{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,6]],"date-time":"2026-03-06T11:03:29Z","timestamp":1772795009856,"version":"3.50.1"},"reference-count":36,"publisher":"Wiley","issue":"1","license":[{"start":{"date-parts":[[2019,2,1]],"date-time":"2019-02-01T00:00:00Z","timestamp":1548979200000},"content-version":"vor","delay-in-days":396,"URL":"http:\/\/onlinelibrary.wiley.com\/termsAndConditions#vor"}],"content-domain":{"domain":["asistdl.onlinelibrary.wiley.com"],"crossmark-restriction":true},"short-container-title":["Proc. Assoc. Info. Sci. Tech."],"published-print":{"date-parts":[[2018,1]]},"abstract":"<jats:title>ABSTRACT<\/jats:title>\n                  <jats:p>The term \u201cinternet trolling\u201d has come to encompass a wide range of behaviours, ranging from abusive speech and hacking to sarcastic humour and friendly teasing. While some of these behaviours are clearly antisocial and, in extreme cases, criminal, others are harmless and may even have potential prosocial functions. This study is an attempt to disambiguate some of the competing and contrary interpretations of internet trolling by examining the perspectives of avid internet users for whom trolling is a familiar part of their online lives. Through data collected from in\u2010depth, semi\u2010structured interviews, a multifaceted picture of trolling emerges that is at odds with previous media characterizations of internet trolls as merely hateful bullies. On the contrary, most participants in this study did not consider trolling to be a serious problem and many did not consider harmful interactions to be trolling at all. This paper describes some of the defining characteristics of internet trolling in order to differentiate the harmful behaviours from the harmless. This work aims to contribute to the growing body of literature on internet trolling in the hopes of informing regulatory policy and educational initiatives concerning internet use and safety.<\/jats:p>","DOI":"10.1002\/pra2.2018.14505501009","type":"journal-article","created":{"date-parts":[[2019,2,1]],"date-time":"2019-02-01T16:52:19Z","timestamp":1549039939000},"page":"76-85","update-policy":"https:\/\/doi.org\/10.1002\/crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["\u201cBeing a butt while on the internet\u201d: Perceptions of what is and isn't internet trolling"],"prefix":"10.1002","volume":"55","author":[{"given":"Yimin","family":"Chen","sequence":"first","affiliation":[{"name":"University of Western Ontario Canada"}]}],"member":"311","published-online":{"date-parts":[[2019,2]]},"reference":[{"key":"e_1_2_6_2_1","first-page":"303","volume-title":"The Oxford handbook of internet psychology","author":"Barak A.","year":"2007"},{"key":"e_1_2_6_3_1","doi-asserted-by":"crossref","unstructured":"Bernstein M. Monroy\u2010Hern\u00e1ndez A. Harry D. Andr\u00e9 P. Panovich K. &Vargas G.(2011). 4chan and \/b\/: An analysis of anonymity and ephemerality in a large online community.Proceedings of AAAI 50\u201357.","DOI":"10.1609\/icwsm.v5i1.14134"},{"key":"e_1_2_6_4_1","doi-asserted-by":"publisher","DOI":"10.1080\/17512786.2011.648988"},{"key":"e_1_2_6_5_1","unstructured":"Brady K.(2018 March 24). We need to get tough on sickening Twitter abuse.The Sun. Retrieved fromhttps:\/\/www.thesun.co.uk\/news\/5892820\/karren-brady-twitter-abuse-trolls"},{"key":"e_1_2_6_6_1","doi-asserted-by":"publisher","DOI":"10.1191\/1478088706qp063oa"},{"key":"e_1_2_6_7_1","doi-asserted-by":"publisher","DOI":"10.1177\/0956797613490749"},{"key":"e_1_2_6_8_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.paid.2014.01.016"},{"key":"e_1_2_6_9_1","doi-asserted-by":"crossref","first-page":"99","DOI":"10.18574\/nyu\/9780814764077.003.0012","volume-title":"The social media reader","author":"Coleman G.","year":"2012"},{"key":"e_1_2_6_10_1","unstructured":"Dibbell J.(1998).A rape in cyberspace. Retrieved fromhttp:\/\/www.juliandibbell.com\/articles\/a-rape-in-cyberspace"},{"key":"e_1_2_6_11_1","first-page":"29","volume-title":"Communities in cyberspace","author":"Donath J.","year":"1999"},{"key":"e_1_2_6_12_1","unstructured":"Duggan M.(2017).Online harassment2017. Pew Research Center. Retrieved fromhttp:\/\/www.pewinternet.org\/2017\/07\/11\/online-harassment-2017"},{"key":"e_1_2_6_13_1","doi-asserted-by":"crossref","first-page":"23","DOI":"10.4324\/9780203948873-2","volume-title":"Internet culture","author":"Foster D","year":"1997"},{"key":"e_1_2_6_14_1","unstructured":"Fox S. &Rainie L.(2014).The Web at 25 in the U.S. Pew Research Center. Retrieved fromhttp:\/\/www.pewinternet.org\/files\/2014\/02\/PIP_25th-anniversary-of-the-Web_0227141.pdf"},{"key":"e_1_2_6_15_1","doi-asserted-by":"publisher","DOI":"10.1080\/17482798.2012.739756"},{"key":"e_1_2_6_16_1","doi-asserted-by":"publisher","DOI":"10.1177\/1461444805056007"},{"key":"e_1_2_6_17_1","doi-asserted-by":"publisher","DOI":"10.1515\/jplr.2010.011"},{"key":"e_1_2_6_18_1","unstructured":"Harmon A.H.&Metaxas P.(2010). How to create a Smart Mob: Understanding a social network capital.e\u2010Democracy Conference Germany. Retrieved fromhttp:\/\/cs.wellesley.edu\/~pmetaxas\/How-to-create-Smart-Mobs%20eDem2010.pdf"},{"key":"e_1_2_6_19_1","doi-asserted-by":"crossref","unstructured":"Hart S. W. &Klink M. C.(2017 November). 1st Troll Battalion: Influencing military and strategic operations through cyber\u2010personas. InCyber Conflict (CyCon US) 2017 International Conference on(pp.97\u2013104). IEEE.","DOI":"10.1109\/CYCONUS.2017.8167503"},{"key":"e_1_2_6_20_1","doi-asserted-by":"publisher","DOI":"10.4324\/9780203139943"},{"key":"e_1_2_6_21_1","doi-asserted-by":"publisher","DOI":"10.1080\/09662839.2017.1294162"},{"key":"e_1_2_6_22_1","doi-asserted-by":"publisher","DOI":"10.1080\/01972240290108186"},{"key":"e_1_2_6_23_1","doi-asserted-by":"publisher","DOI":"10.1080\/14680777.2012.741073"},{"key":"e_1_2_6_24_1","unstructured":"Kessler G.(2010 November 29). WikiLeaks's unveiling of secret State Department cables exposes U.S. diplomacy.The Washintong Post. Retrieved fromhttp:\/\/www.washingtonpost.com\/wp-dyn\/content\/article\/2010\/11\/28\/AR2010112802395.html"},{"key":"e_1_2_6_25_1","doi-asserted-by":"crossref","first-page":"121","DOI":"10.1145\/2212776.2212790","volume-title":"CHI'12 Extended Abstracts on Human Factors in Computing Systems","author":"Kirman B.","year":"2012"},{"key":"e_1_2_6_26_1","volume-title":"Hackers: Heroes of the computer revolution","author":"Levy S.","year":"1984"},{"key":"e_1_2_6_27_1","doi-asserted-by":"publisher","DOI":"10.1080\/14680777.2017.1316755"},{"key":"e_1_2_6_28_1","doi-asserted-by":"publisher","DOI":"10.1016\/S1353-4858(11)70004-6"},{"key":"e_1_2_6_29_1","unstructured":"McKnight M.&Bishop G.(2018 March 29). Inside the dark world of trolling.Sports Illustrated. Retrieved fromhttps:\/\/www.si.com\/more-sports\/2018\/03\/29\/twitter-internet-trolls-sports-athletes"},{"key":"e_1_2_6_30_1","doi-asserted-by":"publisher","DOI":"10.7551\/mitpress\/10288.001.0001"},{"key":"e_1_2_6_31_1","volume-title":"The ambivalent internet","author":"Phillips W.","year":"2017"},{"key":"e_1_2_6_32_1","doi-asserted-by":"publisher","DOI":"10.1080\/01972243.2017.1391911"},{"key":"e_1_2_6_33_1","doi-asserted-by":"crossref","unstructured":"Sanfilippo M. R. Yang S. &Fichman P.(2017). Managing online trolling: From deviant to social and political trolls. InProceedings of the 50th Hawaii International Conference on System Sciences.","DOI":"10.24251\/HICSS.2017.219"},{"key":"e_1_2_6_34_1","doi-asserted-by":"publisher","DOI":"10.1177\/0165551510365390"},{"key":"e_1_2_6_35_1","doi-asserted-by":"publisher","DOI":"10.1002\/aps.42"},{"key":"e_1_2_6_36_1","doi-asserted-by":"crossref","first-page":"39","DOI":"10.4324\/9780203948873-3","volume-title":"Internet culture","author":"Tepper M.","year":"1997"},{"key":"e_1_2_6_37_1","unstructured":"West L.(Writer). (2015 January 23). Ask not for whom the bell trolls; it trolls for thee.This American Life. Retrieved fromhttps:\/\/www.thisamericanlife.org\/545\/if-you-dont-have-anything-nice-to-say-say-it-in-all-caps\/act-one"}],"container-title":["Proceedings of the Association for Information Science and Technology"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.wiley.com\/onlinelibrary\/tdm\/v1\/articles\/10.1002%2Fpra2.2018.14505501009","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/pdf\/10.1002\/pra2.2018.14505501009","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/full-xml\/10.1002\/pra2.2018.14505501009","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/asistdl.onlinelibrary.wiley.com\/doi\/pdf\/10.1002\/pra2.2018.14505501009","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,21]],"date-time":"2025-10-21T17:41:33Z","timestamp":1761068493000},"score":1,"resource":{"primary":{"URL":"https:\/\/asistdl.onlinelibrary.wiley.com\/doi\/10.1002\/pra2.2018.14505501009"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,1]]},"references-count":36,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2018,1]]}},"alternative-id":["10.1002\/pra2.2018.14505501009"],"URL":"https:\/\/doi.org\/10.1002\/pra2.2018.14505501009","archive":["Portico"],"relation":{},"ISSN":["2373-9231","2373-9231"],"issn-type":[{"value":"2373-9231","type":"print"},{"value":"2373-9231","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018,1]]},"assertion":[{"value":"2019-02-01","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}