Abstract
The proliferation of harmful content on online social media platforms has necessitated empirical understandings of experiences of harm online and the development of practices for harm mitigation. Both understandings of harm and approaches to mitigating that harm, often through content moderation, have implicitly embedded frameworks of prioritization-what forms of harm should be researched, how policy on harmful content should be implemented, and how harmful content should be moderated. To aid efforts of better understanding the variety of online harms, how they relate to one another, and how to prioritize harms relevant to research, policy, and practice, we present a theoretical framework of severity for harmful online content. By employing a grounded theory approach, we developed a framework of severity based on interviews and card-sorting activities conducted with 52 participants over the course of ten months. Through our analysis, we identified four Types of Harm (physical, emotional, relational, and financial) and eight Dimensions along which the severity of harm can be understood (perspectives, intent, agency, experience, scale, urgency, vulnerability, sphere). We describe how our framework can be applied to both research and policy settings towards deeper understandings of specific forms of harm (e.g., harassment) and prioritization frameworks when implementing policies encompassing many forms of harm.
- [n.d.]. Optimal Workshop | User Experience (UX) Research Platform. https://www.optimalworkshop.com/Google Scholar
- Sarah A. Aghazadeh, Alison Burns, Jun Chu, Hazel Feigenblatt, Elizabeth Laribee, Lucy Maynard, Amy L. M. Meyers, Jessica L. O'Brien, and Leah Rufus. 2018. GamerGate: A Case Study in Online Harassment. In Online Harassment. Springer, Cham, 179--207. https://doi.org/10.1007/978--3--319--78583--7_8Google ScholarCross Ref
- Harriet Alexander. 2020. Woman jailed for shooting her rapist dead after he threatened to kill her. https://www.independent.co.uk/news/world/americas/alabama-rape-shooting-murder-brittany-smith-todd-jail-sentence-b936467.htmlGoogle Scholar
- Maitri Amin. 2016. A survey of financial losses due to malware. In ACM International Conference Proceeding Series, Vol. 04-05-Marc. Association for Computing Machinery, New York, New York, USA, 1--4. https://doi.org/10.1145/2905055.2905362Google ScholarDigital Library
- Nazanin Andalibi, Pinar Ozturk, and Andrea Forte. 2017. Sensitive Self-disclosures, Responses, and Social Support on Instagram. In Proceedings of the 2017 ACM Conference on Computer Supported Cooperative Work and Social Computing - CSCW '17. 1485--1500. https://doi.org/10.1145/2998181.2998243Google ScholarDigital Library
- Nazanin Andalibi, Pinar Ozturk, and Andrea Forte. 2017. Sensitive Self-disclosures, Responses, and Social Support on Instagram: The Case of #Depression. In Proceedings of the 2017 ACM Conference on Computer Supported Cooperative Work and Social Computing - CSCW '17. ACM Press, New York, New York, USA, 1485--1500. https://doi.org/10.1145/ 2998181.2998243Google ScholarDigital Library
- Jeff Asher and Ben Horwitz. 2020. How Do the Police Actually Spend Their Time? https://www.nytimes.com/2020/06/19/upshot/unrest-police-time-violent-crime.htmlGoogle Scholar
- Zahra Ashktorab and Jessica Vitak. 2016. Designing cyberbullying mitigation and prevention solutions through participatory design with teenagers. In Conference on Human Factors in Computing Systems - Proceedings. Association for Computing Machinery, New York, NY, USA, 3895--3905. https://doi.org/10.1145/2858036.2858548Google ScholarDigital Library
- Jessica Aycock. 2019. Criminalizing the Victim: Ending Prosecution of Human Trafficking Victims. SSRN Electronic Journal (feb 2019). https://doi.org/10.2139/ssrn.3327525Google ScholarCross Ref
- Mary Elizabeth Ballard and Kelly Marie Welch. 2017. Virtual Warfare: Cyberbullying and Cyber-Victimization in MMOG Play. Games and Culture 12, 5 (2017), 466--491. https://doi.org/10.1177/1555412015592473Google ScholarCross Ref
- Lindsay Blackwell, Jill Dimond, Sarita Schoenebeck, and Cliff Lampe. 2017. Classification and its consequences for online harassment: Design insights from HeartMob. Proceedings of the ACM on Human-Computer Interaction 1, CSCW (nov 2017), 1--19. https://doi.org/10.1145/3134659Google ScholarDigital Library
- Lindsay Blackwell, Nicole Ellison, Natasha Elliott-Deflo, and Raz Schwartz. 2019. Harassment in social virtual reality: Challenges for platform governance. , 25 pages. https://doi.org/10.1145/3359202Google ScholarDigital Library
- Lindsay Blackwell, Mark Handel, Sarah T. Roberts, Amy Bruckman, and Kimberly Voll. 2018. Understanding "bad actors" online. In Conference on Human Factors in Computing Systems - Proceedings, Vol. 2018-April. ACM Press, New York, New York, USA, 1--7. https://doi.org/10.1145/3170427.3170610Google ScholarDigital Library
- Andrea Braithwaite. 2016. It's About Ethics in Games Journalism? Gamergaters and Geek Masculinity. Social Media and Society 2, 4 (nov 2016), 205630511667248. https://doi.org/10.1177/2056305116672484Google ScholarCross Ref
- Robyn Caplan. 2018. Content or context moderation? Artisanal, community-reliant, and industrial approaches. Data & Society (2018). https://datasociety.net/library/content-or-context-moderation/Google Scholar
- Stevie Chancellor, Jessica Pater, Trustin Clear, Eric Gilbert, and Munmun De Choudhury. 2016. Thyghgapp: Instagram content moderation and lexical variation in Pro-Eating disorder communities. In Proceedings of the ACM Conference on Computer Supported Cooperative Work, CSCW, Vol. 27. Association for Computing Machinery, New York, New York, USA, 1201--1213. https://doi.org/10.1145/2818048.2819963Google ScholarDigital Library
- Eshwar Chandrasekharan, Chaitrali Gandhi, Matthew Wortley Mustelier, and Eric Gilbert. 2019. CrossMod: A cross-community learning-based system to assist reddit moderators. Proceedings of the ACM on Human-Computer Interaction 3, CSCW (nov 2019), 1--30. https://doi.org/10.1145/3359276Google ScholarDigital Library
- Kathy Charmaz. 2006. Constructing Grounded Theory: A Practical Guide Through Qualitative Analysis. 388 pages. http://www.sxf.uevora.pt/wp-content/uploads/2013/03/Charmaz_2006.pdfGoogle Scholar
- Elizabeth Charters. 2003. The Use of Think-aloud Methods in Qualitative Research An Introduction to Think-aloud Methods. Brock Education Journal 12, 2 (jul 2003). https://doi.org/10.26522/brocked.v12i2.38Google ScholarCross Ref
- Despoina Chatzakou, Nicolas Kourtellis, Jeremy Blackburn, Emiliano De Cristofaro, Gianluca Stringhini, and Athena Vakali. 2019. Measuring #Gamergate: A tale of hate, sexism, and bullying. In 26th International World Wide Web Conference 2017, WWW 2017 Companion. International World Wide Web Conferences Steering Committee, 1285--1290. https://doi.org/10.1145/3041021.3053890 arXiv:1702.07784Google ScholarDigital Library
- Irfan Chaudhry. 2015. #Hashtagging hate: Using Twitter to track racism online. First Monday 20, 2 (feb 2015). https://doi.org/10.5210/fm.v20i2.5450Google ScholarCross Ref
- Christine L Cook, Aashka Patel, and Donghee Yvette Wohn. 2021. Commercial Versus Volunteer: Comparing User Perceptions of Toxicity and Transparency in Content Moderation Across Social Media Platforms. Frontiers in Human Dynamics 3 (feb 2021), 3. https://doi.org/10.3389/fhumd.2021.626409Google ScholarCross Ref
- Juliet Corbin and Anselm Strauss. 2014. Basics of Qualitative Research: Techniques and Procedures for Developing Grounded Theory. SAGE Publications Inc. https://us.sagepub.com/en-us/nam/basics-of-qualitative-research/book235578http://us.sagepub.com/en-us/nam/basics-of-qualitative-research/book235578Google Scholar
- Brandon Dang, Martin J. Riedl, and Matthew Lease. 2018. But Who Protects the Moderators? The Case of Crowdsourced Image Moderation. (apr 2018). arXiv:1804.10999 http://arxiv.org/abs/1804.10999Google Scholar
- City of Eugene Police Department. 2009. Police Call Priority Definitions. Technical Report. www.eugene-or.gov/policeGoogle Scholar
- Ritam Dutt, Ashok Deb, and Emilio Ferrara. 2019. ?senator, We Sell Ads": Analysis of the 2016 russian facebook ads campaign. In Communications in Computer and Information Science, Vol. 941. Springer Verlag, 151--168. https://doi.org/10.1007/978--981--13--3582--2_12 arXiv:1809.10158Google ScholarCross Ref
- Facebook. [n.d.]. Community Standards. ([n. d.]). https://www.facebook.com/communitystandards/violence_criminal_behaviorGoogle Scholar
- Julia R. Fernandez and Jeremy Birnholtz. 2019. "I don't want them to not know": Investigating decisions to disclose transgender identity on dating platforms. Proceedings of the ACM on Human-Computer Interaction 3, CSCW (nov 2019), 1--21. https://doi.org/10.1145/3359328Google ScholarDigital Library
- Miriam Fernandez and Harith Alani. 2018. Online Misinformation: Challenges and Future Directions. In The Web Conference 2018 - Companion of the World Wide Web Conference, WWW 2018. Association for Computing Machinery, Inc, New York, New York, USA, 595--602. https://doi.org/10.1145/3184558.3188730Google ScholarDigital Library
- Jessica L. Feuston, Alex S. Taylor, and Anne Marie Piper. 2020. Conformity of Eating Disorders through Content Moderation. Proceedings of the ACM on Human-Computer Interaction 4, CSCW1 (may 2020). https://doi.org/10.1145/3392845Google ScholarDigital Library
- Maggie Fick and Dave Paresh. 2019. INSIGHT-Facebook's flood of languages leave it struggling to monitor content. https://www.reuters.com/article/facebook-languages/insight-facebooks-flood-of-languages-leave-it-struggling-to-monitor-content-idUSL1N20U01Ehttps://www.reuters.com/article/us-facebook-languages-insight-idUSKCN1RZ0DWGoogle Scholar
- Casey Fiesler, Jialun Aaron Jiang, Joshua McCann, Kyle Frye, and Jed R Brubaker. 2018. Reddit rules! Characterizing an ecosystem of governance. In 12th International AAAI Conference on Web and Social Media, ICWSM 2018. 72--81. www.reddit.comGoogle ScholarCross Ref
- Ed Gilgor. [n.d.]. Is Your 911 Call a Priority? Technical Report. https://grantpark.org/info/16029Google Scholar
- Tarleton Gillespie. 2018. Custodians of the Internet. Yale University Press. https://yalebooks.yale.edu/book/9780300173130/custodians-internetGoogle Scholar
- Stephen M. Haas, Meghan E. Irr, Nancy A. Jennings, and Lisa M. Wagner. 2011. Communicating thin: A grounded model of online negative enabling support groups in the pro-anorexia movement. New Media and Society 13, 1 (feb 2011), 40--57. https://doi.org/10.1177/1461444810363910Google ScholarCross Ref
- Debarati Halder. 2014. Hate Crimes in Cyberspace. International Journal of Cyber Criminology 8, 2 (2014), 172--175. http://www.jstor.org/stable/j.ctt7zsws7http://search.ebscohost.com/login.aspx?direct=true&db=i3h&AN=101788663&site=ehost-liveGoogle Scholar
- Hugo L. Hammer, Michael A. Riegler, Lilja Ovrelid, and Erik Velldal. 2019. THREAT: A Large Annotated Corpus for Detection of Violent Threats. In Proceedings - International Workshop on Content-Based Multimedia Indexing, Vol. 2019-Septe. IEEE Computer Society. https://doi.org/10.1109/CBMI.2019.8877435Google ScholarCross Ref
- Frederik Hjorth and Rebecca Adler-Nissen. 2019. Ideological asymmetry in the reach of pro-Russian digital disinformation to United States audiences. Journal of Communication 69, 2 (apr 2019), 168--192. https://doi.org/10.1093/joc/jqz006Google ScholarCross Ref
- Shagun Jhaver, Iris Birman, Eric Gilbert, and Amy Bruckman. 2019. Human-machine collaboration for content regulation: The case of reddit automoderator. ACM Transactions on Computer-Human Interaction 26, 5 (jul 2019), 1--35. https://doi.org/10.1145/3338243Google ScholarDigital Library
- Jialun Jiang, Charles Kiene, Skyler Middler, Jed R. Brubaker, and Casey Fiesler. 2019. Moderation challenges in voice-based online communities on discord. Proceedings of the ACM on Human-Computer Interaction 3, CSCW (nov 2019), 1--23. https://doi.org/10.1145/3359157Google ScholarDigital Library
- Jialun "Aaron" Jiang, Skyler Middler, Jed R. Brubaker, and Casey Fiesler. 2020. Characterizing Community Guidelines on Social Media Platforms. CSCW'20 Companion (2020). https://doi.org/10.1145/3406865.3418312Google ScholarDigital Library
- Kate Klonick. 2018. The new governors: The people, rules, and processes governing online speech. Harvard Law Review 131, 6 (2018), 1599--1670. https://harvardlawreview.org/2018/04/the-new-governors-the-people-rules-and-processes-governing-online-speech/Google Scholar
- Jason Koebler and Joseph Cox. 2018. The Impossible Job: Inside Facebook's Struggle to Moderate Two Billion People., Aug 23 pages. https://www.vice.com/en/article/xwk9zd/how-facebook-content-moderation-workshttps://www.vice.com/en_us/article/xwk9zd/how-facebook-content-moderation-worksGoogle Scholar
- Kaylee Payne Kruzan, Janis Whitlock, Natalya N. Bazarova, Katherine D. Miller, Julia Chapman, and Andrea Stevenson Won. 2020. Supporting Self-Injury Recovery: The Potential for Virtual Reality Intervention. In Conference on Human Factors in Computing Systems - Proceedings. Association for Computing Machinery. https://doi.org/10.1145/3313831.3376396Google ScholarDigital Library
- Ponnurangam Kumaraguru, Yong Rhee, Alessandro Acquisti, Lorrie Faith Cranor, Jason Hong, and Elizabeth Nunge. 2007. Protecting people from phishing: The design and evaluation of an embedded training email system. In Conference on Human Factors in Computing Systems - Proceedings. ACM Press, New York, New York, USA, 905--914. https://doi.org/10.1145/1240624.1240760Google ScholarDigital Library
- Haewoon Kwak, Jeremy Blackburn, and Seungyeop Han. 2015. Exploring cyberbullying and other toxic behavior in team competition online games. In Conference on Human Factors in Computing Systems - Proceedings, Vol. 2015-April. Association for Computing Machinery, New York, New York, USA, 3739--3748. https://doi.org/10.1145/2702123.2702529 arXiv:1504.02305Google ScholarDigital Library
- Caitlin E Lawson. 2015. Cascading Exploitations: A Digital Analysis of the Celebrity Nude Photo Hack. Technical Report. https://doi.org/10.5210/SPIR.V5I0.8490Google ScholarCross Ref
- Sonia Livingstone, Lucyna Kirwil, Cristina Ponte, and Elisabeth Staksrud. 2014. In their own words: What bothers children online? European Journal of Communication 29, 3 (jun 2014), 271--288. https://doi.org/10.1177/0267323114521045Google ScholarCross Ref
- Adrienne L. Massanari. 2020. Gamergate. In The International Encyclopedia of Gender, Media, and Communication. Wiley, 1--5. https://doi.org/10.1002/9781119429128.iegmc014Google ScholarCross Ref
- Tara Matthews, Kathleen O'Leary, Anna Turner, Manya Sleeper, Jill Palzkill Woelfer, Martin Shelton, Cori Manthorne, Elizabeth F. Churchill, and Sunny Consolvo. 2017. Stories from survivors: Privacy & security practices when coping with intimate partner abuse. In Conference on Human Factors in Computing Systems - Proceedings, Vol. 2017-May. Association for Computing Machinery, New York, NY, USA, 2189--2201. https://doi.org/10.1145/3025453.3025875Google ScholarDigital Library
- Sarah Myers West. 2018. Censored, suspended, shadowbanned: User interpretations of content moderation on social media platforms. New Media & Society 20, 11 (nov 2018), 4366--4383. https://doi.org/10.1177/1461444818773059Google ScholarCross Ref
- Fayika Farhat Nova, Md Rashidujjaman Rifat, Pratyasha Saha, Syed Ishtiaque Ahmed, and Shion Guha. 2018. Silenced voices: Understanding sexual harassment on anonymous social media among Bangladeshi people. In Proceedings of the ACM Conference on Computer Supported Cooperative Work, CSCW. Association for Computing Machinery, New York, NY, USA, 209--212. https://doi.org/10.1145/3272973.3274057Google ScholarDigital Library
- Chloé Nurik. 2019. "Men Are Scum": Self-Regulation, Hate Speech, and Gender-Based Censorship on Facebook. International Journal of Communication 13 (2019), 21. http://ijoc.org.Google Scholar
- Jessica A. Pater, Moon K. Kim, Elizabeth D. Mynatt, and Casey Fiesler. 2016. Characterizations of online harassment: Comparing policies across social media platforms. In Proceedings of the International ACM SIGGROUP Conference on Supporting Group Work, Vol. 13--16-Nove. Association for Computing Machinery, New York, NY, USA, 369--374. https://doi.org/10.1145/2957276.2957297Google ScholarDigital Library
- Lynne Peeples. 2020. What the data say about police brutality and racial bias - and which reforms might work., 22--24 pages. https://doi.org/10.1038/d41586-020-01846-zGoogle ScholarCross Ref
- Shruti Phadke, Jonathan Lloyd, James Hawdon, Mattia Samory, and Tanushree Mitra. 2018. Framing hate with hate frames: Designing the codebook. In Proceedings of the ACM Conference on Computer Supported Cooperative Work, CSCW. Association for Computing Machinery, New York, NY, USA, 201--204. https://doi.org/10.1145/3272973.3274055Google ScholarDigital Library
- Bailey Poland. 2016. Haters: Harassment, abuse, and violence online. 1--301 pages. https://www.jstor.org/stable/j.ctt1fq9wdpGoogle ScholarCross Ref
- Dallas Police. 2016. Communications Operations Center (Handling Calls for Service). Technical Report.Google Scholar
- Zoe Quinn. 2017. Crash Override: How Gamergate (Nearly) Destroyed My Life, and How We Can Win the Fight Against Online Hate. 242 pages. https://books.google.com/books/about/Crash_Override.html?id=gpvUDQAAQBAJGoogle Scholar
- Elissa M Redmiles, Jessica Bodford, and Lindsay Blackwell. 2019. "I just want to feel safe": A diary study of safety perceptions on social media. In Proceedings of the 13th International Conference on Web and Social Media, ICWSM 2019, Vol. 13. 405--416. www.aaai.orgGoogle ScholarCross Ref
- Kathryn E Ringland, Christine T Wolf, Lynn Dombrowski, and Gillian R Hayes. 2015. Making "Safe". In CSCW. 1788--1800. https://doi.org/10.1145/2675133.2675216Google ScholarDigital Library
- Sarah T. Roberts. 2019. Behind the Screen. Yale University Press. https://yalebooks.yale.edu/book/9780300235883/behind-screenGoogle Scholar
- Adi Robertson. 2014. 'Massacre' threat forces Anita Sarkeesian to cancel university talk - The Verge. https://www.theverge.com/2014/10/14/6978809/utah-state-university-receives-shooting-threat-for-anita-sarkeesian-visitGoogle Scholar
- Minna Ruckenstein and Linda Lisa Maria Turunen. 2020. Re-humanizing the platform: Content moderators and the logic of care. New Media and Society 22, 6 (jun 2020), 1026--1042. https://doi.org/10.1177/1461444819875990Google ScholarCross Ref
- Valeriya Safronova and Rebecca Halleck. 2019. These Rape Victims Had to Sue to Get the Police to Investigate. https://www.nytimes.com/2019/05/23/us/rape-victims-kits-police-departments.htmlGoogle Scholar
- Johnny Saldana. 2013. The Coding Manual for Qualitative Researchers Instruction. Sage (2013), 299. www.sagepublications.comGoogle Scholar
- Morgan Klaus Scheuerman, Stacy M Branham, and Foad Hamidi. 2018. Safe Spaces and Safe Places: Unpacking Technology-Mediated Experiences of Safety and Harm with Transgender People. Proceedings of the ACM on Human-Computer Interaction 2 (2018), 29.Google ScholarDigital Library
- S Schrock and D Boyd. 2009. Online threats to youth: Solicitation, harassment, and problematic content. In Enhancing Child Safety and Online Technologies. http://cyber.law.harvard.edu/research/isttfGoogle Scholar
- Joseph Seering, Tony Wang, Jina Yoon, and Geoff Kaufman. 2019. Moderator engagement and community development in the age of algorithms. New Media and Society 21, 7 (jul 2019), 1417--1443. https://doi.org/10.1177/1461444818821316Google ScholarCross Ref
- Irving Seidman. 1998. Interviewing as Qualitative Research: A Guide for Researchers in Education and the Social Sciences. Teachers College Press. https://books.google.com/books/about/Interviewing_as_Qualitative_Research.html?id=DhpjQgAACAAJ&source=kp_book_descriptionhttps://books.google.co.uk/books?hl=en&lr=&id=pk1Rmq-Y15QC&oi=fnd&pg=PR9&ots=4pl7SRNPJR&sig=rRd9I_WNECoUTA7KzGwTti_R3g0&redir_esc=y#vGoogle Scholar
- Jana Shakarian, Andrew T. Gunn, and Paulo Shakarian. 2016. Exploring malicious hacker forums. In Cyber Deception: Building the Scientific Foundation. Springer International Publishing, 259--282. https://doi.org/10.1007/978--3--319--32699--3_11Google ScholarCross Ref
- Vivek K. Singh, Marie L. Radford, Qianjia Huang, and Susan Furrer. 2017. "They basically like destroyed the school one day": On Newer App Features and Cyberbullying in Schools. In Proceedings of the 2017 ACM Conference on Computer Supported Cooperative Work and Social Computing - CSCW '17. ACM Press, New York, New York, USA, 1210--1216. https://doi.org/10.1145/2998181.2998279Google ScholarDigital Library
- Donna Spencer and Jesse James Garrett. 2009. Card Sorting: Designing Usable Categories - Donna Spencer - Google Books. Rosenfeld Media. 162 pages. https://books.google.com/books/about/Card_Sorting.html?id=_h4D9gqi5tsC&source=kp_book_descriptionhttps://books.google.com.cy/books?hl=en&lr=&id=-nk3DwAAQBAJ&oi=fnd&pg=PP1&dq=card+sorting+web+design&ots=2__cH6MatE&sig=i2cJh6KKSmAjc_zKoaS8HxnFaiU&redir_escGoogle Scholar
- Alice Speri, Alleen Brown, and Mara Hvistendahl. [n.d.]. The George Floyd Killing Exposes Failures of Police Reform. https://theintercept.com/2020/05/29/george-floyd-minneapolis-police-reform/Google Scholar
- Alexandra To, Wenxia Sweeney, Jessica Hammer, and Geoff Kaufman. 2020. "they Just Don't Get It": Towards Social Technologies for Coping with Interpersonal Racism. Proceedings of the ACM on Human-Computer Interaction 4, CSCW1 (may 2020), 29. https://doi.org/10.1145/3392828Google ScholarDigital Library
- Twitter. [n.d.]. Twitter Terms of Service. https://twitter.com/en/tosGoogle Scholar
- Brendesha M. Tynes, Henry A. Willis, Ashley M. Stewart, and Matthew W. Hamilton. 2019. Race-Related Traumatic Events Online and Mental Health Among Adolescents of Color. Journal of Adolescent Health 65, 3 (sep 2019), 371--377. https://doi.org/10.1016/j.jadohealth.2019.03.006Google ScholarCross Ref
- James Vincent. 2019. AI won't relieve the misery of Facebook's human moderators. https://www.theverge.com/2019/2/27/18242724/facebook-moderation-ai-artificial-intelligence-platformsGoogle Scholar
- Jessica Vitak, Kalyani Chadha, Linda Steiner, and Zahra Ashktorab. 2017. Identifying Women's Experiences With and Strategies for Mitigating Negative Effects of Online Harassment. Proceedings of the 2017 ACM Conference on Computer Supported Cooperative Work and Social Computing (CSCW '17) (2017), 1231--1245. https://doi.org/10.1145/2998181.2998337Google ScholarDigital Library
- Nick Wingfield. 2014. Feminist Critics of Video Games Facing Threats in 'GamerGate' Campaign. https://www.nytimes.com/2014/10/16/technology/gamergate-women-video-game-threats-anita-sarkeesian.htmlhttps://www.nytimes.com/2014/10/16/technology/gamergate-women-video-game-threats-anita-sarkeesian.html?_r=0Google Scholar
- Donghee Yvette Wohn. 2019. Volunteer moderators in twitch micro communities: How they get involved, the roles they play, and the emotional labor they experience. In Conference on Human Factors in Computing Systems - Proceedings. Association for Computing Machinery, New York, New York, USA, 1--13. https://doi.org/10.1145/3290605.3300390Google ScholarDigital Library
- Eva Zangerle and Günther Specht. 2014. "Sorry, i was hacked" a classification of compromised Twitter accounts. In Proceedings of the ACM Symposium on Applied Computing. Association for Computing Machinery, New York, New York, USA, 587--593. https://doi.org/10.1145/2554850.2554894Google ScholarDigital Library
Index Terms
- A Framework of Severity for Harmful Content Online
Recommendations
Detecting Harmful Content on Online Platforms: What Platforms Need vs. Where Research Efforts Go
The proliferation of harmful content on online platforms is a major societal problem, which comes in many different forms, including hate speech, offensive language, bullying and harassment, misinformation, spam, violence, graphic content, sexual abuse, ...
Online risks obstructing safe internet access for students
Purpose -- The purpose of this paper is to provide an overall insight into the factors which undermine safe internet access for students. Safer internet access for students is an issue raised during recent years as the web becomes increasingly more ...
Modeling safety and airworthiness (RTCA DO-178B) information: conceptual model and UML profile
Several safety-related standards exist for developing and certifying safety-critical systems. System safety assessments are common practice and system certification according to a standard requires submitting relevant system safety information to ...
Comments