{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,14]],"date-time":"2026-04-14T00:25:28Z","timestamp":1776126328775,"version":"3.50.1"},"reference-count":113,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2015,2,1]],"date-time":"2015-02-01T00:00:00Z","timestamp":1422748800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Ethics Inf Technol"],"published-print":{"date-parts":[[2015,3]]},"DOI":"10.1007\/s10676-015-9362-0","type":"journal-article","created":{"date-parts":[[2015,1,31]],"date-time":"2015-01-31T08:27:58Z","timestamp":1422692878000},"page":"65-87","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":101,"title":["Flaming? What flaming? The pitfalls and potentials of researching online hostility"],"prefix":"10.1007","volume":"17","author":[{"given":"Emma A.","family":"Jane","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,2,1]]},"reference":[{"key":"9362_CR1","unstructured":"Aedy, R. (2013). A journalist\u2019s guide to finding the truth via social media. Radio National. Radio broadcast. 5 Dec."},{"issue":"2","key":"9362_CR2","doi-asserted-by":"crossref","first-page":"95","DOI":"10.1016\/S0378-7206(99)00036-1","volume":"37","author":"M Aiken","year":"2000","unstructured":"Aiken, M., & Waller, B. (2000). Flaming among first-time group support system users. Information and Management, 37(2), 95\u2013100.","journal-title":"Information and Management"},{"key":"9362_CR3","doi-asserted-by":"crossref","first-page":"205","DOI":"10.1016\/S0167-9236(02)00190-2","volume":"36","author":"M Alonzo","year":"2004","unstructured":"Alonzo, M., & Aiken, M. (2004). Flaming in electronic communication. Decision Support Systems, 36, 205\u2013213.","journal-title":"Decision Support Systems"},{"key":"9362_CR4","unstructured":"Aristotle. (1984). Categories. In Barnes, J. (Ed.), (trans: Ackrill, J. L.), The complete works of aristotle, Vol 2 (pp. 3\u201324). Princeton: Princeton University Press."},{"key":"9362_CR5","unstructured":"Auernheimer, A. (2013). Of sierras and sandovals. Pastebin. 28 Sept. http:\/\/pastebin.com\/DUWEZfTy . Accessed 18 Oct 2013."},{"key":"9362_CR6","unstructured":"Baraniuk, C. (2013). I\u2019m not giving up says Caroline Criado-Perez as Twitter abuse storm thunders on. Wired UK. 1 Aug. http:\/\/www.wired.co.uk\/news\/archive\/2013-08\/01\/caroline-criado-perez . Accessed 3 Aug 2013."},{"key":"9362_CR7","doi-asserted-by":"crossref","DOI":"10.7312\/beck93140","volume-title":"The biological way of thought","author":"M Beckner","year":"1959","unstructured":"Beckner, M. (1959). The biological way of thought. New York: Columbia University Press."},{"key":"9362_CR8","volume-title":"Misogyny re-loaded","author":"A Bray","year":"2013","unstructured":"Bray, A. (2013). Misogyny re-loaded. North Melbourne: Spinifex Press."},{"key":"9362_CR9","doi-asserted-by":"crossref","unstructured":"Brembs, B., Button, K. & Munaf\u00f2, M. (2013). Deep impact: Unintended consequences of journal rank. Frontiers in human neuroscience. doi: 10.3389\/fnhum.2013.00291 . http:\/\/www.frontiersin.org\/Journal\/10.3389\/fnhum.2013.00291\/full#B19 . Accessed 7 Jan 2013.","DOI":"10.3389\/fnhum.2013.00291"},{"key":"9362_CR10","unstructured":"Brown, T. (2012). Charlotte\u2019s hell. 60 minutes. Television Broadcast. 31 Aug. http:\/\/sixtyminutes.ninemsn.com.au\/article.aspx?id=8525498 . Accessed 17 Jan 2013."},{"key":"9362_CR11","unstructured":"Carey, T. (2011). Help me, mummy. It\u2019s hot here in hell: A special investigation into the distress of grieving families caused by the sick internet craze of \u2018trolling\u2019. Mail Online. http:\/\/www.dailymail.co.uk\/news\/article-2041193\/Internet-trolling-Investigation-distress-grieving-families-caused-trolls.html . Accessed 17 Jan 2013."},{"key":"9362_CR12","volume-title":"Folk devils and moral panics","author":"S Cohen","year":"2002","unstructured":"Cohen, S. (2002). Folk devils and moral panics (3rd ed.). London and New York: Routledge.","edition":"3"},{"key":"9362_CR13","doi-asserted-by":"crossref","first-page":"99","DOI":"10.18574\/nyu\/9780814764077.003.0012","volume-title":"The social media reader","author":"EG Coleman","year":"2012","unstructured":"Coleman, E. G. (2012). Phreaks, hackers, and trolls: The politics of transgression and spectacle. In M. Mandiberg (Ed.), The social media reader (pp. 99\u2013119). New York and London: New York University Press."},{"key":"9362_CR14","unstructured":"Colvin, M., & Mark, D. (2012). TV presenter in hospital after vicious Twitter attacks. ABC News\u2014PM. Radio Broadcast. 30 Aug. http:\/\/www.abc.net.au\/pm\/content\/2012\/s3579714.htm . Accessed 2 Feb 2013."},{"key":"9362_CR15","doi-asserted-by":"crossref","DOI":"10.1002\/9781444314861","volume-title":"The handbook of internet studies","author":"M Consalvo","year":"2011","unstructured":"Consalvo, M., & Ess, C. (2011). The handbook of internet studies. West Sussex: Wiley."},{"key":"9362_CR16","unstructured":"Criado-Perez, C. (2013). Twitter row victim Caroline Criado-Perez: I Feel under siege. BBC News. Television Broadcast. 7 Aug. http:\/\/www.bbc.co.uk\/news\/uk-23498146 . Accessed 27 Dec 2013."},{"key":"9362_CR17","volume-title":"Speech and phenomena\u2014And other essays on Husserl\u2019s theory of signs","author":"J Derrida","year":"1973","unstructured":"Derrida, J. (1973). Speech and phenomena\u2014And other essays on Husserl\u2019s theory of signs. Evanston: Northwestern University Press."},{"key":"9362_CR18","first-page":"200","volume-title":"Mediated interpersonal communication","author":"KM Douglas","year":"2008","unstructured":"Douglas, K. M. (2008). Antisocial communication on electronic mail and the internet. In E. A. Konijin, S. Utz, M. Tanis, & S. B. Barnes (Eds.), Mediated interpersonal communication (pp. 200\u2013214). London: Routledge."},{"key":"9362_CR19","unstructured":"Doyle, S. (2011a). The girl\u2019s guide to staying safe online. In These Times. 17 Nov. http:\/\/inthesetimes.com\/article\/12311\/the_girls_guide_to_staying_safe_online\/ . Accessed 27 Dec 2013."},{"key":"9362_CR20","unstructured":"Doyle, S. (2011b). But how do you know it\u2019s sexist? The #MenCallMeThings Round-Up. Tiger Beatdown. 10 Nov. http:\/\/tigerbeatdown.com\/2011\/11\/10\/but-how-do-you-know-its-sexist-the-mencallmethings-round-up\/ . Accessed 27 Dec 2013."},{"key":"9362_CR21","volume-title":"The oxford handbook of internet studies","year":"2013","unstructured":"Dutton, W. H. (Ed.). (2013a). The oxford handbook of internet studies. Oxford: Oxford University Press."},{"key":"9362_CR22","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1093\/oxfordhb\/9780199589074.001.0001","volume-title":"The oxford handbook of internet studies","author":"WH Dutton","year":"2013","unstructured":"Dutton, W. H. (2013b). Internet studies: The foundations of a transformative field. In W. H. Dutton (Ed.), The oxford handbook of internet studies (pp. 1\u201326). Oxford: Oxford University Press."},{"key":"9362_CR23","unstructured":"Eisenhuth, S. (2000). One\u2019s plea for simplicity. The Australian. Media Section.\u00a026 Oct (p. 8)."},{"key":"9362_CR24","unstructured":"Elam, P. (2011). Stalking sady Doyle. A voice for men. http:\/\/www.avoiceformen.com\/feminism\/feminist-lies-feminism\/stalking-sady-doyle\/ . Accessed 1 Aug 2013."},{"key":"9362_CR25","unstructured":"Elliott, C. (2011). An occupational hazard? Too much to say for myself. 20 April. http:\/\/toomuchtosayformyself.com\/2011\/04\/20\/an-occupational-hazard . Accessed 27 Dec 2013."},{"key":"9362_CR26","first-page":"151","volume-title":"The oxford handbook of internet studies","author":"NB Ellison","year":"2013","unstructured":"Ellison, N. B., & Boyd, D. M. (2013). Sociality through social network sites. In W. H. Dutton (Ed.), The oxford handbook of internet studies (pp. 151\u2013172). Oxford: Oxford University Press."},{"key":"9362_CR27","unstructured":"Evans, K. (2011) Men call me things: it\u2019s not as romantic as it sounds. The Drum. 11 Nov. http:\/\/www.abc.net.au\/unleashed\/3659712.html . Accessed 23 Dec 2013."},{"key":"9362_CR28","unstructured":"Fisk, R. (2013). Anonymous comments are as pathetic as the anonymous \u2018sources\u2019 that contaminate gutless journalism from the New York Times, BBC, and CNN. The Independent. 26 Dec. http:\/\/www.independent.co.uk\/voices\/comment\/anonymous-comments-are-as-pathetic-as-the-anonymous-sources-that-contaminate-gutless-journalism-from-the-new-york-times-bbc-and-cnn-8446788.html . Accessed 28 Jan 2013."},{"key":"9362_CR29","volume-title":"Academic instincts","author":"M Garber","year":"2001","unstructured":"Garber, M. (2001). Academic instincts. Princeton and Oxford: Princeton University Press."},{"key":"9362_CR30","unstructured":"Girard, R. (1979). Violence and the sacred. (trans: Gregory, P.). Baltimore: The Johns Hopkins University Press."},{"key":"9362_CR31","unstructured":"Greenfeld, L. A. (1997). Sex offenses and offenders\u2014An analysis of data on rape and sexual assault. Bureau of justice statistics. (pp. 1\u201339). http:\/\/www.ojp.usdoj.gov\/bjs\/ . Accessed 20 Dec 2013."},{"key":"9362_CR32","volume-title":"Popular reality\u2014Journalism, modernity, popular culture","author":"J Hartley","year":"1996","unstructured":"Hartley, J. (1996). Popular reality\u2014Journalism, modernity, popular culture. London, New York, Sydney, Auckland: Arnold."},{"issue":"Summer","key":"9362_CR33","first-page":"187","volume":"14","author":"SC Herring","year":"2002","unstructured":"Herring, S. C. (2002). Cyber violence: Recognizing and resisting abuse in online environments. Asian Women, 14(Summer), 187\u2013212.","journal-title":"Asian Women"},{"issue":"5","key":"9362_CR34","doi-asserted-by":"crossref","first-page":"371","DOI":"10.1080\/01972240290108186","volume":"18","author":"S Herring","year":"2002","unstructured":"Herring, S., Job-Sluder, K., Scheckler, R., & Barab, S. (2002). Searching for safety online: Managing \u2018trolling\u2019 in a feminist forum. The Information Society, 18(5), 371\u2013384. doi: 10.1080\/01972240290108186 .","journal-title":"The Information Society"},{"issue":"1","key":"9362_CR35","doi-asserted-by":"crossref","first-page":"21","DOI":"10.1080\/08900523.2011.525190","volume":"26","author":"L Hlavach","year":"2011","unstructured":"Hlavach, L., & Freivogel, W. H. (2011). Ethical implications of anonymous comments posted to online news stories. Journal of Mass Media Ethics, 26(1), 21\u201337. doi: 10.1080\/08900523.2011.525190 .","journal-title":"Journal of Mass Media Ethics"},{"key":"9362_CR36","unstructured":"Hot Chicks in Batman shirts (pics)! (2010). Bodybuilding.com. http:\/\/forum.bodybuilding.com\/showthread.php?t=129966903&pagenumber . Accessed 23 Dec 2013."},{"key":"9362_CR37","unstructured":"Hudson, J. (2010). Gay teen suicide sparks debate over cyber bullying. The Wire. 1 Oct. http:\/\/www.thewire.com\/national\/2010\/10\/gay-teen-suicide-sparks-debate-over-cyber-bullying\/22829\/ . Accessed 27 Dec 2013."},{"key":"9362_CR38","doi-asserted-by":"crossref","DOI":"10.1007\/978-1-4020-9789-8","volume-title":"International handbook of internet research","author":"J Hunsinger","year":"2010","unstructured":"Hunsinger, J., Klastrup, L., & Allen, M. (2010). International handbook of internet research. London, New York: Springer."},{"key":"9362_CR39","volume-title":"Trickster makes this world: Mischief, myth, and art","author":"L Hyde","year":"2010","unstructured":"Hyde, L. (2010). Trickster makes this world: Mischief, myth, and art. New York: Farrar, Straus and Giroux."},{"key":"9362_CR40","unstructured":"Jackman, C. (2011). War of words. The Australian. 4 June. http:\/\/www.theaustralian.com.au\/news\/features\/war-of-words\/story-e6frg8h6-1226068173588 . Accessed 7 Dec 2012."},{"key":"9362_CR41","unstructured":"Jane, E. A (2012a). Flip-skirt fatales: On cheerleading, fetish and hate. Unpublished PhD thesis. Sydney: University of New South Wales."},{"key":"9362_CR42","author":"EA Jane","year":"2012","unstructured":"Jane, E. A. (2012b). Your a ugly, whorish slut\u2014Understanding E-bile. Feminist Media Studies,. doi: 10.1080\/14680777.2012.741073 .","journal-title":"Feminist Media Studies"},{"issue":"2","key":"9362_CR43","doi-asserted-by":"crossref","first-page":"175","DOI":"10.1177\/1367877913514330","volume":"17","author":"EA Jane","year":"2014","unstructured":"Jane, E. A. (2014a). Beyond antifandom: Cheerleading, textual hate and new media ethics. International Journal of Cultural Studies, 17(2), 175\u2013190. doi: 10.1177\/1367877913514330 .","journal-title":"International Journal of Cultural Studies"},{"issue":"4","key":"9362_CR44","doi-asserted-by":"crossref","first-page":"558","DOI":"10.1080\/10304312.2014.924479","volume":"28","author":"EA Jane","year":"2014","unstructured":"Jane, E. A. (2014b). Back to the kitchen, cunt: Speaking the unspeakable about online misogyny. Continuum: Journal of Media and Cultural Studies, 28(4), 558\u2013570. doi: 10.1080\/10304312.2014.924479 .","journal-title":"Continuum: Journal of Media and Cultural Studies"},{"key":"9362_CR45","doi-asserted-by":"crossref","first-page":"43","DOI":"10.1002\/9781444314861.ch3","volume-title":"The handbook of internet studies","author":"KB Jensen","year":"2011","unstructured":"Jensen, K. B. (2011). New media, old methods\u2014Internet methodologies and the online\/offline divide. In M. Consalvo & C. Ess (Eds.), The handbook of internet studies (pp. 43\u201358). West Sussex: Wiley."},{"key":"9362_CR46","doi-asserted-by":"crossref","first-page":"660","DOI":"10.1016\/j.dss.2008.10.008","volume":"46","author":"NA Johnson","year":"2008","unstructured":"Johnson, N. A., Cooper, R. B., & Chin, W. W. (2008). Anger and flaming in computer-mediated negotiation among strangers. Decision Support Systems, 46, 660\u2013672.","journal-title":"Decision Support Systems"},{"key":"9362_CR47","volume-title":"Monty python\u2019s life of brian","author":"T Jones","year":"1979","unstructured":"Jones, T. (1979). Monty python\u2019s life of brian. UK: HandMade Films."},{"key":"9362_CR48","unstructured":"Jones, S. (2013). Man arrested over Twitter threats to female MP and campaigner. The Guardian. 7 Aug. http:\/\/www.theguardian.com\/uk-news\/2013\/aug\/07\/man-arrested-twitter-creasy-criado-perez . Accessed 2 Sept 2013."},{"key":"9362_CR49","unstructured":"Kaufer, D. (2000). Flaming: A white paper. Carnegie Mellon, Department of English. June."},{"key":"9362_CR50","doi-asserted-by":"crossref","first-page":"1135","DOI":"10.1002\/(SICI)1097-4571(1998)49:12<1135::AID-ASI8>3.0.CO;2-W","volume":"49","author":"JM Kayany","year":"1998","unstructured":"Kayany, J. M. (1998). Contexts of uninhibited online behavior: Flaming in social newsgroups on usenet. Journal of the American Society for Information Science, 49, 1135\u20131141.","journal-title":"Journal of the American Society for Information Science"},{"issue":"10","key":"9362_CR51","doi-asserted-by":"crossref","first-page":"1123","DOI":"10.1037\/0003-066X.39.10.1123","volume":"39","author":"S Kiesler","year":"1984","unstructured":"Kiesler, S., Siegel, J., & McGuire, T. W. (1984). Social psychological aspects of computer-mediated communication. American Psychologist, 39(10), 1123\u20131134.","journal-title":"American Psychologist"},{"key":"9362_CR52","doi-asserted-by":"crossref","first-page":"77","DOI":"10.1207\/s15327051hci0101_3","volume":"1","author":"S Kiesler","year":"1985","unstructured":"Kiesler, S., Zubrow, D., Moses, A. M., & Geller, V. (1985). Affect in computer-mediated communication: An experiment in synchronous terminal-to-terminal discussion. Human Computer Interaction, 1, 77\u2013104. doi: 10.1207\/s15327051hci0101_3 .","journal-title":"Human Computer Interaction"},{"issue":"2","key":"9362_CR53","first-page":"133","volume":"20","author":"YS Kim","year":"2008","unstructured":"Kim, Y. S. (2008). Bullying and suicide. A review. International Journal of Adolescent Medicine and Health, 20(2), 133\u2013154.","journal-title":"International Journal of Adolescent Medicine and Health"},{"key":"9362_CR54","first-page":"101","volume-title":"Queer online: Media technology and sexuality","author":"A Kuntsman","year":"2007","unstructured":"Kuntsman, A. (2007). Belonging through violence: Flaming, erasure, and performativity in queer migrant community. In K. O\u2019Riordan & D. J. Phillips (Eds.), Queer online: Media technology and sexuality (pp. 101\u2013120). New York: Peter Lang Publishing Inc."},{"key":"9362_CR55","doi-asserted-by":"crossref","first-page":"177","DOI":"10.1093\/oso\/9780199291335.003.0014","volume-title":"Literary theory and criticism: An oxford guide","author":"P Lamarque","year":"2006","unstructured":"Lamarque, P. (2006). The intentional fallacy. In P. Waugh (Ed.), Literary theory and criticism: An oxford guide (pp. 177\u2013188). Oxford: Oxford University Press."},{"issue":"2","key":"9362_CR56","doi-asserted-by":"crossref","first-page":"133","DOI":"10.1111\/j.1571-9979.2000.tb00209.x","volume":"16","author":"EM Landry","year":"2000","unstructured":"Landry, E. M. (2000). Scrolling around the new organization: The potential for conflict in the on-line environment. Negotiation Journal, 16(2), 133\u2013142.","journal-title":"Negotiation Journal"},{"key":"9362_CR57","unstructured":"Lange, P. G. (2006). What is your claim to flame? First monday 11(9), 4 Sept. http:\/\/firstmonday.org\/ojs\/index.php\/fm\/article\/view\/1393\/1311 . Accessed 24 Dec 2013."},{"key":"9362_CR58","unstructured":"Lange, P. G. (2007). Commenting on comments: Investigating responses to antagonism on youtube. Society for Applied anthropology conference (pp. 1\u201327) Tampa, Florida."},{"key":"9362_CR59","volume-title":"You are not a gadget\u2014A manifesto","author":"J Lanier","year":"2011","unstructured":"Lanier, J. (2011). You are not a gadget\u2014A manifesto. London: Penguin Books."},{"key":"9362_CR60","first-page":"89","volume-title":"Contexts of computer-mediated communication","author":"M Lea","year":"1992","unstructured":"Lea, M., O\u2019Shea, T., Fung, P., & Spears, R. (1992). Flaming in computer-mediated communication\u2014Observations, explanations, implications. In M. Lea (Ed.), Contexts of computer-mediated communication (pp. 89\u2013112). New York: Harvester-Wheatsheaf."},{"issue":"2","key":"9362_CR61","doi-asserted-by":"crossref","first-page":"385","DOI":"10.1111\/j.1533-8525.2005.00017.x","volume":"46","author":"H Lee","year":"2005","unstructured":"Lee, H. (2005). Behavioral strategies for dealing with flaming in an online forum. The Sociology Quarterly, 46(2), 385\u2013403.","journal-title":"The Sociology Quarterly"},{"key":"9362_CR62","unstructured":"Lenssen, P. (2007). A chat with aaron swartz. Google blogoscoped. 7 May. http:\/\/blogoscoped.com\/archive\/2007-05-07-n78.html . Accessed 18 Oct 2013."},{"key":"9362_CR63","unstructured":"Lewis, H. (2013). We must threaten women with rape to save comedy, says the internet. New Statesman. http:\/\/www.newstatesman.com\/helen-lewis\/2013\/06\/we-must-threaten-women-rape-save-comedy-says-internet . Accessed 18 Oct 2013."},{"key":"9362_CR64","unstructured":"Lewis-Hasteley, H. (2011) You should have your tongue ripped out: The reality of sexist abuse online. New Statesman. 3 Nov. http:\/\/www.newstatesman.com\/blogs\/helen-lewis-hasteley\/2011\/11\/comments-rape-abuse-women . Accessed 7 Dec 2012."},{"key":"9362_CR65","first-page":"199","volume-title":"The ideas market\u2014An alternative take on Australia\u2019s intellectual life","author":"C Lumby","year":"2004","unstructured":"Lumby, C. (2004). Outside in: Journalists and academics in the public sphere. In D. Carter (Ed.), The ideas market\u2014An alternative take on Australia\u2019s intellectual life (pp. 199\u2013218). Carlton, Victoria: Melbourne University Press."},{"key":"9362_CR66","doi-asserted-by":"crossref","first-page":"4","DOI":"10.1111\/j.1083-6101.1997.tb00200.x","volume":"2","author":"R MacKinnon","year":"2006","unstructured":"MacKinnon, R. (2006). Virtual rape. Journal of Computer Mediated Communication, 2, 4. doi: 10.1111\/j.1083-6101.1997.tb00200.x .","journal-title":"Journal of Computer Mediated Communication"},{"key":"9362_CR67","unstructured":"Martinez, E. (2010). Cyber bullying illegal: Mass. Governor signs landmark anti-bullying law. CBS News. 4 May. www.cbsnews.com\/8301-504083_162-20004060-504083.html . Accessed 18 Jan 2013."},{"key":"9362_CR68","unstructured":"Masterson, D. (2006a). Germaine Greer is a cunt. Men are better than women. http:\/\/www.menarebetterthanwomen.com\/germaine-greer-2\/ . Accessed 19 Oct 2013."},{"key":"9362_CR69","unstructured":"Masterson, D. (2006b). Germain Greer is a cunt (and a whore). Part II. Men are better than women. http:\/\/www.menarebetterthanwomen.com\/germain-greer-is-a-cunt-and-a-whore-part-ii\/ . Accessed 19 Oct 2013."},{"key":"9362_CR70","author":"A McCosker","year":"2013","unstructured":"McCosker, A. (2013). Trolling as provocation: YouTube\u2019s agonistic publics. Convergence: The International Journal of Reserach into New Media Technologies,. doi: 10.1177\/1354856513501413 .","journal-title":"Convergence: The International Journal of Reserach into New Media Technologies"},{"key":"9362_CR71","doi-asserted-by":"crossref","first-page":"411","DOI":"10.1016\/S8755-4615(02)00143-3","volume":"19","author":"H McKee","year":"2002","unstructured":"McKee, H. (2002). YOUR VIEWS SHOWED TRUE IGNORANCE: (Mis) Communication in an online interracial discussion forum. Computers and Composition, 19, 411\u2013434.","journal-title":"Computers and Composition"},{"issue":"1","key":"9362_CR72","doi-asserted-by":"crossref","first-page":"57","DOI":"10.1207\/S15327957PSPR0401_6","volume":"4","author":"KYA McKenna","year":"2000","unstructured":"McKenna, K. Y. A., & Bargh, J. A. (2000). Plan 9 from cyberspace: The implications of the internet for personality and social psychology. Personality and Social Psychology Review, 4(1), 57\u201375.","journal-title":"Personality and Social Psychology Review"},{"key":"9362_CR73","volume-title":"Understanding media\u2014The extensions of man","author":"M McLuhan","year":"1994","unstructured":"McLuhan, M. (1994). Understanding media\u2014The extensions of man. Cambridge, MA: MIT Press."},{"key":"9362_CR74","unstructured":"Merleau-Ponty, M. (1968). The visible and the invisible. (trans: Lingis, A.). Evanston, IL: Northwestern University Press."},{"key":"9362_CR75","volume-title":"Letters, postcards, email\u2014Technologies of presence","author":"E Milne","year":"2010","unstructured":"Milne, E. (2010). Letters, postcards, email\u2014Technologies of presence. New York: Routledge."},{"key":"9362_CR76","doi-asserted-by":"crossref","first-page":"1536","DOI":"10.1016\/j.chb.2010.05.023","volume":"26","author":"PJ Moor","year":"2010","unstructured":"Moor, P. J., Heuvelman, A., & Verleur, R. (2010). Flaming on YouTube. Computers in Human Behavior, 26, 1536\u20131546. doi: 10.1016\/j.chb.2010.05.023 .","journal-title":"Computers in Human Behavior"},{"key":"9362_CR77","first-page":"113","volume-title":"Political Theory in transition","author":"C Mouffe","year":"2000","unstructured":"Mouffe, C. (2000). For an agonistic model of democracy. In N. O\u2019Sullivan (Ed.), Political Theory in transition (pp. 113\u2013132). London: Routledge."},{"key":"9362_CR78","unstructured":"Mungeam, F. (2011). Commenting on the news: How the degree of anonymity affects flaming online. Unpublished thesis, MA Program in Communication and Leadership Studies, Gonzaga University, (pp. 1\u201338)."},{"key":"9362_CR79","unstructured":"O\u2019Neill, B. (2011). The campaign to stamp out misogyny online echoes victorian efforts to protect women from coarse language. Telegraph. 7 Nov. http:\/\/blogs.telegraph.co.uk\/news\/brendanoneill2\/100115868\/the-campaign-to-stamp-out-misogyny-online-echoes-victorian-efforts-to-protect-women-from-coarse-language\/ . Accessed 24 Dec 2013."},{"issue":"1","key":"9362_CR80","doi-asserted-by":"crossref","first-page":"69","DOI":"10.1177\/1461444803005001908","volume":"5","author":"PB O\u2019Sullivan","year":"2003","unstructured":"O\u2019Sullivan, P. B., & Flanagin, A. J. (2003). Reconceptualizing \u2018flaming\u2019 and other problematic messages. New Media and Society, 5(1), 69\u201394. doi: 10.1177\/1461444803005001908 .","journal-title":"New Media and Society"},{"key":"9362_CR81","volume-title":"The filter bubble\u2014What the internet is hiding from you","author":"E Pariser","year":"2011","unstructured":"Pariser, E. (2011). The filter bubble\u2014What the internet is hiding from you. London, New York: Viking."},{"key":"9362_CR82","unstructured":"Penny, L. (2011) Laurie penny: A woman\u2019s opinion is the mini-skirt of the internet. The Independent. 4 Nov. http:\/\/www.independent.co.uk\/voices\/commentators\/laurie-penny-a-womans-opinion-is-the-miniskirt-of-the-internet-6256946.html . Accessed 16 Jan 2013."},{"key":"9362_CR83","volume-title":"Cybersexism\u2014Sex, gender and power on the internet","author":"L Penny","year":"2013","unstructured":"Penny, L. (2013). Cybersexism\u2014Sex, gender and power on the internet. London, New Delhi, New York, Sydney: Bloomsbury."},{"key":"9362_CR84","unstructured":"Phillips, W. (2011). LOLing at tragedy: Facebook trolls, memorial pages and resistance to grief online. First Monday 16(12), 5 Dec. http:\/\/firstmonday.org\/ojs\/index.php\/fm\/article\/view\/3168 . Accessed 24 Dec 2013."},{"key":"9362_CR85","author":"W Phillips","year":"2012","unstructured":"Phillips, W. (2012). The house that fox built: Anonymous, spectacle, and cycles of amplification. Television and New Media,. doi: 10.1177\/1527476412452799 .","journal-title":"Television and New Media"},{"issue":"July","key":"9362_CR86","doi-asserted-by":"crossref","first-page":"341","DOI":"10.1111\/j.1468-2958.2000.tb00761.x","volume":"26","author":"T Postmes","year":"2000","unstructured":"Postmes, T., Spears, R., & Lea, M. (2000). The formation of group norms in computer-mediated communication. Human Communication Research, 26(July), 341\u2013371.","journal-title":"Human Communication Research"},{"key":"9362_CR87","unstructured":"Price, J. (2013). Caroline Criado-Perez forces social media to wake up. The Sydney Morning Herald. 30 July. http:\/\/www.smh.com.au\/comment\/caroline-criadoperez-forces-social-media-to-wake-up-20130729-2qurg.html . Accessed 2 Sept 2013."},{"key":"9362_CR88","doi-asserted-by":"crossref","unstructured":"Reinig, B. A., Briggs, R. O. & Nunamaker Jr., J. F. (1997\/1998). Flaming in the electronic classroom. Journal of Management Information Systems 14(3 Winter), 45\u201359.","DOI":"10.1080\/07421222.1997.11518174"},{"issue":"6","key":"9362_CR89","doi-asserted-by":"crossref","first-page":"698","DOI":"10.1177\/1046496404266773","volume":"35","author":"BA Reinig","year":"2004","unstructured":"Reinig, B. A., & Mejias, R. J. (2004). The effects of national culture and anonymity on flaming and criticalness in GSS-supported discussions. Small Group Research, 35(6), 698\u2013723. doi: 10.1177\/1046496404266773 .","journal-title":"Small Group Research"},{"key":"9362_CR90","unstructured":"Reist, M. T. (2013). Abuse, rape threats, Tyler the Creator fans defend their idol. Melinda Tankard Reist. 7 June. http:\/\/melindatankardreist.com\/2013\/06\/abuse-rape-threats-tyler-the-creator-fans-defend-their-idol\/ . Accessed 22 Aug 2013."},{"key":"9362_CR91","unstructured":"Sandoval, G. (2013). The end of kindness: Weev and the cult of the angry young man. The Verge. 12 Sept. http:\/\/www.theverge.com\/2013\/9\/12\/4693710\/the-end-of-kindness-weev-and-the-cult-of-the-angry-young-man . Accessed 18 Oct 2013."},{"key":"9362_CR92","unstructured":"Schwartz, M. (2008). The trolls among us. The New York Times, 3 Aug. http:\/\/www.nytimes.com\/2008\/08\/03\/magazine\/03trolls-t.html?pagewanted=all . Accessed 21 Dec 2013."},{"key":"9362_CR93","unstructured":"Shea, V. (1997). Rule 7: Help keep flame wars under control. Netiquette. http:\/\/www.albion.com\/netiquette\/rule7.html . Accessed 26 Dec 2013."},{"key":"9362_CR94","unstructured":"Shirky, C. (2004). Group as user: Flaming and the design of social software. Clay Shirky\u2019s Writings About the Internet. 5 Nov. http:\/\/www.shirky.com\/writings\/herecomeseverybody\/group_user.html . Accessed 25 Oct 2013."},{"key":"9362_CR95","unstructured":"Smith, S. E. (2011). On blogging, threats and silence. Tiger Beatdown. 11 Oct. http:\/\/tigerbeatdown.com\/2011\/10\/11\/on-blogging-threats-and-silence\/ . Accessed 7 Dec 2012."},{"key":"9362_CR96","volume-title":"Presence and absence","author":"R Sokolowski","year":"1978","unstructured":"Sokolowski, R. (1978). Presence and absence. Bloomington, IN: Indiana University Press."},{"key":"9362_CR97","first-page":"30","volume-title":"Contexts of computer-mediated communication","author":"R Spears","year":"1992","unstructured":"Spears, R., & Lea, M. (1992). Social influence and the influence of the \u2018social\u2019 in computer-mediated communication. In M. Lea (Ed.), Contexts of computer-mediated communication (pp. 30\u201365). New York: Harvester-Wheatsheaf."},{"issue":"11","key":"9362_CR98","doi-asserted-by":"crossref","first-page":"1492","DOI":"10.1287\/mnsc.32.11.1492","volume":"32","author":"L Sproull","year":"1986","unstructured":"Sproull, L., & Kiesler, S. (1986). Reducing social context cues: Electronic mail in organizational communication. Management Science, 32(11), 1492\u20131512.","journal-title":"Management Science"},{"key":"9362_CR99","unstructured":"Stone, T. (2013a). Tyler the creator shouldn\u2019t be allowed to verbally abuse me. The Guardian. 7 June. http:\/\/www.theguardian.com\/commentisfree\/2013\/jun\/07\/tyler-the-creator-rape-abuse . Accessed 18 Oct 2013."},{"key":"9362_CR100","unstructured":"Stone, T. (2013b). @TwitterAU: It\u2019s time for a zero-tolerance to rape threats policy. change.org. http:\/\/www.change.org\/en-AU\/petitions\/twitterau-it-s-time-for-a-zero-tolerance-to-rape-threats-policy . Accessed 22 Aug 2013."},{"key":"9362_CR101","volume-title":"Hate crimes revised edition","author":"T Streissguth","year":"2009","unstructured":"Streissguth, T. (2009). Hate crimes revised edition. New York: Facts on File Inc."},{"key":"9362_CR102","first-page":"139","volume-title":"The oxford handbook of internet psychology","author":"M Tanis","year":"2007","unstructured":"Tanis, M. (2007). Online social support groups. In A. N. Joinson, K. Y. A. McKenna, T. Postmes, & U.-D. Reips (Eds.), The oxford handbook of internet psychology (pp. 139\u2013153). Oxford: Oxford University Press."},{"key":"9362_CR103","unstructured":"Thompsen, P. A. (1993). A social influence model of flaming in computer-mediated communication. Paper presented at the Western States Communication Association. Alburquerque, NM. Feb. (pp. 1\u20139)."},{"issue":"2","key":"9362_CR104","doi-asserted-by":"crossref","first-page":"225","DOI":"10.1016\/0747-5632(96)00004-0","volume":"12","author":"PA Thompsen","year":"1996","unstructured":"Thompsen, P. A., & Foulger, D. A. (1996). Effects of pictographs and quoting on flaming in electronic mail. Computers in Human Behavior, 12(2), 225\u2013243.","journal-title":"Computers in Human Behavior"},{"key":"9362_CR105","unstructured":"Thorpe, V. & Rogers, R. (2011). Women bloggers call for a stop to \u2018hateful\u2019 trolling by misogynist men. The Observer. 6 Nov. http:\/\/www.theguardian.com\/world\/2011\/nov\/05\/women-bloggers-hateful-trolling . Accessed 24 Dec 2013."},{"key":"9362_CR106","doi-asserted-by":"crossref","first-page":"43","DOI":"10.1111\/j.1083-6101.2007.00385.x","volume":"13","author":"AK Turnage","year":"2007","unstructured":"Turnage, A. K. (2007). Email flaming behaviors and organizational conflict. Journal of Computer-Mediated Communication, 13, 43\u201359. doi: 10.1111\/j.1083-6101.2007.00385.x .","journal-title":"Journal of Computer-Mediated Communication"},{"key":"9362_CR107","doi-asserted-by":"crossref","first-page":"75","DOI":"10.1002\/9781118551424.ch4","volume-title":"Responsible innovation\u2014Managing the responsible emergence of science and innovation in society","author":"J Hoven van den","year":"2013","unstructured":"van den Hoven, J. (2013). Value sensitive design and responsible innovation. In R. Owen, J. Bessant, & M. Heintz (Eds.), Responsible innovation\u2014Managing the responsible emergence of science and innovation in society (pp. 75\u201384). West Sussex: Wiley."},{"issue":"1","key":"9362_CR108","doi-asserted-by":"crossref","first-page":"51","DOI":"10.1177\/14614440222226262","volume":"4","author":"SS Vrooman","year":"2002","unstructured":"Vrooman, S. S. (2002). The art of invective: Performing identity in cyberspace. New Media and Society, 4(1), 51\u201370.","journal-title":"New Media and Society"},{"key":"9362_CR109","unstructured":"Walsh, J. (2007). Men who hate women on the Web. Salon. 31 Mar. http:\/\/www.salon.com\/2007\/03\/31\/sierra\/ . Accessed 24 Dec 2013."},{"key":"9362_CR110","unstructured":"Wang, H. (1996). Flaming: More than a necessary evil for academic mailing lists. The Electronic Journal of Communication 6(1)."},{"key":"9362_CR111","unstructured":"West, L. (2013). If comedy has no lady problem, why am i getting so many rape threats? Jezebel. 6 April. http:\/\/jezebel.com\/if-comedy-has-no-lady-problem-why-am-i-getting-so-many-511214385 . Accessed 26 Dec 2013."},{"key":"9362_CR112","unstructured":"Wilson, J., McCrea, C. & Fuller, G. (2013). CFP-special issue for the fibreculture journal: The politics of trolling and the negative space of the internet. The Fibreculture Journal. http:\/\/fibreculturejournal.org\/category\/cfp\/ . Accessed 13 Jan 2013."},{"key":"9362_CR113","unstructured":"Zetter, K. (2007). Cyberbullying suicide stokes the internet fury machine. Wired. 21 Nov. http:\/\/www.wired.com\/politics\/onlinerights\/news\/2007\/11\/vigilante_justice . Accessed 2 Feb 2013."}],"container-title":["Ethics and Information Technology"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10676-015-9362-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10676-015-9362-0\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10676-015-9362-0","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,6,6]],"date-time":"2024-06-06T23:05:29Z","timestamp":1717715129000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10676-015-9362-0"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,2,1]]},"references-count":113,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2015,3]]}},"alternative-id":["9362"],"URL":"https:\/\/doi.org\/10.1007\/s10676-015-9362-0","relation":{},"ISSN":["1388-1957","1572-8439"],"issn-type":[{"value":"1388-1957","type":"print"},{"value":"1572-8439","type":"electronic"}],"subject":[],"published":{"date-parts":[[2015,2,1]]}}}