skip to main content
10.1145/3209542.3210576acmconferencesArticle/Chapter ViewAbstractPublication PageshtConference Proceedingsconference-collections
research-article

A Villain's Guide To Social Media And Web Science

Published:03 July 2018Publication History

ABSTRACT

If we have not yet achieved planetary super-villainy on the desktop, it may be feasible to fit it into a suburban office suite. Social media and Web science permit the modern villain to deploy traditional cruelties to great and surprising effect. Because the impact of villainous techniques is radically asymmetric, our fetid plots are difficult and costly to foil.

References

  1. Ammann, R. 2009. "Jorn Barger, The Newspage Network And The Emergence Of The Weblog Community," Proceedings Of The 20th ACM Conference On Hypertext And Hypermedia". HT '09. 279--288. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. Backstrom, L., Dworkin, C., and Kleinberg, J. 2011. 'Wherefore Art Thou R3579x': Anonymized Social Networks, Hidden Patterns, And Structural Steganography". Commun. ACM. 54, 12, 133--141. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. Backstrom, L. And Kleinberg, J. 2014. "Romantic Partnerships And The Dispersion Of Social Ties: A Network Analysis Of Relationship Status On Facebook Proceedings Of The 17th Acm Conference On Computer Supported Cooperative Work & Social Computing". CSCW '14. 831--841. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. Johnson, B. 2001. "The Short Life Of Kaycee Nicole". The Guardian.Google ScholarGoogle Scholar
  5. Chen, A. 2015. "The Agency". New York Times Magazine.Google ScholarGoogle Scholar
  6. Clarke, A. C. 1967 The Nine Billion Names Of God; The Best Short Stories Of Arthur C. Clarke. Harcourt, Brace & World.Google ScholarGoogle Scholar
  7. Derakhshan, H. 2016. "Killing The Hyperlink, Killing The Web: The Shift From Library-Internet To Television-Internet Proceedings Of The 27th Acm Conference On Hypertext And Social Media". HT "16. 3--3. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. Dick, P. K. 2016 The Minority Report : And Other Classic Stories. Citadel Press.Google ScholarGoogle Scholar
  9. Dickens, C. 1870 The Adventures Of Oliver Twist. Fields, Osgood & Co.Google ScholarGoogle Scholar
  10. Edwards, M., Peersman, C., And Rashid, A. 2017. "Scamming The Scammers: Towards Automatic Detection Of Persuasion In Advance Fee Frauds Proceedings Of The 26th International Conference On World Wide Web Companion". WWW '17 Companion. 1291--1299. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. Hamilton, D. 2016 The Thinking Machine. In Echoes Of Sherlock Holmes : Stories Inspired By The Holmes Canon, L. R. King, L. S. Klinger, J. Connolly, M. Gardiner, D. Cameron, T. Alexander, D. Morrell, T. Lee, B. Musson, H. P. Ryan, A. Perry, M. Scott, H. Ephron, G. Phillips, W. K. Krueger, C. Mcpherson, D. Crombie, J. Maberry, D. Mina, And C. Doctorow, Eds. Pegasus Books.Google ScholarGoogle Scholar
  12. Hern, A. 2018. "Fitness Tracking App Strava Gives Away Location Of Secret Us Army Bases". The Guardian.Google ScholarGoogle Scholar
  13. Huang, Q., Singh, V. K., And Atrey, P. K. 2014. "Cyber Bullying Detection Using Social And Textual Analysis Proceedings Of The 3rd International Workshop On Socially-Aware Multimedia". SAM '14. 3--6. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. Le Carré,, J.. 1980 Smiley's People. Knopf.Google ScholarGoogle Scholar
  15. Rizoiu, M.-A., Xie, L., Caetano, T., And Cebrian, M. 2016. "Evolution Of Privacy Loss In Wikipedia Proceedings Of The Ninth Acm International Conference On Web Search And Data Mining". WSDM "16. 215--224. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. Shelley, M. W. 1984 Frankenstein, Or, The Modern Prometheus. Modern Library.Google ScholarGoogle Scholar
  17. Sofia El Amine, S. B., Sabrine Saad, Addis Tesfa And Christophe Varin "Infowar In Syria: The Web Between Liberation And Repression". Web Science 2012.Google ScholarGoogle Scholar
  18. Stross, C. 2006 The Jennifer Morgue. Golden Gryphon Press.Google ScholarGoogle Scholar
  19. Meyer, E. 2014 "My Year Was Tragic. Facebook Ambushed Me With a Painful Reminder." Slate, http://www.slate.com/blogs/future_tense/2014/12/29/facebook_year_in_review_my_tragic_year_was_the_wrong_fodder_for_facebook.htmlGoogle ScholarGoogle Scholar
  20. Czege, P. My Life With Master, Half-Meme Press, 2003.Google ScholarGoogle Scholar
  21. Timberg, C. and Harwell, D. 2018 "We studied thousands of anonymous posts about the Parkland attack - and found a conspiracy in the making", The Washington Post (28 February 2018)Google ScholarGoogle Scholar
  22. Nevin, Andrew D. 2015. Cyber-Psychopathy: Examining the Relationship between Dark E-Personality and Online Misconduct. M.A. Thesis, Western University. https://ir.lib.uwo.ca/etd/2926Google ScholarGoogle Scholar
  23. DiFranzo, D., Taylor, S. H. et al., 2018, "Upstanding by Design: Bystander Intervention in Cyberbullying", CHI 18 (Montréal 21--26 April 2018)Google ScholarGoogle Scholar
  24. Brignull, Harry. "Types of Dark Patterns," https://darkpatterns.org/types-of-dark-patternGoogle ScholarGoogle Scholar
  25. Vosoughi, S., Roy, D., and Aral, S. 2018 "The spread of true and false news online' Science (9 March 20--18) pp. 1146--1151Google ScholarGoogle Scholar

Index Terms

  1. A Villain's Guide To Social Media And Web Science

        Recommendations

        Comments

        Login options

        Check if you have access through your login credentials or your institution to get full access on this article.

        Sign in
        • Published in

          cover image ACM Conferences
          HT '18: Proceedings of the 29th on Hypertext and Social Media
          July 2018
          266 pages
          ISBN:9781450354271
          DOI:10.1145/3209542

          Copyright © 2018 ACM

          Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

          Publisher

          Association for Computing Machinery

          New York, NY, United States

          Publication History

          • Published: 3 July 2018

          Permissions

          Request permissions about this article.

          Request Permissions

          Check for updates

          Qualifiers

          • research-article

          Acceptance Rates

          HT '18 Paper Acceptance Rate19of69submissions,28%Overall Acceptance Rate378of1,158submissions,33%

          Upcoming Conference

          HT '24
          35th ACM Conference on Hypertext and Social Media
          September 10 - 13, 2024
          Poznan , Poland

        PDF Format

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader