Online Stakeholder Communication in Firestorm Situations | Mikkel Zangenberg

Total Page:16

File Type:pdf, Size:1020Kb

Online Stakeholder Communication in Firestorm Situations | Mikkel Zangenberg Online stakeholder communication in firestorm situations Copenhagen Business School MA in International Business Communication/MCO May 17th, 2016 Master’s Thesis Author: Mikkel Zangenberg Supervisor: Dennis Schoeneborn Number of pages: 57 Characters including spaces: 108003 1 Online stakeholder communication in firestorm situations | Mikkel Zangenberg Table of contents Table of Figures ...................................................................................................................................... 2 Résumé ...................................................................................................................................................... 3 Chapter 1 .................................................................................................................................................. 4 1.0 Introduction ......................................................................................................................................... 5 1.1 Topic delimitation:...................................................................................................................... 6 1.2 Scope of the thesis ........................................................................................................................... 6 1.3 Disposition ........................................................................................................................................ 7 1.4 Definitions ........................................................................................................................................ 8 1.4.1 Online terms .................................................................................................................................. 8 1.4.2 Crowdfunding ................................................................................................................................ 9 1.4.3 Steam and the concept of ”Early Access” ...................................................................................... 9 1.5 Methods ......................................................................................................................................... 11 1.6 Data collection................................................................................................................................ 11 Chapter 2 .................................................................................................................................................. 12 2.0 Literature review: current literature .................................................................................................. 13 2.1 Stakeholder communication strategies .......................................................................................... 13 2.2 The Spiral of Silence ....................................................................................................................... 16 2.3 Public Citizenship Arenas ................................................................................................................ 17 2.4 Situational Crisis Communication Theory ....................................................................................... 19 Chapter 3 .................................................................................................................................................. 23 3.0 A new lens - additions to existing literature ....................................................................................... 24 3.1 Online firestorms and clusters........................................................................................................ 24 3.3 The online disinhibition effect ........................................................................................................ 25 3.4 Online “Trolls” ................................................................................................................................ 27 3.5 Social Media ................................................................................................................................... 28 3.6 Partial conclusion ........................................................................................................................... 30 Chapter 4 .................................................................................................................................................. 31 4.0 Analysis............................................................................................................................................... 32 4.1 Background on the firestorm.......................................................................................................... 32 4.1.1 Timeline ....................................................................................................................................... 32 4.1.2 Timeline for software updates .................................................................................................... 35 1 2 Online stakeholder communication in firestorm situations | Mikkel Zangenberg 4.2 The communicative approach of Chucklefish ................................................................................. 36 4.2.1 The official blog and forum.......................................................................................................... 37 4.2.2 The official Twitter feed .......................................................................................................... 39 4.3 Communicative response to the firestorm situation .......................................................................... 39 4.4 Communicative mistakes made by Chucklefish .................................................................................. 39 4.4.1 Strategic approach to delays ....................................................................................................... 40 4.4.2 Moderation efforts .................................................................................................................. 41 4.4.3 Strategic approach to CSR communication ................................................................................. 43 4.4.4 Not winning over key dissidents .................................................................................................. 44 4.4.5 Engaging with users in a counterproductive manner .................................................................. 45 4.4.6 on the topic of unreasonable stakeholders ................................................................................. 49 4.4.7 On vocal majorities and minorities .............................................................................................. 51 These numbers were all accurate as of the time of writing on May 10, 2016. ..................................... 51 4.5 Partial conclusion ........................................................................................................................... 52 Chapter 5 .................................................................................................................................................. 54 5.0 Conclusion .......................................................................................................................................... 55 5.1 Reflections and limitations ................................................................................................................. 56 5.2 Further research ................................................................................................................................. 57 6.0 Bibliography ....................................................................................................................................... 58 Appendix – Figure transcripts ................................................................................................................... 66 Table of Figures Figure 1: The Spiral of Silence .................................................................................................................. 16 Figure 2: John Gabriel's Greater Internet Fuckwad Theory ...................................................................... 27 Figure 3: Sample blog post ....................................................................................................................... 38 Figure 4: Comment exchange ................................................................................................................... 45 Figure 5: Michael Reilly quote .................................................................................................................. 46 Figure 6: Michael Reilly quote regarding Stakeholder .............................................................................. 47 Figure 7: Joke poll ..................................................................................................................................... 48 2 3 Online stakeholder communication in firestorm situations | Mikkel Zangenberg Résumé The internet has changed the way companies must approach stakeholder communication. Social media and online forums have changed the need for a presence and availability to stakeholders a company and its employees need to contribute with. This leads to challenges in the form of “firestorm” situations in which companies can find themselves in crisis situations without warning. These “firestorm” situations can be self-inflicted or come from outside sources, but online communications have changed both the speed and potential degree of crisis with which a “firestorm”
Recommended publications
  • Trolls Can Sing and Dance in the Movies
    can sing and dance in the Movies TrollsBut let’s be clear! Internet Trolls are not cute or funny! In Internet slang, a troll is a person who creates bad feelings on the Internet by starting quarrels or upsetting people, or by posting inflammatory, extraneous, or off-topic messages with the intent of provoking readers into an emotional outburst. 01. The Insult Troll 06. The Profanity and All-Caps Troll The insult troll is a pure hater, plain and simple. They will This type of troll spews F-bombs and other curse words with his often pick on everyone and anyone - calling them names, caps lock button on. In many cases, these types of trolls are just accusing them of certain things, doing anything they can to bored kids looking for something to do without needing to put too get a negative emotional response from them. This type of much thought or effort into anything. trolling can be considered a serious form of cyberbullying. 02. The Persistent Debate Troll 07. The One Word Only Troll This type of troll loves a good argument. They believe they're There's always that one type of troll who just says "LOL" or "what" or right, and everyone else is wrong. They write long posts and "k" or "yes" or "no." They may not be the worst type of troll online, they're always determined to have the last word - continuing but when a serious or detailed topic is being discussed, their one- to comment until that other user gives up. word replies are just a nuisance.
    [Show full text]
  • Online Harassment: a Legislative Solution
    \\jciprod01\productn\H\HLL\54-2\HLL205.txt unknown Seq: 1 11-MAY-17 15:55 ONLINE HARASSMENT: A LEGISLATIVE SOLUTION EMMA MARSHAK* TABLE OF CONTENTS I. INTRODUCTION .......................................... 501 II. WHY IS ONLINE HARASSMENT A PROBLEM?................ 504 R a. The Scope of the Problem ............................ 504 R b. Economic Impact .................................... 507 R i. Lost Business Opportunities ...................... 507 R ii. Swatting ........................................ 510 R iii. Doxxing ........................................ 511 R III. CURRENT LAW .......................................... 512 R a. Divergent State Law ................................. 512 R b. Elements of the Law ................................. 514 R IV. LAW ENFORCEMENT AND INVESTIGATIVE PROBLEMS ........ 515 R a. Police Training ...................................... 515 R b. Investigative Resources .............................. 519 R c. Prosecutorial Jurisdiction ............................ 520 R V. SOLUTION ............................................... 521 R a. Proposed Legislation ................................ 521 R b. National Evidence Laboratory ........................ 526 R c. Training Materials ................................... 526 R VI. CONCLUSION ............................................ 528 R VII. APPENDIX ............................................... 530 R I. INTRODUCTION A journalist publishes an article; rape threats follow in the comments.1 An art curator has a conversation with a visitor to her gallery;
    [Show full text]
  • Staying Alive Fallout 76
    ALL FORMATS EXCLUSIVE Staying Alive Far Cry 4’s Alex Hutchinson How the British games industry survived its on his “louder, brasher” game turbulent early years Fallout 76 Bethesda, BETA and “spectacular” bugs Issue 1 £3 wfmag.cc 01 72000 GRIS 16 7263 97 Subscribe today 12 weeks for £12* Visit: wfmag.cc/12issues to order * UK Price. 6 issue introductory offer In search of real criticism an games be art? Roger Ebert judge – the critic is a guide, an educator, and an argued that they couldn’t. He was interpreter. The critic makes subtext text, traces C wrong. Any narrative medium themes, and fills in white space. Put another can produce art. But I’m not sure way, the critic helps the audience find deeper we’re producing many examples that meet JESSICA PRICE meaning in a piece of art. Or: the critic teaches that definition. Let’s be honest: everyone keeps Jessica Price is a the audience the rules of the games artists play producer, writer, and talking about BioShock because it had something manager with over a so that they’re on a level ground with the artist. to say and said it with competence and style, decade of experience One only has to compare movie or TV reviews in triple-A, indie, and not because what it had to say was especially tabletop games. in any mainstream publication, in which at least profound. Had it been a movie or a book, I doubt some critical analysis beyond “is this movie it would have gotten much attention.
    [Show full text]
  • Address Munging: the Practice of Disguising, Or Munging, an E-Mail Address to Prevent It Being Automatically Collected and Used
    Address Munging: the practice of disguising, or munging, an e-mail address to prevent it being automatically collected and used as a target for people and organizations that send unsolicited bulk e-mail address. Adware: or advertising-supported software is any software package which automatically plays, displays, or downloads advertising material to a computer after the software is installed on it or while the application is being used. Some types of adware are also spyware and can be classified as privacy-invasive software. Adware is software designed to force pre-chosen ads to display on your system. Some adware is designed to be malicious and will pop up ads with such speed and frequency that they seem to be taking over everything, slowing down your system and tying up all of your system resources. When adware is coupled with spyware, it can be a frustrating ride, to say the least. Backdoor: in a computer system (or cryptosystem or algorithm) is a method of bypassing normal authentication, securing remote access to a computer, obtaining access to plaintext, and so on, while attempting to remain undetected. The backdoor may take the form of an installed program (e.g., Back Orifice), or could be a modification to an existing program or hardware device. A back door is a point of entry that circumvents normal security and can be used by a cracker to access a network or computer system. Usually back doors are created by system developers as shortcuts to speed access through security during the development stage and then are overlooked and never properly removed during final implementation.
    [Show full text]
  • In Re Grand Jury Subpoena Gj2020111968168and Applicationof The
    Case 1:20-sc-03082-BAH Document 3 Filed 03/10/21 Page 1 of 16 UNITEDSTATESDISTRICT COURT FOR THE DISTRICT OF COLUMBIA ) IN RE GRAND JURY SUBPOENA ) SC NO. 1:20-sc-03082 GJ2020111968168AND APPLICATIONOF ) THE UNITEDSTATESOF AMERICAFOR ) AN ORDER PURSUANT TO 18 U.S.C. ) Filed Under Seal § 2705(B) ) ) ) Twitter Account: @NunesAlt ) ) TWITTER, INC.’S MOTIONTO QUASH SUBPOENA AND VACATE NONDISCLOSUREORDERAND MEMORANDUMINSUPPORT INTRODUCTION The government has issued a subpoena (the “Subpoena”) for “[a]ll customer or subscriber account information” for the Twitter user @NunesAlt (the “Account”) from October 1, 2020 to present. Under the First Amendment, the government cannot compel Twitter to produce information related to the Account unless it “can show a compelling interest in the sought-after material and a sufficient nexusbetween the subject matter of the investigation and the information it seek[s].” Inre Grand Jury Subpoena No. 11116275,846 F. Supp. 2d 1, 4 (D.D.C.2012)(internal quotation marksomitted).While Twitter does not have visibility into the purpose of the Subpoena, Twitter has serious concerns whether the government can meet this standard given the context in which it has received the Subpoena. It appears to Twitter that the Subpoena may be related to Congressman Devin Nunes’s repeated efforts to unmask individuals behind parody accounts critical of him. His efforts to suppress critical speech are as well-publicized as they are unsuccessful.He recently sued Twitter, attempting to hold it liable for speech by the parody Twitter accounts @DevinCow, @DevinNunesMom,@fireDevinNunes,and @DevinGrapes, and asking the court in that case to Case 1:20-sc-03082-BAH Document 3 Filed 03/10/21 Page 2 of 16 order Twitter to disclose information identifying those accounts.
    [Show full text]
  • Can Public Diplomacy Survive the Internet?
    D C CAN PUBLIC DIPLOMACY SURVIVE THE INTERNET? BOTS, ECHO CHAMBERS, AND DISINFORMATION Edited by Shawn Powers and Markos Kounalakis May 2017 TRANSMITTAL LETTER Tothe President, Congress, Secretary of State and the American People: Established in 1948, the U.S. Advisory Commission on Public Diplomacy (ACPD) is authorized pur­ suant to Public Law 114- 113 to appraise all U.S. government efforts to understand, inform and in­ fluence foreign publics. We achieve this goal in a variety of ways, including, among other efforts, offering policy recommendations, and through our Comprehensive Annual Report, which tracks how the roughly $1.8 billion in appropriated funds is spent on public diplomacy efforts throughout the world. Part of the Commission’s mandate is to help the State Department prepare for cutting edge and transformative changes, which have the potential to upend how we think about engaging with foreign publics. This report aims to achieve precisely that. In order to think carefully about public diplomacy in this ever and rapidly changing communications space, the Commission convened a group of private sector, government, and academic experts at Stanford University’s Hoover Insti­ tution to discuss the latest research and trends in strategic communication in digital spaces. The results of that workshop, refined by a number of follow-on interviews and discussions with other organizations interested in similar questions, are included in this report. Can Public Diplomacy Survive the Internet? features essays by workshop participants that focus on emergent and potentially transformative technology and communication patterns. The essays also highlight the potential challenges and opportunities these changes create for public diplomacy practitioners in particular and the U.S.
    [Show full text]
  • Un Conjunto De Herramientas Para Unity Orientado Al Desarrollo De Videojuegos De Acción-Aventura Y Estilo Retro Con Gráficos Isométricos 3D
    UN CONJUNTO DE HERRAMIENTAS PARA UNITY ORIENTADO AL DESARROLLO DE VIDEOJUEGOS DE ACCIÓN-AVENTURA Y ESTILO RETRO CON GRÁFICOS ISOMÉTRICOS 3D D. Iván José Pérez Colado D. Víctor Manuel Pérez Colado GRADO EN INGENIERÍA DEL SOFTWARE FACULTAD DE INFORMÁTICA UNIVERSIDAD COMPLUTENSE DE MADRID TRABAJO DE FIN DE GRADO DE INGENIERÍA DEL SOFTWARE Madrid, 20 junio de 2014 Director: Prof. Dr. D. Federico Peinado Gil Autorización de difusión y utilización Iván José Pérez Colado y Víctor Manuel Pérez Colado autorizamos a la Universidad Complutense de Madrid a difundir y utilizar con fines académicos, no comerciales y mencionando expresamente a sus autores, tanto la propia memoria, como el código, los contenidos audiovisuales incluso si incluyen imágenes de los autores, la documentación y/o el prototipo desarrollado. Fdo. Iván José Pérez Colado Fdo. Víctor Manuel Pérez Colado Para nuestro nono Quien con su empeño e ilusión, fue un motivo en nuestras vidas para llegar hasta donde hemos llegado y no está hoy con nosotros para verlo Agradecimientos Queremos agradecer, en primer lugar, a nuestro director de proyecto Federico Peinado Gil, por darnos la oportunidad de participar en un proyecto del campo que más nos apasiona, los videojuegos, y por toda la ayuda y dedicación que nos ha prestado durante el curso para completarlo. En segundo lugar, agradecemos a nuestros amigos y familia, su opinión y continua valoración de los resultados que íbamos obteniendo durante la realización del proyecto. Por último, agradecer a la comunidad de usuarios de Unity, y a los usuarios de StackOverflow, la cesión de múltiples fragmentos de código que han servido de referencia para la realización del proyecto.
    [Show full text]
  • Mapping the Range of User Roles in Open Development Games Projects
    Not just users: Mapping the range of user roles in open development games projects Luke Thominet Florida International University Miami, FL, USA [email protected] ABSTRACT love what you’re doing, and they’re not playing a lot, Open video game development systems provide a useful model but they might be writing fanfction, they might be for designing an engaging user experience (UX) research project. drawing, they might be doing other things, and they’re While UX research has typically framed people simultaneously as not actually just a hardcore player. [19] research subjects and users of a technology, some work has also At the 2015 Game Developers Conference, a panel of experienced problematized each of these categorizations. For instance, UX prac- developers discussed their experiences with open development titioners have questioned the framing of people as generic users, projects. In the quote above, Jamie Cheng described how partici- and participatory design has repositioned participants as co-owners pants in these projects were doing a lot more than just playing the of the results of research. This article ofers a complimentary per- game. This paper expands on this observation to review the broad spective by applying the concept of user roles to the activity of range of roles that user-participants adopt in open development participation in open development. Open development, which is the systems. prolonged process where incomplete games are publicly released Broadly speaking, open development is publicly distributing an and iterated on based on player feedback, is fundamentally a UX incomplete game, sharing information about the game develop- research process.
    [Show full text]
  • What to Do When Confronted by an Internet Troll. “One Negative Voice Aimed at Me Has the Incredible Power to Drown out a Thousand Positive Ones
    Internet Trolling What to do when confronted by an internet troll. “One negative voice aimed at me has the incredible power to drown out a thousand positive ones. One of the greatest things I can achieve is to never let it.” – Dan Pearce, Single Dad Laughing The key with online Trolls, just like any bully, is to report their behaviour and avoid responding to their comments. You can control who can contact you online and it’s important to make use of the muting, reporting and blocking features available on these platforms. However, it can be immensely frustrating and hurtful to know that people are spreading falsities and lies about you or your loved ones online. This may leave you feeling overwhelmed, stressed and unsure of how to make it stop. We’ve compiled some guidance on the steps you can take in response to this behaviour on Twitter and Facebook. What is an internet ‘Troll’ UrbanDictionary.com defines Trolling as: “The deliberate act, (by a Troll – noun or adjective), of making random unsolicited and/or controversial comments on various internet forums with the intent to provoke an emotional knee jerk reaction from unsuspecting readers to engage in a fight or argument.” The anonymous nature of the internet allows for the bullies to operate without accountability or fear of punishment. Indeed, the self-creation of profiles allows user to pose as anyone (or no-one) and the nature of public platforms allows one post, or one user, to reach millions. Undoubtedly, these platforms can be used as a force for good, yet at the same time, can cause significant harm.
    [Show full text]
  • 'Please Read the Comments': Commenting Cultures
    Selected Papers of #AoIR2020: st The 21 ​ Annual Conference of the ​ Association of Internet Researchers D u b l i n Virtual, Irela nEventd / 2 8/ - 27-3131 Oc Octobertober 2 0202020 ‘PLEASE READ THE COMMENTS’: COMMENTING CULTURES ACROSS PLATFORMS Crystal Abidin Curtin University Platform-specific commenting cultures An old adage about the internet goes “Don’t Read The Comments”. It is a cynical word of caution from supposedly more experienced and savvy internet users, against a slew of negative, abusive, and unhelpful comments that are usually rampant online, stemming from trolling behaviour (Phillips 2015). “Don’t Read The Comments” has become an internet meme. Alongside parody websites (i.e. @AvoidComments n.d.), trawling through the comments section in search of ludicrosity has become an internet genre in and of itself. This comprises the likes of meme factory ‘The Straits Times Comment Section’ which collates absurd comments from users on a specific newspaper’s Facebook page (STcomments n.d.), as well as internet celebrity troll commentators like ‘American Ken’ M (Know Your Meme n.d.) and Singaporean ‘Peter Tan’ (Yeoh 2018), who post comments on a network of social media and fora in stealthily satirical ways that have even been co-opted for advertorials (Vox 2016). Such vernacular practice has in turn provoked a counter-genre of memes known as “I’m just Here For The Comments” (Tenor n.d.), in which users closely follow social media posts mainly for the resulting discussion and engagement in the comments section rather than the actual post itself. It is on this point of departure that this panel turns its focus to commenting cultures across platforms.
    [Show full text]
  • Cyber -Trolling, Cyber-Impersonation and Social Adjustment Among Secondary School Students in Calabar Education Zone, Cross River State, Nigeria
    British Journal of Education Vol.7, Issue 10, pp.44-52, October 2019 Published by ECRTD- UK Print ISSN: ISSN 2054-6351 (print), Online ISSN: ISSN 2054-636X (online) CYBER -TROLLING, CYBER-IMPERSONATION AND SOCIAL ADJUSTMENT AMONG SECONDARY SCHOOL STUDENTS IN CALABAR EDUCATION ZONE, CROSS RIVER STATE, NIGERIA Denwigwe, C.P., Uche, R.D., Asuquo, P.N., and Ngbar, M.W. Department of Guidance and Counselling, University of Calabar, Calabar Nigeria. ABSTRACT: This study is an investigation of cyber-trolling, cyber-impersonation and social adjustment among secondary school students in Calabar Education Zone of Cross River State, Nigeria. Two hypotheses were formulated to guide the discovery of the influence of cyber-trolling and cyber-impersonation on social adjustment of SS1 students which is the main purpose of the study. The research design adopted was the ex-post facto research design. 8829 public secondary school students formed the study population. A total sample of 579 students was selected through the purposive sampling technique. The instrument for data collection was the researcher-made Cyber bullying Assessment Questionnaire (CAQ), constructed on a four-point Likert scale of strongly agreed, agreed, disagreed and strongly disagreed. The Cronbach Alpha Reliability method was used to establish the reliability coefficient of the instrument with a range of 0.71 to 0.79. The statistical tool for data analysis was the One-way Analysis of Variance (ANOVA). The findings of the study revealed after the testing of the two hypotheses at 0.05 level of significance were that cyber-trolling and cyber- impersonation have negative influence on the social adjustment of secondary school students in Calabar Education Zone of Cross River State, Nigeria.
    [Show full text]
  • Bladed Fury Crack Game Download
    1 / 2 Bladed Fury Crack Game Download Durga Stuti Download .... pdf Durga stuti by chaman lal bhardwaj WordPress com. December 4th, 2017 ... Bladed Fury crack game download · mbrwizard suite .... You cannot download Bladed Fury for free, including torrenting, since the game is distributed as a one-time purchase. MMO13 gives Bladed Fury a 7.8 out of 10.. It is one of the eight Heavy Weapons in the Game and has 90 bullets, boasts high Damage, ... Which nest they will defend with a legendary aggressive fury, chasing the ... That's B Boddington Tactical Hunter Fixed Blade Knife with Rough Black ... List All Game Switch Download Free Game Nintendo Switch XCI NSP EShop, .... Get the final cracked versions of new games by direct links. ... Bladed Fury is an Action, Adventure and RPG game for PC published by NEXT Studios in 2018.. Bladed Fury (2018), 0.97GB ElAmigos release, game is already cracked after installation (crack by Codex). Updated to version 1.0.1820 .... Arcticfox – An Amiga game from 1986 has been cracked/fixed to work on all Amigas ... StingRay, that you can now download the fully cracked and working Amiga game 'Articfox'. ... Bladed Fury now launching in March 2021.. ... Free Download - Changelogs: bonus also provides crack patch of this game. ... Bladed Fury Free Download PC Game Cracked in Direct Link and Torrent. ... City CD Key; GnuCash 3.9 released; Valdis Story: Abyssal City Free Download.. CODEX – TORRENT – FREE DOWNLOAD – CRACKED. Bladed Fury An action game set in the Ancient China, bringing players addictive . WeMod has cheats and trainers for hundreds of the most popular PC games.
    [Show full text]