publisher","unstructured":"Smita Kumar and Liz Cavallaro. 2018. Researcher Self-Care in Emotionally Demanding Research: A Proposed Conceptual Framework. Qualitative Health Research 28 4 (March 2018) 648\u2013658. 10.1177\/1049732317746377","DOI":"10.1177\/1049732317746377"},{"key":"e_1_3_3_2_23_2","doi-asserted-by":"publisher","DOI":"10.1145\/3584931.3611294"},{"key":"e_1_3_3_2_24_2","doi-asserted-by":"publisher","DOI":"10.1145\/3678884.3681832"},{"key":"e_1_3_3_2_25_2","doi-asserted-by":"publisher","DOI":"10.1145\/3272973.3273003"},{"key":"e_1_3_3_2_26_2","first-page":"4625","volume-title":"32nd USENIX Security Symposium (USENIX Security 23)","author":"McClearn Jessica","year":"2023","unstructured":"Jessica McClearn, Rikke\u00a0Bjerg Jensen, and Reem Talhouk. 2023. Othered, silenced and scapegoated: understanding the situated security of marginalised populations in Lebanon. In 32nd USENIX Security Symposium (USENIX Security 23). 4625\u20134642."},{"key":"e_1_3_3_2_27_2","doi-asserted-by":"publisher","DOI":"10.1145\/3334480.3375174"},{"key":"e_1_3_3_2_28_2","doi-asserted-by":"publisher","DOI":"10.1145\/3313831.3376167"},{"key":"e_1_3_3_2_29_2","doi-asserted-by":"crossref","unstructured":"Nora McDonald and Andrea Forte. 2021. Powerful privacy norms in social network discourse. Proceedings of the ACM on Human-Computer Interaction 5 CSCW2 (2021) 1\u201327.","DOI":"10.1145\/3479565"},{"key":"e_1_3_3_2_30_2","doi-asserted-by":"publisher","DOI":"10.1145\/2470654.2466248"},{"key":"e_1_3_3_2_31_2","doi-asserted-by":"crossref","unstructured":"Jay\u00a0D. Orlander Thomas\u00a0W. Barber and B.\u00a0Graeme Fincke. 2002. The Morbidity and Mortality Conference: The Delicate Nature of Learning from Error. Academic Medicine 77 10 (Oct. 2002) 1001.","DOI":"10.1097\/00001888-200210000-00011"},{"key":"e_1_3_3_2_32_2","doi-asserted-by":"publisher","unstructured":"Morgan\u00a0Klaus Scheuerman Stacy\u00a0M. Branham and Foad Hamidi. 2018. Safe Spaces and Safe Places: Unpacking Technology-Mediated Experiences of Safety and Harm with Transgender People. Proceedings of the ACM on Human-Computer Interaction 2 CSCW (Nov. 2018) 1\u201327. 10.1145\/3274424","DOI":"10.1145\/3274424"},{"key":"e_1_3_3_2_33_2","doi-asserted-by":"publisher","unstructured":"Morgan\u00a0Klaus Scheuerman Alex Hanna and Emily Denton. 2021. Do Datasets Have Politics? Disciplinary Values in Computer Vision Dataset Development. Proceedings of the ACM on Human-Computer Interaction 5 CSCW2 (Oct. 2021) 317:1\u2013317:37. 10.1145\/3476058","DOI":"10.1145\/3476058"},{"key":"e_1_3_3_2_34_2","doi-asserted-by":"publisher","unstructured":"Morgan\u00a0Klaus Scheuerman Kandrea Wade Caitlin Lustig and Jed\u00a0R. Brubaker. 2020. How We\u2019ve Taught Algorithms to See Identity: Constructing Race and Gender in Image Databases for Facial Analysis. Proceedings of the ACM on Human-Computer Interaction 4 (May 2020) 58:1\u201358:35. 10.1145\/3392866","DOI":"10.1145\/3392866"},{"key":"e_1_3_3_2_35_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-23315-9_20"},{"key":"e_1_3_3_2_36_2","doi-asserted-by":"crossref","unstructured":"Reem Talhouk Lizzie Coles-Kemp Rikke\u00a0Bjerg Jensen Madeline Balaam Andrew Garbett Hala Ghattas Vera Araujo-Soares Balsam Ahmad and Kyle Montague. 2020. Food aid technology: the experience of a Syrian refugee community in coping with food insecurity. Proceedings of the ACM on Human-Computer Interaction 4 CSCW2 (2020) 1\u201325.","DOI":"10.1145\/3415205"},{"key":"e_1_3_3_2_37_2","doi-asserted-by":"publisher","DOI":"10.1145\/3584931.3611285"},{"key":"e_1_3_3_2_38_2","doi-asserted-by":"publisher","unstructured":"Emily Tseng Rosanna Bellini Yeuk-Yu Lee Alana Ramjit Thomas Ristenpart and Nicola Dell. 2024. Data Stewardship in Clinical Computer Security: Balancing Benefit and Burden in Participatory Systems. Proc. ACM Hum.-Comput. Interact. 8 CSCW1 Article 39 (apr 2024) 29\u00a0pages. 10.1145\/3637316","DOI":"10.1145\/3637316"},{"key":"e_1_3_3_2_39_2","doi-asserted-by":"publisher","DOI":"10.1145\/3678884.3681824"},{"key":"e_1_3_3_2_40_2","doi-asserted-by":"publisher","DOI":"10.1109\/SP46214.2022.9833643"},{"key":"e_1_3_3_2_41_2","volume-title":"USENIX Security Symposium","author":"Wei Miranda","year":"2024","unstructured":"Miranda Wei, Jaron Mink, Yael Eiger, Tadayoshi Kohno, Elissa\u00a0M. Redmiles, and Franziska Roesner. 2024. SoK (or SoLK?): On the Quantitative Study of Sociodemographic Factors and Computer Security Behaviors. In USENIX Security Symposium. USENIX, Philadelphia, PA, USA."},{"key":"e_1_3_3_2_42_2","doi-asserted-by":"publisher","DOI":"10.1145\/3678884.3687147"}],"event":{"name":"CSCW Companion '25: Companion of the Computer-Supported Cooperative Work and Social Computing","location":"Bergen Norway","acronym":"CSCW Companion '25","sponsor":["SIGCHI ACM Special Interest Group on Computer-Human Interaction"]},"container-title":["Companion Publication of the 2025 Conference on Computer-Supported Cooperative Work and Social Computing"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3715070.3748292","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,1,9]],"date-time":"2026-01-09T17:47:59Z","timestamp":1767980879000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3715070.3748292"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,10,17]]},"references-count":41,"alternative-id":["10.1145\/3715070.3748292","10.1145\/3715070"],"URL":"https:\/\/doi.org\/10.1145\/3715070.3748292","relation":{},"subject":[],"published":{"date-parts":[[2025,10,17]]},"assertion":[{"value":"2025-10-17","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}