2,590
Views
43
CrossRef citations to date
0
Altmetric
Articles

Bot-based collective blocklists in Twitter: the counterpublic moderation of harassment in a networked public space

Pages 787-803 | Received 08 Sep 2015, Accepted 08 Feb 2016, Published online: 21 Mar 2016

References

  • Adam, A. (2000). Gender and computer ethics in the internet age. Computer Professionals for Social Responsibility, 18(1).
  • Adam, A. (2005). Gender, ethics, and information technology. New York, NY: Palgrave Macmillan.
  • Barbrook, R., & Cameron, A. (1996). The Californian ideology. Science as Culture, 6(1), 44–72. doi:10.1080/09505439609526455
  • Barlow, J. P. (1996). A declaration of the independence of cyberspace. In J. Casimir (Ed.), Postcards from the net: An intrepid guide to the wired world web (pp. 365–367). Sydney: Allen and Unwin. Retrieved from https://www.eff.org/cyberspace-independence
  • Bond, R. M., Fariss, C. J., Jones, J. J., Kramer, A. D. I., Marlow, C., Settle, J. E., & Fowler, J. H. (2012). A 61-million-person experiment in social influence and political mobilization. Nature, 489, 295–298. doi:10.1038/nature11421
  • Bowker, G. C., Baker, K., Millerand, F., & Ribes, D. (2010). Toward information infrastructure studies: Ways of knowing in a networked environment. In J. Hunsinger, L. Klastrup, & M. Allen (Eds.), International handbook of internet research (pp. 97–117). Dordrecht: Springer doi:10.1007/978-1-4020-9789-8_5
  • Bowker, G. C., & Star, S. L. (1999). Sorting things out: Classification and its consequences. Cambridge, MA: MIT Press.
  • boyd, d. (2010). Social network sites as networked publics: Affordances, dynamics, and implications. In Z. Papacharissi (Ed.), A networked self: Identity, community, and culture on social network sites (pp. 39–58). New York, NY: Routledge. Retrieved from http://www.danah.org/papers/2010/SNSasNetworkedPublics.pdf
  • Chess, S., & Shaw, A. (2015). A Conspiracy of fishes, or, how we learned to stop worrying about #Gamergate and Embrace Hegemonic Masculinity. Journal of Broadcasting & Electronic Media, 59(March), 37–41. doi:10.1080/08838151.2014.999917
  • Citron, D. (2014). Hate crimes in cyberspace. Cambridge, MA: Harvard University Press.
  • Crawford, K. (2009). Following you: Disciplines of listening in social media. Continuum: Journal of Media & Cultural Studies, 23(4), 525–535. doi:10.1080/10304310903003270
  • Crawford, K., & Gillespie, T. (2014). What is a flag for? Social media reporting tools and the vocabulary of complaint. New Media & Society. doi:10.1177/1461444814543163
  • Diakopoulos, N. (2015). Algorithmic accountability: Journalistic investigation of computational power structures. Digital Journalism, 3(3), 398–415. doi:10.1080/21670811.2014.976411
  • Dibbell, J. (1993). A rape in cyberspace. The Village Voice, (42), 36. Retrieved from http://www.villagevoice.com/news/a-rape-in-cyberspace-6401665.
  • Duggan, M. (2014). Online harassment: Summary of findings. Retrieved from http://www.pewinternet.org/2014/10/22/online-harassment/
  • Fernback, J. (1997). The individual within the collective: Virtual ideology and the realization of collective principles. In S. Jones (Ed.), Virtual culture: Identity and communication in cybersociety (pp. 36–55). London: Sage.
  • Fleishman, G. (2014, August 11). How collaborative social blocking could bring sanity to social networks. BoingBoing. Retrieved from http://boingboing.net/2014/08/11/whack-a-troll-with-collaborati.html
  • Fraser, N. (1990). Rethinking the public sphere: A contribution to the critique of actually existing democracy. Social Text, 26, 56–80. doi:10.2307/466240
  • Geiger, R. S. (2014). Bots, bespoke, code and the materiality of software platforms. Information, Communication & Society, 17(3), 342–356. doi:10.1080/1369118X.2013.873069
  • Geiger, R. S., & Ribes, D. (2011). Trace ethnography: Following coordination through documentary practices. In Proc HICSS 2011. IEEE. Retrieved from http://www.stuartgeiger.com/trace-ethnography-hicss-geiger-ribes.pdf
  • Gillespie, T. (2010). The politics of “platforms”. New Media & Society, 12(3), 347–364. doi:10.1177/1461444809342738
  • Gillespie, T. (2014). The relevance of algorithms. In T. Gillespie, P. Boczkowski, & K. Foot (Eds.), Media technologies: Essays on communication, materiality, and society (pp. 167–194). Cambridge, MA: The MIT Press. Retrieved from http://6.asset.soup.io/asset/3911/8870_2ed3.pdf
  • Habermas, J. (1989). The structural transformation of the public sphere. Cambridge, MA: The MIT Press.
  • Heron, M. J., Belford, P., & Goker, A. (2014). Sexism in the circuitry. ACM SIGCAS Computers and Society, 44(4), 18–29. doi:10.1145/2695577.2695582
  • Herring, S. C. (1999). The Rhetorical dynamics of gender Harassment on-line. The Information Society, 15(3), 151–167. doi:10.1080/019722499128466
  • Hess, A. (2014, October). Twitter won't stop harassment on its platform, so its users are stepping in. Slate. Retrieved from http://www.slate.com/blogs/future_tense/2014/08/06/twitter_harassment_user_created_apps_block_together_flaminga_and_the_block.html
  • Irani, L. (2013). The cultural work of microwork. New Media & Society, 17(5), 720–739. doi:10.1177/1461444813511926
  • Kelty, C. (2008). Two bits: The cultural significance of free software. Durham, NC: Duke University Press.
  • Lessig, L. (1999). Code and other laws of cyberspace. New York, NY: Basic Books.
  • Marwick, A., & Miller, R. (2014). Online harassment, defamation, and hateful speech: A primer of the legal landscape. New York, NY: Fordham Center on Law and Information Policy. Retrieved from http://papers.ssrn.com/sol3/papers.cfm?abstract_id=2447904
  • Massanari, A. (2015). #Gamergate and the fappening: How Reddit's algorithm, governance, and culture support toxic technocultures. New Media & Society, 1461444815608807. doi:10.1177/1461444815608807
  • Matias, J. N., Johnson, A., Boesel, W. E., Keegan, B., Friedman, J., & DeTar, C. (2015). Reporting, reviewing, and responding to harassment on Twitter. Retrieved from http://papers.ssrn.com/abstract=2602018
  • Morozov, E. (2013). To save everything click here: The folly of technological solutionism. New York, NY: PublicAffairs.
  • Papacharissi, Z. (2002). The virtual sphere: The internet as a public sphere. New Media & Society, 4(1), 9–27. doi:10.1177/14614440222226244
  • Papacharissi, Z. (2014). Affective publics: Sentiment, technology, and politics. Oxford: Oxford University Press.
  • Pariser, E. (2012). The filter bubble. The filter bubble. New York, NY: Penguin.
  • Phillips, W. (2015). This is why we can't have nice things: Mapping the relationship between online trolling and mainstream culture. Cambridge, MA: The MIT Press.
  • Poster, M. (2001). Cyberdemocracy: Internet and the public sphere (pp. 259–271). Malden, MA: Blackwell Publishing.
  • Schwartz, R., Lynch, D., & Harper, R. (2015). OAPI. FLOSS Weekly, 331. Retrieved from https://twit.tv/shows/floss-weekly/episodes/331
  • Star, S. L. (1999). The ethnography of infrastructure. American Behavioral Scientist, 43(3), 377–391. doi:10.1177/00027649921955326
  • Star, S. L., & Strauss, A. (1999). Layers of silence, Arenas of voice: The ecology of visible and invisible work. Computer Supported Cooperative Work (CSCW), 8, 9–30. doi:10.1023/A:1008651105359
  • Suchman, L. (2007). Human-machine reconfigurations: Plans and situated actions. Cambridge: Cambridge University Press.
  • Tokunaga, R. S. (2010). Following you home from school: A critical review and synthesis of research on cyberbullying victimization. Computers in Human Behavior, 26(3), 277–287. doi:10.1016/j.chb.2009.11.014
  • Tufekci, Z. (2014). Engineering the public: Big data, surveillance and computational politics. First Monday, 19(7). doi:10.5210/fm.v19i7.4901
  • Turner, F. (2006). From counterculture to cyberculture: Stewart brand, the whole earth network, and the rise of digital utopianism. Chicago, IL: University of Chicago Press.
  • Williams, R. (1977). Marxism and literature. Oxford: Oxford University Press.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.