0% found this document useful (0 votes)
39 views15 pages

2016 Jane. Online Misogyny and Feminist Digilantism

The article discusses the rise of online misogyny and the responses of feminist 'digilantism,' particularly focusing on the case of Australian gamer Alanah Pearce who alerted the mothers of young male harassers. While such DIY strategies raise awareness, the article argues they inadequately address the broader issue of gendered cyber-hate and shift responsibility from perpetrators to victims. It calls for a hybrid approach combining individual and collective feminist activism to effectively combat gendered hate online.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
39 views15 pages

2016 Jane. Online Misogyny and Feminist Digilantism

The article discusses the rise of online misogyny and the responses of feminist 'digilantism,' particularly focusing on the case of Australian gamer Alanah Pearce who alerted the mothers of young male harassers. While such DIY strategies raise awareness, the article argues they inadequately address the broader issue of gendered cyber-hate and shift responsibility from perpetrators to victims. It calls for a hybrid approach combining individual and collective feminist activism to effectively combat gendered hate online.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 15

Continuum

Journal of Media & Cultural Studies

ISSN: 1030-4312 (Print) 1469-3666 (Online) Journal homepage: http://www.tandfonline.com/loi/ccon20

Online misogyny and feminist digilantism

Emma A. Jane

To cite this article: Emma A. Jane (2016): Online misogyny and feminist digilantism,
Continuum, DOI: 10.1080/10304312.2016.1166560

To link to this article: http://dx.doi.org/10.1080/10304312.2016.1166560

Published online: 31 Mar 2016.

Submit your article to this journal

Article views: 25

View related articles

View Crossmark data

Full Terms & Conditions of access and use can be found at


http://www.tandfonline.com/action/journalInformation?journalCode=ccon20

Download by: [Emory University] Date: 10 April 2016, At: 02:29


Continuum: Journal of Media & Cultural Studies, 2016
http://dx.doi.org/10.1080/10304312.2016.1166560

Online misogyny and feminist digilantism


Emma A. Jane
School of the Arts & Media, University of New South Wales, Sydney, Australia

ABSTRACT
This article examines contemporary feminist ‘digilante’ responses to the
increasing problem of misogyny online. In particular, it focuses on female
gamers and a recent incident in which the Australian gamer Alanah Pearce
responded to threats of sexual violence from young male Internet users by
Downloaded by [Emory University] at 02:29 10 April 2016

alerting their mothers. Pearce’s move was celebrated in international media


commentary as the ‘perfect’ solution to the problem of online rape threats.
This article, however, argues that while ‘do-it-yourself’ strategies such as
Pearce’s have some benefits, unsupplemented, they do not constitute an
adequate solution to the broader problem of gendered vitriol online. Further,
they comport with a wider trend which shifts the burden of responsibility
for the problem of gendered cyber-hate from perpetrators to targets, and
from the public to the private sphere. Over the course of this article, I will
show that the contemporary problem of gendered ‘e-bile’ has parallels with
some key social issues addressed by second-wave feminism. As such, I argue
that a hybrid of feminist activist efforts – including a recalibrated approach
to collectivism – is required to achieve the legislative and corporate reforms
necessary to address the significant social problem of gendered hate on
the Internet.

Introduction
In late 2014, the Australian gamer journalist Alanah Pearce received a Facebook message reading, ‘i’ll
rape u if i ever see u cunt’ (cited in True 2014).1 This alone was hardly a newsworthy event. In recent
years, cyber-harassment such as rape threats and sexualized vitriol – what I have elsewhere called
‘e-bile’2 – have become part of the everyday experience for many women online (cf. Jane 2014a, 2014b,
2015). While various types of ‘anti-social’ communications have always been observed on the Internet,
media accounts and self-reports of sexualized electronic vitriol present a strong prima facie case that
gendered cyber-hate has increased markedly since at least 2011. Further, there is good evidence that
the discourse involved is more rhetorically noxious and is occurring in far broader communities than
earlier iterations of gender-based harassment documented in scholarly literature.3 This is especially true
in gamer communities where commentators have argued that the ‘misogynist backlash’ is so virulent
it constitutes a form of terrorism (Hudson 2014; see also Marcetic 2014).
Pearce’s response to receiving e-threats of sexual violence, however, was novel. Given that the abuse
she received involved public Facebook pages, she was able to determine that some of the perpetra-
tors were minors (Pearce cited in True 2014). She then used Facebook to identify and make contact
with four of the boys’ mothers, asking if they knew about the messages and would discuss them with

CONTACT Emma A. Jane [email protected]


© 2016 Informa UK Limited, trading as Taylor & Francis Group
2 E. A. Jane

their children (True 2014). Pearce’s approach met with high praise in the international media and the
cybersphere where, as I will go on to show, it was repeatedly described as the ‘perfect’ way for women
to deal with rape threats online.
Given the contemporary proliferation of gendered cyber-hate and an acknowledged shortage of
effective remedies, the Pearce case study deserves close attention. As I will demonstrate, her response
aligns with a more general tendency for female e-bile targets to engage in do-it-yourself (DIY), ‘digilante’
tactics such as ‘calling out’ and/or attempting to ‘name and shame’ their antagonists. Such strategies are
understandable, given the monumentally inadequate response to gendered cyber-harassment from
law enforcement bodies, policy-makers and corporations (cf. Citron 2009; Halder and Jaishankar 2011;
Jenson and de Castell 2013; Sandoval 2013; Citron 2014; Dewey 2014).4 Yet, while activists such as Pearce
are engaged in extremely valuable awareness-raising work, unsupplemented, such approaches are not
likely to adequately address the problem of gendered e-bile. Further, the enthusiastic endorsement
given to such DIY initiatives by media commentators can be viewed as both reflecting and bolstering
a dominant cyber norm which shifts the burden of responsibility for gendered hostility from male
perpetrators to female targets, and from the public to the private sphere.
Over the course of this article, I will show that there exist many parallels between contemporary
Downloaded by [Emory University] at 02:29 10 April 2016

gendered cyber-hate, and key social problems addressed by second-wave5 feminists in the 1960s and
1970s – namely: rape, domestic violence and workplace sexual harassment. While a signal characteristic
of the second wave of the women’s movement was communal mobilization, contemporary iterations
of feminism tend to be associated with individuated, micropolitical and DIY action, especially in the
cybersphere. This paper examines the efficacy and the ethics of digilante interventions by situating
these responses within the broader context of feminist theories and activism. It goes on to argue that,
despite a history of tension between generations of feminists, combating gendered cyber-harassment
requires a combination of individualism as well as collectivism – what could be described as a hybrid
of second- and third-wave approaches.
This research is part of a much larger (and ongoing) project into the nature, manifestations, preva-
lence, etiology and ramifications of gendered e-bile. I have been archiving manifestations of gendered
hate speech from Anglophone cyber domains since 1998 using screen shots and web captures, and
deploying methodological approaches from the emerging field of Internet historiography (Brügger
2010). While this paper focuses primarily on electronic vitriol directed at female gamers in 2014, its
arguments are informed by a close study of my entire archive. This paper draws on established methods
in textual analysis and media ethnography in its mapping and analysis of discourses around hostility
and vitriol in online gamer communities using selected themes such as ‘trolling’, ‘cyber-harassment’,
‘cyber-stalking’, ‘cyber-bullying’, ‘cyber-hate’ and ‘cyber-violence’ as lenses. In addition to other methods
used to track relevant media discourse, from January 2011 to the present day, I have deployed the
‘Google Alerts’ service which provides daily notifications of relevant content from news sites, blogs and
other web sites in a variety of media forms. I use 9 alerts searching for 16 relevant words or phrases.
My hermeneutic is interdisciplinary and works across feminist theory, political philosophy, cultural
and media studies and legal studies. Methodologically, I am also influenced by standpoint theory (cf.
Harding 2004; Sprague 2005) in that I write from the position of a feminist who has herself been a target
for cyber-hate (Jane 2014b), and because my research is intended to contribute to the broad feminist
project of advancing gender equity.

Gendered e-bile and Gamergate


While gendered e-bile has circulated since the earliest days of the Internet, it was not until 2011 that a
large number of women from a range of social contexts, cultures and countries began speaking pub-
lically about the rape threats and sexualized vitriol they were receiving on social media platforms and
the Internet (cf. Jane 2014a, 2014b, 2015). Over the following years, media accounts and self-reports of
gendered cyber-hate increased markedly (cf. Battersby 2013; Sandoval 2013; Dewey 2014; Marcetic 2014;
Mead 2014; Sierra 2014; Penny 2014). These anecdotal accounts comport with empirical research such
Continuum: Journal of Media & Cultural Studies  3

as a 2014 study by the Pew Research Center showing that 73% of adult Internet users have witnessed
harassment online and 40% have experienced it personally (Duggan 2014). While men are more likely
to be subjected to less severe harassment such as name-calling and embarrassment, young women
are particularly vulnerable to more severe kinds of cyber abuse such as sexual harassment and stalking
(Duggan 2014). Nicola Henry and Anastasia Powell note that, despite a dearth of scholarly literature and
empirical prevalence studies on the subject of technology-facilitated sexual violence and harassment
(TFSV) against women, a number of international studies suggest that women are disproportionately
the targets of harassment and hate speech in cyberspace (2015, 759).
Women in online tech and gamer communities have historically been subjected to especially noxious
e-bile. In 2007, for instance, tech blogger Kathy Sierra withdrew from public life after a campaign of har-
assment including the circulation of doctored images of her as a sexually mutilated corpse accompanied
by the publishing of her personal details as a ‘call to action’ for people to harass her (Sierra 2014). Five
years later, feminist blogger and gamer Anita Sarkeesian was subjected to a similar cyber mob attack
after launching a crowd-funding campaign for a series of short films examining sexist stereotypes in
video games (Sarkeesian 2012a, 2012b). In August 2014, Sarkeesian was forced to leave her home after
receiving a series of graphic death threats that included her and her parents’ home addresses (Marcetic
Downloaded by [Emory University] at 02:29 10 April 2016

2014). Two months later, Sarkeesian had to cancel a speaking event at Utah State University after an
anonymous emailer threatened ‘the deadliest school shooting in American history’ if her talk was per-
mitted to go ahead (cited in Marcetic 2014). This email said Sarkeesian was ‘everything wrong with the
feminist woman’ and would ‘die screaming like the craven little whore that she is’ (cited in Marcetic 2014).
The 2014 threats against Sarkeesian were part of a broader campaign of harassment against women
in gaming known as ‘Gamergate’ which began when the disgruntled ex-boyfriend of a games designer
called Zoe Quinn claimed (baselessly)6 that Quinn had slept with a journalist to secure positive reviews
for her game Depression Quest. Quinn’s attackers used the common e-bile tactics of ‘doxxing’ (publishing
personally identifying information to incite Internet antagonists to hunt targets in offline domains),
and ‘revenge porn’ (uploading sexually explicit material – usually of a former female partner – without
the consent of the pictured subject). While Gamergate was ostensibly a protest about ethics in games
journalism, its targets were almost exclusively female games developers, academics and writers, and
the undercurrent of the movement was ‘always … darkly misogynistic’ (Stuart 2014b).
Like Sarkeesian, Quinn eventually left her home because she feared for her safety. After accumu-
lating 16 gigabytes of abuse (Jason 2015), her concern was that one of her anonymous critics would
eventually make good on their threats to kill her (Quinn cited in Stuart 2014b). Female journalists
and gamers who publically defended Quinn and/or who questioned the Gamergate movement
were also attacked. In October 2014, the personal details of the American game designer Brianna
Wu were posted on the 8chan chat forum, and within minutes, she had begun receiving threats
such as ‘I’ve got a K-bar and I’m coming to your house so I can shove it up your ugly feminist cunt’
(cited in Stuart 2014a). Wu also left her home because she feared for her safety, observing that
this was not ‘just casual sexism, it’s angry, violent sexism … Every woman I know in the industry
is scared’ (cited in Stuart 2014a).

A feminist issue
Women targeted for mob attacks on the Internet suffer a range of psychological, professional and
financial impacts (cf. Day 2013; Battersby 2013; Hess 2014; Jane 2014a). Gendered e-bile is having a
chilling effect on women’s voices online in that many targets report self-censoring, writing anonymously
or under pseudonyms or withdrawing from online domains altogether to avoid abuse (Jane 2014a).
As Sarkeesian, Quinn and Wu experienced during Gamergate, online attacks are increasingly spilling
into offline domains7 – most frequently via the practices of doxxing and revenge porn. Media outlets
have also reported an increase in the number of men publishing faux advertisements claiming their
ex-partners are soliciting sex (Sandoval 2013). One U.S. man posted an ad entitled ‘Rape Me and My
Daughters’ and was jailed after more than 50 men arrived at his ex-wife’s home (Sandoval 2013).
4 E. A. Jane

Online abuse has also been linked to offline domestic violence against women. According to research
published by Women’s Aid, 48% of U.K. women who had experienced violence at the hands of a partner
reported experiencing harassment or online abuse once they had left the relationship, and 38% of
women said they had been stalked online after they had left their partners (Smith 2014). The signifi-
cance of such studies is not just that violent partners and ex-partners are able to use the Internet as
another dimension of their abuse of women, but that violent partners and ex-partners are able to use
the Internet to incite others to join their attacks. We can also see the way that – in cases such as those
involving assaults that are filmed and published online – technology enables ‘the continuation of harm
… well beyond the original crime’ (Henry and Powell 2015, 767).
Danielle Keats Citron’s conclusion is that rape threats and gendered doxxing are causing ‘profound’
harm to women by impeding their full participation in online life, and undermining ‘their autonomy,
identity, dignity, and well-being’ (2009, 411; see also Citron 2014). Citron condemns the way gendered
cyber-harassment is deemed ‘harmless teasing that women should expect, and tolerate, given the
internet’s Wild West norms of behavior’ (2009, 373). Debarati Halder and K. Jaishankar concur, argu-
ing that female victims remain a secondary concern for ‘developed cyber-savvy nations’ (2011, 300),
while Jennifer Jenson and Suzanne de Castell contend that individual cases of online misogyny are not
Downloaded by [Emory University] at 02:29 10 April 2016

exceptional but indicative of broader attitudes which ‘excuse violent hate speech’ targeting women
online (2013, 75).
The sheer volume of gendered cyber-hate as well as the striking homogeneity of its rhetoric (Jane
2014b) make this a phenomenon which demands consideration not only as a collection of individual
incidents but en masse as a significant social problem. Further, while e-bile’s medium is new, we can
see that the e-bile message sits squarely within a far older tradition – one which insists that women are
inferior; that their primary value relates to sexual utility; that they do not belong in the public sphere;
and that those females who overstep the mark should be put ‘back in their place’ or otherwise pun-
ished.8 This, in other words, is a feminist issue. Further, it is a feminist issue which has striking parallels
with some key social problems addressed by second-wave activists. As with rape, domestic violence
and workplace sexual harassment in the 1960s, gendered cyber-harassment is frequently trivialized,
mocked, regarded as a personal matter and framed as legally intractable because of its ‘highly personal
and idiosyncratic’ contexts (Citron 2014, 22).
Also paralleling more ‘traditional’ forms of sexual assault and harassment is the tendency to blame
the female victims of cyber-hate and cyber-harassment (cf. Caroline Criado-Perez cited in Day 2013;
Richard White cited in Dowell 2013; Ramsdell 2014). Law enforcement officers are also known to coun-
sel female cyber-hate targets to simply ‘take a break’ from the cybersphere (Hess 2014), while some
media commentators instruct women to stop being so ‘peculiarly sensitive’ (O’Neill 2011) and to refrain
from engaging in ‘narcissistic victimhood’ (West 2015). Again, such attitudes shift the responsibility
for cyber-hate to targets, and penalize women by advising them to withdraw from a domain that is
widely acknowledged as being an integral – and essential – part of contemporary life and citizenship
(cf. Mossberger 2009; Wheeler 2011; Braman 2011).

Feminist digilantism: a ‘brilliant new ploy’?


The oppressive force of e-bile – combined with the lack of institutional solutions – helps explain why
many contemporary feminist activists are pushing back via digital vigilantism or ‘digilantism’ – a word
used interchangeably with terms such as ‘cybervigilante’ to describe DIY justice online (Nakamura 2014,
263). Digilantism is not just deployed by online feminists, but is part of a far broader ‘vengeance culture’
in the cybersphere (Hai-Jew 2014, 64). Unlike traditional vigilantes who use violence to lynch their
targets, the extrajudicial punishment meted out by digilantes usually involves some combination of
trickery, persuasion and public shaming (Byrne 2013, 71). Digilante methods are associated with groups
such as WikiLeaks and Anonymous, and are manifest in tactics such as ‘hacktivism’,9 ‘scam-baiting’,10 and
‘denial-of-service attacks’11 (cf. Crews 2006; Rosenbaum 2007; Tom 2008; Citron 2010; Murphy 2012;
Colesky and van Niekerk 2012). As Byrne observes, ‘Though rarely cast alongside traditional vigilantism,
Continuum: Journal of Media & Cultural Studies  5

digilante zeal is quite similar in that activity also hinges on the belief that there are scarcities and defi-
ciencies in the state security system’ (2013, 74).
Feminist digilantism has primarily focussed on naming and shaming approaches, such as establishing
blogs, web sites and hashtags that are used to republish offensive material that might otherwise have
only been viewed by recipients. Examples include Fat, Ugly or Slutty (a blog which collates and reposts
abuse directed at female gamers), ‘Page O’ Hate’ (the section of blogger Rebecca Watson’s skepchick
web site devoted to reposting the e-bile she receives) and Not in the Kitchen Anymore (a site founded
by Jenny Haniver to document the hostility she experiences while gaming). The ‘#mencallmethings’,
‘#everydaysexism’ and ‘#1reasonwhy (there aren’t more women in the games industry)’ hashtag move-
ments on Twitter serve similar functions. Another example, from Russia in 2015, involves the queer
activist Lena Klimova who has posted a photo album depicting identifying photographs of people she
says have sent her threatening messages via the Russian social network VKontakte (Rothrock 2015).
Another feminist variation on naming and shaming involves e-bile targets outing and/or engaging
directly with individual attackers in public fora. In 2012, for instance, the Canadian feminist Steph
Guthrie tracked down the 25-year-old man who created an infamous online game called ‘Beat Up Anita
Sarkeesian’ which invited players to ‘punch this bitch in the face’ (cited in Sarkeesian 2012a). Guthrie’s
Downloaded by [Emory University] at 02:29 10 April 2016

initial tweet about the man read, ‘So I found the Twitter account of that fuck listed as creator of the
“punch a woman in the face” game. Should I sic the internet on him?’ (Guthrie 2012). After receiving
encouragement from her followers, Guthrie then confronted the man publically on Twitter, before
passing his details on to media outlets, and alerting potential employers in his local area that if he ever
sent them his résumé, they should know he was responsible for making ‘woman facepunching’ games
(Guthrie 2012, 2013).
While arguments have arisen about the ethics of publically outing e-bilers (boyd 2012), the U.K.
blogger Laurie Penny praises the ‘new mood of online vigilantism … beginning to take hold of the
Net’, arguing that
people with a modern understanding of misogyny and what it means aren’t prepared to wait for society to fix itself
… Right now the Internet is outstripping the conventional court system when it comes to digging out information
about rapists and other sexual predators. (2014, 197–198)
Penny’s point about conventional legal remedies not keeping pace with the types of crimes occurring
on the Internet and social media platforms is well made. It does not follow, however, that digilantism
is necessarily the best solution to this problem. To demonstrate some of the reasons why, I will now
return to the Pearce case study.
On 28 November 2014, Pearce publicized her digilante efforts by tweeting, ‘Sometimes young boys
on Facebook send me rape threats, so I’ve started telling their mothers’. This was accompanied by a
screen shot of her text message exchange with one of the boys’ mothers who replied, ‘omg little shit …
IM SO SORRY’ (cited in True 2014). The Australian gamer’s strategy received an overwhelmingly positive
reaction. By January 2015, her initial tweet had been retweeted 45,000 times, and had been ‘favour-
ited’ 71,000 times. The story received a flood of international media coverage in which commentators
frequently described her actions as the ‘perfect’ solution to rape threats online (cf. Essert 2014; ‘Gamer
Alanah pearce responds to online rape threats in the perfect way’ 2014; Klee 2014; Lynch 2014; Parker
2014). Others praised Pearce for her ‘brilliant new ploy’ (Boggioni 2014) and urged other women to follow
suit by ‘standing up and smacking these boys down’ (David Weller commenting beneath Kurp 2014).
As with other feminist digilante approaches discussed in the section above, Pearce’s strategy does offer
some benefits. Her decision not to publically name the boys who sent her rape threats may well have spared
them the intense counter vitriol which can be launched at e-bilers, yet she still put them into a position where
they would potentially face consequences for their actions. By talking about her experience, she humanized
herself as a target, and the boys as attackers. She also assisted in making the extent, nature and ramifications
of gendered cyber-hate visible. Pearce may have experienced a sense of empowerment and agency as a
result of using her cyber savvy – in the manner of a jujitsu manoeuvre – back against her attackers. Speaking
publically about such issues also offers the benefits of catharsis, as well as a sense of solidarity with other
targets, and the chance to have one’s individual suffering acknowledged.
6 E. A. Jane

There are, however, a number of potentially problematic aspects to Pearce’s tactics and the wide
applause they received. These point to some potentially problematic aspects of digilantism (including
feminist digilantism) more generally. The problems are interrelated but can be grouped thematically
as involving issues associated with: (1) logistics; (2) various feminist activist approaches; and (3) the
ethics and efficacy of digilantism. I wish to emphasize here that my intention is not to criticize Pearce
or other cyber feminists, but to critique the inequitable cyber norms that may make digilantism seem
like the only viable response to e-bile.
Firstly, framing Pearce’s individual approach as constituting the ‘perfect’ response to the broad prob-
lem of online rape threats is wrongheaded because several key aspects of her circumstances were
atypical, specifically: (a) she was able to identify her antagonists; and (b) her antagonists were minors.
Most e-bilers attack anonymously therefore making it logistically unfeasible to identify them offline.
Even contacting them online is impossible if, for example, they use disposable user profiles which are
created – and quickly decommissioned – for the express purpose of engaging in unidentifiable, ‘drive-by’
assaults. Those e-bilers whose identities have been uncovered have tended to be men over the age of
18 (cf. Chen 2012; Bracchi 2013; Readhead 2014). As such, contacting their mothers to request parental
intervention would presumably be less appropriate. Further, if an e-bile attack did happen to involve
Downloaded by [Emory University] at 02:29 10 April 2016

assailants who were both identifiable and under 18, it would likely be impossible to track down and
engage with all their mothers, given that most cyber attacks involve huge numbers of assailants.
Secondly, applauding Pearce’s decision to handle the matter herself by telling her attackers’ mothers
risks reinscribing one of the key social norms resisted by second-wave feminism, namely that sexual-
ized violence against women is a problem that should be solved by individuals in private rather than
public domains. Consider the language used by journalists praising Pearce’s actions. One said she went
‘straight to the source to tackle the issue’ (True 2014), while another said she talked to ‘the one person
who might actually get through to these terrible people’ (Essert 2014). Then, there is the journalist
who wrote: ‘Rather than report Facebook abuse through corporate channels, she’s going straight to
the real authority figure’ (Klee 2014, emphasis in original). While initiating parental involvement may
be a valid response if e-bile attacks involve underaged antagonists, the responsibility for this action
should not lie with targets. Neither is it helpful for mothers to be cast as the ‘real’ authority figures in
the e-bile scene. Just as there exists a tendency to blame the victims of cyber-hate, such discourse
implicates mothers as being responsible for and possibly also even partly to blame for e-bile. Further,
such framings infantalize the perpetrators and suggest the wider problem of e-bile is little more than
the bad behaviour of naughty little boys.12
Also telling is the ode to Pearce published by the popular Australian women’s website Mamamia,
which states outright that telling e-bilers’ mothers will have more of an impact than calling the police,
and which repeatedly congratulates Pearce for ‘getting back at’ her abusers ‘in a way that truly brings it
home’ (Rudd 2014). Discourse such as the above is unhelpful in its suggestion that alerting authorities
is not as admirable or effective as dealing with e-bile individually. While it may be true that Pearce’s
strategy brought the perpetrators’ actions ‘home’ in the sense that it made the abuse clear and placed
blame, it also brought the actions ‘home’ into the domestic sphere. As such, while the media applause
of Pearce is putatively supportive of her as an individual, it is less helpful to women collectively in that
it bolsters the unhelpful norm that the responsibility for cyber-hate rests with victims who should
deal with it in private rather than public domains.13 This, in turn, may make it easier for governments,
corporations and enforcement bodies to continue eliding their responsibility for e-bile with impunity.
Thirdly, the deployment of online vigilantism – like the deployment of offline vigilantism – raises many
ethical quandaries (cf. Tuovinen and Röning 2007; Tom 2008; Dumsday 2009; boyd 2012; Byrne 2013;
Nagle 2013b; Nakamura 2014). Devin Coldewey's observation, for instance, is that the ‘crowd-sourcing’
of justice online is unpredictable in that ‘bad actors are at least as common and active as the well-in-
tentioned and insightful’ (2013). Further, what might seem like fair and reasonable street justice from
one viewpoint may well resemble vengeance-motivated lynching or even sadism from another. Such
perspectivism was certainly operative in Gamergate in that the movement came about as a result of
individuals who insisted their indignation was righteous,14 yet whose actions were regarded as cruel
Continuum: Journal of Media & Cultural Studies  7

and starkly misogynistic by many outsiders. Gamergate also demonstrates some other risks of vigilan-
tism, namely: that the vigilante acts can become worse than the ill supposedly being addressed; that
the punishments meted out are disproportionate and/or may be directed at innocents; and that the
movement becomes a semi-legitimate avenue for those who are not motivated by a genuine social
issue, but who simply wish to do harm (Rosenbaum and Sederberg 1976, 21).
Similarly, digilante approaches can result in scapegoating, and in e-bile producers being attacked via
methods that are similar – or worse – than those being objected to in the first instance.15 While various
groups associated with vigilantism online have made various attempts to build an ethics of digilantism,
the results of these enterprises are uncertain (Murphy 2012). In the meantime, the interconnectedness
of the cybersphere is such that even ‘seemingly mundane self-help policies can carry big implications’
(Crews 2006, 2). Citron’s sombre warning is that the digilante strategy of ‘[n]aming and shaming can
become a one-way ratchet to degradation. It can spiral out of control with cyber mobs on both sides
and no ability to control the damage’ (2014, 118).
Special pleading has been made by some feminists with regard to women’s deployment of vigilante
methods in other contexts. Aaronette White and Shagun Rastogi, for instance, make the case for a ‘femi-
nist definition of violence’ to support their argument that the vigilante activities of female gangs in India
Downloaded by [Emory University] at 02:29 10 April 2016

are not representative of ‘irrational, spontaneous mob violence’ but of ‘grassroots feminist sensibilities’
which offer ‘psychological, social, and justice-related assistance to … women who have been failed
by the … judiciary system’ (2014, 216, 215). White and Rastogi do, however, acknowledge that violent
retributive activities ‘do not challenge fundamental structures of domination in society over the long
term’, and that female vigilantes risk being dangerously attacked themselves (2014, 225). Both these
issues are relevant to the DIY activities of online feminists.
Digilantism can also misfire. In 2011, for instance, the Australian writer and performer Marieke Hardy
had to publically apologize and pay an undisclosed sum of money to a man she wrongly named – via
the ‘#mencallmethings’ hashtag on Twitter – as the pseudonymous author of a hate blog dedicated to
her (Griffin 2011). Another example is the case of Adria Richards who tweeted a photo of two men she’d
overheard making jokes about ‘dongles’ at a tech conference. Richards was bombarded with rape and
death threats on Twitter and Facebook, was fired after her attackers disabled her employer’s website
and then left her home after someone published her address along with a photograph of a beheaded
woman with tape over her mouth (Ronson 2015). A related problem involves girls and women who
use online platforms to make extrajudicial allegations of sexual violence and abuse against named
individuals because of a perceived shortfall in institutional responsiveness to gender justice. As Salter
has observed, not all these efforts receive a sympathetic response; indeed, some spark a ‘ferocious
backlash’ (2013, 231, 234).
With regard to the efficacy of feminist vigilante approaches in relation to gendered e-bile, I note
that republishing offensive material and talking about the hurt it has caused may have the reverse
effect of that which is intended, given that the raison d’être of trolling16 is to disrupt others’ emotional
equilibrium (Schwartz 2008). Online vitriol is competitive, in that e-bilers can frequently be observed
to be competing to produce the most creative venom, break the largest number of taboos, elicit the
largest emotional response in targets, gain the most attention for their exploits and so on (Citron 2014;
Jane 2014a). As such, e-bilers may relish the news that their activities have had an impact and may
enjoy the publicity. This is not to endorse the cyber maxim ‘don’t feed the trolls’17 by suggesting women
refrain from speaking up at all. Instead, it is intended to further texture the argument that ‘calling out’
attackers on a case-by-case basis is unlikely to solve the larger e-bile problem.

Collectivism sans sisterhood


Discourse produced by contemporary cyber feminists indicates an awareness that e-bile is best con-
ceptualized not as a problem concerning individual men and individual women, but as diagnostic
of a far broader sexism that is making the cybersphere a profoundly inequitable space. Yet, as we
have seen, online feminists are primarily engaging in individualized and ad hoc acts of resistance. This
8 E. A. Jane

approach resonates with third-wave feminism’s sensibility of individuated action and emancipation,
and postfeminism’s highlighting of the ‘multiple agency and subject positions of individuals’ (Genz and
Brabon 2009, 25). Its emphasis on social media activism also comports with the notion of a fourth wave
of feminism that is associated with digital nativism, and the emergence of a ‘call-out’ culture’ online
(Munro 2013; see also Baumgardner 2011). Without wishing to detract from the many positive aspects
of contemporary feminist theory and practice, in the case of gendered cyber-hate, it is relevant to
consider the critique that contemporary feminism’s focus on micropolitics shifts ‘the onus for change
onto the individual’ and makes wide-reaching change more difficult to effect (Munro 2013). Debates
about whether online modes of feminist activism have the potential to lead to transformative political
action are also germane (Munro 2013).
Rather than attempting to generalize about whether contemporary modes of feminism and cyber-
activism are either all (or mostly all) effective or all (or mostly all) ineffective, a more useful approach is
to appraise situations individually. In the case of gendered cyber-hate, my research supports the con-
tention that while novel tactics such as Pearce’s have the potential to gain a rush of media attention,
individualistic approaches are easily forgotten. That is, indeed, if they receive any attention at all. As
Julia Schuster argues, young women who choose online activism as their main form of political energy
Downloaded by [Emory University] at 02:29 10 April 2016

may well be ‘invisible’ to the wider public and to feminists of older generations, and, as a result, such
strategies may be ‘disadvantageous at a broader political level’ (2013, 9, 20).
My case in relation to gendered cyber-hate is that extant forms of online feminist activism are
useful, but – if they are to succeed – need to be accompanied by the sorts of hard advocacy, political
organization and collectivist approaches used by second-wave feminists in their campaigns against
rape, domestic violence and workplace sexual harassment. Just as second-wave feminism devel-
oped an analysis of violence against women which argued that issues such as rape and domestic
violence ‘were not merely private problems but were, in fact, public crises’ (Randol 2005, 18–19),
gendered cyber-hate and cyber-harassment need to be addressed ‘not as issues of intimacy but
rather as problems rooted in mechanisms of power and control’ (Randol 2005, 19). Further, given
that speaking out against e-bile has consistently been associated with a steep escalation of abuse
(cf. Citron 2014, 100; Jane 2014b, 562–564), individual activists are sorely in need of the support
of a ‘wider politics’ (Nagle 2013a, 157).
None of this is to advocate a return to the troubled trope of the sisterhood (Henry 2004, 182) or
to imply that all women – or even all women online – are a unified group. Neither is it an attempt to
perform a feminist politics version of Pearce’s move by ‘dobbing’ a generation of politically feckless
postfeminist daughters in to their second-wave mothers and grandmothers. Instead, it is a recognition
that, on this particular issue, there are enough commonalities of experience to justify (possibly even
demand) a collectivist approach to activism. It also rejects the micropolitics/movement binary in favour
of the integrated approaches associated with hybrid social movements which combine ‘web-based
interactions with more traditional F2F [face-to-face] meetings, encampments, and crowds-in-the-street’
(Boler and Nitsou 2014, 232, 238).
As Citron observes, the movement to delegitimize cyber harassment is in its early stages – and is
mostly at the awareness-raising stage (2014, 23; cf. Jenson and de Castell 2013, 80). While contemporary
feminists may not explicitly designate their activities as ‘consciousness raising’, functionally, this is what
is occurring when they talk publically about their experiences and republish gendered cyber-hate. These
aspects of e-bile-related activism should continue. Contemporary cyber feminists are particularly well
placed to use their insider knowledge of networked digital technologies to unearth and increase public
knowledge about gendered cyber-hate. Awareness-raising, however, is not in and of itself enough to
have direct or immediate effect in terms of social change (Schuster 2013, 16). Further activism in the
form of collective mobilization and cohesive advocacy is required to bring pressure to bear on legal
and political elites. This would also recognize the fact that the harm caused by online misogyny is not
just individualized but may buttress the collective experiences of status inequality (cf. Megarry 2014;
Henry and Powell 2015).
Continuum: Journal of Media & Cultural Studies  9

A proto-collectivist approach to combating e-bile is evident in the launching of online petitions


demanding, for instance, reform in terms of the way platforms handle rape threats (cf. Graham 2013;
Stone 2013; Mastronardi 2014), as well as in boycotts such as 2013's day of ‘Twitter silence’ (Baker 2013).
Groups such as the Everyday Sexism Project, and Women, Action and Media have launched effective
social media campaigns targeting companies whose advertising appeared on platforms which have
failed or been slow to remove pages glorifying rape and violence against women (Buni and Chemaly
2014). Key activists are also achieving results by talking to media outlets and lobbying politicians (Wu
cited in Stuart 2014a). To combat gendered cyber-hate, these approaches need to be escalated and aug-
mented in order to demonstrate that – as with problems such as workplace harassment and domestic
violence – e-bile involves subordination with tangible economic, social and political costs (Citron 2014,
22). As such, no less than a ‘cyber civil rights legal agenda’ is required to ensure equality of opportunity
in the digital era (Citron 2014, 25).

Conclusion
In this article, I have focussed on hostility directed at female gamers to illustrate the contemporary
Downloaded by [Emory University] at 02:29 10 April 2016

problem of gendered cyber-hate and cyber-harassment. While the latter involve profanity, cruelty and
threats of violence that would be unacceptable and/or illegal in offline contexts, there is a stark lack of
institutional support and remedies available to victims. Over the course of this paper, I have examined
some feminist digilante interventions that – particularly in Pearce’s case – have been applauded in the
media as innovative, courageous and exemplary ways for women to respond to rape threats online.
Such media coverage both reflects and bolsters the dominant view that it is best for individuals attacked
on the Internet to take matters into their own hands because digilantism offers the only chance of
seeking redress. While it is true that corporations, governments and enforcement agencies have failed
to take adequate responsibility for combating gendered e-bile and supporting targets in the past, it
would be perverse to argue that this failure therefore relieves them of responsibility for the problem
in future. Rather, increased feminist pressure should be applied to these bodies to step up and assist
in building the legislative, corporate, pedagogical and social structures required to recognize and deal
with gendered e-bile.
While online feminists are not usually associated with DIY acts at the most extreme end of
the digilante spectrum, I have made the case that engaging in any act of digilantism is still likely
to be ethically questionable; to put activists at risk; to have uncertain results; and to ultimately
strengthen extrajudicial cultures online, whereas what the problems of cyber-harassment and
cyber-hate urgently require are institutional remedies. To explore more useful ways for feminist
activists to respond to electronic vitriol targeting women online, I have situated the problem of
gendered cyber-hate in relation to historical tensions that have manifested between various fem-
inist ‘waves’. Contemporary generations of feminists have – quite rightly – rejected those aspects
of second-wave feminism which conceive of women as a homogenous group whose interests can
be represented by a single politics. Yet, while highly individualized forms of feminism have the
advantage of acknowledging and respecting difference, they are unlikely to solve a problem as
broad and structural as gendered cyber-hate.
Instead, I have made the case that a better way for activists to address old equity and misogyny
issues in the new terrain of the cybersphere is to forge hybrid activist strategies which involve tempo-
rary allegiances between various theories, tactics and feminist generations. The argument in favour
of a pragmatic rather than identity politics approach might have relevance beyond the parameters of
this particular issue. Future researchers might wish, for example, to examine the broader usefulness
of a feminism that is a series of malleable, eclectic, project-specific and goal-orientated articulations,
rather than a unitary movement insisting on strict fidelity to any particular theoretical frame, mode of
political action or moment in feminist history.
10 E. A. Jane

Notes
1.  I will not be writing ‘sic’ after grammatical, spelling and syntax errors in cited electronic communications and online
material in recognition of the informality and colloquialism commonly found in such contexts.
2.  I have previously used the term ‘e-bile’ to describe a range of discourses and practices that have historically been
designated via terms such as ‘cyberbullying’, ‘cyber-stalking’, ‘cyber-violence’, ‘trolling’ and, most commonly, ‘flaming’
(Jane 2014a, 2014b, 2015). My case is that a new descriptor is required in order to gather under one heading a
variety of denunciatory forms that share characteristic, signal features and so demand a broad field of inquiry.
Further, while scholarly coverage of discourse designated by terms such as ‘trolling’ and ‘flaming’ is of enormous
assistance in understanding the current circulation of hostile discourse on the Internet, it is also associated with
a tendency across a range of disciplines to underplay, overlook, ignore or otherwise marginalize the prevalence
and serious ethical and material ramifications of these new media discourses and practices (Jane 2015). As such,
my hope is that deploying a new term will assist in underlining the prevalence, rhetorical noxiousness and stark
misogyny of contemporary hostility on the Internet and social media platforms.
3.  For examples, see: Herring 2002; Herring et al. 2002.
4.  Citron, for instance, provides a meticulous survey of the various ways gendered cyber-hate, cyber-harassment and
cyber-stalking are trivialized, ignored and sometimes mocked by Internet users and media commentators, as well
as by those responsible for law enforcement, policy development and platform management (2014).
5.  I acknowledge that terms such as ‘second wave’, ‘third wave’, ‘fourth wave’ and ‘postfeminist’ are contested,
Downloaded by [Emory University] at 02:29 10 April 2016

imprecise and problematic in their tendency to flatten contexts, universalize women’s experiences and facilitate
intra-movement adversarialism (cf. Aronson 2003; Hall and Rodriguez 2003; Gillis and Munford 2004; Henry 2004;
Genz and Brabon 2009; Baumgardner 2011; Budgeon 2011). I will, however, use some wave-related terminology
because it provides a ‘useful shorthand’ for referencing ‘the broad strokes of feminist history’ (Baumgardner 2011).
I use the term ‘cyber feminism’ in the populist sense to describe feminists whose concerns and activist approaches
are primarily played out online, rather than in the tightly delineated sense found in feminist theory (cf. Consalvo
2003, 108–109; Nagle 2013a).
6.  Quinn’s ex-partner, Eron Gjoni, said later that this suggestion was erroneous. He claimed it had been included in
his lengthy blog dedicated to denouncing Quinn because of a typographical error (Gjoni 2014).
7.  It is important to tread carefully when making distinctions between ‘online’ and ‘offline’ abuse and harassment.
While much recent work in Internet studies rejects the online/offline dichotomy as ‘anachronistic’, given that
networked technologies have become integrated in most aspects of daily life (Buchanan 2011, 89: see also Jensen
2011), distinguishing between these domains may still be useful in that it can provide context about particular
instances of abuse. Certainly the anonymity and self-publishing opportunities associated with the cybersphere
facilitate mob attacks in ways that would simply not be possible offline. There is a risk, however, that attacks which
occur online are dismissed as ‘virtual’ rather than ‘real’ and are therefore not taken seriously. Cogent here is Henry
and Powell’s case that TFSV can result in embodied harms which may have at least as much impact on a personal
as traditional harms occurring against the physical body (2015).
8.  The canon of feminist literature outlining these issues is too vast to list here. Chris Beasley does, however, provide a
useful survey of feminist theorists which have drawn attention to the way mainstream social and political thoughts
have legitimated the subordination of women in social and political lives (1999). Women, for instance, have been
frequently presented as ‘partial beings’ and ‘helpmates’ in that they are defined in terms of men’s needs regarding
pleasure, provision of services, child rearing and so on (Beasley 1999, 6–7). Carole Pateman’s work is also instructive
in terms of providing an overview of the exclusion of women from the public sphere (1989; cf. Carver and Chambers
2011), while Susan Faludi provides one of the many accounts of the various ways women are controlled, shamed,
silenced or otherwise shut down if they are perceived to be, for example, ‘loud and self-determined’ (1993, 92–93).
9. ‘Hacktivism’ – a portmanteau of ‘hacking’ and ‘activism’ – refers to the unauthorized access to and disruption of
computer systems in the name of socio-political agendas.
10. ‘Scam-baiting’ is the practice of turning the tables on Internet scammers by scamming them back (cf. Rosenbaum
2007; Tom 2008).
11. A ‘denial-of-service’ (DoS) or ‘distributed denial-of-service’ (DDoS) attack results in a computer or online network
becoming unavailable to users.
12. A similar dynamic has been observed by Mary Beard who critiques media narratives that recast the troll as an
‘errant son’ and their target as a ‘scolding but forgiving mother – a Penelope who chastises Telemachus for being
rude, then patiently teaches him the error of his ways’ (cited in Mead 2014).
13. With regard to whether Pearce’s use of Facebook and Twitter constitutes a private or public act, I acknowledge the
liminality of cyber domains in that they involve, as Lange puts it, the ‘publically private’ as well as the ‘privately public’
(2007). I am still designating Pearce’s actions as being primarily ‘private’, however, because they were prosecuted
by her sans institutional support.
14. Indeed, Gjoni has justified his public character assassination of Quinn on the grounds that he was not being
vindictive but, as a survivor of her ‘emotional abuse’, simply wished to protect others (2014).
Continuum: Journal of Media & Cultural Studies  11

15. An example is the vicious vigilante campaign of on and offline retaliation directed at Lori Drew, a woman whose
online hoax was linked to the 2006 suicide of 13-year-old Megan Meier (Collins 2008).
16. While definitions of ‘trolling’ vary, in this paper, I am using the term interchangeably with ‘e-biling’.
17. ‘Don’t feed the trolls’ is the idea that ignoring Internet provocateurs will deprive them of the attention and reaction
they crave, and will therefore result in their retreat.

Disclosure statement
No potential conflict of interest was reported by the author.

Notes on contributor
Emma A Jane (previously known as Emma Tom) is an Australian Research Council (ARC) DECRA Fellow and a senior lecturer
at the University of New South Wales. Online misogyny, cyberbullying and digital mobs are the foci of her ongoing research
into the social and ethical implications of emerging technologies. She is currently running a three-year research project into
the impact of gendered cyberhate called ‘Cyberhate: the new digital divide?’. Prior to commencing her academic career,
Emma spent nearly 25 years working in the print, electronic and online media. She has published seven books including a
novel, Deadset, which won the Commonwealth Writers’ Prize for Asia and the South Pacific for Best First Novel in 1997. Her
Downloaded by [Emory University] at 02:29 10 April 2016

seventh book – Modern Conspiracy: The Importance of Being Paranoid, co-authored with Chris Fleming, was published
by Bloomsbury in August, 2014. Her eighth book, the fifth edition of Cultural Studies: Theory and Practice, co-authored
with Chris Barker, is currently in production with Sage. Emma is working on a new monograph on gendered cyberhate
which will be published by Sage in 2016.

References
Aronson, Pamela. 2003. “Feminists or ‘Postfeminists’?: Young Women’s Attitudes toward Feminism and Gender Relations.”
Gender and Society 17 (6): 903–922.
Baker, Katie J. M. 2013. “‘Twitter Silence’ Campaign Brings out the Worst in Everyone.” Jezebel, August 5. http://jezebel.com/
twitter-silence-campaign-brings-out-the-worst-in-ever-1029564175.
Battersby, Lucy. 2013. “Twitter Criticised for failing to Respond to Caroline Criado-Perez Rape Threats.” Sydney Morning
Herald, July 29. http://www.smh.com.au/digital-life/digital-life-news/twitter-criticised-for-failing-to-respond-to-caroline-
criadoperez-rape-threats-20130729-2qu8d.html.
Baumgardner, Jennifer. 2011. “Is There a Fourth Wave? Does It Matter?” feminist.com. http://www.feminist.com/resources/
artspeech/genwom/baumgardner2011.html.
Beasley, Chris. 1999. What is Feminism? An Introduction to Feminist Theory. London: Sage.
Boggioni, Tom. 2014. “Game Reviewer Strikes Back at Male Stalkers with a Brilliant New Ploy: Telling Their Moms.” Raw Story,
November 28. http://www.rawstory.com/rs/2014/11/gamergate-victim-strikes-back-at-male-stalkers-with-a-brilliant-
new-ploy-telling-their-moms/.
Boler, Megan, and Christina Nitsou. 2014. “Women Activists of Occupy Wall Street: Consciousness-raising and Connective
Action in Hybrid Social Movements.” In Cyberactivism on the Participatory Web, edited by Martha McCaughey, 232–256.
New York: Routledge.
boyd, danah. 2012. “Truth, Lies, and ‘Doxxing’: The Real Moral of the Gawker/Reddit Story.” Wired, October 29. http://www.
wired.com/2012/10/truth-lies-doxxing-internet-vigilanteism/.
Bracchi, Paul. 2013. “The Women-hating Twitter Trolls Unmasked: From a Respected Military Man to a Former Public
Schoolboy, Men Who Anonymously Spew out Vile Abuse Online.” Daily Mail Australia, August 3. http://www.dailymail.
co.uk/news/article-2383808/The-women-hating-Twitter-trolls-unmasked-from-respected-military-man-public-
schoolboy-men-anonymously-spew-vile-abuse-online.html#ixzz3NooehWln.
Braman, Sandra. 2011. “Internet Policy.” In The Handbook of Internet Studies, edited by Mia Consalvo and Charles Ess, 137–167.
West Sussex: Wiley-Blackwell.
Brügger, Niels, ed. 2010. Web History. New York: Peter Lang.
Buchanan, Elizabeth A. 2011. “Internet Research Ethics: Past, Present, and Future.” In The Handbook of Internet Studies, edited
by M. Consalvo and C. Ess, 83–108. Oxford: Wiley-Blackwell.
Budgeon, Shelley. 2011. Third Wave Feminism and the Politics of Gender in Late Modernity. Basingstoke: Palgrave Macmillan.
Buni, Catherine, and Soraya Chemaly. 2014. “The Unsafety Net: How Social Media Turned against Women.” Atlantic, October
9. http://www.theatlantic.com/technology/archive/2014/10/the-unsafety-net-how-social-media-turned-against-
women/381261/?single_page=true.
Byrne, Dara N. 2013. “419 Digilantes and the Frontier of Radical Justice Online.” Radical History Review 117 (Fall): 70–82.
Carver, Terrell, and Samuel A. Chambers, eds. 2011. Carole Pateman: Democracy, Feminism, Welfare. Oxon: Routledge.
12 E. A. Jane

Chen, Adrian. 2012. “Unmasking Reddit’s Violentacrez, the Biggest Troll on the Web.” Gawker, October 12. http://gawker.
com/5950981/unmasking-reddits-violentacrez-the-biggest-troll-on-the-web.
Citron, Danielle Keats. 2009. “Law’s Expressive Value in Combating Cyber Gender Harassment.” Michigan Law Review 108:
373–415.
Citron, Danielle Keats. 2010. “Civil Rights in Our Information Age.” In The Offensive Internet, edited by Saul Levmore and
Martha C. Nussbaum, 31–49. Cambridge, MA: Harvard University Press.
Citron, Danielle Keats. 2014. Hate Crimes in Cyberspace. Cambridge, MA: Harvard University Press.
Coldewey, Devin. 2013. “Dawn of the Digilante.” TechCrunch, April 21. http://techcrunch.com/2013/04/21/dawn-of-the-
digilante/.
Colesky, Michael R., and Johan van Niekerk. 2012. “Hacktivism – Controlling the Effects.” Paper presented at the 14th
Annual Conference on World Wide Web Applications, Cape Peninsula University of Technology, Durban, South Africa,
November 7–9.
Collins, Lauren. 2008. “Friend Game: Behind the Online Hoax That Led to a Girl’s Suicide.” New Yorker, January 21. http://
www.newyorker.com/magazine/2008/01/21/friend-game.
Consalvo, Mia. 2003. “Cyberfeminism.” In Encyclopedia of New Media: An Essential Reference to Communication and Technology,
edited by Steve Jones, 108–109. New York: Sage.
Crews, Clyde Wayne, Jr. 2006. “Giving Chase in Cyberspace: Does Vigilantism against Hackers and File-sharers Make Sense?”
CEI nPoint, No. 109, October 24. http://www.cei.org/pdf/5569.pdf.
Day, Elizabeth. 2013. “Caroline Criado-Perez: ‘I Don’t Know If I Had a Kind of Breakdown’.” Guardian, December 8. http://
Downloaded by [Emory University] at 02:29 10 April 2016

www.theguardian.com/society/2013/dec/08/caroline-criado-perez-jane-austen-review-2013.
Dewey, Caitlin. 2014. “Rape Threats, Then No Response: What It Was like to Be a Woman on Twitter in 2014.” Washington Post,
December 17. http://www.washingtonpost.com/news/the-intersect/wp/2014/12/17/rape-threats-then-no-response-
what-it-was-like-to-be-a-woman-on-twitter-in-2014/.
Dowell, Ben. 2013. “Mary Beard Row: Website Owner Says Sorry but Accuses Friends of ‘Trolling’.” Guardian, January 25.
http://www.theguardian.com/media/2013/jan/25/mary-beard-row-website-apologises.
Duggan, Maeve. 2014. “Online Harassment.” Pew Research Internet Project, October 22. http://www.pewinternet.
org/2014/10/22/online-harassment/.
Dumsday, Travis. 2009. “On Cheering Charles Bronson: The Ethics of Vigilantism.” The Southern Journal of Philosophy 47
(1): 49–67.
Essert, Matt. 2014. “This Woman’s Response to Online Rape Threats Deserves a Standing Ovation.” Mic, November 28. http://
mic.com/articles/105272/one-woman-has-the-perfect-response-to-online-rape-threats.
Faludi, Susan. 1993. Backlash: The Undeclared War against Women. London: Vintage.
“Gamer Alanah Pearce Responds to Online Rape Threats in the Perfect Way.” 2014. Inquisitr, November 29. http://www.inquisitr.
com/1642205/gamer-alanah-pearce-responds-to-online-rape-threats-in-the-perfect-way/#zAvufwBKSyAGZb4h.99.
Genz, Stéphanie, and Benjamin A. Brabon. 2009. Postfeminism: Cultural Texts and Theories. Edinburgh: Edinburgh University
Press.
Gillis, Stacy, and Rebecca Munford. 2004. “Genealogies and Generations: The Politics and Praxis of Third Wave Feminism.”
Women’s History Review 13 (2): 165–182.
Gjoni, Eron. 2014. “Why Does This Exist?” Thezoepost, August 16. https://thezoepost.wordpress.com/.
Graham, Kim. 2013. “Add a Report Abuse Button to Tweets.” change.org. https://www.change.org/p/twitter-add-a-report-
abuse-button-to-tweets.
Griffin, Michelle. 2011. “Writer Hardy Pays up in Legal Row over Wrong Online Shaming.” Age, December 27. http://
www.theage.com.au/technology/technology-news/writer-hardy-pays-up-in-legal-row-over-wrong-online-shaming-
20111226-1pagk.html.
Guthrie, Steph. 2012. “Why is This Conversation Necessary?” Storify. https://storify.com/WiTOpoli/why-is-this-conversation-
necessary-ben-spurr.
Guthrie, Steph. 2013. “The Problem with ‘Don’t Feed the Trolls’.” TEDxToronto, October 1. https://www.youtube.com/
watch?v=_KHEkR5yb9A.
Hai-Jew, Shalin. 2014. “Vengeance Culture Online: A Qualitative Meta-analysis and Position Paper.” In Human Rights and the
Impact of ICT in the Public Sphere: Participation, Democracy, and Political Autonomy, edited by Christina M. Akrivopoulou
and N. Garipidis, 64–93. Hershey, PA: Information Science Reference.
Halder, Debarati, and K. Jaishankar. 2011. “Online Social Networking and Women Victims.” In Cyber Criminology, edited by
K. Jaishankar, 299–316. Boca Raton, FL: CRC Press.
Hall, Elaine J., and Marnie Salupo Rodriguez. 2003. “The Myth of Postfeminism.” Gender and Society 17 (6): 878–902.
Harding, Sandra. 2004. The Feminist Standpoint Theory Reader: Intellectual and Political Controversies. New York: Routledge.
Henry, Astrid. 2004. Not My Mother’s Sister: Generational Conflict and Third-wave Feminism. Bloomington: Indiana University
Press.
Henry, Nicola, and Anastasia Powell. 2015. “Embodied Harms: Gender, Shame, and Technology-facilitated Sexual Violence.”
Violence Against Women 21 (6): 758–779. doi:10.1177/1077801215576581.
Herring, Susan C. 2002. “Cyber Violence: Recognizing and Resisting Abuse in Online Environments.” Asian Women 14
(Summer): 187–212.
Continuum: Journal of Media & Cultural Studies  13

Herring, Susan C., Kirk Job-Sluder, Rebecca Scheckler, and Sasha Barab. 2002. “Searching for Safety Online: Managing
‘Trolling’ in a Feminist Forum.” The Information Society 18 (5): 371–384.
Hess, Amanda. 2014. “Why Women Aren’t Welcome on the Internet.” Pacific Standard, January 6. http://www.psmag.com/
navigation/health-and-behavior/women-arent-welcome-internet-72170/.
Hudson, Laura. 2014. “Gamergate Goons Can Scream All They Want, but They Can’t Stop Progress.” Wired, October 21. http://
www.wired.com/2014/10/the-secret-about-gamergate-is-that-it-cant-stop-progress/.
Jane, Emma A. 2014a. “‘Your a Ugly, Whorish, Slut’.” Feminist Media Studies 14 (4): 531–546.
Jane, Emma A. 2014b. “‘Back to the Kitchen, Cunt’: Speaking the Unspeakable about Online Misogyny.” Continuum – Journal
of Media & Cultural Studies 28 (4): 558–570.
Jane, Emma A. 2015. “Flaming? What Flaming? The Pitfalls and Potentials of Researching Online Hostility.” Ethics and
Information Technology 17 (1): 65–87. doi:10.1007/s10676-015-9362-0.
Jason, Zachary. 2015. “Game of Fear.” Boston Magazine, May. http://www.bostonmagazine.com/news/article/2015/04/28/
gamergate/.
Jensen, Klaus Bruhn. 2011. “New Media, Old Methods – Internet Methodologies and the Online/Offline Divide.” In The
Handbook of Internet Studies, edited by M. Consalvo and C. Ess, 43–58. Oxford: Wiley-Blackwell.
Jenson, Jennifer, and Suzanne de Castell. 2013. “Tipping Points: Marginality, Misogyny and Videogames.” Journal of
Curriculum Theorizing 29 (2): 72–85.
Klee, Miles. 2014. “The Perfect Way to Deal with Rape-threat Trolls: Tell Their Moms.” Daily Dot, November 28. http://www.
dailydot.com/lol/telling-moms-their-sons-make-rape-threats/.
Downloaded by [Emory University] at 02:29 10 April 2016

Kurp, Josh. 2014. “This Woman is Contacting the Moms of Boys Who Threaten to Rape Her on Facebook.” Uproxx, November
28. http://uproxx.com/webculture/2014/11/this-woman-is-contacting-the-moms-of-boys-who-threaten-to-rape-her-
on-twitter/.
Lange, Patricia G. 2007. “Publicly Private and Privately Public: Social Networking on YouTube.” Journal of Computer-Mediated
Communication 13 (1): 361–380.
Lynch, Alison. 2014. “When Boys Send This Woman Rape Threats on Facebook, She Tells Mum on Them.” Metro, November
28. http://metro.co.uk/2014/11/28/when-boys-send-this-woman-rape-threats-on-facebook-she-tells-mum-on-
them-4966287/.
Marcetic, Branko. 2014. “#Gamergate is Really about Terrorism: Why Bill Maher Should Be Vilifying the Gaming Community,
Too.” Salon, October 24. http://www.salon.com/2014/10/23/gamergate_is_really_about_terrorism_why_bill_maher_
should_be_vilifying_the_gaming_community_too/.
Mastronardi, Em. 2014. “Charlotte’s Law – Tougher Cyber Bullying Legislation.” change.org. https://www.change.org/p/
malcolm-turnbull-charlotte-s-law-tougher-cyber-bullying-legislation.
Mead, Rebecca. 2014. “The Troll Slayer: A Cambridge Classicist Takes on Her Sexist Detractors.” New Yorker, September 1.
http://www.newyorker.com/magazine/2014/09/01/troll-slayer.
Megarry, Jessica. 2014. “Online Incivility or Sexual Harassment? Conceptualising Women’s Experiences in the Digital Age.”
Women’s Studies International Forum 47: 46–55.
Mossberger, Karen. 2009. “Toward Digital Citizenship: Addressing Inequality in the Information Age.” In Routledge Handbook
of Internet Politics, edited by Andrew Chadwick and Philip N. Howard, 173–185. New York: Routledge.
Munro, Ealasaid. 2013. “Feminism: A Fourth Wave?” Political Insight 4 (2): 22–25. doi:10.1111/2041-9066.12021.
Murphy, Samantha. 2012. “New Hacktivist Sect Emerges from Anonymous.” New Scientist 2861, April 20. http://www.
newscientist.com/article/mg21428615.200-new-hacktivist-sect-emerges-from-anonymous.html#.VLA66oqUfiQ.
Nagle, Angela. 2013a. “Not Quite Kicking off Everywhere: Feminist Notes on Digital Liberation.” In Internet Research, Theory
and Practice: Perspectives from Ireland, edited by Cathy Fowley, Claire English, and Sylvie Thouësny, 157–176. Dublin:
Research-publishing.net.
Nagle, Angela. 2013b. “Noises from beneath.” Dublin Review of Books, December 2. http://www.drb.ie/essays/noises-from-
beneath
Nakamura, Lisa. 2014. “‘I WILL DO EVERYthing That Am Asked’: Scambaiting, Digital Show-space, and the Racial Violence
of Social Media.” Journal of Visual Culture 13 (3): 257–274.
O’Neill, Brendan. 2011. “The Campaign to ‘Stamp out Misogyny Online’ Echoes Victorian Efforts to Protect Women from
Coarse Language.” Telegraph, November 7. http://blogs.telegraph.co.uk/news/brendanoneill2/100115868/the-
campaign-to-stamp-out-misogyny-online-echoes-victorian-efforts-to-protect-women-from-coarse-language/.
Parker, Jameson. 2014. “Woman’s Perfect Way to Handle Online Rape Threats She Gets – Contact Senders’ Moms.” Addicting
Info, November 28. http://www.addictinginfo.org/2014/11/28/womans-perfect-way-to-handle-online-rape-threats-she-
gets-contact-senders-moms/.
Pateman, Carole. 1989. The Disorder of Women. Stanford: Stanford University Press.
Penny, Laurie. 2014. Unspeakable Things: Sex, Lies and Revolution. London: Bloomsbury.
Ramsdell, Catherine. 2014. “‘Hate Crimes in Cyberspace’ Shows Us the Steps to Overcome Online Bullying and Terror.”
PopMatters, December 19. http://www.popmatters.com/review/188665-hate-crimes-in-cyberspace-by-danielle-keats-
citron/.
14 E. A. Jane

Randol, Elizabeth F. 2005. “Homeland Security and the Co-optation of Feminist Discourse.” In Women and Children First:
Feminism, Rhetoric, and Public Policy, edited by Sharon M. Meagher and Patrice DiQuinzio, 17–36. Albany: State University
of New York.
Readhead, Harry. 2014. “Glasgow Bin Lorry Crash: Internet Trolls Unmasked following Offensive Posts.” Metro.co.uk,
December 24. http://metro.co.uk/2014/12/24/glasgow-bin-lorry-crash-internet-trolls-unmasked-following-offensive-
posts-4998439/.
Ronson, Jon. 2015. “How One Stupid Tweet Blew up Justine Sacco’s Life.” The New York Times Magazine, February 12. http://
www.nytimes.com/2015/02/15/magazine/how-one-stupid-tweet-ruined-justine-saccos-life.html?_r=0.
Rosenbaum, Ron. 2007. “How to Trick an Online Scammer into Carving a Computer out of Wood: Ingenious Acts of Cyber-
vengeance.” Atlantic, June 1. http://www.theatlantic.com/magazine/archive/2007/06/how-to-trick-an-online-scammer-
into-carving-a-computer-out-of-wood/305903/.
Rosenbaum, H. Jon, and Peter C. Sederberg. 1976. “Vigilantism: An Analysis of Establishment Violence.” In Vigilante Politics,
edited by H. Jon Rosenbaum and Peter C. Sederberg, 3–29. Philadelphia: University of Pennsylvania Press.
Rothrock, Kevin. 2015. “The ‘Beauty’ of Russian Homophobia.” Global Voices, April 20. https://globalvoicesonline.
org/2015/04/20/the-beauty-of-russian-homophobia/.
Rudd, Mathilda. 2014. “Alanah Pearce Received Rape Threats. What She Did Next Will Impress You.” Mamamia, November 30.
http://www.mamamia.com.au/social/alanah-pearce-online-rape-threats/?utm_source=edm&utm_medium=mc&utm_
campaign=daily.
Salter, Michael. 2013. “Justice and Revenge in Online Counter-publics: Emerging Responses to Sexual Violence in the Age
Downloaded by [Emory University] at 02:29 10 April 2016

of Social Media.” Crime Media Culture 9 (3): 225–242.


Sandoval, Greg. 2013. “The End of Kindness: Weev and the Cult of the Angry Young Man.” Verge, September 12. http://www.
theverge.com/2013/9/12/4693710/the-end-of-kindness-weev-and-the-cult-of-the-angry-young-man.
Sarkeesian, Anita. 2012a. “Image Based Harassment and Visual Misogyny.” Feminist Frequency, July 1. http://www.
feministfrequency.com/2012/07/image-based-harassment-and-visual-misogyny/.
Sarkeesian, Anita. 2012b. “TEDxWomen Talk about Online Harassment & Cyber Mobs.” Feminist Frequency, December 5.
http://www.feministfrequency.com/2012/12/tedxwomen-talk-on-sexist-harassment-cyber-mobs/.
Schuster, Julia. 2013. “Invisible Feminists? Social Media and Young Women’s Political Participation.” Political Science 65 (1):
8–24.
Schwartz, Mattathias. 2008. “The Trolls among Us.” New York Times, August 3. http://www.nytimes.com/2008/08/03/
magazine/03trolls-t.html?pagewanted=all.
Sierra, Kathy. 2014. “Why the Trolls Will Always Win.” Wired, October 8. http://www.wired.com/2014/10/trolls-will-always-
win/.
Smith, Lydia. 2014. “Domestic Violence and Online Abuse: Half UK Survivors Experience Trolling in ‘Tidal Wave of Hate’.”
International Business times, March 1. http://www.ibtimes.co.uk/domestic-violence-online-abuse-half-uk-survivors-
experience-trolling-tidal-wave-hate-1438420.
Sprague, Joey. 2005. Feminist Methodologies for Critical Researchers: Bridging Differences. Walnut Creek, CA: AltaMira Press.
Stone, Talitha. 2013. “@TwitterAU: It’s Time for a Zero-tolerance to Rape Threats Policy.” change.org. https://www.change.
org/p/twitterau-it-s-time-for-a-zero-tolerance-to-rape-threats-policy.
Stuart, Keith. 2014a. “Brianna Wu and the Human Cost of Gamergate: ‘Every Woman I Know in the Industry is Scared’.”
Guardian, October 18. http://www.theguardian.com/technology/2014/oct/17/brianna-wu-gamergate-human-cost.
Stuart, Keith. 2014b. “Zoe Quinn: ‘All Gamergate Has Done is Ruin People’s Lives’.” Guardian, December 4. http://www.
theguardian.com/technology/2014/dec/03/zoe-quinn-gamergate-interview.
True, Everett. 2014. “The Gaming Journalist Who Tells on Her Internet Trolls – To Their Mothers.” Guardian, November 28.
http://www.theguardian.com/culture/australia-culture-blog/2014/nov/28/alanah-pearce-tells-on-her-internet-trolls-
to-their-mothers.
*Tom, Emma. 2008. “It’s Not a Pretty Picture When Scam-baiters Take It Too Far.” Australian, November 13. http://www.
theaustralian.com.au/news/when-scam-baiters-take-it-too-far/story-e6frg6n6-1111118018653.
Tuovinen, Lauri, and Juha Röning. 2007. “Baits and Beatings: Vigilante Justice in Virtual Communities.” Published in the
proceedings of the 7th International Conference of Computer Ethics; Philosophical Enquiry, Trondheim, 397–405.
West, Patrick. 2015. “Stop Taking Twitter Death Threats Seriously.” Spiked, April 22. http://www.spiked-online.com/newsite/
article/stop-taking-twitter-death-threats-seriously/16895#.VUKwIK2qpBc.
Wheeler, Deborah L. 2011. “Does the Internet Empower? A Look at the Internet and International Development.” In The
Handbook of Internet Studies, edited by Mia Consalvo and Charles Ess, 188–211. West Sussex: Wiley-Blackwell.
White, Aaronette, and Shagun Rastogi. 2014. “Justice by Any Means Necessary: Vigilantism among Indian Women.” In Gender,
Globalization, and Violence: Postcolonial Conflict Zones, edited by Sandra Ponzanesi, 214–228. New York: Routledge.
*Previously I published as ‘Emma Tom’.

You might also like