Strategies and Behaviors of Cyber Deviance and Internet Trolling

Strategies and Behaviors of Cyber Deviance and Internet Trolling

Central Washington University ScholarWorks@CWU All Master's Theses Master's Theses Summer 2017 Strategies and Behaviors of Cyber Deviance and Internet Trolling Cody Taylor Central Washington University, [email protected] Follow this and additional works at: https://digitalcommons.cwu.edu/etd Part of the Computer Law Commons, Gaming Law Commons, Internet Law Commons, and the Juvenile Law Commons Recommended Citation Taylor, Cody, "Strategies and Behaviors of Cyber Deviance and Internet Trolling" (2017). All Master's Theses. 782. https://digitalcommons.cwu.edu/etd/782 This Thesis is brought to you for free and open access by the Master's Theses at ScholarWorks@CWU. It has been accepted for inclusion in All Master's Theses by an authorized administrator of ScholarWorks@CWU. For more information, please contact [email protected]. STRATEGIES AND BEHAVIORS OF CYBER DEVIANCE AND INTERNET TROLLING ____________________________________________________ A Thesis Presented to The Graduate Faculty Central Washington University ________________________________________ In Partial Fulfillment of the Requirements for the Degree Master of Science Law and Justice _____________________ by Cody Mason Taylor August 2017 CENTRAL WASHINGTON UNIVERSITY Graduate Studies We hereby approve the thesis of Cody Mason Taylor Candidate for the degree of Master of Science APPROVED FOR THE GRADUATE FACULTY ______________ ______________________________ Dr. Cody Stoddard, Committee Chair ______________ ______________________________ Dr. Michael Harrod ______________ ______________________________ Dr. Roger Schaefer ______________ ______________________________ Dean of Graduate Studies ii ABSTRACT STRATEGIES AND BEHAVIORS OF CYBER DEVIANCE AND INTERNET TROLLING by Cody Mason Taylor August 2017 As society shifts towards making social media a center focus of contemporary life, trolls, are continually developing distractive dialogue. Although trolls may not be deviant in the sense of harsh online crimes, trolls do cause problems within online communities. Jonathan Bishop (2014) and Whitney Phillips (2015) have developed a foundation of internet troll research. Bishop (2014) studied the behaviors of trolls, while Philips (2015) investigated their techniques. However, neither researcher sampled from an online massive multiplayer Online game. Using one of the largest online gaming communities, World of Warcraft, this research examines the techniques and behaviors of trolling. Trolling was found to mainly be a response mechanism that consisted of heavy mockery and improvisation. This study indicates that trolls successfully disrupt and reroute conversations using a variety of mechanisms and techniques. General findings indicate that, while trolls may distract and derail public conversations, a clear majority of the activity reflected more juvenile and irritating behavior rather than significant threats to society. The research of strategies and behaviors of cyber deviance examined in this work creates a foundation for future examinations of trolling behavior. While this study inspects the strategies, iii future studies look to reveal the goals of trolls. Although trolling may be considered deviant, it has become an important aspect of the online culture that needs to be investigated. iv ACKNOWLEDGMENTS I am greatly humbled to be in the position I am today. My successes did not come easy. Fortunately, I’ve had so many great people to support me through these journeys. I want to start by sharing my gratitude for Michael Harrod PhD. And Roger Schaefer PhD. Harrod and Schaefer came onto this project with nothing but positivity and support. The positive attitudes each professor had were a great motivator for me in this project. I want to thank the Green family being the best god-relatives any one can ask for. Shawn and Carol have always taken me in as their own. I would also like to highlight that Josselyn played an important role in editing this research. I also would like to show my admiration for Central Washington University Police and Parking Department. I spent six years at this police department performing various duties, most notably as a parking enforcement officer. The positivity of this environment always made me feel at home. I have great admiration for my Mother and Father, Jeannette and Trevin Taylor. My parents have always shown 100% support for me. There are no words that can truly show how much I admire and appreciate my parents. I would like to show my deepest appreciations for the love of my life, Amanda. Since the beginning of our relationship, Amanda has supported my dreams and aspirations as her own. Amanda is my motivator and my best friend; and I cherish every moment we have together. I would also like to take some time to thank Cody Stoddard PhD, and his wife Jackee. Professor Stoddard has been a great mentor and friend during my journey through graduate school. I have the highest level of respect and gratitude from all the time Professor Stoddard has spent working with me. v I’m so very thankful for all the support I have received over the years. Thank you, everyone. I couldn’t do it without you. - Cody M Taylor vi TABLE OF CONTENTS Chapter Page I INTRODUCTION ........................................................................................ 1 II LITERATURE REVIEW ............................................................................. 3 Deviance .................................................................................................. 4 Cyber-Deviance ....................................................................................... 5 Cyber-Bullying ........................................................................................ 6 Cyber-Trolling ......................................................................................... 8 Implications for Criminology ................................................................ 13 Routine Activity Theory ....................................................................... 14 Social Cohesion Theory ........................................................................ 14 Social Control Theory ........................................................................... 15 Internet Trolling Techniques ................................................................. 16 Gaming .................................................................................................. 18 World of Warcraft ................................................................................. 20 III METHODOLOGY ..................................................................................... 22 Objective ............................................................................................... 22 Research Focuses .................................................................................. 23 First Research Focus ............................................................................. 23 Second Research Focus ......................................................................... 24 Third Research Focus ............................................................................ 25 Sampling Frame .................................................................................... 26 Data Analysis Methods ......................................................................... 27 Advertisement ....................................................................................... 27 Legitimate Conversations ...................................................................... 27 Serious Conversations ........................................................................... 28 Initial Troll Bait ..................................................................................... 28 Current/Popular Media .......................................................................... 28 Gender/Sexuality ................................................................................... 29 Improvised Troll Bait ............................................................................ 29 Mockery ................................................................................................ 29 Other ...................................................................................................... 30 Response to conversation ...................................................................... 30 Responds with Troll Bait ...................................................................... 30 Serious Response .................................................................................. 30 Transition Bait ....................................................................................... 31 Trolling Instances .................................................................................. 31 IV DATA ANALYSIS ..................................................................................... 32 First Research Focus ............................................................................. 32 vii TABLE OF CONTENTS (CONTINUED) Politics ................................................................................................... 32 Popular Media ....................................................................................... 36 Gender/Sexuality ................................................................................... 39 Improvisation ........................................................................................ 44 Other .....................................................................................................

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    94 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us