References
- The 2017 Florida Statute, Title XLVI, Chapter 784, Section 0487 (2017). Retrieved from https://www.flsenate.gov/Laws/Statutes/2017/784.0487
- Alonzo, M., & Aiken, M. (2004). Flaming in electronic communication. Decision Support Systems, 36(3), 205–213. doi:10.1016/S0167-9236(02)00190-2
- Baker, P. (2001). Moral panic and alternative identity construction in Usenet. Journal of Computer-Mediated Communication, 7, 1. doi:10.1111/j.1083-6101.2001.tb00136.x
- Berger, J., Sorensen, A. T., & Rasmussen, S. J. (2010). Positive effects of negative publicity: When negative reviews increase sales. Marketing Science, 29(5), 815–827. doi:10.1287/mksc.1090.0557
- Bergstrom, K. (2011). “Don’t feed the troll”: Shutting down debate about community expectations on Reddit.com. First Monday, 16(8). Retrieved from http://firstmonday.org/ojs/index.php/fm/article/view/3498
- Binns, A. (2012). DON’T FEED THE TROLLS!: Managing troublemakers in magazines’ online communities. Journalism Practice, 6(4), 547–562. doi:10.1080/17512786.2011.648988
- Bishop, J. (2013). The art of trolling law enforcement: A review and model for implementing “flame trolling” legislation enacted in Great Britain (1981–2012). International Review of Law, Computers & Technology, 27(3), 301–318. doi:10.1080/13600869.2013.796706
- Bitner, M. J., Booms, B. H., & Mohr, L. A. (1994). Critical service encounters: The employee’s viewpoint. Journal of Marketing, 58(4), 95–106. doi:10.2307/1251919
- Buckels, E. E., Trapnell, P. D., & Paulhus, D. L. (2014). Trolls just want to have fun. Personality and Individual Differences, 67, 97–102. doi:10.1016/j.paid.2014.01.016
- Cheng, J., Bernstein, M. S., Danescu-Niculescu-Mizil, C., & Leskovec, J. (2017). Anyone can become a troll: Causes of trolling behavior in online discussions. In CSCW ’17 Proceedings of the 2017 ACM Conference on Computer Supported Cooperative Work and Social Computing (pp. 1217–1230). New York: ACM. Retrieved from https://pdfs.semanticscholar.org/3427/1ca4d5c91e258c2e5bf67a5f4d4698dd1885.pdf
- Cheng, J., Danescu-Niculescu-Mizil, C., & Leskovec, J. (2014). How community feedback shapes user behavior. In Eighth International AAAI Conference on Weblogs and Social Media. Palo Alto, CA: AAAI. Retrieved from http://www.aaai.org/ocs/index.php/ICWSM/ICWSM14/paper/viewPaper/8066
- Cho, D., & Kwon, K. H. (2015). The impacts of identity verification and disclosure of social cues on flaming in online user comments. Computers in Human Behavior, 51, 363–372. doi:10.1016/j.chb.2015.04.046
- Citron, D. (2014, June 8). The Facebook justice system. Slate. Retrieved from http://www.slate.com/articles/technology/future_tense/2014/08/facebook_revenge_porn_lawsuit_social_network_should_change_abuse_reporting.html#lf_comment=197784578
- Cohen, L. E., & Felson, M. (1979). Social change and crime rate trends: A routine activity approach. American Sociological Review, 44(4), 588–608. doi:10.2307/2094589
- Coles, B. A., & West, M. (2016a). Trolling the trolls: Online forum users constructions of the nature and properties of trolling. Computers in Human Behavior, 60, 233–244. doi:10.1016/j.chb.2016.02.070
- Coles, B. A., & West, M. (2016b). Weaving the internet together: Imagined communities in newspaper comment threads. Computers in Human Behavior, 60, 44–53. doi:10.1016/j.chb.2016.02.049
- Communications Act 2003, Chapter 21, Section 127 (2003). Retrieved from http://www.legislation.gov.uk/ukpga/2003/21/section/127
- Cornish, D. B., & Clarke, R. V. (2003). Opportunities, precipitators and criminal decisions: A reply to Wortley’s critique of situational crime prevention. Crime Prevention Studies, 16, 41–96.
- Craker, N., & March, E. (2016). The dark side of Facebook®: The dark tetrad, negative social potency, and trolling behaviours. Personality and Individual Differences, 102, 79–84. doi:10.1016/j.paid.2016.06.043
- Criminal Code Act 1995, Chapter 9, Section 474.17 (1995). Retrieved from https://www.legislation.gov.au/Details/C2017C00235/Html/Volume_2
- Dahlberg, L. (2001). Computer-mediated communication and the public sphere: A critical analysis. Journal of Computer-Mediated Communication, 7, 1. doi:10.1111/j.1083-6101.2001.tb00137.x
- Daunt, K. L., & Greer, D. A. (2015). Unpacking the perceived opportunity to misbehave: The influence of spatio-temporal and social dimensions on consumer misbehavior. European Journal of Marketing, 49(9/10), 1505–1526. doi:10.1108/EJM-01-2014-0061
- Daunt, K. L., & Harris, L. C. (2012). Exploring the forms of dysfunctional customer behaviour: A study of differences in service scape and customer disaffection with service. Journal of Marketing Management, 28(1–2), 129–153. doi:10.1080/0267257X.2011.619149
- Dineva, D. P., Breitsohl, J. C., & Garrod, B. (2017). Corporate conflict management on social media brand fan pages. Journal of Marketing Management, 33(9–10), 679–698. doi:10.1080/0267257X.2017.1329225
- Donath, J. S. (1999). Identity and deception in the virtual community. In M. A. Smith & P. Kollock (Eds.), Communities in Cyberspace (pp. 29–59). London: Routledge.
- Ewing, M. T., Wagstaff, P. E., & Powell, I. H. (2013). Brand rivalry and community conflict. Journal of Business Research, 66(1), 4–12. doi:10.1016/j.jbusres.2011.07.017
- Fichman, P., & Sanfilippo, M. R. (2015). The bad boys and girls of cyberspace how gender and context impact perception of and reaction to trolling. Social Science Computer Review, 33(2), 163–180. doi:10.1177/0894439314533169
- Fisk, R., Grove, S., Harris, L. C., Keeffe, D. A., Daunt, K. L., Russell-Bennett, R., & Wirtz, J. (2010). Customers behaving badly: A state of the art review, research agenda and implications for practitioners. Journal of Services Marketing, 24(6), 417–429. doi:10.1108/08876041011072537
- Freestone, O., & Mitchell, V. (2004). Generation Y attitudes towards e-ethics and internet-related misbehaviours. Journal of Business Ethics, 54(2), 121–128. doi:10.1007/s10551-004-1571-0
- Fullerton, R. A., & Punj, G. (1993). Choosing to misbehave: A structural model of aberrant consumer behavior. Advances in Consumer Research, 20(1), 570–574.
- Fullerton, R. A., & Punj, G. (2004). Repercussions of promoting an ideology of consumption: Consumer misbehavior. Journal of Business Research, 57(11), 1239–1249. doi:10.1016/S0148-2963(02)00455-1
- Gallaugher, J., & Ransbotham, S. (2010). Social media and customer dialog management at starbucks. MIS Quarterly Executive, 9(4), 197–212.
- Gensler, S., Völckner, F., Liu-Thompkins, Y., & Wiertz, C. (2013). Managing brands in the social media environment. Journal of Interactive Marketing, 27(4), 242–256. doi:10.1016/j.intmar.2013.09.004
- Ghoshal, S. (2015, September 26). Android users are trolling this app with hilarious reviews because...Why Not! Retrieved October 11, 2016, from http://www.storypick.com/android-users-reviews/
- Goffman, E. (1975). Frame analysis: An essay on the organization of experience. Harmondsworth, Middlesex: Penguin books.
- Gorton, K., & Garde-Hansen, J. (2013). From old media whore to new media troll. Feminist Media Studies, 13(2), 288–302. doi:10.1080/14680777.2012.678370
- Gully, A. (2012). It’s only a flaming game: A case study of arabic computer-mediated communication. British Journal of Middle Eastern Studies, 39(1), 1–18. doi:10.1080/13530194.2012.659440
- Hardaker, C. (2010). Trolling in asynchronous computer-mediated communication: From user discussions to academic definitions. Journal of Politeness Research, 6(2), 215–242. doi:10.1515/jplr.2010.011
- Hardaker, C. (2013). “Uh…. not to be nitpicky,,,, but…the past tense of drag is dragged, not drug.”: An overview of trolling strategies. Journal of Language Aggression and Conflict, 1(1), 58–86. doi:10.1075/jlac.1.1.04har
- Harmful Digital Communications Act 2015, Pub. L. No. 63 (2015). Retrieved from http://www.legislation.govt.nz/act/public/2015/0063/latest/whole.html#DLM5711810
- Harris, L. C., & Dumas, A. (2009). Online consumer misbehaviour: An application of neutralization theory. Marketing Theory, 9(4), 379–402. doi:10.1177/1470593109346895
- Herring, S. (2002). Computer-mediated communication on the Internet. Annual Review of Information Science and Technology, 36(1), 109–168.
- Herring, S., Job-Sluder, K., Scheckler, R., & Barab, S. (2002). Searching for safety online: Managing “trolling” in a feminist forum. The Information Society, 18(5), 371–384. doi:10.1080/01972240290108186
- Hickman, T., & Ward, J. (2007). The dark side of brand community: Inter-group stereotyping, trash talk, and schadenfreude. Advances in Consumer Research, 34, 314–319.
- Hinduja, S. (2007). Neutralization theory and online software piracy: An empirical analysis. Ethics and Information Technology, 9(3), 187–204. doi:10.1007/s10676-007-9143-5
- Hopkinson, C. (2013). Trolling in online discussions: From provocation to community-building. Brno Studies in English, 39(1), 5–25. doi:10.5817/BSE2013-1-1
- House of Lords. (2014a). Social media and criminal offences inquiry. Oral and supplementary written evidence. Retrieved from http://www.parliament.uk/documents/lords-committees/communications/socialmediaoffences/SMCOEvidence.pdf
- House of Lords. (2014b). Social media and criminal offences. Select Committee on Communications. 1st Report on Session 2014/2015. Retrieved from http://www.publications.parliament.uk/pa/ld201415/ldselect/ldcomuni/37/37.pdf
- Huberman, B. A., Romero, D. M., & Wu, F. (2009). Crowdsourcing, attention and productivity. Journal of Information Science, 35(6), 758–765. doi:10.1177/0165551509346786
- Hutchinson, A. (2015, September 5). Hey brands – if you don’t provide social media customer service, someone else will do it for you. Retrieved September 7, 2015, from http://www.socialmediatoday.com/social-business/adhutchinson/2015-09-05/hey-brands-if-you-dont-provide-social-media-customer-service
- Jane, E. A. (2014). “Your a ugly, whorish, slut”: Understanding E-bile. Feminist Media Studies, 14(4), 531–546. doi:10.1080/14680777.2012.741073
- Jane, E. A. (2015). Flaming? What flaming? The pitfalls and potentials of researching online hostility. Ethics and Information Technology, 17(1), 65–87. doi:10.1007/s10676-015-9362-0
- Japan, C. (2015). TWITCH RAIDS: Cooking a laptop. Retrieved from http://www.liveleak.com/view?i=f38_1427830234
- Johnson, M., & Gelb, B. D. (2002). Cyber-libel: Policy trade-offs. Journal of Public Policy & Marketing, 21(1), 152–159.
- Kiesler, S., Siegel, J., & McGuire, T. W. (1984). Social psychological aspects of computer-mediated communication. American Psychologist, 39(10), 1123. doi:10.1037/0003-066X.39.10.1123
- Kirman, B., Linehan, C., & Lawson, S. (2012). Exploring mischief and mayhem in social computing or: How we learned to stop worrying and love the trolls. In CHI ’12 Extended abstracts on human factors in computing systems (pp. 121–130). New York: ACM. doi:10.1145/2212776.2212790
- Kowalski, R. M., Giumetti, G. W., Schroeder, A. N., & Lattanner, M. R. (2014). Bullying in the digital age: A critical review and meta-analysis of cyberbullying research among youth. Psychological Bulletin, 140(4), 1073–1137. doi:10.1037/a0035618
- Lea, M., O’Shea, T., Fung, P., & Spears, R. (1992). “Flaming” in computer-mediated communication: Observations, explanations, implications. In M. Lea (Ed.), Contexts of computer-mediated communication (pp. 89–112). Hertfordshire, UK: Harvester Wheatsheaf.
- Leets, L. (2002). Experiencing hate speech: Perceptions and responses to anti-semitism and antigay speech. Journal of Social Issues, 58(2), 341.
- Lipton, J. D. (2011). Combating cyber-victimization. Berkeley Technology Law Journal, 26, 1103.
- Lovelock, C. H., & Wirtz, J. (2016). Services marketing: People, technology, strategy (8th ed.). Hackensack, NJ: World Scientific Publishing.
- March, E., Grieve, R., Marrington, J., & Jonason, P. K. (2017). Trolling on Tinder® (and other dating apps): Examining the role of the dark tetrad and impulsivity. Personality and Individual Differences, 110, 139–143. doi:10.1016/j.paid.2017.01.025
- Marwick, A., & Miller, R. (2014). Online harassment, defamation, and hateful speech: A primer of the legal landscape. Fordham Center on Law and Information Policy Report. Retrieved from http://ir.lawnet.fordham.edu/clip/3
- McAloon, J. (2015, September 30). Why do celebrities like Lena Dunham leave Twitter? Telegraph. Retrieved from http://www.telegraph.co.uk/culture/tvandradio/11537494/Why-do-celebrities-leave-Twitter.html
- NetSafe. (2012, February 24). Submission on NZLC IP27: The news media meets “new media”: rights, responsibilities and regulation in the digital age. Retrieved from http://www.lawcom.govt.nz/sites/default/files/submissionAttachments/39%20NetSafe.pdf
- New Zealand Law Commission. (2012). Harmful digital communications: The adequacy of the current sanctions and remedies. (Ministerial Briefing Paper). Wellington. Retrieved from http://www.lawcom.govt.nz/our-projects/regulatory-gaps-and-new-media
- Noble, C. H., Noble, S. M., & Adjei, M. T. (2012). Let them talk! Managing primary and extended online brand communities for success. Business Horizons, 55(5), 475–483. doi:10.1016/j.bushor.2012.05.001
- Nudd, T. (2015, August 13). Man poses as target on Facebook, trolls haters of its gender-neutral move with epic replies. Retrieved October 18, 2016, from http://www.adweek.com/adfreak/man-poses-target-facebook-trolls-haters-its-gender-neutral-move-epic-replies-166364
- Odou, P., & Bonnin, G. (2014). Consumers’ neutralization strategies to counter normative pressure: The case of illegal downloading. Recherche Et Applications En Marketing (English Edition), 29(1), 103–121. doi:10.1177/2051570714524878
- Olweus, D. (2012). Cyberbullying: An overrated phenomenon? European Journal of Developmental Psychology, 9(5), 520–538. doi:10.1080/17405629.2012.682358
- Peattie, K., Peattie, S., & Newcombe, R. (2016). Unintended consequences in demarketing antisocial behaviour: Project Bernie. Journal of Marketing Management, 32(17–18), 1588–1618. doi:10.1080/0267257X.2016.1244556
- Peterson, J., & Densley, J. (2017). Cyber violence: What do we know and where do we go from here? Aggression and Violent Behavior. doi:10.1016/j.avb.2017.01.012
- Petty, R. D. (2012). Using the law to protect the brand on social media sites: A three “M”s framework for marketing managers. Management Research Review, 35(9), 758–769. doi:10.1108/01409171211255939
- Pfeffer, J., Zorbach, T., & Carley, K. M. (2014). Understanding online firestorms: Negative word-of-mouth dynamics in social media networks. Journal of Marketing Communications, 20(1–2), 117–128. doi:10.1080/13527266.2013.797778
- Phau, I., Teah, M., & Lwin, M. (2014). Pirating pirates of the Caribbean : The curse of cyberspace. Journal of Marketing Management, 30(3–4), 312–333. doi:10.1080/0267257X.2013.811280
- Phillips, W. (2011). LOLing at tragedy: Facebook trolls, memorial pages and resistance to grief online. First Monday, 16, 12. Retrieved from http://firstmonday.org/ojs/index.php/fm/article/view/3168
- Phillips, W. (2013). The house that fox built: Anonymous, spectacle, and cycles of amplification. Television & New Media, 14(6), 494–509. doi:10.1177/1527476412452799
- Phillips, W. (2014, August 19). To fight trolls, focus on actions and context. The New York Times. Retrieved from http://www.nytimes.com/roomfordebate/2014/08/19/the-war-against-online-trolls/to-fight-trolls-focus-on-actions-and-context
- Punj, G. (2017). Consumer intentions to falsify personal information online: Unethical or justifiable? Journal of Marketing Management, 1–11. doi:10.1080/0267257X.2017.1348011
- Reed, G., & White, T. (2014, June 13). Social media offences. Criminal Law & Justice Weekly, 178(37). Retrieved from http://www.criminallawandjustice.co.uk/comment/Social-Media-Offences
- Reynolds, K. L., & Harris, L. C. (2005). When service failure is not service failure: An exploration of the forms and motives of “illegitimate” customer complaining. Journal of Services Marketing, 19(5), 321–335. doi:10.1108/08876040510609934
- Rokka, J., & Canniford, R. (2016). Heterotopian selfies: How social media destabilizes brand assemblages. European Journal of Marketing, 50(9/10), 1789–1813.
- Shachaf, P., & Hara, N. (2010). Beyond vandalism: Wikipedia trolls. Journal of Information Science, 36(3), 357–370. doi:10.1177/0165551510365390
- Sindelar, D. (2014, August 12). The Kremlin’s troll army. The Atlantic. Retrieved from http://www.theatlantic.com/international/archive/2014/08/the-kremlins-troll-army/375932/
- Suler, J. (2004). The online disinhibition effect. Cyberpsychology & Behavior, 7(3), 321–326. doi:10.1089/1094931041291295
- Suler, J. R., & Phillips, W. L. (1998). The bad boys of cyberspace: Deviant behavior in a multimedia chat community. CyberPsychology & Behavior, 1(3), 275–294. doi:10.1089/cpb.1998.1.275
- Synnott, J., Coulias, A., & Ioannou, M. (2017). Online trolling: The case of Madeleine McCann. Computers in Human Behavior, 71, 70–78. doi:10.1016/j.chb.2017.01.053
- TechRax. (2016). Secret hack to get headphone jack on the iPhone, 7, Retrieved from https://www.youtube.com/watch?v=5tqH-Un9SFU
- Thacker, S., & Griffiths, M. D. (2012). An exploratory study of trolling in online video gaming. International Journal of Cyber Behavior, Psychology and Learning, 2(4), 17–33. doi:10.4018/ijcbpl.2012100102
- Tokunaga, R. S. (2010). Following you home from school: A critical review and synthesis of research on cyberbullying victimization. Computers in Human Behavior, 26(3), 277–287. doi:10.1016/j.chb.2009.11.014
- Tri-City Herald. (2015, July 12). Prank call causes $5,000 in damages at Kennewick McDonald’s. Retrieved November 10, 2016, from http://www.tri-cityherald.com/news/local/crime/article48517325.html
- Turner, T. C., Smith, M. A., Fisher, D., & Welser, H. T. (2005). Picturing Usenet: Mapping computer-mediated collective action. Journal of Computer-Mediated Communication, 10(4). doi:10.1111/j.1083-6101.2005.tb00270.x
- Tuzovic, S. (2010). Frequent (flier) frustration and the dark side of word-of-web: Exploring online dysfunctional behavior in online feedback forums. Journal of Services Marketing, 24(6), 446–457. doi:10.1108/08876041011072564
- Utz, S. (2005). Types of deception and underlying motivation. What people think. Social Science Computer Review, 23(1), 49–56. doi:10.1177/0894439304271534
- Van Laer, T. (2013). The means to justify the end: Combating cyber harassment in social media. Journal of Business Ethics, 123(1), 85–98. doi:10.1007/s10551-013-1806-z
- Vandebosch, H., & Van Cleemput, K. (2008). Defining cyberbullying: A qualitative research into the perceptions of youngsters. CyberPsychology & Behavior, 11(4), 499–503.
- Vanden Bergh, B. G., Lee, M., Quilliam, E. T., & Hove, T. (2011). The multidimensional nature and brand impact of user-generated ad parodies in social media. International Journal of Advertising, 30(1), 103–131.
- YouGov. (2014a). Omnibus trolling. Retrieved March 15, 2015, from https://today.yougov.com/news/2014/10/20/over-quarter-americans-admit-malicious-online-comm/
- YouGov. (2014b). YouGov survey results. Posting online and trolls. Retrieved March 20, 2016, from http://cdn.yougov.com/cumulus_uploads/document/3yqcx5p1jb/InternalResults_141021_posting_online_and_trolls_Website.pdf