[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
research-article
Open access

Toward a Feminist Social Media Vulnerability Taxonomy

Published: 16 April 2023 Publication History

Abstract

Vulnerability intimately shapes the lived human experience and continues to gain attention in computer-supported cooperative work and human-computer interaction scholarship broadly, and in social media studies specifically. Social media comprise sociotechnical affordances that may uniquely shape lived experiences with vulnerability, rendering existing frameworks inadequate for comprehensive examinations of vulnerability as mediated on social media. Through interviews with social media users in the United States (N = 20) and drawing on feminist conceptualizations of vulnerability and social media disclosure and privacy scholarship, we propose a feminist taxonomy of social media vulnerability (FSMV). The FSMV taxonomy reflects vulnerabilitysources, states, andvalences, within which we introduce the state ofnetworked vulnerability andambivalent, desired, andundesired valences. We describe how social media enable forms of vulnerability different from in-person settings, challenge framings that synonymize vulnerability with risk/harm, and facilitate interdisciplinary theory-building. Additionally, we discuss hownetworked, ambivalent, andun/desired vulnerability extend and diverge from prior work to create a theoretically rich taxonomy that is useful for future work on social media and vulnerability. Finally, we discuss implications for design related to granular control over profile, content, and privacy settings, as well as implications for platform accountability, as they pertain to social media vulnerability.

References

[1]
Joseph A. Allen, Tammy Beck, Cliff W. Scott, and Steven G. Rogelberg. 2014. Understanding workplace meetings: A qualitative taxonomy of meeting purposes. Management Research Review, Vol. 37, 9 (Aug. 2014), 791--814. https://doi.org/10.1108/MRR-03--2013-0067
[2]
Irwin Altman and Dalmas A. Taylor. 1973. Social penetration: The development of interpersonal relationships. Holt, Rinehart & Winston, Oxford, England. Pages: viii, 212.
[3]
Nazanin Andalibi. 2019. What Happens After Disclosing Stigmatized Experiences on Identified Social Media: Individual, Dyadic, and Social/Network Outcomes. In Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems. Association for Computing Machinery, New York, NY, USA, 1--15. https://doi.org/10.1145/3290605.3300367
[4]
Nazanin Andalibi. 2020. Disclosure, Privacy, and Stigma on Social Media: Examining Non-Disclosure of Distressing Experiences. ACM Transactions on Computer-Human Interaction, Vol. 27, 3 (June 2020), 1--43. https://doi.org/10.1145/3386600
[5]
Nazanin Andalibi. 2021. Symbolic annihilation through design: Pregnancy loss in pregnancy-related mobile apps. New Media & Society, Vol. 23, 3 (March 2021), 613--631. https://doi.org/10.1177/1461444820984473 Publisher: SAGE Publications.
[6]
Nazanin Andalibi and Andrea Forte. 2018. Announcing Pregnancy Loss on Facebook: A Decision-Making Framework for Stigmatized Disclosures on Identified Social Network Sites. In Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems. ACM, Montreal QC Canada, 1--14. https://doi.org/10.1145/3173574.3173732
[7]
Nazanin Andalibi and Patricia Garcia. 2021. Sensemaking and Coping After Pregnancy Loss: The Seeking and Disruption of Emotional Validation Online. Proceedings of the ACM on Human-Computer Interaction, Vol. 5, CSCW1 (April 2021), 1--32. https://doi.org/10.1145/3449201
[8]
Nazanin Andalibi, Margaret E. Morris, and Andrea Forte. 2018. Testing Waters, Sending Clues: Indirect Disclosures of Socially Stigmatized Experiences on Social Media. Proceedings of the ACM on Human-Computer Interaction, Vol. 2, CSCW (Nov. 2018), 19:1--19:23. https://doi.org/10.1145/3274288
[9]
Nazanin Andalibi, Pinar Ozturk, and Andrea Forte. 2017. Sensitive Self-disclosures, Responses, and Social Support on Instagram: The Case of #Depression. In Proceedings of the 2017 ACM Conference on Computer Supported Cooperative Work and Social Computing (CSCW '17). Association for Computing Machinery, New York, NY, USA, 1485--1500. https://doi.org/10.1145/2998181.2998243
[10]
Alissa N. Antle. 2017. The ethics of doing research with vulnerable populations. Interactions, Vol. 24, 6 (Oct. 2017), 74--77. https://doi.org/10.1145/3137107
[11]
Carolina Are. 2020. How Instagram's algorithm is censoring women and vulnerable users but helping online abusers. Feminist Media Studies, Vol. 20, 5 (July 2020), 741--744. https://doi.org/10.1080/14680777.2020.1783805 Publisher: Routledge _eprint: https://doi.org/10.1080/14680777.2020.1783805.
[12]
Carolina Are. 2021. The Shadowban Cycle: an autoethnography of pole dancing, nudity and censorship on Instagram. Feminist Media Studies (May 2021), 1--18. https://doi.org/10.1080/14680777.2021.1928259
[13]
Kenneth D. Bailey. 1994. Typologies and taxonomies: an introduction to classification techniques. Number 07--102 in Quantitative applications in the social sciences. Sage Publications, Thousand Oaks, Calif.
[14]
Michele Banko, Brendon MacKeen, and Laurie Ray. 2020. A Unified Taxonomy of Harmful Content. In Proceedings of the Fourth Workshop on Online Abuse and Harms. Association for Computational Linguistics, Online, 125--137. https://doi.org/10.18653/v1/2020.alw-1.16
[15]
Kristen Barta. 2021. Beacons over bridges: hashtags, visibility, and sexual assault disclosure on social media. Information, Communication & Society, Vol. 0, 0 (Aug. 2021), 1--18. https://doi.org/10.1080/1369118X.2021.1962946 Publisher: Routledge _eprint: https://doi.org/10.1080/1369118X.2021.1962946.
[16]
Eric P. S. Baumer. 2018. Socioeconomic Inequalities in the Non use of Facebook. In Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems. ACM, Montreal QC Canada, 1--14. https://doi.org/10.1145/3173574.3174190
[17]
Leslie A. Baxter and Barbara M. Montgomery. 1996. Relating: Dialogues and Dialectics. Guilford Press. Google-Books-ID: RG6EujhALsEC.
[18]
Natalya N. Bazarova and Yoon Hyung Choi. 2014. Self-Disclosure in Social Media: Extending the Functional Approach to Disclosure Motivations and Characteristics on Social Network Sites. Journal of Communication, Vol. 64, 4 (Aug. 2014), 635--657. https://doi.org/10.1111/jcom.12106
[19]
Jeremy Birnholtz, Ashley Kraus, Weiwei Zheng, David A. Moskowitz, Kathryn Macapagal, and Darren Gergle. 2020. Sensitive Sharing on Social Media: Exploring Willingness to Disclose PrEP Usage Among Adolescent Males Who Have Sex With Males. Social Media Society, Vol. 6, 3 (July 2020), 205630512095517. https://doi.org/10.1177/2056305120955176
[20]
DANAH BOYD. 2010. Social Network Sites as Networked Publics: Affordances, Dynamics, and Implications. In A Networked Self. Routledge. Num Pages: 20.
[21]
danah boyd. 2014. It's Complicated: The Social Lives of Networked Teens. Yale University Press, New Haven London.
[22]
Elizabeth H. Bradley, Leslie A. Curry, and Kelly J. Devers. 2007. Qualitative Data Analysis for Health Services Research: Developing Taxonomy, Themes, and Theory. Health Services Research, Vol. 42, 4 (Aug. 2007), 1758--1772. https://doi.org/10.1111/j.1475--6773.2006.00684.x
[23]
André Brock Jr. 2020. Distributed Blackness. New York University Press. http://www.degruyter.com/document/doi/10.18574/9781479811908/html Publication Title: Distributed Blackness.
[24]
Sarah L. Buglass, Jens F. Binder, Lucy R. Betts, and Jean D.M. Underwood. 2016. When "friends' collide: Social heterogeneity and user vulnerability on social network sites. Computers in Human Behavior, Vol. 54 (Jan. 2016), 62--72. https://doi.org/10.1016/j.chb.2015.07.039
[25]
Judith Butler. 2016. Rethinking Vulnerability and Resistance. In Vulnerability in Resistance, Judith Butler, Zeynep Gambetti, and Leticia Sabsay (Eds.). Duke University Press, 12--27. http://www.degruyter.com/document/doi/10.1515/9780822373490-004/html Pages: 12--27 Publication Title: Vulnerability in Resistance Section: Vulnerability in Resistance.
[26]
John L. Campbell, Charles Quincy, Jordan Osserman, and Ove K. Pedersen. 2013. Coding In-depth Semistructured Interviews: Problems of Unitization and Intercoder Reliability and Agreement. Sociological Methods & Research, Vol. 42, 3 (Aug. 2013), 294--320. https://doi.org/10.1177/0049124113500475
[27]
Caleb T. Carr and Rebecca A. Hayes. 2015. Social Media: Defining, Developing, and Divining. Atlantic Journal of Communication, Vol. 23, 1 (Jan. 2015), 46--65. https://doi.org/10.1080/15456870.2015.972282 Publisher: Routledge _eprint: https://doi.org/10.1080/15456870.2015.972282.
[28]
Kalyani Chadha, Linda Steiner, Jessica Vitak, and Zahra Ashktorab. 2020. Women's Responses to Online Harassment. International Journal of Communication, Vol. 14, 1 (2020), 239--257. https://ijoc.org/index.php/ijoc/article/view/11683/2906
[29]
Stevie Chancellor, Nazanin Andalibi, Lindsay Blackwell, David Nemer, and Wendy Moncur. 2019. Sensitive Research, Practice and Design in HCI. In Extended Abstracts of the 2019 CHI Conference on Human Factors in Computing Systems (CHI EA '19). Association for Computing Machinery, New York, NY, USA, 1--8. https://doi.org/10.1145/3290607.3299003
[30]
Stephenie R. Chaudoir and Jeffrey D. Fisher. 2010. The disclosure processes model: Understanding disclosure decision making and postdisclosure outcomes among people living with a concealable stigmatized identity. Psychological Bulletin, Vol. 136, 2 (2010), 236--256. https://doi.org/10.1037/a0018193 Place: US Publisher: American Psychological Association.
[31]
Stephenie R. Chaudoir and Diane M. Quinn. 2010. Revealing concealable stigmatized identities: The impact of disclosure motivations and positive first disclosure experiences on fear of disclosure and well-being. The Journal of social issues, Vol. 66, 3 (Sept. 2010), 570--584. https://doi.org/10.1111/j.1540--4560.2010.01663.x
[32]
Janet X. Chen, Allison McDonald, Yixin Zou, Emily Tseng, Kevin A Roundy, Acar Tamersoy, Florian Schaub, Thomas Ristenpart, and Nicola Dell. 2022. Trauma-Informed Computing: Towards Safer Technology Experiences for All. In CHI Conference on Human Factors in Computing Systems. ACM, New Orleans LA USA, 1--20. https://doi.org/10.1145/3491102.3517475
[33]
Nancy L. Collins and Lynn Carol Miller. 1994. Self-disclosure and liking: A meta-analytic review. Psychological Bulletin, Vol. 116, 3 (1994), 457--475. https://doi.org/10.1037/0033--2909.116.3.457 Place: US Publisher: American Psychological Association.
[34]
William D. Crano, Marilynn B. Brewer, and Andrew Lac. 2014. Principles and methods of social research third edition ed.). Routledge, New York.
[35]
Valerian J. Derlega and Janusz Grzelak. 1979. Appropriateness of self-disclosure. In Self-disclosure: Origins, patterns, and implications of openness in interpersonal relationships, Gordon J. Chelune (Ed.). Jossey-Bass, San Francisco, 151--176.
[36]
Michael A. DeVito, Jeremy Birnholtz, Jeffery T. Hancock, Megan French, and Sunny Liu. 2018. How People Form Folk Theories of Social Media Feeds and What it Means for How We Study Self-Presentation. In Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems. ACM, Montreal QC Canada, 1--12. https://doi.org/10.1145/3173574.3173694
[37]
Michael A. Devito, Ashley Marie Walker, Jeremy Birnholtz, Kathryn Ringland, Kathryn Macapagal, Ashley Kraus, Sean Munson, Calvin Liang, and Herman Saksono. 2019. Social Technologies for Digital Wellbeing Among Marginalized Communities. In Conference Companion Publication of the 2019 on Computer Supported Cooperative Work and Social Computing (CSCW '19). Association for Computing Machinery, New York, NY, USA, 449--454. https://doi.org/10.1145/3311957.3359442
[38]
Kathryn Dindia. 1998. 'Going into and coming out of the closet': The dialectics of stigma disclosure. In Dialectical Approaches to Studying Personal Relationships, Barbara M. Montgomery and Leslie A. Baxter (Eds.). Lawrence Erlbaum Associates, Mahwah, NJ, 83--107.
[39]
Brooke Erin Duffy and Ngai Keung Chan. 2019. ?You never really know who's looking": Imagined surveillance across social media platforms. New Media & Society, Vol. 21, 1 (Jan. 2019), 119--138. https://doi.org/10.1177/1461444818791318 Publisher: SAGE Publications.
[40]
Maeve Duggan. 2017. Online Harassment 2017. https://www.pewresearch.org/internet/2017/07/11/online-harassment-2017/
[41]
Evelyne Durocher, Ryoa Chung, Christiane Rochon, and Matthew Hunt. 2016. Understanding and Addressing Vulnerability Following the 2010 Haiti Earthquake: Applying a Feminist Lens to Examine Perspectives of Haitian and Expatriate Health Care Providers and Decision-Makers. Journal of Human Rights Practice, Vol. 8, 2 (July 2016), 219--238. https://doi.org/10.1093/jhuman/huw007
[42]
Motahhare Eslami, Karrie Karahalios, Christian Sandvig, Kristen Vaccaro, Aimee Rickman, Kevin Hamilton, and Alex Kirlik. 2016. First I "like" it, then I hide it: Folk Theories of Social Feeds. In Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems. ACM, San Jose California USA, 2371--2382. https://doi.org/10.1145/2858036.2858494
[43]
Jessica L. Feuston and Anne Marie Piper. 2019. Everyday Experiences: Small Stories and Mental Illness on Instagram. In Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems. ACM, Glasgow Scotland Uk, 1--14. https://doi.org/10.1145/3290605.3300495
[44]
Jessica L. Feuston, Alex S. Taylor, and Anne Marie Piper. 2020. Conformity of Eating Disorders through Content Moderation. Proceedings of the ACM on Human-Computer Interaction, Vol. 4, CSCW1 (May 2020), 040:1--040:28. https://doi.org/10.1145/3392845
[45]
Ryan J. Gallagher, Elizabeth Stowell, Andrea G. Parker, and Brooke Foucault Welles. 2019. Reclaiming Stigmatized Narratives: The Networked Disclosure Landscape of #MeToo. Proceedings of the ACM on Human-Computer Interaction, Vol. 3, CSCW (Nov. 2019), 1--30. https://doi.org/10.1145/3359198
[46]
Aakash Gautam, Chandani Shrestha, Andrew Kulak, Steve Harrison, and Deborah Tatar. 2018. Participatory tensions in working with a vulnerable population. In Proceedings of the 15th Participatory Design Conference: Short Papers, Situated Actions, Workshops and Tutorial - Volume 2 (PDC '18). Association for Computing Machinery, New York, NY, USA, 1--5. https://doi.org/10.1145/3210604.3210629
[47]
Erinn Gilson. 2011. Vulnerability, Ignorance, and Oppression. Hypatia, Vol. 26, 2 (2011), 308--332. https://doi.org/10.1111/j.1527--2001.2010.01158.x
[48]
Barney G. Glaser and Ansel L. Strauss. 1967. The Discovery of Grounded Theory: Strategies for Qualitative Research.
[49]
Oliver Haimson. 2018. Social Media as Social Transition Machinery. Proceedings of the ACM on Human-Computer Interaction, Vol. 2 (Nov. 2018), 63. https://doi.org/10.1145/3274332
[50]
Oliver L. Haimson, Justin Buss, Zu Weinger, Denny L. Starks, Dykee Gorrell, and Briar Sweetbriar Baron. 2020. Trans Time: Safety, Privacy, and Content Warnings on a Transgender-Specific Social Media Site. Proceedings of the ACM on Human-Computer Interaction, Vol. 4, CSCW2 (Oct. 2020), 124:1--124:27. https://doi.org/10.1145/3415195
[51]
Oliver L. Haimson and Anna Lauren Hoffmann. 2016. Constructing and enforcing "authentic" identity online: Facebook, real names, and non-normative identities. First Monday (June 2016). https://doi.org/10.5210/fm.v21i6.6791
[52]
Benjamin Hanckel, Son Vivienne, Paul Byron, Brady Robards, and Brendan Churchill. 2019. ?That's not necessarily for them': LGBTIQ young people, social media platform affordances and identity curation. Media, Culture & Society, Vol. 41, 8 (Nov. 2019), 1261--1278. https://doi.org/10.1177/0163443719846612
[53]
Eszter Hargittai. 2020. Potential Biases in Big Data: Omitted Voices on Social Media. Social Science Computer Review, Vol. 38, 1 (Feb. 2020), 10--24. https://doi.org/10.1177/0894439318788322
[54]
Eszter Hargittai and Eden Litt. 2011. The tweet smell of celebrity success: Explaining variation in Twitter adoption among a diverse group of young adults. New Media & Society, Vol. 13, 5 (Aug. 2011), 824--842. https://doi.org/10.1177/1461444811405805
[55]
Daniel Herron, Nazanin Andalibi, Oliver Haimson, Wendy Moncur, and Elise van den Hoven. 2016. HCI and Sensitive Life Experiences. In Proceedings of the 9th Nordic Conference on Human-Computer Interaction (NordiCHI '16). Association for Computing Machinery, New York, NY, USA, 1--3. https://doi.org/10.1145/2971485.2987673
[56]
Jane Im, Jill Dimond, Melody Berton, Una Lee, Katherine Mustelier, Mark S. Ackerman, and Eric Gilbert. 2021. Yes: Affirmative Consent as a Theoretical Framework for Understanding and Imagining Social Platforms. In Proceedings of the 2021 CHI Conference on Human Factors in Computing Systems. ACM, Yokohama Japan, 1--18. https://doi.org/10.1145/3411764.3445778
[57]
Sarah J. Jackson and Brooke Foucault Welles. 2015. Hijacking #MYNYPD: Social Media Dissent and Networked Counterpublics. Journal of Communication, Vol. 65, 6 (Dec. 2015), 932--952. https://doi.org/10.1111/jcom.12185
[58]
Samantha Jaroszewski, Danielle Lottridge, Oliver L. Haimson, and Katie Quehl. 2018. "Genderfluid" or "Attack Helicopter": Responsible HCI Research Practice with Non-binary Gender Variation in Online Communities. In Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems. ACM, Montreal QC Canada, 1--15. https://doi.org/10.1145/3173574.3173881
[59]
Jialun Aaron Jiang, Morgan Klaus Scheuerman, Casey Fiesler, and Jed R. Brubaker. 2021. Understanding international perceptions of the severity of harmful content online. PLOS ONE, Vol. 16, 8 (Aug. 2021), e0256762. https://doi.org/10.1371/journal.pone.0256762
[60]
Sanja Kapidzic and Susan C Herring. 2015. Race, gender, and self-presentation in teen profile photographs. New Media & Society, Vol. 17, 6 (June 2015), 958--976. https://doi.org/10.1177/1461444813520301
[61]
Nadia Karizat, Daniel Delmonaco, Motahhare Eslami, and Nazanin Andalibi. 2021. Algorithmic Folk Theories and Identity: How TikTok Users Co-Produce Knowledge of Identity and Engage in Algorithmic Resistance. (2021), 41.
[62]
Dilara Kekulluoglu, Kami Vaniea, and Walid Magdy. 2022. Understanding Privacy Switching Behaviour on Twitter. In CHI Conference on Human Factors in Computing Systems (CHI '22). Association for Computing Machinery, New York, NY, USA, 1--14. https://doi.org/10.1145/3491102.3517675
[63]
Hanna Krasnova, Sarah Spiekermann, Ksenia Koroleva, and Thomas Hildebrand. 2010. Online Social Networks: Why We Disclose. Journal of Information Technology, Vol. 25, 2 (June 2010), 109--125. https://doi.org/10.1057/jit.2010.6 Publisher: SAGE Publications Ltd.
[64]
Neha Kumar and Naveena Karusala. 2021. Braving Citational Justice in Human-Computer Interaction. In Extended Abstracts of the 2021 CHI Conference on Human Factors in Computing Systems. ACM, Yokohama Japan, 1--9. https://doi.org/10.1145/3411763.3450389
[65]
Margaret Meek Lange, Wendy Rogers, and Susan Dodds. 2013. Vulnerability in Research Ethics: a Way Forward. Bioethics, Vol. 27, 6 (2013), 333--340. https://doi.org/10.1111/bioe.12032 _eprint: https://onlinelibrary.wiley.com/doi/pdf/10.1111/bioe.12032.
[66]
Caitlin E. Lawson. 2018. Platform vulnerabilities: harassment and misogynoir in the digital attack on Leslie Jones. Information, Communication & Society, Vol. 21, 6 (June 2018), 818--833. https://doi.org/10.1080/1369118X.2018.1437203
[67]
Alex Leavitt. 2015. "This is a Throwaway Account": Temporary Technical Identities and Perceptions of Anonymity in a Massive Online Community. In Proceedings of the 18th ACM Conference on Computer Supported Cooperative Work & Social Computing (CSCW '15). Association for Computing Machinery, New York, NY, USA, 317--327. https://doi.org/10.1145/2675133.2675175
[68]
Jioni A. Lewis, Ruby Mendenhall, Stacy A. Harwood, and Margaret Browne Huntt. 2016. "Ain't I a Woman?": Perceived Gendered Racial Microaggressions Experienced by Black Women. The Counseling Psychologist, Vol. 44, 5 (July 2016), 758--780. https://doi.org/10.1177/0011000016641193
[69]
Eden Litt. 2012. Knock, Knock. Who's There? The Imagined Audience. Journal of Broadcasting & Electronic Media, Vol. 56, 3 (July 2012), 330--345. https://doi.org/10.1080/08838151.2012.705195 Publisher: Routledge _eprint: https://doi.org/10.1080/08838151.2012.705195.
[70]
Catriona Mackenzie, Wendy Rogers, and Susan Dodds (Eds.). 2013. Vulnerability: new essays in ethics and feminist philosophy. Oxford University Press, New York.
[71]
Alice E. Marwick and danah boyd. 2011. I tweet honestly, I tweet passionately: Twitter users, context collapse, and the imagined audience. New Media & Society, Vol. 13, 1 (Feb. 2011), 114--133. https://doi.org/10.1177/1461444810365313 Publisher: SAGE Publications.
[72]
Alice E. Marwick and danah boyd. 2014. Networked privacy: How teenagers negotiate context in social media. New Media & Society, Vol. 16, 7 (Nov. 2014), 1051--1067. https://doi.org/10.1177/1461444814543995
[73]
Nora McDonald, Karla Badillo-Urquiola, Morgan G. Ames, Nicola Dell, Elizabeth Keneski, Manya Sleeper, and Pamela J. Wisniewski. 2020. Privacy and Power: Acknowledging the Importance of Privacy Research and Design for Vulnerable Populations. In Extended Abstracts of the 2020 CHI Conference on Human Factors in Computing Systems (CHI EA '20). Association for Computing Machinery, New York, NY, USA, 1--8. https://doi.org/10.1145/3334480.3375174
[74]
Nora McDonald and Andrea Forte. 2020. The Politics of Privacy Theories: Moving from Norms to Vulnerabilities. In Proceedings of the 2020 CHI Conference on Human Factors in Computing Systems. ACM, Honolulu HI USA, 1--14. https://doi.org/10.1145/3313831.3376167
[75]
Nora McDonald, Sarita Schoenebeck, and Andrea Forte. 2019. Reliability and Inter-rater Reliability in Qualitative Research: Norms and Guidelines for CSCW and HCI Practice. Proceedings of the ACM on Human-Computer Interaction, Vol. 3, CSCW (Nov. 2019), 1--23. https://doi.org/10.1145/3359174
[76]
Matthew B. Miles and A. Michael Huberman. 1994. Qualitative data analysis: An expanded sourcebook, 2nd ed. Sage Publications, Inc, Thousand Oaks, CA, US. Pages: xiv, 338.
[77]
Cosmin Munteanu, Heather Molyneaux, and Susan O'Donnell. 2014. Fieldwork with vulnerable populations. Interactions, Vol. 21, 1 (Jan. 2014), 50--53. https://doi.org/10.1145/2543579
[78]
John A. Naslund and Kelly A. Aschbrenner. 2019. Risks to Privacy With Use of Social Media: Understanding the Views of Social Media Users With Serious Mental Illness. Psychiatric Services, Vol. 70, 7 (July 2019), 561--568. https://doi.org/10.1176/appi.ps.201800520 Publisher: American Psychiatric Publishing.
[79]
Robert C Nickerson, Upkar Varshney, and Jan Muntermann. 2013. A method for taxonomy development and its application in information systems. European Journal of Information Systems, Vol. 22, 3 (May 2013), 336--359. https://doi.org/10.1057/ejis.2012.26
[80]
Julia Omarzu. 2000. A Disclosure Decision Model: Determining How and When Individuals Will Self-Disclose. Personality and Social Psychology Review, Vol. 4, 2 (May 2000), 174--185. https://doi.org/10.1207/S15327957PSPR0402_05 Publisher: SAGE Publications Inc.
[81]
Patrick B O'Sullivan and Caleb T Carr. 2018. Masspersonal communication: A model bridging the mass-interpersonal divide. New Media & Society, Vol. 20, 3 (March 2018), 1161--1180. https://doi.org/10.1177/1461444816686104
[82]
Leysia Palen and Paul Dourish. 2003. Unpacking "privacy" for a networked world. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (CHI '03). Association for Computing Machinery, New York, NY, USA, 129--136. https://doi.org/10.1145/642611.642635
[83]
Michael Quinn Patton. 2015. Qualitative research & evaluation methods: integrating theory and practice fourth edition ed.). SAGE Publications, Inc, Thousand Oaks, California.
[84]
Katy E. Pearce, Jessica Vitak, and Kristen Barta. 2018. Privacy at the Marginstextbar Socially Mediated Visibility: Friendship and Dissent in Authoritarian Azerbaijan. International Journal of Communication, Vol. 12, 0 (March 2018), 22. https://ijoc.org/index.php/ijoc/article/view/7039 Number: 0.
[85]
James W. Pennebaker. 1997. Opening Up: The Healing Power of Expressing Emotions. Guilford Press. Google-Books-ID: F3gF8OoKydQC.
[86]
Danielle Petherbridge. 2016. What's Critical about Vulnerability? Rethinking Interdependence, Recognition, and Power. Hypatia, Vol. 31, 3 (2016), 589--604. https://doi.org/10.1111/hypa.12250
[87]
Sandra Petronio. 2002. Boundaries of Privacy: Dialectics of Disclosure. SUNY Press. Google-Books-ID: gTCsft8zVXgC.
[88]
James Pierce, Sarah Fox, Nick Merrill, and Richmond Wong. 2018. Differential Vulnerabilities and a Diversity of Tactics: What Toolkits Teach Us about Cybersecurity. Proceedings of the ACM on Human-Computer Interaction, Vol. 2, CSCW (Nov. 2018), 139:1--139:24. https://doi.org/10.1145/3274408
[89]
Anthony T. Pinter, Jialun Aaron Jiang, Katie Z. Gach, Melanie M. Sidwell, James E. Dykes, and Jed R. Brubaker. 2019. "Am I Never Going to Be Free of All This Crap?": Upsetting Encounters with Algorithmically Curated Content About Ex-Partners. Proceedings of the ACM on Human-Computer Interaction, Vol. 3, CSCW (Nov. 2019), 1--23. https://doi.org/10.1145/3359172
[90]
Anastasia Powell. 2015. Seeking rape justice: Formal and informal responses to sexual violence through technosocial counter-publics. Theoretical Criminology, Vol. 19, 4 (Nov. 2015), 571--588. https://doi.org/10.1177/1362480615576271
[91]
Anastasia Powell, Adrian J Scott, and Nicola Henry. 2020. Digital harassment and abuse: Experiences of sexuality and gender minority adults. European Journal of Criminology, Vol. 17, 2 (March 2020), 199--223. https://doi.org/10.1177/1477370818788006
[92]
Cassidy Pyle, Lee Roosevelt, Ashley Lacombe-Duncan, and Nazanin Andalibi. 2021. LGBTQ Persons' Pregnancy Loss Disclosures to Known Ties on Social Media: Disclosure Decisions and Ideal Disclosure Environments. In Proceedings of the 2021 CHI Conference on Human Factors in Computing Systems. ACM, Yokohama Japan, 1--17. https://doi.org/10.1145/3411764.3445331
[93]
Wendy Rogers, Catriona Mackenzie, and Susan Dodds. 2012. Why bioethics needs a concept of vulnerability. IJFAB: International Journal of Feminist Approaches to Bioethics, Vol. 5, 2 (Sept. 2012), 11--38. https://doi.org/10.3138/ijfab.5.2.11
[94]
Aja Romano. 2018. YouTube's PewDiePie amplified anti-Semitic rhetoric. Again. Vox (Dec. 2018). https://www.vox.com/2018/12/13/18136253/pewdiepie-vs-tseries-links-to-white-supremacist-alt-right-redpill
[95]
Johnny Saldaña. 2014. Coding and Analysis Strategies. In The Oxford Handbook of Qualitative Research, Patricia Leavy (Ed.). Oxford University Press, 580--598. https://doi.org/10.1093/oxfordhb/9780199811755.013.001
[96]
Michael Salter. 2013. Justice and revenge in online counter-publics: Emerging responses to sexual violence in the age of social media. Crime, Media, Culture: An International Journal, Vol. 9, 3 (Dec. 2013), 225--242. https://doi.org/10.1177/1741659013493918
[97]
Morgan Klaus Scheuerman, Aaron Jiang, Katta Spiel, and Jed R. Brubaker. 2021b. Revisiting Gendered Web Forms: An Evaluation of Gender Inputs with (Non-)Binary People. In Proceedings of the 2021 CHI Conference on Human Factors in Computing Systems. ACM, Yokohama Japan, 1--18. https://doi.org/10.1145/3411764.3445742
[98]
Morgan Klaus Scheuerman, Jialun Aaron Jiang, Casey Fiesler, and Jed R. Brubaker. 2021a. A Framework of Severity for Harmful Content Online. arXiv:2108.04401 [cs] (Aug. 2021). https://doi.org/10.1145/3479512 arXiv: 2108.04401.
[99]
Ari Schlesinger, W. Keith Edwards, and Rebecca E. Grinter. 2017. Intersectional HCI: Engaging Identity through Gender, Race, and Class. In Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems. ACM, Denver Colorado USA, 5412--5427. https://doi.org/10.1145/3025453.3025766
[100]
Sarita Schoenebeck and Lindsay Blackwell. 2021. Reimagining Social Media Governance: Harm, Accountability, and Repair. SSRN Electronic Journal (2021). https://doi.org/10.2139/ssrn.3895779
[101]
Sarita Schoenebeck, Oliver L Haimson, and Lisa Nakamura. 2021. Drawing from justice theories to support targets of online harassment. New Media & Society, Vol. 23, 5 (May 2021), 1278--1300. https://doi.org/10.1177/1461444820913122
[102]
Andi Schwartz. 2020. Radical vulnerability: selfies as a Femme-inine mode of resistance. Psychology & Sexuality (Aug. 2020), 1--14. https://doi.org/10.1080/19419899.2020.1810745
[103]
Bryan Semaan, Lauren M. Britton, and Bryan Dosono. 2017. Military Masculinity and the Travails of Transitioning: Disclosure in Social Media. In Proceedings of the 2017 ACM Conference on Computer Supported Cooperative Work and Social Computing. ACM, Portland Oregon USA, 387--403. https://doi.org/10.1145/2998181.2998221
[104]
Elisabeth Sheff. 2014. The polyamorists next door: inside multiple-partner relationships and families. Rowman & Littlefield Publishers, Inc, Lanham.
[105]
William B. Stiles. 1987. "I Have to Talk to Somebody". In Self-Disclosure: Theory, Research, and Therapy, Valerian J. Derlega and John H. Berg (Eds.). Springer US, Boston, MA, 257--282. https://doi.org/10.1007/978--1--4899--3523--6_12
[106]
Elizabeth Stowell, Mercedes C. Lyson, Herman Saksono, Reneé C. Wurth, Holly Jimison, Misha Pavel, and Andrea G. Parker. 2018. Designing and Evaluating mHealth Interventions for Vulnerable Populations: A Systematic Review. In Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems. Association for Computing Machinery, New York, NY, USA, 1--17. http://doi.org/10.1145/3173574.3173589
[107]
Jeffrey W. Treem and Paul M. Leonardi. 2013. Social Media Use in Organizations: Exploring the Affordances of Visibility, Editability, Persistence, and Association. Annals of the International Communication Association, Vol. 36, 1 (Jan. 2013), 143--189. https://doi.org/10.1080/23808985.2013.11679130 Publisher: Routledge _eprint: https://doi.org/10.1080/23808985.2013.11679130.
[108]
Jeffrey W. Treem, Paul M. Leonardi, and Bart van den Hooff. 2020. Computer-Mediated Communication in the Age of Communication Visibility. Journal of Computer-Mediated Communication, Vol. 25, 1 (March 2020), 44--59. https://doi.org/10.1093/jcmc/zmz024
[109]
Anthony Henry Triggs, Kristian Møller, and Christina Neumayer. 2021. Context collapse and anonymity among queer Reddit users. New Media & Society, Vol. 23, 1 (Jan. 2021), 5--21. https://doi.org/10.1177/1461444819890353 Publisher: SAGE Publications.
[110]
Zeynep Tufekci. 2017. Twitter and Tear Gas: The Power and Fragility of Networked Protest. Yale University Press. Google-Books-ID: x7S_DgAAQBAJ.
[111]
Tanvir C Turin, Tasnima Abedin, Nashit Chowdhury, Mahzabin Ferdous, Marcus Vaska, Nahid Rumana, Rossana Urrutia, and Mohammad Ziaul Islam Chowdhury. 2020. Community engagement with immigrant communities involving health and wellness research: a systematic review protocol towards developing a taxonomy of community engagement definitions, frameworks, and methods. BMJ Open, Vol. 10, 4 (April 2020), e035649. https://doi.org/10.1136/bmjopen-2019-035649
[112]
John Vines, Roisin McNaney, Rachel Clarke, Stephen Lindsay, John McCarthy, Steve Howard, Mario Romero, and Jayne Wallace. 2013. Designing for- and with- vulnerable people. In CHI '13 Extended Abstracts on Human Factors in Computing Systems (CHI EA '13). Association for Computing Machinery, New York, NY, USA, 3231--3234. https://doi.org/10.1145/2468356.2479654
[113]
Jessica Vitak, Katie Shilton, and Zahra Ashktorab. 2016. Beyond the Belmont Principles: Ethical Challenges, Practices, and Beliefs in the Online Data Research Community. In Proceedings of the 19th ACM Conference on Computer-Supported Cooperative Work & Social Computing. ACM, San Francisco California USA, 941--953. https://doi.org/10.1145/2818048.2820078
[114]
Ashley Marie Walker and Michael A. DeVito. 2020. "'More gay' fits in better": Intracommunity Power Dynamics and Harms in Online LGBTQ Spaces. In Proceedings of the 2020 CHI Conference on Human Factors in Computing Systems. ACM, Honolulu HI USA, 1--15. https://doi.org/10.1145/3313831.3376497
[115]
Tao Wang, Monica Garfield, Pamela Wisniewski, and Xinru Page. 2020. Benefits and Challenges for Social Media Users on the Autism Spectrum. In Conference Companion Publication of the 2020 on Computer Supported Cooperative Work and Social Computing. Association for Computing Machinery, New York, NY, USA, 419--424. https://doi.org/10.1145/3406865.3418322
[116]
Renwen Zhang, Natalya N. Bazarova, and Madhu Reddy. 2021. Distress Disclosure across Social Media Platforms during the COVID-19 Pandemic: Untangling the Effects of Platforms, Affordances, and Audiences. In Proceedings of the 2021 CHI Conference on Human Factors in Computing Systems. 1--15. http://doi.org/10.1145/3411764.3445134
[117]
Xuan Zhao, Cliff Lampe, and Nicole B. Ellison. 2016. The Social Media Ecology: User Perceptions, Strategies and Challenges. In Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems. ACM, San Jose California USA, 89--100. https://doi.org/10.1145/2858036.2858333showDOI

Cited By

View all
  • (2024)Threat Modeling Healthcare Privacy in the United StatesACM Transactions on Computer-Human Interaction10.1145/3704634Online publication date: 18-Nov-2024
  • (2024)Carefully Unmaking the “Marginalized User:” A Diffractive Analysis of a Gay Online CommunityACM Transactions on Computer-Human Interaction10.1145/3673229Online publication date: 14-Jun-2024
  • (2024)Theorizing Self Visibility on Social Media: A Visibility Objects LensACM Transactions on Computer-Human Interaction10.1145/366033731:3(1-28)Online publication date: 22-Apr-2024

Index Terms

  1. Toward a Feminist Social Media Vulnerability Taxonomy

    Recommendations

    Comments

    Please enable JavaScript to view thecomments powered by Disqus.

    Information & Contributors

    Information

    Published In

    cover image Proceedings of the ACM on Human-Computer Interaction
    Proceedings of the ACM on Human-Computer Interaction  Volume 7, Issue CSCW1
    CSCW
    April 2023
    3836 pages
    EISSN:2573-0142
    DOI:10.1145/3593053
    Issue’s Table of Contents
    Permission to make digital or hard copies of part or all of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for third-party components of this work must be honored. For all other uses, contact the Owner/Author.

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 16 April 2023
    Published in PACMHCI Volume 7, Issue CSCW1

    Check for updates

    Author Tags

    1. feminist
    2. identity
    3. power
    4. social media
    5. taxonomy
    6. vulnerability

    Qualifiers

    • Research-article

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)425
    • Downloads (Last 6 weeks)68
    Reflects downloads up to 12 Dec 2024

    Other Metrics

    Citations

    Cited By

    View all
    • (2024)Threat Modeling Healthcare Privacy in the United StatesACM Transactions on Computer-Human Interaction10.1145/3704634Online publication date: 18-Nov-2024
    • (2024)Carefully Unmaking the “Marginalized User:” A Diffractive Analysis of a Gay Online CommunityACM Transactions on Computer-Human Interaction10.1145/3673229Online publication date: 14-Jun-2024
    • (2024)Theorizing Self Visibility on Social Media: A Visibility Objects LensACM Transactions on Computer-Human Interaction10.1145/366033731:3(1-28)Online publication date: 22-Apr-2024

    View Options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Login options

    Full Access

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media