Nothing Special   »   [go: up one dir, main page]

skip to main content
research-article
Open access

A Framework of Severity for Harmful Content Online

Published: 18 October 2021 Publication History

Abstract

The proliferation of harmful content on online social media platforms has necessitated empirical understandings of experiences of harm online and the development of practices for harm mitigation. Both understandings of harm and approaches to mitigating that harm, often through content moderation, have implicitly embedded frameworks of prioritization-what forms of harm should be researched, how policy on harmful content should be implemented, and how harmful content should be moderated. To aid efforts of better understanding the variety of online harms, how they relate to one another, and how to prioritize harms relevant to research, policy, and practice, we present a theoretical framework of severity for harmful online content. By employing a grounded theory approach, we developed a framework of severity based on interviews and card-sorting activities conducted with 52 participants over the course of ten months. Through our analysis, we identified four Types of Harm (physical, emotional, relational, and financial) and eight Dimensions along which the severity of harm can be understood (perspectives, intent, agency, experience, scale, urgency, vulnerability, sphere). We describe how our framework can be applied to both research and policy settings towards deeper understandings of specific forms of harm (e.g., harassment) and prioritization frameworks when implementing policies encompassing many forms of harm.

References

[1]
[n.d.]. Optimal Workshop | User Experience (UX) Research Platform. https://www.optimalworkshop.com/
[2]
Sarah A. Aghazadeh, Alison Burns, Jun Chu, Hazel Feigenblatt, Elizabeth Laribee, Lucy Maynard, Amy L. M. Meyers, Jessica L. O'Brien, and Leah Rufus. 2018. GamerGate: A Case Study in Online Harassment. In Online Harassment. Springer, Cham, 179--207. https://doi.org/10.1007/978--3--319--78583--7_8
[3]
Harriet Alexander. 2020. Woman jailed for shooting her rapist dead after he threatened to kill her. https://www.independent.co.uk/news/world/americas/alabama-rape-shooting-murder-brittany-smith-todd-jail-sentence-b936467.html
[4]
Maitri Amin. 2016. A survey of financial losses due to malware. In ACM International Conference Proceeding Series, Vol. 04-05-Marc. Association for Computing Machinery, New York, New York, USA, 1--4. https://doi.org/10.1145/2905055.2905362
[5]
Nazanin Andalibi, Pinar Ozturk, and Andrea Forte. 2017. Sensitive Self-disclosures, Responses, and Social Support on Instagram. In Proceedings of the 2017 ACM Conference on Computer Supported Cooperative Work and Social Computing - CSCW '17. 1485--1500. https://doi.org/10.1145/2998181.2998243
[6]
Nazanin Andalibi, Pinar Ozturk, and Andrea Forte. 2017. Sensitive Self-disclosures, Responses, and Social Support on Instagram: The Case of #Depression. In Proceedings of the 2017 ACM Conference on Computer Supported Cooperative Work and Social Computing - CSCW '17. ACM Press, New York, New York, USA, 1485--1500. https://doi.org/10.1145/ 2998181.2998243
[7]
Jeff Asher and Ben Horwitz. 2020. How Do the Police Actually Spend Their Time? https://www.nytimes.com/2020/06/19/upshot/unrest-police-time-violent-crime.html
[8]
Zahra Ashktorab and Jessica Vitak. 2016. Designing cyberbullying mitigation and prevention solutions through participatory design with teenagers. In Conference on Human Factors in Computing Systems - Proceedings. Association for Computing Machinery, New York, NY, USA, 3895--3905. https://doi.org/10.1145/2858036.2858548
[9]
Jessica Aycock. 2019. Criminalizing the Victim: Ending Prosecution of Human Trafficking Victims. SSRN Electronic Journal (feb 2019). https://doi.org/10.2139/ssrn.3327525
[10]
Mary Elizabeth Ballard and Kelly Marie Welch. 2017. Virtual Warfare: Cyberbullying and Cyber-Victimization in MMOG Play. Games and Culture 12, 5 (2017), 466--491. https://doi.org/10.1177/1555412015592473
[11]
Lindsay Blackwell, Jill Dimond, Sarita Schoenebeck, and Cliff Lampe. 2017. Classification and its consequences for online harassment: Design insights from HeartMob. Proceedings of the ACM on Human-Computer Interaction 1, CSCW (nov 2017), 1--19. https://doi.org/10.1145/3134659
[12]
Lindsay Blackwell, Nicole Ellison, Natasha Elliott-Deflo, and Raz Schwartz. 2019. Harassment in social virtual reality: Challenges for platform governance., 25 pages. https://doi.org/10.1145/3359202
[13]
Lindsay Blackwell, Mark Handel, Sarah T. Roberts, Amy Bruckman, and Kimberly Voll. 2018. Understanding "bad actors" online. In Conference on Human Factors in Computing Systems - Proceedings, Vol. 2018-April. ACM Press, New York, New York, USA, 1--7. https://doi.org/10.1145/3170427.3170610
[14]
Andrea Braithwaite. 2016. It's About Ethics in Games Journalism? Gamergaters and Geek Masculinity. Social Media and Society 2, 4 (nov 2016), 205630511667248. https://doi.org/10.1177/2056305116672484
[15]
Robyn Caplan. 2018. Content or context moderation? Artisanal, community-reliant, and industrial approaches. Data & Society (2018). https://datasociety.net/library/content-or-context-moderation/
[16]
Stevie Chancellor, Jessica Pater, Trustin Clear, Eric Gilbert, and Munmun De Choudhury. 2016. Thyghgapp: Instagram content moderation and lexical variation in Pro-Eating disorder communities. In Proceedings of the ACM Conference on Computer Supported Cooperative Work, CSCW, Vol. 27. Association for Computing Machinery, New York, New York, USA, 1201--1213. https://doi.org/10.1145/2818048.2819963
[17]
Eshwar Chandrasekharan, Chaitrali Gandhi, Matthew Wortley Mustelier, and Eric Gilbert. 2019. CrossMod: A cross-community learning-based system to assist reddit moderators. Proceedings of the ACM on Human-Computer Interaction 3, CSCW (nov 2019), 1--30. https://doi.org/10.1145/3359276
[18]
Kathy Charmaz. 2006. Constructing Grounded Theory: A Practical Guide Through Qualitative Analysis. 388 pages. http://www.sxf.uevora.pt/wp-content/uploads/2013/03/Charmaz_2006.pdf
[19]
Elizabeth Charters. 2003. The Use of Think-aloud Methods in Qualitative Research An Introduction to Think-aloud Methods. Brock Education Journal 12, 2 (jul 2003). https://doi.org/10.26522/brocked.v12i2.38
[20]
Despoina Chatzakou, Nicolas Kourtellis, Jeremy Blackburn, Emiliano De Cristofaro, Gianluca Stringhini, and Athena Vakali. 2019. Measuring #Gamergate: A tale of hate, sexism, and bullying. In 26th International World Wide Web Conference 2017, WWW 2017 Companion. International World Wide Web Conferences Steering Committee, 1285--1290. https://doi.org/10.1145/3041021.3053890 arXiv:1702.07784
[21]
Irfan Chaudhry. 2015. #Hashtagging hate: Using Twitter to track racism online. First Monday 20, 2 (feb 2015). https://doi.org/10.5210/fm.v20i2.5450
[22]
Christine L Cook, Aashka Patel, and Donghee Yvette Wohn. 2021. Commercial Versus Volunteer: Comparing User Perceptions of Toxicity and Transparency in Content Moderation Across Social Media Platforms. Frontiers in Human Dynamics 3 (feb 2021), 3. https://doi.org/10.3389/fhumd.2021.626409
[23]
Juliet Corbin and Anselm Strauss. 2014. Basics of Qualitative Research: Techniques and Procedures for Developing Grounded Theory. SAGE Publications Inc. https://us.sagepub.com/en-us/nam/basics-of-qualitative-research/book235578http://us.sagepub.com/en-us/nam/basics-of-qualitative-research/book235578
[24]
Brandon Dang, Martin J. Riedl, and Matthew Lease. 2018. But Who Protects the Moderators? The Case of Crowdsourced Image Moderation. (apr 2018). arXiv:1804.10999 http://arxiv.org/abs/1804.10999
[25]
City of Eugene Police Department. 2009. Police Call Priority Definitions. Technical Report. www.eugene-or.gov/police
[26]
Ritam Dutt, Ashok Deb, and Emilio Ferrara. 2019. ?senator, We Sell Ads": Analysis of the 2016 russian facebook ads campaign. In Communications in Computer and Information Science, Vol. 941. Springer Verlag, 151--168. https://doi.org/10.1007/978--981--13--3582--2_12 arXiv:1809.10158
[27]
Facebook. [n.d.]. Community Standards. ([n. d.]). https://www.facebook.com/communitystandards/violence_criminal_behavior
[28]
Julia R. Fernandez and Jeremy Birnholtz. 2019. "I don't want them to not know": Investigating decisions to disclose transgender identity on dating platforms. Proceedings of the ACM on Human-Computer Interaction 3, CSCW (nov 2019), 1--21. https://doi.org/10.1145/3359328
[29]
Miriam Fernandez and Harith Alani. 2018. Online Misinformation: Challenges and Future Directions. In The Web Conference 2018 - Companion of the World Wide Web Conference, WWW 2018. Association for Computing Machinery, Inc, New York, New York, USA, 595--602. https://doi.org/10.1145/3184558.3188730
[30]
Jessica L. Feuston, Alex S. Taylor, and Anne Marie Piper. 2020. Conformity of Eating Disorders through Content Moderation. Proceedings of the ACM on Human-Computer Interaction 4, CSCW1 (may 2020). https://doi.org/10.1145/3392845
[31]
Maggie Fick and Dave Paresh. 2019. INSIGHT-Facebook's flood of languages leave it struggling to monitor content. https://www.reuters.com/article/facebook-languages/insight-facebooks-flood-of-languages-leave-it-struggling-to-monitor-content-idUSL1N20U01Ehttps://www.reuters.com/article/us-facebook-languages-insight-idUSKCN1RZ0DW
[32]
Casey Fiesler, Jialun Aaron Jiang, Joshua McCann, Kyle Frye, and Jed R Brubaker. 2018. Reddit rules! Characterizing an ecosystem of governance. In 12th International AAAI Conference on Web and Social Media, ICWSM 2018. 72--81. www.reddit.com
[33]
Ed Gilgor. [n.d.]. Is Your 911 Call a Priority? Technical Report. https://grantpark.org/info/16029
[34]
Tarleton Gillespie. 2018. Custodians of the Internet. Yale University Press. https://yalebooks.yale.edu/book/9780300173130/custodians-internet
[35]
Stephen M. Haas, Meghan E. Irr, Nancy A. Jennings, and Lisa M. Wagner. 2011. Communicating thin: A grounded model of online negative enabling support groups in the pro-anorexia movement. New Media and Society 13, 1 (feb 2011), 40--57. https://doi.org/10.1177/1461444810363910
[36]
Debarati Halder. 2014. Hate Crimes in Cyberspace. International Journal of Cyber Criminology 8, 2 (2014), 172--175. http://www.jstor.org/stable/j.ctt7zsws7http://search.ebscohost.com/login.aspx?direct=true&db=i3h&AN=101788663&site=ehost-live
[37]
Hugo L. Hammer, Michael A. Riegler, Lilja Ovrelid, and Erik Velldal. 2019. THREAT: A Large Annotated Corpus for Detection of Violent Threats. In Proceedings - International Workshop on Content-Based Multimedia Indexing, Vol. 2019-Septe. IEEE Computer Society. https://doi.org/10.1109/CBMI.2019.8877435
[38]
Frederik Hjorth and Rebecca Adler-Nissen. 2019. Ideological asymmetry in the reach of pro-Russian digital disinformation to United States audiences. Journal of Communication 69, 2 (apr 2019), 168--192. https://doi.org/10.1093/joc/jqz006
[39]
Shagun Jhaver, Iris Birman, Eric Gilbert, and Amy Bruckman. 2019. Human-machine collaboration for content regulation: The case of reddit automoderator. ACM Transactions on Computer-Human Interaction 26, 5 (jul 2019), 1--35. https://doi.org/10.1145/3338243
[40]
Jialun Jiang, Charles Kiene, Skyler Middler, Jed R. Brubaker, and Casey Fiesler. 2019. Moderation challenges in voice-based online communities on discord. Proceedings of the ACM on Human-Computer Interaction 3, CSCW (nov 2019), 1--23. https://doi.org/10.1145/3359157
[41]
Jialun "Aaron" Jiang, Skyler Middler, Jed R. Brubaker, and Casey Fiesler. 2020. Characterizing Community Guidelines on Social Media Platforms. CSCW'20 Companion (2020). https://doi.org/10.1145/3406865.3418312
[42]
Kate Klonick. 2018. The new governors: The people, rules, and processes governing online speech. Harvard Law Review 131, 6 (2018), 1599--1670. https://harvardlawreview.org/2018/04/the-new-governors-the-people-rules-and-processes-governing-online-speech/
[43]
Jason Koebler and Joseph Cox. 2018. The Impossible Job: Inside Facebook's Struggle to Moderate Two Billion People., Aug 23 pages. https://www.vice.com/en/article/xwk9zd/how-facebook-content-moderation-workshttps://www.vice.com/en_us/article/xwk9zd/how-facebook-content-moderation-works
[44]
Kaylee Payne Kruzan, Janis Whitlock, Natalya N. Bazarova, Katherine D. Miller, Julia Chapman, and Andrea Stevenson Won. 2020. Supporting Self-Injury Recovery: The Potential for Virtual Reality Intervention. In Conference on Human Factors in Computing Systems - Proceedings. Association for Computing Machinery. https://doi.org/10.1145/3313831.3376396
[45]
Ponnurangam Kumaraguru, Yong Rhee, Alessandro Acquisti, Lorrie Faith Cranor, Jason Hong, and Elizabeth Nunge. 2007. Protecting people from phishing: The design and evaluation of an embedded training email system. In Conference on Human Factors in Computing Systems - Proceedings. ACM Press, New York, New York, USA, 905--914. https://doi.org/10.1145/1240624.1240760
[46]
Haewoon Kwak, Jeremy Blackburn, and Seungyeop Han. 2015. Exploring cyberbullying and other toxic behavior in team competition online games. In Conference on Human Factors in Computing Systems - Proceedings, Vol. 2015-April. Association for Computing Machinery, New York, New York, USA, 3739--3748. https://doi.org/10.1145/2702123.2702529 arXiv:1504.02305
[47]
Caitlin E Lawson. 2015. Cascading Exploitations: A Digital Analysis of the Celebrity Nude Photo Hack. Technical Report. https://doi.org/10.5210/SPIR.V5I0.8490
[48]
Sonia Livingstone, Lucyna Kirwil, Cristina Ponte, and Elisabeth Staksrud. 2014. In their own words: What bothers children online? European Journal of Communication 29, 3 (jun 2014), 271--288. https://doi.org/10.1177/0267323114521045
[49]
Adrienne L. Massanari. 2020. Gamergate. In The International Encyclopedia of Gender, Media, and Communication. Wiley, 1--5. https://doi.org/10.1002/9781119429128.iegmc014
[50]
Tara Matthews, Kathleen O'Leary, Anna Turner, Manya Sleeper, Jill Palzkill Woelfer, Martin Shelton, Cori Manthorne, Elizabeth F. Churchill, and Sunny Consolvo. 2017. Stories from survivors: Privacy & security practices when coping with intimate partner abuse. In Conference on Human Factors in Computing Systems - Proceedings, Vol. 2017-May. Association for Computing Machinery, New York, NY, USA, 2189--2201. https://doi.org/10.1145/3025453.3025875
[51]
Sarah Myers West. 2018. Censored, suspended, shadowbanned: User interpretations of content moderation on social media platforms. New Media & Society 20, 11 (nov 2018), 4366--4383. https://doi.org/10.1177/1461444818773059
[52]
Fayika Farhat Nova, Md Rashidujjaman Rifat, Pratyasha Saha, Syed Ishtiaque Ahmed, and Shion Guha. 2018. Silenced voices: Understanding sexual harassment on anonymous social media among Bangladeshi people. In Proceedings of the ACM Conference on Computer Supported Cooperative Work, CSCW. Association for Computing Machinery, New York, NY, USA, 209--212. https://doi.org/10.1145/3272973.3274057
[53]
Chloé Nurik. 2019. "Men Are Scum": Self-Regulation, Hate Speech, and Gender-Based Censorship on Facebook. International Journal of Communication 13 (2019), 21. http://ijoc.org.
[54]
Jessica A. Pater, Moon K. Kim, Elizabeth D. Mynatt, and Casey Fiesler. 2016. Characterizations of online harassment: Comparing policies across social media platforms. In Proceedings of the International ACM SIGGROUP Conference on Supporting Group Work, Vol. 13--16-Nove. Association for Computing Machinery, New York, NY, USA, 369--374. https://doi.org/10.1145/2957276.2957297
[55]
Lynne Peeples. 2020. What the data say about police brutality and racial bias - and which reforms might work., 22--24 pages. https://doi.org/10.1038/d41586-020-01846-z
[56]
Shruti Phadke, Jonathan Lloyd, James Hawdon, Mattia Samory, and Tanushree Mitra. 2018. Framing hate with hate frames: Designing the codebook. In Proceedings of the ACM Conference on Computer Supported Cooperative Work, CSCW. Association for Computing Machinery, New York, NY, USA, 201--204. https://doi.org/10.1145/3272973.3274055
[57]
Bailey Poland. 2016. Haters: Harassment, abuse, and violence online. 1--301 pages. https://www.jstor.org/stable/j.ctt1fq9wdp
[58]
Dallas Police. 2016. Communications Operations Center (Handling Calls for Service). Technical Report.
[59]
Zoe Quinn. 2017. Crash Override: How Gamergate (Nearly) Destroyed My Life, and How We Can Win the Fight Against Online Hate. 242 pages. https://books.google.com/books/about/Crash_Override.html?id=gpvUDQAAQBAJ
[60]
Elissa M Redmiles, Jessica Bodford, and Lindsay Blackwell. 2019. "I just want to feel safe": A diary study of safety perceptions on social media. In Proceedings of the 13th International Conference on Web and Social Media, ICWSM 2019, Vol. 13. 405--416. www.aaai.org
[61]
Kathryn E Ringland, Christine T Wolf, Lynn Dombrowski, and Gillian R Hayes. 2015. Making "Safe". In CSCW. 1788--1800. https://doi.org/10.1145/2675133.2675216
[62]
Sarah T. Roberts. 2019. Behind the Screen. Yale University Press. https://yalebooks.yale.edu/book/9780300235883/behind-screen
[63]
Adi Robertson. 2014. 'Massacre' threat forces Anita Sarkeesian to cancel university talk - The Verge. https://www.theverge.com/2014/10/14/6978809/utah-state-university-receives-shooting-threat-for-anita-sarkeesian-visit
[64]
Minna Ruckenstein and Linda Lisa Maria Turunen. 2020. Re-humanizing the platform: Content moderators and the logic of care. New Media and Society 22, 6 (jun 2020), 1026--1042. https://doi.org/10.1177/1461444819875990
[65]
Valeriya Safronova and Rebecca Halleck. 2019. These Rape Victims Had to Sue to Get the Police to Investigate. https://www.nytimes.com/2019/05/23/us/rape-victims-kits-police-departments.html
[66]
Johnny Saldana. 2013. The Coding Manual for Qualitative Researchers Instruction. Sage (2013), 299. www.sagepublications.com
[67]
Morgan Klaus Scheuerman, Stacy M Branham, and Foad Hamidi. 2018. Safe Spaces and Safe Places: Unpacking Technology-Mediated Experiences of Safety and Harm with Transgender People. Proceedings of the ACM on Human-Computer Interaction 2 (2018), 29.
[68]
S Schrock and D Boyd. 2009. Online threats to youth: Solicitation, harassment, and problematic content. In Enhancing Child Safety and Online Technologies. http://cyber.law.harvard.edu/research/isttf
[69]
Joseph Seering, Tony Wang, Jina Yoon, and Geoff Kaufman. 2019. Moderator engagement and community development in the age of algorithms. New Media and Society 21, 7 (jul 2019), 1417--1443. https://doi.org/10.1177/1461444818821316
[70]
Irving Seidman. 1998. Interviewing as Qualitative Research: A Guide for Researchers in Education and the Social Sciences. Teachers College Press. https://books.google.com/books/about/Interviewing_as_Qualitative_Research.html?id=DhpjQgAACAAJ&source=kp_book_descriptionhttps://books.google.co.uk/books?hl=en&lr=&id=pk1Rmq-Y15QC&oi=fnd&pg=PR9&ots=4pl7SRNPJR&sig=rRd9I_WNECoUTA7KzGwTti_R3g0&redir_esc=y#v
[71]
Jana Shakarian, Andrew T. Gunn, and Paulo Shakarian. 2016. Exploring malicious hacker forums. In Cyber Deception: Building the Scientific Foundation. Springer International Publishing, 259--282. https://doi.org/10.1007/978--3--319--32699--3_11
[72]
Vivek K. Singh, Marie L. Radford, Qianjia Huang, and Susan Furrer. 2017. "They basically like destroyed the school one day": On Newer App Features and Cyberbullying in Schools. In Proceedings of the 2017 ACM Conference on Computer Supported Cooperative Work and Social Computing - CSCW '17. ACM Press, New York, New York, USA, 1210--1216. https://doi.org/10.1145/2998181.2998279
[73]
Donna Spencer and Jesse James Garrett. 2009. Card Sorting: Designing Usable Categories - Donna Spencer - Google Books. Rosenfeld Media. 162 pages. https://books.google.com/books/about/Card_Sorting.html?id=_h4D9gqi5tsC&source=kp_book_descriptionhttps://books.google.com.cy/books?hl=en&lr=&id=-nk3DwAAQBAJ&oi=fnd&pg=PP1&dq=card+sorting+web+design&ots=2__cH6MatE&sig=i2cJh6KKSmAjc_zKoaS8HxnFaiU&redir_esc
[74]
Alice Speri, Alleen Brown, and Mara Hvistendahl. [n.d.]. The George Floyd Killing Exposes Failures of Police Reform. https://theintercept.com/2020/05/29/george-floyd-minneapolis-police-reform/
[75]
Alexandra To, Wenxia Sweeney, Jessica Hammer, and Geoff Kaufman. 2020. "they Just Don't Get It": Towards Social Technologies for Coping with Interpersonal Racism. Proceedings of the ACM on Human-Computer Interaction 4, CSCW1 (may 2020), 29. https://doi.org/10.1145/3392828
[76]
Twitter. [n.d.]. Twitter Terms of Service. https://twitter.com/en/tos
[77]
Brendesha M. Tynes, Henry A. Willis, Ashley M. Stewart, and Matthew W. Hamilton. 2019. Race-Related Traumatic Events Online and Mental Health Among Adolescents of Color. Journal of Adolescent Health 65, 3 (sep 2019), 371--377. https://doi.org/10.1016/j.jadohealth.2019.03.006
[78]
James Vincent. 2019. AI won't relieve the misery of Facebook's human moderators. https://www.theverge.com/2019/2/27/18242724/facebook-moderation-ai-artificial-intelligence-platforms
[79]
Jessica Vitak, Kalyani Chadha, Linda Steiner, and Zahra Ashktorab. 2017. Identifying Women's Experiences With and Strategies for Mitigating Negative Effects of Online Harassment. Proceedings of the 2017 ACM Conference on Computer Supported Cooperative Work and Social Computing (CSCW '17) (2017), 1231--1245. https://doi.org/10.1145/2998181.2998337
[80]
Nick Wingfield. 2014. Feminist Critics of Video Games Facing Threats in 'GamerGate' Campaign. https://www.nytimes.com/2014/10/16/technology/gamergate-women-video-game-threats-anita-sarkeesian.htmlhttps://www.nytimes.com/2014/10/16/technology/gamergate-women-video-game-threats-anita-sarkeesian.html?_r=0
[81]
Donghee Yvette Wohn. 2019. Volunteer moderators in twitch micro communities: How they get involved, the roles they play, and the emotional labor they experience. In Conference on Human Factors in Computing Systems - Proceedings. Association for Computing Machinery, New York, New York, USA, 1--13. https://doi.org/10.1145/3290605.3300390
[82]
Eva Zangerle and Günther Specht. 2014. "Sorry, i was hacked" a classification of compromised Twitter accounts. In Proceedings of the ACM Symposium on Applied Computing. Association for Computing Machinery, New York, New York, USA, 587--593. https://doi.org/10.1145/2554850.2554894

Cited By

View all
  • (2024)A playbook for mapping adolescent interactions with misinformation to perceptions of online harmHarvard Kennedy School Misinformation Review10.37016/mr-2020-161Online publication date: 30-Oct-2024
  • (2024)Moral judgment of objectionable online content: Reporting decisions and punishment preferences on social mediaPLOS ONE10.1371/journal.pone.030096019:3(e0300960)Online publication date: 25-Mar-2024
  • (2024)Whose Knowledge is Valued? Epistemic Injustice in CSCW ApplicationsProceedings of the ACM on Human-Computer Interaction10.1145/36870628:CSCW2(1-28)Online publication date: 8-Nov-2024
  • Show More Cited By

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image Proceedings of the ACM on Human-Computer Interaction
Proceedings of the ACM on Human-Computer Interaction  Volume 5, Issue CSCW2
CSCW2
October 2021
5376 pages
EISSN:2573-0142
DOI:10.1145/3493286
Issue’s Table of Contents
This work is licensed under a Creative Commons Attribution-NonCommercial International 4.0 License.

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 18 October 2021
Published in PACMHCI Volume 5, Issue CSCW2

Check for updates

Author Tags

  1. content moderation
  2. framework
  3. harm
  4. online communities
  5. safety
  6. severity
  7. social networks

Qualifiers

  • Research-article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)1,648
  • Downloads (Last 6 weeks)219
Reflects downloads up to 20 Nov 2024

Other Metrics

Citations

Cited By

View all
  • (2024)A playbook for mapping adolescent interactions with misinformation to perceptions of online harmHarvard Kennedy School Misinformation Review10.37016/mr-2020-161Online publication date: 30-Oct-2024
  • (2024)Moral judgment of objectionable online content: Reporting decisions and punishment preferences on social mediaPLOS ONE10.1371/journal.pone.030096019:3(e0300960)Online publication date: 25-Mar-2024
  • (2024)Whose Knowledge is Valued? Epistemic Injustice in CSCW ApplicationsProceedings of the ACM on Human-Computer Interaction10.1145/36870628:CSCW2(1-28)Online publication date: 8-Nov-2024
  • (2024)Safer Algorithmically-Mediated Offline Introductions: Harms and Protective BehaviorsProceedings of the ACM on Human-Computer Interaction10.1145/36869488:CSCW2(1-43)Online publication date: 8-Nov-2024
  • (2024)A Cross Community Comparison of Muting in Conversations of Gendered Violence on RedditProceedings of the ACM on Human-Computer Interaction10.1145/36869408:CSCW2(1-29)Online publication date: 8-Nov-2024
  • (2024)"Positive reinforcement helps breed positive behavior": Moderator Perspectives on Encouraging Desirable BehaviorProceedings of the ACM on Human-Computer Interaction10.1145/36869298:CSCW2(1-33)Online publication date: 8-Nov-2024
  • (2024)Misinformation, Fraud, and Stereotyping: Towards a Typology of Harm Caused by DeepfakesCompanion Publication of the 2024 Conference on Computer-Supported Cooperative Work and Social Computing10.1145/3678884.3685938(533-538)Online publication date: 11-Nov-2024
  • (2024)Harmful Design in User-Generated Games and its Ethical and Governance Challenges: An Investigation of Design Co-Ideation of Game Creators on RobloxProceedings of the ACM on Human-Computer Interaction10.1145/36770768:CHI PLAY(1-31)Online publication date: 15-Oct-2024
  • (2024)Combating Islamophobia: Compromise, Community, and Harmony in Mitigating Harmful Online ContentACM Transactions on Social Computing10.1145/36415107:1(1-32)Online publication date: 27-Apr-2024
  • (2024)Misinformation as a Harm: Structured Approaches for Fact-Checking PrioritizationProceedings of the ACM on Human-Computer Interaction10.1145/36410108:CSCW1(1-36)Online publication date: 26-Apr-2024
  • Show More Cited By

View Options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Login options

Full Access

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media