Internet vigilantism
Internet vigilantism is the act of carrying out vigilante activities through the Internet. The term encompasses vigilantism against alleged scams, crimes, and non-Internet related behavior.
Lack of central control/oversight over the Internet has enabled vigilante reactions against certain behaviors in the same way that they have prompted those behaviors to occur in the first place.[1] Internet vigilantism often occurs due to an inability to effectively police the Internet.[2]
Description
The term internet vigilantism describes punitive public denunciations, aimed at swaying public opinion in order to “take justice into one’s own hands” by engaging in forms of targeted surveillance, unwanted attention, negative publicity, repression, coercion or dissuasion. Associate professor in sociology Benjamin Loveluck is identifies four main forms of internet vigilantism: flagging, investigation, hounding, and organized denunciation.[3]
Methods
The following are methods of Internet vigilantism that have been used or proposed for use:
Online shaming
The act of publicly shaming other internet users online. Those who are shamed online have not necessarily committed any social transgression, however. Online shaming may be used to get revenge (for example, in the form of revenge pornography), stalk, blackmail, or to threaten other internet users.[4]
Legality
In 2002 in the United States, Representative Howard Berman proposed the Peer to Peer Piracy Prevention Act, which would have protected copyright holders from liability for taking measures to prevent the distribution, reproduction or display of their copyrighted works on peer-to-peer computer networks.[1] Berman stated that the legislation would have given copyright holders "both carrots and sticks" and said that "copyright owners should be free to use reasonable, limited self-help measures to thwart P2P piracy if they can do so without causing harm."[5] Smith College assistant professor James D. Miller acknowledged the threats to the privacy of legitimate Internet users that such actions would pose, but drew comparisons with other successful crime-fighting measures that can invade privacy, such as metal detectors at airports.[6]
See also
References
- "Giving Chase in Cyberspace" (PDF).
- Fisher, Bonnie; Lab, Steven (2010). Encyclopedia of Victimology and Crime Prevention, Volume 1. Thousand Oaks, CA: SAGE. p. 1027. ISBN 9781412960472.
- Loveluck, Benjamin (2016). Digital Vigilantism, Between Denunciation and Punitive Action. De Boeck Supérieur. pp. 127–153.
- Laidlaw, Emily (1 February 2017). "Online Shaming and the Right to Privacy". Laws. 6: 3. doi:10.3390/laws6010003. Retrieved 5 April 2020.
- "The Truth About The Peer To Peer Piracy Prevention Act". Writ.news.findlaw.com. 2002-10-01. Retrieved 2009-03-03.
- "Let Hollywood Hack". Techcentralstation.com. Archived from the original on 2005-02-10. Retrieved 2009-03-03.
Further reading
- Cheong, P. H., & Gong, J. (2010) “Cyber vigilantism, transmedia collective intelligence, and civic participation.”, Chinese Journal of Communication, 3(4), 471-487.
- Byrne, Dara N. 419 Digilantes and the Frontier of Radical Justice Online. Radical History Review, Vol. 117, 2013, p. 70-82. doi:10.1215/01636545-2210464
- Rolon, Dario N. Vigilancia informatica y responsabilidad penal de los proveedores de internet
- Lennon Y.C. Chang and Ryan Poon (2016) “Internet Vigilantism: Attitudes and Experiences of University Students in Hong Kong”, International Journal of Offender Therapy and Comparative criminology. (doi:10.1177/0306624X16639037)
- Lennon Chang and Andy Leung (2015) “An introduction of cyber-crowdsourcing (human flesh searching) in the Greater China region” In Smith, R., Cheung, R and Lau, L. (eds) Cybercrime Risks and Responses: Eastern and Western Perspectives (pp, 240-252). NY: Palgrave. doi:10.1057/9781137474162_16
External links
- 'From flash mob to lynch mob', CNN, June 5, 2007