{"id":870108,"date":"2022-08-16T11:38:28","date_gmt":"2022-08-16T18:38:28","guid":{"rendered":"https:\/\/www.microsoft.com\/en-us\/research\/"},"modified":"2022-08-16T11:38:28","modified_gmt":"2022-08-16T18:38:28","slug":"pro-self-harm-and-the-visibility-of-youth-generated-problematic-content","status":"publish","type":"msr-research-item","link":"https:\/\/www.microsoft.com\/en-us\/research\/publication\/pro-self-harm-and-the-visibility-of-youth-generated-problematic-content\/","title":{"rendered":"Pro-Self-Harm and the Visibility of Youth-Generated Problematic Content"},"content":{"rendered":"

The increasing ubiquity of the Internet in the everyday lives of youth has been accompanied by a whole new set of anxieties and concerns. While many have worried about how the Internet increases youth access to problematic content\u2014including pornographic and violent content\u2014little consideration has been paid to youth-generated problematic content. This article examines one genre of youth-generated problematic content: that which advocates self-harm practices. Countless websites and online communities are devoted to the topic of deliberate self-harm, ranging from online therapy and support groups to \u2015pro-anorexia\u2016 and \u2015pro-cutting\u2016 websites, and much of the content on these websites is produced by and for youth. This paper seeks to provide an overview of what is known about the spectrum of self-harm practices and how technology inflects these practices in new ways. We begin with a brief introductory section detailing a working definition of self-harm based on the most recent published literature, outline the general prevalence and demographics, and note the correlations between self-harm practices, eating disorders, and the media. The latter half of this article summarizes various approaches to handling online self-harm content, ranging from censoring content (through Internet Service Provider (ISP) policies and governmental regulations) to providing support for those struggling with the underlying issues associated with deliberate self-harm (e.g., media literacy programs, online support groups, and grassroots social movements and campaigns). Given that censorship of such content often results in pushing it further underground, we recommend solutions that address the underlying sociocultural forces that motivate youth to engage in self-harm practices, and call for further research into these phenomena.<\/p>\n","protected":false},"excerpt":{"rendered":"

The increasing ubiquity of the Internet in the everyday lives of youth has been accompanied by a whole new set of anxieties and concerns. While many have worried about how the Internet increases youth access to problematic content\u2014including pornographic and violent content\u2014little consideration has been paid to youth-generated problematic content. This article examines one genre […]<\/p>\n","protected":false},"featured_media":0,"template":"","meta":{"msr-url-field":"","msr-podcast-episode":"","msrModifiedDate":"","msrModifiedDateEnabled":false,"ep_exclude_from_search":false,"footnotes":""},"msr-content-type":[3],"msr-research-highlight":[],"research-area":[13559],"msr-publication-type":[193715],"msr-product-type":[],"msr-focus-area":[],"msr-platform":[],"msr-download-source":[],"msr-locale":[268875],"msr-field-of-study":[],"msr-conference":[],"msr-journal":[],"msr-impact-theme":[],"msr-pillar":[],"class_list":["post-870108","msr-research-item","type-msr-research-item","status-publish","hentry","msr-research-area-social-sciences","msr-locale-en_us"],"msr_publishername":"","msr_edition":"","msr_affiliation":"","msr_published_date":"2011-1","msr_host":"","msr_duration":"","msr_version":"","msr_speaker":"","msr_other_contributors":"","msr_booktitle":"","msr_pages_string":"","msr_chapter":"","msr_isbn":"","msr_journal":"I\/S: A Journal of Law and Policy for the Information Society","msr_volume":"7","msr_number":"","msr_editors":"","msr_series":"","msr_issue":"1","msr_organization":"","msr_how_published":"","msr_notes":"","msr_highlight_text":"","msr_release_tracker_id":"","msr_original_fields_of_study":"","msr_download_urls":"","msr_external_url":"","msr_secondary_video_url":"","msr_longbiography":"","msr_microsoftintellectualproperty":1,"msr_main_download":"","msr_publicationurl":"","msr_doi":"","msr_publication_uploader":[{"type":"url","viewUrl":"false","id":"false","title":"https:\/\/www.danah.org\/papers\/2011\/IS-ProSelfHarm.pdf","label_id":"243132","label":0}],"msr_related_uploader":"","msr_attachments":[],"msr-author-ordering":[{"type":"user_nicename","value":"danah boyd","user_id":31651,"rest_url":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/microsoft-research\/v1\/researchers?person=danah boyd"},{"type":"text","value":"Jenny Ryan","user_id":0,"rest_url":false},{"type":"text","value":"Alex Leavitt","user_id":0,"rest_url":false}],"msr_impact_theme":[],"msr_research_lab":[],"msr_event":[],"msr_group":[],"msr_project":[],"publication":[],"video":[],"download":[],"msr_publication_type":"article","_links":{"self":[{"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-research-item\/870108"}],"collection":[{"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-research-item"}],"about":[{"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/types\/msr-research-item"}],"version-history":[{"count":1,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-research-item\/870108\/revisions"}],"predecessor-version":[{"id":870111,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-research-item\/870108\/revisions\/870111"}],"wp:attachment":[{"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/media?parent=870108"}],"wp:term":[{"taxonomy":"msr-content-type","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-content-type?post=870108"},{"taxonomy":"msr-research-highlight","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-research-highlight?post=870108"},{"taxonomy":"msr-research-area","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/research-area?post=870108"},{"taxonomy":"msr-publication-type","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-publication-type?post=870108"},{"taxonomy":"msr-product-type","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-product-type?post=870108"},{"taxonomy":"msr-focus-area","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-focus-area?post=870108"},{"taxonomy":"msr-platform","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-platform?post=870108"},{"taxonomy":"msr-download-source","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-download-source?post=870108"},{"taxonomy":"msr-locale","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-locale?post=870108"},{"taxonomy":"msr-field-of-study","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-field-of-study?post=870108"},{"taxonomy":"msr-conference","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-conference?post=870108"},{"taxonomy":"msr-journal","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-journal?post=870108"},{"taxonomy":"msr-impact-theme","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-impact-theme?post=870108"},{"taxonomy":"msr-pillar","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-pillar?post=870108"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}