, to see if you have full access to this publication.
Book Titles No access
Social Media Victimization
Theories and Impacts of Cyberpunishment- Authors:
- Publisher:
- 2022
Summary
Every week we read more and more stories of someone who commits suicide, gets fired, gets "canceled", abandoned, or worse, because of a conflict or misunderstanding involving social media. Using theories that originated in studies of extremism and terrorism, Jessica Emami analyzes the processes that drive people to punish others using social media. Professor Emami makes a case that "cyberpunishment" is driven by outrage against our personal sense of morality, and a deep desire for our act of punishment to be acknowledged by others. Moreover, she demonstrates that today's social media platforms are by their very structure unable to curb or resist cyberpunishment.
Keywords
Search publication
Bibliographic data
- Copyright year
- 2022
- ISBN-Print
- 978-1-7936-2964-7
- ISBN-Online
- 978-1-7936-2965-4
- Publisher
- Lexington, Lanham
- Language
- English
- Pages
- 92
- Product type
- Book Titles
Table of contents
ChapterPages
- Dedication No access
- Contents No access
- Foreword No access
- Acknowledgments No access
- Notes No access
- The First Modern Cancellation No access
- Modern Day Online Social Death Decrees No access
- Varieties of Cyberpunishment No access
- Social Death Decrees Vary, but Some Do Kill No access
- Moral Outrage: The Key to Internet Punishments No access
- Motivating Factors No access
- The Quest for Significance and Acknowledgment No access
- Terror Management Theory (TMT) No access
- Everybody Online Wants to Be a Hero No access
- The Media, a Material Culture Hero System No access
- Social Media Makes Digital “Fatwas” More Probable Than in the Physical World No access
- The Emergence of “Smart Mobs” No access
- Social Media Aggregate around Causes and Interests, not People No access
- The Internet and Social Media Are Forever No access
- Targeted, Identified, Memed No access
- The Social Media Panopticon: The Internet Sees All No access
- Possible Solutions to Mitigate Norm Enforcement Group Targeting No access
- Notes No access
- How the Online and Offline Environments Influence One Another No access
- Varieties of On- and Offline Relationships No access
- The Digital Pillory No access
- The Case of the “Stolen” Cellphone and the Shaming that Followed No access
- Third-Party Online Hatemongers: Neo-Nazis Using the Internet to Terrorize and Recruit No access
- Planning of Cruel Acts Especially for the Internet No access
- Curated Terrorism: ISIS’ Heinous “Movies” No access
- Livestreaming Terrorism and Slaughter: Online and Offline Meet No access
- Social Media Business Model and Algorithms Encourage Abuse No access
- Why Did I Post That? No access
- Notes No access
- Did the Media and Native American Community Overreact? No access
- The First Video Lied No access
- Notes No access
- Case Study of Profile Deception: The Tragedy of Professor James Aune No access
- Notes No access
- Veritas aut fictio? No access
- Redefining Convention No access
- The Future of News No access
- Notes No access
- Conclusion No access Pages 73 - 74
- Bibliography No access Pages 75 - 86
- Index No access Pages 87 - 90
- About the Author No access Pages 91 - 92





