701
Views
26
CrossRef citations to date
0
Altmetric
Refereed Papers

Defacing the Map: Cartographic Vandalism in the Digital Commons

Pages 214-224 | Received 30 Nov 2013, Accepted 04 Mar 2014, Published online: 05 May 2014

REFERENCES

  • Adler BT, de Alfaro L, Mola-Velasco SM, Rosso P and West AG. (2011). ‘Wikipedia vandalism detection: combining natural language, metadata, and reputation features’, http://www.springer.com/computer/swe/book/978-3-540-40522-1, 6609, pp. 277–288.
  • Allen V and Greenberger D. (1978). ‘An aesthetic theory of vandalism’, Crime & Delinquency, 24, pp. 309–321.
  • Ballatore A, Wilson D and Bertolotto M. (2013). ‘A survey of volunteered open geo-knowledge bases in the semantic web’, in Quality Issues in the Management of Web Information, Volume 50 of Intelligent Systems Reference Library, ed. by Pasi, G., Bordogna, G. and Jain, L., pp. 93–120, Springer, Berlin.
  • Bayuk J. (2010). CyberForensics: Understanding Information Security Investigations, Humana Press, New York.
  • Benkler Y and Nissenbaum H. (2006). ‘Commons-based peer production and virtue’, Journal of Political Philosophy, 14, pp. 394–419.
  • Carpenter TG. (2013). ‘Tangled web: the Syrian Civil War and its implications’, Mediterranean Quarterly, 24, pp. 1–11.
  • Carr J. (2011). Inside Cyber Warfare: Mapping the Cyber Underworld, O’Reilly Media, Sebastopol, CA.
  • Coast S. (2010a). Enough is enough: disinfecting OSM from poisonous people (August 10, 2010). OpenGeoData. http://opengeodata.org/enough-is-enough-disinfecting-osm-from-poison
  • Coast S. (2010b). OpenStreetMap – the best map (February 19, 2010). OpenGeoData. http://opengeodata.org/openstreetmap-the-best-map
  • Cohen S. (1973). ‘Property destruction: motives and meanings’, in Vandalism, ed. by Ward C, pp. 23–53, Architectural Press, London.
  • Coleman D, Georgiadou Y and Labonte J. (2009). ‘Volunteered Geographic Information: the nature and motivation of produsers’, International Journal of Spatial Data Infrastructures Research, 4, pp. 332–358.
  • Cozens P. (2008). ‘Crime prevention through environmental design’, in Environmental Criminology and Crime Analysis, ed. by Wortley R and Mazerolle L, pp. 153–194, Willan, Devon.
  • Dodge M and Kitchin R. (2013). ‘Mapping experience: crowdsourced cartography’, Environment and Planning A, 45, pp. 19–36.
  • Elwood S. (2008). ‘Volunteered geographic information: key questions, concepts and methods to guide emerging research and practice’, GeoJournal, 72, pp. 133–135.
  • Elwood S. (2010). ‘Geographic information science: emerging research on the societal implications of the geospatial web’, Progress in Human Geography, 34, pp. 349–357.
  • Elwood S, Goodchild M and Sui D. (2012). ‘Researching volunteered geographic information: spatial data, geographic research, and new social practice’, Annals of the Association of American Geographers, 102, pp. 571–590.
  • Fisher J and Baron R. (1982). ‘An equity-based model of vandalism’, Population & Environment, 5, 182–200.
  • Flanagin A and Metzger M. (2008). ‘The credibility of volunteered geographic information’, GeoJournal, 72, 137–148.
  • Furnell S. (2002). ‘Cybercrime: vandalizing the information society’, http://www.springer.com/computer/swe/book/978-3-540-40522-1, 2722, pp. 8–16.
  • Gau JM and Pratt TC. (2010). ‘Revisiting broken windows theory: examining the sources of the discriminant validity of perceived disorder and crime’, Journal of Criminal Justice, 38, pp. 758–766.
  • George A. (2007). ‘Avoiding tragedy in the wiki-commons’, Virginia Journal of Law and Technology, 12, pp. 1–42.
  • Goldstein A. (1996). The Psychology of Vandalism, Plenum Press, New York.
  • Goodchild M. (2007). ‘Citizens as sensors: the world of volunteered geography’, GeoJournal, 69, pp. 211–221.
  • Goodchild M and Li L. (2012). ‘Assuring the quality of volunteered geographic information’, Spatial Statistics, 1, 110–120.
  • Graham M. (2010). ‘Neogeography and the palimpsests of place: Web 2·0 and the construction of a virtual earth’, Tijdschrift voor economische en sociale geografie, 101, 422–436.
  • Haklay M. (2010a). ‘How good is volunteered geographical information? A comparative study of OpenStreetMap and Ordnance Survey datasets’, Environment and Planning B: Planning and Design, 37, pp. 682–703.
  • Haklay M (Ed.) (2010b). Interacting with Geospatial Technologies, John Wiley & Sons, Chichester.
  • Heymann P, Koutrika G and Garcia-Molina H. (2007). ‘Fighting spam on social web sites: a survey of approaches and future challenges’, IEEE Internet Computing, 11, pp. 36–45.
  • Jayaraman K. (2012). ‘Tragedy of the commons in the production of digital artifacts’, International Journal of Innovation, Management and Technology, 3, pp. 625–627.
  • Jindal N and Liu B. (2008). ‘Opinion spam and analysis’, in Proceedings of the International Conference on Web Search and Web Data Mining, WSDM 2008, pp. 219–230, ACM, New York.
  • Joliveau T. (2009). ‘Connecting real and imaginary places through geospatial technologies: examples from set-jetting and art-oriented tourism’, The Cartographic Journal, 46, pp. 36–45.
  • Jurgenson N. (2012). ‘When atoms meet bits: social media, the mobile web and augmented revolution’, Future Internet, 4, pp. 83–91.
  • Kelling G and Wilson J. (1982). Broken windows: the police and neighborhood safety’, Atlantic Monthly, 249, pp. 29–38.
  • Kittur A, Pendleton B and Kraut R. (2009). ‘Herding the cats: the influence of groups in coordinating peer production’, in Proceedings of the 5th International Symposium on Wikis and Open Collaboration, pp. 1–7, ACM, New York.
  • Lewisohn C. (2008). Street Art: The Graffiti Revolution, Abrams, New York.
  • Ley D and Cybriwsky R. (1974). ‘Urban Graffiti as territorial markers’, Annals of the Association of American Geographers, 64, pp. 491–505.
  • Maron M, Slater G and Coast S. (2012). Google IP Vandalizing OpenStreetMap (January 16, 2012). OpenGeoData. http://opengeodata.org/google-ip-vandalizing-openstreetmap
  • Minor H. (1999). ‘Mapping Mussolini: ritual and cartography in public art during the Second Roman Empire’, Imago Mundi, 51, pp. 147–162.
  • Monmonier M. (1996). How to Lie with Maps, University of Chicago Press, Chicago, IL.
  • Mooney P and Corcoran P. (2012). ‘Characteristics of heavily edited objects in OpenStreetMap’, Future Internet, 4, pp. 285–305.
  • Mooney P, Corcoran P and Winstanley A. (2010). ‘Towards quality metrics for OpenStreetMap’, in Proceedings of the 18th SIGSPATIAL International Conference on Advances in Geographic Information Systems, pp. 514–517, ACM, New York.
  • Moore U. (2013). How Afghan amateur mappers unintentionally punked apple (January 14, 2013). UN Dispatch. http://www. undispatch.com/how-afghan-mappers-punked-apple
  • Moser G. (1992). ‘What is vandalism? Towards a psycho-social definition and its implications’, in Vandalism: Research, Prevention, and Social Policy, ed. by Christensen H H, Johnson D R and Brookes M H, pp. 51–59, US Department of Agriculture, Forest Service, Pacific Northwest Research Station, Portland, OR.
  • Neis P, Goetz M and Zipf A. (2012). ‘Towards automatic vandalism detection in OpenStreetMap’, ISPRS International Journal of Geo-Information, 1, pp. 315–332.
  • Nielsen F. (2012). ‘Wikipedia research and tools: review and comments’, Social Science Research Network, pp. 1–52. http://ssrn. com/abstract = 2129874
  • Piatti B and Hurni L. (2011). ‘Cartographies of fictional worlds’, The Cartographic Journal, 48, pp. 218–223.
  • Potthast M and Holfeld T. (2011). ‘Overview of the 2nd International Competition on Wikipedia Vandalism Detection’, in CLEF 2011 Labs and Workshop, Notebook Papers, Amsterdam, The Netherlands, Sep 19–22.
  • Potthast M, Stein B and Gerling R. (2008). ‘Automatic vandalism detection in Wikipedia’, http://www.springer.com/computer/swe/book/978-3-540-40522-1, 4956, pp. 663–668.
  • Shepherd ID and Bleasdale-Shepherd ID. (2009). ‘Videogames: the new GIS?’, in Virtual Geographic Environments, ed. by Lin H and Batty M, pp. 311–344, Science Press, Beijing.
  • Sottek T. (2012). Sources: Google contractors fired after vandalizing OpenStreetMap, ‘no connection’ with Mocality incident (January 1, 2012). The Verge. http://www.theverge.com/2012/1/17/2714044/ google-contractors-sacked-vandalism-openstreetmap
  • Suler J. (2004). ‘The online disinhibition effect’, Cyberpsychology & Behavior, 7, pp. 321–326.
  • Sutton M. (1987). Differential rates of vandalism in a new town: towards a theory of relative place. PhD thesis. Lancashire Polytechnic. Preston, UK.
  • TomTom (2012). Open source maps and their alternatives. TomTomNewsletter. http://www.tomtom.com/en_gb/licensing/newsletter/ 201205/didyouknow
  • Tufnell B. (2006). Land Art, Tate Publishing, London.
  • Wall D and Williams M. (2007). ‘Policing diversity in the digital age: maintaining order in virtual communities’, Criminology and Criminal Justice, 7, pp. 391–415.
  • Whalen K. (2013). ‘Defacing Kabul: an iconography of political campaign posters’, Cultural Geographies, 20, pp. 541–549.
  • Williams M. (2004). ‘Understanding king punisher and his order: vandalism in an online community – motives, meanings and possible solutions’, Internet Journal of Criminology. http://www. internetjournalofcriminology.com
  • Williams M. (2006). Virtually Criminal: Crime, Deviance, and Regulation Online, Taylor & Francis, Abington.
  • Williams M. (2007). ‘Policing and cybersociety: the maturation of regulation within an online community’, Policing & Society, 17, pp. 59–82.
  • Wittel A. (2001). ‘Toward a network sociality’, Theory, Culture & Society, 18, 51–76.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.