Black hat trolling, white hat trolling, and hacking the attention landscape

6Citations
Citations of this article
36Readers
Mendeley users who have this article in their library.
Get full text

Abstract

In this paper, we analogize the practice of trolling to the practice of hacking. Just as hacking often involves the discovery and exploitation of vulnerabilities in a computer security landscape, trolling frequently involves the discovery and exploitation of vulnerabilities in a media or attention landscape to amplify messages and direct attention. Also like with hacking, we consider the possibility for a range of trolling personas: from black hat trolls who push an agenda that is clearly counter to the interests of the target, to gray hat trolls who exploit vulnerabilities to draw critical attention to unaddressed issues, and white hat trolls who could help proactively disclose vulnerabilities so that attack surface can be reduced. We discuss a variety of trolling techniques from dogpiling to sockpuppetry and also a range of possible interventions.

Cite

CITATION STYLE

APA

Goerzen, M., & Matthews, J. (2019). Black hat trolling, white hat trolling, and hacking the attention landscape. In The Web Conference 2019 - Companion of the World Wide Web Conference, WWW 2019 (pp. 523–528). Association for Computing Machinery, Inc. https://doi.org/10.1145/3308560.3317598

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free