ABSTRACT DESIGNING CYBERBULLYING PREVENTION and MITIGATION TOOLS Zahra Ashktorab, Doctor of Philosophy, 2017 College of Informat

Total Page:16

File Type:pdf, Size:1020Kb

ABSTRACT DESIGNING CYBERBULLYING PREVENTION and MITIGATION TOOLS Zahra Ashktorab, Doctor of Philosophy, 2017 College of Informat ABSTRACT Title of dissertation: DESIGNING CYBERBULLYING PREVENTION AND MITIGATION TOOLS Zahra Ashktorab, Doctor of Philosophy, 2017 Dissertation directed by: Professor Jennifer Golbeck College of Information Studies Professor Jessica Vitak College of Information Studies While cyberbullying is prevalent among adolescents, attempts by researchers to evaluate mechanisms for it's prevenion and mitigation have been largely non- existent. In this dissertation, I argue that the complex nature of cyberbullying, made more challenging by the affordances of diverse social media, cannot be solved through strictly algorithmic approaches. Instead, I employ multidisciplinary meth- ods to evaluate data generated by teens on social media and work with teens to develop and test potential cyberbullying mitigation solutions. I further argue that solutions focused on improving users' well-being after being targeted online offer designers a valuable tool in fighting back against the harm caused by cyberbullying. Based on the interdisciplinary studies conducted in this dissertation, I offer design recommendations for cyberbullying prevention and mitigation tools. I address the mitigation of adolescent cyberbullying through a multi-methodological approach: 1) data-centric exploratory study of discourse occuring alongside cyberbullying 2) an experimental design of reactions to positive messages in response to cyberbul- lying 3) human-centered participatory design to design cyberbullying mitigation prototypes and 4) a longitudinal study evaluating the effectiveness of cyberbullying mitigation tools. I offer design recommendations for building and administering cy- berbullying mitigation tools. This dissertation begins with a data-centric study to understand why users are motivated to post and interact through ASKfm, a social media platform that affords cyberbullying and how anonymity and the site's other affordances affect these interactions. I discuss the unique affordances specific to semi-anonymous Q&A social media platforms and how such affordances enable users to engage in self-disclosure and gaining social support on sensitive topics. I then present two studies to first determine if users will be receptive to anonymous positive messages responding to bullying messages, then to administer positive messages or Cyberbully Reversal Pings to Ask.fm users who have received bullying messages. I then use a human-centered approach methodology to co-design cyberbullying proto- types with teens. I use the design recommendations derived from the participatory design study to test the impact of a cyberbullying mitigation system. I address technological mechanisms to mitigate sadness and decline in well-being caused by negative online experiences and cyberbullying. I administer cyberbullying mitiga- tion through technology-mediated memory; in other words, I use positive posts and images participants have previously shared on social media to remind them of exist- ing social support in users social networks. The studies in this dissertation comprise of a mixed methods approach to understand social media platforms on which cy- berbullying occurs, work collaboratively with users to design mitigation platforms and ultimately evaluate a cyberbullying mitigation platform with real users. These aforementioned studies result in design recommendations for building cyberbullying mitigation tools and design recommendations for designing a study to evaluate a cyberbullying mitigation tool. DESIGNING CYBERBULLYING PREVENTION AND MITIGATION TOOLS by Zahra Ashktorab Dissertation submitted to the Faculty of the Graduate School of the University of Maryland, College Park in partial fulfillment of the requirements for the degree of Doctor of Philosophy 2017 Advisory Committee: Professor Jennifer Golbeck, Chair/Advisor Professor Jessica Vitak, Chair/Advisor Professor William Kules Professor Katie Shilton Professor Kathryn Wentzel c Copyright by Zahra Ashktorab 2017 Dedication I dedicate this thesis to my loving mother and father, Dr. Farideh Chitsaz and Dr. Hassan Ashktorab. ii Acknowledgements I owe my gratitude to all the people who have made this thesis possible. First and foremost I'd like to thank my advisors, Dr. Jessica Vitak and Dr. Jennifer Golbeck for their continued support and feedback throughout this process. Without Dr. Vitak's extraordinary theoretical ideas and guidance, and Dr. Gol- beck's computational expertise and direction, this thesis would have been a distant dream. Id like to thank my committee members, Dr. William Kules, Dr. Katie Shilton, and Dr. Kathryn Wentzel for their valuable feedback. I would also like to thank my colleagues for providing much appreciated as- sistance throughout the various studies in this dissertation. Id like to thank Leyla Norooz for being \researcher number 2" during coding of qualitative data during the last phase of analysis of this dissertation and providing her valuable expertise of qualitative data analysis. I owe my deepest thanks to my family - my mother and father who have always stood by me and guided me throughout this journey, and have always encouraged me to be the best at whatever I love to do. Words cannot express the gratitude I owe them. Id like to thank my little brother, Yusuf, for making me laugh, bringing me so much joy, and always encouraging me to accomplish my dreams and goals, no matter how difficult. Thanks to my sister, Parnak and my brother-in-law Hesam for your continued support throughout these years. Samaneh, thank you for always being there for me. iii Table of Contents List of Figures ix List of Abbreviations xi 1 Introduction 1 1.1 Dissertation Overview . .3 1.2 Contributions . .6 2 Literature Review 7 2.1 Chapter Summary . .7 2.2 Social Media Use by Adolescents . .7 2.3 The State of Cyberbullying . .9 2.4 Bullying and Intervention . 12 2.5 Existing Cyberbullying Mitigation Tools . 13 3 Motivations Behind the Use of Semi-Anonymous Q&A Social Media Plat- forms 15 3.1 Chapter Summary . 15 3.2 Introduction . 16 3.3 Related Work . 19 3.3.1 ASKfm: Description of Platform . 20 3.3.2 Discourse on Semi-Anonymous Social Media . 21 3.3.3 Anonymity, Disinhibition, and Online Behavior . 22 3.3.4 Positive Outcomes of Anonymous Disclosures . 23 3.4 Study I: Discourse Discovery on ASKfm . 25 3.4.1 Data Collection . 26 3.4.2 Topic Modeling to Discover Discourse Types . 28 3.4.2.1 Classifying Discourse Types . 34 3.4.2.2 Anonymity and Discourse Types . 36 3.4.3 Limitations . 36 3.5 Study II: ASKfm Use Motivations . 37 3.5.1 Participant Demographics . 38 iv 3.5.2 Experiences with Bullying and Cyberbullying . 38 3.5.3 ASKfm Interactions . 39 3.6 Discussion . 40 3.6.1 Emergent Behaviors on ASKfm . 40 3.6.1.1 Self-Disclosure on Semi-Anonymous Q&A Websites . 41 3.6.1.2 Social Support on Semi-Anonymous Q&A Websites . 42 3.6.2 ASKfm Specific Interaction Types . 46 3.6.2.1 Self-Directed Anonymous Questions . 46 3.6.2.2 Transition from Anonymity to Visibility . 47 3.6.2.3 Built-In Filtering . 48 3.6.3 Design Recommendations . 49 3.7 Conclusion . 52 4 Design Heuristics for Cyberbullying Mitigation on Self-Anonymous Websites 54 4.1 Chapter Summary . 54 4.2 Introduction . 55 4.3 Related Work . 56 4.4 Peer Support . 56 4.5 Well Being and Social Support . 58 4.6 Experimental Design: Is Anonymous Support Effective? . 59 4.6.1 Results of the Experiment . 61 4.7 Main Study: Cyberbully-Reversal Ping Pipeline . 64 4.8 Construction of Cyberbully-Reversal Pings . 66 4.8.1 Mediation . 67 4.8.2 Preventative Advocacy and Advice Giving . 67 4.8.2.1 Advocacy and Advice Giving for Self-Harm . 68 4.8.2.2 Advocacy and Advice Giving for Bullying . 68 4.8.3 Befriending . 69 4.9 Identification of Cyberbullying Targets . 70 4.9.1 Method 1: Identifying Cyberbullying Targets with Self Harm Detection and Bullying Detection . 70 4.9.1.1 Classifier . 71 4.9.1.2 Heuristics for Determining Target . 72 4.9.2 Method 2: Identifying Cyberbullying Targets with Bullying Detection . 73 4.9.2.1 Classifier . 73 4.9.2.2 Heuristics for Determining Target . 73 4.9.3 Design Iterations . 74 4.9.3.1 The Challenge of Evaluating Cyberbully-Reversal Pings 74 4.9.3.2 First Iteration: Method 1 Anonymous + All Posts . 75 4.9.3.3 Second Iteration: Method 2 Anonymous + All Posts 76 4.9.3.4 Third Iteration: Method 2 Anonymous + Recent Posts 76 4.9.4 Evaluating Success of Cyberbully-Reversal Pings . 77 4.9.4.1 Response Rate . 78 4.9.4.2 Types of Responses . 78 v 4.10 Discussion and Design Implications . 78 4.10.1 Considering Recent Interactions . 79 4.10.2 Befriending Pings are the Best type of Pings . 80 4.10.3 Gender-Neutral Language is Important . 81 4.11 Ethics . 82 4.12 Conclusion . 83 5 Designing Cyberbullying Mitigation and Prevention Solutions through Par- ticipatory Design With Teenagers 84 5.1 Chapter Summary . 84 5.2 Introduction . 85 5.3 Related Work . 87 5.3.1 Participatory Design and Youth . 88 5.3.2 Designing Cyberbullying Mitigation Tools . 88 5.3.3 User-Centered Design and Cyberbullying . 89 5.4 Method . 90 5.4.1 Survey Details . 91 5.4.2 PD Sessions: My Design Partners . 93 5.4.3 The Design Activities . 94 5.4.3.1 Session I: Focus Group . 94 5.4.3.2 Session II: Scenario Centers . 95 5.4.3.3 Session III: Bags of Stuff/Low-Fidelity Prototyping . 97 5.4.3.4 Session IV: Mixing Ideas . 99 5.4.3.5 Session V: Evaluating Prototypes . 99 5.5 Results . 99 5.5.1 Negative Experiences on Social Media Among Design Partners 100 5.5.2 Design Applications . 101 5.6 Discussion . 107 5.6.1 Defining Cyberbullying . 107 5.6.2 Designing for Support . 108 5.6.3 Designing for Prevention . 109 5.6.3.1 Cyberbullying Prevention by the Bully . 110 5.6.3.2 Cyberbullying Prevention by Victim .
Recommended publications
  • A Randomized Experiment Using Absenteeism Information to “Nudge” Attendance
    February 2017 Making an Impact A randomized experiment using absenteeism information to “nudge” attendance Todd Rogers Harvard Kennedy School Teresa Duncan ICF International Tonya Wolford School District of Philadelphia John Ternovski Shruthi Subramanyam Harvard Kennedy School Adrienne Reitano School District of Philadelphia Key findings This randomized controlled trial, conducted in collaboration with the School District of Philadelphia, finds that a single postcard that encouraged guardians to improve their student’s attendance reduced absences by roughly 2.4 percent. Guardians received one of two types of message: one encouraging guardians to improve their student’s attendance or one encouraging guardians to improve their student’s attendance that also included specific information about the student’s attendance history. There was no statistically significant difference in absences between students according to which message their guardians received. The effect of the postcard did not differ between students in grades 1–8 and students in grades 9–12. U.S. Department of Education At ICF International Institute of Education Sciences Thomas W. Brock, Commissioner for Education Research Delegated the Duties of Director National Center for Education Evaluation and Regional Assistance Audrey Pendleton, Acting Commissioner Elizabeth Eisner, Acting Associate Commissioner Amy Johnson, Action Editor Felicia Sanders, Project Officer REL 2017–252 The National Center for Education Evaluation and Regional Assistance (NCEE) conducts unbiased large-scale evaluations of education programs and practices supported by federal funds; provides research-based technical assistance to educators and policymakers; and supports the synthesis and the widespread dissemination of the results of research and evaluation throughout the United States. Febr uar y 2017 This report was prepared for the Institute of Education Sciences (IES) under Contract ED-IES-12-C-0006 by Regional Educational Laboratory Mid-Atlantic administered by ICF International.
    [Show full text]
  • Nudge Me Right: Personalizing Online Security Nudges to People’S Decision-Making Styles
    Computers in Human Behavior 109 (2020) 106347 Contents lists available at ScienceDirect Computers in Human Behavior journal homepage: http://www.elsevier.com/locate/comphumbeh Full length article Nudge me right: Personalizing online security nudges to people’s decision-making styles Eyal Peer a,*, Serge Egelman b,c, Marian Harbach b, Nathan Malkin c, Arunesh Mathur d, Alisa Frik b,c a Federmann School of Public Policy, Hebrew University of Jerusalem, Israel b International Computer Science Institute, Berkeley, CA, USA c Department of Electrical Engineering and Computer Sciences, University of California, Berkeley, CA, USA d Department of Computer Science, Princeton University, USA ABSTRACT Nudges are simple and effective interventions that alter the architecture in which people make choices in order to help them make decisions that could benefit themselves or society. For many years, researchers and practitioners have used online nudges to encourage users to choose stronger and safer passwords. However, the effects of such nudges have been limited to local maxima, because they are designed with the “average” person in mind, instead of being customized to different individuals. We present a novel approach that analyzes individual differences in traits of decision-making style and, based on this analysis, selects which, from an array of online password nudges, would be the most effective nudge each user should receive. In two large-scale online studies, we show that such personalized nudges can lead to considerably better outcomes, increasing nudges’ effectiveness up to four times compared to administering “one-size-fits-all” nudges. We regard these novel findings a proof-of-concept that should steer more researchers, practitioners and policy-makers to develop and apply more efforts that could guarantee that each user is nudged in a way most right for them.
    [Show full text]
  • Good Vibrations: Can a Digital Nudge Reduce Digital Overload?
    Good Vibrations: Can a Digital Nudge Reduce Digital Overload? Fabian Okekey, Michael SobolevyΦ, Nicola DellyΨ, Deborah Estriny yCornell Tech, ΦTechnion, Ψe Jacobs Institute [fno2;ms3377;nixdell;de226]@cornell.edu ABSTRACT Snapchat, and more, have become an integral part of people’s ev- Digital overuse on mobile devices is a growing problem in every- eryday lives, helping them to share their thoughts, connect with day life. is paper describes a generalizable mobile intervention friends and families, receive news updates, and enjoy many forms that combines nudge theory and negative reinforcement to create of digital entertainment. However, research has shown that tech- a subtle, repeating phone vibration that nudges a user to reduce nology burdens people with the pressure of continual availability their digital consumption. For example, if a user has a daily Face- [2, 37], the need to constantly check in [38, 47], and the ease to book limit of 30 minutes but opens Facebook past this limit, the procrastinate on work, studies, and personal goals [22, 39, 52]. As user’s phone will issue gentle vibrations every ve seconds, but the a result, many people desire to reduce or limit their technology vibration stops once the user navigates away from Facebook. We use [21]. A number of studies have suggested completely abandon- evaluated the intervention through a three-week controlled experi- ing social media [3], using feature phones instead of smartphones ment with 50 participants on Amazon’s Mechanical Turk platform [31], calling users daily to reect on their social media habits [6], with ndings that show daily digital consumption was successfully limiting usage through personal productivity tools [16, 25], and reduced by over 20%.
    [Show full text]
  • Strategic Recommendations for the Design of Nudges Towards a Sustainable Society
    Master's Degree Thesis Strategic Recommendations for the Design of Nudges towards a Sustainable Society. Nell Goepel Maíra Rossini Rahme Frida Svanhall Blekinge Institute of Technology Karlskrona, Sweden 2015 Examiner: Dr. Henrik Ny Ph.D. Supervisor: Professor Karl-Henrik Robèrt Primary advisor: M.Sc. Patricia Lagun Mesquita Secondary advisor: M.Sc. Rachael Gould Strategic Recommendations for the Design of Nudges towards a Sustainable Society. Nell Goepel, Maíra Rossini Rahme, Frida Svanhall School of Engineering Blekinge Institute of Technology Karlskrona, Sweden 2015 Thesis submitted for completion of Master of Strategic Leadership towards Sustainability, Blekinge Institute of Technology, Karlskrona, Sweden. Abstract: Even though most people support the sustainability agenda, human behavior continues to play a major role in driving the long-term global trends comprising today's Sustainability Challenge. Raising awareness and public intention to act sustainably is not translating into meaningful change in sustainable behavior and legislation is time and cost intensive to implement. Another approach, that acts in the gap between intention and action, is cost and time efficient, and provides non-invasive guidance to decisions is nudge. This research analyzes guides for designing nudges and the current practices of nudge designers to discover its potential to guide human behavior towards sustainability. Using the Framework for Strategic Sustainable Development the researchers conclude that nudging can effectively create incremental changes towards sustainable behavior. The researchers see strong potential for nudging to have a greater impact within the Sustainability Challenge if scaled up and out. To do this, a strategic approach is required which considers the Earth’s complexity and preserves freedom.
    [Show full text]
  • Psychology at Queen's
    SCHOOL OF PSYCHOLOGY PSYCHOLOGY AT QUEEN’S A UNIQUE STUDY ABROAD EXPERIENCE Semester one Semester two Level 1 classes 1006 Using Psychology in Everyday Life 1: Using Psychology in Everyday Life 2: The module will cover aspects of everyday life seen The module will cover how psychology may improve from a psychological point of view. This should individual performance and provide interventions to offer fresh insights into familiar phenomena and overcome individual problems in everyday behaviours. encourage students to question some common The module will outline the role psychology has sense beliefs. Students will also be given the in designing and implementing interventions to opportunity to undertake an experiment to gain influence individual performance and behaviour. experience of research in psychology in a practical The module will explore the psychology behind the setting. Lectures will discuss real-world and behaviour(s) and how effective programmes are in everyday situations and explore how psychology influencing and changing behaviour. The module contributes to our understanding of them and will offer fresh insights into the causes of and how it is applied in everyday life. The topics are solutions to everyday psychological and behavioural presented by members of the course team who have issues experienced by the individual. The topics are a specific interest and knowledge of their topic. presented by members of the course team who have a specific interest and knowledge of their topic. Semester one Semester two Level 2 classes 2065 Social Psychology & Individual Differences: 2065 Conceptual Issues in Psychology & Perception: This module develops the topics of social This module develops the topics of conceptual psychology and individual differences.
    [Show full text]
  • Nudge-Approach and the Perception
    NUDGE-APPROACH AND THE PERCEPTION OF HUMAN NATURE, SOCIAL PROBLEMS, AND THE ROLE OF THE STATE By Weronika Koralewska Submitted to Central European University Department of Political Science In partial fulfillment of the requirements for the degree of Master of Political Science Supervisor: Professor Andres Moles CEU eTD Collection Budapest, Hungary (2016) Abstract This thesis analyzes how the nudge-approach perceives human nature, social problems and the role of the state, with the stress on how it shifts the focus from the broader, holistic context, to the situation of the chooser's individual decision. This research remains in line with the assumption that ideas themselves matter and that power per se, being intertwined with knowledge and language, with which we describe reality, has a diffused nature. Investigating the theoretical underpinnings of the nudge-approach together with contrasting them with different theories, the analysis shows the distinctiveness of the nudge-approach. In addition, the thesis suggests what the nudge-approach overlooks. CEU eTD Collection i Table of contents Abstract ....................................................................................................................................... i Table of contents ........................................................................................................................ ii List of tables .............................................................................................................................. iii Introduction ...............................................................................................................................
    [Show full text]
  • Morning Phase", Il Nuovo Album Di BECK
    MARTEDì 25 FEBBRAIO 2014 È disponibile da oggi nei negozi tradizionali e negli store digitali "Morning phase", il nuovo album di BECK. L'album, a poche ore dalla pubblicazione, è già presente nella TopTen di iTunes dei principali paesi Beck, è uscito oggi il nuovo album del mondo a cominciare dagli Stati Uniti e il Canada, passando per la "Morning phase" Gran Bretagna e i paesi del nord Europa fino ad arrivare all'Italia. Il disco già in TopTen su iTunes "Morning phase" è il dodicesimo lavoro di studio del cantautore americano ed è il primo disco contenente materiale inedito dall'uscita di "Modern Guilt" del 2008. ANDREA LECCARDI In scaletta 12 brani inediti: "Morning", "Heart Is A Drum", "Say Goodbye", "Waking Light", "Unforgiven", "Wave", "Don't Let It Go", "Blackbird Chain", "Evil Things", "Blue Moon", "Turn Away", "Country Down". Intervistato a proposito del nuovo album dal magazine inglese Q, Beck ha chiarito nel dettaglio quali sono state le ispirazioni e le fonti che hanno dato vita ai brani del nuovo album: "Sono tornato alla musica della [email protected] mia giovinezza e delle mie radici: parlo di Neil Young, Gram Parsons e SPETTACOLINEWS.IT Crosby, Stills, & Nash. Ricordo sempre il suono di quei dischi e di quelle registrazioni, erano parte di una cultura mentre crescevo. Fanno parte del mio imprinting di crescita, che mi piaccia o meno. Forse rifiutavo questa musica quando ho cominciato a suonare, perché cercavo di trovare la mia identità. Ma sia io sia tutti quelli che hanno suonato su questo disco, siamo cresciuti tutti in California e quindi questo tipo di musica è inevitabilmente parte del nostro DNA".
    [Show full text]
  • The Many Shades of Anonymity: Characterizing Anonymous Social Media Content
    Proceedings of the Ninth International AAAI Conference on Web and Social Media The Many Shades of Anonymity: Characterizing Anonymous Social Media Content Denzil Correay, Leandro Araújo Silvaz, Mainack Mondaly, Fabrício Benevenutoz, Krishna P. Gummadiy y Max Planck Institute for Software Systems (MPI-SWS), Germany z Federal University of Minas Gerais (UFMG), Brazil Abstract While anonymous online forums have been in existence since the early days of the Internet, in the past, such forums Recently, there has been a significant increase in the popu- larity of anonymous social media sites like Whisper and Se- were often devoted to certain sensitive topics or issues. In cret. Unlike traditional social media sites like Facebook and addition, its user population was relatively small and limited Twitter, posts on anonymous social media sites are not as- to technically sophisticated users with specific concerns or sociated with well-defined user identities or profiles. In this requirements to be anonymous. On the other hand, anony- study, our goals are two-fold: (i) to understand the nature mous social media sites like Whisper1 and Secret2 provide a (sensitivity, types) of content posted on anonymous social generic and easy-to-use platform for lay users to post their media sites and (ii) to investigate the differences between thoughts in relative anonymity. Thus, the advent and rapidly content posted on anonymous and non-anonymous social me- growing adoption of these sites provide us with an oppor- dia sites like Twitter. To this end, we gather and analyze ex- tunity for the first time to investigate how large user popu- tensive content traces from Whisper (anonymous) and Twitter lations make use of an anonymous public platform to post (non-anonymous) social media sites.
    [Show full text]
  • Social Construction of Privacy: Reddit Case Study
    Social Construction of Privacy: Reddit Case Study December 13, 2020 A Thesis Prospectus Submitted to the Faculty of the School of Engineering and Applied Science University of Virginia ² Charlottesville, Virginia In Partial Fulfillment of the Requirements of the Degree Bachelor of Science, School of Engineering Rajiv Sarvepalli 1 1 INTRODUCTION In the technological age of today, privacy becomes a more and more valuable commod- ity. With so many companies that live off the idea that information is money, it becomes increasingly concerning the amount of an individual’s information that is public. It is public in every sense of the word, not just to a group of people, but to the whole world. Consider the constant data scandals that plague our technological world. Whether it is Facebook, Google, or governments, someone is always getting caught selling, collecting, or losing data that many consider infringes on their privacy. Therefore, as stewards of these technologies, we must develop preemptive ways of protecting the privacy of the individual in an information-based world focused on the collective. The heterogeneous nature of society, especially with respect to privacy, makes the perspective vary greatly from person to person. This study shall focus on Reddit, an anonymous social media since individuals within anonymous social media communities tend to view anonymity as some form of privacy and therefore tend to care about in some manner about privacy. In order to understand the perspective and definitions of privacy, privacy needs to be analyzed in the context of a society. The conundrum of our information society is the constant complaints of lack of privacy, yet no privacy-invasive companies change their conduct.
    [Show full text]
  • ACRONYMX-Round2 HSNCT.Pdf
    ACRONYM X - Round 2 1. In a 1978 comic book, this athlete fights against and later joins forces with Superman to ​ defeat an alien invasion. Trevor Berbick was the last man to compete against this athlete, who won a Supreme Court case in 1971 concerning his refusal to be drafted. This man, who lit the (*) cauldron at the 1996 Summer Olympics, rejected what he called his "slave name" ​ after converting to Islam. George Foreman was defeated at the "Rumble in the Jungle" by, for 10 points, what heavyweight boxer formerly known as Cassius Clay? ANSWER: Muhammad Ali [accept Cassius Clay before the end] <Nelson> ​ ​ ​ ​ 2. In this series, Scott Clarke attempts to demonstrate an implausible theory by stabbing a ​ paper plate. The band Survive produced music for this series, which also repeatedly makes use of The Clash's song "Should I (*) Stay Or Should I Go." A character on this series, whose ​ real name, may be Jane Ives, is played by Millie Bobbie Brown and steals Eggos from a supermarket some time before following a monster into the Upside Down. Will Byers disappears at the beginning of, for 10 points, what supernatural-oriented Netflix series? ANSWER: Stranger Things <Nelson> ​ ​ 3. This man's directing credits include a 2007 film about a historically black college's ​ debate team titled The Great Debaters. In a 2014 film, this actor portrayed a low-lying ​ ​ hardware store employee who is forced to use his experience as a former black ops killing machine. This star of the Antoine Fuqua [FOO-kwuh] film (*) The Equalizer won an Oscar ​ ​ ​ for another of Fuqua's films, in which he plays Alonzo Harris, a man initiating a fellow police officer.
    [Show full text]
  • Characterizing Anonymous Social Media Content
    The Many Shades of Anonymity: Characterizing Anonymous Social Media Content Denzil Correa†, Leandro Araújo Silva‡, Mainack Mondal†, Fabrício Benevenuto‡, Krishna P. Gummadi† † Max Planck Institute for Software Systems (MPI-SWS), Germany ‡ Federal University of Minas Gerais (UFMG), Brazil Abstract While anonymous online forums have been in existence since the early days of the Internet, in the past, such forums Recently, there has been a significant increase in the popu- larity of anonymous social media sites like Whisper and Se- were often devoted to certain sensitive topics or issues. In cret. Unlike traditional social media sites like Facebook and addition, its user population was relatively small and limited Twitter, posts on anonymous social media sites are not as- to technically sophisticated users with specific concerns or sociated with well-defined user identities or profiles. In this requirements to be anonymous. On the other hand, anony- study, our goals are two-fold: (i) to understand the nature mous social media sites like Whisper1 and Secret2 provide a (sensitivity, types) of content posted on anonymous social generic and easy-to-use platform for lay users to post their media sites and (ii) to investigate the differences between thoughts in relative anonymity. Thus, the advent and rapidly content posted on anonymous and non-anonymous social me- growing adoption of these sites provide us with an oppor- dia sites like Twitter. To this end, we gather and analyze ex- tunity for the first time to investigate how large user popu- tensive content traces from Whisper (anonymous) and Twitter lations make use of an anonymous public platform to post (non-anonymous) social media sites.
    [Show full text]
  • The Many Shades of Anonymity: Characterizing Anonymous Social Media Content
    The Many Shades of Anonymity: Characterizing Anonymous Social Media Content Denzil Correay, Leandro Araújo Silvaz, Mainack Mondaly, Fabrício Benevenutoz, Krishna P. Gummadiy y Max Planck Institute for Software Systems (MPI-SWS), Germany z Federal University of Minas Gerais (UFMG), Brazil Abstract While anonymous online forums have been in existence since the early days of the Internet, in the past, such forums Recently, there has been a significant increase in the popu- larity of anonymous social media sites like Whisper and Se- were often devoted to certain sensitive topics or issues. In cret. Unlike traditional social media sites like Facebook and addition, its user population was relatively small and limited Twitter, posts on anonymous social media sites are not as- to technically sophisticated users with specific concerns or sociated with well-defined user identities or profiles. In this requirements to be anonymous. On the other hand, anony- study, our goals are two-fold: (i) to understand the nature mous social media sites like Whisper1 and Secret2 provide a (sensitivity, types) of content posted on anonymous social generic and easy-to-use platform for lay users to post their media sites and (ii) to investigate the differences between thoughts in relative anonymity. Thus, the advent and rapidly content posted on anonymous and non-anonymous social me- growing adoption of these sites provide us with an oppor- dia sites like Twitter. To this end, we gather and analyze ex- tunity for the first time to investigate how large user popu- tensive content traces from Whisper (anonymous) and Twitter lations make use of an anonymous public platform to post (non-anonymous) social media sites.
    [Show full text]