Download as pdf or txt
Download as pdf or txt
You are on page 1of 13

Journal of Public Affairs Volume 3 Number 4

Passage to cyberactivism: How dynamics of


activism change

Laura Illia
Received: 4th November, 2002

Institute for Corporate Communication, Via Giuseppe Buffi 13, University of Lugano, Switzerland;
tel: +41 91 912 4632; e-mail: laura.illia@lu.unisi.ch

Laura Illia is a researcher at the Institute of tional set-up among activist groups puts new
Corporate Communication (ICA), University of pressure on corporations, which must develop new
Lugano, Switzerland. In 2000 she co-authored strategies concerning online rules. Cyber actions are
the paper ‘Global Issues Management in the New originated by individuals triggering a spontaneous
Economy’, presented at the Public Relations relationship between many users. The pressure is
World Congress 2000. Her masters thesis won no longer the result of a long aggregation into
the ‘Angelika Meyer Terlizzi Award’ in 2001, association, but of an immediate and spontaneous
awarded by the Swiss–Italian chapter of the network of relationships.
Swiss Public Relations Society (SPRG), and the
‘Jos Willems Award’ in 2002, awarded by Eur- KEYWORDS: activism, dynamics of cyber-
opean Public Relations Education and Research activism, rogue websites, online forum,
Association (EUPRERA). hacking, environmental changes, cyber-
issue lifecycle
ABSTRACT
The boost to activism to which the internet has WHAT IS CYBERACTIVISM?
largely contributed has been underlined by financial Cyberactivism follows a process similar to
and image issues growing from hacker attacks and activism, but is the result of new dynamics
the online promotion of activist groups. Emergency that definitively change the pressure on
corporate counteractions with regard to these cyber corporations.
threats have not analysed this new phenomenon. The redefinition of the concept of acti-
The state of the research in this area has consis- vism, considering public relations, issue man-
tently remained at the period before the develop- agement, politics, philosophy and sociology
ment and widespread use of the internet. — systemic theory — shows that activism
Cyberactivism, therefore, is a cyber phenomenon grows around issues selected by a group of
without a clear meaning or a clear definition. individuals. The pressure on corporations is
In order to understand cyberactivism, it is impor- the result of aggregations in a protest move-
tant to understand that it is much more than ment (Luhmann 1992: 58–72), as well as
simply about hacking and activists’ online promo- organisational systems being given mass
tion. It is a new phenomenon, growing out of media coverage (Grunig 1992; Regester and
activism but changing the pressure on corporations. Larking 1997; Luhmann 1992: 58–72; Kym-
Journal of Public Affairs
With the internet, new dynamics of issue selection licka 1996). Issues selection has a territorial
Vol. 3 No. 4, 2003, pp. 326–337 have been established and a different aggregation limit, and pressure is achieved through a long
& Henry Stewart Publications,
ISSN 1472-3891 within groups has taken place. A new organisa- process (Grunig 1992: 510; Holtz 2000:

Page 326
Illia

176), which stretches from flyers distributed within society and there has been a develop-
on the streets and meetings to campaigns and ment of local grassroots campaigns (Kelly
media coverage, and includes the collection 1996). New players enter into the negotia-
of financial and human resources. Such a tion process at an international level, and a
process might last for several months, or even new regulation regime is now needed to
years. manage the severe heterogeneity of pressures
Following the introduction of communi- and issues since the advent of the internet
cation technologies (CT), information (Schwartz and Gibb 1999: 1-9, 131–47). All
technology (IT) and the internet, the of these changes point to major complexities
environment within which organisations and within the world of activism: a new kind of
activists deal with each other changed. Pres- active behaviour relating to technical attacks
sure is now no longer the outcome of an (Becca 2000: 45; Schwartau 2000); a change
aggregation into organisational systems but within corporation–stakeholder relationships
rather the result of relationships established. leading to a major participation of each node
Cyberactivism grows around issues selected within the plural network (Siegel 1999;
through the interconnection of many kinds Rifkin 2000); the need for a customised
of players: traditional pressure groups that go behaviour of corporations, increasing the
online, spontaneous aggregation, and indivi- involvement of the core public in the deci-
duals. As a timeless, location-free and agency sion-making process (Siegel 1999); the rise in
medium (Gregory 1999: 9; Lévi 1999: 124; new issues relating to cyberspace and the
Bettetini and Colombo 1996: 15; Maiocchi new economy as the commercialisation of
2000: 34), the internet moves the emphasis culture (Rifkin 2000); security and privacy
from a territorial to a functional selection of problems (Schwartau 2000; Dr K 2000);
issues. This means that the issue selection — disparity of access with consequent economic
having a functional logic in itself — is disparity between countries (Negrine 1997:
empowered by the loss of territorial limits. 54).
Since the advent of the internet, the environ- Overall, these basic elements produce four
ment is a plural network in which many to typologies of cyberactivism, which are
many communication (Clark and Lapiski the result of a construction of relationships
1999; Gregory, 1999) allows individuals to producing synergies between the different
be either sender or receiver, modifying and typologies.
elaborating information. This new intercon-
nection of the flow of communication opens Online activist groups born before the advent
up a new concept regarding time limits and, of the internet
more importantly, causes the loss of control A web-based analysis1 conducted in 2000
(Holtz 2000) on the part of corporate com- shows that activist groups have a website
munication. The cyberactivism process no structure following the online communica-
longer necessitates a long time in develop- tional dynamics (Holtz 2000: 16–32), similar
ment; it can now even be the outcome of an to the e-business solutions. Websites are not
instant action, and cyberactivists’ visibility only catalogues informing about issues and
needs mass media coverage only to reach events — typical e-commerce structure (Sie-
public policy results (Wernli and Frank gel 1999: 21–25) — but rather are places
2000). where relationships are established. The
This development, as shown in Table 1, is web-based analysis showed that 33 per cent
the result of many changes at the business of websites publish strictly personalised infor-
and governmental levels. There is a higher mation — receiver-driven communication
responsibility and participation of individuals (Holtz 2000: 29; Kurzmeyer 2000) —

Page 327
Passage to cyberactivism: How dynamics of activism change

Table 1: Cyberactivism: How dynamics of activism change

Activisma Cyberactivismb

1 Originates from society’s complexity and Originates from an increase in the complexity of
pluralism society that is due to the loss of communication
control within the plural network
2 Originates from the heterogeneity of society Originates from a greater heterogeneity due to two
characteristics of the internet: agency and
mutability
3 Grows from an issue selection caused by failed Grows from an issue selection caused by a failed
expectation related to corporate social expectation related to a major responsible public
responsibility (CSR) opinion in regard to CSR issues and non-CSR
issues
4 There is a tendency to rise and focus around There is a tendency to rise and focus around an
an issue. The selection of the issue has a issue. The selection of the issue has a functional
functional logic that is limited by a territorial logic that is empowered by the functional logic of
boundary the issue development in cyberspace
5 Activism consists of a protest of two or more Cyberactivism consists of a protest of a single
individuals. The aggregation into a group of individual or two or more individuals. The
people is a prerogative of activism aggregation is not a prerogative of cyberactivism
6 Activism expresses and reaches a situation of Cyberactivism expresses in spontaneous
pressure on a corporation into a movement of aggregations, individual actions, movements of
protest or an organisation. Pressure on protest taking place off- and online, and
corporations is reached within the aggregation organisations that operate off- and online. The
pressure on corporations is reached within every
singular relationship
7 Visibility is reached due to a mass media coverage Visibility is reached through both mass media and
that contributes to the increase in pressure the internet. Both contribute to gain visibility, but
a public policy result can be achieved only if there
is a mass media coverage.

a
These seven key characteristics are the result of activism redefinition through an analysis that integrates three
disciplines studying activism: public relations (see eg Grunig 1992; Regester and Larkin 1997; Holtz 2000), politics’
philosophy (see eg Kymlicka 1996), systemic theory of Luhmann, cybernetic approach to the systems theory (see eg
Luhmann 1992; Luhmann and De Giorgi 1996).
b
These seven key characteristics are the result of the revision of activism’s characteristics in the light of changes that
have been brought about by the internet within the environment where activists and non-activists interact. The
analysis has been conducted at three levels of change: business (see eg Siegel 1999; Rifkin 2000; Kelly 1996),
governmental (see eg Negrine 2000; Schwartz and Gibb 1999) and communication (see eg Clark and Lapiski 1999;
Gregory 1999; Holtz 2000; Lévy 1999).

oriented to the pull dynamic. Information sites’ users who are tied to one’s issue.
packages and web sections help users to find Partnerships are drivers of a target of users.
and pull the information they are interested Finally, 7 per cent of websites collect finan-
in. Furthermore, 26 per cent of websites cial resources with online forms and online
establish many partnerships — market sample auctions, and 17 per cent create interactivity
of one communication (Holtz 2000: 34; with mailing lists and discussion groups. This
Neustifter 2000) — in order to reach other relationship structure orientation does not

Page 328
Illia

mean that cyberactivists have an e-business ning 1998) and Cokespotlight attack sites
strategy. It means that they go online utilising (Piro 2000a). In 1996, Ford announced the
the potential of the internet at the commu- recall of 8.7 million cars and trucks equal to a
nications level, which permits them to focus loss of US$300m and in 2000, Coke changed
their own communication on establishing a its distribution channels. These are direct and
relationship. indirect consequences of cyber actions origi-
nated by individuals triggering spontaneous
Rogue websites and individuals within group relationships between many users.
of discussions Users publishing rogue websites some-
Rogue websites publish arguments concern- times use the cross-related communication
ing corporations (Holtz 2000: 183). As in the potential of discussion groups. Individuals
first typology of cyberactivism, they have a lurk — passive membership within the vir-
structure oriented to relationships. They dif- tual community — and participate within
ferentiate from the first typology because discussion groups in order to sensitise others
they are published by individuals or by teams on an issue they are involved with (Solheim
that grow spontaneously from partnerships and Henning 1998; Holtz 2000). Every mes-
among the cyberactivist online aggregation. sage published creates a relationship having
There are both fan sites, publishing positive an exponential diffusion due to the cross-
information, and suck sites (Kassel 2000a), related communication between virtual
publishing negative information. communities and the logic of the online
Despite providing publicity for corp- grapevine (Siegel 2000: 101) and the trust
orations, fan sites are a big problem for between members of the communities. In
companies, especially for those working this way, individuals with agendas using
within the entertainment industry. Copy- vertical virtual communities follow the viral
right problems are core issues relating to and permission marketing logic of online
these sites. The International Trademark As- communities. The potential of this logic is
sociation confirms that during the year 2000, huge. The Nutrasweet case (Holtz 2000) has
there was a 22 per cent decrease in sales shown that 500 messages posted by a user can
because of copyright infringement (Nua Sur- give rise to an 80 per cent increase in
veys, 2000). An example of a fan site problem messages within virtual communities (Holtz
is the Mattel and Barbie dolls collectors case 2000: 181). Other examples of this typology
(Gellene 1997; Millican 1999–2000; Holtz of cyberactivism are the Intel Pentium case
2000: 182–83), which shows communica- (Regester and Larkin 1997: 55–62; Holtz
tional as well as corporate identity issues tied 2000: 216; Rodger 1996) — in 1995, Intel
to a legal counteraction. replaced the Pentium chip, giving rise to a
By contrast, attack sites publish informa- loss of £306m — and frauds within financial
tion with the aim of damaging the corporate virtual communities (Torresan 2000: 49;
image. In 2000, more than 5000 attack sites Beccalli 2000: 4).
were published by ‘disgruntled consumers
and disaffected employees’ (Kassel 2000a). Hacking
Disappointed consumers or individuals pur- Hackers represent a new kind of active be-
suing a cause achieve pressure due to syner- haviour related to technical attacks. There
gies created with online partnerships. Either are many kinds of hackers, with different
image of financial problems can be the result. grades of criminality. Some of them — Elite
Examples of attack sites are The Flaming Uber hackers, Ethical Hackers and White
Ford owners (Bradsher 1996; Association of Hats (Schwartau 2000: 38–61; Winkler
Flaming Ford Owners; Solheim and Hen- 2000) — do not have criminal intent, since

Page 329
Passage to cyberactivism: How dynamics of activism change

their hacking consists only of finding IT well (Dr K 2000: 78–80; De Rada 2001:
systems and software weaknesses. Others — 103): collecting information from employees,
Black hats, Prackers, Hacker gangs, Wan- hackers turn employees into indirect accom-
nabes and Push button (Schwartau 2000: plices to hacking. Finally, corporations have
38–61; US Department of Defense 1996) — to be aware that employee dissatisfaction can
have a middle to low degree of criminal lead to hacking against corporations: 35 per
intent, since they penetrate IT systems to cent of hackers are internal employees (Noak
prove their technical ability. Another cate- 2000). The analysis showed that hacker
gory — Warez Durez, Crackers, Terrorist attacks follow many techniques (Ahuja 1997;
hacking and Criminals (Schwartau 2000: Schwartau 2000; Becca 2000; Dr K 2000;
38–61; Winkler 2000; Introvigne 1999) — MXM 1997). Some are oriented towards
have a high degree of criminal intent, since credit card hacking — password hacking,
they penetrate systems and decrypt messages sniff, Trojan hacking, war dialling, crypto-
in order to steal information and cause da- hacking — and others towards IT systems
mage. The limiting factor in distinguishing hacking — denial of services, hacking for
cyberactivism, criminal activity and hacking evidence, stenography, viruses, anonymity.
relates to the purpose of each hacker. Cyber-
activism can arise whenever there is a failed Hybrid expressions
expectation, whether or not it is mixed with Domain squatting, cybergraffiti, hacktivism
criminal intent. It is not possible to compare and net strike are all hybrid expressions of
cyberactivism and hackers, however, when cyberactivism resulting from a synergy be-
there is only a criminal intent or a lack tween the other three.
thereof. The limit between criminal activity Domain squatting consists of a domain
and this typology of cyberactivism becomes name registration having two functions: to
even less clear when different typologies of gain money — the domain name will be
hackers interact and share information. In offered and sold to a corporation interested
this case, non-criminal hackers contribute in that name (Damiani 2000: 4); or re-route a
indirectly to criminal hacker attacks. famous website’s traffic to the domain name
Corporations have to learn how to manage registered — in this case, clients and users
hackers, not only because hacker attacks have will come across a website criticising cor-
a large impact at the financial and corporate porations or issues related to it instead of
image levels, but also because corporations reaching the corporation website itself (Bes-
indirectly contribute to hacker attacks. In son 2000: 14–15). An example of this is the
order to carry out the external mapping of IT etoy/E-toys case (Piro 2000b).
architectures and to identify a system’s weak- Cybergraffiti consists of the substitution of
nesses — hacker strategy (Schwartau 2000: an original website page — usually the web
185) — hackers collect a huge amount of page — with a message relating to activist or
information on the corporation they want to cyberactivist causes (Schwartau 2000: 25–
attack. In addition to the unofficial informa- 32). On the websites http://www.attrition.
tion which hackers exchange with each com and http://www.2600.com, one finds
other, there is also official information, pub- many examples of such cybergraffiti.
lished both by IT system corporations and Hacktivism (Schwartau 2000: 69–72) is a
the target corporation itself, which is useful type of political hacking leading to a use of
for hackers (Winkler 2000). Furthermore, the internet for civil disobedience. An exam-
corporations have great responsibility in pre- ple of this is the online information of anti-
venting hacker attacks because they are indir- global activist groups. Net strikes comprise
ectly responsible for social engineering as denial of services (IT systems breakdown —

Page 330
Illia

eg May 1996, Usenet newsgroup alt.religion. within the communication flow (Lévi 1997:
scientology) or online strikes (e-commerce 79; Esposito 1995; Luhmann and De Giorgi
blocks — eg Adbusters, Buying nothing 1996: 102). Finally, a higher participation
day). changes the rules of the game (Bettellini and
Colombo 1996: 15). All together, these new
HOW TO MANAGE CYBERACTIVISM elements show how new activities aimed at
In managing the pressures created by cyber- monitoring e-communication have become
activism, it is important to envisage activities more important for managing relationships.
which support strategic planning by consid- They must be considered as activities that
ering relationships, participation and loss of require a stakeholder mapping which no
control as main elements within the environ- longer portrays the corporation at the centre
ment. of the stakeholder map.
The analysis of Grunig and Repper’s mod-
el of public relations strategy (Grunig and Public stage
Repper 1992) in the light of the new envir- With the introduction of the internet, it has
onment underscores that in each stage of been necessary to consider new factors to be
communication planning, there are new ele- taken into consideration within Grunig’s
ments which need to be taken into consid- Situational Theory of Communication Behavior.
eration. Communication planning at this stage
aims to identify which stakeholder is a public,
Stakeholder stage or which player is aware of the influence he
The introduction of the internet has made it can exert on a corporation and is therefore
necessary to change the concept of stake- likely to be active (Grunig and Repper 1992;
holder mapping. Grunig 1997). The purpose of communica-
Communication planning at this stage tion planning is to involve the public in the
aims to identify corporate stakeholders (or decision-making process. The Situational
players influencing and influenced by corpo- Theory of Communication Behavior identifies
rate operations) in order to promote a pre- three independent variables (problem recog-
vious communication to them (Grunig and nition, constraint recognition and level of
Repper 1992). Stakeholder mapping follows involvement), which allows one to under-
a logic in which corporations are the central stand if the communication behaviour of
element that can control relationships be- individuals is inclined to be information
tween corporation and stakeholder and be- seeking (dependent variable of active search
tween stakeholder and stakeholder. of information) or information processing
With the introduction of the internet, (dependent variable of passive information
however, the management of relationships acquisition). Depending on the degree of
needs to be handled even more carefully than each independent variable and its influence
before these changes to the environment. In on the dependent variables, different kinds of
an e-communication where the channel is interest groups emerge: non-public, latent,
used ‘to transform, alter, correct, attack, sup- aware and active.
port a message’ (Gregory 1999: 9), commu- Since the introduction of the internet, it is
nication is completely transformed. The important not only to identify these interest
many-to-many communication substitutes groups and to communicate with the active
traditional models of information processing or ‘aware’ ones — these are the ones most
(Lévi 1997: 124-26; Holtz 2000: 89-194; likely to seek and process the information. It
Gregory 1999). In addition, the anonymity is equally important to identify the transition
and the loss of control alter the equilibrium from one interest group to another and to

Page 331
Passage to cyberactivism: How dynamics of activism change

construct a corporate communication struc- media coverage within the issue develop-
ture permitting corporations to adapt to ment. In fact, the potential and emerging
changes (Cozier and Witmer 2001: 615–28). phases are longer than the current, crisis and
Put another way, if constraint recognition dormant ones.
decreases, whereas the level of involvement With the introduction of the internet, this
and of problem recognition increases, the balance has changed because of e-memory
consequence is that it is necessary to keep an (Wernli and Frank 2000) and relationship
eye on non-public groups and on the transi- pressures attained by synergies among cyber-
tion from latent to aware and active. This activists. As can be seen in Figure 2, the
means that it is necessary to stress more than potential and emergent phases are shorter,
before the flexibility of the communication since the increase in the mass media coverage
structure in order to reach a higher adapta- area (due to an e-memory) causes an expo-
tion to changes. The pressure against cor- nential growth within them. E-memory has
porations attained with the interconnected to be considered as a double-edged factor
flow of communication causes a continuous which, apart from being a pressure item, is
potential alteration of the degree of problem the basis for an increase in the issues manage-
recognition, constraint recognition and level ment area. Consequently, issues management
of involvement. finds new challenges and opportunities that
have to be considered and managed by the
Issue stage corporation communication structure.
With the introduction of the internet, it has
become necessary to consider new factors to Monitoring activities
be taken into consideration within the issue To manage the whole strategic planning
lifecycle. process, cyberbridging activities are neces-
Communication planning at this stage sary, or monitoring operations contributing
aims to identify issues relating to interest to a decision-making process and following a
groups and their degree of development two-way symmetrical approach to commu-
(Grunig and Repper 1992). Following nication (Grunig and Kornegay 1998). In this
Hainsworth’s and Meng’s concept of the way, it is possible to include interest groups
issue lifecycle (Regester and Larking 1997), and issues within the decision-making pro-
the proportion of each issue’s phase is the cess and thus manage the whole planning
consequence of the important role of mass process, not only in the late stages, but also

Figure 1: Stakeholder mapping: from a control of relationships to a control of environmental


changes

Page 332
Illia

Figure 2: Online conception of issues lifecycle

E-Memory

Physical activism
Pressure

Lobbying
Formal constraint
e
at
ip
r tic eed Information
pa sp Coordination
to t ’ s
n ity en Direction
tu m Mobilization
or lop
pp ve Hacktivism
O de
Domain squatting
Rogue websites
Networked newsgroups
E-publishing:
dedicated issue
websites- first
rogue websites

E-mail network
coalition

Community
expression

Issue management and early issue identification Mass media coverage


Issue and
Potential Emerging Current and crisis Dormant cyberactivism
phase 1 phase 2 phase 3 phase 4 lifecycle

Source: This chart is the result of the integration of the Hainsworth and Meng issue lifecycle
and Wernli and Frank’s (2000) cyber issues development.

from the moment that the first symptoms of and clip management. Taken all together,
issues arises and the actions of interest groups these elements have to support the construc-
become noticeable. tion of an e-memory of the corporation in
Monitoring activities can be done by out- order to manage issues, interest groups and
sourcing (Kassel 2000a; Kassel 2000c; Gre- environmental changes from the beginning.
gory 1999), with internal staff or through By contrast, in-house monitoring activities
web clipping services (Middleberg 2001; have to be implemented in three areas: web
Arnold and Colson 2000; Funke 2000; Holtz page monitoring conducted with search en-
2000; Viali 2000; Thoniel 2000). gines, directories or human expert search
Web clipping services can simply offer engines (askme.com, expercentral, Exp.com,
web monitoring (Webclipping, Cyberalert) Frenzi.com, Knowpost.com, Keen.com,
or they can provide consultation regarding Askjeeves.com); discussion groups monitor-
the issues found (Net current, E-watch, M3, ing with Web forum, Usenet newsgroups
Delaye group, Cyveillance). Depending on (Newsmonger, Dejanews, title.net) or mail-
the service provided, the selection of web ing lists (litz, topica, title.net); and, finally,
clipping services can follow eight criteria online media monitoring through database
(Kassel 2000b): automation, coverage, search information aggregators (Lexis-Nexis, Dia-
frequency and depth, selectivity, timeliness, log, Factiva) and content aggregators
search specification or definition, relevance (Screaming media, Moreover, Isyndicate).

Page 333
Passage to cyberactivism: How dynamics of activism change

CONCLUSION • Public relations has a function in the


The analysis of cyberactivism leads to the con- integration of online and offline commu-
clusion that it is much more than a faster nication. It is important to manage cyber-
typology of activism. The internet has chan- activist and activist visibility, as well as
ged the dynamics of activism into a new form the corporate online presence. These two
of pressure that is the result of different objectives are reachable with a concept of
dynamics of pressure on corporations. The control related to the ‘control of changes’
establishment of relationships and its dialogue instead of the ‘control of relationship’.
construction permits cyberactivists to gain An adaptive approach to communication
visibility — and to reach objectives without has to be added to a relationship structure
the prerequisite of group aggregation. The of the website. Public relations has to
synergies arising from the relationship con- turn websites into places of dialogue
struction between the four typologies of cy- where relationships are developed, facing
beractivism (online traditional activists, rogue the loss of control of the communication
websites and discussion groups, hackers and flow with a strong line in official infor-
hybrid forms) show how spontaneous aggre- mation and communication.
gations and individuals are important players Within these functions, the main challenge
within the area of cyber pressure. The con- of public relations lies in the definition of
struction of relationships grows from a deep flexible communication oriented to environ-
orientation to web potentials. This means that mental changes, permitting an offline and
cyberactivists make excellent use of the web online relationship construction. Therefore,
by following online dynamics and logic and by public relations has to consider communica-
utilising the internet as a relationship medium tion planning principally as an effort of
as well as an information medium. coordination which allows control of the
The analysis of the management of cyber- environmental changes to be attained
activism leads to the conclusion that the through information and communication.
public relations role is defined by commu- This means that each communication med-
nication planning and programming con- ium has to be considered as a relationship
cerning the management of many elements medium, rather than an information med-
within the corporate organisation: ium.
• Public relations has a function in the
implementation of the corporate culture ACKNOWLEDGMENTS
and employee education, core elements The author wishes to thank Francesco Lurati
to face social engineering as well as for his supervision during the research, Jorge
employee dissatisfaction. Wernli for his helpful comments, and Robert
• Public relations has an important function Hangartner for his support.
in the implementation of corporate social
responsibility. Cyberbridging activities
permit public relations to manage issues NOTE
from the outset and to develop with 1. Each website has each element (packages and
sections, partnership, market sample of one,
cyberactivists the corporate social respon-
online financial resources collection, interac-
sibility and issues relating to the com- tivity) in a different proportion. The web-
pany. In other words, public relations has based analysis methodology followed three
an important role in implementing the phases. First phase: definition of research ques-
double edge of the e-memory in order to tions, evaluation variables, evaluation grids,
manage relationships with a two-way selection criteria, mapping, selection and first
symmetrical approach. navigation. Second phase: second navigation of

Page 334
Illia

websites (description of each website: 2 to 6 Clark, Y. and Lapiski, R. (1999) ‘Putting the
pages). Third phase: evaluation within grids, comm(unication) in e-commerce’, paper given
mapping, and results. The web-based analysis at the Institute of Public Relations Annual
comprises the following 42 websites: RAN; Conference, Birmingham, UK.
Greenpeace; Terre des hommes; WWF; Am- Cozier, Z. R. and Witmer, D. F. (2001) ‘The
nesty International; PETA; Adbusters; Ruckus Development of a Structuration Analysis of
Society; DAMN; Indymedia; Freespeech In- New Publics in an Elecronic Environment’, in
ternet television; Project underground; A-infos R. L. Heath (ed.), Handbook of Public Relations,
Radio Project; Protest.net; Private.net – Con- 615–23. Thousand Oaks: Sage Publications,
sumer.net; Privacypage; Consumer Union; Inc.
National Consumer League; ICO; Complain- Damiani, E. (2000) ‘Cybersquatting’, Internet
domain.com; CIVICUS; Mobilization for glo- News, VI (7): 4.
bal justice; Seattle WTO; IFG; ZPG; The De Rada, G. (2001) ‘Hacker e diritto penale’,
public eye on Davos; PGA; 1TM ark; ICG; Internet News, VII (1): 102–104.
eactivism.com; Net_institute; Allstate insur- Dr K. (2000) A Complete Hacker’s Handbook:
ance sucks; Association of Flaming Ford Own- Everything You Need to Know about Hacking in
ers; ChaseBanksucks; Cokespotlight; Radio the Age of the Web. London: Carlton Books.
LoRa and the alternative information on the Esposito, E. (1995) ‘Interaktion un Interaktivitat:
WEF 2000 Davos; Mcspotlight; Mission Possi- Personalisierung der Massesmedien?’ Soziale
ble International & Betty Martini; NO to Systeme. I(2): 223–59.
WTO (Ireland); ora-ito; overcoming consu- Funke, S. A. (2000) ‘New Web Sites Content
merism; Revolt against the empire. Options from New Content Aggregators’,
Searcher, 8(7): 1–3. URL: http://www.
REFERENCES infotoday.com/searcher/jul00/funke.htm, last
Ahuja, V. (1997) Secure Commerce on the Net. accessed December 2000.
London: AP Professional. Gellene, D. (1997) ‘Barbie Protesters Aren’t
Arnold, S. E. and Colson, M. (2000) ‘The R Playing Around’, United States Los Angeles
Technologie Revolution: Relationship, Re- Times, 10th May, 1997, p. 1, URL: http://
search Revenue’, Searcher, 8: 1–18. URL: ezone.org/barbie/censored/bbanger.htm, last
http://www.infotoday.com/searcher/oct00/ accessed December 2000.
searcher.htm, last accessed December 2000. Gregory, A. (1999) ‘How the Internet Radically
Association of Flaming Ford Owners, URL: Changes Public Relations Practice’. University
http://www.flamingford.com, last accessed of Maryland, unpublished paper.
December 2000. Grunig, L. A. (1992) ‘Activism: How It limits the
Becca, A. (2000) ‘Smurf Attack’, Internet News, Effectiveness of Organizations and How Excel-
VI(3): 44–6. lent Public Relations Departments Respond’,
Beccalli, E. (2000) Investire online. Come, dove e in J.E. Grunig (ed.), Excellence in Public Relations
quando. Milano: Tecniche Nuove. and Communication Management, 503–30. Hills-
Besson, M. (2000) ‘L’e-business sur la défensive dale, NJ: Lawrence Erlbaum Associates.
contre les pirates informatiques’, Finance et Grunig, J. E. (1997) ‘A Situational Theory of
technologie. Supplement to No. 82 of l’Agefi Publics: Conceptual History, Recent Chal-
28th April, 2000: 13–17. lenges and New Research’, in D. Moss et al.
Bettetini, G. and Colombo, F. (1996) Le nuove (eds), Public Relations Research: An International
tecnologie della comunicazione, 4th edn. Milano: Perspective, 3–48. London: Thomson Business
Strumenti Bompiani. Press.
Bradsher, K. (1996) ‘Ford Announces Recall of Grunig, J. E. and Repper, F. C. (1992) ‘Strategic
8.7 Million Cars and Trucks’, New York Times, Management, Publics, and Issues’, in J. E.
26th April, URL: http://flamingfords. Grunig (ed.), Excellence in Public Relations and
com/nytimes/nyt042696.html, last accessed Communication Management, 117–57. Hillsdale,
December 2000. NJ: Lawrence Erlbaum Associates.

Page 335
Passage to cyberactivism: How dynamics of activism change

Grunig, L. A. and Kornegay, J. (1998) ‘Cyber- Millican, A. (1999–2000) ‘The Soapbox –


bridging: How the Communication Manager The Barbie1 Trademark and Your Website’,
Role Can Link with the Dominant Coalition’, Dollzine, URL: http://www.dollzine.com/
Journal of Communication Management, 3: features/art120499-01.asp
140–56. MXM, Gruppo di lavoro per le tecnologie
Holtz, S. (2000) Public Relations on the Net. New nell’ambito del progetto Milano per la
York, NY: Amacom. Multimedialità (1997) ‘Scenari tecnologici
Introvigne, M, (1999) ‘So Many Evil Things: 1997’, Politecnı̀co di Milano, http://hoc.
Anti-Cult Terrorism via the Internet’. URL: elet.polimi.it/MXM/indice.htm, last accessed
http://www.cesnur.org/testi/anticult_terror.htm, December 2000.
last accessed December 2000. Negrine, R. (1997) ‘Communication Technolo-
Kassel, A. (2000a) ‘Guide to Internet Monitoring gies: an Overview’, in A. Mohammadi (ed.),
and Clipping: Strategies for Public Relations, International Communication and Globalization,
Marketing, Reputation Management and 50–66. London: Sage Publications.
Competitive Intelligence’. Paper for Profes- Neustifter, M. (2000) ‘From Business to e-busi-
sional Education. URL: http://www. ness with Relationship Management’, Finance
cyberalert.com/whitepaper.html#anti, last et technologie. Supplement to No. 82 of l’Agefi,
accessed December 2000. 28th April 2000: 83–84.
Kassel, A. (2000b) ‘The Last Word on Web Noack, D. (2000) ‘Employees, Not Hackers,
Monitoring and Clipping Services’, Searcher, Greatest Computer Threat’, http://www.
8: 1–27 URL: http://www.infotoday.com/ apbnews.co/newscenter/internetcrime/2000/
searcher/sep00/kassel.htm, last accessed 01/04comptheft0104_01.html, last accessed
December 2000. December 2000.
Kassel, A. (2000c) ‘Web Monitoring and Clip- Nua Survey, http://www.nua.ie/surveys/index.
ping Services Round-Up’, Searcher, 8: 1–6. cgi?f=VS&art_id=905354707&rel=true, last
URL: http://www.infotoday.com/searcher/ accessed December 2000.
jul00/kassel.htm, last accessed December 2000. Piro, N. (2000a) ‘Bollicine ma senza gas’, Internet
Kelly, M, (1996) ‘Emerging Technologies and News, VI (10): 110–12.
Public Affairs. The New Breed Game’, Corpo- Piro, N. (2000b) ‘Arma giocattolo’, Internet News,
rate Public Affairs, 6: 321–34. VI(2): 96–8.
Kurzmeyer, H. (2000) ‘Separating the Wheat Regester, M. and Larkin, J. (1997) Risk Issues and
from the Chaff: E-business’, Finance et technolo- Crisis Management. London: Kogan Page.
gie. Supplement to No. 82 of l’Agefi, 28th Rifkin, J. (2000) The Age of Access. Penguin
April, 2000: 46–50. Putnam Inc.
Kymlicka, W. (1996) Introduzione alla filosofia Rodger, W. (1996) ‘Corporate Threat: Attack of
politica contemporanea. Milano Feltrinelli. the Slamming Sites’, Interactive Week, 22 July,
Lévy, P. (1999) Cyberculture. Rapport au Conseil de URL: http://www.zdnet.com/intweek/print/
l’Europe. Odile Jacob. 960722/cover/doc1.html, last accessed
Luhmann, N. (1992) Comunicazione ecologica. Può December 2000.
la società moderna adattarsi alle minacce ecologiche? Schwartau, W. (2000) Cybershock Surviving Hack-
Milano: Franco Angeli. ers, Phreakers, Identity Thieves, Internet Terrorists
Luhmann, N. and De Giorgi, R. (1996) Teoria and Weapons of Mass Disruption. New York,
della società, 8th edn. Milano: Franco Angeli. NY: Thunder’s Mouth Press.
Maiocchi, M. (2000) Ipertesti. Progettare con un Schwartz, P. and Gibb, B. (1999) When Good
nuovo strumento di comunicazione. Milano: Companies Do Bad Things: Responsibility and
Franco Angeli. Risk in an Age of Globalization. New York,
Middleberg, D. (2001) Winning PR in the Wired NY: John Wiley.
World. Powerful Communications Strategies for the Siegel, D. (2000) (1999) Futurize your Enterprise.
Noisy Digital Space. New York, NY: McGraw- Business Strategy in the Age of the E-Customer.
Hill. Wiley & Sons.Inc.

Page 336
Illia

Solheim, C. and Henning, F. (1998) ‘Managing May.


Your Corporate Reputation: Strategies for the Viali, G. (2000) ‘Metabrowser, Navigazione Per-
Internet’, Journal of Communication Management, sonale’, Internet News, VI(9): 108–11.
3: 157–67. Wernli, J. and Frank, U. (2000) Global Issues
Thoniel, P. (2000) ‘Sécurité Sur Internet: Vrais et Management in the New Economy. Paper pre-
Faux Problèmes’, Finance et Technologie. Sup- sented at Public Relations World Congress
plement to No. 82 of l’Agefi, 28th April, 2000: 2000, Chicago. URL: http://prsa.org/work-
22–28. book/page21a.html, last accessed December
Torresan, U. (2000) ‘Chiavi Elettroniche per i 2000.
Paradisi Fiscali’, e-business, 6: 10–12. Winkler, I. S. (2000) Who Are Hackers? URL:
US Department of Defense (1996) GAO/ http://www.Infowar.com/Hacker/whohacks.
AIMD 96-84 Defence information security, html-ssi, last accessed December 2000.

Page 337

You might also like