Life-Cycle of Internet Trolls

Total Page:16

File Type:pdf, Size:1020Kb

Life-Cycle of Internet Trolls Terho Jussinoja LIFE-CYCLE OF INTERNET TROLLS UNIVERSITY OF JYVÄSKYLÄ FACULTY OF INFORMATION TECHNOLOGY 2018 ABSTRACT Jussinoja, Terho Life-cycle of Internet Trolls Jyväskylä: University of Jyväskylä, 2018, 107 p. Information Systems, Master’s Thesis This paper is a master’s thesis about internet trolls and trolling with the main goal of finding what is the life-cycle of internet trolls. In other words, how a person becomes a troll, how their trolling evolves, and how does trolling stop. Trolling definitions are also examined to see whether they are adequate. This thesis also covers the current state of research done on trolling, with the empha- sis on literature that is relevant to the life-cycle of a troll. The literature will also be evaluated against the results from this study. Past research on trolling is quite scarce when comparing to the multiple topics it holds, suggesting that the scientific understanding of internet trolls is still less than ideal. Most of the pre- vious studies have not been able to utilize trolls’ views, whereas this study only uses commentary from trolls. This study was conducted using a qualitative re- search method, thematic analysis, and used three different methods for data collection. Trolling has become more commonplace in recent years and it has been claimed to be a formidable problem for civil discourse on the internet and there- fore deserves better insight on the matter. Media accounts, literature, and public opinions rarely match when it comes to trolling. This shows that there is plenty of confusion and misunderstandings on the topic. By discovering the reasons why an individual decides to troll, and how they decide to stop, there can be better technological solutions developed that might discourage people to start trolling or encourage them to stop. Keywords: Internet trolling, Trolling, Internet troll, Antisocial behavior, Life- cycle FIGURES FIGURE 1 Trolls's starting ages ................................................................................. 59 FIGURE 2 Length of time as a troll ........................................................................... 84 FIGURE 3 Life-cycle of trolls ...................................................................................... 86 TABLES TABLE 1 Examples of different definitions for trolling ......................................... 12 TABLE 2 Main sources for each troll in the data .................................................... 49 TABLE 3 Phases of thematic analysis (Braun & Clarke, 2006) .............................. 52 TABLE 4 Troll categories for this study ................................................................... 53 TABLE 5 Number of trolls by category .................................................................... 55 TABLE 6 Employment and student statuses for trolls when active..................... 56 TABLE 7 Factors related to trolls' personality ......................................................... 56 TABLE 8 Trolls' ages to start by certain age ............................................................ 59 TABLE 9 Reasons to start trolling ............................................................................. 60 TABLE 10 Occurrences of behavioral aspects ......................................................... 64 TABLE 11 Platforms used by trolls ........................................................................... 77 TABLE 12 Reasons to quit .......................................................................................... 78 TABLE 13 Main factors for quitting .......................................................................... 79 TABLE OF CONTENTS ABSTRACT .................................................................................................. 2 FIGURES ...................................................................................................... 3 TABLES ........................................................................................................ 3 TABLE OF CONTENTS ............................................................................ 4 1 INTRODUCTION .............................................................................. 6 2 TROLLS, WHO ARE THEY AND WHY DO THEY TROLL? ..... 9 2.1 The Term Troll and Trolling....................................................................... 9 2.1.1 Origin of the Term .............................................................................. 9 2.1.2 Definition of Trolling ....................................................................... 10 2.1.3 Trolling Compared to Flaming....................................................... 14 2.1.4 Trolling Compared to Cyberbullying ........................................... 15 2.1.5 The Use of the Term Troll in Wider Public Use ........................... 17 2.2 Who are the Trolls? .................................................................................... 18 2.2.1 Who can Become a Troll? ................................................................ 20 2.2.2 The Number of Trolls ...................................................................... 20 2.3 Why do They Troll? ................................................................................... 21 2.3.1 Reasons for Individuals to Troll ..................................................... 22 2.3.2 Effect of Computer-Mediated Communication ........................... 23 2.4 Personality of Trolls................................................................................... 24 2.5 Definition of a Troll for This Study ......................................................... 26 3 TROLL ACTIVITIES ........................................................................ 28 3.1 Types of Trolls and Trolling ..................................................................... 28 3.1.1 Troll Categorization ......................................................................... 28 3.1.2 Troll Activities .................................................................................. 30 3.1.3 Organized Trolling ........................................................................... 31 3.2 Behavior ...................................................................................................... 32 3.3 Trolling in Different Platforms ................................................................ 35 3.4 Trolling Strategies ...................................................................................... 37 4 DEALING WITH TROLLS ............................................................. 39 4.1 How Trolling is Perceived ........................................................................ 39 4.2 Outcomes of Trolling................................................................................. 41 4.3 How to Deal with Trolls ........................................................................... 43 4.4 How to Prevent Trolling ........................................................................... 45 5 RESEARCH METHOD .................................................................... 47 5.1 Qualitative Research Method ................................................................... 47 5.2 Data Collection ........................................................................................... 48 5.3 Analysis ....................................................................................................... 52 6 RESULTS ........................................................................................... 55 6.1 Background Information .......................................................................... 55 6.2 Beginning .................................................................................................... 57 6.2.1 Life Before Trolling .......................................................................... 57 6.2.2 Age to Start Trolling......................................................................... 58 6.2.3 How Trolling Started ....................................................................... 60 6.3 Time as an Active Troll ............................................................................. 64 6.3.1 Behavior ............................................................................................. 64 6.3.2 Progression of Trolling Behavior ................................................... 72 6.3.3 Targeting ............................................................................................ 73 6.3.4 Organized Trolling ........................................................................... 76 6.3.5 Platforms ............................................................................................ 77 6.4 Ending ......................................................................................................... 78 6.4.1 Reasons to Quit ................................................................................. 78 6.4.2 Length of Time as a Troll ................................................................ 83 7 DISCUSSION .................................................................................... 85 7.1 Life-cycle of Internet Trolls ...................................................................... 85 7.2 Research Implications ............................................................................... 87 7.3 Practical Implications ................................................................................ 94 7.4 Limitations and Future Topics ................................................................. 95 8 CONCLUSION
Recommended publications
  • UC Santa Barbara UC Santa Barbara Electronic Theses and Dissertations
    UC Santa Barbara UC Santa Barbara Electronic Theses and Dissertations Title A Web of Extended Metaphors in the Guerilla Open Access Manifesto of Aaron Swartz Permalink https://escholarship.org/uc/item/6w76f8x7 Author Swift, Kathy Publication Date 2017 Peer reviewed|Thesis/dissertation eScholarship.org Powered by the California Digital Library University of California UNIVERSITY OF CALIFORNIA Santa Barbara A Web of Extended Metaphors in the Guerilla Open Access Manifesto of Aaron Swartz A dissertation submitted in partial satisfaction of the requirements for the degree Doctor of Philosophy in Education by Kathleen Anne Swift Committee in charge: Professor Richard Duran, Chair Professor Diana Arya Professor William Robinson September 2017 The dissertation of Kathleen Anne Swift is approved. ................................................................................................................................ Diana Arya ................................................................................................................................ William Robinson ................................................................................................................................ Richard Duran, Committee Chair June 2017 A Web of Extended Metaphors in the Guerilla Open Access Manifesto of Aaron Swartz Copyright © 2017 by Kathleen Anne Swift iii ACKNOWLEDGEMENTS I would like to thank the members of my committee for their advice and patience as I worked on gathering and analyzing the copious amounts of research necessary to
    [Show full text]
  • How We Became Legion: Burke's Identification and Anonymous By
    How We Became Legion: Burke's Identification and Anonymous by Débora Cristina Ramos Antunes da Silva A thesis presented to the University of Waterloo in fulfilment of the thesis requirement for the degree of Master of Arts in English - Rhetoric and Communication Design Waterloo, Ontario, Canada, 2013 © Débora Cristina Ramos Antunes da Silva 2013 I hereby declare that I am the sole author of this thesis. This is a true copy of the thesis, including any required final revisions, as accepted by my examiners. I understand that my thesis may be made electronically available to the public. ii Abstract This thesis presents a study of how identification, according to Kenneth Burke's theory, can be observed in the media-related practices promoted by the cyber-activist collective Anonymous. Identification is the capacity of community-building through the use of shared interests. Burke affirms that, as human beings are essentially social, identification is the very aim of any human interaction. Cyber-activism deeply relies on this capacity to promote and legitimise its campaigns. In the case of Anonymous, the collective became extremely popular and is now a frequent presence even in street protests, usually organised online, around the world. Here, I argue that this power was possible through the use of identification, which helped attract a large number of individuals to the collective. Anonymous was particularly skilled in its capacity to create an ideology for each campaign, which worked well to set up a perfect enemy who should be fought against by any people, despite their demographic or social status. Other forms of identification were also present and important.
    [Show full text]
  • Trolls Can Sing and Dance in the Movies
    can sing and dance in the Movies TrollsBut let’s be clear! Internet Trolls are not cute or funny! In Internet slang, a troll is a person who creates bad feelings on the Internet by starting quarrels or upsetting people, or by posting inflammatory, extraneous, or off-topic messages with the intent of provoking readers into an emotional outburst. 01. The Insult Troll 06. The Profanity and All-Caps Troll The insult troll is a pure hater, plain and simple. They will This type of troll spews F-bombs and other curse words with his often pick on everyone and anyone - calling them names, caps lock button on. In many cases, these types of trolls are just accusing them of certain things, doing anything they can to bored kids looking for something to do without needing to put too get a negative emotional response from them. This type of much thought or effort into anything. trolling can be considered a serious form of cyberbullying. 02. The Persistent Debate Troll 07. The One Word Only Troll This type of troll loves a good argument. They believe they're There's always that one type of troll who just says "LOL" or "what" or right, and everyone else is wrong. They write long posts and "k" or "yes" or "no." They may not be the worst type of troll online, they're always determined to have the last word - continuing but when a serious or detailed topic is being discussed, their one- to comment until that other user gives up. word replies are just a nuisance.
    [Show full text]
  • Online Harassment: a Legislative Solution
    \\jciprod01\productn\H\HLL\54-2\HLL205.txt unknown Seq: 1 11-MAY-17 15:55 ONLINE HARASSMENT: A LEGISLATIVE SOLUTION EMMA MARSHAK* TABLE OF CONTENTS I. INTRODUCTION .......................................... 501 II. WHY IS ONLINE HARASSMENT A PROBLEM?................ 504 R a. The Scope of the Problem ............................ 504 R b. Economic Impact .................................... 507 R i. Lost Business Opportunities ...................... 507 R ii. Swatting ........................................ 510 R iii. Doxxing ........................................ 511 R III. CURRENT LAW .......................................... 512 R a. Divergent State Law ................................. 512 R b. Elements of the Law ................................. 514 R IV. LAW ENFORCEMENT AND INVESTIGATIVE PROBLEMS ........ 515 R a. Police Training ...................................... 515 R b. Investigative Resources .............................. 519 R c. Prosecutorial Jurisdiction ............................ 520 R V. SOLUTION ............................................... 521 R a. Proposed Legislation ................................ 521 R b. National Evidence Laboratory ........................ 526 R c. Training Materials ................................... 526 R VI. CONCLUSION ............................................ 528 R VII. APPENDIX ............................................... 530 R I. INTRODUCTION A journalist publishes an article; rape threats follow in the comments.1 An art curator has a conversation with a visitor to her gallery;
    [Show full text]
  • Pepe the Frog
    PEPE THE FROG: A Case Study of the Internet Meme and its Potential Subversive Power to Challenge Cultural Hegemonies by BEN PETTIS A THESIS Presented to the School of Journalism and Communication and the Robert D. Clark Honors College in partial fulfillment of the requirements for the degree of Bachelor of Arts Spring 2018 An Abstract of the Thesis of Ben Pettis for the degree of Bachelor of Arts in the School of Journalism and Communication to be taken Spring 2018 Title: Pepe the Frog: A Case Study of the Internet Meme and Its Potential Subversive Power to Challenge Cultural Hegemonies Approved: _______________________________________ Dr. Peter Alilunas This thesis examines Internet memes, a unique medium that has the capability to easily and seamlessly transfer ideologies between groups. It argues that these media can potentially enable subcultures to challenge, and possibly overthrow, hegemonic power structures that maintain the dominance of a mainstream culture. I trace the meme from its creation by Matt Furie in 2005 to its appearance in the 2016 US Presidential Election and examine how its meaning has changed throughout its history. I define the difference between a meme instance and the meme as a whole, and conclude that the meaning of the overall meme is formed by the sum of its numerous meme instances. This structure is unique to the medium of Internet memes and is what enables subcultures to use them to easily transfer ideologies in order to challenge the hegemony of dominant cultures. Dick Hebdige provides a model by which a dominant culture can reclaim the images and symbols used by a subculture through the process of commodification.
    [Show full text]
  • Extracting Inter-Community Conflicts in Reddit
    Extracting Inter-community Conflicts in Reddit Srayan Datta Eytan Adar University of Michigan University of Michigan [email protected] [email protected] Abstract Anti-social behaviors in social media can happen both at user and community levels. While a great deal of attention is on the individual as an ‘aggressor,’ the banning of entire Reddit subcommunities (i.e., subreddits) demonstrates that this is a multi-layer concern. Existing research on inter-community conflict has largely focused on specific subcommunities or ideological opponents. However, antago- nistic behaviors may be more pervasive and integrate into the broader network. In this work, we study the landscape of conflicts among subreddits by deriving higher-level (community) behaviors from the way individuals are sanctioned and rewarded. By constructing a conflict network, we characterize different patterns in subreddit-to-subreddit conflicts as well as communities of ‘co-targeted’ sub- reddits. By analyzing the dynamics of these interactions, we also observe that the conflict focus shifts over time. keywords: Inter-group conflict, Reddit, social network analysis, conflict network 1 Introduction Anti-social behavior in social media is not solely an individual process. Communities can, and do, antagonize other groups with anti-social behaviors. Similarly, both individuals and communities can be sanctioned in reaction to this behavior. On Reddit, for example, individuals can be banned or otherwise be sanctioned (e.g., have their posts down-voted). Likewise, entire subreddits can also be sanctioned when multiple individuals use the community as a platform for generating conflict, in violation of general Reddit norms. Critically, the form of anti-social behavior at the community level can be quite varied.
    [Show full text]
  • Hard-Coded Censorship in Open Source Mastodon Clients — How Free Is Open Source?
    Proceedings of the Conference on Technology Ethics 2020 - Tethics 2020 Hard-coded censorship in Open Source Mastodon clients — How Free is Open Source? Long paper Juhani Naskali 0000-0002-7559-2595 Information Systems Science, Turku School of Economics, University of Turku Turku, Finland juhani.naskali@utu.fi Abstract. This article analyses hard-coded domain blocking in open source soft- ware, using the GPL3-licensed Mastodon client Tusky as a case example. First, the question of whether such action is censorship is analysed. Second, the licensing compliance of such action is examined using the applicable open-source software and distribution licenses. Domain blocking is found to be censorship in the literal definition of the word, as well as possibly against some the used Google distribu- tion licenses — though some ambiguity remains, which calls for clarifications in the agreement terms. GPL allows for functionalities that limit the use of the software, as long as end-users are free to edit the source code and use a version of the appli- cation without such limitations. Such software is still open source, but no longer free (as in freedom). A multi-disciplinary ethical examination of domain blocking will be needed to ascertain whether such censorship is ethical, as all censorship is not necessarily wrong. Keywords: open source, FOSS, censorship, domain blocking, licensing terms 1 Introduction New technologies constantly create new challenges. Old laws and policies cannot al- ways predict future possibilities, and sometimes need to be re-examined. Open source software is a licensing method to freely distribute software code, but also an ideology of openness and inclusiveness, especially when it comes to FOSS (Free and Open-source software).
    [Show full text]
  • Address Munging: the Practice of Disguising, Or Munging, an E-Mail Address to Prevent It Being Automatically Collected and Used
    Address Munging: the practice of disguising, or munging, an e-mail address to prevent it being automatically collected and used as a target for people and organizations that send unsolicited bulk e-mail address. Adware: or advertising-supported software is any software package which automatically plays, displays, or downloads advertising material to a computer after the software is installed on it or while the application is being used. Some types of adware are also spyware and can be classified as privacy-invasive software. Adware is software designed to force pre-chosen ads to display on your system. Some adware is designed to be malicious and will pop up ads with such speed and frequency that they seem to be taking over everything, slowing down your system and tying up all of your system resources. When adware is coupled with spyware, it can be a frustrating ride, to say the least. Backdoor: in a computer system (or cryptosystem or algorithm) is a method of bypassing normal authentication, securing remote access to a computer, obtaining access to plaintext, and so on, while attempting to remain undetected. The backdoor may take the form of an installed program (e.g., Back Orifice), or could be a modification to an existing program or hardware device. A back door is a point of entry that circumvents normal security and can be used by a cracker to access a network or computer system. Usually back doors are created by system developers as shortcuts to speed access through security during the development stage and then are overlooked and never properly removed during final implementation.
    [Show full text]
  • Deciphering L33tspeak
    Ghent University Faculty of Arts and Philosophy Thesis Deciphering L33t5p34k Internet Slang on Message Boards Supervisor: Master Paper submitted in partial fulfilment of Prof. Anne-Marie Simon-Vandenbergen the requirements for the degree of ―Master in de Taal- en Letterkunde – Afstudeerrichting: Engels‖ By Eveline Flamand 2007-2008 i Acknowledgements I would like to thank my promoter, professor Anne-Marie Vandenbergen, for agreeing on supervising this perhaps unconventional thesis. Secondly I would like to mention my brother, who recently graduated as a computer engineer and who has helped me out when my knowledge on electronic technology did not suffice. Niels Cuelenaere also helped me out by providing me with some material and helping me with a Swedish translation. The people who came up to me and told me they would like to read my thesis, have encouraged me massively. In moments of doubt, they made me realize that there is an audience for this kind of research, which made me even more determined to finish this thesis successfully. Finally, I would also like to mention the members of the Filologica forum, who have been an inspiration for me. ii Index 1. Introduction .......................................................................................................................... 1 2. Methodology ......................................................................................................................... 1 2.1 4chan ...............................................................................................................................
    [Show full text]
  • Extracting Inter-Community Conflicts in Reddit
    Proceedings of the Thirteenth International AAAI Conference on Web and Social Media (ICWSM 2019) Extracting Inter-Community Conflicts in Reddit Srayan Datta Eytan Adar University of Michigan University of Michigan [email protected] [email protected] Abstract sult is an entire embedded network of subreddit-to-subreddit conflicts inside of the Reddit ecosystem. Research has found Anti-social behaviors in social media can happen both at user specific instances of these conflicts. Our goal is to inferen- and community levels. While a great deal of attention is on the individual as an ‘aggressor,’ the banning of entire Red- tially identify the structure and dynamics of this community- dit subcommunities (i.e., subreddits) demonstrates that this is to-community conflict network at scale. a multi-layer concern. Existing research on inter-community To achieve this, we address a number of challenges. First conflict has largely focused on specific subcommunities or among them is the lack of explicit group membership. Group ideological opponents. However, antagonistic behaviors may ‘membership’ in Reddit, and systems like it, can be vague. be more pervasive and integrate into the broader network. In While subscriptions are possible, individuals can display this work, we study the landscape of conflicts among sub- member-like behaviors by posting to subreddits they are reddits by deriving higher-level (community) behaviors from not part of. Such behaviors—subscription and posting—are the way individuals are sanctioned and rewarded. By con- structing a conflict network, we characterize different patterns not, however, a clear indication of the individual’s ‘social in subreddit-to-subreddit conflicts as well as communities of homes.’ An individual can display both social and anti-social ‘co-targeted’ subreddits .The dynamics of these interactions behaviors within the community via posting.
    [Show full text]
  • Extracting Insights from Differences: Analyzing Node-Aligned Social
    Extracting Insights from Differences: Analyzing Node-aligned Social Graphs by Srayan Datta A dissertation submitted in partial fulfillment of the requirements for the degree of Doctor of Philosophy (Computer Science and Engineering) in The University of Michigan 2019 Doctoral Committee: Associate Professor Eytan Adar, Chair Associate Professor Mike Cafarella Assistant Professor Danai Koutra Associate Professor Clifford Lampe Srayan Datta [email protected] ORCID iD: 0000-0002-5800-830X c Srayan Datta 2019 To my family and friends ii ACKNOWLEDGEMENTS There are several people who made this dissertation possible, first among this long list is my adviser, Eytan Adar. Pursuing a doctoral program after just finishing un- dergraduate studies can be a daunting task but Eytan made it easy with his patience, kindness, and guidance. I learned a lot from our collaborations and idle conversations and I am very grateful for that. I would like to extend my thanks to the rest of my thesis committee, Mike Ca- farella, Danai Koutra and Cliff Lampe for their suggestions and constructive feed- back. I would also like to thank the following faculty members, Daniel Romero, Ceren Budak, Eric Gilbert and David Jurgens for their long insightful conversations and suggestions about some of my projects. I would like to thank all of friends and colleagues who helped (as a co-author or through critique) or supported me through this process. This is an enormous list but I am especially thankful to Chanda Phelan, Eshwar Chandrasekharan, Sam Carton, Cristina Garbacea, Shiyan Yan, Hari Subramonyam, Bikash Kanungo, and Ram Srivatasa. I would like to thank my parents for their unwavering support and faith in me.
    [Show full text]
  • In Re Grand Jury Subpoena Gj2020111968168and Applicationof The
    Case 1:20-sc-03082-BAH Document 3 Filed 03/10/21 Page 1 of 16 UNITEDSTATESDISTRICT COURT FOR THE DISTRICT OF COLUMBIA ) IN RE GRAND JURY SUBPOENA ) SC NO. 1:20-sc-03082 GJ2020111968168AND APPLICATIONOF ) THE UNITEDSTATESOF AMERICAFOR ) AN ORDER PURSUANT TO 18 U.S.C. ) Filed Under Seal § 2705(B) ) ) ) Twitter Account: @NunesAlt ) ) TWITTER, INC.’S MOTIONTO QUASH SUBPOENA AND VACATE NONDISCLOSUREORDERAND MEMORANDUMINSUPPORT INTRODUCTION The government has issued a subpoena (the “Subpoena”) for “[a]ll customer or subscriber account information” for the Twitter user @NunesAlt (the “Account”) from October 1, 2020 to present. Under the First Amendment, the government cannot compel Twitter to produce information related to the Account unless it “can show a compelling interest in the sought-after material and a sufficient nexusbetween the subject matter of the investigation and the information it seek[s].” Inre Grand Jury Subpoena No. 11116275,846 F. Supp. 2d 1, 4 (D.D.C.2012)(internal quotation marksomitted).While Twitter does not have visibility into the purpose of the Subpoena, Twitter has serious concerns whether the government can meet this standard given the context in which it has received the Subpoena. It appears to Twitter that the Subpoena may be related to Congressman Devin Nunes’s repeated efforts to unmask individuals behind parody accounts critical of him. His efforts to suppress critical speech are as well-publicized as they are unsuccessful.He recently sued Twitter, attempting to hold it liable for speech by the parody Twitter accounts @DevinCow, @DevinNunesMom,@fireDevinNunes,and @DevinGrapes, and asking the court in that case to Case 1:20-sc-03082-BAH Document 3 Filed 03/10/21 Page 2 of 16 order Twitter to disclose information identifying those accounts.
    [Show full text]