“It’s common and a part of being a content creator”: Understanding How Creators Experience and Cope with Hate and Harassment Online
暂无分享,去创建一个
[1] Tara Matthews,et al. SoK: A Framework for Unifying At-Risk User Research , 2021, 2022 IEEE Symposium on Security and Privacy (SP).
[2] Sunny Consolvo,et al. Designing Toxic Content Classification for a Diversity of Perspectives , 2021, SOUPS @ USENIX Security Symposium.
[3] Tara Matthews,et al. "Why wouldn't someone think of democracy as a target?": Security practices & challenges of people involved with U.S. political campaigns , 2021, USENIX Security Symposium.
[4] Transgender People’s Technology Needs to Support Health and Transition , 2021, CHI.
[5] Yubo Kou,et al. Flag and Flaggability in Automated Moderation: The Case of Reporting Toxic Behavior in an Online Game Community , 2021, CHI.
[6] “Disadvantaged in the American-dominated Internet”: Sex, Work, and Technology , 2021, CHI.
[7] Nicola Dell,et al. A Digital Safety Dilemma: Analysis of Computer-Mediated Computer Security Interventions for Intimate Partner Violence During COVID-19 , 2021, CHI.
[8] Michael S. Bernstein,et al. The Disagreement Deconvolution: Bringing Machine Learning Performance Metrics In Line With Reality , 2021, CHI.
[9] Tadayoshi Kohno,et al. Defensive Technology Use by Political Activists During the Sudanese Revolution , 2021, 2021 IEEE Symposium on Security and Privacy (SP).
[10] Nicola Dell,et al. The Role of Computer Security Customer Support in Helping Survivors of Intimate Partner Violence , 2021, USENIX Security Symposium.
[11] Elissa M. Redmiles,et al. "It's stressful having all these phones": Investigating Sex Workers' Safety Goals, Risks, and Practices Online , 2021, USENIX Security Symposium.
[12] Thomas Ristenpart,et al. The Tools and Tactics Used in Intimate Partner Surveillance: An Analysis of Online Infidelity Forums , 2020, USENIX Security Symposium.
[13] Ada Lerner,et al. Privacy and Activism in the Transgender Community , 2020, CHI.
[14] Sonia Chiasson,et al. 'Lime', 'Open Lock', and 'Blocked': Children's Perception of Colors, Symbols, and Words in Cybersecurity Warnings , 2020, CHI.
[15] Bruce Schneier,et al. Privacy threats in intimate relationships , 2020, J. Cybersecur..
[16] Apu Kapadia,et al. "I am uncomfortable sharing what I can't see": Privacy Concerns of the Visually Impaired with Camera Based Assistive Applications , 2020, USENIX Security Symposium.
[17] Donghee Yvette Wohn,et al. What are Effective Strategies of Handling Harassment on Twitch?: Users' Perspectives , 2019, CSCW Companion.
[18] Casey Fiesler,et al. Moderation Challenges in Voice-based Online Communities on Discord , 2019, Proc. ACM Hum. Comput. Interact..
[19] Nicola Dell,et al. Computer Security and Privacy in the Interactions Between Victim Service Providers and Human Trafficking Survivors , 2019, USENIX Security Symposium.
[20] David Nemer,et al. "They Don't Leave Us Alone Anywhere We Go": Gender and Digital Abuse in South Asia , 2019, CHI.
[21] Bryan C. Semaan,et al. Moderation Practices as Emotional Labor in Sustaining Online Communities: The Case of AAPI Identity Work on Reddit , 2019, CHI.
[22] Helena M. Mentis,et al. Upside and Downside Risk in Online Security for Older Adults with Mild Cognitive Impairment , 2019, CHI.
[23] Tara Matthews,et al. Tough Times at Transitional Homeless Shelters: Considering the Impact of Financial Insecurity on Digital Security and Privacy , 2019, CHI.
[24] Angelika Strohmayer,et al. Technologies for Social Justice: Lessons from Sex Workers on the Front Lines , 2019, CHI.
[25] Jay Chen,et al. "Everyone Has Some Personal Stuff": Designing to Support Digital Privacy with Shared Mobile Phone Use in Bangladesh , 2019, CHI.
[26] Donghee Yvette Wohn,et al. Volunteer Moderators in Twitch Micro Communities: How They Get Involved, the Roles They Play, and the Emotional Labor They Experience , 2019, CHI.
[27] Jun Zhao,et al. `I make up a silly name': Understanding Children's Perception of Privacy Risks Online , 2019, CHI.
[28] Gianluca Stringhini,et al. "You Know What to Do" , 2018, Proceedings of the ACM on Human-Computer Interaction.
[29] Jeremy Blackburn,et al. "You Know What to Do" , 2018, Proc. ACM Hum. Comput. Interact..
[30] Yang Wang,et al. Cooperative Privacy and Security: Learning from People with Visual Impairments and Their Allies , 2019, SOUPS @ USENIX Security Symposium.
[31] A. Bruckman,et al. Human-Machine Collaboration for Content Regulation: The Case of Reddit Automoderator , 2019, ACM Trans. Comput. Hum. Interact..
[32] Nicola Dell,et al. Clinical Computer Security for Victims of Intimate Partner Violence , 2019, USENIX Security Symposium.
[33] Serge Egelman,et al. Privacy and Security Threat Models and Mitigation Strategies of Older Adults , 2019, SOUPS @ USENIX Security Symposium.
[34] Lucy Vasserman,et al. Measuring and Mitigating Unintended Bias in Text Classification , 2018, AIES.
[35] Sarah Myers West. Censored, suspended, shadowbanned: User interpretations of content moderation on social media platforms , 2018 .
[36] Priya Kumar,et al. 'I Knew It Was Too Good to Be True" , 2018, Proc. ACM Hum. Comput. Interact..
[37] Morgan Klaus Scheuerman,et al. Safe Spaces and Safe Places , 2018, Proc. ACM Hum. Comput. Interact..
[38] David R. Karger,et al. Squadbox: A Tool to Combat Email Harassment Using Friendsourced Moderation , 2018, CHI.
[39] David R. Karger,et al. Squadbox: A Tool To Combat Online Harassment Using Friendsourced Moderation , 2018, CHI Extended Abstracts.
[40] Kentaro Toyama,et al. Keeping a Low Profile?: Technology, Risk and Privacy among Undocumented Immigrants , 2018, CHI.
[41] Ada Lerner,et al. Computer Security and Privacy for Refugees in the United States , 2018, 2018 IEEE Symposium on Security and Privacy (SP).
[42] A. Bruckman,et al. Online Harassment and Content Moderation , 2018 .
[43] Hongfei Fan,et al. Computer Supported Cooperative Work and Social Computing , 2018, Communications in Computer and Information Science.
[44] David Nemer,et al. "Privacy is not for me, it's for those rich women": Performative Privacy Practices on Mobile Phones by Women in South Asia , 2018, SOUPS @ USENIX Security Symposium.
[45] J. Golbeck. Online Harassment , 2020, Human Resource Management International Digest.
[46] Eric Gilbert,et al. Online Harassment and Content Moderation: The Case of Blocklists , 2018, ACM Trans. Comput. Hum. Interact..
[47] S. Hewitt,et al. 2017 , 2017, Les 25 ans de l’OMC: Une rétrospective en photos.
[48] Cliff Lampe,et al. Classification and Its Consequences for Online Harassment , 2017, Proc. ACM Hum. Comput. Interact..
[49] Lynne M. Coventry,et al. Privacy Considerations when Designing Social Network Systems to Support Successful Ageing , 2017, CHI.
[50] Tara Matthews,et al. Stories from Survivors: Privacy & Security Practices when Coping with Intimate Partner Abuse , 2017, CHI.
[51] Zahra Ashktorab,et al. Identifying Women's Experiences With and Strategies for Mitigating Negative Effects of Online Harassment , 2017, CSCW.
[52] Lucas Dixon,et al. Ex Machina: Personal Attacks Seen at Scale , 2016, WWW.
[53] Mahdi N. Al-Ameen,et al. Learning System-assigned Passwords: A Preliminary Study on the People with Learning Disabilities , 2017, SOUPS.
[54] Elizabeth D. Mynatt,et al. Characterizations of Online Harassment: Comparing Policies Across Social Media Platforms , 2016, GROUP.
[55] Franziska Roesner,et al. Individual versus Organizational Computer Security and Privacy Concerns in Journalism , 2016, Proc. Priv. Enhancing Technol..
[56] Zahra Ashktorab,et al. Designing Cyberbullying Mitigation and Prevention Solutions through Participatory Design With Teenagers , 2016, CHI.
[57] Xuan Zhao,et al. The Social Media Ecology: User Perceptions, Strategies and Challenges , 2016, CHI.
[58] Volker Wulf,et al. ICT Use by Prominent Activists in Republika Srpska , 2016, CHI.
[59] Kate Crawford,et al. What is a flag for? Social media reporting tools and the vocabulary of complaint , 2016, New Media Soc..
[60] Franziska Roesner,et al. Investigating the Computer Security Practices and Needs of Journalists , 2015, USENIX Security Symposium.
[61] David J. Crandall,et al. Privacy Concerns and Behaviors of People with Visual Impairments , 2015, CHI.