Advertisement

From Vigilantism to Digilantism?

  • Frauke ReichlEmail author
Chapter
Part of the Security Informatics and Law Enforcement book series (SILE)

Abstract

Citizens have always taken justice “into their own hands”. Yet social media make this even easier, as misbehaviour can become not only more visible, they can also be punished more easily. This phenomenon, known from the offline world as vigilantism, is often referred to as digital vigilantism or digilantism. Using well known cases as examples, this chapter illustrates how social media create new forms and new practices of vigilantism. It further presents and reviews theoretical frameworks for vigilantism and their application to the online arena. Overall, it aims to answer the question whether there is an actual qualitative shift from vigilantism to digilantism or whether the new forms are rather conventional vigilantism through new means.

Keywords

Vigilantism Digilantism Citizen justice Boston marathon bombings Vancouver riots Amanda Todd Case example 

References

  1. Abrahams, R. (1998). Vigilant citizens: Vigilantism and the state. Cambridge: Polity Press.Google Scholar
  2. Arfsten, K.-S. (2012). “Every man is entitled to defend his castle…” - Vigilantismus während der London Riots. Kriminologisches Journal, 44(2), 101–117.Google Scholar
  3. Bork, H. (2008, April 19). Vorolympische Hexenjagd auf selbstkritische Chinesen. Tagesanzeiger. Retrieved November 30, 2017, from https://archive.is/20121015171253/http:/sc.tagesanzeiger.ch/dyn/news/zuerich/863350.html
  4. Branigan, T. (2008, November 5). Chinese official sacked over attack on girl, 11. The Guardian. Retrieved November 30, 2017, from https://www.theguardian.com/world/2008/nov/05/china-lin-xiaxiang-communist-party.
  5. Breitenbach, P. (2015). Netiquette: Auf der Suche nach einer digitalen Etiquette. In C. Stiegler, P. Breitenbach, & T. Zorbach (Eds.), New media culture: Mediale phänomene der netzkultur. Digitale gesellschaft (Vol. 5, 1st ed., pp. 143–162). Bielefeld: Transcript.Google Scholar
  6. Brown, R. M. (1975). Strain of violence: Historical studies of American violence and vigilantism. New York: Oxford University Press.Google Scholar
  7. Burrows, W. E. (1977). Vigilante! New York: Harcourt Brace Jovanovich.Google Scholar
  8. CBC News. (2012, October 16). Amanda Todd’s alleged tormentor named by hacker group. CBC News Online. Retrieved October 23, 2017, from http://www.cbc.ca/news/canada/british-columbia/amanda-todd-s-alleged-tormentor-named-by-hacker-group-1.1134233.
  9. Chavez, L. R. (2005). Spectacle in the desert: The minuteman project on the US-Mexico border. In D. Pratten & A. Sen (Eds.), Global vigilantes (pp. 25–46). New York: Columbia University Press.Google Scholar
  10. Chen, A. (2013, April 17). Your guide to the Boston Marathon bombing amateur internet crowd-sleuthing. gawker.com. Retrieved from http://gawker.com/5994892/your-guide-to-the-boston-marathon-bombing-amateur-internet-crowd-sleuthing
  11. Cheong, P. H., & Gong, J. (2010). Cyber vigilantism, transmedia collective intelligence, and civic participation. Chinese Journal of Communication, 3(4), 471–487.CrossRefGoogle Scholar
  12. Cheung, S. A. (2009). China internet going wild: Cyber-hunting versus privacy protection. Computer Law & Security Review, 25(3), 275–279.CrossRefGoogle Scholar
  13. CNN Library. (2017, March 29). Boston Marathon terror attack fast facts. CNN. Retrieved October 25, 2017, from http://edition.cnn.com/2013/06/03/us/boston-marathon-terror-attack-fast-facts/index.html.
  14. Culberson, W. C. (1990). Vigilantism: Political history of private power in America: Contributions in criminology & penology. New York: Greenwood Press.Google Scholar
  15. Davison, J. (2012, October 22). Online vigilantes: Is ‘doxing’ a neighbourhood watch or dangerous witch hunt? CBC News Online. Retrieved October 27, 2017, from http://www.cbc.ca/news/technology/online-vigilantes-is-doxing-a-neighbourhood-watch-or-dangerous-witch-hunt-1.1132015.
  16. Dennis, K. (2008). Keeping a close watch—The rise of self-surveillance and the threat of digital exposure. The Sociological Review, 56(3), 347–357.CrossRefGoogle Scholar
  17. Halberschmidt, T. (2014, October 3). Entstehung eines Shitstorms: Warum die Medien eine Mitschuld haben. Handelsblatt. Retrieved January 12, 2018, from http://www.handelsblatt.com/panorama/aus-aller-welt/entstehung-eines-shitstorms-warum-die-medien-eine-mitschuld-haben/10778756.html.
  18. Hansen, C. (2006, October 26). They’re still showing up. NBC News. Retrieved December 29, 2017, from http://www.nbcnews.com/id/14824427/ns/dateline_nbc/t/theyre-still-showing/#.WkYKL9_ibZt.
  19. Hatten, C. (2014, January 28). China’s internet vigilantes and the ‘human flesh search engine’. BBC News. Retrieved November 30, 2017, from http://www.bbc.com/news/magazine-25913472
  20. Hill, C. (2017). How digital communities cope: Cyber-vigilantism following the Boston Marathon bombings. The Yale Review of International Studies, 7(2), 5–11.Google Scholar
  21. Hitzler, R. (1994). Die neuen Vigilanten: über Formen der Bewältigung alltäglicher Verunsicherung. Bürgerrechte & Polizei, 48(2), 67–71.Google Scholar
  22. Huey, L., Nhan, J., & Broll, R. (2012). ‘Uppity civilians’ and ‘cyber-vigilantes’: The role of the general public in policing cyber-crime. Criminology & Criminal Justice, 13(1), 81–97.CrossRefGoogle Scholar
  23. Jane, E. (2016a, April 11). DIY internet justice is a symptom, not a solution to online misogyny. The Sydney Morning Herald. Retrieved November 30, 2017, from http://www.smh.com.au/lifestyle/news-and-views/opinion/diy-internet-justice-is-a-symptom-not-a-solution-to-online-misogyny-20160410-go2z6z.html.
  24. Jane, E. (2016b, July 14). Stopping online abuse isn’t censorship it’s the least we can do. The Sydney Morning Herald. Retrieved November 30, 2017, from http://www.smh.com.au/comment/stopping-online-abuse-isnt-censorship-its-the-least-we-can-do-20160713-gq4oj5.html-can-do-20160713-gq4oj5.
  25. Kang, J. C. (2013, July 25). Should Reddit be blamed for the spreading of a smear? New York Times Magazine. Retrieved October 26, 2017, from http://www.nytimes.com/2013/07/28/magazine/should-reddit-be-blamed-for-the-spreading-of-a-smear.html.
  26. Kembrey, M. (2016, July 30). Sydney labourer Zane Alchin sentenced for harassing women on Facebook. The Sydney Morning Herald. Retrieved November 30, 2017, from http://www.smh.com.au/nsw/sydney-man-zane-alchin-sentenced-for-harassing-women-on-facebook-20160728-gqg8l8.html.
  27. Knowyourmeme.com. (2005). Dog poo girl. Retrieved October 23, 2017, from http://knowyourmeme.com/memes/dog-poo-girl.
  28. Kowalewski, D. (2003). Vigilantism. In W. Heitmeyer & J. Hagan (Eds.), International handbook of violence research (pp. 339–349). Dordrecht: Kluwer Academic Publishers.CrossRefGoogle Scholar
  29. Krim, J. (2005, July 7). Subway fracas escalates into test of the internet’s power to shame. Washington Post. Retrieved October 23, 2017, from http://www.washingtonpost.com/wp-dyn/content/article/2005/07/06/AR2005070601953.html?referrer=emailarticle.
  30. Lee, J. (2011, September 1). Police, city poorly prepared for vancouver stanley cup riot, says report. Vancouver Sun. Retrieved October 26, 2017, from http://www.vancouversun.com/news/Police+city+poorly+prepared+Stanley+riot+Report/5341286/story.html.
  31. Marx, G. T. (2013). The public as a partner? Technology can make us auxiliaries as well as vigilantes. IEEE Security & Privacy, 11(5), 56–61.CrossRefGoogle Scholar
  32. Ngak, C. (2013, April 17). Crowdsourcing or witch hunt? Reddit, 4chan users try to ID Boston bomb suspects. cnet. Retrieved October 26, 2017, from https://www.cnet.com/news/crowdsourcing-or-witch-hunt-reddit-4chan-users-try-to-id-boston-bomb-suspects/.
  33. Nhan, J., Huey, L., & Broll, R. (2017). Digilantism: An analysis of crowdsourcing and the Boston Marathon bombings. British Journal of Criminology, 57(2), 341–361.Google Scholar
  34. Nichols, J. (2013, September 5). ‘Occupy Paedophilia,’ Russian anti-gay group, ‘on safari’ hunting gays (VIDEO). The Huffington Post. Retrieved December 29, 2017, from https://www.huffingtonpost.com/2013/09/05/occupy-paedophilia-hunting-gays-russia_n_3875223.html.
  35. Patalong, F. (2009, September 14). Anonymer Angriff aus dem web. Spiegel Online. http://www.spiegel.de/netzwelt/netzpolitik/protestkultur-anonymer-angriff-aus-dem-web-a-648653.html.
  36. Pratten, D., & Sen, A. (Eds.). (2005). Global vigilantes. New York: Columbia University Press.Google Scholar
  37. Rahmanzadeh, S., Leong, J., Riley, S., Leuci, S., & Schwartz, R. (2013, April 18). Teen: I am not the Boston Marathon bomber. abc news. Retrieved October 26, 2017, from http://abcnews.go.com/Blotter/teen-boston-marathon-bomber/story?id=18990057#.UXBs_CtASOv.
  38. Reinbold, F. (2017, June 30). Das Facebook-Gesetz ist erst der Anfang. Spiegel Online. http://www.spiegel.de/netzwelt/netzpolitik/heiko-maas-und-facebook-das-netzdg-ist-erst-der-anfang-die-analyse-a-1155222.html.
  39. Rosenbaum, H. J., & Sederberg, P. C. (Eds.). (1976). Vigilante politics. Philadelphia: University of Pennsylvania Press.Google Scholar
  40. Rütten, F., & Sendker, J. (2017, March 22). Wie ein Cyber-Stalker ein junges Mädchen in den Tod trieb. Stern Online. Retrieved November 24, 2017, from https://www.stern.de/panorama/stern-crime/fall-amanda-todd%2D%2Dwie-ein-cyber-stalker-ein-junges-maedchen-in-den-tod-trieb-7379148.html.
  41. Schmidt, J.-H. (2013). Social media. Wiesbaden: VS Verlag für Sozialwissenschaften.Google Scholar
  42. Schmidt-Lux, T. (2012). Vigilantismus. Ein Phänomen der Grenze? Kriminologisches Journal, 44(2), 118–132.Google Scholar
  43. Schmidt-Lux, T. (2013a). Jenseits von Batman. Schlüsselfiguren des Vigilantismus. Forschungsjournal Soziale Bewegungen, 26(4), 64–71.CrossRefGoogle Scholar
  44. Schmidt-Lux, T. (2013b). Vigilantismus als politische Gewalt. Eine Typologie. BEHEMOTH A Journal on Civilisation, 6(1), 98–117.Google Scholar
  45. Schneider, C. J., & Trottier, D. (2012). The 2011 Vancouver riot and the role of Facebook in crowd-sourced policing: Research note. The British Columbian Quarterly, 175(Autumn), 57–72.Google Scholar
  46. Schütten, S. (2012, October 25). Cybermobbing lässt sich nicht allein im Netz bekämpfen. Zeit Online. Retrieved October 23, 2017, from http://www.zeit.de/digital/internet/2012-10/amanda-todd-anonymous.
  47. Smith, J. (2016, June 20). ‘Slut shamer’, 25, could face three years’ jail after pleading guilty to abusing a woman on Facebook after she quoted drake lyrics on her Tinder profile. Mail Online. Retrieved November 30, 2017, from http://www.dailymail.co.uk/news/article-3649867/Zane-Alchin-faces-jail-abusive-Facebook-comments-raping-feminists-woman-included-explicit-Drake-lyric-Tinder-profile.html.
  48. Solove, D. (2005). Of privacy and poop: Norm enforcement via the blogosphere. Retrieved October 23, 2017, from https://balkin.blogspot.de/2005/06/of-privacy-and-poop-norm-enforcement.html.
  49. Strittmatter, K. (2010, May 11). Die Menschenfleischsuche. Süddeutsche Zeitung. Retrieved November 30, 2017, from http://www.sueddeutsche.de/politik/trainieren-fuer-olympia-die-menschenfleischsuche-1.204850.
  50. Tapia, A. H., LaLone, N., & Kim, H. W. (2014). Run amok: Group crowd participation in identifying the bomb and bomber from the Boston marathon bombing. In ISCRAM 2014 Conference Proceedings - 11th International Conference on Information Systems for Crisis Response and Management (pp. 265–274). The Pennsylvania State University.Google Scholar
  51. Tormsen, D. (2015). 10 stories of China’s human flesh search engines. Listverse.com. Retrieved November 30, 2017, from https://listverse.com/2015/04/22/10-stories-of-chinas-human-flesh-search-engines/.
  52. Trottier, D. (2012). Policing social media. Canadian Review of Sociology, 49(4), 411–426.CrossRefGoogle Scholar
  53. Trottier, D. (2017). Digital vigilantism as weaponisation of visibility. Philosophy & Technology, 30(1), 55–72.CrossRefGoogle Scholar
  54. Vernon, J. (2016, June 20). Zane Alchin pleads guilty to making Facebook threats about Olivia Melville Tinder profile. ABC News. Retrieved November 30, 2017, from http://www.abc.net.au/news/2016-06-20/zane-alchin-pleads-guilty-to-facebook-abuse-of-olivia-melville/7525664.
  55. Wilson, D. (2013, April 22). Letzgo hunting and the dangers of paedophile vigilantism. The Guardian. Retrieved from https://www.theguardian.com/commentisfree/2013/apr/22/paedophile-vigilantism.

Copyright information

© Springer Nature Switzerland AG 2019

Authors and Affiliations

  1. 1.Westfälische Wilhelms-Universität MünsterMünsterGermany

Personalised recommendations