Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/3209542.3210576acmconferencesArticle/Chapter ViewAbstractPublication PageshtConference Proceedingsconference-collections
research-article

A Villain's Guide To Social Media And Web Science

Published: 03 July 2018 Publication History

Abstract

If we have not yet achieved planetary super-villainy on the desktop, it may be feasible to fit it into a suburban office suite. Social media and Web science permit the modern villain to deploy traditional cruelties to great and surprising effect. Because the impact of villainous techniques is radically asymmetric, our fetid plots are difficult and costly to foil.

References

[1]
Ammann, R. 2009. "Jorn Barger, The Newspage Network And The Emergence Of The Weblog Community," Proceedings Of The 20th ACM Conference On Hypertext And Hypermedia". HT '09. 279--288.
[2]
Backstrom, L., Dworkin, C., and Kleinberg, J. 2011. 'Wherefore Art Thou R3579x': Anonymized Social Networks, Hidden Patterns, And Structural Steganography". Commun. ACM. 54, 12, 133--141.
[3]
Backstrom, L. And Kleinberg, J. 2014. "Romantic Partnerships And The Dispersion Of Social Ties: A Network Analysis Of Relationship Status On Facebook Proceedings Of The 17th Acm Conference On Computer Supported Cooperative Work & Social Computing". CSCW '14. 831--841.
[4]
Johnson, B. 2001. "The Short Life Of Kaycee Nicole". The Guardian.
[5]
Chen, A. 2015. "The Agency". New York Times Magazine.
[6]
Clarke, A. C. 1967 The Nine Billion Names Of God; The Best Short Stories Of Arthur C. Clarke. Harcourt, Brace & World.
[7]
Derakhshan, H. 2016. "Killing The Hyperlink, Killing The Web: The Shift From Library-Internet To Television-Internet Proceedings Of The 27th Acm Conference On Hypertext And Social Media". HT "16. 3--3.
[8]
Dick, P. K. 2016 The Minority Report : And Other Classic Stories. Citadel Press.
[9]
Dickens, C. 1870 The Adventures Of Oliver Twist. Fields, Osgood & Co.
[10]
Edwards, M., Peersman, C., And Rashid, A. 2017. "Scamming The Scammers: Towards Automatic Detection Of Persuasion In Advance Fee Frauds Proceedings Of The 26th International Conference On World Wide Web Companion". WWW '17 Companion. 1291--1299.
[11]
Hamilton, D. 2016 The Thinking Machine. In Echoes Of Sherlock Holmes : Stories Inspired By The Holmes Canon, L. R. King, L. S. Klinger, J. Connolly, M. Gardiner, D. Cameron, T. Alexander, D. Morrell, T. Lee, B. Musson, H. P. Ryan, A. Perry, M. Scott, H. Ephron, G. Phillips, W. K. Krueger, C. Mcpherson, D. Crombie, J. Maberry, D. Mina, And C. Doctorow, Eds. Pegasus Books.
[12]
Hern, A. 2018. "Fitness Tracking App Strava Gives Away Location Of Secret Us Army Bases". The Guardian.
[13]
Huang, Q., Singh, V. K., And Atrey, P. K. 2014. "Cyber Bullying Detection Using Social And Textual Analysis Proceedings Of The 3rd International Workshop On Socially-Aware Multimedia". SAM '14. 3--6.
[14]
Le Carré, J. 1980 Smiley's People. Knopf.
[15]
Rizoiu, M.-A., Xie, L., Caetano, T., And Cebrian, M. 2016. "Evolution Of Privacy Loss In Wikipedia Proceedings Of The Ninth Acm International Conference On Web Search And Data Mining". WSDM "16. 215--224.
[16]
Shelley, M. W. 1984 Frankenstein, Or, The Modern Prometheus. Modern Library.
[17]
Sofia El Amine, S. B., Sabrine Saad, Addis Tesfa And Christophe Varin "Infowar In Syria: The Web Between Liberation And Repression". Web Science 2012.
[18]
Stross, C. 2006 The Jennifer Morgue. Golden Gryphon Press.
[19]
Meyer, E. 2014 "My Year Was Tragic. Facebook Ambushed Me With a Painful Reminder." Slate, http://www.slate.com/blogs/future_tense/2014/12/29/facebook_year_in_review_my_tragic_year_was_the_wrong_fodder_for_facebook.html
[20]
Czege, P. My Life With Master, Half-Meme Press, 2003.
[21]
Timberg, C. and Harwell, D. 2018 "We studied thousands of anonymous posts about the Parkland attack - and found a conspiracy in the making", The Washington Post (28 February 2018)
[22]
Nevin, Andrew D. 2015. Cyber-Psychopathy: Examining the Relationship between Dark E-Personality and Online Misconduct. M.A. Thesis, Western University. https://ir.lib.uwo.ca/etd/2926
[23]
DiFranzo, D., Taylor, S. H. et al., 2018, "Upstanding by Design: Bystander Intervention in Cyberbullying", CHI 18 (Montréal 21--26 April 2018)
[24]
Brignull, Harry. "Types of Dark Patterns," https://darkpatterns.org/types-of-dark-pattern
[25]
Vosoughi, S., Roy, D., and Aral, S. 2018 "The spread of true and false news online' Science (9 March 20--18) pp. 1146--1151

Cited By

View all

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
HT '18: Proceedings of the 29th on Hypertext and Social Media
July 2018
266 pages
ISBN:9781450354271
DOI:10.1145/3209542
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 03 July 2018

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. fiction
  2. history of computing
  3. hypertext
  4. implementation
  5. literature
  6. politics
  7. social media
  8. villainy

Qualifiers

  • Research-article

Conference

HT '18
Sponsor:

Acceptance Rates

HT '18 Paper Acceptance Rate 19 of 69 submissions, 28%;
Overall Acceptance Rate 378 of 1,158 submissions, 33%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)21
  • Downloads (Last 6 weeks)1
Reflects downloads up to 17 Oct 2024

Other Metrics

Citations

Cited By

View all
  • (2024)A Novel Architecture for Classical HypertextProceedings of the 35th ACM Conference on Hypertext and Social Media10.1145/3648188.3675147(302-308)Online publication date: 10-Sep-2024
  • (2023)Seven HypertextsProceedings of the 34th ACM Conference on Hypertext and Social Media10.1145/3603163.3609048(1-15)Online publication date: 4-Sep-2023
  • (2022)The Web At War: Hypertext, Social Media, and TotalitarianismProceedings of the 33rd ACM Conference on Hypertext and Social Media10.1145/3511095.3536365(256-258)Online publication date: 28-Jun-2022
  • (2022)Links Of Darkness: Hypertext And HorrorProceedings of the 33rd ACM Conference on Hypertext and Social Media10.1145/3511095.3531270(73-79)Online publication date: 28-Jun-2022
  • (2020)In Spite Of OurselvesProceedings of the 3rd International Conference on Web Studies10.1145/3423958.3423961(4-8)Online publication date: 15-Oct-2020
  • (2019)48 Hour Hypertext ChallengeProceedings of the 30th ACM Conference on Hypertext and Social Media10.1145/3342220.3345458(299-300)Online publication date: 12-Sep-2019
  • (2018)LinksProceedings of the 2nd International Conference on Web Studies10.1145/3240431.3240433(5-11)Online publication date: 3-Oct-2018

View Options

Get Access

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media