Skip to main content

A Villain’s Guide to Social Media and Interactive Digital Storytelling

  • Conference paper
  • First Online:
Interactive Storytelling (ICIDS 2018)

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 11318))

Included in the following conference series:

Abstract

If we have not yet achieved planetary super-villainy on the desktop, it may be feasible to fit it into a suburban office suite. The familiar perils of fiction and deceit can now be augmented by mass customization, allowing powerful malefactors to shape perceived reality to suit their preferences. Social media permit the modern villain to deploy traditional cruelties to great and surprising effect. Interactive digital storytelling lets us exploit weakness and illness for profit and help us normalize wickedness. Because the impact of villainous techniques is radically asymmetric, our fetid plots are difficult and costly to foil.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    http://www.cbc.ca/news/canada/calgary/jeremy-quaile-knightley-dog-death-calgary-1.4602948.

References

  1. Ammann, R.: Jorn barger, the newspage network and the emergence of the weblog community. In: Proceedings of the 20th ACM Conference on Hypertext and Hypermedia. HT 2009, pp. 279–288 (2009)

    Google Scholar 

  2. Backstrom, L., Dworkin, C., Kleinberg, J.: Wherefore art thou R3579x?: Anonymized social networks, hidden patterns, and structural steganography. Commun. ACM 54(12), 133–141 (2011)

    Article  Google Scholar 

  3. Backstrom, L., Kleinberg, J.: Romantic partnerships and the dispersion of social ties: a network analysis of relationship status on Facebook. In: Proceedings of the 17th ACM Conference on Computer Supported Cooperative Work & Social Computing, CSCW 2014, pp. 831–841 (2014)

    Google Scholar 

  4. Johnson, B.: The Short Life of Kaycee Nicole. The Guardian (2001)

    Google Scholar 

  5. Chen, A.: The Agency. New York Times Mag. (2015)

    Google Scholar 

  6. Clarke, A.C.: The Nine Billion Names of God; the Best Short Stories of Arthur C. Clarke. Harcourt, Brace & World (1967)

    Google Scholar 

  7. Derakhshan, H.: Killing the hyperlink, killing the web: the shift from library-internet to television-internet. In: Proceedings of the 27th ACM Conference on Hypertext and Social Media, HT 2016, p. 3 (2016)

    Google Scholar 

  8. Dick, P.K.: The Minority Report: and Other Classic Stories. Citadel Press (2016)

    Google Scholar 

  9. Dickens, C.: The Adventures of Oliver Twist. Fields, Osgood & Co (1870)

    Google Scholar 

  10. Edwards, M., Peersman, C., Rashid, A.: Scamming the scammers: towards automatic detection of persuasion in advance fee frauds. In: Proceedings of the 26th International Conference on World Wide Web Companion, WWW 2017 Companion, pp. 1291–1299 (2017)

    Google Scholar 

  11. Hamilton, D.: The thinking machine. In: King, L.R., et al. (eds.) Echoes of Sherlock Holmes: Stories Inspired By The Holmes Canon. Pegasus Books (2016)

    Google Scholar 

  12. Hern, A.: Fitness Tracking App Strava Gives Away Location of Secret US Army Bases. The Guardian (2018)

    Google Scholar 

  13. Huang, Q., Singh, V.K., Atrey, P.K.: Cyber bullying detection using social and textual analysis. In: Proceedings of the 3rd International Workshop on Socially-Aware Multimedia, SAM 2014, pp. 3–6 (2014)

    Google Scholar 

  14. Le Carré, J.: Smiley’s People. Knopf (1980)

    Google Scholar 

  15. Rizoiu, M.-A., Xie, L., Caetano, T., Cebrian, M.: Evolution of privacy loss. In: Wikipedia Proceedings of the Ninth ACM International Conference on Web Search and Data Mining, WSDM 2016, pp. 215–224 (2016)

    Google Scholar 

  16. Shelley, M.W.: Frankenstein, or, the Modern Prometheus. Modern Library (1984)

    Google Scholar 

  17. Sofia El Amine, S.B., Saad, S., Tesfa, A., Varin, C.: Infowar in Syria: the web between liberation and repression. Web Science 2012 (2012)

    Google Scholar 

  18. Stross, C.: The Jennifer Morgue. Golden Gryphon Press (2006)

    Google Scholar 

  19. Mueller, R.S.: Indictment: United States of America vs. Viktor Borisovich Netyksho et al., U. S. District Court for the District of Columbia, 13 July 2018

    Google Scholar 

  20. Czege, P.: My Life With Master. Half-Meme Press (2003)

    Google Scholar 

  21. Timberg, C., Harwell, D.: We studied thousands of anonymous posts about the Parkland attack—and found a conspiracy in the making. The Washington Post, 28 February 2018

    Google Scholar 

  22. Reeves, B., Nass, C.: The Media Equation - How People Treat Computers, Television, and New Media Like Real People and Places. Cambridge University Press, Cambridge (1996)

    Google Scholar 

  23. DiFranzo, D., Taylor, S.H., et al.: Upstanding by design: bystander intervention in cyberbullying. In: CHI 18, Montréal, 21–26 April 2018

    Google Scholar 

  24. Brignull, H.: Types of Dark Patterns. https://darkpatterns.org/types-of-dark-pattern

  25. Vosoughi, S., Roy, D., Aral, S.: The spread of true and false news online. Science, 1146–1151 (2018)

    Article  Google Scholar 

  26. Ramachandran, A., Wang, L.: Chaintreau dynamics and prediction of clicks on news from Twitter. In: Sastry, N., Weber, I. (eds.) Proceedings of the 29th on Hypertext and Social Media, HT 2018, pp. 210–214 (2018)

    Google Scholar 

  27. Nagy, G.: A Cretan Odyssey, Part 1. Classical Inquiries Studies on the Ancient World from CHS. https://classical-inquiries.chs.harvard.edu/a-cretan-odyssey-part-1/

  28. Brusilovsky, P., Millán, E.: User models for adaptive hypermedia and adaptive educational systems. In: Brusilovsky, P., Kobsa, A., Nejdl, W. (eds.) The Adaptive Web. LNCS, vol. 4321, pp. 3–53. Springer, Heidelberg (2007). https://doi.org/10.1007/978-3-540-72079-9_1

    Chapter  Google Scholar 

  29. Stephens-Davidowitz, S.: Everybody Lies: Big Data, New Data, and What the Internet Can Tell Us About Who We Really Are. Dey St., An Imprint of William Morrow, New York (2017)

    Google Scholar 

  30. Aletras, N., Chamberlain, B.P.: Predicting Twitter user socioeconomic attributes with network and language information. In: Proceedings of the 29th on Hypertext and Social Media, HT 2018, pp. 20–24 (2018)

    Google Scholar 

  31. Khazaei, T., Xiao, L., Mercer, R.E., Khan, A.: Understanding privacy dichotomy in Twitter. In: Proceedings of the 29th on Hypertext and Social Media, HT 2018, pp. 156–164 (2018)

    Google Scholar 

  32. Goodman, A.: The Chalk Artist: A Novel. The Dial Press, New York (2017)

    Google Scholar 

  33. Soroush, M., Hancock, M., Bohns, V.K.: Self-control in casual games: the relationship between candy crush saga; players’ in-app purchases and self-control. In: IEEE Games Media Entertainment, pp. 1–6 (2014)

    Google Scholar 

  34. Mazetti, M., Benner, K.: 12 Russian agents indicted in Mueller investigation. The New York Times, 13 July 2018. https://www.nytimes.com/2018/07/13/us/politics/mueller-indictment-russian-intelligence-hacking.html

  35. Eagleton, T.: After Theory. Basic Books, New York (2003)

    Google Scholar 

  36. Murray, J.: Hamlet on the Holodeck: The Future of Narrative in Cyberspace. The Free Press, New York (1997)

    Google Scholar 

  37. Bernstein, M.: As we may hear: our slaves of steel. In: Proceedings of the 29th ACM Conference on Hypertext and Social Media, HT 2018, pp. 242–245 (2018)

    Google Scholar 

  38. Arakelyan, S., Morstatter, F., Martin, M., Ferrara, E., Galstyan, A.: Mining and forecasting career trajectories of music artists. In: Proceedings of the 29th ACM Conference on Hypertext and Social Media, HT 2018, pp. 11–19 (2018)

    Google Scholar 

  39. Zhao, B.Y.: Insecure machine learning systems and their impact on the web. In: Proceedings of the 29th on Hypertext and Social Media (HT 2018), p. 63. ACM, New York (2018). https://doi.org/10.1145/3209542.3209544

  40. Wang, B., Yao, Y., Viswanath, B., Zheng, H., Zhao, B.Y.: With great training comes great vulnerability: practical attacks against transfer learning. In: 27th {USENIX} Security Symposium ({USENIX} Security 18). USENIX Association, August 2018

    Google Scholar 

  41. Baeza-Yates, R.: Bias on the web. Commun. ACM 61(6), 54–61 (2018)

    Article  Google Scholar 

  42. Lazer, D.M.J., et al.: The science of fake news. Science 359(6380), 1094–1096 (2018)

    Article  Google Scholar 

  43. McCurry, J.: Japanese blogger stabbed to death after internet abuse seminar. The guardian, 26 June 2018. https://www.theguardian.com/world/2018/jun/26/japanese-blogger-kenichiro-okamoto-stabbed-to-death-after-internet-abuse-seminar

  44. Jason, Z.: Game of fear. Boston Mag. (2015). https://www.bostonmagazine.com/news/2015/04/28/gamergate/

  45. Feinberg, A.: The alt-right can’t disown charlottesville. Wired, 13 August 2017. https://www.wired.com/story/alt-right-charlottesville-reddit-4chan/

  46. Orwell, G.: Politics and the English Languages. Horizon 13(76) (1946)

    Google Scholar 

  47. Flanagan, C.: I believe her. The Atlantic Monthly, 17 September 2018. https://www.theatlantic.com/ideas/archive/2018/09/me-too/570520/

Download references

Acknowledgments

This is a satire. Don’t try this at home. The works cited here are not villainous. We thank David E. Millard, Charlie Hargood, Dr. Fionnbar Lenihan and Robert A. Sullivan for helpful conversations on related topics. Of course, none of them are in any way responsible for this villainous paper.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Mark Bernstein .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Bernstein, M., Hooper, C. (2018). A Villain’s Guide to Social Media and Interactive Digital Storytelling. In: Rouse, R., Koenitz, H., Haahr, M. (eds) Interactive Storytelling. ICIDS 2018. Lecture Notes in Computer Science(), vol 11318. Springer, Cham. https://doi.org/10.1007/978-3-030-04028-4_4

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-04028-4_4

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-04027-7

  • Online ISBN: 978-3-030-04028-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics