skip to main content
research-article
Open Access

A Framework of Severity for Harmful Content Online

Published:18 October 2021Publication History
Skip Abstract Section

Abstract

The proliferation of harmful content on online social media platforms has necessitated empirical understandings of experiences of harm online and the development of practices for harm mitigation. Both understandings of harm and approaches to mitigating that harm, often through content moderation, have implicitly embedded frameworks of prioritization-what forms of harm should be researched, how policy on harmful content should be implemented, and how harmful content should be moderated. To aid efforts of better understanding the variety of online harms, how they relate to one another, and how to prioritize harms relevant to research, policy, and practice, we present a theoretical framework of severity for harmful online content. By employing a grounded theory approach, we developed a framework of severity based on interviews and card-sorting activities conducted with 52 participants over the course of ten months. Through our analysis, we identified four Types of Harm (physical, emotional, relational, and financial) and eight Dimensions along which the severity of harm can be understood (perspectives, intent, agency, experience, scale, urgency, vulnerability, sphere). We describe how our framework can be applied to both research and policy settings towards deeper understandings of specific forms of harm (e.g., harassment) and prioritization frameworks when implementing policies encompassing many forms of harm.

References

  1. [n.d.]. Optimal Workshop | User Experience (UX) Research Platform. https://www.optimalworkshop.com/Google ScholarGoogle Scholar
  2. Sarah A. Aghazadeh, Alison Burns, Jun Chu, Hazel Feigenblatt, Elizabeth Laribee, Lucy Maynard, Amy L. M. Meyers, Jessica L. O'Brien, and Leah Rufus. 2018. GamerGate: A Case Study in Online Harassment. In Online Harassment. Springer, Cham, 179--207. https://doi.org/10.1007/978--3--319--78583--7_8Google ScholarGoogle ScholarCross RefCross Ref
  3. Harriet Alexander. 2020. Woman jailed for shooting her rapist dead after he threatened to kill her. https://www.independent.co.uk/news/world/americas/alabama-rape-shooting-murder-brittany-smith-todd-jail-sentence-b936467.htmlGoogle ScholarGoogle Scholar
  4. Maitri Amin. 2016. A survey of financial losses due to malware. In ACM International Conference Proceeding Series, Vol. 04-05-Marc. Association for Computing Machinery, New York, New York, USA, 1--4. https://doi.org/10.1145/2905055.2905362Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. Nazanin Andalibi, Pinar Ozturk, and Andrea Forte. 2017. Sensitive Self-disclosures, Responses, and Social Support on Instagram. In Proceedings of the 2017 ACM Conference on Computer Supported Cooperative Work and Social Computing - CSCW '17. 1485--1500. https://doi.org/10.1145/2998181.2998243Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. Nazanin Andalibi, Pinar Ozturk, and Andrea Forte. 2017. Sensitive Self-disclosures, Responses, and Social Support on Instagram: The Case of #Depression. In Proceedings of the 2017 ACM Conference on Computer Supported Cooperative Work and Social Computing - CSCW '17. ACM Press, New York, New York, USA, 1485--1500. https://doi.org/10.1145/ 2998181.2998243Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. Jeff Asher and Ben Horwitz. 2020. How Do the Police Actually Spend Their Time? https://www.nytimes.com/2020/06/19/upshot/unrest-police-time-violent-crime.htmlGoogle ScholarGoogle Scholar
  8. Zahra Ashktorab and Jessica Vitak. 2016. Designing cyberbullying mitigation and prevention solutions through participatory design with teenagers. In Conference on Human Factors in Computing Systems - Proceedings. Association for Computing Machinery, New York, NY, USA, 3895--3905. https://doi.org/10.1145/2858036.2858548Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. Jessica Aycock. 2019. Criminalizing the Victim: Ending Prosecution of Human Trafficking Victims. SSRN Electronic Journal (feb 2019). https://doi.org/10.2139/ssrn.3327525Google ScholarGoogle ScholarCross RefCross Ref
  10. Mary Elizabeth Ballard and Kelly Marie Welch. 2017. Virtual Warfare: Cyberbullying and Cyber-Victimization in MMOG Play. Games and Culture 12, 5 (2017), 466--491. https://doi.org/10.1177/1555412015592473Google ScholarGoogle ScholarCross RefCross Ref
  11. Lindsay Blackwell, Jill Dimond, Sarita Schoenebeck, and Cliff Lampe. 2017. Classification and its consequences for online harassment: Design insights from HeartMob. Proceedings of the ACM on Human-Computer Interaction 1, CSCW (nov 2017), 1--19. https://doi.org/10.1145/3134659Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. Lindsay Blackwell, Nicole Ellison, Natasha Elliott-Deflo, and Raz Schwartz. 2019. Harassment in social virtual reality: Challenges for platform governance. , 25 pages. https://doi.org/10.1145/3359202Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. Lindsay Blackwell, Mark Handel, Sarah T. Roberts, Amy Bruckman, and Kimberly Voll. 2018. Understanding "bad actors" online. In Conference on Human Factors in Computing Systems - Proceedings, Vol. 2018-April. ACM Press, New York, New York, USA, 1--7. https://doi.org/10.1145/3170427.3170610Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. Andrea Braithwaite. 2016. It's About Ethics in Games Journalism? Gamergaters and Geek Masculinity. Social Media and Society 2, 4 (nov 2016), 205630511667248. https://doi.org/10.1177/2056305116672484Google ScholarGoogle ScholarCross RefCross Ref
  15. Robyn Caplan. 2018. Content or context moderation? Artisanal, community-reliant, and industrial approaches. Data & Society (2018). https://datasociety.net/library/content-or-context-moderation/Google ScholarGoogle Scholar
  16. Stevie Chancellor, Jessica Pater, Trustin Clear, Eric Gilbert, and Munmun De Choudhury. 2016. Thyghgapp: Instagram content moderation and lexical variation in Pro-Eating disorder communities. In Proceedings of the ACM Conference on Computer Supported Cooperative Work, CSCW, Vol. 27. Association for Computing Machinery, New York, New York, USA, 1201--1213. https://doi.org/10.1145/2818048.2819963Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. Eshwar Chandrasekharan, Chaitrali Gandhi, Matthew Wortley Mustelier, and Eric Gilbert. 2019. CrossMod: A cross-community learning-based system to assist reddit moderators. Proceedings of the ACM on Human-Computer Interaction 3, CSCW (nov 2019), 1--30. https://doi.org/10.1145/3359276Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. Kathy Charmaz. 2006. Constructing Grounded Theory: A Practical Guide Through Qualitative Analysis. 388 pages. http://www.sxf.uevora.pt/wp-content/uploads/2013/03/Charmaz_2006.pdfGoogle ScholarGoogle Scholar
  19. Elizabeth Charters. 2003. The Use of Think-aloud Methods in Qualitative Research An Introduction to Think-aloud Methods. Brock Education Journal 12, 2 (jul 2003). https://doi.org/10.26522/brocked.v12i2.38Google ScholarGoogle ScholarCross RefCross Ref
  20. Despoina Chatzakou, Nicolas Kourtellis, Jeremy Blackburn, Emiliano De Cristofaro, Gianluca Stringhini, and Athena Vakali. 2019. Measuring #Gamergate: A tale of hate, sexism, and bullying. In 26th International World Wide Web Conference 2017, WWW 2017 Companion. International World Wide Web Conferences Steering Committee, 1285--1290. https://doi.org/10.1145/3041021.3053890 arXiv:1702.07784Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. Irfan Chaudhry. 2015. #Hashtagging hate: Using Twitter to track racism online. First Monday 20, 2 (feb 2015). https://doi.org/10.5210/fm.v20i2.5450Google ScholarGoogle ScholarCross RefCross Ref
  22. Christine L Cook, Aashka Patel, and Donghee Yvette Wohn. 2021. Commercial Versus Volunteer: Comparing User Perceptions of Toxicity and Transparency in Content Moderation Across Social Media Platforms. Frontiers in Human Dynamics 3 (feb 2021), 3. https://doi.org/10.3389/fhumd.2021.626409Google ScholarGoogle ScholarCross RefCross Ref
  23. Juliet Corbin and Anselm Strauss. 2014. Basics of Qualitative Research: Techniques and Procedures for Developing Grounded Theory. SAGE Publications Inc. https://us.sagepub.com/en-us/nam/basics-of-qualitative-research/book235578http://us.sagepub.com/en-us/nam/basics-of-qualitative-research/book235578Google ScholarGoogle Scholar
  24. Brandon Dang, Martin J. Riedl, and Matthew Lease. 2018. But Who Protects the Moderators? The Case of Crowdsourced Image Moderation. (apr 2018). arXiv:1804.10999 http://arxiv.org/abs/1804.10999Google ScholarGoogle Scholar
  25. City of Eugene Police Department. 2009. Police Call Priority Definitions. Technical Report. www.eugene-or.gov/policeGoogle ScholarGoogle Scholar
  26. Ritam Dutt, Ashok Deb, and Emilio Ferrara. 2019. ?senator, We Sell Ads": Analysis of the 2016 russian facebook ads campaign. In Communications in Computer and Information Science, Vol. 941. Springer Verlag, 151--168. https://doi.org/10.1007/978--981--13--3582--2_12 arXiv:1809.10158Google ScholarGoogle ScholarCross RefCross Ref
  27. Facebook. [n.d.]. Community Standards. ([n. d.]). https://www.facebook.com/communitystandards/violence_criminal_behaviorGoogle ScholarGoogle Scholar
  28. Julia R. Fernandez and Jeremy Birnholtz. 2019. "I don't want them to not know": Investigating decisions to disclose transgender identity on dating platforms. Proceedings of the ACM on Human-Computer Interaction 3, CSCW (nov 2019), 1--21. https://doi.org/10.1145/3359328Google ScholarGoogle ScholarDigital LibraryDigital Library
  29. Miriam Fernandez and Harith Alani. 2018. Online Misinformation: Challenges and Future Directions. In The Web Conference 2018 - Companion of the World Wide Web Conference, WWW 2018. Association for Computing Machinery, Inc, New York, New York, USA, 595--602. https://doi.org/10.1145/3184558.3188730Google ScholarGoogle ScholarDigital LibraryDigital Library
  30. Jessica L. Feuston, Alex S. Taylor, and Anne Marie Piper. 2020. Conformity of Eating Disorders through Content Moderation. Proceedings of the ACM on Human-Computer Interaction 4, CSCW1 (may 2020). https://doi.org/10.1145/3392845Google ScholarGoogle ScholarDigital LibraryDigital Library
  31. Maggie Fick and Dave Paresh. 2019. INSIGHT-Facebook's flood of languages leave it struggling to monitor content. https://www.reuters.com/article/facebook-languages/insight-facebooks-flood-of-languages-leave-it-struggling-to-monitor-content-idUSL1N20U01Ehttps://www.reuters.com/article/us-facebook-languages-insight-idUSKCN1RZ0DWGoogle ScholarGoogle Scholar
  32. Casey Fiesler, Jialun Aaron Jiang, Joshua McCann, Kyle Frye, and Jed R Brubaker. 2018. Reddit rules! Characterizing an ecosystem of governance. In 12th International AAAI Conference on Web and Social Media, ICWSM 2018. 72--81. www.reddit.comGoogle ScholarGoogle ScholarCross RefCross Ref
  33. Ed Gilgor. [n.d.]. Is Your 911 Call a Priority? Technical Report. https://grantpark.org/info/16029Google ScholarGoogle Scholar
  34. Tarleton Gillespie. 2018. Custodians of the Internet. Yale University Press. https://yalebooks.yale.edu/book/9780300173130/custodians-internetGoogle ScholarGoogle Scholar
  35. Stephen M. Haas, Meghan E. Irr, Nancy A. Jennings, and Lisa M. Wagner. 2011. Communicating thin: A grounded model of online negative enabling support groups in the pro-anorexia movement. New Media and Society 13, 1 (feb 2011), 40--57. https://doi.org/10.1177/1461444810363910Google ScholarGoogle ScholarCross RefCross Ref
  36. Debarati Halder. 2014. Hate Crimes in Cyberspace. International Journal of Cyber Criminology 8, 2 (2014), 172--175. http://www.jstor.org/stable/j.ctt7zsws7http://search.ebscohost.com/login.aspx?direct=true&db=i3h&AN=101788663&site=ehost-liveGoogle ScholarGoogle Scholar
  37. Hugo L. Hammer, Michael A. Riegler, Lilja Ovrelid, and Erik Velldal. 2019. THREAT: A Large Annotated Corpus for Detection of Violent Threats. In Proceedings - International Workshop on Content-Based Multimedia Indexing, Vol. 2019-Septe. IEEE Computer Society. https://doi.org/10.1109/CBMI.2019.8877435Google ScholarGoogle ScholarCross RefCross Ref
  38. Frederik Hjorth and Rebecca Adler-Nissen. 2019. Ideological asymmetry in the reach of pro-Russian digital disinformation to United States audiences. Journal of Communication 69, 2 (apr 2019), 168--192. https://doi.org/10.1093/joc/jqz006Google ScholarGoogle ScholarCross RefCross Ref
  39. Shagun Jhaver, Iris Birman, Eric Gilbert, and Amy Bruckman. 2019. Human-machine collaboration for content regulation: The case of reddit automoderator. ACM Transactions on Computer-Human Interaction 26, 5 (jul 2019), 1--35. https://doi.org/10.1145/3338243Google ScholarGoogle ScholarDigital LibraryDigital Library
  40. Jialun Jiang, Charles Kiene, Skyler Middler, Jed R. Brubaker, and Casey Fiesler. 2019. Moderation challenges in voice-based online communities on discord. Proceedings of the ACM on Human-Computer Interaction 3, CSCW (nov 2019), 1--23. https://doi.org/10.1145/3359157Google ScholarGoogle ScholarDigital LibraryDigital Library
  41. Jialun "Aaron" Jiang, Skyler Middler, Jed R. Brubaker, and Casey Fiesler. 2020. Characterizing Community Guidelines on Social Media Platforms. CSCW'20 Companion (2020). https://doi.org/10.1145/3406865.3418312Google ScholarGoogle ScholarDigital LibraryDigital Library
  42. Kate Klonick. 2018. The new governors: The people, rules, and processes governing online speech. Harvard Law Review 131, 6 (2018), 1599--1670. https://harvardlawreview.org/2018/04/the-new-governors-the-people-rules-and-processes-governing-online-speech/Google ScholarGoogle Scholar
  43. Jason Koebler and Joseph Cox. 2018. The Impossible Job: Inside Facebook's Struggle to Moderate Two Billion People., Aug 23 pages. https://www.vice.com/en/article/xwk9zd/how-facebook-content-moderation-workshttps://www.vice.com/en_us/article/xwk9zd/how-facebook-content-moderation-worksGoogle ScholarGoogle Scholar
  44. Kaylee Payne Kruzan, Janis Whitlock, Natalya N. Bazarova, Katherine D. Miller, Julia Chapman, and Andrea Stevenson Won. 2020. Supporting Self-Injury Recovery: The Potential for Virtual Reality Intervention. In Conference on Human Factors in Computing Systems - Proceedings. Association for Computing Machinery. https://doi.org/10.1145/3313831.3376396Google ScholarGoogle ScholarDigital LibraryDigital Library
  45. Ponnurangam Kumaraguru, Yong Rhee, Alessandro Acquisti, Lorrie Faith Cranor, Jason Hong, and Elizabeth Nunge. 2007. Protecting people from phishing: The design and evaluation of an embedded training email system. In Conference on Human Factors in Computing Systems - Proceedings. ACM Press, New York, New York, USA, 905--914. https://doi.org/10.1145/1240624.1240760Google ScholarGoogle ScholarDigital LibraryDigital Library
  46. Haewoon Kwak, Jeremy Blackburn, and Seungyeop Han. 2015. Exploring cyberbullying and other toxic behavior in team competition online games. In Conference on Human Factors in Computing Systems - Proceedings, Vol. 2015-April. Association for Computing Machinery, New York, New York, USA, 3739--3748. https://doi.org/10.1145/2702123.2702529 arXiv:1504.02305Google ScholarGoogle ScholarDigital LibraryDigital Library
  47. Caitlin E Lawson. 2015. Cascading Exploitations: A Digital Analysis of the Celebrity Nude Photo Hack. Technical Report. https://doi.org/10.5210/SPIR.V5I0.8490Google ScholarGoogle ScholarCross RefCross Ref
  48. Sonia Livingstone, Lucyna Kirwil, Cristina Ponte, and Elisabeth Staksrud. 2014. In their own words: What bothers children online? European Journal of Communication 29, 3 (jun 2014), 271--288. https://doi.org/10.1177/0267323114521045Google ScholarGoogle ScholarCross RefCross Ref
  49. Adrienne L. Massanari. 2020. Gamergate. In The International Encyclopedia of Gender, Media, and Communication. Wiley, 1--5. https://doi.org/10.1002/9781119429128.iegmc014Google ScholarGoogle ScholarCross RefCross Ref
  50. Tara Matthews, Kathleen O'Leary, Anna Turner, Manya Sleeper, Jill Palzkill Woelfer, Martin Shelton, Cori Manthorne, Elizabeth F. Churchill, and Sunny Consolvo. 2017. Stories from survivors: Privacy & security practices when coping with intimate partner abuse. In Conference on Human Factors in Computing Systems - Proceedings, Vol. 2017-May. Association for Computing Machinery, New York, NY, USA, 2189--2201. https://doi.org/10.1145/3025453.3025875Google ScholarGoogle ScholarDigital LibraryDigital Library
  51. Sarah Myers West. 2018. Censored, suspended, shadowbanned: User interpretations of content moderation on social media platforms. New Media & Society 20, 11 (nov 2018), 4366--4383. https://doi.org/10.1177/1461444818773059Google ScholarGoogle ScholarCross RefCross Ref
  52. Fayika Farhat Nova, Md Rashidujjaman Rifat, Pratyasha Saha, Syed Ishtiaque Ahmed, and Shion Guha. 2018. Silenced voices: Understanding sexual harassment on anonymous social media among Bangladeshi people. In Proceedings of the ACM Conference on Computer Supported Cooperative Work, CSCW. Association for Computing Machinery, New York, NY, USA, 209--212. https://doi.org/10.1145/3272973.3274057Google ScholarGoogle ScholarDigital LibraryDigital Library
  53. Chloé Nurik. 2019. "Men Are Scum": Self-Regulation, Hate Speech, and Gender-Based Censorship on Facebook. International Journal of Communication 13 (2019), 21. http://ijoc.org.Google ScholarGoogle Scholar
  54. Jessica A. Pater, Moon K. Kim, Elizabeth D. Mynatt, and Casey Fiesler. 2016. Characterizations of online harassment: Comparing policies across social media platforms. In Proceedings of the International ACM SIGGROUP Conference on Supporting Group Work, Vol. 13--16-Nove. Association for Computing Machinery, New York, NY, USA, 369--374. https://doi.org/10.1145/2957276.2957297Google ScholarGoogle ScholarDigital LibraryDigital Library
  55. Lynne Peeples. 2020. What the data say about police brutality and racial bias - and which reforms might work., 22--24 pages. https://doi.org/10.1038/d41586-020-01846-zGoogle ScholarGoogle ScholarCross RefCross Ref
  56. Shruti Phadke, Jonathan Lloyd, James Hawdon, Mattia Samory, and Tanushree Mitra. 2018. Framing hate with hate frames: Designing the codebook. In Proceedings of the ACM Conference on Computer Supported Cooperative Work, CSCW. Association for Computing Machinery, New York, NY, USA, 201--204. https://doi.org/10.1145/3272973.3274055Google ScholarGoogle ScholarDigital LibraryDigital Library
  57. Bailey Poland. 2016. Haters: Harassment, abuse, and violence online. 1--301 pages. https://www.jstor.org/stable/j.ctt1fq9wdpGoogle ScholarGoogle ScholarCross RefCross Ref
  58. Dallas Police. 2016. Communications Operations Center (Handling Calls for Service). Technical Report.Google ScholarGoogle Scholar
  59. Zoe Quinn. 2017. Crash Override: How Gamergate (Nearly) Destroyed My Life, and How We Can Win the Fight Against Online Hate. 242 pages. https://books.google.com/books/about/Crash_Override.html?id=gpvUDQAAQBAJGoogle ScholarGoogle Scholar
  60. Elissa M Redmiles, Jessica Bodford, and Lindsay Blackwell. 2019. "I just want to feel safe": A diary study of safety perceptions on social media. In Proceedings of the 13th International Conference on Web and Social Media, ICWSM 2019, Vol. 13. 405--416. www.aaai.orgGoogle ScholarGoogle ScholarCross RefCross Ref
  61. Kathryn E Ringland, Christine T Wolf, Lynn Dombrowski, and Gillian R Hayes. 2015. Making "Safe". In CSCW. 1788--1800. https://doi.org/10.1145/2675133.2675216Google ScholarGoogle ScholarDigital LibraryDigital Library
  62. Sarah T. Roberts. 2019. Behind the Screen. Yale University Press. https://yalebooks.yale.edu/book/9780300235883/behind-screenGoogle ScholarGoogle Scholar
  63. Adi Robertson. 2014. 'Massacre' threat forces Anita Sarkeesian to cancel university talk - The Verge. https://www.theverge.com/2014/10/14/6978809/utah-state-university-receives-shooting-threat-for-anita-sarkeesian-visitGoogle ScholarGoogle Scholar
  64. Minna Ruckenstein and Linda Lisa Maria Turunen. 2020. Re-humanizing the platform: Content moderators and the logic of care. New Media and Society 22, 6 (jun 2020), 1026--1042. https://doi.org/10.1177/1461444819875990Google ScholarGoogle ScholarCross RefCross Ref
  65. Valeriya Safronova and Rebecca Halleck. 2019. These Rape Victims Had to Sue to Get the Police to Investigate. https://www.nytimes.com/2019/05/23/us/rape-victims-kits-police-departments.htmlGoogle ScholarGoogle Scholar
  66. Johnny Saldana. 2013. The Coding Manual for Qualitative Researchers Instruction. Sage (2013), 299. www.sagepublications.comGoogle ScholarGoogle Scholar
  67. Morgan Klaus Scheuerman, Stacy M Branham, and Foad Hamidi. 2018. Safe Spaces and Safe Places: Unpacking Technology-Mediated Experiences of Safety and Harm with Transgender People. Proceedings of the ACM on Human-Computer Interaction 2 (2018), 29.Google ScholarGoogle ScholarDigital LibraryDigital Library
  68. S Schrock and D Boyd. 2009. Online threats to youth: Solicitation, harassment, and problematic content. In Enhancing Child Safety and Online Technologies. http://cyber.law.harvard.edu/research/isttfGoogle ScholarGoogle Scholar
  69. Joseph Seering, Tony Wang, Jina Yoon, and Geoff Kaufman. 2019. Moderator engagement and community development in the age of algorithms. New Media and Society 21, 7 (jul 2019), 1417--1443. https://doi.org/10.1177/1461444818821316Google ScholarGoogle ScholarCross RefCross Ref
  70. Irving Seidman. 1998. Interviewing as Qualitative Research: A Guide for Researchers in Education and the Social Sciences. Teachers College Press. https://books.google.com/books/about/Interviewing_as_Qualitative_Research.html?id=DhpjQgAACAAJ&source=kp_book_descriptionhttps://books.google.co.uk/books?hl=en&lr=&id=pk1Rmq-Y15QC&oi=fnd&pg=PR9&ots=4pl7SRNPJR&sig=rRd9I_WNECoUTA7KzGwTti_R3g0&redir_esc=y#vGoogle ScholarGoogle Scholar
  71. Jana Shakarian, Andrew T. Gunn, and Paulo Shakarian. 2016. Exploring malicious hacker forums. In Cyber Deception: Building the Scientific Foundation. Springer International Publishing, 259--282. https://doi.org/10.1007/978--3--319--32699--3_11Google ScholarGoogle ScholarCross RefCross Ref
  72. Vivek K. Singh, Marie L. Radford, Qianjia Huang, and Susan Furrer. 2017. "They basically like destroyed the school one day": On Newer App Features and Cyberbullying in Schools. In Proceedings of the 2017 ACM Conference on Computer Supported Cooperative Work and Social Computing - CSCW '17. ACM Press, New York, New York, USA, 1210--1216. https://doi.org/10.1145/2998181.2998279Google ScholarGoogle ScholarDigital LibraryDigital Library
  73. Donna Spencer and Jesse James Garrett. 2009. Card Sorting: Designing Usable Categories - Donna Spencer - Google Books. Rosenfeld Media. 162 pages. https://books.google.com/books/about/Card_Sorting.html?id=_h4D9gqi5tsC&source=kp_book_descriptionhttps://books.google.com.cy/books?hl=en&lr=&id=-nk3DwAAQBAJ&oi=fnd&pg=PP1&dq=card+sorting+web+design&ots=2__cH6MatE&sig=i2cJh6KKSmAjc_zKoaS8HxnFaiU&redir_escGoogle ScholarGoogle Scholar
  74. Alice Speri, Alleen Brown, and Mara Hvistendahl. [n.d.]. The George Floyd Killing Exposes Failures of Police Reform. https://theintercept.com/2020/05/29/george-floyd-minneapolis-police-reform/Google ScholarGoogle Scholar
  75. Alexandra To, Wenxia Sweeney, Jessica Hammer, and Geoff Kaufman. 2020. "they Just Don't Get It": Towards Social Technologies for Coping with Interpersonal Racism. Proceedings of the ACM on Human-Computer Interaction 4, CSCW1 (may 2020), 29. https://doi.org/10.1145/3392828Google ScholarGoogle ScholarDigital LibraryDigital Library
  76. Twitter. [n.d.]. Twitter Terms of Service. https://twitter.com/en/tosGoogle ScholarGoogle Scholar
  77. Brendesha M. Tynes, Henry A. Willis, Ashley M. Stewart, and Matthew W. Hamilton. 2019. Race-Related Traumatic Events Online and Mental Health Among Adolescents of Color. Journal of Adolescent Health 65, 3 (sep 2019), 371--377. https://doi.org/10.1016/j.jadohealth.2019.03.006Google ScholarGoogle ScholarCross RefCross Ref
  78. James Vincent. 2019. AI won't relieve the misery of Facebook's human moderators. https://www.theverge.com/2019/2/27/18242724/facebook-moderation-ai-artificial-intelligence-platformsGoogle ScholarGoogle Scholar
  79. Jessica Vitak, Kalyani Chadha, Linda Steiner, and Zahra Ashktorab. 2017. Identifying Women's Experiences With and Strategies for Mitigating Negative Effects of Online Harassment. Proceedings of the 2017 ACM Conference on Computer Supported Cooperative Work and Social Computing (CSCW '17) (2017), 1231--1245. https://doi.org/10.1145/2998181.2998337Google ScholarGoogle ScholarDigital LibraryDigital Library
  80. Nick Wingfield. 2014. Feminist Critics of Video Games Facing Threats in 'GamerGate' Campaign. https://www.nytimes.com/2014/10/16/technology/gamergate-women-video-game-threats-anita-sarkeesian.htmlhttps://www.nytimes.com/2014/10/16/technology/gamergate-women-video-game-threats-anita-sarkeesian.html?_r=0Google ScholarGoogle Scholar
  81. Donghee Yvette Wohn. 2019. Volunteer moderators in twitch micro communities: How they get involved, the roles they play, and the emotional labor they experience. In Conference on Human Factors in Computing Systems - Proceedings. Association for Computing Machinery, New York, New York, USA, 1--13. https://doi.org/10.1145/3290605.3300390Google ScholarGoogle ScholarDigital LibraryDigital Library
  82. Eva Zangerle and Günther Specht. 2014. "Sorry, i was hacked" a classification of compromised Twitter accounts. In Proceedings of the ACM Symposium on Applied Computing. Association for Computing Machinery, New York, New York, USA, 587--593. https://doi.org/10.1145/2554850.2554894Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. A Framework of Severity for Harmful Content Online

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in

      Full Access

      • Published in

        cover image Proceedings of the ACM on Human-Computer Interaction
        Proceedings of the ACM on Human-Computer Interaction  Volume 5, Issue CSCW2
        CSCW2
        October 2021
        5376 pages
        EISSN:2573-0142
        DOI:10.1145/3493286
        Issue’s Table of Contents

        Copyright © 2021 Owner/Author

        This work is licensed under a Creative Commons Attribution-NonCommercial International 4.0 License.

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 18 October 2021
        Published in pacmhci Volume 5, Issue CSCW2

        Check for updates

        Qualifiers

        • research-article

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader