Download as pdf or txt
Download as pdf or txt
You are on page 1of 20

International Journal of E-Politics, 5(4), 1-20, October-December 2014 1

Dealing with Internet Trolling in


Political Online Communities:
Towards the This Is Why We Can’t
Have Nice Things Scale
Jonathan Bishop, Centre for Research into Online Communities and E-Learning Systems,
Swansea, Wales, UK

ABSTRACT
Internet trolling has become a popularly used term to describe the posting of any content on the Internet which
is provocative or offensive. This is different from the original meaning online in the 1990s, which referred to
the posting of provocative messages for humourous effect. Those systems operators (sysops) who run online
communities are finding they are being targeted because of abuse posted on their platforms. Political discus-
sion groups are some of the most prone to trolling, whether consensual or unwanted. Many such websites ara
open for anyone to join, meaning when some members post messages they know are offensive but legal, others
might find grossly offensive, meaning these messages could be illegal. This paper develops a questionnaire
called the This Is Why We Can’t Have Nice Things Scale (TIWWCHNT-20), which aims to help sysops better
plan the development of online communities to take account of different users’ capacity to be offended, and
for users to self-assess whether they will be suited to an online community. The scale is discussed in relation
to different Internet posting techniques where different users will act differently.

Keywords: Factor Analysis, Internet Trolling, Network Society, Online Communities, Questionnaire,
Trolling Law, Trolls

1. INTRODUCTION 2013a; Bishop, 2014; Walter, Hourizi, Mon-


cur, & Pitsillides, 2011), but in legal terms it
Internet trolling as a term has changed in mean- should refer to the posting of messages which
ing through use since the 1990s. Around that are grossly offensive as opposed to simply of-
time trolling meant posting messages on the fensive (Starmer, 2013). The difference between
Internet in order to provoke a reaction. It has what is offensive and what is not appears to in
come to mean the posting of provocative or some cases be driven by the media, meaning
offensive messages more generally (Bishop, people posting offensive messages are falling

DOI: 10.4018/ijep.2014100101

Copyright © 2014, IGI Global. Copying or distributing in print or electronic forms without written permission of IGI Global is prohibited.
2 International Journal of E-Politics, 5(4), 1-20, October-December 2014

foul of the criminal justice system as pressure 1.1. Politicisation in the


is put on law enforcement authorities to deal Network Society
with such content (Bishop, 2014).
It is now firmly established that cyberspace The term network society is now widely used.
is not a frontier in its own right but is subject to The network society is made up of virtual com-
the jurisdiction of nation states (Bishop, 2011a). munities and organic communities (Van Dijk,
Case law has established that what is grossly 1999; Van Dijk, 2005). It is almost impossible in
offensive to one person should not necessarily today’s world to exclude any form of governance
be grossly offensive to another. The case of DPP over one’s life. This has led to online discus-
v Connolly in the UK declared that a person sion groups and online communities in general
who sends an image of an aborted foetus to to be cesspits for political partisanship where
pharmacists with a politicial message would people express opinions on the basis of whether
be breaking the law, whereas if they sent the it corresponds with the policies of the political
same to an abortion surgeon it would be free party they support and not their genuine convic-
speech as the abortion surgeon is unlikely to get tions. Equally there are those online discussion
grossly offended. But pharmacists unexposed to groups which are solely dedicated to attacking
such images are likely to. In terms of the USA politicians regardless of their party politics. One
and Canada the cases of Jake Baker and Arthur might therefore see the world not as a network
Gonda respectively has the same outcome society per se, but as a collection of network
which was that by sending abusive messages societies in which the social construction each
between one another could not be considered person has received through their senses about
unlawful because they were not intended for the world, is to them the true reality. It is there-
a wider audience (Wallace, 1999). In the case fore important to understand the political points
of Jake Baker specifically he was found to not of views of those who participate in online
have broken US trolling law in the form of the discussion groups because depending on their
Telecommunications Act 1996 by posting a point of view and attitudes their participation
plot for a rape story to a newslist as it was free in an online community may be destined to be
speech. This was replicated in the UK with the successful, or indeed unsuccessful.
case of Chambers v DPP, where it was found
that a message has to cause apprehension in 1.2. The 12 Types of Troller
those receiving it in order for it to be illegal.
Such clear yet complex case law provides It is established that there are 12 types of In-
a challenge for the systems operators (syspos) ternet troller that describe many of the types
who run online communities where the posting of behaviours online, through clearly defined
of political content is the norm. The chance of character theory (Bishop, 2012b; Bishop,
someone getting grossly offended when most 2013b). In addition to this there are four groups
others in a community are not even offended of Internet troller in which these can be classi-
can create challenges for sysops. Websites like fied using definitions available in (Edmonds &
4chan have tried to deal with this by separating Gray, 2002). All of these can be seen in Table
general boards like ‘/b/’ from ones containing 1. Haters include E-Vengers, Iconoclasts and
hardcore content like ‘/hc/’ so that users know Snerts, who all like to inflame situations for
what to expect. However it is difficult for these no real benefit to others. Lolcows consist of
sysops to plan the design of an online commu- Big Men, Rippers and Chatroom Bobs, who
nity without knowing which content would be post messages to to provoke others so that the
tolerable to which people. This is something attention is on them. Bzzzters, namely MHBFY
this paper hopes to solve. Jennies, Wizards and Flirts like to chat and en-
gage in converstion even if the information or
advice they give is inaccurate. Finally Eyeballs

Copyright © 2014, IGI Global. Copying or distributing in print or electronic forms without written permission of IGI Global is prohibited.
International Journal of E-Politics, 5(4), 1-20, October-December 2014 3

Table 1. The 12 types of troller and their 4 sub-types

Group type Troller Character Description


Type (orientation)
Haters E-Venger Driven by ‘Vengeance’ forces. An E-Venger does trolling in order to
(Like to inflame (Not Criticised) trip someone up so that their ‘true colours’ are revealed.
situations for no
Iconoclast Driven by ‘Destructive’ forces. An Iconoclast takes part in trolling
real benefit to
(Important) to help others discover ‘the truth’, often by telling them things
tohers)
completely factual, but which may drive them into a state of
consternation. They may post links to content that contradicts the
worldview of their target.
Snert Driven by ‘Anti-social’ forces. A Snert takes part in trolling to harm
(Appreciated) others for their own sick entertainment.
Lolcows Big Man Driven by ‘Order’ forces. A Big Man does trolling by posting
Like to provoke (Important) something pleasing to others in order to support their world view.
others so the
Ripper Driven by ‘Thanatotic’ forces. A Ripper takes part in self-
attention is on
(Not Criticised) deprecating trolling in order to build a false sense of empathy from
them)
others.
Chatroom Bob Driven by ‘Existential’ forces. A chatroom bob takes part in trolling
(Appreciated) to gain the trust of other members in order to exploit them.
Bzzzters MHBFY Jenny Driven by ‘Forgiveness forces’. A MHBFY Jenny takes part in
(Like to chat (Appreciated) trolling to help people see the lighter side of life and to help others
regardless of come to terms with their concerns.
accuracy or
Wizard Driven by ‘Creative’ forces. A Wizard does trolling through making
usefulness of
(Important) up and sharing content that they think helps others.
contributions)
Flirt Driven by ‘Social’ forces. A Flirt takes part in trolling to help others
(Not Criticised) be sociable, including through light ’teasing’
Eyeballs Lurker Driven by ‘Surveillance’ forces. Lurkers make silent calls by
(Like to watch (Not Criticised) accident, etc., clicking on adverts or ‘like’ buttons, using ’referrer
what others do for spoofers’, reporting posts, modifying opinion polls or user kudos
the ‘opportune’ scores.
moment to post
Troll Driven by ‘Chaos’ forces. A Troll takes part in trolling to entertain
a provocative
(Appreciated) others, bringing some fun and mischief to an online community.
message)
Elder Driven by ‘Escape’ forces. An Elder is an outbound member of the
(Important) community, often engaging in “trolling for newbies”, where they
wind up the newer members often without questioning from other
members.

are made up of Lurkers, Elders and Trolls, all flame-war, as Snerts try to achieve if a person of
of which like to watch what others are doing, interest to them is the original poster, then as this
waiting for their opportune moment to post. erodes the discussion it might be considered by
Consider the Flirts and Snerts. These troll- sysops and their moderators to be unnecessary
ers take part in a type of posting called ‘snack- and disproportionate (Wallace, 1999).
ing’ (i.e. intensive posting on specific topics). Consider also MHBFY Jennies (who are
Both of these types of troller are known to post empathetic and forgiving) and E-Vengers (who
off-topic, but to what extent something could are vengeful). These types of troller often take
be considered to be off-topic is often a matter part in a type of posting called ‘mobiling.’ Mo-
of debate (Wallace, 1999, p.238). One might biling can be used constructively by trollers to
consider that if an off-topic post results in a share stories and offer advice (Young & Levine,

Copyright © 2014, IGI Global. Copying or distributing in print or electronic forms without written permission of IGI Global is prohibited.
4 International Journal of E-Politics, 5(4), 1-20, October-December 2014

2000, p. 13), but it can also be used to provide trollers will try to influence the kudos points
advice in a non-constructive and deceptive way. others may have so that those they disagree with,
Another set of trollers, Trolls and Big or who post an idea before they thought of it,
Men, take part in trolling, or ‘classical trolling’ are given bad ‘karma’ (Powazek, 2002, p.132).
(Bishop, 2014) whereby the point of the former’s
posts is to provide provocative content that is
entertaining (Wallace, 1999, p.102; Young & 2. DEVELOPING THE ‘THIS
Levine, 2000, p. 275) and the point of the latter’s IS WHY WE CAN’T HAVE
posts is to post messages that assert their point NICE THINGS’ SCALE
of views which then provokes those posters
Tensions in online communities, particularly of
who either disagree with their point of view,
a political nature, can have a severe impact on
or don’t like them per se.
the enjoyment of participating in those online
Another type of posting called ‘flooding’ is
communities (Bishop, 2011c; Bishop, 2013b;
often done by users called Chatroom Bobs and
Hardaker, 2013). This poses a problem for the
Rippers. Flooding can have as its aim to target
systems operators who design and administer
users through fast, rapid or multiple postings in
online communities can ensure that only the
order to seduce someone to their perspective in
types of poster most suited to their website take
the case of the former (Wallace, 1999, p.245),
part and that they can keep away those who
or in the case of the latter to draw attention to
would be offended or otherwise dislike that
how they have been treated unfavourably by
online community’s ethos. There can be no one
others to drown out or bring attention to that
kind of political online community – some are
point of view (Wallace, 1999, p.238; Young &
abusive to politicians and others focus on policy
Levine, 2000).
and not personalities. It is therefore important
A further kind of posting is ‘spamming.’
that a scale to assess the suitability of particu-
Whilst this conjures up images of unsolicited
lar users to online communities be developed.
emails to either a person or newslist (Wallace,
Whilst this may be difficult for sysops of online
1999, p.132), the concept extends to the posting
communities to administer adhoc, it is hoped
of any content in a self-promotional or self-
such a scale could help in the planning of online
serving way. This can include self-promoting
communities and through self-administration
oneself on Wikipedia using a sock puppet
by users themselves.
account masked with a pseudonym, or using
search engine optimisation (SEO) methods to 2.1. Participants
post links to ones content from various providers
of free personal homepage creation. Spamming This research study examined what implica-
is usually done by Wizards and Iconoclasts. tions for forms of democratic citizenship and
A final type of participation is ‘lurking,’ participation that consumption may have on
which is traditionally associated with people online and media participation. The research
who do not participate in online communities, covered the ways that people’s practices as
except on the periphery, known as Lurkers media consumers were connected (or not) to
(Bishop, 2007b; Nonnecke, Preece, & Andrews, their practices as citizens. The project involved
2004; Preece, Nonnecke, & Andrews, 2004). a telephone survey of over 1000 people, con-
However, it has been extended to those out- ducted by ICM Research across the United
bound from the community, known as Elders, Kingdom that aimed to produce conclusions
who wait for the opportunity to post uncon- on the detailed issues about consumption and
structively lurking by Elders includes ‘trolling citizenship (Couldry, Markham, & Livingstone,
for newbies,’ where they post messages that go 2007). In the end, a total of 1065 observations
against the grain of the beliefs the new members were made, consisting of people from a variety
expect to find in the discussion group. Both these of backgrounds across the United Kingdom.

Copyright © 2014, IGI Global. Copying or distributing in print or electronic forms without written permission of IGI Global is prohibited.
International Journal of E-Politics, 5(4), 1-20, October-December 2014 5

In terms of age, 287 of the participants were It was decided to use the A Priori Criterion
aged 18-34 (26.9%), 386 aged 35-54 (36.2%), and extract six factors from the data as this
and 344 were aged over 55 (32.3%). In terms of represented the six processes from stimulus to
Internet access 295 of the participants (27.7%) response in the ecological cognition framework.
had access to the Internet at home, 85 had access A Priori specification can help shape the initial
to the Internet at work (8%), 47 had access to design of theory-building research, which some
the Internet somewhere else (4.4%), with 301 argue is a purpose of factor analysis (Gorsuch,
not presently having access (28.3%) and 48 1983, p.xviii), as it permits researchers to iden-
of the participants (4.5%) did not respond to tify constructs more accurately than is possible
this question. In terms of ethnicity, 835 of the through purely cognitive processes (Eisenhardt,
participants considered themselves to be Brit- 1989). An alternative would have been to allow
ish (78.4%) and 13 considered themselves to the statistical analysis package to select factors
be Irish (1.2%), with 48 not responding (4.5%) using some arbitrary Eigenvalue, but it was
and the remaining 169 (15.9%) being from other decided that keeping the number of factors in
ethnic backgrounds. line with the ECF was more important.

2.2. Measurements 2.3.1. Preliminary Analysis

The study administered a set of questions that Multi-colinearity was tested by the author
were derived from analysing the diaries of 37 before they conducted a factor analysis by
participants’ media consumption as well as measuring the sampling adequacy, using the
initial and subsequent interviews that were Kaiser-Meyer-Olkin test. This test compares
conducted with those respondents, and focus the magnitudes of the calculated correlation
group interviews that were conducted with coefficients to the magnitudes of the partial cor-
diarists (Couldry et al., 2007). The telephone relation coefficients (Pett, Lackey, & Sullivan,
survey of 1,017 people, was conducted by ICM 2003). The dataset showed individual MSAs of
Research across the United Kingdom that aimed between 0.587 and 0.868 which in the case of
to produce conclusions on the detailed issues the latter is “great” (Field, 2005, p.630). In the
about consumption and citizenship raised in case of the latter, 86.8% of the variance of one
Phase One (Couldry et al., 2007). variable is accounted for by all the others and
58.7% in the case of the former. Taking into
2.3. Methodology and Method account this and the KMO of 0.778 it seemed
that there was no reason for concern and that
Factor analysis was the most appropriate method the factor analysis should continue. As well
for this dataset, as it is necessary to reduce the as the overall measure of sampling adequacy,
data to specific factors, which would hopefully as estimated by the KMO, it is also important
map onto the ecological cognition framework to test the sphericity of the data set (Hinton,
(Bishop, 2007a; Bishop, 2007b). There are three Brownlow, McMurray, & Cozens, 2004, p.349).
primary analytical techniques for performing a The Bartlett test of sphericity examines whether
factor analysis; principal components analysis, a variance-covariance matrix is proportional to
common factor analysis and Q-method factor an identity matrix and a dataset is considered
analysis. Principal components analysis (PCA), suitable for further analysis if the associated
was selected because it yields one of more probability is less than .05 (Bryde & Pelie,
composite variables that can capture much of 2006, p.123). In the data set it showed a Chi
the information originally contained in a larger square of 2961.74 and significance of <0.001
dataset, with the components being weighted making the dataset suitable.
as sums of the original sums (DeVellis, 2003,
p.128).

Copyright © 2014, IGI Global. Copying or distributing in print or electronic forms without written permission of IGI Global is prohibited.
6 International Journal of E-Politics, 5(4), 1-20, October-December 2014

Table 2. Factor matrix for ‘opportunity’

Opportunity Understanding Relevance Aspiration Choice Expression


1. You know where to go .769
to find out information
that you need
2. Sometimes you feel -.402 .327 .392
strongly about an issue,
but don’t know what to
do about it

2.3.2. Factor Extraction, Rotation, by (Bishop, 2007b). Table 2 shows the factor
Description and Naming loadings for the ‘Opportunity’ factor.
It has been argued that the question of
Assessing the loadings of variables on to factor fairness across generations should be formu-
is important in assessing the effectiveness of the lated as a comparison of opportunities avail-
factor analysis output. Factor loadings are coef- able to individuals living at different times
ficients that indicate the importance of a variable (Norton, 1999, p.119). From this it is clear to
to a factor. The un-rotated component matrix find support for the existence of this factor in
showed variables loading onto more than one understanding the similarities between how
of the factors. Whilst it may have been possible different generations use information. The
to run the analysis again without restricting it to statement, ‘You know where to go to find out
6 factors. It seemed more suitable to rotate the information that you need’ identified in the data
data to improve the clarity of the pattern using is quite relevant to this category as it is known
Quartimax rotation. Loadings under 0.25 were that organisations can be effective when they
disregarded. As a structure to the data existed, act on opportunities to transform information
the next stage involved naming and describing into knowledge in order to integrate the wisdom
the factors and their interrelationships through of different generations into the workplace
investigating their loadings using the rotated (Kouzes & Posner, 1987, p.xxiii). The statement,
component matrix. ‘Sometimes you feel strongly about an issue,
but don’t know what to do about it’ negatively
2.3.2.1. Opportunity loaded onto this factor, which is appropriate as
different age groups approach opportunities in
When someone decides to visit a particular part
relation to discussing politics differently and it
of a virtual world or take part in an information
is recommended that organisations manage the
exchange, they are doing so by giving up the
communication between them (Hankin, 2005,
opportunity to do something else, referred to as
p.24). This could be because actors within an
‘the opportunity cost’ (Lehr, 2009). Different
economy are always seeking out opportunities
generations value certain activities more than
to meet their goals and will narrow their focus
others and are more willing to sacrifice certain
within their competencies to achieve those
opportunities over others. This is a core aspect
goals (Mantovani, 1996). It is a clear principle
of ecological cognition, where it is stated that
of economics that human wants are infinite and
users of information systems do not have a hi-
resources are scarce, which means that users of
erarchy to their needs that are innate, but have
virtual worlds will seek out a new opportunity
developed cognitions that affect their priorities
if they lack the resources to take part in their
through exposure to not only their internal en-
preferred one. For instance, in Second Life
vironment (i.e. their mind and body), but also
where some virtual goods are charged for, the
their external one (i.e. the world) as suggested

Copyright © 2014, IGI Global. Copying or distributing in print or electronic forms without written permission of IGI Global is prohibited.
International Journal of E-Politics, 5(4), 1-20, October-December 2014 7

Table 3. Factor matrix for ‘understanding’

Opportunity Understanding Relevance Aspiration Choice Expression


3. It’s a regular part of .761
your day to catch up with
the news
4. You follow the news to .718
understand what’s going
on in the world
5. You follow the news to .602
know what other people
are talking about
6. It’s your duty to keep .511 .462
up with what’s going on
in the world
7. You have a pretty good 0.3 .443
understanding of the
main issues facing our
country

user may go without and instead learn to create in informing their understanding of the world
them for themselves. around them (Barlow, 2007, p.43).

2.3.2.2. Understanding 2.3.2.3. Relevance

The crucial part of responding to an economic The relevance of a particular stimulus in the
opportunity in the environment is an understand- environment to an actor is affected by their
ing of the stimuli it offers. It has been argued ability to consume it (Mantovani, 1996). It can
that understanding, particularly of science be seen that as a particular user’s confidence in
and faith is spread over many generations, a system increases so their consumption of its
with each adding its own contribution, arising resources also increase. For instance, in Second
from its own perspective (Polkinghorne, 2000, Life, as a user becomes aware of how to interact
p.40). Table 3 shows the factor loadings for the with the system, such as through ‘flying’ or
‘Understanding’ factor. ‘teleporting’ then the greater their exposure to
In terms of the factor analysis, the state- different aspects of the system will be and it
ments, ‘It’s a regular part of your day to catch will become more likely that their inventory
up with the news’, ‘You follow the news to will increase as they discover artefacts that
understand what’s going on in the world’, ‘You are relevant to them. Table 4 shows the factor
follow the news to know what other people are loadings for the ‘Relevance’ factor.
talking about’ fit well into this factor as it is The statements ‘You often feel that there’s
known that people who follow the news have too much media, so you need to switch off’ and
a greater understanding of their communities ‘There’s no point in watching the news, because
and themselves (Salwen & Stacks, 2008, p.48). it deals with things you can do nothing about’
The statements, ‘It’s your duty to keep up with seem fitting to this factor of relevance as ac-
what’s going on in the world’ and ‘You have cording to (Johnston, 1998, p.6) citizens will
a pretty good understanding of the main is- consume news media if it is relevant to them
sues facing our country’ seem relevant to this regardless of whether it is for information or
category as keeping up-to-date with current entertainment purposes. The statements, ‘It
affairs has been consistent across generations doesn’t really matter which party is in power,

Copyright © 2014, IGI Global. Copying or distributing in print or electronic forms without written permission of IGI Global is prohibited.
8 International Journal of E-Politics, 5(4), 1-20, October-December 2014

Table 4. Factor matrix for ‘relevance’

Opportunity Understanding Relevance Aspiration Choice Expression


8. You often feel that .652 .280
there’s too much media,
so you need to switch
off
9. There’s no point in -.327 .639
watching the news,
because it deals with
things you can do
nothing about
10. It doesn’t really .620
matter which party is in
power, in the end things
go on pretty much the
same
11. People like us have .552 -.325
no say in what the
government does
12. Sometimes politics -0.46 .535
seems so complicated
that you can’t really
understand what’s
going on

in the end things go on pretty much the same’, & Palda, 1983). The negatively loaded state-
and ‘People like us have no say in what the ment, ‘Sometimes politics seems so complicated
government does’ are also appropriate as the that you can’t really understand what’s going
relevance of government and political parties to on’ is also suitable for this factor as individuals
a particular household is related to the effect they are more likely to accept arguments about their
have on that household’s ability to achieve its democracies if they are simpler and relevant to
goals and that all political parties have access to their lives (Barber, 2004, p.249).
the same instruments for affecting it (Chapman

Table 5. Factor matrix for ‘aspiration’

Opportunity Understanding Relevance Aspiration Choice Expression


13. People at .777
work would
expect you to
know what’s
going on in the
world
14. Your .384 .717
friends would
expect you to
know what’s
going on in the
world

Copyright © 2014, IGI Global. Copying or distributing in print or electronic forms without written permission of IGI Global is prohibited.
International Journal of E-Politics, 5(4), 1-20, October-December 2014 9

Table 6. Factor matrix for ‘choice’

Opportunity Understanding Relevance Aspiration Choice Expression


15. You trust the .823
government to do what
is right
16. You trust politicians .819
to deal with the things
that matter
17. You trust politicians .773
to tell the truth

2.3.2.4. Aspiration an individual or group of individuals of differ-


ent generations (Goldring & Shapira, 1993).
People of all generations and within them have While the statements in this factor talk
different aspirations (Taylor, Rosenbach, & about ‘trust’, it is apparent from analysing
Rosenbach, 2009, p.276), although the thing the ecological cognition framework (Bishop,
they generally have in common is that they 2007a; Bishop, 2007b) that this factor is more
regularly have them (Grikscheit, Cash, & Young, about ‘choice’ be seen in Table 6. Trust after
1993, p.129). Table 5 shows the factor loadings all is a choice, and the statements represent the
for this ‘Aspiration’ factor. different choices individuals take in a demo-
The two statements in this factor, namely, cratic society. The statement, ‘You trust the
‘People at work would expect you to know government to do what is right’ suggests that
what’s going on in the world’ and ‘Your friends individuals choose to put their trust in elected
would expect you to know what’s going on in representatives, as does the statement, ‘You trust
the world’ seem to fit with the idea that people politicians to deal with the things that matter’.
draw some of their aspirations from those they The statement, ‘You trust politicians to tell the
are in close contact with in the social world. This truth’ is reflective of the choice people make to
factor is particularly affected by the principle of accept information from these representatives
‘marginal utility’, which is the extent to which as being accurate. This factor appears to include
the exposure to a particular stimulus leads to the reconciliation of internal wants with external
demand for a re-exposure or reuptake of that costs, or externalities.
stimulus. It is at this stage that actors become
unaware of the externalities of their wants and 2.3.2.6. Expression
are driven purely by responding to existing
relevant opportunities and going on to create Like the opportunity factor, the expression factor
new opportunities, even if this is only to be re- is affected by opportunity cost. While an actor
exposed to desirable aspects of the environment. is using a specific product or communicating
with a specific actor they may be missing out
2.3.2.5. Choice on the opportunity to do so with somebody
else. (Bolin, 2009) indicates that the need for
Different actors will respond differently to the expressing oneself is evenly distributed across
principle of marginal utility and the effect of generations, but the means for expression should
their judgement on whether to take up another be expected to vary, as would means for enter-
unit of exposure is affected by the universal tainment, and suggests it would be beneficial to
value of ‘choice’. Choice goes beyond the right map the differences between generations when
to choose, as the basis for exercising choice is it comes to activities that they carry out. The
according to the perceived needs or values of

Copyright © 2014, IGI Global. Copying or distributing in print or electronic forms without written permission of IGI Global is prohibited.
10 International Journal of E-Politics, 5(4), 1-20, October-December 2014

Table 7. Factor Matrix for ‘Expression’

Opportunity Understanding Relevance Aspiration Choice Expression


18. You can .752
affect things
by getting
involved in
issues you care
about
19. You feel .317 .612
that you can
influence
decisions in
your area
20. Politics .264 .316 -.265 -0.47
has little
connection
with your life

factor loadings for this factor, ‘Expression,’ determining reliability. The first measure is to
are in Table 7. consider each separate item, including the item
The statement, ‘You can affect things by total correlation and the interim correlation. The
getting involved in issues you care about’ seems second type of diagnostic measure is the reli-
appropriate for this factor as increasingly ac- ability coefficient that assesses the consistency
tors are getting involved in political activism of the scale with Chronbach’s alpha. The third
as a form of democratic expression (Andersen, type is to use the reliability measures derived
2002, p.15). With the mass adoption of Internet from a confirmatory factor analysis.
technologies and in particular virtual worlds To perform the analysis requires selecting
users are exposed evermore to opportunities one factor at a time and taking into account
to express themselves and often to a wider each of the variables that make up that factor.
audience that gives them a greater degree of The Chronbach’s alpha for ‘Understanding’
influence. The statement, ‘You feel that you can was 0.689 which is reasonable, and this was
influence decisions in your area’ is relevant to not improved by removing variables from the
this factor as political influence has been linked scale. The Chronbach’s alpha for ‘Relevance’
to the expression of individual identities (Innes was 0.624 and when items were removed it
& Rendall, 2006). The statement, ‘Politics has was significantly reduced, suggesting that the
little connection with your life’ if inverted is scale is adequate. The Chronbach’s alpha for
appropriate as political expression is common- ‘Choice’ was 0.751 and this was not improved
place and shaped by the social context of the by removing items. The Chronbach’s alpha for
individuals within electoral regions (Agnew, ‘Aspiration’was 0.676 and this was significantly
1990, p.15). worse when variables were removed, suggest-
ing it is adequate. The Chronbach’s alpha for
2.3.3. Reliability Analysis ‘Expression’ was 0.006, but when ‘politics has
little connection with your life’ was removed it
According to (Hair, Black, Babin, Anderson, improved to 0.499, suggesting this item should
& Tathan, 2006), reliability is an assessment be deleted from the scale. The Chronbach’s
of the degree of consistency between multiple alpha for ‘Opportunity’ was -0.254 and this
measurements of a variable. They indicate that was not improved by removing any variables,
there are three types of diagnostic measures for

Copyright © 2014, IGI Global. Copying or distributing in print or electronic forms without written permission of IGI Global is prohibited.
International Journal of E-Politics, 5(4), 1-20, October-December 2014 11

Table 8. Overview of how to read results from the this is why we can’t be nice scale

Factor Outcome of High Score Benefits of more users


Opportunity Increased TISWCHNT Potential. Flame Increased content production
trolling, unbalanced lurking
Understanding Reduced TISWCHNT Potential. Reduced flame Increased content consumption
trolling, increased lurking
Relevance Increased TISWCHNT Potential. Increased Increased posting of flames
flame trolling, increased lurking
Aspiration Reduced TISWCHNT Potential. Reduced flame Increased participation and membership
trolling, reduced lurking base due to viral marketing
Choice Reduced TISWCHNT Potential. Reduced flame Increased posting of kudos, even if critical
trolling, reduced lurking
Expression Moderate TISWCHNT Potential. Unbalanced Mixed posting of kudos and flames due to
flame trolling, reduced lurking increased confidence

suggesting more variables need to be added to free speech, humans have a strange way of mak-
make this scale reliable. ing it work for the worse aspects of humankind.
Whether it is the threatening letter, the abusive
2.4. Network Politics and the phone call, text or tweet, humans are always
TIWWCHNT Potential Grid ready to abuse others. It is therefore imperative
that ways are found so that everyone is able to
The role of the TIWWCHNT-20 in preventing exercise free speech to express their grievances,
conflict in online discussion groups that discuss without harming others in the process.
politics could be an increasing one for ensur- It is therefore necessary to introduce a con-
ing the effective implementation of ‘network cept of ‘TISWCHNT Potential.’ The acronym
politics.’The emerging field of network politics TISWWCHNT means, as stated earlier, ‘This Is
has come about for a number of reasons ac- Why We Can’t Have Nice Things’. A Website’s
cording to (Solo & Bishop, 2011). Information TISWWCHNT Potential therefore is the extent
technology and communication networks have to which the design and nature of the website
caused many changes in the realm of politics. is conducive to abusive forms of posting, such
The newest communication network to have a as flame trolling. The outcome of a person’s
great impact on politics is the Internet. Recent scores on the This Is Why We Can’t Have Nice
revolutions in many countries in the Middle East Things Scale (TIWWCHNT-20) could be used
and North Africa have started in large part due to determine which type of online community
to social networking Web sites like Facebook they would most effectively troll in and which
and Twitter. Politicians and candidates use their they should use to avoid trolling. The higher
own Web sites and social networking profiles to their score on a particular factor of the scale, the
get their message out. Equally, the mainstream more suited they are to an online community.
media no longer have a monopoly on political Table 8 Overview of how to read results from
commentary as anybody can set up a blog or the This Is Why We Can’t Be Nice Scale shows
post an article or video online. It is also possible how a high score on a particular part of the scale
for political activists to network together online. can help users determine which communities
It can therefore be seen that information they can avoid the temptation to troll in, and
and communications technologies, especially thus have a reduced TWIWWCHNT Potential,
the Internet has been a vehicle for social change as well as those they can most effectively troll
at all levels. With each technology that enables in, where their TWIWWCHNT is at its greatest.

Copyright © 2014, IGI Global. Copying or distributing in print or electronic forms without written permission of IGI Global is prohibited.
12 International Journal of E-Politics, 5(4), 1-20, October-December 2014

2.5. The Role Of The in a concise and clear way that older and more
TIWWCHNT-20 Scale For Choosing contemporary research has failed to do.
A Web-Based Community Platform The differences between the Snerts and the
Flirts, who conduct ‘snacking’, which would
Depending on the outcome of a batch of found- rely on the ‘Expression’ component of the scale.
ing users of an online community, the appropri- In the case of the former they will be obnox-
ate genre could be chosen to maximise the type ious (as they are in real life) and the Flirts will
of posting that the systems operator (sysop) of give anecdotes to keep the conversation going.
that online community wants to achieve. If one Snacking, which includes ‘infosnacking’ and
considered the 12 types of troller (Bishop, 2008; ‘data-snacking’ is the posting and consumption
Bishop, 2012b; Bishop, 2013c) it is possible to of content in online communities (Jansen &
see how these different types of user may be re- James, 1995; Jansen & James, 2002). Snerts
flective of the various types of attitude reflected are more suited to communities where there
in the TIWWCHNT-20 scale. Even though it is is a negative attitude to politics and politics,
proven that have then they were members of an whereas Flirts will fit into most communities
online community can be more effective than – except those where getting to the point and
have been many, the actors not necessarily cor- staying on topic are important.
respond with the view that an online community The practice of ‘mobiling’ is often carried
should not seek to involve others besides its out by MHBFY Jennies and E-Venger, as can
own members. Social networking services like be seen from Table 9. In the case of the former
Facebook are allowing organisations to create these more emotional posts are based on trying
pages were they can promote the work they to provide empathy and in the case of the lat-
do. Such pages could do far more to increase ter to ‘right wrongs.’ In those political online
the membership of an online community in communities where things can become heated
a productive way and also act as a means of it might be common for some posters to have
recruitment (Bishop, 2010). When people are their accounts deleted. This can result in that
on Facebook they are unlikely to leave it, but person becoming an E-Venger and signing
having a page on Facebook allows a dedicated up under a new alias to cause havoc (Bishop,
online community to build trust in their brand 2013b). The longer a person has been in the
through cooperating with Facebook, even if it community often reflects the intensity of their
is informally. Cooperative advantage, which need for vengeance – especially if they earned
refers to avoiding competing with organisations a lot of kudospoints or had a high post count
in a market and instead working together for (Powazek, 2002). In terms of the MHBFY
mutual benefit (Bishop, 2012a), can allow a Jenny, as can be seen from Table 9, they will
community to grow on a different website one provide help and support to members, including
might want to compete with, but instead make newbies, but this can sometimes be unhelpful or
use of it to promote one’s offerings. innaccurate. Posters who spread misinformation
Table 3 presents an amalgamation of estab- can be called Bzzzters, and MHBFY Jennies
lished research from the end of the 20th century are not the only posters who do this, as Flirts
(Wallace, 1999) and the start of the 21st century and Wizards can do this as well. Even so, the
(Preece, 2000). The findings are still relevant in posts by MHBFY Jennies are often intended to
the second decade of the 21st century, and have be in good faith and empathetic. Bother these
been confirmed by recent studies, including types of users will likely fall into the ‘Under-
research by an acupuncture expert (Hardaker, standing’ component of the TIWWCHNT-20
2013). Many of these types of posting have been scale, as MHFBY Jennies want to understand
defined since the mid 1990s (Jansen & James, other users, whereas E-Vengers want others to
1995), and Table 9 provides a simple way to understand them. Someone with a high score
understand and differentiate the different kinds on this part of the scale is likely to not engage

Copyright © 2014, IGI Global. Copying or distributing in print or electronic forms without written permission of IGI Global is prohibited.
International Journal of E-Politics, 5(4), 1-20, October-December 2014 13

Table 9. Examples of posting types, their descriptions and associations with online discussion
group genres

Pulse type Description of posting Genre to encourage Genre to Examples


(Post type) type posting type discourage
Character posting type
theory
Social Participants who perform Snacking is more Snacking is least Flirt: “Brighton is a good
(Snacking) snacking offer short achievable in achievable in place to learn to ski. That’s
Mostly done bursts of content and communities where communities where I learned, and I think
by Flirts and consume a lot too. It discussion can flow where people they offer a special deal for
Snerts. allows for the posting of and where people are abused or beginners.” (Wallace, 1999)
‘anecdotal evidence’ or are looking for blocked for Snert: “You are a jerk,” “You
other content which is sympathetic points of going off-topic or are stupid” (Hardaker, 2013).
tolerable or acceptable, view. Message boards digressing from
but also the posting of and chat groups are the original post
messages targeting others examples. which is asking
which cause harm to them for an answer and
in some way that is not not empathy.
necessary or proportionate.
Emotional Mobiling is where Mobiling is more Mobiling is MHBFY Jenny: “Most
(Mobiling) participants use emotions achievable in most difficult newbies will not have the
Mostly done to either become closer to communities where to achieve in ability to recognize a troll
by MHBFY others or make a distance communication platforms where post amid all the good advice
Jennies and from them. It allows for is fast so that users can easily posted, or the bad advice
E-Vengers. the posting of passionate grammatical or correct their that is suggested and then
opinions and/or resentment others mistakes can mistakes or delete refuted. Leaving bad (troll)
of target groups like be made and picked embarrassing advise unrefuted *will*
politicians. The risk is that upon. Examples posts. Examples mislead newbies who are
those affiliated with the include Chat Groups, include weblogs diligently trying to educate
target might be offended especially where controlled by the themselves.” (Hardaker,
and start a flame war. length of posts are user or message 2013).
limited. boards with an E-Venger: “Somehow
edit feature. you expect people to be
diplomatic to you when you
have been trolling us. […]
We only reply to your BS to
keep others from thinking
that you might be giving
them useful advice. […] you
can rest assured that someone
is going to call you on it.”
(Hardaker, 2013).
Cognitive Trolling as a more Trolling is most Trolling is least Troll: I love trolling on the
(Trolling) generic pursuit seeks achievable in achievable in horse news groups. It is just
Mostly done to provoke others into communities where communities plain FUNNY. They have
by Trolls posting a response to a it is possible to open to a range gotten used to my trolls. Any
and Big topic, which might be identify particular of materials ideas on a good troll for the
Men. iconoclastic, unpopular or interest groups and and where it is horse people?” (Hardaker,
unfashionable. Can involve post alienating or easy for sysops 2013).
the posting of satirical or opposing comments. to remove Big Man: “bubi: depends
other banter and humour The most effective confrontational what sort of qualifications,
which may be acceptable platforms are those content. experience, intentions, area”
depending on the website where content is (Wallace, 1999)
in question. more permanent such
as message boards
and blogs.

continued on following page

Copyright © 2014, IGI Global. Copying or distributing in print or electronic forms without written permission of IGI Global is prohibited.
14 International Journal of E-Politics, 5(4), 1-20, October-December 2014

Table 9. Continued

Pulse type Description of posting Genre to encourage Genre to Examples


(Post type) type posting type discourage
Character posting type
theory
Physical Flooding is where Flooding is most Flooding its least Ripper: “Jeny doesn’t love
(Flooding) participants get heavily achievable in achievable in me anymore:(“ (Preece,
Mostly involved in posting on communities where communities with 2000).
done by a particular topic (often membership is strong systems Ripper: “I’ve had some tough
Chatroom to multiple websites) to easily achievable for detecting that times in my life” (Wallace,
Bobs and further discussion on a and content goes users are only 1999)
Rippers. topic that might be the unchecked. Examples posting to SEO Chatroom Bob: “Are you
subject of censorship include platforms existing content lonely, solo?” (Wallace,
because those to which offing blogging and or to mass post 1999)
it refers find the ‘truth’ personal homepage specific points of
distasteful or even painful. hosting. view.
Visual Spamming, often Spamming is most Spamming is Iconoclast: “B, explain to
(Spamming) associated with unsolicited achievable in least achievable me exactly how I am being
Mostly mail, is in general the communities which in communities a Troll. I am participating in
done by practices of making give advice or offer where people a ng about horses. Thats all.
Wizards and available information one the chance to post have to use their We are discussing a method
Iconoclasts. has a conflict of interest in their point of view own identities or of horse training that I like
so that it is more accessible as fact. The partial otherwise strong and you don’t. I have stated
to others. advice given could moderation from my original post that
actually be to the facilities exist. I was just playing with this
person’s detriment, method because I was bored.
and is most […] I have not bashed their
achievable on Wikis chosen method of training.”
or message boards (Hardaker, 2013).
where pseudonyms Wizard: “On many gaming
are used. muds, you see server code
trying to handle the task of
intervening before actual
harm is done, and prevent
the antisocial activity from
occurring (eg, the @player
killing siwtch@)” (Wallace,
1999)
Relaxational Lurking is enacted by Lurking is most Lurking is least Lurker: “Since everyone
(Lurking) those on the periphery achievable in achievable thinks I am a troll, I wont
Mostly done of a community. Their communities that in discussion post here anymore. I didn’t
by Lurkers judgements for not taking have kudos points groups where mean to come across the
and Elders part often relate to a lack of other means of one’s actions way I did, and this group
of purpose or control. It secretly influencing are transparent doesn’t mean anything to me
is essential to build on the dynamics of and visible to anyway” (Hardaker, 2013).
the skills and knowledge online discussions. all and where Elder: “What we try to do on
that already exist in the content cannot be uo [Ultima Online] is give
community, for example, accessed by those tools to the players to help
by encouraging networks who do not post. them identify the behaivor
of people who can support THEY don’t like, and then
each other. Designing to give them tools to easily
the community around identify and track repeat
allowing people to both offenders.” (Wallace, 1999)
see what others are up to,
as well as allowing them
to have a break from one
another can build strong
relationships. A ‘do not bite
the newbies’ policy should
be enforced.

Copyright © 2014, IGI Global. Copying or distributing in print or electronic forms without written permission of IGI Global is prohibited.
International Journal of E-Politics, 5(4), 1-20, October-December 2014 15

in flame trolling, but if their comments are not likely to flame troll themselves before deciding
welcomed, they are likely to go back to lurking not to participate.
for a while. Someone with a low score is likely Spamming is normally thought in terms of
to target those who may lack an understanding sending someone an unwanted email to entice
of their point of view, which they feel is under- them into buying a product or service, but in
represented or which has been ignored. terms of online communities it has a broader
The next type of posting – trolling – is meaning (Jansen & James, 1995; Jansen &
more complex than those who rely on grey James, 2002). When Wizards do Spamming it
media such as newspapers might think. Trolling is usualy to share their ideas and generate a lot
when doen by Trolls (as opposed to ‘trolls’) is of content that can be attributed to them. As can
for mischief making and provocation to make be seen from the example in Table 9, a Wizard
others ‘laugh out loud’ (i.e. ‘trolling for the will also provide help and advice on making
lolz’). Another type of trolling is done by a type use of specific tools in a web-based community
of poster called a ‘Big Man.’ This troller type so others can enjoy the experiences of creativ-
takes part in trolling to puff themselves up by ity they did. In terms of Iconoclasts, their type
speaking in an authoritive way to assume the of Spamming is making other aware of their
role as expert on a particular topic (Bishop, ‘truth’ or to challenge the status quo in terms of
2013b; Campbell, Fletcher, & Greenhill, 2009). others’ believes, which can be painful to some
They are often targets of other members of the who would rather not hear it (Bishop, 2013b;
group, especially Snerts, who often feel the Starmer, 2013). Both Wizards and Iconoclasts
Big Men think they are superior to them, even may fall within the ‘Relevance’ part of the TIW-
if they don’t. WCHNT-20 scale. In the case of Wizards (who
Flooding is another type of posting online, have a low score) they will try to create content
which is often provoked when an online com- relevant to the community and in the case of
munity deletes content or gives opportunities Iconoclasts (who have a high score) they will
for content to be created, is the extensive post- try to remove content they find irrelevant, or
ing of content to a person or website (Jansen which is contrary to their point of view.
& James, 1995; Jansen & James, 2002). In Lurking is generally thought of in terms of
terms of ‘chatroom bobs,’ if someone denies a non-participation and perepherial participation
person a right to free speech they will ensure (Bishop, 2007b; Nonnecke & Preece, 2000a;
that free speech is widely available (by flood- Nonnecke & Preece, 2000b; Nonnecke & Pre-
ing the Internet). Chatroom bobs can also do a ece, 2003). As can be seen from Table 9, it is
different type of flooding – where they flood more complex than that because lurking is not
a particular user with compliments and other just done by Lurkers who don’t post, but also
favourable gestures in order to seduce them and by Elders who have made a lot of contributions.
take advantage of them (Bishop, 2012c). When Both of these types of troller look for the op-
flooding is done by another type of troller called portune moment to post a message. In terms
a Ripper, it is flooding one or more online com- of a Lurker it takes a long time for them to get
munities with ‘sob stories’ in order to try to get the confidence to post. Sometimes if they do
sympathy for whatever they are using to seek post and get a bad reaction Lurkers will return
attention. Chatroom bobs and Rippers be best to perepherial participation as there is usually
recognised through the Opportunity component something keeping them there (Bishop, 2007b;
of the TIWWCHNT-20 scale. The former are Preece et al., 2004). Elders know the rules
more likely to be at the low end of this part and norms of an online community and can
of the scale as their posts are only relevant to be helping in encouraging Lurkers to become
achieving their own aims regardless of others’ posters (Bishop, 2007b; Kim, 2000). If they
interests. The latter are more likely to fit into are out-bound from the community, however.
a high score part of this component as they are They can be problemating by posting content

Copyright © 2014, IGI Global. Copying or distributing in print or electronic forms without written permission of IGI Global is prohibited.
16 International Journal of E-Politics, 5(4), 1-20, October-December 2014

to wind up the newer members as a kind of the paper has shown how those who control
initiation called ‘trolling for newbies.’ The part online communities, whom are called sysops
of the TIWWCHNT-20 scale relevant to these (i.e. systems operators), can attract the types of
trollers is Choice. A low score reflects lurking, poster they want – whether they have a negative
where the user thinks by choosing not post attitude about politics and politics, or whether
they are less likely to be abused or otherwise they want positive and constructive debate.
not have their posts welcomed (Preece et al., The paper discussed the different types of
2004). Elders on the other hand are also driven post that can be made to an online community
by Choice and a higher score on this part of the and the types of user that are more likely to
scale suggest they will be more likely to flame post that type of message. This can help sysops
troll newbies. An overview of these different manage the types of posts they want to encour-
types of posting, and their connection with the age members to post while assisting them in
types of discussion group genre are presented ensuring the types of users who are unwelcome
in Table 9. in the community can be identified and blocked
from access.

3. DISCUSSION 3.1. Limitations And Directions


For Future Research
The posting of messages on the Internet that
are Satirical, or iconoclastic, or rude comment, Case law in the UK says that a message is only
the expression of unpopular or unfashionable grossly offensive if the recipient is likely to be
opinion about serious or trivial matters, banter offended (DPP v Connolly). Other case law has
or humour, even if distasteful to some or painful said if the group to which a message refers is
to those subjected to it should and no doubt will likely to be grossly offended then the message is
continue at their customary level the UK case illegal (DPP v Collins). This poses a challenge
of DPP v Connolly found. We must therefore for those communities which might want to use
accept that after 200,000 years of existence the TIWWCHNT-20 scale to attract users who
that if the human race has not changed about post transgressive or subversive messages that
their acceptance of those who happen to be target particular groups, such as on the grounds
different from them, they are unlikely to ever of race. Whilst the community members might
change without forcing the evolution of our want to ensure that the only members who join
brains, or more practicably, by changing our en- are unlikely to be offended within the meaning
vironment to promote constructive behaviours of DPP v Connolly, they risk posting unlaw-
over destructive ones. Changing the law so in ful messages under DPP v Collins in relation
the words of victims of Internet abuse things to those who are not in the community whom
“never happens again” is naïve to say the least, might be offended.
especially as most flame trolling offences are If one were to look at the legal situation in
illegal in the UK and other countries through Great Britain around Internet trolling, it might
dedicated or generic laws on harassment or be possible to see how the TIWWCHNT-20
public order. questionnaire could be used to justify the ex-
This paper has shown that the type of online istences of websites that would offend those
discussion group genre (i.e. the platform) can for whom they were not intended. A number of
have a significant effect on the types of con- precedents have been set on Internet trolling that
tribution made to them. The paper proposes a raises questions about when a website’s content
scale for predicting the types of contributions a should be considered free speech and when it
specific troller is likely to post called the ‘This should be considered “grossly offensive.”
Is Why We can’t Have Nice Things Scale’ The case of DPP v Connolly, for instance,
(TIWWCHNT-20). Putting the two together found that a message is only grossly offensive

Copyright © 2014, IGI Global. Copying or distributing in print or electronic forms without written permission of IGI Global is prohibited.
International Journal of E-Politics, 5(4), 1-20, October-December 2014 17

if the recipients to whom it was targeted would Barber, B. R. (2004). Strong democracy: Participa-
find it to be grossly offensive. A community tory politics for a new age. California, USA: Uni-
versity of California Press.
where users high on Relevant are likely to oc-
cupy are likely to offend people who score high Barlow, A. (2007). The rise of the blogosphere.
on Expression. For instance, on the Urban75. Praeger Publishers.
net website, its sysop Mike Slocombe called Bishop, J. (2007a). Ecological cognition: A new dy-
the London Mayor the T-word because of how namic for human-computer interaction. In B. Wallace,
the crowd at the London Olympics found him A. Ross, J. Davies, & T. Anderson (Eds.), The mind,
endearing. One might therefore ask whether it the body and the world: Psychology after cognitivism
would be possible for the police to take action (pp. 327–345). Exeter: Imprint Academic.
against websites like this if it could be made clear Bishop, J. (2007b). Increasing participation in online
to visitors of the website that there is likely to communities: A framework for human–computer
be a high amount of flame trolling, which some interaction. Computers in Human Behavior, 23(4),
1881–1893. doi:10.1016/j.chb.2005.11.004
people might find offensive. It might seem a bit
much to the reasonable person for websites to Bishop, J. (2008). Increasing capital revenue in
be closed simply because others find the content social networking communities: Building social
offensive, if that website is dedicated to being and economic relationships through avatars and
characters. In C. Romm-Livermore & K. Setzekorn
offensive, such as the website ‘Sickipedia’. (Eds.), Social networking communities and eDating
Equally, a general website that is open to all services: Concepts and implications (). Hershey, PA:
persons, might be found to be breaching decency IGI Global. doi:10.4018/978-1-60566-104-9.ch004
if it is not possible for users to be pre-warned.
Bishop, J. (2010). Increasing the economic sustain-
ability of online communities: An empirical inves-
tigation. In M. F. Hindsworth & T. B. Lang (Eds.),
ACKNOWLEDGMENT Community participation and empowerment (p. 349).
New York, NY: Nova Science Publishers.
The author would like to anowledge all those
that provided advice and guidance on this paper, Bishop, J. (2011a). All’s WELL that ends WELL:
A comparative analysis of the constitutional and
in particular Hugh Preston who supervised the administrative frameworks of cyberspace and the
factor analysis component of this study, which united kingdom. In A. Dudley-Sponaugle & J.
formed part of the MScEcon in Information Braman (Eds.), Investigating cyber law and cyber
Systems at Aberystwyth University (Bishop, ethics: Issues, impacts and practices (). Hershey, PA:
2011b). The author would also like to aknowl- IGI Global. doi:10.4018/978-1-61350-132-0.ch012
ege the contributions of (Couldry et al., 2007), Bishop, J. (2011b). The equatrics of intergenera-
who collected the data and made it available tional knowledge transformation in techno-cultures:
for analysis. Towards a model for enhancing information man-
agement in virtual worlds. Unpublished MScEcon.
Aberystwyth, UK: Aberystwyth University.

REFERENCES Bishop, J. (2011c). Transforming lurkers into posters:


The role of the participation continuum. Proceedings
Agnew, J. A. (1990). From political methodology of the Fourth International Conference on Internet
to geographical social theory? A critical review Technologies and Applications (ITA11), Glyndwr
of electoral geography, 1960–87. Developments University.
in electoral geography (pp. 15–38). London, UK: Bishop, J. (2012a). Lessons from the emotivate
Routledge. project for increasing take-up of big society and
Andersen, K. (2002). Political parties and civil responsible capitalism initiatives. In P. M. Pumilia-
society: Learning from the american case. Demo- Gnarini, E. Favaron, E. Pacetti, J. Bishop, & L.
cratic institution performance: Research and policy Guerra (Eds.), Didactic strategies and technologies
perspectives (pp. 15–26). Abingdon, UK: Greenwood for education: Incorporating advancements (pp.
Publishing Group. 208–217). Hershey, PA: IGI Global. doi:10.4018/978-
1-4666-2122-0.ch019

Copyright © 2014, IGI Global. Copying or distributing in print or electronic forms without written permission of IGI Global is prohibited.
18 International Journal of E-Politics, 5(4), 1-20, October-December 2014

Bishop, J. (2012b). Scope and limitations in the Couldry, N., Markham, T., & Livingstone, S. (2007).
government of wales act 2006 for tackling internet Media consumption and the future of public connec-
abuses in the form of ‘Flame trolling’. Statute Law tion (2004-2005) (SN: 5631 ed.). Colchester, GB:
Review, 33(2), 207–216. doi:10.1093/slr/hms016 UK Data Archive.
Bishop, J. (2012c). Taming the chatroom bob: The DeVellis, R. F. (2003). Scale development: Theory
role of brain-computer interfaces that manipulate and applications. London, UK: Sage.
prefrontal cortex optimization for increasing par-
ticipation of victims of traumatic sex and other Edmonds, G., & Gray, D. (2002). Internet dictionary.
abuse online. Proceedings of the 13th International London, GB: Dorling Kinderslet Limited.
Conference on Bioinformatics and Computational Eisenhardt, K. M. (1989). Building theory from case
Biology (BIOCOMP’12), USA. study research. Academy of Management Review,
Bishop, J. (2013a). The effect of deindividuation of 14(4), 532–550.
the internet troller on criminal procedure implementa- Field, A. (2005). Discovering statistics using SPSS
tion: An interview with a hater. International Journal (introducing statistical methods series) (Second Edi-
of Cyber Criminology, 7(1), 28–48. tion (CD-ROM) ed.) Sage Publications Ltd.
Bishop, J. (2013b). Increasing capital revenue in Goldring, E. B., & Shapira, R. (1993). Choice, em-
social networking communities: Building social and powerment, and involvement: What satisfies parents?
economic relationships through avatars and char- Educational Evaluation and Policy Analysis, 15(4),
acters. In J. Bishop (Ed.), Examining the concepts, 396–409. doi:10.3102/01623737015004396
issues, and implications of internet trolling (pp.
44–61). Hershey, PA: IGI Global. doi:10.4018/978- Gorsuch, R. L. (1983). Factor analysis. New York:
1-4666-2803-8.ch005 Lawrence Erlbaum Associates.
Bishop, J. (2014). Representations of ‘trolls’ in mass Grikscheit, G. M., Cash, H. C., & Young, C. E. (1993).
media communication: A review of media-texts The handbook of selling: Psychological, managerial,
and moral panics relating to ‘Internet trolling.’. and marketing dynamics. Wiley.
International Journal of Web Based Communities,
Bishop, J. (2013c). The psychology of trolling and Hair, J. F., Black, W. C., Babin, B. J., Anderson, R.
lurking: The role of defriending and gamification for E., & Tathan, R. L. (2006). Multivariate data analy-
increasing participation in online communities using sis. Upper Saddle River, NJ: Pearson Prentice Hall.
seductive narratives. In J. Bishop (Ed.), Examining
the concepts, issues and implications of internet Hankin, H. (2005). The new workforce: Five sweep-
trolling (pp. 106-123). Hershey, PA: IGI Global. ing trends that will shape your company’s future.
AMACOM Div American Mgmt Assn.
Bolin, G. (2009). Mobile generations: The role of
mobile technology in the shaping of swedish media Hardaker, C. (2013). Uh.... not to be nitpicky, but...
generations. International Journal of Communica- the past tense of drag is dragged, not drug.”: An
tion, 2, 108–124. overview of trolling strategies. Journal of Language
Aggression and Conflict, 1(1), 57–85. doi:10.1075/
Bryde, D., & Pelie, D. (2006). The impact of project jlac.1.1.04har
management practices and project sponsorship on
project performance. In M. Khosrow-Pour (Ed.), Hinton, P. R., Brownlow, C., McMurray, I., & Cozens,
Emerging trends and challenges in information B. (2004). SPSS explained. London, UK: Routledge.
technology management (pp. 122–126). Hershey, Innes, S., & Rendall, J. (2006). Women, gender
PA: IGI Global. and politics. Gender in scottish history since
Campbell, J., Fletcher, G., & Greenhill, A. (2009). 1700: Since 1700 (p. 43). Edinburgh, UK:
Conflict and identity shape shifting in an online finan- Edinburgh University Press. doi:10.3366/edin-
cial community. Information Systems Journal, 19(5), burgh/9780748617609.003.0003
461–478. doi:10.1111/j.1365-2575.2008.00301.x Jansen, E., & James, V. (1995). NetLingo: The internet
Chapman, R. G., & Palda, K. S. (1983). Electoral dictionary. Oxnard, CA: Netlingo Inc.
turnout in rational voting and consumption perspec- Jansen, E., & James, V. (2002). NetLingo: The internet
tives. The Journal of Consumer Research, 9(4), dictionary. Oxnard, CA: Netlingo Inc.
337–346. doi:10.1086/208928

Copyright © 2014, IGI Global. Copying or distributing in print or electronic forms without written permission of IGI Global is prohibited.
International Journal of E-Politics, 5(4), 1-20, October-December 2014 19

Johnston, C. B. (1998). Global news access: The Powazek, D. M. (2002). Design for community:
impact of new communications technologies. Abing- The art of connecting real people in virtual places.
don, UK: Greenwood. New Riders.
Kim, A. J. (2000). Community building on the web: Preece, J. (2000). Online communities: Designing
Secret strategies for successful online communities. usability, supporting sociability. Chichester, GB:
Berkeley: Peachpit Press. John Wiley & Sons.
Kouzes, J. M., & Posner, B. Z. (1987). The leadership Preece, J., Nonnecke, B., & Andrews, D. (2004).
challenge: How to get extraordinary things done in The top 5 reasons for lurking: Improving community
organizations. Jossey-Bass San Francisco. experiences for everyone. Computers in Human
Behavior, 2(1), 42.
Lehr, W. H. (2009). The role of unlicensed in spectrum
reform. In W. H. Lehr & L. M. Pupillo (Eds.), Internet Salwen, M., & Stacks, D. W. (2008). An integrated
policy and economics (pp. 169–180). London, UK: approach to communication theory and research.
Springer. doi:10.1007/b104899_11 Routledge.
Mantovani, G. (1996). New communication environ- Solo, A. M. G., & Bishop, J. (2011). The new field of
ments: From everyday to virtual. London: Taylor network politics. Paper presented at the Proceedings
& Francis. of the 2011 World Congress in Computer Science,
Computer Engineering, and Applied Computing
Nonnecke, B., & Preece, J. (2000a). Lurker de- (WORLDCOMP’11).
mographics: Counting the silent. Paper presented
at the Proceedings of the SIGCHI Conference on Starmer, K. (2013). Guidelines on prosecuting cases
Human Factors in Computing Systems, pp. 73-80. involving communications sent via social media.
doi:10.1145/332040.332409 London, GB: Crown Prosecution Service.
Nonnecke, B., & Preece, J. (2000b). Persistence Taylor, R. L., Rosenbach, W. E., & Rosenbach, E. B.
and lurkers in discussion lists: A pilot study. Paper (2009). Military leadership: In pursuit of excellence.
presented at the Proceedings of HICSS, pp. 3031. Westview Press.
doi:10.1109/HICSS.2000.926714
Van Dijk, J. A. G. M. (1999). The network society:
Nonnecke, B., & Preece, J. (2003). Silent partici- Social aspects of new media (1st ed.). London, GB:
pants: Getting to know lurkers better. From Usenet Sage Publications Ltd.
to CoWebs: Interacting with Social Information
Spaces,, 110-132. Van Dijk, J. A. G. M. (2005). The network society:
Social aspects of new media (2nd ed.). London, GB:
Nonnecke, B., Preece, J., & Andrews, D. (2004). What Sage Publications Ltd.
lurkers and posters think of each other. System Sci-
ences, 2004. Proceedings of the 37th Annual Hawaii Wallace, P. M. (1999). The psychology of the in-
International Conference On, pp. 9 pp. ternet. Cambridge University Press. doi:10.1017/
CBO9780511581670
Norton, B. (1999). Ecology and opportunity: Inter-
generational equity and sustainable options. Fairness Walter, T., Hourizi, R., Moncur, W., & Pitsillides,
and Futurity: Essays on Environmental Sustainability S. (2011). Does the internet change how we die and
and Social Justice,, 118–50. mourn? an overview. Omega, 64(4), 12. doi:10.2190/
OM.64.4.a PMID:22530294
Pett, M. A., Lackey, N. R., & Sullivan, J. J. (2003).
Making sense of factor analysis: The use of factor Young, M. L., & Levine, J. R. (2000). Poor rich-
analysis for instrument development in health care ard’s building online communities: Create a web
research. London, UK: Sage Publications. community for your business, club, association, or
family. Top Floor Pub.
Polkinghorne, J. C. (2000). Faith, science, and
understanding. Yale Univ Pr.

Copyright © 2014, IGI Global. Copying or distributing in print or electronic forms without written permission of IGI Global is prohibited.
20 International Journal of E-Politics, 5(4), 1-20, October-December 2014

Jonathan Bishop is an information technology executive, researcher and writer. He is the founder of the
companies that form part of the Crocels Community Media Group, and founded the Centre for Research
into Online Communities and E-Learning Systems in 2005 from which the group is named. Jonathan’s
research generally falls within human-computer interaction, and he has numerous publications in this
area, such as on Internet trolling, gamification, Classroom 2.0, and multimedia forensics. In addition to
his BSc(Hons) in Multimedia Studies and various postgraduate degrees, including in law, economics and
computing, Jonathan has served in local government as a councillor and school governor, as well as hav-
ing contested numerous elections. He is also a fellow of numerous learned bodies, including BCS - The
Chartered Institute for IT, the Royal Anthropological Institute, and the Royal Society of Arts. Jonathan has
won prizes for his literary skills and been a finalist in national and local competitions for his environmental,
community and equality work, which often form part of action research studies. In his spare time Jonathan
enjoys listening to music, swimming and chess.

Copyright © 2014, IGI Global. Copying or distributing in print or electronic forms without written permission of IGI Global is prohibited.

You might also like