FCJ-167 Spraying, Fishing, Looking for Trouble: the Chinese Internet and a Critical Perspective on the Concept of Trolling
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
Trolls Can Sing and Dance in the Movies
can sing and dance in the Movies TrollsBut let’s be clear! Internet Trolls are not cute or funny! In Internet slang, a troll is a person who creates bad feelings on the Internet by starting quarrels or upsetting people, or by posting inflammatory, extraneous, or off-topic messages with the intent of provoking readers into an emotional outburst. 01. The Insult Troll 06. The Profanity and All-Caps Troll The insult troll is a pure hater, plain and simple. They will This type of troll spews F-bombs and other curse words with his often pick on everyone and anyone - calling them names, caps lock button on. In many cases, these types of trolls are just accusing them of certain things, doing anything they can to bored kids looking for something to do without needing to put too get a negative emotional response from them. This type of much thought or effort into anything. trolling can be considered a serious form of cyberbullying. 02. The Persistent Debate Troll 07. The One Word Only Troll This type of troll loves a good argument. They believe they're There's always that one type of troll who just says "LOL" or "what" or right, and everyone else is wrong. They write long posts and "k" or "yes" or "no." They may not be the worst type of troll online, they're always determined to have the last word - continuing but when a serious or detailed topic is being discussed, their one- to comment until that other user gives up. word replies are just a nuisance. -
Online Harassment: a Legislative Solution
\\jciprod01\productn\H\HLL\54-2\HLL205.txt unknown Seq: 1 11-MAY-17 15:55 ONLINE HARASSMENT: A LEGISLATIVE SOLUTION EMMA MARSHAK* TABLE OF CONTENTS I. INTRODUCTION .......................................... 501 II. WHY IS ONLINE HARASSMENT A PROBLEM?................ 504 R a. The Scope of the Problem ............................ 504 R b. Economic Impact .................................... 507 R i. Lost Business Opportunities ...................... 507 R ii. Swatting ........................................ 510 R iii. Doxxing ........................................ 511 R III. CURRENT LAW .......................................... 512 R a. Divergent State Law ................................. 512 R b. Elements of the Law ................................. 514 R IV. LAW ENFORCEMENT AND INVESTIGATIVE PROBLEMS ........ 515 R a. Police Training ...................................... 515 R b. Investigative Resources .............................. 519 R c. Prosecutorial Jurisdiction ............................ 520 R V. SOLUTION ............................................... 521 R a. Proposed Legislation ................................ 521 R b. National Evidence Laboratory ........................ 526 R c. Training Materials ................................... 526 R VI. CONCLUSION ............................................ 528 R VII. APPENDIX ............................................... 530 R I. INTRODUCTION A journalist publishes an article; rape threats follow in the comments.1 An art curator has a conversation with a visitor to her gallery; -
Why Do People Seek Anonymity on the Internet?
Why Do People Seek Anonymity on the Internet? Informing Policy and Design Ruogu Kang1, Stephanie Brown2, Sara Kiesler1 Human Computer Interaction Institute1 Department of Psychology2 Carnegie Mellon University 5000 Forbes Ave., Pittsburgh, PA 15213 [email protected], [email protected], [email protected] ABSTRACT literature that exists mainly derives from studies of one or a In this research we set out to discover why and how people few online communities or activities (e.g., the study of seek anonymity in their online interactions. Our goal is to 4chan in [5]). We lack a full understanding of the real life inform policy and the design of future Internet architecture circumstances surrounding people’s experiences of seeking and applications. We interviewed 44 people from America, anonymity and their feelings about the tradeoffs between Asia, Europe, and Africa who had sought anonymity and anonymity and identifiability. A main purpose of the asked them about their experiences. A key finding of our research reported here was to learn more about how people research is the very large variation in interviewees’ past think about online anonymity and why they seek it. More experiences and life situations leading them to seek specifically, we wanted to capture a broad slice of user anonymity, and how they tried to achieve it. Our results activities and experiences from people who have actually suggest implications for the design of online communities, sought anonymity, to investigate their experiences, and to challenges for policy, and ways to improve anonymity tools understand their attitudes about anonymous and identified and educate users about the different routes and threats to communication. -
Address Munging: the Practice of Disguising, Or Munging, an E-Mail Address to Prevent It Being Automatically Collected and Used
Address Munging: the practice of disguising, or munging, an e-mail address to prevent it being automatically collected and used as a target for people and organizations that send unsolicited bulk e-mail address. Adware: or advertising-supported software is any software package which automatically plays, displays, or downloads advertising material to a computer after the software is installed on it or while the application is being used. Some types of adware are also spyware and can be classified as privacy-invasive software. Adware is software designed to force pre-chosen ads to display on your system. Some adware is designed to be malicious and will pop up ads with such speed and frequency that they seem to be taking over everything, slowing down your system and tying up all of your system resources. When adware is coupled with spyware, it can be a frustrating ride, to say the least. Backdoor: in a computer system (or cryptosystem or algorithm) is a method of bypassing normal authentication, securing remote access to a computer, obtaining access to plaintext, and so on, while attempting to remain undetected. The backdoor may take the form of an installed program (e.g., Back Orifice), or could be a modification to an existing program or hardware device. A back door is a point of entry that circumvents normal security and can be used by a cracker to access a network or computer system. Usually back doors are created by system developers as shortcuts to speed access through security during the development stage and then are overlooked and never properly removed during final implementation. -
Don't Feed the Trolls: a Cautionary Tale
Don’t Feed the Trolls: others (Linux, of course). In fact, the phrase originated as a reference to the A Cautionary Tale comic book the Fantastic Four, as one of the characters could turn himself DANA SAMUEL into a Human Torch. Chat participants would use the HTML‐styled, bracketed annotation to insult other participants online. In Eddo Stern’s Best. Flame War. Ever. we are presented with an online argu‐ <flame on> You’re pretty stupid for ment over seemingly insignificant not knowing what MMPORPG means. game‐playing topics that grows quickly Go look it up on Wiki. </flame off> out of proportion and out of the realm of online experience. Two collaged When the internet opened to the animated masks – each an amalgam of commercial world, and more people heraldry, knighthood, pixilated joined these groups, more language warriors, fantasy species, castles, and jargon was developed to describe shields and symbols – animate a flame the goings‐on in these communities. A war that actually took place online “troll” is one who writes nasty flames over the role‐playing game Everquest, just to make others angry and to be an MMPORPG. annoying. “Meat‐puppets” and “sock‐ Did I just make you feel like a total puppets” are those who are deceptive “newb”? about their identities or their true Online games, discussion boards and allegiances on a discussion board. communities have developed their How all very “D&D.” own language since these online It’s said, by several theorists, that worlds were first populated in people can be more uninhibited online, research and academia, and then, later they can change their personality, role‐ (post‐cold war, after the military had play and morph into who they no need for such a specialized perceive themselves to be. -
CS 508 102 NOTE Definition of Flaming, Which Asserts Both a Behavioral and Reproductions Supplied by EDRS Are the Best That
DOCUMENT RESUME ED 355 572 CS 508 102 AUTHOR Thompsen, Philip A. TITLE A Social Influence Model of Flaming in Computer-Mediated Communication. PUB DATE Feb 93 NOTE 9p.; Paper presented at the Annual Meeting of the Western States Communication Association (64th, Albuquerque, NM, February 12-16, 1993). PUB TYPE Speeches/Conference Papers (150) -- Viewpoints (Opinion/Position Papers, Essays, etc.) (120) EDRS PRICE MFO1 /PCO1 Plus Postage. DESCRIPTORS Communication Research; Definitions; *Electronic Mail; Higher Education; Interpersonal Communication; Models; *Social Influences IDENTIFIERS *Communication Behavior; Computer Mediated Communication; *Flaming (Computei Mediated Communication) ABSTRACT This paper explores the phenomenon of "flaming," which has been typically cited as an antisocial effect of computer-mediated communication. The paper discusses the diverse range of conceptual and operational definitions of flaming found in the literature. The paper offers a four-point critique of previous theoretical explanations of flaming, and suggests an alternative definition of flaming, which asserts both a behavioral and interpretive dimension to flaming. Drawing from the work of J. Fulk, J. Schmitz, and C. W. Steinfield, the paper then develops a social influence model of flaming that provides.a more flexible and powerful approach than previous theories, while yielding potentially useful insights to guide future research. A figure representing the model is included. (Contains 56 references.)(RS) *********************************************************************** -
Literature Review.Docx
HOW COMPUTER-MEDIATED COMMUNICATION CAN CONFUSE EMOTIONS IN DIVERSE TEAMS by Adam Bartek Submitted in partial fulfillment of the requirements for Departmental Honors in the Department of Information Systems and Supply Chain Management Texas Christian University Fort Worth, Texas May 2, 2014 ii HOW COMPUTER-MEDIATED COMMUNICATION CAN CONFUSE EMOTIONS IN DIVERSE TEAMS Project Approved: Supervising Professor: Beata Jones, Ph.D. Department of Information Systems and Supply Chain Management Charles Greer, Ph.D. Department of Management, Entrepreneurship, and Leadership David Preston, Ph.D. Department of Information Systems and Supply Chain Management iii ABSTRACT This study focused on how various forms of CMC (Computer-mediated communication) were perceived and analyzed in a team setting by different genders and members of different generational groups. Specifically, the aspects of flaming, emoticons, and conflict resolution were examined in detail. Hypotheses concerning flaming were mixed as while all participants disliked flaming, baby boomer-age respondents were more tolerant of it. However, all hypotheses concerning emoticon usage were not supported. Neither gender specifically supported emoticon usage. Also, younger generations were not as supportive of emoticon usage in a team setting as expected. Finally, mixed results were found for hypotheses concerning conflict resolution. While male respondents were more comfortable with conflict over CMC, there was no significantly higher level of comfort concerning conflict and CMC for younger generations. Implications and possible avenues for future research are also discussed. iv ACKNOWLEDGEMENTS This paper would not exist without the assistance and help of numerous professors, advisors, family, and friends. In particular, the guidance of the thesis committee was greatly appreciated. -
I Give Permission for Public Access to My Thesis and for Any Copying to Be Done at the Discretion of the Archives Librarian And/Or the College Librarian
1 I give permission for public access to my thesis and for any copying to be done at the discretion of the archives librarian and/or the College librarian. Emily Merritt 06/22/12 An Analysis of the Discourse of Internet Trolling: A Case Study of Reddit.com Student presenter: Emily Rose Merritt Project advisor: Esther Castro-Cuenca With the proliferation of social media and community discussion and forum websites, interest in understanding and explaining communication on the Internet (with an emphasis on language-based communication) is on the rise. Over time, new genres of interaction have developed that take place primarily or exclusively in online communication, and with them has developed the need to investigate the structure of these interactions, what their function is within conversations and communities, what their place is within certain Internet discourses, and over time what effects they have on communication on and offline. Thus far many of these genres have been deemed at best disruptive and at worst anti-social, but when studied from a judgment-free point of view show high levels of complexity and offer us excellent opportunities to understand how the Internet is shaping and being shaped by new kinds and contexts of communication. One of these genres of interaction that has gained significant fame on some very popular forums and discussion sites is called trolling. Trolling occurs on discussion sites or message boards when a user intentionally posts erroneous or inflammatory information with the intention of provoking a strong reaction out of other users. The objective of this study is to understand the complexities of trolling, as well as some of its functions and outcomes in anonymous online communication. -