Social networking sites and blogs have increasingly become breeding grounds for anonymous online groups that attack women, people of color, and members of other traditionally disadvantaged groups. These destructive groups target individuals with defamation, threats of violence, and technology-based attacks that silence victims and concomitantly destroy their privacy. Victims go offline or assume pseudonyms to prevent future attacks, impoverishing online dialogue and depriving victims of the social and economic opportunities associated with a vibrant online presence. Attackers manipulate search engines to reproduce their lies and threats for employers and clients to see, creating digital “scarlet letters” that ruin reputations. Today’s cyber...
The last twenty years have seen an explosion in the development of information technology, to the po...
No longer confined to isolated corners of the web, cyber hate now enjoys a major presence on popular...
The last twenty years have seen an explosion in the development of information technology, to the po...
Social networking sites and blogs have increasingly become breeding grounds for anonymous online gro...
Social networking sites and blogs have increasingly become breeding grounds for anonymous online gro...
Social network sites and blogs have increasingly become breeding grounds for anonymous online groups...
Most Internet users are familiar with trolling—aggressive, foul-mouthed posts designed to elicit ang...
This conference explores the role of crowds in establishing online reputations. My talk will address...
Over recent decades, the boom in information and communication technologies (ICTs) has brought compl...
The online harassment of women exemplifies twenty-first century behavior that profoundly harms women...
No longer confined to isolated corners of the web, cyber hate now enjoys a major presence on popular...
Information technology has been developing in the last two decades and has been rapidly absorbed by ...
The article discusses how social networking sites can pose a danger to victims of online offensive c...
The article discusses how social networking sites can pose a danger to victims of online offensive c...
Efforts to decrease the sexist aspects of online fora have been largely ineffective, and in some ins...
The last twenty years have seen an explosion in the development of information technology, to the po...
No longer confined to isolated corners of the web, cyber hate now enjoys a major presence on popular...
The last twenty years have seen an explosion in the development of information technology, to the po...
Social networking sites and blogs have increasingly become breeding grounds for anonymous online gro...
Social networking sites and blogs have increasingly become breeding grounds for anonymous online gro...
Social network sites and blogs have increasingly become breeding grounds for anonymous online groups...
Most Internet users are familiar with trolling—aggressive, foul-mouthed posts designed to elicit ang...
This conference explores the role of crowds in establishing online reputations. My talk will address...
Over recent decades, the boom in information and communication technologies (ICTs) has brought compl...
The online harassment of women exemplifies twenty-first century behavior that profoundly harms women...
No longer confined to isolated corners of the web, cyber hate now enjoys a major presence on popular...
Information technology has been developing in the last two decades and has been rapidly absorbed by ...
The article discusses how social networking sites can pose a danger to victims of online offensive c...
The article discusses how social networking sites can pose a danger to victims of online offensive c...
Efforts to decrease the sexist aspects of online fora have been largely ineffective, and in some ins...
The last twenty years have seen an explosion in the development of information technology, to the po...
No longer confined to isolated corners of the web, cyber hate now enjoys a major presence on popular...
The last twenty years have seen an explosion in the development of information technology, to the po...