Cybermobs, Civil Conspiracy, and Tort Liability Winhkong Hua

Total Page:16

File Type:pdf, Size:1020Kb

Cybermobs, Civil Conspiracy, and Tort Liability Winhkong Hua Fordham Urban Law Journal Volume 44 Number 4 Colloquium - Getting There From Here: An Article 10 Exploration of Regionalism and Transportation in the United States 2017 Cybermobs, Civil Conspiracy, and Tort Liability Winhkong Hua Follow this and additional works at: https://ir.lawnet.fordham.edu/ulj Recommended Citation Winhkong Hua, Cybermobs, Civil Conspiracy, and Tort Liability, 44 Fordham Urb. L.J. 1217 (2017). Available at: https://ir.lawnet.fordham.edu/ulj/vol44/iss4/10 This Note is brought to you for free and open access by FLASH: The orF dham Law Archive of Scholarship and History. It has been accepted for inclusion in Fordham Urban Law Journal by an authorized editor of FLASH: The orF dham Law Archive of Scholarship and History. For more information, please contact [email protected]. CYBERMOBS, CIVIL CONSPIRACY, AND TORT LIABILITY Winhkong Hua* Introduction ........................................................................................... 1218 I. Background of Internet Harassment and Civil Conspiracy ......... 1221 A. Internet Harassment ........................................................... 1221 B. Civil Litigation and its Internet Inadequacies ................. 1229 1. Lack of Defendants ....................................................... 1230 2. Ease of Access and Anonymity ................................... 1236 3. Jurisdictional Issues....................................................... 1240 C. Civil Conspiracy and its Features Adapted ..................... 1241 II. The Problem of Cybermobs and Civil Conspiracy as a Remedy ............................................................................................ 1245 A. Cybermobs ........................................................................... 1245 B. Civil Conspiracy, Copyright Law, and Permissive Joinder .................................................................................. 1248 C. Civil Conspiracy and Cybermobs ...................................... 1251 III. AutoAdmit and Civil Conspiracy in Practice ............................. 1255 A. Civil Conspiracy Elements Present ................................... 1257 1. Group of Two or More ................................................. 1257 2. Unlawful Objective/Lawful Objective by Unlawful Means .............................................................................. 1258 3. Agreement ..................................................................... 1258 4. An Unlawful Act Committed to Further the Agreement ..................................................................... 1261 5. Harm that Was Proximately Caused by Conspiracy . 1262 B. Possible Inadequacies of Cybermob Civil Conspiracy ... 1263 Conclusion .............................................................................................. 1264 * Fordham University School of Law, J.D., 2017. I am grateful for all the help that Professor Aaron Saiger has provided me through this process. I thank my family and friends for putting up with me while I went through this writing process, and I thank the members of the Fordham Urban Law Journal for helping develop my ideas and fixing my citations. 1217 1218 FORDHAM URB. L.J. [Vol. XLIV INTRODUCTION Cities are centers of culture, learning, and debate. These urban spaces provide a stage upon which discordant voices are brought together, where communities may form, and where ideas can clash.1 The Internet is the new urban, where dissident voices can find refuge and where the world grows closer.2 But even as the Internet draws people closer together and allows debate to flourish, the Internet creates new ways for people to harass and harm others.3 So as exists in cities, structures must be created to safeguard individuals while maintaining the diversity and vibrancy that makes the space desirable. The Internet allows individuals to be hurt in ways that simply did not previously exist. Several examples demonstrate the new types of harms that have become available when people use the Internet as a tool of harassment: from false accusations, gender discrimination, and inexplicable ire, to the scorning of people who tread past certain social norms. After the Boston Marathon Bombing, Sunil Tripathi was falsely accused on Reddit of being the Boston Bomber; his family received hundreds of threatening and anti-Islamic phone calls.4 Reddit users from around the world trawled through news articles, 1. In the words of modern urban planning’s mother, Jane Jacobs: [T]he differences that often go far deeper than differences in color—which are possible and normal in intensely urban life, but which are so foreign to suburbs and pseudo-suburbs, are possible and normal only when streets of great cities have built-in equipment allowing strangers to dwell in peace together on civilized but essentially dignified and reserved terms. JANE JACOBS, THE DEATH AND LIFE OF GREAT AMERICAN CITIES 83 (1961). 2. See, e.g., Weiyu Zhang, Virtual Communities as Subaltern Public Spheres: A Theoretical Development and an Application to the Chinese Internet, in CYBER BEHAVIOR: CONCEPTS, METHODOLOGIES, TOOLS, AND APPLICATIONS (Linda Johnston ed., 2014), ACADEMIA, https://www.academia.edu/2077992/Virtual_ communities_as_subaltern_public_spheres_A_theoretical_development_and_an_app lication_to_the_Chinese_Internet [https://perma.cc/HU5W-JKKW]; Brenden Gallagher, 20 Internet Communities You Can’t Unsee, COMPLEX (July 17, 2013), http://www.complex.com/pop-culture/2013/07/20-internet-communities-you-cant- unsee/ [https://perma.cc/RD7Q-VF6J] . 3. See, e.g., Amanda Hess, For the Alt-Right, Message is in the Punctuation, N.Y. TIMES (June 10, 2016), https://www.nytimes.com/2016/06/11/arts/for-the-alt- right-the-message-is-in-the-punctuation.html [https://perma.cc/SZ7D-T6KX] (discussing the growth of the alt-right and what they borrow from 4chan communities); Abby Ohleiser, ‘We Actually Elected a Meme As President:’ How 4chan Celebrated Trump’s Victory, CHI. TRIB. (Nov. 12, 2016, 8:00 AM), http://www.chicagotribune.com/bluesky/technology/ct-meme-president-4chan-trump- wp-bsi-20161112-story.html [https://perma.cc/B8XB-63YD]. 4. Jay Caspian Kang, Should Reddit Be Blamed for the Spreading of a Smear?, N.Y. TIMES MAG. (July 25, 2013), http://www.nytimes.com/2013/07/28/magazine/ should-reddit-be-blamed-for-the-spreading-of-a-smear.html [https://perma.cc/PJ5S- T9SK]. 2017] CYBERMOBS 1219 images, and social media only to misidentify Mr. Tripathi, who had committed suicide days before the Bombing.5 Steven Rudderham received death threats and hateful comments after accusations that he was a pedophile spread through Facebook; he committed suicide soon after.6 After posting feminist critiques of video games, Anita Sarkeesian cancelled speaking engagements because of bomb threats, had her website shut down by hackers numerous times, was accused of being a fraud and a liar, and received death and rape threats which included her address and the names of her family members.7 Jessica Leonhardt was eleven when she faced the ire of a cybermob; in just a few hours after someone posted one of her videos on 4chan,8 her real name, phone number, real address, and social networking accounts circulated the Internet; harassers spammed her networking accounts, prank-called her home, and threatened her life.9 As Leonhardt’s mother said, “We’ve had many, many death threats. We’re afraid to leave the house. We’re afraid to go to bed. We’re sleeping in shifts, my husband and I am.”10 Walter Palmer, the dentist who killed Cecil the Lion, received a staggeringly large amount of online abuse that quickly turned into harassment as Internet users shared his address, 5. Id.; see also Traci G. Lee, The Real Story of Sunil Tripathi, the Boston Bomber Who Wasn’t, NBC NEWS (June 22, 2015, 9:05 AM), http://www.nbc news.com/news/asian-america/wrongly-accused-boston-bombing-sunil-tripathys- story-now-being-told-n373141 [https://perma.cc/G2B4-Z6C2]. 6. Sam Webb, Father ‘Driven to Suicide After He Was Wrongly Accused of Being a Paedophile on Facebook,’ DAILYMAIL (May 23, 2013, 4:02 PM), http://www.dailymail.co.uk/news/article-2329453/Father-driven-suicide-accused- paedophile-Facebook.html [https://perma.cc/6QXM-2NB8]. 7. See Nick Wingfield, Feminist Critics of Video Games Facing Threats in ‘GamerGate’ Campaign, N.Y. TIMES (Oct. 15, 2014), http://www.nytimes.com/2014/ 10/16/technology/gamergate-women-video-game-threats-anita-sarkeesian.html [https://perma.cc/3RGV-JPQ2]; see also Luke Malone, A Breakdown of Anita Sarkeesian’s Weekly Rape and Death Threats, VOCATIV (Jan. 28, 2015, 1:11 PM), http://www.vocativ.com/culture/society/anita-sarkeesian-threats/ [https://perma.cc/DW8K-4W37]. 8. 4chan is a large online forum that emphasizes the anonymity of its users and actively does not archive. Users do not have to register in order to participate in threads, and do not even need to input a screenname when posting. 4chan usage is free. See F.A.Q., 4CHAN, http://www.4chan.org/faq [https://perma.cc/WQK7-EAL3]. 9. Adrian Chen, How the Internet Beat Up an 11-Year-Old Girl, GAWKER (July 16, 2010, 2:02 PM), http://gawker.com/5589103/how-the-internet-beat-up-an-11-year- old-girl [https://perma.cc/3ND8-XSSR]. 10. Adrian Chen, 11-Year-Old Viral Video Star Placed Under Police Protection After Death Threats (Updated), GAWKER (July 18, 2010, 4:07 PM), http://gawker.com/5590166/11-year-old-viral-video-star-placed-under-police- protection-after-death-threats [https://perma.cc/VCG5-3HER]. 1220 FORDHAM URB. L.J. [Vol. XLIV his phone number, uncovered information
Recommended publications
  • Sexual and Nonsexual Behavioral Signs of Child Sexual Abuse*
    CSA Workshop Handout 6 Page | 1 SEXUAL AND NONSEXUAL BEHAVIORAL SIGNS OF CHILD SEXUAL ABUSE* You should be more suspicious of sexual abuse when a child displays several signs, especially a combination of sexual and nonsexual signs. SEXUAL SIGNS Sexual signs are generally higher probability signs; in other words, these signs mean it is more likely that the child was sexually abused. Lower probability signs may indicate the child was sexually abused, but the child may display these signs for reasons other than sexual abuse. Sexual signs vary somewhat depending on the child’s age and development. The signs are divided into those likely to be found in younger children (10 years of age or under) who have been sexually abused, and older children (over the age of 10) who have been sexually abused. It is important to remember that this is somewhat arbitrary because within these two age ranges there are children at very different levels of development. SEXUAL BEHAVIORS FOUND IN YOUNGER CHILDREN Signs of Sexual Knowledge Not Ordinarily Possessed by Young Children The following are very strong signs that a child has been sexually abused because young children generally do not have the sexual knowledge to do the following: Sexual behavior with other people. Sexual aggression toward younger or more naive children. By behaving in this way, the child is identifying with the abuser. Aggressive or playful sexual behavior with peers. Such behavior indicates the child experienced a degree of pleasure from the abusive activity. Sexual invitations to older persons. This behavior suggests the child expects and accepts sexual activity as a way of relating to adults.
    [Show full text]
  • Silenced by Free Speech: How Cyberabuse Affects Debate and Democracy
    Silenced by Free Speech: How cyberabuse affects debate and democracy Chapter in: Rethinking Cybercrime, Palgrave Macmillan. In press, publication date January 2017 Editors: Tim Owen, Wayne Noble, Faye Speed The early days of the internet promised much. Posting online seemed to offer a freedom from expectation and prejudice. In the words of the New Yorker cartoon, on the internet, nobody knows you’re a dog. We believed nobody knew your gender, age or race either. Your beauty or lack of it was of no account, your mind was disembodied, pure spirit, freed from the hidebound judgements of society. You could remove the mask you wear every day, revealing your true nature online to other disembodied spirits in a way that you never could to your family or colleagues. Perhaps you would find a new community to live in online, a community that thinks and feels as you do. Or instead of revealing yourself, you could create a new self. You could play with your identity more easily than playing with your hair colour, you could have a whole wardrobe of new selves if you want them. The internet offered freedom from the space constraints and word counts of newspapers, as well as from their gatekeepers, political stances and editorial guidelines. Here, anyone could be their own publisher for free, and could be heard all over the world without having their opinions edited down to fit a hole at the bottom of a column or a gap in a 90-second feature. You can’t fill the internet, so you could say everything you always wanted to say, as many times as you like.
    [Show full text]
  • Civility, Safety & Interaction Online
    Civility, Safety & Interaction Online February 2020 1 Study Methodology Adults 18-74, Teens 13-17 The 2019 report is based on the views of 12,520 14-minute Web survey adults and teens questioned across 25 countries Interviews conducted May 1-31, 2019 Argentina 502 Belgium 501 Brazil 502 Canada 500 Chile 503 Colombia 502 France 502 Germany 501 Hungary 500 India 502 Indonesia 501 Ireland 500 Italy 500 Malaysia 500 Mexico 500 Netherlands 504 Peru 500 Poland 500 Russia 500 Singapore 500 South Africa 500 Turkey 500 United Kingdom 500 Countries in Bold United States 500 new in 2019 Vietnam 500 2 42,000+ Interviews since 2016 25 Countries 21 Online Risks 2019 22 Countries 21 Online Risks 2018 23 Countries 2017 20 Online Risks 14 Countries 17 Online Risks 2016 3 3 Key Research Questions Core Trends New questions Digital Civility Index Current & future state of digital civility Sources of online risk Consumer’s aspirations for digital civility Pain caused by online risks Topics that generate uncivil behavior Consequences & Actions taken The number of times a risk has occurred Know where to find help 4 The Rising Tide of Incivility Pessimism and Hope The Digital Civility Index increased 4-points to 70%. About half of the twenty-five country DCI scores rose significantly, with fifteen countries registering their worst DCI since the study began in 2016. Many countries in the study have seen a rise of populist movements or politicians who employ incendiary rhetoric, fueling confrontational discourse that extends into the online world. Nearly four in ten adults said politics was at the center of rude, uncivil or abusive interactions online.
    [Show full text]
  • Slander”? Find 34 Synonyms and 30 Related Words for “Slander” in This Overview
    Need another word that means the same as “slander”? Find 34 synonyms and 30 related words for “slander” in this overview. Table Of Contents: Slander as a Noun Definitions of "Slander" as a noun Synonyms of "Slander" as a noun (7 Words) Usage Examples of "Slander" as a noun Slander as a Verb Definitions of "Slander" as a verb Synonyms of "Slander" as a verb (27 Words) Usage Examples of "Slander" as a verb Associations of "Slander" (30 Words) The synonyms of “Slander” are: aspersion, calumny, defamation, denigration, defamation of character, character assassination, libel, asperse, besmirch, calumniate, defame, denigrate, smear, smirch, sully, defame someone's character, blacken someone's name, give someone a bad name, tell lies about, speak evil of, speak ill of, drag through the mire, drag through the mud, fling mud at, sling mud at, throw mud at, sully someone's reputation, run a smear campaign against, cast aspersions on, spread scandal about, tarnish, taint, misrepresent Slander as a Noun Definitions of "Slander" as a noun According to the Oxford Dictionary of English, “slander” as a noun can have the following definitions: An abusive attack on a person's character or good name. Words falsely spoken that damage the reputation of another. A false and malicious spoken statement. The action or crime of making a false spoken statement damaging to a person's GrammarTOP.com reputation. Synonyms of "Slander" as a noun (7 Words) The act of sprinkling water in baptism (rare. aspersion I don t think anyone is casting aspersions on you. An abusive attack on a person’s character or good name.
    [Show full text]
  • Crafting Online Harassment and Abuse Reporting Policies
    crafting online harassment and abuse reporting policies Amanda Levendowski Internet Law & Policy Foundry Fellow Data & Society Databite December 17, 2015 1 CRAFTING HARP what’s the problem? 2 CRAFTING HARP “We suck at dealing with abuse and trolls on the platform and we’ve sucked at it for years. It’s no secret and the rest of the world talks about it every day. We lose core user after core user by not addressing simple trolling issues that they face every day.” - Dick Costolo, CEO of Twitter 3 CRAFTING HARP 40% 4 CRAFTING HARP According to a 2014 survey, over 40% of online adults report being targets one or more types of harassment: called offensive names 7% purposefully embarassed 8% 27% stalked 6% 8% sexually harassed 22% physically threatened sustained harassment Maeve Duggan, Online Harassment, PEW Research Internet Project (Oct. 22, 2014), http://www.pewinternet.org/2014/10/22/online-harassment/ 5 CRAFTING HARP WHO 6 CRAFTING HARP There may be a correlation between the types of people who engage in harassment and where that behavior is likely to occur: co-worker 7% former partner 10% family 12% friend 23% acquaintance 24% unknown 26% stranger 38% 7 CRAFTING HARP WHERE 8 CRAFTING HARP There may be a correlation between the types of people who engage in harassment and where that behavior is likely to occur: online dating site 6% co-worker 7% forum 10% former partner 10% family 12% email 16% friend 23% online gaming 16% acquaintance 24% the comments 22% unknown 26% stranger 38% social media 66% 9 platform permeability matrix CRAFTING
    [Show full text]
  • Recantation and False Allegations of Child Abuse
    Recantation and False Allegations of Child Abuse Prepared by David N. King, Ph.D. Maureen Drost, B.A. Selected Bibliography 2005 Updated 2011 Muriel K. Wells, MLIS This publication was supported in part by Grant No. SM 54259-01 from the U.S. Department of Health and Human Services, Public Health Service, Substance Abuse and Mental Health Services Administration. Its contents are solely the responsibility of the authors and do not necessarily represent the official views of the U.S. Department of Health and Human Services, Public Health Service, Substance Abuse and Mental Health Services Administration. Copyright © 2005, 2011 National Children’s Advocacy Center. All rights reserved. 1 ©National Children’s Advocacy Center, 2011 Recantation and False Allegations of Child Abuse Recantation and False Allegations of Child Abuse Selected Bibliography Introduction The issues pertaining to recantation and false allegations of abuse by children are among the more complex to understand psychologically and to interpret accurately. Ac-cording to Lipian, Mills and Brantman (2004), false allegations of abuse may derive from (1) submitting to suggestion by authority figures; (2) the result of "pseudo memories;" or (3) the product of evading honest answers. Recantation may result from the same reasons. Scope This bibliography focuses specifically on literature related to recantation and false allegations of abuse experienced in childhood. The relationship between disclosure, memory, truthfulness, fantastical storytelling, suggestibility, and coaching with recantation and false allegations is complex. To the extent possible, this bibliography does not, except in passing, delve deeply into those topics, preferring instead to provide guidance to publications that specifically address the core topic of false allegations and recanted accusation.
    [Show full text]
  • MIAMI UNIVERSITY the Graduate School
    MIAMI UNIVERSITY The Graduate School Certificate for Approving the Dissertation We hereby approve the Dissertation of Bridget Christine Gelms Candidate for the Degree Doctor of Philosophy ______________________________________ Dr. Jason Palmeri, Director ______________________________________ Dr. Tim Lockridge, Reader ______________________________________ Dr. Michele Simmons, Reader ______________________________________ Dr. Lisa Weems, Graduate School Representative ABSTRACT VOLATILE VISIBILITY: THE EFFECTS OF ONLINE HARASSMENT ON FEMINIST CIRCULATION AND PUBLIC DISCOURSE by Bridget C. Gelms As our digital environments—in their inhabitants, communities, and cultures—have evolved, harassment, unfortunately, has become the status quo on the internet (Duggan, 2014 & 2017; Jane, 2014b). Harassment is an issue that disproportionately affects women, particularly women of color (Citron, 2014; Mantilla, 2015), LGBTQIA+ women (Herring et al., 2002; Warzel, 2016), and women who engage in social justice, civil rights, and feminist discourses (Cole, 2015; Davies, 2015; Jane, 2014a). Whitney Phillips (2015) notes that it’s politically significant to pay attention to issues of online harassment because this kind of invective calls “attention to dominant cultural mores” (p. 7). Keeping our finger on the pulse of such attitudes is imperative to understand who is excluded from digital publics and how these exclusions perpetuate racism and sexism to “preserve the internet as a space free of politics and thus free of challenge to white masculine heterosexual hegemony” (Higgin, 2013, n.p.). While rhetoric and writing as a field has a long history of examining myriad exclusionary practices that occur in public discourses, we still have much work to do in understanding how online harassment, particularly that which is gendered, manifests in digital publics and to what rhetorical effect.
    [Show full text]
  • Consequences of Being Falsely Accused of Sexual Violence
    Running head: FALSE ACCUSATION OF SEXUAL VIOLENCE 1 Consequences of Being Falsely Accused of Sexual Violence: Focussing on Someone’s Social, Personal and Economic life Tessa G. van der Putten Tilburg University Tessa Gabrielle van der Putten, Victimology and criminal Justice, Tilburg University, 798730, 25-08-2016 Supervisor: K. M. E. Lens FALSE ACCUSATION OF SEXUAL VIOLENCE 2 Abstract A false accusation of sexual abuse occurs more often than most people would expect. Reasons for false accusations are mostly intentional, and otherwise erroneous. It is often argued that false accusations could have severe consequences for the falsely accused person on several aspects. Unfortunately, there is a paucity of good research on the consequences of false accusations of sexual abuse. In order to close the gap in scientific literature, the current study focussed on the consequences of sexual abuse on several aspects (social, personal, and economic) of someone’s life. An explorative study was conducted, with the use of a self-report questionnaire among eight falsely accused men. The self-report questionnaire focussed on someone’s perceived social support, rejection, stigmatization, coping style, and psychological- and physical well-being. Participants reported in the open-questions that the false accusation influenced their social, personal, and economic life. However, scores on the closed-ended questions of the self-report questionnaire did not indicate severe consequences of being falsely accused. It seems that participants who received a higher level of social support, showed less signs of stigmatization, rejection, psychological – and physical symptoms and vice versa. This could indicate that social support possibly had a buffering effect on the consequences of a false accusation.
    [Show full text]
  • Doxxing, Swatting and the New Trends in Online Harassment 22 April 2015, by Andrew Quodling
    Doxxing, swatting and the new trends in online harassment 22 April 2015, by Andrew Quodling citizens about "swatting" (see below) since 2008. It has become common to see articles about how these attacks have affected politicians (both Republican and Democrat in the US), celebrities, journalists, businesses, video game streamers and public servants. What is doxxing? Doxxing – named for "documents" or "docs" – is the act of release of someone's personal and/or When the SWAT team bursts into your bedroom, it’s not identifiable information without their consent. This only unpleasant but potentially deadly. Credit: Jason can include things like their full legal name, social Eppink/Flickr, CC BY security numbers, home or work addresses and contact information. There's no set format for a "dox"; the doxxer simply Imagine this: there's a knock at your door. "Pizza publishes whatever information they've managed to delivery!" It's the fifth time in the last hour that turn up in their searches. Sometimes this even you've had to say to a delivery-person: "No, I really includes the names and details of their target's didn't order anything." That's irritating. family or close friends. Half an hour later, there's another noise at the As a tactic of harassment, doxxing serves two door. This time it's forced open as your house is purposes: it intimidates the people targeted by stormed by the heavily armed and aggressive invading and disrupting their expectations of special response unit of your local police force. privacy; and it provides an avenue for the They're responding to a tip off that warned them of perpetuation of that person's harassment by a hostage situation at your address.
    [Show full text]
  • Mot. to Seal and for Evidentiary Hearing (HTW Edit) (B3759745
    DOCUMENT 355 ELECTRONICALLY FILED 3/2/2021 2:08 PM 01-CV-2019-901210.00 CIRCUIT COURT OF JEFFERSON COUNTY, ALABAMA JACQUELINE ANDERSON SMITH, CLERK IN THE CIRCUIT COURT OF JEFFERSON COUNTY, ALABAMA BIRMINGHAM DIVISION DAVID ROBERSON and ANNA ) ROBERSON, ) ) Plaintiffs, ) ) CIVIL ACTION NO. 01-CV-2019-901210 vs. ) ) DRUMMOND COMPANY, INC. and ) BALCH & BINGHAM, LLP, ) ) Defendants. ) DRUMMOND COMPANY, INC.’S MOTION TO MAKE THE CASE “CONFIDENTIAL”, AND FOR EVIDENTIARY HEARING AS TO WHETHER THIS COURT’S ORDER HAS BEEN VIOLATED COMES NOW Drummond Company, Inc. (“Drummond”), and hereby moves for an order directing the Clerk to code this case as “Confidential” to prevent further prejudicial publicity of the pre-trial discovery process, and to set an evidentiary hearing to determine whether this Court’s Order aimed at preventing such publicity (Doc. 297) has been violated. Introduction Plaintiff David Roberson stated the following to United States District Judge Abdul Kallon: “I know that had I cooperated with the government and accused others of committing crimes, I could have benefited myself, whether by not being prosecuted at all or by getting a recommendation for leniency. But I could never live with myself or face the people who believe in me if I had taken that way out. Because I would have had to lie about it.” Ex. A (Roberson Sentencing Hrg. Tr.) at 151:17-23. Plaintiffs have apparently gotten over their reluctance to falsely accuse Drummond of criminal conduct, and what has resulted is a public smear campaign which {B3759745} DOCUMENT 355 threatens the integrity of this proceeding and risks Drummond’s right to a fair trial, untainted by prejudicial pre-trial publicity.
    [Show full text]
  • Building Trust by Tearing Others Down When Accusing Others of Unethical Behavior Engenders Trust
    Organizational Behavior and Human Decision Processes 149 (2018) 111–128 Contents lists available at ScienceDirect Organizational Behavior and Human Decision Processes journal homepage: www.elsevier.com/locate/obhdp Building trust by tearing others down: When accusing others of unethical behavior engenders trust T ⁎ Jessica A. Kennedya, , Maurice E. Schweitzerb a Vanderbilt University, Owen Graduate School of Management, 401 21st Avenue S., Nashville, TN 37203, United States b University of Pennsylvania, The Wharton School, 3730 Walnut St., Philadelphia, PA 19104, United States ARTICLE INFO ABSTRACT Keywords: We demonstrate that accusations harm trust in targets, but boost trust in the accuser when the accusation signals Ethics that the accuser has high integrity. Compared to individuals who did not accuse targets of engaging in unethical Morality behavior, accusers engendered greater trust when observers perceived the accusation to be motivated by a desire Accusations to defend moral norms, rather than by a desire to advance ulterior motives. We also found that the accuser’s Trust moral hypocrisy, the accusation's revealed veracity, and the target’s intentions when committing the unethical Impression management act moderate the trust benefits conferred to accusers. Taken together, we find that accusations have important interpersonal consequences. 1. Introduction how accusations influence observers’ perceptions of the accuser. In our investigation, we focus on the relationship between accusations and a Leaders and co-workers play a crucial role in establishing ethical construct that has particular relevance for organizations: trust norms in organizations (Flynn & Wiltermuth, 2010; Pillutla, 2011; (Crossley, Cooper, & Wernsing, 2013; Lount, Zhong, Sivanathan, & Smith-Crowe et al., 2014; Thau, Derfler-Rozin, Pitesa, Mitchell, & Murnighan, 2008; Pillutla, Malhotra, & Murnighan, 2003).
    [Show full text]
  • What Is Cyberbullying?
    Cyberbullying Contents 1. What Is Cyberbullying 2. The Dangers Of Cyberbullying 3. How Is Cyberbullying Different From Regular Bullying 4. How To Tell If Your Child Is Being Cyberbullied 5. How To Tell If Your Child Is Cyberbullying Someone Else 6. Why Do Children Cyberbully 7. What To Do If Your Child Is Cyberbullying 8. What To Do If Your Child Is Being Cyberbullied 9. Parents Top 10 Questions About Cyberbullying 10. Statistics Of Cyberbullying 2015 Page 2 www.keepchildrensafeonline.com 1. What Is Cyberbullying? The definition of Cyberbullying is ‘the use of electronic communication to bully a person, typically by sending 1 messages of an intimidating or threatening nature’. As the definition suggests, Cyberbullying can take many forms. Just about any type of electronic communication can be used to bully or intimidate somebody, whether it’s via texting, email, instant messengers, chat rooms, multiplayer games and so forth. Here is a list of some (but by no means all) of the possible sources of Cyberbullying: • Texting • Phone Calls • Social Media • Chatrooms • Forums • Messaging & Photo Apps like WhatsApp and Snapchat • Online Multiplayer 1 Oxford English Dictionary Page 3 www.keepchildrensafeonline.com Of course, it can be tricky to know what is and isn’t Cyberbullying, as sometimes children say mean things to each other online, but one wouldn’t consider it any more than childish name-calling. The key distinction to make is that Cyberbullying is generally characterised by repeatedly causing harm, whether that is through repeated incidents or a single malicious incident that has lasting repercussions. Some examples of Cyberbullying include: Cyberstalking Cyberstalking is where somebody ‘stalks’ the victim online, usually sending multiple messages or just making it clear that they are watching the victim’s online life.
    [Show full text]