Internet vigilantism

Internet vigilantism is the act of carrying out vigilante activities through the Internet. The term encompasses vigilantism against alleged scams, crimes, and non-Internet related behavior.

Lack of central control/oversight over the Internet has enabled vigilante reactions against certain behaviors in the same way that they have prompted those behaviors to occur in the first place.[1] Internet vigilantism often occurs due to an inability to effectively police the Internet.[2]

Description

The term internet vigilantism describes punitive public denunciations, aimed at swaying public opinion in order to “take justice into one’s own hands” by engaging in forms of targeted surveillance, unwanted attention, negative publicity, repression, coercion or dissuasion. Associate professor in sociology Benjamin Loveluck is identifies four main forms of internet vigilantism: flagging, investigation, hounding, and organized denunciation.[3]

Methods

The following are methods of Internet vigilantism that have been used or proposed for use:

Online shaming

The act of publicly shaming other internet users online. Those who are shamed online have not necessarily committed any social transgression, however. Online shaming may be used to get revenge (for example, in the form of revenge pornography), stalk, blackmail, or to threaten other internet users.[4]

Legality

In 2002 in the United States, Representative Howard Berman proposed the Peer to Peer Piracy Prevention Act, which would have protected copyright holders from liability for taking measures to prevent the distribution, reproduction or display of their copyrighted works on peer-to-peer computer networks.[1] Berman stated that the legislation would have given copyright holders "both carrots and sticks" and said that "copyright owners should be free to use reasonable, limited self-help measures to thwart P2P piracy if they can do so without causing harm."[5] Smith College assistant professor James D. Miller acknowledged the threats to the privacy of legitimate Internet users that such actions would pose, but drew comparisons with other successful crime-fighting measures that can invade privacy, such as metal detectors at airports.[6]

gollark: <@258639553357676545> knows which laws are true, really …
gollark: Gollark's conjecture: <@330678593904443393>'s are worse.
gollark: Gollark's 3rd nth law: Sinth's nth law is true only if Gollark's 1st (CURRENT MINOR VERSION OF RUST)th law is true.
gollark: Of course, Gollark's nth law applies to that as well…
gollark: Yes.

See also

References

  1. "Giving Chase in Cyberspace" (PDF).
  2. Fisher, Bonnie; Lab, Steven (2010). Encyclopedia of Victimology and Crime Prevention, Volume 1. Thousand Oaks, CA: SAGE. p. 1027. ISBN 9781412960472.
  3. Loveluck, Benjamin (2016). Digital Vigilantism, Between Denunciation and Punitive Action. De Boeck Supérieur. pp. 127–153.
  4. Laidlaw, Emily (1 February 2017). "Online Shaming and the Right to Privacy". Laws. 6: 3. doi:10.3390/laws6010003. Retrieved 5 April 2020.
  5. "The Truth About The Peer To Peer Piracy Prevention Act". Writ.news.findlaw.com. 2002-10-01. Retrieved 2009-03-03.
  6. "Let Hollywood Hack". Techcentralstation.com. Archived from the original on 2005-02-10. Retrieved 2009-03-03.

Further reading

This article is issued from Wikipedia. The text is licensed under Creative Commons - Attribution - Sharealike. Additional terms may apply for the media files.