Free Essay

Cyber Mobs

In:

Submitted By dysty2
Words 1373
Pages 6
Online harassment and Cyber Mobs

Woman on the Internet encounter harassment online every single day, just because they make a public profile online. This is becoming more and more common, and happens a lot to online streamers, Bloggers and politicians. The fact that this happens mostly to women, it makes is very discriminating.

Anita Sarkeesian posted her speech on the website ‘’ Feminist Frequency’’ in December 2012. She launched a campaign where the object was to look at how women outstand in the world of video gaming. A bunch of male gamers weren’t too exited about this. They took it further and created an online hate campaign against Anita Sarkeesian. The issue of online harassment of women is pretty big. In an other article, ‘’Online harassment of women is a problem. Here’s what to do about it’’1, written by Timothy B. Lee, he writes about a woman who has experienced online harassment. A woman named Amanda Hess has got a lot of tweets from angry men. ‘’(…) Someone going by the name ‘headlessfemalepig’ had sent me seven tweets…. ‘’Happy to say we live in the same state. I’m looking you up, and when I find you, Im going to rape you and remove your head’’ ‘’. Hess was feeling terrified and embarrassed for being scared. What is the purpose of harassing women? Is it because the ones who hares women think we are weak and we just deserve it? Well, this tweet was a threat and Amanda Hess dialed 911. Even though we all know that threats of violence are illegal, the online harassments in the form of treats, isn’t a priority for the police departments. The online harassment is just as serious as a sexual harassment at a workplace. But the problem is, the harassment in a workplace has a higher priority than harassment on the Internet. The police will not do anything about it. It doesn’t make a difference whether the harassment is online or at a workplace. The women are offended in the same way in both situations.

Timothy B. Lee writes, ‘‘the problem is that police and prosecutors haven't made it a priority to prosecute those who make threats online. If people who wrote this kind of thing started winding up in jail, it would make the Internet a little more hospitable for our mothers, sisters and daughters.’’ The perpetrators should really learn from their mistakes, but no one does anything about it and they can just keep harassing women. The Internet isn’t safe for the

1 http://www.washingtonpost.com/blogs/the-­‐switch/wp/2014/01/07/online-­‐harassment-­‐ of-­‐women-­‐is-­‐a-­‐problem-­‐heres-­‐what-­‐to-­‐do-­‐about-­‐it/ female users, they are too afraid. What if one of those perpetrators really made their threats physical, what would happen? The harassment is too real. But I believe the fact that when a perpetrator threatens a woman online and then physically harassing the woman afterwards, the police would see it as a high priority. It’s wrong that only the physical crimes are taken serious, but the crime and harassing on the Internet doesn’t mean a thing to the government or the forces of law and order. The online harassing is just wrong.

‘’And Congress had good reasons to exempt intermediaries such as Twitter from liability for the vile comments of their users’’. Of course the intermediaries shouldn’t be blamed for the harassment on their social website, but I do think that they should take care of the victims. They can’t just ignore the harassment of the female users; they should really do something about it. The intermediaries should delete or ban the perpetrators instead of letting them harass women every single day. How can a social website accept it? It is supposed to be safe to be on the social network and women shouldn’t be harassed, just because they use their freedom of speech to express something. Why aren’t men being harassed when they say something that might offend people? Simply because they are men. They obviously have more right to say something than women has.

If you take a look at how Anita Sarkeesian engages her audience, she does it in different ways.

In the video of her talking to her audience, she shows picture slides all the way through the speech. The first one she shows is of her sitting in her living room playing a videogame. She has been playing since she was 10. ‘’This is a photo of me at age 10 playing Super Mario World on the Super Nintendo, so I’ve been playing games for quite a while’’ The picture indicates that it’s totally normal for a girl to play a videogame just as it is for boys. As Anita says ‘’games have lots of positive benefits as well.’’ But her problem was, that in all these videogames the women are shown as ‘’sexually objectified, stereotyped and downright oppressive portrayals of women in any medium’’. She shows a picture of the sexually objectified women, to show ‘’non-­‐gamers’’ what she actually means and to show how women are portrayed. It’s used as her ‘proof’. That’s why she started the fundraising campaign, to look at the way women are represented.

The most conspicuous way she engage her audience, is by showing a slide with all of the harassment messages she received and all the threats. She wants to show her audience how outrageous the men and their messages can be. That’s her pathos. It makes us sympathize

with her and it kind of reveal an inner rage, but then again I think it’s a feeling of unintentional rage because we don’t now how it feels to be harassed if we haven’t experienced it. But her way, by using photos of all the violent and harassing messages, we read and understand the problem of the harassment and how horrible and awful it must feel to be harassed. She also shows a slide of the game that some of the perpetrators has made. It is again to show how outrageous it is and how far people actually go, to stop what they think is wrong. Anita also engages her audience by asking questions and answering them, to explain how their game works. She wants people to understand how the perpetrators work together and how they search for acknowledgement by showing off what they did to harass a woman.

As Anita Sarkeesian says: ‘’We can kind of think of this as an informal reward system where players earn ‘’internet points’’ for increasingly brazen and abusive attacks. Then they would document these attacks, and they would bring them back to the message boards as evidence to show off to each other – kind of like trophies or achievements’’

At the end she tells the audience about her own ‘achievements’, to show people how important it is to keep going strong and fight till you reach your goal, even though there’s a lot of people who would like to get you down. She tells that she raised 25 times what she asked for and that 7000 individuals contributed to make her project bigger and better. Even a lot of gamers are fed up with the way women are being treated and they speak up.

Her project started out to be just a little fundraising project to be a full time endeavor.

To keep fighting and to keep going strong is her message of her speech. In the end of her speech she says: ‘’Every day I am encouraged by the women who persevere, who continue to engage, and who refuse to be silenced. I truly believe that if we work together, we can create a culture shift where women, without fear of intimidation, without fear of threats or harassment, can be full and active participants in our digital world.’’ In this quotation, the message of the speech is clearly shown. Her goal and message is for women to be strong, ignore the harassment and live without fear. If all the women work together, they can support each other against misogyny and still be active participants in the digital world. It is a online fight being fought and the perpetrators are not going to win. The women should fight until they are

Similar Documents

Premium Essay

Online Harassment and Cyber Mob

...Online Harassment and Cyber Mobs Even though sexism has been fortunately eradicated in many areas of society, and not something that we noticed in our daily lives, it is unfortunately something that takes place. Women are often objectified throughout the social medias, such as video games, and it can have fatal consequences for the victims. There is no doubt that cyber bullying is a big problem. One of those who couldn’t tolerate it anymore was Anita Sarkeesian. She launched and online fundraising campaign on the Internet, called “Feminist Frequency”, to create awareness of how we use the women as a sexual stereotype in videogames. This is also the theme or topic of the speech, that she held at the TEDxWomen event in 2012. _______________________________ Anita Sarkeeshian begins her speech by telling the audience a little presentation about herself, who she is, and that she for four years has run a video web series on YouTube, about sexism and women’s representation in the social medias. Sarkesshian is a women feminist, and a really independent woman, who also have been punished for her opinion. She is extremely well spoken and organized, and has some amazing points, that she through the speech shows. Her main focus in the speech is the video gaming industry, as she says: “It is no secret that the video game industry boasts some of the most sexually objectified, stereotyped and downright oppressive portrayals of women in any medium“ (Page 1 lines 13-14). The gaming...

Words: 912 - Pages: 4

Free Essay

Flash Mob Robberies

...Flash Mob Robberies Americans, despite their religion, race, ethnicity, or gender, never gave much thought to the terms like “flash mob robberies” or “organized looting.” However, these expressions have become acknowledge to the American society due to their criminal nature and the alarming frequency in which they take place. Historically, a flash mob was clearly an assembly of people who unexpectedly appeared at the same location at the same time. Now, flash mobs began to incorporate robberies, but they occurred infrequently across the country. Unfortunately, because of the economic collapse, flash mobs have become very notorious and are increasing in numbers in turning into criminal action in attempt to survive in America. Adolescents take advantage of social media, such as Facebook, and Twitter, to organize large group of other adolescents to assemble at a certain time and place. Once assembled, the large groups of delinquents run into a store steal as much merchandise as they can in a very short period of time. This is so the retail merchant does not have time to react. As a result, the once unfamiliar term is no notoriously known amongst all Americans. All across the country, retailers and other Americans have personally witnessed and reported multiple flash mob incidents. Law enforcement officers have recognized the accuracy of the flash mop epidemic and are taking the criminal manner very seriously. There are two important elements which make flash...

Words: 998 - Pages: 4

Free Essay

The Departed

...The Departed and the Irish Mob While not as talked about as the Italian mafia, the Irish Mob is just as violent and proficient in their ways. Taking place in South Boston, the departed depicts a fictitious, but only just, account of the struggle between the Massachusetts State Police and the Irish Mob. Leonardo Dicaprio’s character Billy Costigan is a new member of the MSP and is chosen to become an undercover officer because of his background. Costigan’s father was from South Boston, and Costigan spent time there as a child. He infiltrates the Irish Mob, headed by Jack Nicholson’s character Frank Costello. Frank is the violent head of the Irish Mob that seems to never really be convicted of his crimes. We later come to find out that is in part because of his status as an FBI informant. Costello has an informant in the MSP by way of Matt Damon’s character Colin Sullivan. Sullivan grew up in Costello’s neighborhood and Costello was almost a father figure to him. With his loyalty to Costello, Sullivan was convinced to join the MSP and feed information to Costello. As the movie progresses, both Sullivan and Costigan find out about each other as “rats”, but not necessarily each other’s identities until towards the end. Sullivan upon finding out who Costigan is, erases his file after the death of Captain Queenan at the hands of the Irish Mob and the dismissal of Sargent Dignam. In the end Barrigan, another one if Costello’s men on the inside, shoots Costigan and Sullivan’s partner...

Words: 673 - Pages: 3

Premium Essay

Teens and Social Media

...are naturally anxious to meet new people and possibly make new friends and contacts. Online social media provide the perfect setting to do exactly that. Teenagers are able to interact with people from all over the world. This serves to not only increase their general knowledge but it enables this generation to be more tolerant of cultures and beliefs that differ from their own. New technology including smart phones with video and photo capabilities, iPad and other tablets, and portable Wi-Fi docs have made the Internet infinitely more assessable (Wolak, Mitchell & Finkelhor, 2006). Although technology has been associated with many positive effects, cyber bullying, sexting and slut shaming among teens are detrimental practices that have been encouraged by the advancement of technology owing to the obscurity that the cyber space provides. The first practice that this paper will focus on is bullying among teenagers, a form of intimidation that can take different forms and has been in existence since time immemorial. While the internet provides opportunities for self-affirmation...

Words: 1560 - Pages: 7

Free Essay

Information Technology

...with people being able to share ideas thus enhancing diversity (Thomas, 123-145). However, social media has negative effects as well. It is not possible to determine if a relationship developed over social media is meaningful. Many casual relationships have been nurtured through social media and in due course, some have been a source of misery to many people. Social media has been used by predators to advance negative actions to vulnerable people such as kids. Most of them have become victims of cyber-bullying and made to undergo terror experiences under the watch of their parents and peers. The consequence of cyber-bullying may be tragic and disappointing to the victim. Although social media has its positive benefits to the society, the negative effects are more aching to the target and therefore there is need for action. This is achievable by enhancing parental and institutional rules to control cyberspace and limit the negative effects associated with social media such as cyber bullying....

Words: 331 - Pages: 2

Premium Essay

Contemporary Heroes

...1. An overview on cyberbullying in higher education. This article defines bullying as “repeated intimidation, over time, of a physical, verbal, and Psychological nature of a less powerful person by a more powerful person or group of persons”. To date, 18 states have laws to address cyberbullying, compared with 49 states, all except Montana, having laws to address bullying (Hinduja & Patchin, 2013). State laws primarily focus on cyberbullying that occurs on K-12 campuses, and each state requires school district to have policies against bullying. In a K-12 environment, cyberbullying that occurs off campus has been handed off to the parents. The expansion and use of communications technology, such as mobile and tablet devices, has allowed the bully to transform and follow his or her victim almost anywhere, at any time. Short story/example: White female student at Duke University. On May 2010, this female student developed a fake senior thesis as a PowerPoint presentation that described her sexual exploits with 13 male students at Duke University. In her fake thesis, she utilized each student’s real name and picture which, in some cases, showed the male student in his university athletic uniform. The female student emailed the fake thesis to three people she considered close friends, and the thesis was forwarded to others undoubtedly due to the salacious nature of the thesis (Seelye & Roberts, 2010). Eventually, the thesis ended up in the public domain on the blog...

Words: 388 - Pages: 2

Free Essay

Cyber Espionage - China and the United States

...Cyber Espionage Topics in Global Strategy Mike Dresser MGT 536 March 11, 2013 Cyber espionage is quickly becoming one of the most feared tactics around the world, but most recently, the computer spy game between China and the United States has been elevated to new levels. Just within the last few days, The New York Times broke a story pin pointing Coca Cola as one of the main targets of a Chinese sponsored cyber attack. Many believe this was largely due to discussions that Coca Cola had with China Huiyuan Juice Company regarding a potential acquisition. If it had gone through, this would have been the largest acquisition of a Chinese company by a foreign corporation. However, due to an elaborate Chinese cyber spy operation, they attempted to hack into Coke’s files to find information about Coca Cola’s negotiating strategy, and the deal was ultimately terminated because of deceptive practices. This is only the tip of the iceberg as cyber spy attacks are becoming more and more prevalent across the globe with no signs of slowing down. Mandiant, a cyber security company, also made front page news this past week when they published a full detailed report that traced a series of cyber attacks on a variety of U.S. companies, as well as many of our government agencies, such as the Department of Defense, NASA, and the Department of Commerce. Mandiant specifically identified a Shanghai based operation known...

Words: 774 - Pages: 4

Premium Essay

Cyber Bullying

...Difference Between Cyber Bullying Perpetration and Non-Physical Bullying: Relations to Race, Individual, and Family Predictors Abstract The research in this article is based upon finding a relationship between cyber-bullying perpetration with non-physical bullying. It also works on find the relatedness it has with race, home life, and other issues. They use children in grades 5th through 7th and use three time points, each six months apart. The article finds that cyber-bullying does have a significant overlap with non-physical bullying but when it is compared longitudinal there was less of an overlap. In today’s society, bullying has become a very big problem among adolescents. With all the new forms of communication with technology there has been a lot of cyber-bullying, specifically. It seems to be the new way to harass others and the fact that it is done through technology it makes it less obvious. The reason it is such a big problem though, is because the harassment some of the children endure have caused suicide. This article tries to find the relatedness it has with other factors of children’s lives. If some form of connection can be found then there can be a chance to find a way to stop the problem before it begins or to even see the signs of this type of bullying. For starters, what researchers have noticed is that cyber-bullying is something that is quite new to us today. Because of this it is a topic that is less understood by what the underlying...

Words: 2945 - Pages: 12

Premium Essay

Cyber Security

...Cyber security is a critical and growing issue in the world today. President Obama said this issue is, "one of the most serious economic and national security threats our nation faces" (Cybersecurity). The United States is one of the most computer dependent societies and has the most computer dependent military and intelligence agencies. With more and, more of our country being ran by technology we are at a bigger risk of attack. A cyber attack could be the most devastating attack our country has ever faced. An attack on America’s cyber infrastructure could cripple the country and put us at an even greater risk of a normal attack. FBI Director said “Counterterrorism — stopping terrorist attacks — with the FBI is the present number one priority. But down the road, the cyber threat, which cuts across all FBI programs, will be the number one threat to the country” (Paganini). The message is clear the cyber security threat we are facing today is a dangerous and growing threat that has serious offensive potential and is often difficult to detect or prevent. An attack on a nation’s critical infrastructure can be devastating and when you add the fact that cyber attacks often do not make themselves know until it is to late could make for a devastating first strike prior to an invasion. Cyber security is defined as measures taken to protect a computer or computer system (as on the Internet) against unauthorized access or attack. The term “cyber security threat” means...

Words: 2041 - Pages: 9

Free Essay

Cyber Bullying

...Cyber Bullying Table of Contents I. Cover page II. Table of Contents III. Report It only seems like yesterday that teachers would have to stand on the play ground during recess and monitor the bullies, who would try to take another child’s lunch money, or to take a note being passed around in the classroom that would read something like “I will see you on the play ground after school.” A way to help prevent your child from being one of the many bullying victims is to know what the risk factors are of your child becoming one of the bullying victims. When it comes to being a bullying victim, children, teens and adults are those who don't get along well with others, have few or no friends, is less popular than others, what color their skin is, or what kind of clothes they wear, because they wear glasses, and what kind of house they live in. Now here we are in the year 2011, dealing with an entirely different style of bullying, which we all know is called “CYBERBULLYING”. No longer are the days of having the teacher send the student to the principal’s office or a phone call home to mom and dad. Friends and family of victims are also taking part when cyber bullying occurs. They may find themselves in difficult situations where they are peer pressured into participating in the bullying, afraid that if they don't play along, or they could become a target. They may feel that they have no power to stop it or start feeling guilty for not having spoken out against the...

Words: 1506 - Pages: 7

Premium Essay

Corporate/Cyber Espionage

...Corporate/Cyber Espionage You’re the owner of ABC Candy Company and just about to debut your latest and greatest chocolate snack when your biggest rival over in Asia at XYZ Candies introduces its latest snack, that is almost a doppelganger to yours. Have you just been a victim to corporate cyber espionage or just extremely bad timing? In 2012 federal agencies alone reported 46,562 cyber security incidents compared to only 5,503 in 2006. In 6 years the number of incidents has multiplied over 8 times. (LUKAS, 2013) And what is the cost of this to companies in the U.S.? It is figured the price tag for this theft of information is at least 250 Billion dollars each year. This is significantly higher than what businesses pay each year, in federal corporate income taxes. (LUKAS, 2013) Meanwhile, McAfee provides an estimate encompassing global remediation costs to total a staggering $1 trillion per annum. (Paganini, 2013) Cyber corporate espionage attacks and threatens corporate America, government programs and individuals daily in new and unrelenting ways. But who is committing these attacks and why? How are individuals, groups, companies and even governments’ gaining access to supposed secure information? And how are you and corporate America going to detect and remove these threats from your daily lives? Let’s first start with just the basic definition of just what is corporate cyber espionage Cyber espionage is defined as the intentional use of computers or digital communications...

Words: 2686 - Pages: 11

Free Essay

The Technical Criminal

...Internet to the general public. This Internet for most can be a useful resource. From gathering research for an academic project to attending a board room meeting remotely, the Internet has proven to be key in many aspects of human life today. The Internet has also given way to a slue of new crimes and negative activity. Cyber stalking, Cyber bullying, exploitation, sex crimes, financial fraud and the use of viruses and malicious code are just a few things that have become prevalent on the information super highway. One of today’s largest concerns among parents is protecting their children from becoming victims of bullying. There was a time when you had to worry about the school bully running into while in the hallways of your school or out and about around your neighbor, but the situation surrounding bullying been given a technological advantage. Social media sites such, as Facebook.com, Twitter and Instagram have become the avenues for bullies to invade their victim’s homes and lives. In a recent cyber bullying case in Lakeland Florida, a 12-year-old Rebecca Sedgwick jumped to her death at a local cement plant. She had been the victim of at least 15 cyber bullies through many avenues. The torment for her started at her school and bled over to the Facebook.com. After she was taken out of school by her mother and closed her Facebook account she continued to receive harsh messages and...

Words: 1001 - Pages: 5

Premium Essay

Fire Investigator

...Cyber Bullying Stories: Tyler Tyler Clementi, 18, was a regular freshman who was passionate about playing the violin and was still new to his gay identity. Instead of enjoying college life at Rutgers University, his first semester proved to be a living hell, one he felt he had no way of escaping. Tyler had a roommate, Dharun Ravi, who had a hard time getting along with him and realized that Tyler liked to keep to himself most of the time. When Tyler informed his roommate that he would be hosting a male guest at their dorm room and asked for some privacy, Dharun went across the hall to his friend, Molly Wei and both of them streamed a video live from Tyler’s room using Dharun’s webcam, they say Tyler kissing another man and Dharun immediately began tweeting about it to friends and other Rutgers students and possibly, the entire world. On the same night, Tyler sent a request to the school’s administration asking for a single room citing the fact that his roommate had used a webcam to spy on him. The next day, Tyler made the same notification to Dharun that he would be receiving a male guest, this time Dharun tweeted that he would be live streaming the entire sexual tryst, and invited everyone to watch, but the viewing never occurred. The next day everyone woke up to the news that Tyler Clementi had jumped off a bridge into the Hudson river, his body was found hours later. His last communication with the world was a Facebook status declaring he was jumping off the bridge and...

Words: 526 - Pages: 3

Free Essay

Cyberbully

...are all social networking sites – and they’re all part of what is at present known as social media. In that respect, they’re various benefits of delivering social media in our fellowship. Such as, helping students with their educations, supporting the communities, improving relationships and establishing raw friends... Etc. But there are also negative consequences of social media, like posting everything about our personal lives, providing major distractions to people, and most importantly the increased use of social media has led to more suicides among today’s youth--a result of cyberbullying. Ever since the creation of social media had occurred there have been another type of bullying that’s in our everyday life. Today there is "Cyber Bullying," and although it is less physical than traditional forms of bullying, it can cause more devastating and long-lasting effects, As well, there are ways to help preclude this type of bullying and then that they would be less of a chance to induce these experiences in our spirit. Cyberbullying is another path to spread harm to other masses by employing the internet or other electronic communication devices to share embarrassing information about any other individual. The methods of cyberbullying are used in many forms, it can start by making up rumors about the victims, sending photos without their consent, making sexual remarks, and also most of the time threaten the victim’s life. The victims are likely to be aimed at females...

Words: 2084 - Pages: 9

Free Essay

Cyberterrorism

...in terrorist activities, including acts of deliberate, large-scale disruption of computer networks, especially of personal computers attached to the Internet, by the means of tools such as computer viruses. In short, cyber terrorism is a new language of war. What makes cyber terrorism so appealing for criminals? * Remote attacks - One of the primary advantages for terrorists is their ability to launch an attack on a designated area from anywhere in the world. A terrorist on the other side of the world sitting in front of a computer can launch an attack, route it through 50 different countries, cover his tracks so that it is nearly untraceable, and cause billions of dollars in damages and even fatalities. * Damage scope - Another attractive feature is scope of damage that can result. * Using cyberspace a terrorist can take control of traffic lights in a certain area and could take more lives in hundreds of deadly car accidents. * Electric Power System- The electrical power grid is a probable target for cyber terrorists.If the computer systems controlling these systems could be disrupted or shut down it could knock out power for many. This could lead to potential deaths if the system isn’t recovered in a timely manner. Examples of cyber terrorism * In 1998, ethnic Tamil guerrillas attempted to disrupt Sri Lankan embassies by sending large volumes of e-mail. The embassies received 800 e-mails a day over a two-week period. The messages read "We are...

Words: 441 - Pages: 2