{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,17]],"date-time":"2025-10-17T02:10:57Z","timestamp":1760667057142,"version":"build-2065373602"},"reference-count":119,"publisher":"Association for Computing Machinery (ACM)","issue":"7","license":[{"start":{"date-parts":[[2025,10,16]],"date-time":"2025-10-16T00:00:00Z","timestamp":1760572800000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["IIS-1910202, DGE-2234667"],"award-info":[{"award-number":["IIS-1910202, DGE-2234667"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100000038","name":"Natural Sciences and Engineering Research Council of Canada","doi-asserted-by":"publisher","award":["RGPIN-2022-04595"],"award-info":[{"award-number":["RGPIN-2022-04595"]}],"id":[{"id":"10.13039\/501100000038","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["Proc. ACM Hum.-Comput. Interact."],"published-print":{"date-parts":[[2025,10,18]]},"abstract":"<jats:p>Decentralized social media protocols enable users in independent, user-hosted servers (i.e., instances) to interact with each other while they self-govern. This community-based model of social media governance opens up new opportunities for tailored decision-making about information flows - i.e., what user data is shared to whom and when - and in turn, for protecting user privacy. To better understand how community governance shapes privacy expectations on decentralized social media, we conducted a semi-structured interview with 23 users of the Fediverse, a decentralized social media network. Our findings illustrate important factors that shape a community's understandings of information flows, such as rules and proactive efforts from admins who are perceived as trustworthy. We highlight ''governance frictions'' between communities that raise new privacy risks due to incompatibilities in values, security practices, and software. Our findings point to the unique challenges of decentralized social media, suggest design opportunities to address frictions, and outline the role of participatory decision-making to realize the full potential of decentralization.<\/jats:p>","DOI":"10.1145\/3757516","type":"journal-article","created":{"date-parts":[[2025,10,16]],"date-time":"2025-10-16T16:59:10Z","timestamp":1760633950000},"page":"1-26","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Trust and Friction: Negotiating How Information Flows through Decentralized Social Media"],"prefix":"10.1145","volume":"9","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-8415-7395","authenticated-orcid":false,"given":"Sohyeon","family":"Hwang","sequence":"first","affiliation":[{"name":"Princeton University, Princeton, NJ, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0597-6657","authenticated-orcid":false,"given":"Priyanka","family":"Nanayakkara","sequence":"additional","affiliation":[{"name":"Harvard University, Cambridge, MA, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5954-916X","authenticated-orcid":false,"given":"Yan","family":"Shvartzshnaider","sequence":"additional","affiliation":[{"name":"York University, Toronto, ON, Canada"}]}],"member":"320","published-online":{"date-parts":[[2025,10,16]]},"reference":[{"key":"e_1_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/3359237"},{"key":"e_1_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1468-2885.1998.tb00226.x"},{"key":"e_1_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1017\/S0003055418000163"},{"key":"e_1_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/3290605.3300497"},{"key":"e_1_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/2207676.2207727"},{"volume-title":"Privacy, Big Data, and the Public Good,","author":"Barocas Solon","key":"e_1_2_1_6_1","unstructured":"Solon Barocas and Helen Nissenbaum. 2014. Big Data's End Run around Anonymity and Consent. In Privacy, Big Data, and the Public Good, , Julia Lane, Victoria Stodden, Stefan Bender, and Helen Nissenbaum (Eds.). Cambridge University Press, New York NY."},{"key":"e_1_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/2470654.2470658"},{"key":"e_1_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/2702123.2702410"},{"key":"e_1_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/3134659"},{"key":"e_1_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/2858036.2858342"},{"key":"e_1_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/968464.968470"},{"key":"e_1_2_1_12_1","unstructured":"Hannah Bloch-Wehba. 2021. Content Moderation as Surveillance."},{"key":"e_1_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1515\/popets-2016-0038"},{"key":"e_1_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/2998181.2998305"},{"key":"e_1_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1191\/1478088706qp063oa"},{"key":"e_1_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/1125451.1125579"},{"key":"e_1_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/1518701.1518847"},{"key":"e_1_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2010.84"},{"key":"e_1_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/3274301"},{"key":"e_1_2_1_20_1","volume-title":"Practical Guide through Qualitative Analysis","author":"Charmaz Kathy","year":"2006","unstructured":"Kathy Charmaz. 2015. Constructing Grounded Theory: A, Practical Guide through Qualitative Analysis (2nd ed.). SAGE, Thousand Oaks, California. H61.24.C45 2006","edition":"2"},{"key":"e_1_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/3686945"},{"volume-title":"in Social, and Communications Applications, . Thesis","author":"Cobb Camille","key":"e_1_2_1_22_1","unstructured":"Camille Cobb. 2019. User-to-User Privacy, in Social, and Communications Applications, . Thesis. University of Washington."},{"key":"e_1_2_1_23_1","unstructured":"Cindy Cohn and Rory Mir. 2022. The Fediverse Could Be Awesome (If We Don't Screw It up)."},{"key":"e_1_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1609\/icwsm.v18i1.31316"},{"volume-title":"Basics of Qualitative Research: Techniques, and Procedures for Developing Grounded Theory","author":"Corbin Juliet","key":"e_1_2_1_25_1","unstructured":"Juliet Corbin and Anselm Strauss. 2015. Basics of Qualitative Research: Techniques, and Procedures for Developing Grounded Theory (fourth edition ed.). SAGE Publications, Inc, Los Angeles, CA."},{"key":"e_1_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSEC.2021.3093135"},{"key":"e_1_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1609\/icwsm.v8i1.14526"},{"key":"e_1_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2014.03.010"},{"key":"e_1_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/3274313"},{"key":"e_1_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/3392881"},{"key":"e_1_2_1_31_1","doi-asserted-by":"publisher","unstructured":"Evelyn Douek. 2022. Content Moderation as Systems Thinking. doi:10.2139\/ssrn.4005326","DOI":"10.2139\/ssrn.4005326"},{"key":"e_1_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/3272973.3274089"},{"key":"e_1_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1609\/icwsm.v12i1.15033"},{"volume-title":"Online Communities and Big Data","author":"Foote Jeremy","key":"e_1_2_1_34_1","unstructured":"Jeremy Foote and Sohyeon Hwang. 2023. Online Communities and Big Data. In Group Communication, : An Advanced Introduction, , Torsten Reimer, Ernest S Park, and Joseph A. Bonito (Eds.). Routledge, New York, NY."},{"key":"e_1_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/2998181.2998273"},{"key":"e_1_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.15346\/hc.v4i1.5"},{"key":"e_1_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.46743\/2160-3715\/2015.2281"},{"key":"e_1_2_1_38_1","unstructured":"Robert W. Gehl. 2023. ActivityPub the Non-Standard Standard ."},{"key":"e_1_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1080\/1369118X.2022.2147400"},{"key":"e_1_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1080\/1369118X.2016.1153700"},{"key":"e_1_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1080\/24701475.2021.2015967"},{"key":"e_1_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1080\/1369118X.2011.642401"},{"key":"e_1_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1145\/3173574.3173688"},{"key":"e_1_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1145\/3415195"},{"key":"e_1_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijhcs.2020.102498"},{"key":"e_1_2_1_46_1","first-page":"1","article-title":"The Onion Router, : Understanding, a Privacy Enhancing Technology Community. In Proceedings of the 79th ASIS, &T Annual Meeting, : Creating Knowledge, Enhancing Lives Through Information, & Technology, (ASIST, '16). American Society for Information Science, Silver Springs","volume":"34","author":"Huang Hsiao Ying","year":"2016","unstructured":"Hsiao Ying Huang and Masooda Bashir. 2016. The Onion Router, : Understanding, a Privacy Enhancing Technology Community. In Proceedings of the 79th ASIS, &T Annual Meeting, : Creating Knowledge, Enhancing Lives Through Information, & Technology, (ASIST, '16). American Society for Information Science, Silver Springs, MD, USA, 34:1-34:5.","journal-title":"MD, USA"},{"key":"e_1_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1145\/3653707"},{"key":"e_1_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1145\/3544548.3580773"},{"key":"e_1_2_1_49_1","doi-asserted-by":"publisher","unstructured":"L. Irani. 2023. Algorithms of Suspicion: Authentication and Distrust on the Amazon Mechanical Turk Platform. doi:10.2139\/ssrn.4482508","DOI":"10.2139\/ssrn.4482508"},{"key":"e_1_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1177\/20563051231207857"},{"key":"e_1_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1145\/2470654.2481368"},{"key":"e_1_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.5210\/spir.v2023i0.13525"},{"key":"e_1_2_1_53_1","volume-title":"Blackness in the Fediverse, : A Conversation, with Marcia X, . Logic(s) Magazine, 20 (Dec","author":"I'Nasah Kiam Ra'il","year":"2023","unstructured":"Ra'il I'Nasah Kiam. 2023. Blackness in the Fediverse, : A Conversation, with Marcia X, . Logic(s) Magazine, 20 (Dec. 2023)."},{"key":"e_1_2_1_54_1","unstructured":"Charles Kiene. 2024. Identity Legitimacy and Voice : Understanding Rule Adoption Compliance and Evolution in Online Communities. Ph.D. Dissertation. University of Washington Seattle WA USA."},{"volume-title":"Building Successful Online Communities, : Evidence-Based Social Design, , Robert E","author":"Kiesler Sara E.","key":"e_1_2_1_55_1","unstructured":"Sara E. Kiesler, Robert E. Kraut, Paul Resnick, and Aniket Kittur. 2012. Regulating Behavior in Online Communities. In Building Successful Online Communities, : Evidence-Based Social Design, , Robert E. Kraut and Paul Resnick (Eds.). MIT Press, Cambridge, MA."},{"key":"e_1_2_1_56_1","volume-title":"Kraut and Paul Resnick","author":"Robert","year":"2012","unstructured":"Robert E. Kraut and Paul Resnick. 2012. Building Successful Online Communities, : Evidence-based Social Design, . MIT Press, Cambridge, MA. HM742. K73 2011"},{"key":"e_1_2_1_57_1","doi-asserted-by":"publisher","DOI":"10.1145\/3653710"},{"key":"e_1_2_1_58_1","doi-asserted-by":"publisher","DOI":"10.1145\/3178876.3186141"},{"key":"e_1_2_1_59_1","doi-asserted-by":"publisher","DOI":"10.1145\/3555625"},{"key":"e_1_2_1_60_1","doi-asserted-by":"publisher","DOI":"10.1609\/icwsm.v16i1.19317"},{"key":"e_1_2_1_61_1","doi-asserted-by":"publisher","DOI":"10.1145\/3593013.3594070"},{"key":"e_1_2_1_62_1","doi-asserted-by":"publisher","DOI":"10.1177\/2056305116633482"},{"volume-title":"The Eternal Network: The Ends and Becomings of Network Culture","author":"Mansoux Aymeric","key":"e_1_2_1_63_1","unstructured":"Aymeric Mansoux and Roel Rocsam Abbing. 2020. Seven Theses on the Fediverse and the Becoming of Floss. In The Eternal Network: The Ends and Becomings of Network Culture, Kristoffer Gansing and Inga Luchs (Eds.). Institute of Network Cultures and transmediale e.V."},{"key":"e_1_2_1_64_1","doi-asserted-by":"publisher","DOI":"10.1509\/jppm.14.139"},{"key":"e_1_2_1_65_1","doi-asserted-by":"publisher","DOI":"10.1177\/1461444810365313"},{"key":"e_1_2_1_66_1","doi-asserted-by":"publisher","DOI":"10.1177\/1461444814543995"},{"key":"e_1_2_1_67_1","doi-asserted-by":"publisher","DOI":"10.1073\/pnas.1813486116"},{"key":"e_1_2_1_68_1","doi-asserted-by":"publisher","DOI":"10.1145\/3589960"},{"key":"e_1_2_1_69_1","doi-asserted-by":"publisher","DOI":"10.1145\/3313831.3376167"},{"key":"e_1_2_1_70_1","doi-asserted-by":"publisher","DOI":"10.1145\/3479565"},{"key":"e_1_2_1_71_1","doi-asserted-by":"publisher","DOI":"10.1145\/3290605.3300901"},{"key":"e_1_2_1_72_1","doi-asserted-by":"publisher","DOI":"10.1145\/2441776.2441871"},{"key":"e_1_2_1_73_1","volume-title":"Domestic Abuse Survivors Go, 'Underground, ' With, the Tor Network, . AdWeek (May","author":"Morrison Kimberlee","year":"2014","unstructured":"Kimberlee Morrison. 2014. Domestic Abuse Survivors Go, 'Underground, ' With, the Tor Network, . AdWeek (May 2014)."},{"key":"e_1_2_1_74_1","first-page":"989","article-title":"Bridging the Gap, between Privacy, and Design","volume":"14","author":"Mulligan Deirdre K.","year":"2011","unstructured":"Deirdre K. Mulligan and Jennifer King. 2011. Bridging the Gap, between Privacy, and Design, . University of Pennsylvania Journal of Constitutional Law, Vol. 14 (2011), 989.","journal-title":"University of Pennsylvania Journal of Constitutional Law"},{"key":"e_1_2_1_75_1","doi-asserted-by":"publisher","DOI":"10.1145\/2998181.2998307"},{"key":"e_1_2_1_76_1","doi-asserted-by":"publisher","DOI":"10.1515\/9780804772891"},{"volume-title":"Social Dimensions, of Privacy, : Interdisciplinary Perspectives,","author":"Nissenbaum Helen","key":"e_1_2_1_77_1","unstructured":"Helen Nissenbaum. 2015. Respect for Context as a Benchmark for Privacy Online: What, It Is and Isn't. In Social Dimensions, of Privacy, : Interdisciplinary Perspectives, , Beate Roessler and Dorota Mokrosinska (Eds.). Cambridge University Press, Cambridge, UK."},{"key":"e_1_2_1_78_1","doi-asserted-by":"publisher","DOI":"10.1080\/1369118X.2018.1486870"},{"key":"e_1_2_1_79_1","first-page":"i","article-title":"Have We No Decency, Section, 230 and the Liability, of Social Media Companies, for Deepfake Videos Notes","volume":"2021","author":"O'Donnell Nicholas","year":"2021","unstructured":"Nicholas O'Donnell. 2021. Have We No Decency, Section, 230 and the Liability, of Social Media Companies, for Deepfake Videos Notes, . University of Illinois Law Review, Vol. 2021, 2 (2021), i-740.","journal-title":"University of Illinois Law Review"},{"key":"e_1_2_1_80_1","doi-asserted-by":"publisher","DOI":"10.1086\/228313"},{"key":"e_1_2_1_81_1","doi-asserted-by":"publisher","DOI":"10.1145\/642611.642635"},{"volume-title":"Boundaries of Privacy, : Dialectics, of Disclosure","author":"Petronio Sandra","key":"e_1_2_1_82_1","unstructured":"Sandra Petronio. 2002. Boundaries of Privacy, : Dialectics, of Disclosure, . SUNY Press, Albany, NY."},{"key":"e_1_2_1_83_1","unstructured":"Pincus. 2024. Ah Lemmy : Racism and Denial in the Threadiverse (DRAFT ). https:\/\/privacy.thenexus.today\/racism-and-denial-in-the-threadiverse\/."},{"key":"e_1_2_1_84_1","doi-asserted-by":"publisher","DOI":"10.1145\/3173574.3173626"},{"key":"e_1_2_1_85_1","doi-asserted-by":"publisher","DOI":"10.1145\/3555556"},{"key":"e_1_2_1_86_1","doi-asserted-by":"publisher","unstructured":"Sarah Scheffler and Jonathan Mayer. 2023. SoK : Content Moderation for End-to-End Encryption . arXiv:2303.03979 [cs] doi:10.48550\/arXiv.2303.03979","DOI":"10.48550\/arXiv.2303.03979"},{"key":"e_1_2_1_87_1","doi-asserted-by":"publisher","DOI":"10.1145\/3274424"},{"key":"e_1_2_1_88_1","doi-asserted-by":"publisher","DOI":"10.1177\/1461444820986553"},{"volume-title":"Democratic Design, for Online Life","author":"Schneider Nathan","key":"e_1_2_1_89_1","unstructured":"Nathan Schneider. 2024. Governable Spaces, : Democratic Design, for Online Life, . University of California Press, Oakland, CA."},{"key":"e_1_2_1_90_1","doi-asserted-by":"publisher","DOI":"10.1145\/3449090"},{"key":"e_1_2_1_91_1","first-page":"555","volume-title":"Proceedings of the 7th International Conference on Weblogs and Social Media, ICWSM 2013","volume":"7","author":"Schoenebeck Sarita Yardi","year":"2013","unstructured":"Sarita Yardi Schoenebeck. 2013. The Secret Life, of Online Moms, : Anonymity, and Disinhibition, on Youbemom. Com, . Proceedings of the 7th International Conference on Weblogs and Social Media, ICWSM 2013, Vol. 7, 1 (2013), 555-562."},{"key":"e_1_2_1_92_1","volume-title":"Najmin Ahmed","author":"Sch\u00f6pke-Gonzalez Angela M.","year":"2022","unstructured":"Angela M. Sch\u00f6pke-Gonzalez, Shubham Atreja, Han Na Shin, Najmin Ahmed, and Libby Hemphill. 2022. Why Do Volunteer Content Moderators Quit? Burnout, Conflict, and Harmful Behaviors - Angela M. Sch\u00f6pke-Gonzalez, Shubham Atreja, Han Na Shin, Najmin Ahmed, Libby Hemphill, 2022. New Media & Society, Vol. 0(0) (Dec. 2022), 25."},{"key":"e_1_2_1_93_1","doi-asserted-by":"publisher","DOI":"10.1145\/3415178"},{"key":"e_1_2_1_94_1","doi-asserted-by":"publisher","DOI":"10.1145\/3544548.3581331"},{"key":"e_1_2_1_95_1","doi-asserted-by":"publisher","unstructured":"Yan Shvartzshnaider Noah Apthorpe Nick Feamster and Helen Nissenbaum. 2018. Analyzing Privacy Policies Using Contextual Integrity Annotations. arXiv:1809.02236 [cs] doi:10.48550\/arXiv.1809.02236","DOI":"10.48550\/arXiv.1809.02236"},{"key":"e_1_2_1_96_1","doi-asserted-by":"publisher","DOI":"10.1002\/asi.24633"},{"volume-title":"Social Dimensions, of Privacy, : Interdisciplinary Perspectives,","author":"Solove Daniel","key":"e_1_2_1_97_1","unstructured":"Daniel Solove, J. 2015. The Meaning and Value of Privacy. In Social Dimensions, of Privacy, : Interdisciplinary Perspectives, , Beate Roessler and Dorota Mokrosinska (Eds.). Cambridge University Press, Cambridge, UK."},{"key":"e_1_2_1_98_1","doi-asserted-by":"publisher","DOI":"10.1111\/1468-2451.00106"},{"key":"e_1_2_1_99_1","doi-asserted-by":"publisher","DOI":"10.1089\/1094931041291295"},{"key":"e_1_2_1_100_1","doi-asserted-by":"publisher","DOI":"10.1145\/3512908"},{"key":"e_1_2_1_101_1","doi-asserted-by":"publisher","DOI":"10.56553\/popets-2024-0138"},{"key":"e_1_2_1_102_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP40000.2020.00053"},{"key":"e_1_2_1_103_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2019.08.022"},{"key":"e_1_2_1_104_1","doi-asserted-by":"publisher","DOI":"10.1177\/1461444819890353"},{"key":"e_1_2_1_105_1","doi-asserted-by":"publisher","DOI":"10.1007\/BF00988249"},{"key":"e_1_2_1_106_1","first-page":"573","article-title":"A Relational Theory, of Data Governance","volume":"131","author":"Viljoen Salome","year":"2021","unstructured":"Salome Viljoen. 2021. A Relational Theory, of Data Governance, . Yale Law Journal, Vol. 131 (2021), 573.","journal-title":"Yale Law Journal"},{"key":"e_1_2_1_107_1","doi-asserted-by":"publisher","DOI":"10.1145\/3442188.3445885"},{"key":"e_1_2_1_108_1","doi-asserted-by":"publisher","DOI":"10.1080\/08838151.2012.732140"},{"key":"e_1_2_1_109_1","first-page":"0","article-title":"Balancing Audience, and Privacy Tensions, on Social Network Sites, : Strategies, of Highly Engaged Users","volume":"9","author":"Vitak Jessica","year":"2015","unstructured":"Jessica Vitak, Stacy Blasiola, Sameer Patil, and Eden Litt. 2015. Balancing Audience, and Privacy Tensions, on Social Network Sites, : Strategies, of Highly Engaged Users, . International Journal of Communication, Vol. 9, 0 (May 2015), 20.","journal-title":"International Journal of Communication"},{"key":"e_1_2_1_110_1","doi-asserted-by":"publisher","unstructured":"Xinyu Wang Sai Koneru and Sarah Rajtmajer. 2024. The Failed Migration of Academic Twitter . arXiv:2406.04005 [cs] doi:10.48550\/arXiv.2406.04005","DOI":"10.48550\/arXiv.2406.04005"},{"key":"e_1_2_1_111_1","doi-asserted-by":"publisher","DOI":"10.1145\/2818048.2820010"},{"key":"e_1_2_1_112_1","doi-asserted-by":"publisher","DOI":"10.1145\/3610071"},{"key":"e_1_2_1_113_1","volume-title":"Values, Consensus, and Conflict across Thousands of Subreddits. arXiv:2111.05835 [cs]","author":"Weld Galen","year":"2021","unstructured":"Galen Weld, Amy X. Zhang, and Tim Althoff. 2021. What Makes Online Communities 'Better'? Measuring, Values, Consensus, and Conflict across Thousands of Subreddits. arXiv:2111.05835 [cs], Vol. 16 (Nov. 2021), 1121-1132. arXiv:2111.05835 [cs]"},{"key":"e_1_2_1_114_1","doi-asserted-by":"publisher","DOI":"10.1145\/2675133.2675256"},{"key":"e_1_2_1_115_1","doi-asserted-by":"publisher","DOI":"10.1145\/3491102.3517467"},{"key":"e_1_2_1_116_1","doi-asserted-by":"publisher","DOI":"10.1145\/3313831.3376424"},{"key":"e_1_2_1_117_1","doi-asserted-by":"publisher","DOI":"10.1145\/3379337.3415858"},{"key":"e_1_2_1_118_1","doi-asserted-by":"publisher","DOI":"10.1145\/3687059"},{"volume-title":"The Age, of Surveillance","author":"Zuboff Shoshana","key":"e_1_2_1_119_1","unstructured":"Shoshana Zuboff. 2019. The Age, of Surveillance, Capitalism: The Fight for a Human Future at the New Frontier of Power. Public Affairs, New York."}],"container-title":["Proceedings of the ACM on Human-Computer Interaction"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3757516","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3757516","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,17]],"date-time":"2025-10-17T01:57:49Z","timestamp":1760666269000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3757516"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,10,16]]},"references-count":119,"journal-issue":{"issue":"7","published-print":{"date-parts":[[2025,10,18]]}},"alternative-id":["10.1145\/3757516"],"URL":"https:\/\/doi.org\/10.1145\/3757516","relation":{},"ISSN":["2573-0142"],"issn-type":[{"type":"electronic","value":"2573-0142"}],"subject":[],"published":{"date-parts":[[2025,10,16]]},"assertion":[{"value":"2025-10-16","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}