Curating the Future : the Sustainability Practices of Online Hate Groups

Total Page:16

File Type:pdf, Size:1020Kb

Curating the Future : the Sustainability Practices of Online Hate Groups CURATING THE FUTURE: THE SUSTAINABILITY PRACTICES OF ONLINE HATE GROUPS By Julia Rose DeCook A DISSERTATION Submitted to Michigan State University in partial fulfillment of the requirements for the degree of Media and Information Studies — Doctor of Philosophy 2019 ABSTRACT CURATING THE FUTURE: THE SUSTAINABILITY PRACTICES OF ONLINE HATE GROUPS By Julia Rose DeCook The rise of populist fascism and hate violence across the world has raised alarm bells about the nature of the Internet in the radicalization process. Although there have been attempts in recent years to halt the spread of extremist discourse online, these groups remain and continue to grow. The purpose of this dissertation project was to examine online extremist groups’ responses to infrastructural failure, which was defined as an event such as deplatforming and other modes of censorship, to understand how these groups manage to persist over time. Examining the responses of three groups to these failures, r/TheRedPill; r/Incels and Incels.me; and r/AznIdentity; who are affiliated with the larger “Manosphere” (a loosely connected online network of men’s rights activists, Incels, Pick Up Artists, etc. connected to the alt right), what was revealed is that these groups’ practices not only build their communities and spread their discourse, but sustains them. Previous research on hate groups tends to focus on the role of Internet platforms in amplifying hate speech; the discourses the groups create; or on political strategies enacted by the groups. I argued in this dissertation project that this does not get at the heart of why these groups manage to survive despite attempts to thwart them, and that studying the material structures they are on as well as their social practices are necessary to develop better strategies to combat violent far-right extremism. Using an update to the grounded theory approach known as situational analysis, I observed and followed the groups for two years (January 2017 to 2019) and collected data in the form of text posts, images, and their networks. To inform the project, I relied on a theoretical framework guided by platform and infrastructure studies, communication, anthropology, and social movement studies. Ultimately, I argue that what these groups create through these sustainability practices results in a symbolic infrastructure . Unlike material infrastructures (like large scale electrical grids) or knowledge infrastructures, symbolic infrastructure is made up of not just the material artifacts that these groups create, but is primarily premised on the shared practices of these groups that produce and reproduce their discourse, their identity, and their networks. Specifically, symbolic infrastructure is built up of three subpractices: archiving; fortification; and identity maintenance and network building. These practices, and their resulting product, are made possible by the material structures of the Internet and allows for the preservation and circulation of the group’s epistemic/discursive forms. Symbolic infrastructure, due to its nature, is easily transported from platform to platform even after the groups are faced with infrastructural failure or threatened by it. Although it was famously said by Susan Leigh Star that infrastructures only become visible upon breakdown, the case studies in this dissertation demonstrate that the mere threat of breakage is enough for the nature and role of infrastructure to be revealed. Each of the groups case studies navigate and maneuver around the constraints of the platform and digital infrastructure they find themselves reliant on, but also manage to innovatively exploit its affordances. What this dissertation revealed is that the strategy of deplatforming has significant limits because of the nature of the Internet, and that the work of combating extremist thought is not only relegated to the digital realm but must be extended beyond it. Copyright by JULIA ROSE DeCOOK 2019 For my family - I could not have accomplished this without your love and support. I love you all so much. Thank you. 제 가족들에게 - 여러분의 사랑과 지원 없이 이 학위를 받을 수 없었을 겁니다 . 너무나 사랑하고 감사합니다 . Grandma, you never had the choice to go to school. I dedicate this dissertation and my doctorate to you. 할머니 , 할머니에겐 학교를 갈 수 있는 선택권이 없었습니다 . 제 논문과 박사학위를 할머니에게 바칩니다 . v ACKNOWLEDGEMENTS “ … Life is not what you alone make it. Life is the input of everyone who touched your life and every experience that entered it. We are all part of another.” - Yuri Kochiyama, Passing it On, 2004 To my family and friends – you have all fundamentally shaped who I am and have been who I cried to, laughed with, and are all why I am able to live a life filled with joy and love. I could not have gotten through this without you. Thank you for constantly reminding me of the potential of who I was, who I am, and who I can become. I love you all. To my advisor, Kjerstin – I can’t express in words how grateful I am to you for taking me on and for being supportive, kind, and encouraging in my darkest moments. Thank you. You have taught me not only how to be an academic but also a human being. To my committee – Beth, Chantal, and Casey – and my mentors: you have all fundamentally shaped me as a scholar and person, and your kindness and intelligence are what I aim to emanate in the future. Thank you. To my community – it is an honor just to be Asian, and an honor to be an mixed race Korean woman. Without my community, without my heritage, I am nothing. I am eternally grateful to our organizations, culture, and elders. We really are our ancestors’ wildest dreams come true. To those who have been injured or lost their lives because of racial and gendered violence – I also dedicate this dissertation to all of you and those who are mourning your loss. I know that it will not replace the lives that have been cut tragically short, but it is my hope that this project helps to stop future violence and pain. vi TABLE OF CONTENTS LIST OF TABLES ix LIST OF FIGURES x CHAPTER 1: Introduction 1 The Possibilities of Failure 6 Infrastructural Imaginaries 9 Dissertation Map 13 CHAPTER 2: Background and Methods 16 [Online] Extremist Social Movements 17 When Infrastructure Breaks 22 Affordances for Radicalization 27 Networked Publics and Cultural/Epistemic Production 30 Discourse and Preservation 32 Shaping And Maintaining Online Social Worlds 36 Portable Infrastructure 37 Methods 39 Digital Ethnography 40 Data Analysis 43 Situational Analysis 43 CHAPTER 3: Case Study 1 – World Builders: r/TheRedPill 48 Quarantine 49 The Red Pill Universe 51 r/TheRedPill Discourse and Ideology 54 The Ban Wave Cometh: The Beginning of the Imminent End 56 Contingency Plans: Doomsday Preparation on r/TheRedPill 63 “Why Don’t We Just Leave Reddit On Our Own?” 68 “Incels Gets Banned: What Does That Mean For TRP?” 82 “A Civil War Is Coming.” 91 “We Are Not Organized And That Is Our Strength.” 98 Arming the Defenses 101 CHAPTER 4: Case Study 2 – Lost Civilizations: r/Incels & Incels.me 103 Banned: November 2017 104 The “Incelosphere” 107 The 2017 Ban Wave 110 September 2017 117 October 2017 121 Paradise Lost: Incels.Me 126 “Elliot Rodger’s Legacy Lives On” 134 vii “Incels Are Finally Being Taken Seriously.” 138 Incels.Me is Dead 150 “The Fire Rises.” 155 The Incel Institution 163 Diffused Extremism 166 CHAPTER 5: Case Study 3 – Refugees: MRAsians and r/AznIdentity 168 The Asian Masculinity Ecosystem 171 “Get Twitter Now.” 174 Ban Wave 2017 And Networked Harassment 186 MRAsians 197 The Politics of Digital Space 209 CHAPTER 6: Discussion and Conclusion 212 Anticipating Failure 218 Migration Across the Digital Frontier 221 Symbolic Infrastructure 224 Identity Maintenance and Network Building 227 Fortification 230 Archiving 232 Strategies of Subversion 233 Failure as a Nexus for Action 236 Follow the Leader? 239 Portable Discourse and Culture 241 “Culture Wars” and the Fight for Reality 243 Centralized Hubs of Extremism 245 Reproducing Structures 247 Final Thoughts 252 APPENDICES 255 APPENDIX A: Glossary 256 APPENDIX B: Relational Maps 257 APPENDIX C: Discourse Maps 259 BIBLIOGRAPHY 262 viii LIST OF TABLES Table 1. Case Studies, Sites, and Data of Data Collection Start 41 Table 2. Description of Maps, from page xxiv from Clarke, Friese, and Washburn, 2017 44 ix LIST OF FIGURES Figure 1. r/TheRedPill’s landing page after the quarantine 4 Figure 2. r/TheRedPill is Quarantined 49 Figure 3. r/TheRedPill’s universe on reddit 52 Figure 4. r/TheRedPill’s off-reddit universe 54 Figure 5. Response to a reddit announcement post about banning communities containing sexually suggestive content featuring minors/perceived minors 56 Figure 6. Valuable posts should be archived 59 Figure 7. A post from 2013 noting the shadow banning of accounts associated with Men’s Rights and TheRedPill 60 Figure 8. You are not a part of reddit 61 Figure 9. Alt-accounts 62 Figure 10. The landing page of Puerarchy.com 64 Figure 11. An email emergency alert system in the event of a forum shut down 66 Figure 12. When we get banned from the Internet 67 Figure 13. Forums.red 68 Figure 14. “Why don’t we just leave reddit on our own?” 69 Figure 15. The Purge 70 Figure 16. A post from October 2016 about Donald Trump on r/TheRedPill 71 Figure 17. A post about the Vice article that increased attention of the subreddit in 2017 72 Figure 18. A mod post responding to Yiannopoulos’ Twitter ban by moderator redpillschool 73 Figure 19. You can kill a man but you can’t kill an idea 74 x Figure 20. “Don’t talk about Fight Club.” 78 Figure 21. User Bloodycurative speaking about their doxing experience 79 Figure 22.
Recommended publications
  • Setting the Record Straighter on Shadow Banning
    Setting the Record Straighter on Shadow Banning Erwan Le Merrer, Benoˆıt Morgan, Gilles Tredan,´ Univ Rennes, Inria, CNRS, Irisa IRIT/ENSHEEIT LAAS/CNRS [email protected] [email protected] [email protected] Abstract—Shadow banning consists for an online social net- happens on the OSN side, collecting information about po- work in limiting the visibility of some of its users, without them tential issues is difficult. In this paper, we explore scientific being aware of it. Twitter declares that it does not use such approaches to shed light on Twitter’s alleged shadow banning a practice, sometimes arguing about the occurrence of “bugs” to justify restrictions on some users. This paper is the first to practice. Focusing on this OSN is crucial because of its central address the plausibility of shadow banning on a major online use as a public communication medium, and because potential platform, by adopting both a statistical and a graph topological shadow banning practices were recently commented. approach. Shadow banning and moderation techniques. shadow banning We first conduct an extensive data collection and analysis (SB or banning for short, also known as stealth banning [6]) campaign, gathering occurrences of visibility limitations on user profiles (we crawl more than 2:5 millions of them). In such is an online moderation technique used to ostracise undesired a black-box observation setup, we highlight the salient user user behaviors. In modern OSNs, shadow banning would refer profile features that may explain a banning practice (using to a wide range of techniques that artificially limit the visibility machine learning predictors).
    [Show full text]
  • Big Data for Improved Health Outcomes — Second Edition — Arjun Panesar Machine Learning and AI for Healthcare Big Data for Improved Health Outcomes Second Edition
    Machine Learning and AI for Healthcare Big Data for Improved Health Outcomes — Second Edition — Arjun Panesar Machine Learning and AI for Healthcare Big Data for Improved Health Outcomes Second Edition Arjun Panesar Machine Learning and AI for Healthcare Arjun Panesar Coventry, UK ISBN-13 (pbk): 978-1-4842-6536-9 ISBN-13 (electronic): 978-1-4842-6537-6 https://doi.org/10.1007/978-1-4842-6537-6 Copyright © 2021 by Arjun Panesar This work is subject to copyright. All rights are reserved by the Publisher, whether the whole or part of the material is concerned, specifically the rights of translation, reprinting, reuse of illustrations, recitation, broadcasting, reproduction on microfilms or in any other physical way, and transmission or information storage and retrieval, electronic adaptation, computer software, or by similar or dissimilar methodology now known or hereafter developed. Trademarked names, logos, and images may appear in this book. Rather than use a trademark symbol with every occurrence of a trademarked name, logo, or image we use the names, logos, and images only in an editorial fashion and to the benefit of the trademark owner, with no intention of infringement of the trademark. The use in this publication of trade names, trademarks, service marks, and similar terms, even if they are not identified as such, is not to be taken as an expression of opinion as to whether or not they are subject to proprietary rights. While the advice and information in this book are believed to be true and accurate at the date of publication, neither the authors nor the editors nor the publisher can accept any legal responsibility for any errors or omissions that may be made.
    [Show full text]
  • Analyzing Twitter Users' Behavior Before and After Contact By
    Analyzing Twitter Users’ Behavior Before and After Contact by Russia’s Internet Research Agency UPASANA DUTTA, RHETT HANSCOM, JASON SHUO ZHANG, RICHARD HAN, TAMARA 90 LEHMAN, QIN LV, SHIVAKANT MISHRA, University of Colorado Boulder, USA Social media platforms have been exploited to conduct election interference in recent years. In particular, the Russian-backed Internet Research Agency (IRA) has been identified as a key source of misinformation spread on Twitter prior to the 2016 U.S. presidential election. The goal of this research is to understand whether general Twitter users changed their behavior in the year following first contact from an IRA account. We compare the before and after behavior of contacted users to determine whether there were differences in their mean tweet count, the sentiment of their tweets, and the frequency and sentiment of tweets mentioning @realDonaldTrump or @HillaryClinton. Our results indicate that users overall exhibited statistically significant changes in behavior across most of these metrics, and that those users that engaged with the IRA generally showed greater changes in behavior. CCS Concepts: • Applied computing ! Law, social and behavioral sciences; • Human-centered com- puting ! Collaborative and social computing. Additional Key Words and Phrases: Internet Research Agency; IRA; Twitter; Trump; democracy ACM Reference Format: Upasana Dutta, Rhett Hanscom, Jason Shuo Zhang, Richard Han, Tamara Lehman, Qin Lv, Shivakant Mishra. 2021. Analyzing Twitter Users’ Behavior Before and After Contact by Russia’s Internet Research Agency. Proc. ACM Hum.-Comput. Interact. 5, CSCW1, Article 90 (April 2021), 24 pages. https://doi.org/10.1145/3449164 INTRODUCTION For many years, the growth of online social media has been seen as a tool used to bring people together across borders and time-zones.
    [Show full text]
  • Ways to Become a Digital Nomad
    23 WAYS TO BECOME A DIGITAL NOMAD We give ideas, so you can’t give excuses…. NATHAN BUCHAN & HANNAH MARTIN (WORLD NATE & INTREPID INTROVERT) DESIGN & SELL CLOTHING 1 WITH TEESPRING Info: Design and create your own tees, hoodies, mugs, & more with $0 investment! All you need to do is design your logo or upload an existing logo you have already created. Place it on a product of your choice (such as a long sleeve shirt). Choose the type of material you wish to use. Then name the price you wish to sell it for. TeeSpring will tell you the cost of each item made. You will reap the profit from each item you sell. Here’s the cool thing: It doesn’t cost you anything. TeeSpring won’t make your shirt until AFTER someone has purchased; therefore no risk of investment is made. The company will then make and ship each order out for you. You do nothing but advertise your products and reap the rewards of your sales. Income Potential: Scalable with marketing.. You can run Facebook campaigns from within TeeSpring. We have tutorials on this in our Behind Closed Doors Membership here SELL ON EBAY: BUY 2 ON AMAZON Info: Source a product on Amazon and list the same item on E-bay with a markup. Then once it’s sold on E-Bay, buy that same product on Amazon and send it directly to your customer. * Just make sure there is a decent amount of stock and not just one or two left. Begin by researching which products are trending and how much competition you have with selling it on E-bay.
    [Show full text]
  • The Internet of Garbage
    1 The Internet of Garbage © 2015, 2018 by Sarah Jeong Cover and Illustrations by William Joel for The Verge, © 2018 Vox Media, Inc. All rights reserved. The Verge Edition 1.5 August 2018 Published by Vox Media, Inc. www.theverge.com ISBN: 978-0-692-18121-8 2 Table of Contents Preface ............................................... 4 Chapter One: The Internet Is Garbage .................. 6 A Theory of Garbage .......................................... 8 Spam as Garbage .............................................. 9 Chapter Two: On Harassment ........................... 12 Harassment in the News ...................................... 13 About That Media Narrative . ............................ 18 Is Harassment Gendered? ..................................... 20 Intersections of Harassment ................................. 21 On Doxing ................................................... 24 SWATting .................................................... 27 Doxing Women ................................................ 28 Concluding Thoughts on Doxing ............................... 30 A Taxonomy of Harassment .................................... 32 On Modern-Day Social Media Content Moderation ............... 35 What Happens Before: Setting Norms .......................... 38 Chapter Three: Lessons from Copyright Law ............ 40 The Intersection of Copyright and Harassment ................ 41 How the DMCA Taught Us All the Wrong Lessons ................ 44 Turning Hate Crimes into Copyright Crimes ................... 47 Chapter Four: A
    [Show full text]
  • Generating Counter Narratives Against Online Hate Speech: Data and Strategies
    Generating Counter Narratives against Online Hate Speech: Data and Strategies Serra Sinem Tekiroglu˘ 1, Yi-Ling Chung1,2, and Marco Guerini1 1Fondazione Bruno Kessler, Via Sommarive 18, Povo, Trento, Italy [email protected],[email protected],[email protected] 2University of Trento, Italy Abstract the conversations (Bielefeldt et al., 2011; Jurgens et al., 2019). In this line of action, some Non- Recently research has started focusing on avoiding undesired effects that come with Govermental Organizations (NGOs) train operators content moderation, such as censorship and to intervene in online hateful conversations by writ- overblocking, when dealing with hatred on- ing counter-narratives. A Counter-Narrative (CN) line. The core idea is to directly intervene in is a non-aggressive response that offers feedback the discussion with textual responses that are through fact-bound arguments and is considered as meant to counter the hate content and prevent the most effective approach to withstand hate mes- it from further spreading. Accordingly, au- sages (Benesch, 2014; Schieb and Preuss, 2016). tomation strategies, such as natural language generation, are beginning to be investigated. To be effective, a CN should follow guidelines simi- 1 Still, they suffer from the lack of sufficient lar to those in ‘Get the Trolls Out’ project , in order amount of quality data and tend to produce to avoid escalating the hatred in the discussion. generic/repetitive responses. Being aware of Still, manual intervention against hate speech the aforementioned limitations, we present a is not scalable. Therefore, data-driven NLG ap- study on how to collect responses to hate ef- proaches are beginning to be investigated to assist fectively, employing large scale unsupervised language models such as GPT-2 for the gen- NGO operators in writing CNs.
    [Show full text]
  • Spreadshirt: My Newest Passive Income Stream and How You Can Earn Too
    Episode 7: Spreadshirt: My Newest Passive Income Stream and How You Can Earn Too Subscribe to the podcast here. Hey what’s up everybody! Welcome to numero siete of my podcast, number 7. I’m kind of pumped about this podcast because I hope it’s going to give some of you another way or possible way to monetize your website. I just got my first check from SpreadShirt and it was 530 bucks and 20 cents, to be exact. And you can go to 2createawebsite.com/podcast7 to see a screenshot of the earnings. I do that to show proof. I don’t do that to brag. I know there’s a lot of sites out here that talk about making money and they never show that they are. So I do that from time to time for that very reason but not to show off. Oh and while you’re there, you gotta check out my new site design. Yaaaay! My site got a little facelift about a week ago so you gotta check it out. SpreadShirt is a print on demand affiliate program where you simply upload an image, and then you can put that image on a shirt, a button, a hat or whatever. Then you mark up the price to whatever you want to sell it for, and your markup is your commission. So if the base price of the shirt is $10 and you sell it for $20, then you get $10 for every shirt sold. It’s completely free. Now there are premium options and I’m going to talk about this later in the podcast, but it doesn’t cost you anything.
    [Show full text]
  • Countering Terrorism Online with Artificial Intelligence an Overview for Law Enforcement and Counter-Terrorism Agencies in South Asia and South-East Asia
    COUNTERING TERRORISM ONLINE WITH ARTIFICIAL INTELLIGENCE AN OVERVIEW FOR LAW ENFORCEMENT AND COUNTER-TERRORISM AGENCIES IN SOUTH ASIA AND SOUTH-EAST ASIA COUNTERING TERRORISM ONLINE WITH ARTIFICIAL INTELLIGENCE An Overview for Law Enforcement and Counter-Terrorism Agencies in South Asia and South-East Asia A Joint Report by UNICRI and UNCCT 3 Disclaimer The opinions, findings, conclusions and recommendations expressed herein do not necessarily reflect the views of the Unit- ed Nations, the Government of Japan or any other national, regional or global entities involved. Moreover, reference to any specific tool or application in this report should not be considered an endorsement by UNOCT-UNCCT, UNICRI or by the United Nations itself. The designation employed and material presented in this publication does not imply the expression of any opinion whatsoev- er on the part of the Secretariat of the United Nations concerning the legal status of any country, territory, city or area of its authorities, or concerning the delimitation of its frontiers or boundaries. Contents of this publication may be quoted or reproduced, provided that the source of information is acknowledged. The au- thors would like to receive a copy of the document in which this publication is used or quoted. Acknowledgements This report is the product of a joint research initiative on counter-terrorism in the age of artificial intelligence of the Cyber Security and New Technologies Unit of the United Nations Counter-Terrorism Centre (UNCCT) in the United Nations Office of Counter-Terrorism (UNOCT) and the United Nations Interregional Crime and Justice Research Institute (UNICRI) through its Centre for Artificial Intelligence and Robotics.
    [Show full text]
  • What I Learned on the Way to $2,293.35 in 7 Days with My First Teespring Campaign
    What I Learned On The Way To $2,293.35 In 7 Days With My First Teespring Campaign WHAT I LEARNED ON THE WAY TO $2,,293..35 IN 7 DAYS WITH MY FIRST TEESPRING CAMPAIGN $3,294.04 Earned - $1,000.69 Spent = $2,293.35 Profit in 1 Week! Page 1 of 14 Copyright 2013 © Niche Gold Mining Company LLC What I Learned On The Way To $2,293.35 In 7 Days With My First Teespring Campaign All rights reserved. No part of this book may be reproduced in any form or by any electronic or mechanical means, including information storage and retrieval systems, without written permission from the author, except in the case of a reviewer, who may quote brief passages embodied in critical articles or in a review. Trademarked names appear throughout this book. Rather than use a trademark symbol with every occurrence of a trademarked name, names are used in an editorial fashion, with no intention of infringement of the respective owner’s trademark. The information in this book is distributed on an “as is” basis, without warranty. Although every precaution has been taken in the preparation of this work, neither the author nor the publisher shall have any liability to any person or entity with respect to any loss or damage caused or alleged to be caused directly or indirectly by the information contained in this book. Note: You will not receive videos as separate downloads. All videos may be watched or downloaded via links at the end of this book. CONTENTS What I Learned On The Way To $2,,293.35 In 7 Days With My First Teespring Campaign ...............................................
    [Show full text]
  • Web Serial Toolbox
    Web Serial Toolbox Why & How To Serialize Your Fiction Online (for almost no money) by Cecilia Tan ctan.writer @ gmail.com Twitter @ceciliatan #serialtoolbox What is a web serial? What is a web serial? Serialized storytelling is already the norm in ● What is a web serial? Serialized storytelling is already the norm in ● comic books What is a web serial? Serialized storytelling is already the norm in ● comic books ● television series What is a web serial? Serialized storytelling is already the norm in ● comic books ● television series ● web comics Charles Dickens (The Pickwick Papers) and Alexandre Dumas (Three Musketeers) used the emergent mass media of their era (broadsheet printing & early newspapers) to serialize to mass audiences. Now we have the Internet. What is a web serial? ● Text fiction telling a continuing story that is posted online What is a web serial? ● Text fiction telling a continuing story that is posted online – may or may not have a set length/ending ● closed serials are like a novel but split up ● open serials are like a soap opera What is a web serial? ● Text fiction telling a continuing story that is posted online – may or may not have a set length/ending ● closed serials are like a novel but split up ● open serials are like a soap opera – may or may not be posted free to read ● most are free to read on the web ● some are to subscribers only, or are “freemium” going first to subscribers and then free to read for all later Why write a web serial? Why write a web serial? Find readers as addicted to reading as you are to writing.
    [Show full text]
  • Reddit Quarantined: Can Changing Platform Affordances Reduce Hateful Material Online?
    Volume 9 | Issue 4 Reddit quarantined: can changing platform affordances reduce hateful material online? Simon Copland Australian National University [email protected] DOI: https://doi.org/10.14763/2020.4.1516 Published: 21 October 2020 Received: 20 May 2020 Accepted: 6 August 2020 Competing Interests: The author has declared that no competing interests exist that have influenced the text. Licence: This is an open-access article distributed under the terms of the Creative Commons Attribution 3.0 License (Germany) which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. https://creativecommons.org/licenses/by/3.0/de/deed.en Copyright remains with the author(s). Citation: Copland, S. (2020). Reddit quarantined: can changing platform affordances reduce hateful material online?. Internet Policy Review, 9(4). DOI: 10.14763/ 2020.4.1516 Keywords: Reddit, Affordances, Misogyny, Manosphere, Digital platforms, Online platforms Abstract: This paper studies the efficacy of the Reddit’s quarantine, increasingly implemented in the platform as a means of restricting and reducing misogynistic and other hateful material. Using the case studies of r/TheRedPill and r/Braincels, the paper argues the quarantine successfully cordoned off affected subreddits and associated hateful material from the rest of the platform. It did not, however, reduce the levels of hateful material within the affected spaces. Instead many users reacted by leaving Reddit for less regulated spaces, with Reddit making this hateful material someone else’s problem. The paper argues therefore that the success of the quarantine as a policy response is mixed. 2 Internet Policy Review 9(4) | 2020 This paper is part of Trust in the system, a special issue of Internet Policy Review guest- edited by Péter Mezei and Andreea Verteş-Olteanu.
    [Show full text]
  • Le Site Américain Reddit Comme Espace De Variation De L'anglais
    lol thats how reddit talks;) : le site américain Reddit comme espace de variation de l’anglais : étude de corpus intersectionnelle et quantitative d’usages non standard, au prisme du genre, de l’âge et de l’ethnicité Marie Flesch To cite this version: Marie Flesch. lol thats how reddit talks;) : le site américain Reddit comme espace de variation de l’anglais : étude de corpus intersectionnelle et quantitative d’usages non standard, au prisme du genre, de l’âge et de l’ethnicité. Linguistique. Université de Lorraine, 2020. Français. NNT : 2020LORR0192. tel-03129082 HAL Id: tel-03129082 https://hal.univ-lorraine.fr/tel-03129082 Submitted on 2 Feb 2021 HAL is a multi-disciplinary open access L’archive ouverte pluridisciplinaire HAL, est archive for the deposit and dissemination of sci- destinée au dépôt et à la diffusion de documents entific research documents, whether they are pub- scientifiques de niveau recherche, publiés ou non, lished or not. The documents may come from émanant des établissements d’enseignement et de teaching and research institutions in France or recherche français ou étrangers, des laboratoires abroad, or from public or private research centers. publics ou privés. AVERTISSEMENT Ce document est le fruit d'un long travail approuvé par le jury de soutenance et mis à disposition de l'ensemble de la communauté universitaire élargie. Il est soumis à la propriété intellectuelle de l'auteur. Ceci implique une obligation de citation et de référencement lors de l’utilisation de ce document. D'autre part, toute contrefaçon, plagiat, reproduction illicite encourt une poursuite pénale. Contact : [email protected] LIENS Code de la Propriété Intellectuelle.
    [Show full text]