{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,4]],"date-time":"2026-05-04T23:26:37Z","timestamp":1777937197719,"version":"3.51.4"},"reference-count":70,"publisher":"SAGE Publications","issue":"11","license":[{"start":{"date-parts":[[2023,2,1]],"date-time":"2023-02-01T00:00:00Z","timestamp":1675209600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/journals.sagepub.com\/page\/policies\/text-and-data-mining-license"}],"funder":[{"name":"Australian Research Council Centre of Excellence for Automated DecisionMaking and Society","award":["CE200100005"],"award-info":[{"award-number":["CE200100005"]}]},{"DOI":"10.13039\/100019827","name":"Meta","doi-asserted-by":"publisher","award":["Content Governance Grant"],"award-info":[{"award-number":["Content Governance Grant"]}],"id":[{"id":"10.13039\/100019827","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["journals.sagepub.com"],"crossmark-restriction":true},"short-container-title":["New Media &amp; Society"],"published-print":{"date-parts":[[2024,11]]},"abstract":"<jats:p>As social media platforms adapt their rules to limit the presence, spread, and amplification of harmful content on their services, users develop strategies to circumvent content moderation policies. To better understand cultures of content moderation circumvention, including the types of rules that Facebook users seek to circumvent, we analysed a sample of YouTube videos and Reddit threads in which users discuss content moderation circumvention. We show how Facebook users turn to others across platforms to obtain information about circumvention methods. We observe that these users often discuss overcoming Facebook\u2019s content moderation policies in terms that downplay the significance of their intended actions. We suggest that where Facebook\u2019s policies and enforcement measures fail to deter rule violations that may facilitate harm, Facebook should consider new culture-driven approaches to platform governance that foster prosocial environments and engender compliance with platform rules.<\/jats:p>","DOI":"10.1177\/14614448221147661","type":"journal-article","created":{"date-parts":[[2023,2,1]],"date-time":"2023-02-01T03:46:33Z","timestamp":1675223193000},"page":"6183-6204","update-policy":"https:\/\/doi.org\/10.1177\/sage-journals-update-policy","source":"Crossref","is-referenced-by-count":4,"title":["\u2018Just a little hack\u2019: Investigating cultures of content moderation circumvention by Facebook users"],"prefix":"10.1177","volume":"26","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-1437-8050","authenticated-orcid":false,"given":"Rosalie","family":"Gillett","sequence":"first","affiliation":[{"name":"Queensland University of Technology, Australia"}]},{"given":"Joanne E.","family":"Gray","sequence":"additional","affiliation":[{"name":"The University of Sydney, Australia"}]},{"given":"D. Bondy","family":"Valdovinos Kaye","sequence":"additional","affiliation":[{"name":"University of Leeds, UK"}]}],"member":"179","published-online":{"date-parts":[[2023,2,1]]},"reference":[{"key":"bibr1-14614448221147661","volume-title":"Detection of sockpuppet accounts on Reddit","author":"Adhikari S","year":"2020"},{"key":"bibr2-14614448221147661","doi-asserted-by":"publisher","DOI":"10.1215\/9780822373377"},{"key":"bibr3-14614448221147661","doi-asserted-by":"publisher","DOI":"10.1080\/13645579.2013.774186"},{"key":"bibr4-14614448221147661","doi-asserted-by":"publisher","DOI":"10.1080\/14680777.2021.1928259."},{"key":"bibr5-14614448221147661","unstructured":"Azelmat M (2021) Can social media platforms tackle online violence without structural change? GenderIT.org. Available at: https:\/\/genderit.org\/es\/node\/5511 (accessed 24 June 2022)."},{"key":"bibr6-14614448221147661","volume-title":"On Crimes and Punishments","author":"Beccaria C","year":"2009","edition":"5"},{"key":"bibr7-14614448221147661","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-41421-4_7"},{"key":"bibr8-14614448221147661","unstructured":"boyd d (2011) \u2018Real names\u2019 policies are an abuse of power. In: danah boyd \u2013 apophenia. Available at: https:\/\/www.zephoria.org\/thoughts\/archives\/2011\/08\/04\/real-names.html (accessed 10 March 2022)."},{"key":"bibr9-14614448221147661","doi-asserted-by":"publisher","DOI":"10.1002\/cl2.1051"},{"key":"bibr10-14614448221147661","volume-title":"Constructing Grounded Theory","author":"Charmaz K","year":"2006","edition":"2"},{"key":"bibr11-14614448221147661","doi-asserted-by":"publisher","DOI":"10.1080\/1369118X.2021.1994624."},{"key":"bibr12-14614448221147661","unstructured":"Department for Digital, Culture, Media & Sport (2022) Policy paper online safety bill: factsheet. Available at: https:\/\/www.gov.uk\/government\/publications\/online-safety-bill-supporting-documents\/online-safety-bill-factsheet (accessed 10 September, 2022)."},{"key":"bibr13-14614448221147661","first-page":"206","volume":"38","author":"Dootson P","year":"2015","journal-title":"University of New South Wales Law Journal"},{"key":"bibr14-14614448221147661","doi-asserted-by":"publisher","DOI":"10.2139\/ssrn.4005326."},{"key":"bibr15-14614448221147661","doi-asserted-by":"publisher","DOI":"10.1145\/3392845"},{"key":"bibr16-14614448221147661","doi-asserted-by":"publisher","DOI":"10.1386\/jdmp.10.1.33_1"},{"key":"bibr17-14614448221147661","doi-asserted-by":"publisher","DOI":"10.1177\/1461444818776611"},{"key":"bibr18-14614448221147661","volume-title":"Custodians of the Internet: Platforms, Content Moderation, and the Hidden Decisions That Shape Social Media","author":"Gillespie T","year":"2018"},{"issue":"6","key":"bibr19-14614448221147661","volume":"27","author":"Gillett R","year":"2022","journal-title":"First Monday"},{"key":"bibr20-14614448221147661","doi-asserted-by":"publisher","DOI":"10.1177\/2053951719897945"},{"issue":"3","key":"bibr21-14614448221147661","first-page":"1","volume":"7","author":"Graham T","year":"2021","journal-title":"Social Media & Society"},{"key":"bibr22-14614448221147661","doi-asserted-by":"publisher","DOI":"10.1093\/oso\/9780190072070.001.0001"},{"issue":"1","key":"bibr23-14614448221147661","first-page":"7","author":"Gray JE","year":"2020","journal-title":"Big Data & Society"},{"key":"bibr24-14614448221147661","doi-asserted-by":"publisher","DOI":"10.2139\/ssrn.4007098."},{"key":"bibr25-14614448221147661","doi-asserted-by":"publisher","DOI":"10.1145\/3479610"},{"key":"bibr26-14614448221147661","unstructured":"Han E (2021) Advancing our approach to user safety. TikTok Newsroom, July 9. Available at: https:\/\/newsroom.tiktok.com\/en-us\/advancing-our-approach-to-user-safety (accessed 17 November 2021)."},{"key":"bibr27-14614448221147661","unstructured":"Hasinoff A, Gibson AD, Salehi N (2020) The promise of restorative justice in addressing online harm. Brookings, July 27. Available at: https:\/\/www.brookings.edu\/techstream\/the-promise-of-restorative-justice-in-addressing-online-harm\/ (accessed 24 January 2022)."},{"key":"bibr28-14614448221147661","unstructured":"Hazen TJ, Olteanu A, Kazai G, et al. (2020) On the social and technical challenges of web search autosuggestion moderation. Available at: https:\/\/arxiv.org\/abs\/2007.05039v1 (accessed 9 October 2020)."},{"key":"bibr29-14614448221147661","unstructured":"Heller B (2019) Combating terrorist-related content through AI and information sharing. In: One in a series of working papers from the transatlantic high level working group on content moderation online and freedom of expression. Available at: https:\/\/www.ivir.nl\/publicaties\/download\/Hash_sharing_Heller_April_2019.pdf"},{"key":"bibr30-14614448221147661","doi-asserted-by":"publisher","DOI":"10.1609\/icwsm.v9i1.14637"},{"key":"bibr31-14614448221147661","author":"Hollister S","year":"2021","journal-title":"The Verge"},{"issue":"1","key":"bibr32-14614448221147661","first-page":"67","volume":"28","author":"Jackler RK","year":"2018","journal-title":"Tobacco Control"},{"key":"bibr33-14614448221147661","doi-asserted-by":"publisher","DOI":"10.1080\/10304312.2016.1166560"},{"key":"bibr34-14614448221147661","volume-title":"Identifying opportunities to improve content moderation","author":"Jhaver S","year":"2020"},{"key":"bibr35-14614448221147661","doi-asserted-by":"publisher","DOI":"10.1177\/0269758020970414"},{"issue":"4","key":"bibr36-14614448221147661","first-page":"502","volume":"13","author":"Konikoff D","year":"2021","journal-title":"Policy & Internet"},{"key":"bibr37-14614448221147661","unstructured":"Leathern R, Chang B (2017) Addressing cloaking so people see more authentic posts. Facebook, 9 August. Available at: https:\/\/about.fb.com\/news\/2017\/08\/news-feed-fyi-addressing-cloaking-so-people-see-more-authentic-posts\/ (accessed 18 September 2020)."},{"key":"bibr38-14614448221147661","unstructured":"Lima C (2021) A whistleblower\u2019s power: key takeaways from the Facebook papers. The Washington Post, 26 October. https:\/\/www.washingtonpost.com\/technology\/2021\/10\/25\/what-are-the-facebook-papers\/ (accessed 12 September 2022)."},{"key":"bibr39-14614448221147661","doi-asserted-by":"publisher","DOI":"10.1177\/2053951720920686"},{"key":"bibr40-14614448221147661","first-page":"1","author":"McDonald N","year":"2019","journal-title":"Proceedings of the ACM on Human-Computer Interaction"},{"key":"bibr41-14614448221147661","unstructured":"Martin F, Sinpeng A (2021) Hate speech on Facebook is here to stay. Quartz, 9 July. Available at: https:\/\/qz.com\/2030941\/hate-speech-on-facebook-is-here-to-stay\/ (accessed 20 April 2022)."},{"key":"bibr42-14614448221147661","doi-asserted-by":"publisher","DOI":"10.1080\/14680777.2018.1450568"},{"key":"bibr43-14614448221147661","doi-asserted-by":"publisher","DOI":"10.1177\/14614448221090201"},{"key":"bibr44-14614448221147661","doi-asserted-by":"publisher","DOI":"10.1177\/1461444815608807"},{"key":"bibr45-14614448221147661","doi-asserted-by":"publisher","DOI":"10.1080\/1369118X.2017.1293130"},{"key":"bibr46-14614448221147661","first-page":"12","volume":"25","author":"Matamoros-Fern\u00e1ndez A","year":"2020","journal-title":"First Monday"},{"key":"bibr47-14614448221147661","unstructured":"Meta (2021) Meta\u2019s new AI system to help tackle harmful content. Meta, 8 December. Available at: https:\/\/about.fb.com\/news\/2021\/12\/metas-new-ai-system-tackles-harmful-content\/ (accessed 2 June 2022)."},{"key":"bibr48-14614448221147661","unstructured":"Meta (2022a) Community standards enforcement report. Available at: https:\/\/transparency.fb.com\/data\/community-standards-enforcement\/bullying-and-harassment\/facebook\/ (accessed 30 May 2022)"},{"key":"bibr49-14614448221147661","unstructured":"Meta (2022b) Help centre what types of things aren\u2019t allowed on Facebook? Available at: https:\/\/www.facebook.com\/help\/212826392083694 (accessed 10 September 2022)."},{"key":"bibr50-14614448221147661","unstructured":"Mosseri A (2017) Working to stop misinformation and fake news. Available at: https:\/\/www.facebook.com\/formedia\/blog\/working-to-stop-misinformation-and-false-news (accessed 10 September 2022)."},{"issue":"1","key":"bibr51-14614448221147661","first-page":"145","volume":"58","author":"Nahmias Y","year":"2021","journal-title":"Harvard Journal on Legislation"},{"key":"bibr52-14614448221147661","doi-asserted-by":"publisher","DOI":"10.1080\/17439884.2020.1707223"},{"key":"bibr53-14614448221147661","doi-asserted-by":"publisher","DOI":"10.1007\/s12152-018-9382-7"},{"issue":"1","key":"bibr54-14614448221147661","first-page":"181","volume":"69","author":"Perel M","year":"2017","journal-title":"Florida Law Review"},{"key":"bibr55-14614448221147661","first-page":"367","volume-title":"Taking Stock: The Status of Criminological Theory","author":"Pratt T","year":"2006"},{"key":"bibr56-14614448221147661","doi-asserted-by":"publisher","DOI":"10.2139\/ssrn.3895779."},{"key":"bibr57-14614448221147661","doi-asserted-by":"publisher","DOI":"10.1177\/1461444820913122"},{"key":"bibr58-14614448221147661","doi-asserted-by":"publisher","DOI":"10.1177\/1527476420982232"},{"key":"bibr59-14614448221147661","volume-title":"Basics of Qualitative Research: Techniques and Procedures for Developing Grounded Theory","author":"Strauss AL","year":"1998"},{"key":"bibr60-14614448221147661","doi-asserted-by":"publisher","DOI":"10.1017\/9781108666428"},{"key":"bibr61-14614448221147661","first-page":"1526","volume":"13","author":"Suzor NP","year":"2019","journal-title":"International Journal of Communication"},{"key":"bibr62-14614448221147661","doi-asserted-by":"publisher","DOI":"10.2307\/2089195"},{"key":"bibr63-14614448221147661","unstructured":"Tech Transparency Project (2022) Facebook profits from White supremacist groups Available at: https:\/\/www.techtransparencyproject.org\/articles\/facebook-profits-white-supremacist-groups (accessed 10 September 2022)."},{"key":"bibr64-14614448221147661","volume-title":"Reconsidering Indeterminate and Structured Sentencing","author":"Tonry M","year":"1999"},{"key":"bibr65-14614448221147661","unstructured":"Twitter (2021) Permanent suspension of @realDonaldTrump. Twitter Blog, 8 January. Available at: https:\/\/blog.twitter.com\/en_us\/topics\/company\/2020\/suspension (accessed 28 April 2022)."},{"key":"bibr66-14614448221147661","doi-asserted-by":"publisher","DOI":"10.1111\/j.1540-4560.2006.00452.x"},{"key":"bibr67-14614448221147661","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-09502-8_10"},{"key":"bibr68-14614448221147661","volume-title":"Resources of Hope: Culture, Democracy, Socialism","author":"Williams R","year":"1989"},{"key":"bibr69-14614448221147661","first-page":"557","volume":"422","author":"Witt A","year":"2019","journal-title":"The University of New South Wales Law Journal"},{"key":"bibr70-14614448221147661","doi-asserted-by":"publisher","DOI":"10.2224\/sbp.2016.44.8.1371"}],"container-title":["New Media &amp; Society"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/journals.sagepub.com\/doi\/pdf\/10.1177\/14614448221147661","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/journals.sagepub.com\/doi\/full-xml\/10.1177\/14614448221147661","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/journals.sagepub.com\/doi\/pdf\/10.1177\/14614448221147661","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,5,2]],"date-time":"2026-05-02T03:57:18Z","timestamp":1777694238000},"score":1,"resource":{"primary":{"URL":"https:\/\/journals.sagepub.com\/doi\/10.1177\/14614448221147661"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,2,1]]},"references-count":70,"journal-issue":{"issue":"11","published-print":{"date-parts":[[2024,11]]}},"alternative-id":["10.1177\/14614448221147661"],"URL":"https:\/\/doi.org\/10.1177\/14614448221147661","relation":{},"ISSN":["1461-4448","1461-7315"],"issn-type":[{"value":"1461-4448","type":"print"},{"value":"1461-7315","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,2,1]]}}}