Publication Cover
Continuum
Journal of Media & Cultural Studies
Volume 30, 2016 - Issue 3
12,882
Views
105
CrossRef citations to date
0
Altmetric
Original Articles

Online misogyny and feminist digilantism

Pages 284-297 | Published online: 31 Mar 2016
 

Abstract

This article examines contemporary feminist ‘digilante’ responses to the increasing problem of misogyny online. In particular, it focuses on female gamers and a recent incident in which the Australian gamer Alanah Pearce responded to threats of sexual violence from young male Internet users by alerting their mothers. Pearce’s move was celebrated in international media commentary as the ‘perfect’ solution to the problem of online rape threats. This article, however, argues that while ‘do-it-yourself’ strategies such as Pearce’s have some benefits, unsupplemented, they do not constitute an adequate solution to the broader problem of gendered vitriol online. Further, they comport with a wider trend which shifts the burden of responsibility for the problem of gendered cyber-hate from perpetrators to targets, and from the public to the private sphere. Over the course of this article, I will show that the contemporary problem of gendered ‘e-bile’ has parallels with some key social issues addressed by second-wave feminism. As such, I argue that a hybrid of feminist activist efforts – including a recalibrated approach to collectivism – is required to achieve the legislative and corporate reforms necessary to address the significant social problem of gendered hate on the Internet.

Notes

1. I will not be writing ‘sic’ after grammatical, spelling and syntax errors in cited electronic communications and online material in recognition of the informality and colloquialism commonly found in such contexts.

2. I have previously used the term ‘e-bile’ to describe a range of discourses and practices that have historically been designated via terms such as ‘cyberbullying’, ‘cyber-stalking’, ‘cyber-violence’, ‘trolling’ and, most commonly, ‘flaming’ (Jane Citation2014a, Citation2014b, Citation2015). My case is that a new descriptor is required in order to gather under one heading a variety of denunciatory forms that share characteristic, signal features and so demand a broad field of inquiry. Further, while scholarly coverage of discourse designated by terms such as ‘trolling’ and ‘flaming’ is of enormous assistance in understanding the current circulation of hostile discourse on the Internet, it is also associated with a tendency across a range of disciplines to underplay, overlook, ignore or otherwise marginalize the prevalence and serious ethical and material ramifications of these new media discourses and practices (Jane Citation2015). As such, my hope is that deploying a new term will assist in underlining the prevalence, rhetorical noxiousness and stark misogyny of contemporary hostility on the Internet and social media platforms.

3. For examples, see: Herring Citation2002; Herring et al. Citation2002.

4. Citron, for instance, provides a meticulous survey of the various ways gendered cyber-hate, cyber-harassment and cyber-stalking are trivialized, ignored and sometimes mocked by Internet users and media commentators, as well as by those responsible for law enforcement, policy development and platform management (Citation2014).

5. I acknowledge that terms such as ‘second wave’, ‘third wave’, ‘fourth wave’ and ‘postfeminist’ are contested, imprecise and problematic in their tendency to flatten contexts, universalize women’s experiences and facilitate intra-movement adversarialism (cf. Aronson Citation2003; Hall and Rodriguez Citation2003; Gillis and Munford Citation2004; Henry Citation2004; Genz and Brabon Citation2009; Baumgardner Citation2011; Budgeon Citation2011). I will, however, use some wave-related terminology because it provides a ‘useful shorthand’ for referencing ‘the broad strokes of feminist history’ (Baumgardner Citation2011). I use the term ‘cyber feminism’ in the populist sense to describe feminists whose concerns and activist approaches are primarily played out online, rather than in the tightly delineated sense found in feminist theory (cf. Consalvo Citation2003, 108–109; Nagle Citation2013a).

6. Quinn’s ex-partner, Eron Gjoni, said later that this suggestion was erroneous. He claimed it had been included in his lengthy blog dedicated to denouncing Quinn because of a typographical error (Gjoni Citation2014).

7. It is important to tread carefully when making distinctions between ‘online’ and ‘offline’ abuse and harassment. While much recent work in Internet studies rejects the online/offline dichotomy as ‘anachronistic’, given that networked technologies have become integrated in most aspects of daily life (Buchanan Citation2011, 89: see also Jensen Citation2011), distinguishing between these domains may still be useful in that it can provide context about particular instances of abuse. Certainly the anonymity and self-publishing opportunities associated with the cybersphere facilitate mob attacks in ways that would simply not be possible offline. There is a risk, however, that attacks which occur online are dismissed as ‘virtual’ rather than ‘real’ and are therefore not taken seriously. Cogent here is Henry and Powell’s case that TFSV can result in embodied harms which may have at least as much impact on a personal as traditional harms occurring against the physical body (Citation2015).

8. The canon of feminist literature outlining these issues is too vast to list here. Chris Beasley does, however, provide a useful survey of feminist theorists which have drawn attention to the way mainstream social and political thoughts have legitimated the subordination of women in social and political lives (Citation1999). Women, for instance, have been frequently presented as ‘partial beings’ and ‘helpmates’ in that they are defined in terms of men’s needs regarding pleasure, provision of services, child rearing and so on (Beasley Citation1999, 6–7). Carole Pateman’s work is also instructive in terms of providing an overview of the exclusion of women from the public sphere (Citation1989; cf. Carver and Chambers Citation2011), while Susan Faludi provides one of the many accounts of the various ways women are controlled, shamed, silenced or otherwise shut down if they are perceived to be, for example, ‘loud and self-determined’ (Citation1993, 92–93).

9. ‘Hacktivism’ – a portmanteau of ‘hacking’ and ‘activism’ – refers to the unauthorized access to and disruption of computer systems in the name of socio-political agendas.

10. ‘Scam-baiting’ is the practice of turning the tables on Internet scammers by scamming them back (cf. Rosenbaum Citation2007; Tom Citation2008).

11. A ‘denial-of-service’ (DoS) or ‘distributed denial-of-service’ (DDoS) attack results in a computer or online network becoming unavailable to users.

12. A similar dynamic has been observed by Mary Beard who critiques media narratives that recast the troll as an ‘errant son’ and their target as a ‘scolding but forgiving mother – a Penelope who chastises Telemachus for being rude, then patiently teaches him the error of his ways’ (cited in Mead Citation2014).

13. With regard to whether Pearce’s use of Facebook and Twitter constitutes a private or public act, I acknowledge the liminality of cyber domains in that they involve, as Lange puts it, the ‘publically private’ as well as the ‘privately public’ (2007Citation). I am still designating Pearce’s actions as being primarily ‘private’, however, because they were prosecuted by her sans institutional support.

14. Indeed, Gjoni has justified his public character assassination of Quinn on the grounds that he was not being vindictive but, as a survivor of her ‘emotional abuse’, simply wished to protect others (Citation2014).

15. An example is the vicious vigilante campaign of on and offline retaliation directed at Lori Drew, a woman whose online hoax was linked to the 2006 suicide of 13-year-old Megan Meier (Collins Citation2008).

16. While definitions of ‘trolling’ vary, in this paper, I am using the term interchangeably with ‘e-biling’.

17. ‘Don’t feed the trolls’ is the idea that ignoring Internet provocateurs will deprive them of the attention and reaction they crave, and will therefore result in their retreat.

Log in via your institution

Log in to Taylor & Francis Online

PDF download + Online access

  • 48 hours access to article PDF & online version
  • Article PDF can be downloaded
  • Article PDF can be printed
USD 53.00 Add to cart

Issue Purchase

  • 30 days online access to complete issue
  • Article PDFs can be downloaded
  • Article PDFs can be printed
USD 412.00 Add to cart

* Local tax will be added as applicable

Related Research

People also read lists articles that other readers of this article have read.

Recommended articles lists articles that we recommend and is powered by our AI driven recommendation engine.

Cited by lists all citing articles based on Crossref citations.
Articles with the Crossref icon will open in a new tab.