Universidade Federal Da Bahia O Desejo Por Justiça

Total Page:16

File Type:pdf, Size:1020Kb

Universidade Federal Da Bahia O Desejo Por Justiça UNIVERSIDADE FEDERAL DA BAHIA FACULDADE DE COMUNICAÇÃO PROGRAMA DE PÓS-GRADUAÇÃO EM COMUNICAÇÃO E CULTURA CONTEMPORÂNEAS LISIEANNE ARAÚJO BARBERINO O DESEJO POR JUSTIÇA: UM ESTUDO SOBRE LINCHAMENTO VIRTUAL EM SITES DE REDES SOCIAIS Salvador 2017 LISIEANNE ARAÚJO BARBERINO O DESEJO POR JUSTIÇA: UM ESTUDO SOBRE LINCHAMENTO VIRTUAL EM SITES DE REDES SOCIAIS Dissertação apresentada ao Programa de Programa de Pós-graduação em Comunicação e Cultura Contemporâneas da Universidade Federal da Bahia, como requisito para obtenção do título de mestre. Orientador: Prof. Dr. José Carlos Ribeiro Salvador 2017 AGRADECIMENTOS Agradeço ao meu orientador José Carlos Ribeiro, por todo acolhimento, encorajamento e apoio necessário para a realização do presente trabalho de pesquisa. Demonstro também profunda gratidão pelo financiamento do Conselho Nacional de Desenvolvimento Científico e Tecnológico – CNPQ, bem como ao Programa de Pós-Graduação em Comunicação e Cultura Contemporâneas que me proporcionou condições para o desenvolvimento da dissertação. Agradeço aos professores André Lemos, Malu Fontes e Graciela Natansohn pelas preciosas contribuições, durante as disciplinas ministradas e em outras ocasiões de interlocução. Sou imensamente grata aos professores que compuseram a banca, Marcos Palácios e Rodrigo Nejm. Agradeço também às suplentes, Malu Fontes e Bianca Becker pela generosa disponibilidade. Manifesto gratidão a todos os participantes do Grupo de Pesquisa em Interações, Tecnologias Digitais e Sociedade – GITS, que em diferentes momentos e de diferentes maneiras me encorajaram, inspiraram e apoiaram durante o período da pesquisa. A dissertação nunca seria possível sem a preciosa ajuda de Laura Paes Machado, seu constante incentivo e confiança em meu trabalho. Obrigada por não me deixar desistir! Obrigada a Jonas pela companhia e pelo carinho. Agradeço também a Eduardo Paes Machado e Ligia Matta e Machado pelas conversas descontraídas e enriquecedoras. Como não poderia deixar de ser, agradeço à minha mãe, Arlene Lopes de Araújo, ao meu pai Jorge Barberino, aos meus irmãos, Bianca, Rodrigo, Yuri, Wyne e Luna. Agradeço também aos meus queridos avós Luzia, Alvina e Adolfo. Obrigada aos meus tios e primos da família Souza-Araújo, Grassi e a toda família Barberino pelo apoio incondicional. Aproveito para agradecer a meus amigos pela paciência com as inúmeras ausências e períodos de reclusão. RESUMO O presente trabalho busca refletir sobre a conformação do linchamento virtual na sociedade brasileira. Investiga o modo como o fenômeno se expressa e se configura em Sites de Redes Sociais – SRS. Linchamento virtual, enquanto categoria analítica, remete ao enquadramento jornalístico sobre a expressão coletiva de grupo que, mobilizado por um sentimento de revolta ou indignação, age contra um ou mais indivíduos considerados desviantes para aplicar-lhe(s) justiça extralegal. Linchador, portanto, significa acusação moral que recai sobre os diferentes atores implicados na resolução de conflitos de modo violento. O modo complexo de condutas, visões de mundo, emoções e atitudes acionadas pelos diferentes atores em busca de justiça e reparação constitui a cena sob a qual o empreendimento investigatório se debruçará. O ponto de partida metodológico adota a descrição de casos inseridos em um universo social, cultural, político e ético que lhes imprime sentido e lógica própria de funcionamento. Persegue a identificação de um roteiro comum de acontecimentos, que permite confirmar o a priori de que as ações de justiceiros guardam similitudes entre si. A percepção de risco de práticas punitivas em plataformas digitais abrange a rotulação persistente das vítimas e a falta de proporcionalidade punitiva que pode acarretar em injustiças e contribuir para acentuação de sociabilidade opressora. A justiça extralegal, típica de linchamentos virtuais, oculta demandas profundas da sociedade brasileira. Ainda que se verifique extremamente danoso para suas vítimas, o linchamento virtual se constitui em sociabilidade que produz poderosa força gregária no espaço público em rede. Palavras-chave: Linchamento Virtual. Sites de Redes Sociais. Justiçamento. Vigilância. Acusação. Desvio. Punição. ABSTRACT The present work reflects on the conformation of virtual lynching in contemporary Brazilian society. Investigates how the phenomenon is expressed and configured in Social Networking Sites – SRS. Virtual lynching, as an analytical category, refers to the journalistic framework on the collective expression of a group that, mobilized by a feeling of revolt or indignation, acts against one or more individuals considered deviant to apply extralegal justice. “Linchador”, therefore, incomes moral accusation that reaches different actors involved in conflict resolution in a violent way. The complex mode of conducts, world views, emotions and attitudes triggered by the different actors in search of justice and reparation constitutes the scene under which the investigative enterprise will be investigated. The methodological point of departure adopts the description of cases inserted in a social, cultural, political and ethical universe that gives them their own sense and logic of functioning. It pursues the identification of a common route of events, which allows confirming the hypothesis that the actions of “justiceiros” keep similarities among themselves, revealing controversial aspects, typical of the traditional lynching. The perceived risk of punitive practices on digital platforms encompasses the persistent labeling of victims and the lack of punitive proportionality that can lead to injustice and contribute to accentuation of extremely oppressive sociability. Immune to control, extralegal justice, typical of virtual lynchings, hides deep demands of Brazilian society. Even though it is extremely harmful to its victims, virtual lynching constitutes a sociability that produces powerful gregarious force in the public network space. Keywords: Virtual Lynching. Social Network Sites. Policing. Accusation. Deviation Punishment. LISTA DE ILUSTRAÇÕES Figura 1. Tuíte de Mayara, reprodução Twitter, caso Mayara Petruso...........................37 Figura 2. Ofensas a nordestinos 1, reprodução Twitter........................................................38 Figura 3. Ofensas a nordestinos 2, reprodução Twitter........................................................38 Figura 4. Ofensas a nordestinos 3, reprodução Twitter........................................................38 Figura 5. “Assistindo Um Linchamento”, Exposição “Without Sanctuary: Lynching Photography In América”, 2013....................................................................................71 Figura 6. Acusação original, reprodução Youtube, caso Camila Corrêa..........................72 Figura 7. Acusação original, reprodução Facebook, caso Família Bustamante...........73 Figura 8. Manchete racismo, reprodução Espn/Uol, caso Patrícia Moreira..................74 Figura 9. Acusação, reprodução Youtube, caso Patrícia Moreira.......................................74 Figura 10. Acusação, reprodução Facebook, caso Patrícia Moreira................................... 75 Figura 11. Ameaças e ofensas, reprodução Youtube, caso Cláudia Corrêa..................... 76 Figura 12. Circulação de publicação 1, reprodução Twitter, caso Mayara Petruso......78 Figura 13. Circulação de publicação 2, reprodução Twitter, caso Mayara Petruso......78 Figura 14. Circulação de publicação 3, reprodução Twitter, caso Mayara Petruso......78 Figura 15. Incentivo a replicação de acusações, reprodução Instagram, caso Patrícia Moreira....................................................................................................................................79 Figura 16. Validação acusatória, reprodução Facebook, caso Patrícia Moreira.............80 Figura 17. Empreendimento acusatório, reprodução Youtube, caso Camila Corrêa....81 Figura 18. Acusação ‘preconceituosa’ 1, reprodução Twitter, caso Mayara Petruso..82 Figura 19. Acusação ‘preconceituosa’ 2, reprodução Twitter, caso Mayara Petruso..82 Figura 20. Ofensas morais, reprodução Twitter, caso Mayara Petruso.............................87 Figura 21. Ofensas morais, reprodução Youtube, caso Camila Corrêa..............................87 Figura 22. Ofensas morais, reprodução Instagram, caso Patrícia Moreira......................88 Figura 23. Polarização 1, reprodução Facebook, caso Família Bustamante....................89 Figura 24. Polarização 2, reprodução Facebook, caso Família Bustamante....................89 Figura 25. Desculpas, reprodução Facebook, caso Família Bustamante...........................90 Figura 26. Informações pessoais 1, reprodução Twitter, caso Mayara Petruso............92 Figura 27. Informações pessoais 2, reprodução Twitter, caso Mayara Petruso............92 Figura 28. Dados privados, reprodução Youtube, caso Camila Côrrea..............................93 Figura 29. Perfil Facebook 1, reprodução Twitter, caso Mayara Petruso.........................93 Figura 30. Perfil Facebook 2, reprodução Twitter, caso Mayara Petruso.........................93 Figura 31. Perfil Instagram, reprodução Instagram, caso Patrícia Moreira....................93 Figura 32. Ofensas morais e preconceitos, reprodução Instagram, caso Patrícia Moreira..................................................................................................................................................................94 Figura 33. Perfil fake, reprodução Facebook, caso Mayara Petruso...................................95
Recommended publications
  • Zerohack Zer0pwn Youranonnews Yevgeniy Anikin Yes Men
    Zerohack Zer0Pwn YourAnonNews Yevgeniy Anikin Yes Men YamaTough Xtreme x-Leader xenu xen0nymous www.oem.com.mx www.nytimes.com/pages/world/asia/index.html www.informador.com.mx www.futuregov.asia www.cronica.com.mx www.asiapacificsecuritymagazine.com Worm Wolfy Withdrawal* WillyFoReal Wikileaks IRC 88.80.16.13/9999 IRC Channel WikiLeaks WiiSpellWhy whitekidney Wells Fargo weed WallRoad w0rmware Vulnerability Vladislav Khorokhorin Visa Inc. Virus Virgin Islands "Viewpointe Archive Services, LLC" Versability Verizon Venezuela Vegas Vatican City USB US Trust US Bankcorp Uruguay Uran0n unusedcrayon United Kingdom UnicormCr3w unfittoprint unelected.org UndisclosedAnon Ukraine UGNazi ua_musti_1905 U.S. Bankcorp TYLER Turkey trosec113 Trojan Horse Trojan Trivette TriCk Tribalzer0 Transnistria transaction Traitor traffic court Tradecraft Trade Secrets "Total System Services, Inc." Topiary Top Secret Tom Stracener TibitXimer Thumb Drive Thomson Reuters TheWikiBoat thepeoplescause the_infecti0n The Unknowns The UnderTaker The Syrian electronic army The Jokerhack Thailand ThaCosmo th3j35t3r testeux1 TEST Telecomix TehWongZ Teddy Bigglesworth TeaMp0isoN TeamHav0k Team Ghost Shell Team Digi7al tdl4 taxes TARP tango down Tampa Tammy Shapiro Taiwan Tabu T0x1c t0wN T.A.R.P. Syrian Electronic Army syndiv Symantec Corporation Switzerland Swingers Club SWIFT Sweden Swan SwaggSec Swagg Security "SunGard Data Systems, Inc." Stuxnet Stringer Streamroller Stole* Sterlok SteelAnne st0rm SQLi Spyware Spying Spydevilz Spy Camera Sposed Spook Spoofing Splendide
    [Show full text]
  • Coordinating Across Chaos: the Practice of Transnational Internet Security Collaboration
    COORDINATING ACROSS CHAOS: THE PRACTICE OF TRANSNATIONAL INTERNET SECURITY COLLABORATION A Dissertation Presented to The Academic Faculty by Tarun Chaudhary In Partial Fulfillment of the Requirements for the Degree International Affairs, Science, and Technology in the Sam Nunn School of International Affairs Georgia Institute of Technology May 2019 COPYRIGHT © 2019 BY TARUN CHAUDHARY COORDINATING ACROSS CHAOS: THE PRACTICE OF TRANSNATIONAL INTERNET SECURITY COLLABORATION Approved by: Dr. Adam N. Stulberg Dr. Peter K. Brecke School of International Affairs School of International Affairs Georgia Institute of Technology Georgia Institute of Technology Dr. Michael D. Salomone Dr. Milton L. Mueller School of International Affairs School of Public Policy Georgia Institute of Technology Georgia Institute of Technology Dr. Jennifer Jordan School of International Affairs Georgia Institute of Technology Date Approved: March 11, 2019 ACKNOWLEDGEMENTS I was once told that writing a dissertation is lonely experience. This is only partially true. The experience of researching and writing this work has been supported and encouraged by a small army of individuals I am forever grateful toward. My wife Jamie, who has been a truly patient soul and encouraging beyond measure while also being my intellectual sounding board always helping guide me to deeper insight. I have benefited from an abundance of truly wonderful teachers over the course of my academic life. Dr. Michael Salomone who steered me toward the world of international security studies since I was an undergraduate, I am thankful for his wisdom and the tremendous amount of support he has given me over the past two decades. The rest of my committee has been equally as encouraging and provided me with countless insights as this work has been gestating and evolving.
    [Show full text]
  • The 'New' Private Security Industry', the Private Policing of Cyberspace and the Regulatory Questions Mark Button1 Publis
    View metadata, citation and similar papers at core.ac.uk brought to you by CORE provided by Portsmouth University Research Portal (Pure) The ‘New’ Private Security Industry’, the Private Policing of Cyberspace and the Regulatory Questions Mark Button1 Published in Journal of Contemporary Criminal Justice Abstract This paper explores the growth of the ‘new’ private security industry and private policing arrangements, policing cyberspace. It argues there has been a significant change in policing which is equivalent to the ‘quiet revolution’ associated with private policing that Shearing and Stenning observed in the 1970s and 1980s, marking a ‘second quiet revolution’. The paper then explores some of the regulatory questions that arise from these changes, which have been largely ignored, to date, by scholars of policing and policy-makers making some clear recommendations for the future focus of them. Keywords private security, private policing, regulation, cybercrime and cyberspace Introduction Writing in the late 1970s and early 1980s Shearing and Stenning observed the substantial changes to policing taking place at the time in North America, describing the transformation 1 Institute of Criminal Justice Studies, University of Portsmouth, Portsmouth PO1 2HY, UK. Email: [email protected] 1 as a ‘quiet revolution.’ They noted the substantial growth of private security, linked to the advance of mass private property and the under-funding of the police, with a sector focused upon preventative, rather than curative policing (Stenning and
    [Show full text]
  • Armchair Detectives and the Social Construction of Falsehoods
    ARMCHAIR DETECTIVES AND THE SOCIAL CONSTRUCTION OF FALSEHOODS: EMERGENT MOB BEHAVIOR ON THE INTERNET A DISSERTATION SUBMITTED TO THE GRADUATE DIVISION OF THE UNIVERSITY OF HAWAI’I AT MĀNOA IN PARTIAL FULFILLMENT OF THE REQUIREMENTS FOR THE DEGREE OF DOCTOR OF PHILOSOPHY IN SOCIOLOGY MAY 2017 By Penn Pantumsinchai Dissertation Committee: Patricia Steinhoff, Chairperson David Johnson Krysia Mossakowski Wayne Buente Debora Halbert Keywords: Mob justice, online communities, internet vigilantism, collective intelligence, social control, collective behavior ©2017, Penn Pantumsinchai All Rights Reserved ACKNOWLEDGEMENTS I dedicate this dissertation to my father, who was the inspiration for me to pursue my PhD and become the second Doctor of the family. In really tough times, his stories of how he survived the PhD and wrote his dissertation gave me hope. Thank you to my dear mother, who always checked in on me to see how I was doing, and encouraged me to never give up, and never take the easier route. Thank you to my brother Nate, who actually gave me the idea to pursue this murky topic of mob justice in the first place. The dissertation would never have happened otherwise! Thank you to my second brother Dan and his family, Jayon and Sienna, for their endless support and encouragements, as well as a healthy supply of chocolates throughout the years of my PhD. More than anyone, thank you to my beloved aunt, Pabol, who supported my studies through all these years financially and morally. She always believed in me and I hope I have made her proud. My family’s staunch support was the pillar that kept me going.
    [Show full text]
  • China Dreams 梦
    CHINA DREAMS 梦 EDITED BY Jane Golley, Linda Jaivin Ben Hillman, WITH Sharon Strange C HINA S TORY YEARBOOK : C HINA D REAM S Published by ANU Press The Australian National University Acton ACT 2601, Australia Email: [email protected] Available to download for free at press.anu.edu.au ISBN (print): 9781760463731 ISBN (online): 9781760463748 WorldCat (print): 1145684061 WorldCat (online): 1145684091 DOI: 10.22459/CSY.2020 This title is published under a Creative Commons Attribution-NonCommercial- NoDerivatives 4.0 International (CC BY-NC-ND 4.0). The full licence terms are available at creativecommons.org/licenses/by-nc-nd/4.0/ legalcode Design concept by Markuz Wernli; ‘Power’ cover design and chapter openers by CRE8IVE Typesetting by Chin-Jie Melodie Liu and Sharon Strange; copyediting by Jan Borrie Printed by Union Offset Printers, Canberra, Australia The Australian Centre on China in the World is an initiative of the Commonwealth Government of Australia and The Australian National University This edition © 2020 ANU Press 揭秘错综时事蓄 美梦 民族伟大复兴之梦对中国与世界民众而言为何种图景因编辑婴儿事件续镇压维吾尔族群倡导中国公民应在国际场合﹃维护国家荣誉﹄压破碎学生运动三十周年整庆祝中华人民共和国成立七十周年弘扬革命与国家富强之梦2019 , 多元视角呈现政经文化与人文社会之一脉相连、 。 泡影 2019年 、 , 凌云壮志与梦魇于中外大地上相吸相斥之画卷 为中国在全球日渐隆盛势力与影响提供解惑之匙, 拓展南极与称霸太空的雄心亦甚嚣尘上、 有鉴于此 日益恶化中美关系成为媒体焦点, , 各领风骚年中国恰逢几个划时代意义的周年纪念日 几多旧﹃梦﹄重回民主与言论自由在凌晨的梦乡中被政府的安定团结之梦碾 , 。 ︽中国故事年鉴 五四运动百年祭重温爱国情怀与文化革新之梦 , 粉墨登场 。 : 香港暴力抗争风起云涌 梦︾钩沉是年重大事件 。 , 。 。 本年鉴以浅显易懂的笔触一时庙堂江湖舆情四起人工智能的突飞猛进与基习近平主席权倾天下 。 ; 习近平脑海中的中华 。 并一如既往兼容并 是年亦距1989, 。 新旧﹃中国梦﹄ 、 , 新疆持 展示 , 。 并 ; Translation by Yayun Zhu and Annie Luman Ren Contents INTRODUCTION viii . Dream On · JANE GOLLEY, BEN HILLMAN, and LINDA JAIVIN xviii . Acknowledgements xviii . The Cover Image FORUM · ILLUSIONS AND TRANSFORMATIONS: THE MANY MEANINGS OF MENG 夢 5 . From the Land of Illusion to the Paradise of Truth · ANNIE LUMAN REN . 11 Zhuangzi and His Butterfly Dream: The Etymology ofMeng 夢 · JINGJING CHEN CHAPTER 1 .
    [Show full text]
  • The 'New' Private Security Industry', The
    The ‘New’ Private Security Industry’, the Private Policing of Cyberspace and the Regulatory Questions Mark Button1 Published in Journal of Contemporary Criminal Justice Abstract This paper explores the growth of the ‘new’ private security industry and private policing arrangements, policing cyberspace. It argues there has been a significant change in policing which is equivalent to the ‘quiet revolution’ associated with private policing that Shearing and Stenning observed in the 1970s and 1980s, marking a ‘second quiet revolution’. The paper then explores some of the regulatory questions that arise from these changes, which have been largely ignored, to date, by scholars of policing and policy-makers making some clear recommendations for the future focus of them. Keywords private security, private policing, regulation, cybercrime and cyberspace Introduction Writing in the late 1970s and early 1980s Shearing and Stenning observed the substantial changes to policing taking place at the time in North America, describing the transformation 1 Institute of Criminal Justice Studies, University of Portsmouth, Portsmouth PO1 2HY, UK. Email: [email protected] 1 as a ‘quiet revolution.’ They noted the substantial growth of private security, linked to the advance of mass private property and the under-funding of the police, with a sector focused upon preventative, rather than curative policing (Stenning and Shearing, 1979a). They also observed how these significant changes had been occurring with little debate or scrutiny from scholars and policy-makers. A significant number of researchers have built upon their body of research noting the continued augmentation of private security and other forms of private policing and the need for special regulatory and governance structures (Stenning and Shearing, 1979b; Jones and Newburn, 1998; Prenzler and Sarre, 1999; Loader and White, Crawford, 2003; Johnston and Shearing, 2003; 2017; Nalla and Gurinskaya, 2017).
    [Show full text]
  • Pdf, (Accessed 4 September 2014)
    2014 6th International Conference on Cyber Confl ict Permission to make digital or hard copies of this publication for internal use within NATO and for personal or educational use when for non-profi t or non-commercial P.Brangetto, M.Maybaum, J.Stinissen (Eds.) purposes is granted providing that copies bear this notice and a full citation on the 2014 © NATO CCD COE Publications, Tallinn first page. Any other reproduction or transmission requires prior written permission by NATO CCD COE. Low-cost active cyber defence Karlis Podins Iveta Skujina University of Latvia National CERT Riga, Latvia Riga, Latvia [email protected] Varis Teivans National CERT Riga, Latvia Abstract: The authors of this paper investigated relatively simple active strategies against selected popular cyber threat vectors. When cyber attacks are analysed for their severity and occurrence, many incidents are usually classifi ed as minor, e.g. spam or phishing. We are interested in the various types of low-end cyber incidents (as opposed to high-end state- sponsored incidents and advanced persistent threats) for two reasons: • being the least complicated incidents, we expect to fi nd simple active response strategies; • being the most common incidents, fi ghting them will most effectively make cyberspace more secure. We present a literature review encompassing results from academia and practitioners, and describe a previously unpublished hands-on effort to actively hinder phishing incidents. Before that, we take a look at several published defi nitions of active cyber defence, and identify some contradictions between them. So far we have identifi ed active strategies for the following cyber threats: • Nigerian letters – keep up conversation by an artifi cial intelligence (AI) text analyser and generator; • spam – traffi c generation for advertised domains; • phishing – upload of fake credentials and/or special monitored sandboxed accounts; • information collection botnets – fake data (credit card, credentials etc.) upload.
    [Show full text]
  • An Exploratory Study of Internet Vigilantism Karl Allen Wehmhoener Iowa State University
    CORE Metadata, citation and similar papers at core.ac.uk Provided by Digital Repository @ Iowa State University Iowa State University Capstones, Theses and Graduate Theses and Dissertations Dissertations 2010 Social norm or social harm: An exploratory study of Internet vigilantism Karl Allen Wehmhoener Iowa State University Follow this and additional works at: https://lib.dr.iastate.edu/etd Part of the Communication Commons Recommended Citation Wehmhoener, Karl Allen, "Social norm or social harm: An exploratory study of Internet vigilantism" (2010). Graduate Theses and Dissertations. 11572. https://lib.dr.iastate.edu/etd/11572 This Thesis is brought to you for free and open access by the Iowa State University Capstones, Theses and Dissertations at Iowa State University Digital Repository. It has been accepted for inclusion in Graduate Theses and Dissertations by an authorized administrator of Iowa State University Digital Repository. For more information, please contact [email protected]. Social norm or social harm: An exploratory study of Internet vigilantism by Karl Wehmhoener A thesis submitted to the graduate faculty in partial fulfillment of the requirements for the degree of MASTER OF SCIENCE Major: Journalism and Mass Communication Program of Study Committee: Chad M. Harms, Major Professor David Bulla Brian Monahan Iowa State University Ames, Iowa 2010 ii Table of Contents Chapter 1. Introduction 1 Chapter 2. Literature Review 4 Chapter 3. Methodology 25 Chapter 4. Results 30 Chapter 5. Discussion 33 References Cited 43 Appendix 51 1 Chapter 1 Introduction The Internet as a communication technology allows for both interpersonal and mass communication. At times, communication can be kind and caring.
    [Show full text]
  • Human Flesh Search and Privacy Protection
    Paper Human flesh search and privacy protection Two case studies from China by © Zhifang Yu (Tilburg University) [email protected] August 2018 This work is licensed under a Creative Commons Attribution-NoDerivatives 4.0 International License. To view a copy of this license, visit http://creativecommons.org/licenses/by-nd/4.0/ Human flesh search and privacy protection Two case studies from China MA Thesis Zhifang Yu Student number: 588391 MA track: Global Communication Department of Culture Studies School of Humanities August 2018 Supervisor: Dr.P.K. Varis Second reader:Dr. J.M.E. Blommaert Table of contents Abstract ............................................................................................................................................. 5 1. Introduction .................................................................................................................................. 6 2. Literature review ........................................................................................................................... 7 2.1 China’s network status quo ................................................................................................. 7 2.1.1 China’s Internet users and social media ................................................................... 7 2.1.2 China’s Internet culture ............................................................................................ 9 2.1.3 China’s Internet privacy .........................................................................................
    [Show full text]
  • Publication Bans in a Facebook Age: How Internet Vigilantes Have
    Vol. 5 - Issue l / No. 1 – Summer / été 2016 Publication Bans in a Facebook Age: How Internet Vigilantes Have Challenged the Youth Criminal Justice Act’s “Secrecy Laws” Following the 2011 Vancouver Stanley Cup Riot Tania Arvanitidis Simon Fraser University On June 15th, 2011, a hockey riot occurred in Vancouver, British Columbia. This event is prominent in Canada’s history for, among other reasons, the unprecedented extent to which it was documented via photographs and video footage. The days that followed the riot saw much of this media documentation uploaded to social media platforms on the Internet, where Internet users worked together to identify and collectively “name and shame” those believed to have been involved in the disturbance. Several individuals targeted by these “Internet vigilantes” were young offenders whose identities are legally protected from publication under the Youth Criminal Justice Act (YCJA). This article examines the phenomenon of “Internet vigilantism”, and raises the issue of whether those provisions within the YCJA that prohibit the identification of youth remain relevant today, given the current difficulties in enforcing these provisions. Following an overview of these “secrecy provisions”, the phenomenon of Internet vigilantism is defined, and challenges posed by acts of Internet vigilantism are discussed. A “naming and shaming” Facebook group created for the purpose of identifying participants in the 2011 Vancouver riot is then looked to as a case study of Internet vigilantism in action. This article concludes with recommendations for how justice officials and social media outlets may modify current practices to better protect the safety and security of young offenders, and to minimize harmful instances of Internet vigilantism.
    [Show full text]
  • Superheroes, Bandits, and Cyber-Nerds: Exploring the History and Contemporary Development of the Vigilante
    digitalcommons.nyls.edu Faculty Scholarship Articles & Chapters 2012 Superheroes, Bandits, and Cyber-Nerds: Exploring the History and Contemporary Development of the Vigilante Stephanie Juliano New York Law School, [email protected] Follow this and additional works at: https://digitalcommons.nyls.edu/fac_articles_chapters Part of the Civil Rights and Discrimination Commons, and the Law Enforcement and Corrections Commons Recommended Citation Juliano, Stephanie, "Superheroes, Bandits, and Cyber-Nerds: Exploring the History and Contemporary Development of the Vigilante" (2012). Articles & Chapters. 1182. https://digitalcommons.nyls.edu/fac_articles_chapters/1182 This Article is brought to you for free and open access by the Faculty Scholarship at DigitalCommons@NYLS. It has been accepted for inclusion in Articles & Chapters by an authorized administrator of DigitalCommons@NYLS. JICLT Journal of International Co m :er'aL Law and Technology Vol. 2, Issue 1 (2012) Superheroes, Bandits, and Cyber-nerds: Exploring the History and Contemporary Development of the Vigilante Stephanie Juliano Touro Law School sjuliano(i tourolaw.edu Abstract: This article will first discuss what defines a vigilante, the history of vigilantes, and the contemporary vigilante's effect on the legal system as a whole. Also, this article willfocus on those scenarios that bring an ordinary person to react in an illegal way to a perceived injustice. In focusing on these scenarios, this article will examine a little more closely the answers of deeper questions about the nature of law andjustice, and their roles in the acceleratingworld of new media. 1. Introduction The average person has at the very least an understanding of what he or she considers justice.
    [Show full text]
  • Computational Propaganda Ii
    i Computational Propaganda ii Oxford Studies in Digital Politics Series Editor: Andrew Chadwick, Professor of Political Communication in the Centre for Research in Communication and Culture and the Department of Social Sciences, Loughborough University Using Technology, Building Democracy: Taking Our Country Back: The Crafting of Digital Campaigning and the Construction of Networked Politics from Howard Dean to Citizenship Barack Obama Jessica Baldwin-Philippi Daniel Kreiss Expect Us: Online Communities and Political Media and Protest Logics in the Digital Era: The Mobilization Umbrella Movement in Hong Kong Jessica L. Beyer Francis L.F. Lee and Joseph M. Chan If . Then: Algorithmic Power and Politics Bits and Atoms: Information and Communication Taina Bucher Technology in Areas of Limited Statehood Steven Livingston and Gregor Walter- Drop The Hybrid Media System: Politics and Power Digital Cities: The Internet and the Geography of Andrew Chadwick Opportunity Karen Mossberger, Caroline J. Tolbert, and The Only Constant Is Change: Technology, William W. Franko Political Communication, and Innovation Over Time Revolution Stalled: The Political Limits of the Ben Epstein Internet in the Post- Soviet Sphere Sarah Oates Tweeting to Power: The Social Media Revolution in American Politics Disruptive Power: The Crisis of the State in the Jason Gainous and Kevin M. Wagner Digital Age Taylor Owen Risk and Hyperconnectivity: Media and Memories of Neoliberalism Affective Publics: Sentiment, Technology, and Politics Andrew Hoskins and John Tulloch Zizi Papacharissi Democracy’s Fourth Wave?: Digital Media The Citizen Marketer: Promoting Political Opinion and the Arab Spring in the Social Media Age Philip N. Howard and Muzammil M. Hussain Joel Penney The Digital Origins of Dictatorship and China’s Digital Nationalism Democracy: Information Technology Florian Schneider and Political Islam Philip N.
    [Show full text]