{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T10:13:08Z","timestamp":1743070388196,"version":"3.40.3"},"publisher-location":"Cham","reference-count":44,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031280344"},{"type":"electronic","value":"9783031280351"}],"license":[{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023]]},"DOI":"10.1007\/978-3-031-28035-1_17","type":"book-chapter","created":{"date-parts":[[2023,3,9]],"date-time":"2023-03-09T08:04:19Z","timestamp":1678349059000},"page":"242-255","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Lex Informatica and Freedom of Expression: Reflections on the Regulation of Internet Trolling Behaviors"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-3203-9001","authenticated-orcid":false,"given":"David","family":"McMenemy","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,3,10]]},"reference":[{"key":"17_CR1","unstructured":"Lessig, L.: Code: and Other Laws of Cyberspace (Basic Books 1999), p. 4 (1999)"},{"key":"17_CR2","unstructured":"Reidenberg, J.R.: Lex informatica: the formulation of information policy rules through technology. Texas Law Rev.\u00a076, 553 (1997\u20131998). https:\/\/ir.lawnet.fordham.edu\/faculty_scholarship\/42"},{"key":"17_CR3","unstructured":"Crown Prosecution Service: Guidelines on prosecuting cases involving communications sent via social media (2018). https:\/\/www.cps.gov.uk\/legal-guidance\/social-media-guidelines-prosecuting-cases-involving-communications-sent-social-media"},{"key":"17_CR4","unstructured":"Gani, A.: Internet trolling: quarter of teenagers suffered online abuse last year. The Guard. (2016). https:\/\/www.theguardian.com\/uk-news\/2016\/feb\/09\/internet-trolling-teenagers-online-abuse-hate-cyberbullying"},{"key":"17_CR5","unstructured":"Allegretti, A.: Jess Phillips responds to trolls who sent her rape threats on Twitter. Huffington Post. http:\/\/www.huffingtonpost.co.uk\/entry\/jess-phillips-rape-threats-twitter_uk_574d95c6e4b03e9b9ed6262c"},{"key":"17_CR6","unstructured":"Labour\u2019s Yvette Cooper explores trolling aimed at women. BBC News, 17 December 2015. http:\/\/www.bbc.co.uk\/news\/av\/uk-politics-35120551\/labour-s-yvette-cooper-explores-trolling-aimed-at-women"},{"key":"17_CR7","doi-asserted-by":"publisher","first-page":"16","DOI":"10.7551\/mitpress\/10288.001.0001","volume-title":"This is Why We Can\u2019t Have Nice Things: Mapping the Relationship Between Online Trolling and Mainstream Culture","author":"W Phillips","year":"2015","unstructured":"Phillips, W.: This is Why We Can\u2019t Have Nice Things: Mapping the Relationship Between Online Trolling and Mainstream Culture, p. 16. MIT Press, Cambridge (2015)"},{"key":"17_CR8","unstructured":"Carter, C.: Twitter troll jailed for \u2018campaign of hatred\u2019 against Stella Creasy. Dly. Telegr. (2014). http:\/\/www.telegraph.co.uk\/news\/uknews\/crime\/11127808\/Twitter-troll-jailed-for-campaign-of-hatred-against-Stella-Creasy.html"},{"key":"17_CR9","unstructured":"Cooper, Y.: Why I\u2019m campaigning to reclaim the internet from sexist trolls. Telegraph (2017). http:\/\/www.telegraph.co.uk\/women\/politics\/why-im-campaigning-to-reclaim-the-internet-from-sexist-trolls\/"},{"key":"17_CR10","unstructured":"Levmore, S.X., Nussbaum, M.C.: The Offensive Internet: speech, Privacy, and Reputation. Harvard University Press (2010)"},{"key":"17_CR11","unstructured":"Council of Europe: European Convention on Human Rights (1950). https:\/\/www.echr.coe.int\/documents\/convention_eng.pdf"},{"key":"17_CR12","doi-asserted-by":"crossref","unstructured":"Spinello, R.A.: Regulating cyberspace: the policies and technologies of control, p. 109 (2002)","DOI":"10.5040\/9798216006688"},{"key":"17_CR13","first-page":"353","volume":"47","author":"A Gaus","year":"2012","unstructured":"Gaus, A.: Trolling attacks and the need for new approaches to privacy torts. USFL Rev. 47, 353 (2012)","journal-title":"USFL Rev."},{"key":"17_CR14","doi-asserted-by":"crossref","unstructured":"McGoldrick, D.: The limits of freedom of expression on\u00a0facebook\u00a0and social networking sites: a UK perspective. Hum. Rights Law Rev. 13, 125, 130 (2013)","DOI":"10.1093\/hrlr\/ngt005"},{"key":"17_CR15","doi-asserted-by":"crossref","unstructured":"Barlow, J.P.: A declaration of the independence of cyberspace (1996)","DOI":"10.37514\/RNT-J.1996.3.6.21"},{"key":"17_CR16","unstructured":"Citron. In: Levmore, S.X., Nussbaum, M.C. (eds.) The Offensive Internet: Speech, Privacy, and Reputation, pp. 378\u2013379 (2010)"},{"key":"17_CR17","unstructured":"Reno Vs ACLU 521 U.S. 844 (1997)"},{"key":"17_CR18","unstructured":"Lipschultz, J.H.: Free expression in the age of the Internet: social and legal boundaries, p. 127 (1999)"},{"key":"17_CR19","unstructured":"Barendt, E.M.: Freedom of Speech, p. 12. Oxford (1985)"},{"key":"17_CR20","doi-asserted-by":"crossref","unstructured":"Group Vilification Reconsidered. Yale L.J. 89, 308, 332 (1979)","DOI":"10.2307\/795839"},{"key":"17_CR21","unstructured":"Abah: Legal regulation of CSR: the case of social media and gender-based harassment. U. Balt. J. Media L. Ethics 5, 38, 55 (2016)"},{"key":"17_CR22","unstructured":"Marshak, E.: Online harassment: a\u00a0legislative\u00a0solution.\u00a0 Harv. J. Legis. 54, 501, 515\u201317 (2017)"},{"key":"17_CR23","unstructured":"troll2. In: Thorne, T. (ed.)\u00a0Dictionary of Contemporary Slang, 4th edn. Bloomsbury, London (2014). http:\/\/search.credoreference.com\/content\/entry\/acbslang\/troll2\/0?institutionId=396"},{"key":"17_CR24","unstructured":"Trolls \u2013 pass notes No 3,268. The Guardian, 22 October 2012. https:\/\/www.theguardian.com\/technology\/shortcuts\/2012\/oct\/22\/pass-notes-trolls"},{"key":"17_CR25","unstructured":"Lovink, G.: Social Media Abyss: Critical Internet Cultures and the Force of Negation, p. 163. Wiley, New York (2016)"},{"key":"17_CR26","unstructured":"Nagle, A.: Kill All Normies: Online Culture Wars From 4Chan and Tumblr to Trump and the Alt-Right Zero Books, p. 16 (2017)"},{"key":"17_CR27","unstructured":"Diaz, F.L.: Trolling and the First Amendment: Protecting Internet Speech in the Era of Cyber Bullies and Internet Defamation. U. Ill. J.L. Tech. Pol\u2019y 135, 160, p. 137 (2016)"},{"key":"17_CR28","unstructured":"Pew Research Center, October 2014, Online Harassment. http:\/\/www.pewinternet.org\/2014\/10\/22\/online-harassment\/"},{"key":"17_CR29","doi-asserted-by":"crossref","unstructured":"Rosewarne, L.: Cyberbullies, Cyberactivists, Cyberpredators: Film, TV, and Internet Stereotypes, p. 83 (2016)","DOI":"10.5040\/9798400636516"},{"key":"17_CR30","unstructured":"Carrabis, A.B., Haimovitch, S.D.: Cyberbullying: adaptation from the old school sandlot to the 21st century world wide web\u2014the court system and technology law\u2019s race to keep pace. J. Tech. L. Pol\u2019y 16, 143, 173 (2011)"},{"key":"17_CR31","unstructured":"Delgado, R., Stefancic, J.: Four observations about hate speech. Wake Forest L. Rev. 49, 319, 344 (2014)"},{"key":"17_CR32","unstructured":"Ronson, J.: So You\u2019ve Been Publicly Shamed. Pan Macmillan (2015)"},{"key":"17_CR33","unstructured":"Bradshaw, P.: Here come the Oscars: still a cruel joke in a cruel town. The Guardian, 18 February 2015. https:\/\/www.theguardian.com\/commentisfree\/2015\/feb\/18\/oscars-awards-night-winner-tv"},{"key":"17_CR34","doi-asserted-by":"crossref","unstructured":"Vitak, J., et al.: Identifying women\u2019s experiences with and strategies for mitigating negative effects of online harassment. In: Proceedings of the 2017 ACM Conference on Computer Supported Cooperative Work and Social Computing, p. 1239 (2017)","DOI":"10.1145\/2998181.2998337"},{"key":"17_CR35","unstructured":"DPP v Collins [2006] UKHL 40"},{"key":"17_CR36","unstructured":"Chambers v DPP [2012] EWHC 2157"},{"key":"17_CR37","doi-asserted-by":"crossref","unstructured":"Murray, I.: Information technology law: the law and society,\u00a0\u00a08th edition,\u00a0p. 151 (2017)","DOI":"10.1093\/he\/9780198732464.001.0001"},{"key":"17_CR38","unstructured":"Allen Green, D.: The high court is unable to agree on twitter joke trial appeal. New Statesman (2012)"},{"key":"17_CR39","unstructured":"R v Stacey Appeal No: A20120033"},{"key":"17_CR40","unstructured":"https:\/\/www.judiciary.gov.uk\/judgments\/r-v-nimmo-and-sorley-judgment\/"},{"key":"17_CR41","doi-asserted-by":"crossref","unstructured":"[2006] UKHL 34; [2007] 1 A.C. 224","DOI":"10.1353\/lit.2007.0001"},{"key":"17_CR42","unstructured":"Constine, J.: Twitter lets you avoid trolls by muting new users and strangers. Tech Crunch (2017). https:\/\/techcrunch.com\/2017\/07\/10\/twitter-mute\/"},{"key":"17_CR43","unstructured":"Twitter Rules. https:\/\/help.twitter.com\/en\/rules-and-policies\/twitter-rules"},{"key":"17_CR44","unstructured":"Department for Culture, Media, and Sport. Online Safety Bill: Factsheet (2022). https:\/\/www.gov.uk\/government\/publications\/online-safety-bill-supporting-documents\/online-safety-bill-factsheet"}],"container-title":["Lecture Notes in Computer Science","Information for a Better World: Normality, Virtuality, Physicality, Inclusivity"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-28035-1_17","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,10,16]],"date-time":"2024-10-16T01:18:37Z","timestamp":1729041517000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-28035-1_17"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023]]},"ISBN":["9783031280344","9783031280351"],"references-count":44,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-28035-1_17","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2023]]},"assertion":[{"value":"10 March 2023","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"iConference","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Information","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2023","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"13 March 2023","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"17 March 2023","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"18","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"iconference2023","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/ischools.org\/iConference","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"ConfTool","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"197","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"36","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"46","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"18% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}