Publication Cover
Criminal Justice Studies
A Critical Journal of Crime, Law and Society
Volume 36, 2023 - Issue 3: Cybersecurity
334
Views
0
CrossRef citations to date
0
Altmetric
RESEARCH ARTICLE

Support for vigilantism in cyberspace: exploring procedural justice, distributive justice, and legal legitimacy

Pages 311-329 | Received 01 Aug 2023, Accepted 01 Aug 2023, Published online: 05 Sep 2023

References

  • Barkworth, J.M., & Murphy, K. (2015). Procedural justice policing and citizen compliance behaviour: The importance of emotion. Psychology, Crime & Law, 21(3), 254–273. doi:10.1080/1068316X.2014.951649
  • BBC. (2019, 6 November). Police concerns over rise of ‘paedophile hunters’. BBC, https://www.bbc.com/news/uk-england-50302912
  • Bentler, P.M. (1990). Comparative fit indexes in structural models. Psychological Bulletin, 107(2), 238. doi:10.1037/0033-2909.107.2.238
  • Blader, S.L., & Tyler, T.R. (2003). A four-component model of procedural justice: Defining the meaning of a “fair” process. Personality and Social Psychology Bulletin, 29(6), 747–758. doi:10.1177/0146167203029006007
  • Bottoms, A., & Tankebe, J. (2012). Beyond procedural justice: A dialogic approach to legitimacy in criminal justice. The Journal of Criminal Law and Criminology, 102(1), 119–170.
  • Bradford, B. (2011). Voice, neutrality and respect: Use of Victim support services, procedural fairness and confidence in the criminal justice system. Criminology & Criminal Justice, 11(4), 345–366. doi:10.1177/1748895811408832
  • Bradshaw, S., DeNardis, L., Hampson, F.O., Jardine, E., & Raymond, M. (2015). The emergence of contention in global Internet governance. SSRN Electronic Journal. doi:10.2139/ssrn.2634604
  • Bruss, S.M.S. (2019). Naming and shaming or’speaking truth to power’? On the ambivalences of the Indian’list of sexual harassers in academia’(LoSHA). Ephemera, 19(4), 721–743.
  • Byrne, B.M. (1994). Structural equation modeling with EQS and EQS/Windows: Basic concepts, applications, and programming. Sage.
  • Chang, L.Y. (2018). Internet vigilantism: Co-production of security and compliance in the digital age. In Criminal justice and regulation revisited (pp. 147–160). Routledge.
  • Chang, L.Y., & Poon, R. (2017). Internet vigilantism: Attitudes and experiences of university students toward cyber crowdsourcing in Hong Kong. International Journal of Offender Therapy and Comparative Criminology, 61(16), 1912–1932. doi:10.1177/0306624X16639037
  • Chang, L.Y., Zhong, L.Y., & Grabosky, P.N. (2018). Citizen co‐production of cyber security: Self‐help, vigilantes, and cybercrime. Regulation & Governance, 12(1), 101–114. doi:10.1111/rego.12125
  • Chang, L.Y., & Zhu, J. (2020). Taking justice into their own hands: Predictors of Netilantism among cyber citizens in Hong Kong. Frontiers in Psychology, 11, 11. doi:10.3389/fpsyg.2020.556903
  • Chen, Y.-J., & Tang, T.L.-P. (2006). Attitude toward and propensity to engage in unethical behavior: Measurement invariance across major among university students. Journal of Business Ethics, 69(1), 77–93. doi:10.1007/s10551-006-9069-6
  • Coleman, G. (2013). Anonymous in context: The politics and power behind the mask.
  • DeNardis, L., & Raymond, M. (2013). Thinking clearly about Multistakeholder Internet Governance. In GigaNet: Global Internet Governance Academic Network, Annual Symposium, Bali, Indonesia.
  • Denning, D.E. (2011). Cyber conflict as an emergent social phenomenon. In Corporate hacking and technology-driven crime: Social dynamics and implications (pp. 170–186). IGI Global.
  • eSilva, K. (2018). Vigilantism and cooperative criminal justice: Is there a place for cybersecurity vigilantes in cybercrime fighting? International Review of Law, Computers and Technology, 32(1), 21–36. doi:10.1080/13600869.2018.1418142
  • Fagan, J., & Tyler, T. (2004). Policing, order maintenance and legitimacy. In G. Meško, M. Pagon, & D. Bojan (Eds.), Policing in central and Eastern Europe: Dilemmas of contemporary criminal justice (pp. 38–48). University of Maribor-Faculty of Criminal Justice.
  • Gabdulhakov, R. (2019). Heroes or hooligans? Media portrayal of StopXam (Stop a Douchebag) vigilantes in Russia. Laboratorium: Журнал социальных исследований, (3), 16–45. doi:10.25285/2078-1938-2019-11-3-16-45
  • George, J.J., & Leidner, D.E. (2019). From clicktivism to hacktivism: Understanding digital activism. Information and Organization, 29(3), 100249. doi:10.1016/j.infoandorg.2019.04.001
  • Goodin, D. (2017, 4 24). BrickerBot, the permanent denial-of-service botnet, is back with a vengeance. ars Technica. https://arstechnica.com/information-technology/2017/04/brickerbot-the-permanent-denial-of-service-botnet-is-back-with-a-vengeance/
  • Grabosky, P., & Urbas, G. (2019). Online Undercover investigations and the role of private Third Parties. International Journal of Cyber Criminology, 13(1), 38–54.
  • Haas, N.E. (2010). Public support for vigilantism. Netherlands Institute for the Study of Crime and Law Enforcement (NSCR), Leiden University.
  • Haas, N.E., de Keijser, J.W., & Bruinsma, G.J. (2014). Public support for vigilantism, confidence in police and police responsiveness. Policing and Society, 24(2), 224–241. doi:10.1080/10439463.2013.784298
  • Hadjimatheou, K. (2019). Citizen-led digital policing and democratic norms: The case of self-styled paedophile hunters. Criminology & Criminal Justice, 1748895819880956.
  • Hampson, F.O., & Jardine, E. (2017). Look who’s Watching (Revised ed.). Surveillance, Treachery and Trust Online. McGill-Queen’s Press-MQUP. doi:10.1515/9781928096719
  • Hinds, L., & Murphy, K. (2007). Public satisfaction with police: Using procedural justice to improve police legitimacy. Australian & New Zealand Journal of Criminology, 40(1), 27–42. doi:10.1375/acri.40.1.27
  • Huang, Q. (2021). The mediated and mediatised justice-seeking: Chinese digital vigilantism from 2006 to 2018. Internet Histories, 5(3–4), 1–19. doi:10.1080/24701475.2021.1919965
  • Hu, L.T., & Bentler, P.M. (1999). Cutoff criteria for fit indexes in covariance structure analysis: Conventional criteria versus new alternatives. Structural Equation Modeling: A Multidisciplinary Journal, 6(1), 1–55. doi:10.1080/10705519909540118
  • Hwang, Y. (2017, May 5). The Hajime Worm - is it the Solution to Mirai or the Next-Gen botnet? iot for all. https://www.iotforall.com/cyber-vigilantism
  • Ireland, L. (2022). The acquisition of legitimacy for civilian policing: A case study of pedophile hunting groups. Crime, Law and Social Change, 79(2), 1–22. doi:10.1007/s10611-022-10045-y
  • Jackson, J., Bradford, B., Hough, M., Myhill, A., Quinton, P., & Tyler, T.R. (2012). Why do people comply with the law? Legitimacy and the influence of legal institutions. British Journal of Criminology, 52(6), 1051–1071. doi:10.1093/bjc/azs032
  • Jackson, J., Bradford, B., Stanko, B., & Hohl, K. (2012). Just authority?: Trust in the police in England and Wales. Routledge.
  • Jackson, J., Huq, A.Z., Bradford, B., & Tyler, T.R. (2013). Monopolizing force? Police legitimacy and public attitudes toward the acceptability of violence. Psychology, Public Policy, & Law, 19(4), 479. doi:10.1037/a0033852
  • Jane, E.A. (2016). Online misogyny and feminist digilantism. Continuum, 30(3), 284–297. doi:10.1080/10304312.2016.1166560
  • Jane, E.A. (2017). Feminist digilante responses to a slut-shaming on Facebook. Social Media+ Society, 3(2), 2056305117705996. doi:10.1177/2056305117705996
  • Jardine, E. (2015). The dark web dilemma: Tor, anonymity and online policing. Global Commission on Internet Governance Paper Series(21).
  • Jardine, E., Lindner, A.M., & Owenson, G. (2020). The potential harms of the Tor anonymity network cluster disproportionately in free countries. Proceedings of the National Academy of Sciences, 117(50), 31716–31721. doi:10.1073/pnas.2011893117
  • Johnston, L. (1996). What is vigilantism? The British Journal of Criminology, 36(2), 220–236. doi:10.1093/oxfordjournals.bjc.a014083
  • Jordan, T., & Taylor, P. (2004). Hacktivism and cyberwars: Rebels with a cause?. Routledge.
  • Juliano, S. (2012). Superheroes, bandits, and cyber-nerds: Exploring the history and contemporary development of the vigilante. Journal Int’l Com L Technology, 7, 44.
  • Kaplan, D. (2008). Structural equation modeling: Foundations and extensions (Vol. 10). SAGE publications.
  • Kosseff, J. (2016). The hazards of cyber-vigilantism. Computer Law & Security Review, 32(4), 642–649. doi:10.1016/j.clsr.2016.05.008
  • Kubitschko, S. (2015). The role of hackers in countering surveillance and promoting democracy. Media and Communication, 3(2), 77–87. doi:10.17645/mac.v3i2.281
  • Loveluck, B. (2019). From digital vigilantism to political activism… and back again? Circulating repertoires of online direct action. In ICA 2019–International Communication Association annual conference, Washington, DC, United States.
  • Majchrzak, A., Faraj, S., Kane, G.C., & Azad, B. (2013). The contradictory influence of social media affordances on online communal knowledge sharing. Journal of Computer-Mediated Communication, 19(1), 38–55. doi:10.1111/jcc4.12030
  • Makin, D.A., & Ireland, L. (2019). The secret life of PETs: A cross-sectional analysis of interest in privacy enhancing technologies. Policing: An International Journal, 43(1), 121–136. doi:10.1108/PIJPSM-07-2019-0124
  • Mazerolle, L., Antrobus, E., Bennett, S., & Tyler, T.R. (2013). Shaping citizen perceptions of police legitimacy: A randomized field trial of procedural justice. Criminology, 51(1), 33–63. doi:10.1111/j.1745-9125.2012.00289.x
  • McCarthy, J.D., & Zald, M.N. (1977). Resource mobilization and social movements: A partial theory. American Journal of Sociology, 82(6), 1212–1241. doi:10.1086/226464
  • Murphy, K., & Cherney, A. (2012). Understanding cooperation with police in a diverse society. The British Journal of Criminology, 52(1), 181–201. doi:10.1093/bjc/azr065
  • Murphy, K., Hinds, L., & Fleming, J. (2008). Encouraging public cooperation and support for police. Policing & Society, 18(2), 136–155. doi:10.1080/10439460802008660
  • Nhan, J., Huey, L., & Broll, R. (2017). Digilantism: An analysis of crowdsourcing and the Boston marathon bombings. The British Journal of Criminology, 57(2), 341–361.
  • Nivette, A.E. (2016). Institutional ineffectiveness, illegitimacy, and public support for vigilantism in Latin America. Criminology, 54(1), 142–175. doi:10.1111/1745-9125.12099
  • Nuno, L.E. (2018). Hispanics’ perceived procedural justice, legitimacy, and willingness to cooperate with the police. Police Practice & Research, 19(2), 153–167. doi:10.1080/15614263.2018.1418160
  • Owen, T., Noble, W., & Speed, F.C. (2017). Cyber vigilantism–how the cyber mob behaves. In New perspectives on cybercrime (pp. 45–61). Springer. 10.1007/978-3-319-53856-3_4
  • Peiser, J. (2021, Jan. 8). Internet detectives are identifying scores of pro-Trump rioters at the capitol. Some have already been fired. The Seattle Times https://www.seattletimes.com/nation-world/nation/internet-detectives-are-identifying-scores-of-rioters-at-the-capitol-some-have-already-been-fired/
  • Pina-Sánchez, J., & Brunton-Smith, I. (2020). Reassessing the relationship between procedural justice and police legitimacy. Law and Human Behavior, 44(5), 377. doi:10.1037/lhb0000424
  • Potts, L., & Harrison, A. (2013). Interfaces as rhetorical constructions: Reddit and 4chan during the boston marathon bombings. In Proceedings of the 31st ACM international conference on Design of communication, Greenville, North Carolina.
  • Reichl, F. (2019). From vigilantism to digilantism? In Social media strategy in policing (pp. 117–138). Springer International Publishing. 10.1007/978-3-030-22002-0_7
  • Reisig, M.D., Tankebe, J., & Mesko, G. (2012). Procedural justice, police legitimacy, and public cooperation with the police among young Slovene adults. Varstvoslovje, 14(2), 147.
  • Richards, K., & McCartan, K. (2018). Public views about reintegrating child sex offenders via circles of support and accountability (COSA): A qualitative analysis. Deviant Behavior, 39(3), 400–416. doi:10.1080/01639625.2017.1304800
  • Rizza, C., Pereira, Â.G., Chiaramello, M., & Curvelo, P. (2012). Do-it-yourself justice-considerations of social media use in a crisis situation: The case of the 2011 Vancouver riots. In Proceedings of the 2012 International Conference on Advances in Social Networks Analysis and Mining (ASONAM 2012), Baden-Baden, Germany.
  • Ronson, J. (2016). So you’ve been publicly shamed. Riverhead Books.
  • Rosenbaum, H.J., & Sederberg, P.C. (1974). Vigilantism: An analysis of establishment violence. Comparative Politics, 6(4), 541–570. doi:10.2307/421337
  • Schneider, C.J., & Trottier, D. (2012). The 2011 Vancouver riot and the role of Facebook in crowd-sourced policing. BC Studies, 175, 57.
  • Shattuck, J. (2018, 2 8). BrickerBot: Internet vigilantism ends Don’t justify the means. DARKReading, https://www.darkreading.com/partner-perspectives/f5/brickerbot-internet-vigilantism-ends-dont-justify-the-means-/a/d-id/1330992
  • Smallridge, J., & Wagner, P. (2020). The rise of online vigilantism. The Palgrave Handbook of International Cybercrime and Cyberdeviance, 1307–1331.
  • Smallridge, J., Wagner, P., & Crowl, J.N. (2016). Understanding cyber-vigilantism: A conceptual framework. Journal of Theoretical & Philosophical Criminology, 8(1), 57–70.
  • Smith, N.R. (2019). Contradictions of democracy: Vigilantism and rights in post-apartheid South Africa. Oxford University Press.
  • Starbird, K., Maddock, J., Orand, M., Achterman, P., & Mason, R.M. (2014). Rumors, false flags, and digital vigilantes: Misinformation on twitter after the 2013 Boston marathon bombing. In iConference 2014 Proceedings, Berlin, Germany.
  • Sunshine, J., & Tyler, T.R. (2003). The role of procedural justice and legitimacy in shaping public support for policing. Law & Society Review, 37(3), 513–548. doi:10.1111/1540-5893.3703002
  • Sun, I.Y., Wu, Y., Hu, R., & Farmer, A.K. (2017). Procedural justice, legitimacy, and public cooperation with police: Does Western wisdom hold in China? Journal of Research in Crime and Delinquency, 54(4), 454–478. doi:10.1177/0022427816638705
  • Taber, K.S. (2018). The use of Cronbach’s alpha when developing and reporting research instruments in science education. Research in Science Education, 48(6), 1273–1296. doi:10.1007/s11165-016-9602-2
  • Tankebe, J. (2009). Self‐help, policing, and procedural justice: Ghanaian vigilantism and the rule of law. Law & Society Review, 43(2), 245–270. doi:10.1111/j.1540-5893.2009.00372.x
  • Tankebe, J., & Asif, M. (2016). Police legitimacy and support for vigilante violence in Pakistan. International Journal of Comparative and Applied Criminal Justice, 40(4), 343–362. doi:10.1080/01924036.2016.1217425
  • Tapia, A.H., & LaLone, N.J. (2019). Crowdsourcing investigations: Crowd participation in identifying the bomb and bomber from the boston marathon bombing. In Crowdsourcing: Concepts, methodologies, tools, and applications (pp. 1433–1450). IGI Global.
  • Trottier, D. (2017). Digital vigilantism as weaponisation of visibility. Philosophy & Technology, 30(1), 55–72. doi:10.1007/s13347-016-0216-4
  • Trottier, D., Fuchs, C., Trottier, D., & Fuchs, C. (2014). Social media, politics and the state: Protests, revolutions, riots, crime and policing in the age of Facebook, Twitter and YouTube. Routledge. doi:10.4324/9781315764832
  • Trottier, D., Gabdulhakov, R., Huang, Q., Trottier, D., Gabdulhakov, R., & Huang, Q. (2020). Introducing vigilant audiences. Open Book Publishers. doi:10.11647/obp.0200
  • Tyler, T. (1990). Why do people obey the law? New Haven: Yale. In: University Press.
  • Tyler, T.R. (2003). Procedural justice, legitimacy, and the effective rule of law. Crime and Justice, 30, 283–357. doi:10.1086/652233
  • Tyler, T.R. (2007). Legitimacy and criminal justice. New York: Russell Sage Foundation.
  • Tyler, T.R., & Fagan, J. (2008). Legitimacy and cooperation: Why do people help the police fight crime in their communities. Ohio State Journal of Criminal Law Symposium, 6, 231.
  • Tyler, T.R., & Huo, Y. (2002). Trust in the law: Encouraging public cooperation with the police and courts through. Russell Sage Foundation.
  • Tyler, T.R., & Huo, Y.J. (2002). Trust in the law: Encouraging public cooperation with the police and courts. Russell Sage Foundation.
  • Tyler, T.R., & Jackson, J. (2014). Popular legitimacy and the exercise of legal authority: Motivating compliance, cooperation, and engagement. Psychology, Public Policy, & Law, 20(1), 78. doi:10.1037/a0034514
  • Tyler, T.R., & Murphy, K. (2011). Procedural justice, police legitimacy and cooperation with the police: A new paradigm for policing. CEPS Briefing Paper Series.
  • Tyler, T.R., Schulhofer, S., & Huq, A.Z. (2010). Legitimacy and deterrence effects in counterterrorism policing: A study of Muslim Americans. Law & Society Review, 44(2), 365–402. doi:10.1111/j.1540-5893.2010.00405.x
  • Tyler, T.R., & Sevier, J. (2013). How do the courts create popular legitimacy-the role of Establishing the Truth, Punishing Justly, and/or Acting through just procedures. Albany Law Review, 77, 1095.
  • Tyler, T.R., & Wakslak, C.J. (2004). Profiling and police legitimacy: Procedural justice, attributions of motive, and acceptance of police authority. Criminology, 42(2), 253–282. doi:10.1111/j.1745-9125.2004.tb00520.x
  • Wagner, M. (2014, August 12). We are watching you very closely’: Hacker group anonymous demands protesters’ safety, warns police of reprisal after Michael Brown shooting. Daily News https://www.nydailynews.com/news/national/hacker-group-anonymous-threatens-mo-police-article-1.1900772
  • Zizumbo-Colunga, D. (2017). Community, authorities, and support for vigilantism: Experimental evidence. Political Behavior, 39(4), 989–1015. doi:10.1007/s11109-017-9388-6

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.