Strategies and Behaviors of Cyber Deviance and Internet Trolling

Total Page:16

File Type:pdf, Size:1020Kb

Strategies and Behaviors of Cyber Deviance and Internet Trolling Central Washington University ScholarWorks@CWU All Master's Theses Master's Theses Summer 2017 Strategies and Behaviors of Cyber Deviance and Internet Trolling Cody Taylor Central Washington University, [email protected] Follow this and additional works at: https://digitalcommons.cwu.edu/etd Part of the Computer Law Commons, Gaming Law Commons, Internet Law Commons, and the Juvenile Law Commons Recommended Citation Taylor, Cody, "Strategies and Behaviors of Cyber Deviance and Internet Trolling" (2017). All Master's Theses. 782. https://digitalcommons.cwu.edu/etd/782 This Thesis is brought to you for free and open access by the Master's Theses at ScholarWorks@CWU. It has been accepted for inclusion in All Master's Theses by an authorized administrator of ScholarWorks@CWU. For more information, please contact [email protected]. STRATEGIES AND BEHAVIORS OF CYBER DEVIANCE AND INTERNET TROLLING ____________________________________________________ A Thesis Presented to The Graduate Faculty Central Washington University ________________________________________ In Partial Fulfillment of the Requirements for the Degree Master of Science Law and Justice _____________________ by Cody Mason Taylor August 2017 CENTRAL WASHINGTON UNIVERSITY Graduate Studies We hereby approve the thesis of Cody Mason Taylor Candidate for the degree of Master of Science APPROVED FOR THE GRADUATE FACULTY ______________ ______________________________ Dr. Cody Stoddard, Committee Chair ______________ ______________________________ Dr. Michael Harrod ______________ ______________________________ Dr. Roger Schaefer ______________ ______________________________ Dean of Graduate Studies ii ABSTRACT STRATEGIES AND BEHAVIORS OF CYBER DEVIANCE AND INTERNET TROLLING by Cody Mason Taylor August 2017 As society shifts towards making social media a center focus of contemporary life, trolls, are continually developing distractive dialogue. Although trolls may not be deviant in the sense of harsh online crimes, trolls do cause problems within online communities. Jonathan Bishop (2014) and Whitney Phillips (2015) have developed a foundation of internet troll research. Bishop (2014) studied the behaviors of trolls, while Philips (2015) investigated their techniques. However, neither researcher sampled from an online massive multiplayer Online game. Using one of the largest online gaming communities, World of Warcraft, this research examines the techniques and behaviors of trolling. Trolling was found to mainly be a response mechanism that consisted of heavy mockery and improvisation. This study indicates that trolls successfully disrupt and reroute conversations using a variety of mechanisms and techniques. General findings indicate that, while trolls may distract and derail public conversations, a clear majority of the activity reflected more juvenile and irritating behavior rather than significant threats to society. The research of strategies and behaviors of cyber deviance examined in this work creates a foundation for future examinations of trolling behavior. While this study inspects the strategies, iii future studies look to reveal the goals of trolls. Although trolling may be considered deviant, it has become an important aspect of the online culture that needs to be investigated. iv ACKNOWLEDGMENTS I am greatly humbled to be in the position I am today. My successes did not come easy. Fortunately, I’ve had so many great people to support me through these journeys. I want to start by sharing my gratitude for Michael Harrod PhD. And Roger Schaefer PhD. Harrod and Schaefer came onto this project with nothing but positivity and support. The positive attitudes each professor had were a great motivator for me in this project. I want to thank the Green family being the best god-relatives any one can ask for. Shawn and Carol have always taken me in as their own. I would also like to highlight that Josselyn played an important role in editing this research. I also would like to show my admiration for Central Washington University Police and Parking Department. I spent six years at this police department performing various duties, most notably as a parking enforcement officer. The positivity of this environment always made me feel at home. I have great admiration for my Mother and Father, Jeannette and Trevin Taylor. My parents have always shown 100% support for me. There are no words that can truly show how much I admire and appreciate my parents. I would like to show my deepest appreciations for the love of my life, Amanda. Since the beginning of our relationship, Amanda has supported my dreams and aspirations as her own. Amanda is my motivator and my best friend; and I cherish every moment we have together. I would also like to take some time to thank Cody Stoddard PhD, and his wife Jackee. Professor Stoddard has been a great mentor and friend during my journey through graduate school. I have the highest level of respect and gratitude from all the time Professor Stoddard has spent working with me. v I’m so very thankful for all the support I have received over the years. Thank you, everyone. I couldn’t do it without you. - Cody M Taylor vi TABLE OF CONTENTS Chapter Page I INTRODUCTION ........................................................................................ 1 II LITERATURE REVIEW ............................................................................. 3 Deviance .................................................................................................. 4 Cyber-Deviance ....................................................................................... 5 Cyber-Bullying ........................................................................................ 6 Cyber-Trolling ......................................................................................... 8 Implications for Criminology ................................................................ 13 Routine Activity Theory ....................................................................... 14 Social Cohesion Theory ........................................................................ 14 Social Control Theory ........................................................................... 15 Internet Trolling Techniques ................................................................. 16 Gaming .................................................................................................. 18 World of Warcraft ................................................................................. 20 III METHODOLOGY ..................................................................................... 22 Objective ............................................................................................... 22 Research Focuses .................................................................................. 23 First Research Focus ............................................................................. 23 Second Research Focus ......................................................................... 24 Third Research Focus ............................................................................ 25 Sampling Frame .................................................................................... 26 Data Analysis Methods ......................................................................... 27 Advertisement ....................................................................................... 27 Legitimate Conversations ...................................................................... 27 Serious Conversations ........................................................................... 28 Initial Troll Bait ..................................................................................... 28 Current/Popular Media .......................................................................... 28 Gender/Sexuality ................................................................................... 29 Improvised Troll Bait ............................................................................ 29 Mockery ................................................................................................ 29 Other ...................................................................................................... 30 Response to conversation ...................................................................... 30 Responds with Troll Bait ...................................................................... 30 Serious Response .................................................................................. 30 Transition Bait ....................................................................................... 31 Trolling Instances .................................................................................. 31 IV DATA ANALYSIS ..................................................................................... 32 First Research Focus ............................................................................. 32 vii TABLE OF CONTENTS (CONTINUED) Politics ................................................................................................... 32 Popular Media ....................................................................................... 36 Gender/Sexuality ................................................................................... 39 Improvisation ........................................................................................ 44 Other .....................................................................................................
Recommended publications
  • Trolls Can Sing and Dance in the Movies
    can sing and dance in the Movies TrollsBut let’s be clear! Internet Trolls are not cute or funny! In Internet slang, a troll is a person who creates bad feelings on the Internet by starting quarrels or upsetting people, or by posting inflammatory, extraneous, or off-topic messages with the intent of provoking readers into an emotional outburst. 01. The Insult Troll 06. The Profanity and All-Caps Troll The insult troll is a pure hater, plain and simple. They will This type of troll spews F-bombs and other curse words with his often pick on everyone and anyone - calling them names, caps lock button on. In many cases, these types of trolls are just accusing them of certain things, doing anything they can to bored kids looking for something to do without needing to put too get a negative emotional response from them. This type of much thought or effort into anything. trolling can be considered a serious form of cyberbullying. 02. The Persistent Debate Troll 07. The One Word Only Troll This type of troll loves a good argument. They believe they're There's always that one type of troll who just says "LOL" or "what" or right, and everyone else is wrong. They write long posts and "k" or "yes" or "no." They may not be the worst type of troll online, they're always determined to have the last word - continuing but when a serious or detailed topic is being discussed, their one- to comment until that other user gives up. word replies are just a nuisance.
    [Show full text]
  • Online Harassment: a Legislative Solution
    \\jciprod01\productn\H\HLL\54-2\HLL205.txt unknown Seq: 1 11-MAY-17 15:55 ONLINE HARASSMENT: A LEGISLATIVE SOLUTION EMMA MARSHAK* TABLE OF CONTENTS I. INTRODUCTION .......................................... 501 II. WHY IS ONLINE HARASSMENT A PROBLEM?................ 504 R a. The Scope of the Problem ............................ 504 R b. Economic Impact .................................... 507 R i. Lost Business Opportunities ...................... 507 R ii. Swatting ........................................ 510 R iii. Doxxing ........................................ 511 R III. CURRENT LAW .......................................... 512 R a. Divergent State Law ................................. 512 R b. Elements of the Law ................................. 514 R IV. LAW ENFORCEMENT AND INVESTIGATIVE PROBLEMS ........ 515 R a. Police Training ...................................... 515 R b. Investigative Resources .............................. 519 R c. Prosecutorial Jurisdiction ............................ 520 R V. SOLUTION ............................................... 521 R a. Proposed Legislation ................................ 521 R b. National Evidence Laboratory ........................ 526 R c. Training Materials ................................... 526 R VI. CONCLUSION ............................................ 528 R VII. APPENDIX ............................................... 530 R I. INTRODUCTION A journalist publishes an article; rape threats follow in the comments.1 An art curator has a conversation with a visitor to her gallery;
    [Show full text]
  • Cyberbullying and Ohio Schools: a Social Justice Framework to Understand and Create Change Lorri A
    Cyberbullying and Ohio Schools: A Social Justice Framework to Understand and Create Change Lorri A. Gerwig-Parker Donna Tromski-Klingshirn Rebecca Kolssak Joshua D. Miller Wright State University Abstract In 2019, 36.5% of students, age 12-17, reported that they were cyberbullied at some point in their life. Cyberbullying is a growing problem within Ohio. Self-mutilation, attempted suicide, and death have been linked to victims of cyberbullying. Within Ohio, there are also legal implications for schools to consider. Using Bronfenbrenner’s ecological systems framework, different types of cyberbullies, bullying practices, and proposed solutions for cyberbullying can be addressed in a more comprehensive manner within the schools. Ultimately, schools can be the vanguards for social justice, creating the cultural shift to end cyberbullying and its devastating effects on victims. Keywords: cyberbullying, school administration and faculty, adolescents, social justice, ecological model Cyberbullying, also known as e-bullying or digital harassment, has grown from a technological possibility to a universal problem among communities of young people within the past two decades. Adolescent populations have both high rates of victimization and potentially severe consequences to their mental and physical health. Hinduja and Patchin (2019) indicated that 36.5% of adolescents ages 12 to 17 in the United States reported being cyberbullied at least once. Further, according to Pacer’s National Bullying Prevention Center (2019) only 33% of adolescent victims
    [Show full text]
  • Sociotechnical Security As an Analytic Framework
    Entanglements and Exploits: Sociotechnical Security as an Analytic Framework Data & Society Research Institute Columbia University Matt Goerzen, ​ ​Elizabeth Anne Watkins, ​ Open Technology Fund Research Fellow Gabrielle Lim, ​ Abstract Unfortunately, platform-linked violence like the incidents in The rise of social media platforms has produced novel Christchurch and San Diego are not uncommon and are security threats and vulnerabilities. Malicious actors can unlikely to subside in the near future. Other forms of now exploit entanglements of once disparate technical and problematic and potentially dangerous content also social systems to target exposed communities. These proliferate. False and misleading content distributed on exploits pose a challenge to legacy security frameworks Whatsapp in India led to the murders of over two dozen drawn from technical and state-based conceptions of people in 2018 (Goel et al., 2018). The genocide of the referent objects and bounded information systems. In this Rohyinga in Myanmar was partially incited by the military paper we propose a new framework of analysis to meet this through disinformation and false accounts on Facebook challenge, Sociotechnical Security (STsec), which (Mozur, 2018). Facebook usage may also correlate with acknowledges how the interplay between actors produces higher rates of anti-refugee attacks in Germany (Müller and emergent threats to participant communities. This Schwarz 2018). Meanwhile, targeted harassment has been exploratory paper offers an overview of sociotechnical linked to self-censorship and a chilling effect on systems, explains why these threats and vulnerabilities internet-based communications (UN Office of the High require us to expand our understanding of security with Commissioner, 2017). Amnesty International in 2018, for regards to participatory technology, and how sociotechnical example, declared Twitter trolling of women a human rights security can be operationalized as a framework for analysis.
    [Show full text]
  • The Influence of Anonymity on Participation in Online Communities
    Thèse de doctorat de l’UTT Malte PASKUDA The Influence of Anonymity on Participation in Online Communities Spécialité : Ingénierie Sociotechnique des Connaissances, des Réseaux et du Développement Durable 2016TROY0033 Année 2016 THESE pour l’obtention du grade de DOCTEUR de l’UNIVERSITE DE TECHNOLOGIE DE TROYES Spécialité : INGENIERIE SOCIOTECHNIQUE DES CONNAISSANCES, DES RESEAUX ET DU DEVELOPPEMENT DURABLE présentée et soutenue par Malte PASKUDA le 24 octobre 2016 The Influence of Anonymity on Participation in Online Communities JURY M. M. BAKER DIRECTEUR DE RECHERCHE CNRS Président (Rapporteur) Mme N. GAUDUCHEAU MAITRE DE CONFERENCES Examinateur Mme M. LEWKOWICZ PROFESSEUR DES UNIVERSITES Directeur de thèse M. M. PRILLA PROFESSOR Rapporteur M. M. ROHDE DOKTOR Examinateur Acknowledgements Myriam Lewkowicz Michael Baker Michael Prilla Nadia Gauducheau Markus Rohde Michel Marcoccia Valentin Berthou Matthieu Tixier Hassan Atifi Ines Di Loreto Karine Lan Lorraine Tosi Aurlien Bruel Khuloud Abou Amsha Josslyn Beltran Madrigal Les membres de lquipe Tech-CICO et les membres du projet TOPIC trouvent ici mes remerciements les plus sincres. Abstract This work presents my PhD thesis about the influence of anonymity on par- ticipation in online environments. The starting point of this research was the observation of the design process of an online platform for informal caregivers. I realized that there is no knowledge about the practical effects that an anony- mous identity system would have. This thesis contains the subsequent literature review, which has been synthesized into a model that shows which participation factors might be influenced by anonymity. Three studies on existing online en- vironments have been conducted: One on Youtube, where there was a change in the comment system forbidding anonymous comments; one on Quora, where users can choose to answer questions anonymously; and one on Hacker News, where users choose how many identity factors they want to present and which name they use.
    [Show full text]
  • Address Munging: the Practice of Disguising, Or Munging, an E-Mail Address to Prevent It Being Automatically Collected and Used
    Address Munging: the practice of disguising, or munging, an e-mail address to prevent it being automatically collected and used as a target for people and organizations that send unsolicited bulk e-mail address. Adware: or advertising-supported software is any software package which automatically plays, displays, or downloads advertising material to a computer after the software is installed on it or while the application is being used. Some types of adware are also spyware and can be classified as privacy-invasive software. Adware is software designed to force pre-chosen ads to display on your system. Some adware is designed to be malicious and will pop up ads with such speed and frequency that they seem to be taking over everything, slowing down your system and tying up all of your system resources. When adware is coupled with spyware, it can be a frustrating ride, to say the least. Backdoor: in a computer system (or cryptosystem or algorithm) is a method of bypassing normal authentication, securing remote access to a computer, obtaining access to plaintext, and so on, while attempting to remain undetected. The backdoor may take the form of an installed program (e.g., Back Orifice), or could be a modification to an existing program or hardware device. A back door is a point of entry that circumvents normal security and can be used by a cracker to access a network or computer system. Usually back doors are created by system developers as shortcuts to speed access through security during the development stage and then are overlooked and never properly removed during final implementation.
    [Show full text]
  • Deciphering L33tspeak
    Ghent University Faculty of Arts and Philosophy Thesis Deciphering L33t5p34k Internet Slang on Message Boards Supervisor: Master Paper submitted in partial fulfilment of Prof. Anne-Marie Simon-Vandenbergen the requirements for the degree of ―Master in de Taal- en Letterkunde – Afstudeerrichting: Engels‖ By Eveline Flamand 2007-2008 i Acknowledgements I would like to thank my promoter, professor Anne-Marie Vandenbergen, for agreeing on supervising this perhaps unconventional thesis. Secondly I would like to mention my brother, who recently graduated as a computer engineer and who has helped me out when my knowledge on electronic technology did not suffice. Niels Cuelenaere also helped me out by providing me with some material and helping me with a Swedish translation. The people who came up to me and told me they would like to read my thesis, have encouraged me massively. In moments of doubt, they made me realize that there is an audience for this kind of research, which made me even more determined to finish this thesis successfully. Finally, I would also like to mention the members of the Filologica forum, who have been an inspiration for me. ii Index 1. Introduction .......................................................................................................................... 1 2. Methodology ......................................................................................................................... 1 2.1 4chan ...............................................................................................................................
    [Show full text]
  • Freedom on the Net 2016
    FREEDOM ON THE NET 2016 China 2015 2016 Population: 1.371 billion Not Not Internet Freedom Status Internet Penetration 2015 (ITU): 50 percent Free Free Social Media/ICT Apps Blocked: Yes Obstacles to Access (0-25) 18 18 Political/Social Content Blocked: Yes Limits on Content (0-35) 30 30 Bloggers/ICT Users Arrested: Yes Violations of User Rights (0-40) 40 40 TOTAL* (0-100) 88 88 Press Freedom 2016 Status: Not Free * 0=most free, 100=least free Key Developments: June 2015 – May 2016 • A draft cybersecurity law could step up requirements for internet companies to store data in China, censor information, and shut down services for security reasons, under the aus- pices of the Cyberspace Administration of China (see Legal Environment). • An antiterrorism law passed in December 2015 requires technology companies to cooperate with authorities to decrypt data, and introduced content restrictions that could suppress legitimate speech (see Content Removal and Surveillance, Privacy, and Anonymity). • A criminal law amendment effective since November 2015 introduced penalties of up to seven years in prison for posting misinformation on social media (see Legal Environment). • Real-name registration requirements were tightened for internet users, with unregistered mobile phone accounts closed in September 2015, and app providers instructed to regis- ter and store user data in 2016 (see Surveillance, Privacy, and Anonymity). • Websites operated by the South China Morning Post, The Economist and Time magazine were among those newly blocked for reporting perceived as critical of President Xi Jin- ping (see Blocking and Filtering). www.freedomonthenet.org FREEDOM CHINA ON THE NET 2016 Introduction China was the world’s worst abuser of internet freedom in the 2016 Freedom on the Net survey for the second consecutive year.
    [Show full text]
  • The Rhetorics of the Voltron: Legendary Defender Fandom
    "FANS ARE GOING TO SEE IT ANY WAY THEY WANT": THE RHETORICS OF THE VOLTRON: LEGENDARY DEFENDER FANDOM Renee Ann Drouin A Dissertation Submitted to the Graduate College of Bowling Green State University in partial fulfillment of the requirements for the degree of DOCTOR OF PHILOSOPHY May 2021 Committee: Lee Nickoson, Advisor Salim A Elwazani Graduate Faculty Representative Neil Baird Montana Miller © 2021 Renee Ann Drouin All Rights Reserved iii ABSTRACT Lee Nickoson, Advisor The following dissertation explores the rhetorics of a contentious online fan community, the Voltron: Legendary Defender fandom. The fandom is known for its diversity, as most in the fandom were either queer and/or female. Primarily, however, the fandom was infamous for a subsection of fans, antis, who performed online harassment, including blackmailing, stalking, sending death threats and child porn to other fans, and abusing the cast and crew. Their motivation was primarily shipping, the act of wanting two characters to enter a romantic relationship. Those who opposed their chosen ship were targets of harassment, despite their shared identity markers of female and/or queer. Inspired by ethnographically and autoethnography informed methods, I performed a survey of the Voltron: Legendary Defender fandom about their experiences with harassment and their feelings over the show’s universally panned conclusion. In implementing my research, I prioritized only using data given to me, a form of ethical consideration on how to best represent the trauma of others. Unfortunately, in performing this research, I became a target of harassment and altered my research trajectory. In response, I collected the various threats against me and used them to analyze online fandom harassment and the motivations of antis.
    [Show full text]
  • Game of Thrones Renewed
    Game Of Thrones Renewed Trichotomously groaning, Rick cut-offs workbox and brisks sargasso. Pomaceous and zoophagous Merell hornswoggled so gummy that Neddie remerging his osteology. Parker is choppily congealed after hail-fellow-well-met Valentin nagged his controversialists massively. By hbo running an organization that daenerys by his valyrian steel sword hand of thrones An abbreviated variant that preceded movies aired outside of weekend prime time excerpts the footage available the skyscraper leap. Clearly they breathe not watched enough Sean Bean films. At that point, I wish go of whose idea. Hardhome was another month? As main cable channels incorporated comedy specials due until their inexpensive format, HBO began to model its strategy with its comedy specials after his music programming, focusing on record few specials each year featuring popular comedians. Nursing his keep in the baths, Jaime tells Brienne the truth within his assassination of the military King. The harness in Tinfoil armor. Jon was in disaster, even more major battles, it they flat. The Targaryen civil lawsuit known report the Dance of the Dragons was responsible in many dragon deaths, including Vhagar, Caraxes, Syrax, Vermithor, Sunfyre, Dreamfyre, and Meleys the Red Queen. Your pan of Thrones. They know evil men. Discussions posts, wall messages and article comments, but circuit will will be taken to junk any existing ones. This publicity photo released by HBO shows, Peter Dinklage, left, Sibel Kekili, second pump, and Sophie Turner, right, and a scene from array of Thrones. It upheld the status quo. Netflix had popularized the term. Jon Snow was resurrected. Game of Thrones, has been renewed for getting third season.
    [Show full text]
  • Can Spoilers in Online Reviews Impact Viewer Enjoyment?
    The University of Maine DigitalCommons@UMaine Honors College Spring 5-2020 Can Spoilers in Online Reviews Impact Viewer Enjoyment? Marshall Abbott Follow this and additional works at: https://digitalcommons.library.umaine.edu/honors Part of the Film and Media Studies Commons This Honors Thesis is brought to you for free and open access by DigitalCommons@UMaine. It has been accepted for inclusion in Honors College by an authorized administrator of DigitalCommons@UMaine. For more information, please contact [email protected]. CAN SPOILERS IN ONLINE REVIEWS IMPACT VIEWER ENJOYMENT? by Marshall Abbott A Thesis Submitted in Partial Fulfillment of the Requirements for a Degree with Honors (Media Studies) The Honors College University of Maine May 2020 Advisory Committee: Michael Grillo, Associate Professor of History of Art, Advisor Robert W. Glover, Associate Professor of Political Science and Honors Judith E. Rosenbaum, Assistant Professor of Media Studies Clinton Spaulding, Ph.D. Student and Instructor of Communication and Journalism Jennie Woodard, Lecturer in Honors ©2020 ABSTRACT Spoilers research has produced contradictory findings when it comes to the impact they have on enjoyment (Eden, Johnson, Udvardi, & Rosenbaum, 2019). The relationship varies based on viewers’ personality traits, the medium, as well as the genre. To answer these research questions, this study uses a naturalistic study featuring a horror film from 2003 called Gothika. The study used a convenience sampling of college-aged students, a population that commonly watches horror movies (Eden, Johnson, Udvardi, & Rosenbaum, 2019). I designed the study to consider different groups watching Gothika. The individuals were divided into two categories: those who read neutral spoiled reviews and those who read neutral unspoiled reviews.
    [Show full text]
  • I Give Permission for Public Access to My Thesis and for Any Copying to Be Done at the Discretion of the Archives Librarian And/Or the College Librarian
    1 I give permission for public access to my thesis and for any copying to be done at the discretion of the archives librarian and/or the College librarian. Emily Merritt 06/22/12 An Analysis of the Discourse of Internet Trolling: A Case Study of Reddit.com Student presenter: Emily Rose Merritt Project advisor: Esther Castro-Cuenca With the proliferation of social media and community discussion and forum websites, interest in understanding and explaining communication on the Internet (with an emphasis on language-based communication) is on the rise. Over time, new genres of interaction have developed that take place primarily or exclusively in online communication, and with them has developed the need to investigate the structure of these interactions, what their function is within conversations and communities, what their place is within certain Internet discourses, and over time what effects they have on communication on and offline. Thus far many of these genres have been deemed at best disruptive and at worst anti-social, but when studied from a judgment-free point of view show high levels of complexity and offer us excellent opportunities to understand how the Internet is shaping and being shaped by new kinds and contexts of communication. One of these genres of interaction that has gained significant fame on some very popular forums and discussion sites is called trolling. Trolling occurs on discussion sites or message boards when a user intentionally posts erroneous or inflammatory information with the intention of provoking a strong reaction out of other users. The objective of this study is to understand the complexities of trolling, as well as some of its functions and outcomes in anonymous online communication.
    [Show full text]