{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,13]],"date-time":"2025-11-13T12:35:19Z","timestamp":1763037319029,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":45,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,5,13]],"date-time":"2019-05-13T00:00:00Z","timestamp":1557705600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,5,13]]},"DOI":"10.1145\/3308560.3317598","type":"proceedings-article","created":{"date-parts":[[2019,5,13]],"date-time":"2019-05-13T12:17:59Z","timestamp":1557749879000},"page":"523-528","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":11,"title":["Black Hat Trolling, White Hat Trolling, and Hacking the Attention Landscape"],"prefix":"10.1145","author":[{"given":"Jeanna","family":"Matthews","sequence":"first","affiliation":[{"name":"Clarkson Univ."}]},{"given":"Matt","family":"Goerzen","sequence":"additional","affiliation":[{"name":"Data and Society"}]}],"member":"320","published-online":{"date-parts":[[2019,5,13]]},"reference":[{"volume-title":"Communities in Cyberspace","author":"Donath J","key":"e_1_3_2_1_1_1","unstructured":"J Donath , 1998 Identity and Deception in the Virtual Community , in Communities in Cyberspace . P Kollock and M Smith (Eds.). Routledge , London, England . J Donath, 1998 Identity and Deception in the Virtual Community, in Communities in Cyberspace. P Kollock and M Smith (Eds.). Routledge, London, England."},{"volume-title":"Internet Culture. David Porter (Ed.)","author":"Tepper M","key":"e_1_3_2_1_2_1","unstructured":"M Tepper , 1996 Usenet Communities and the Cultural Politics of Information , in Internet Culture. David Porter (Ed.) . Routledge , New York, NY, USA . M Tepper, 1996 Usenet Communities and the Cultural Politics of Information, in Internet Culture. David Porter (Ed.). Routledge, New York, NY, USA."},{"volume-title":"The Social Media Reader","author":"Coleman G","key":"e_1_3_2_1_3_1","unstructured":"G Coleman , 2012 Phreaks, Hackers, and Trolls : The Politics of Transgression and Spectacle , in The Social Media Reader . New York University Press , New York , New York, USA. G Coleman, 2012 Phreaks, Hackers, and Trolls: The Politics of Transgression and Spectacle, in The Social Media Reader. New York University Press, New York, New York, USA."},{"volume-title":"2015 This Is Why We Can't Have Nice Things","author":"Phillips W","key":"e_1_3_2_1_4_1","unstructured":"W Phillips , 2015 This Is Why We Can't Have Nice Things . MIT Press , Cambridge, Massachussets, USA. W Phillips, 2015 This Is Why We Can't Have Nice Things. MIT Press, Cambridge, Massachussets, USA."},{"key":"e_1_3_2_1_5_1","unstructured":"G Coleman 2014 Hacker Hoaxer Whistleblower Spy. Verso London England.  G Coleman 2014 Hacker Hoaxer Whistleblower Spy. Verso London England."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1093\/oso\/9780190931407.001.0001"},{"volume-title":"2018 Architects of Networked Disinformation","author":"Ong JC","key":"e_1_3_2_1_7_1","unstructured":"JC Ong and JVA Caba\u00f1es , 2018 Architects of Networked Disinformation . University of Leeds. JC Ong and JVA Caba\u00f1es, 2018 Architects of Networked Disinformation. University of Leeds."},{"volume-title":"Propaganda Model","author":"Paul C","key":"e_1_3_2_1_8_1","unstructured":"C Paul and M Matthews , 2016 The Russian \u201cFirehose of Falsehood \u201d Propaganda Model . Rand Corporation . C Paul and M Matthews, 2016 The Russian \u201cFirehose of Falsehood\u201d Propaganda Model. Rand Corporation."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"crossref","unstructured":"S Herring K Job-Sluder R Scheckler and S Barab. 2002 Searching for Safety Online: Managing \"Trolling\" in a Feminist Forum.\u00a0The Information Society \u00a018(5) 371-384.  S Herring K Job-Sluder R Scheckler and S Barab. 2002 Searching for Safety Online: Managing \"Trolling\" in a Feminist Forum.\u00a0The Information Society \u00a018(5) 371-384.","DOI":"10.1080\/01972240290108186"},{"volume-title":"2015 Gendertrolling: How Misogyny Went Viral","author":"Mantilla K","key":"e_1_3_2_1_10_1","unstructured":"K Mantilla , 2015 Gendertrolling: How Misogyny Went Viral . Praeger , Santa Barbara , California, USA. K Mantilla, 2015 Gendertrolling: How Misogyny Went Viral. Praeger, Santa Barbara, California, USA."},{"volume-title":"2017 Media Manipulation and Disinformation Online","author":"Marwick A","key":"e_1_3_2_1_11_1","unstructured":"A Marwick and R Lewis , 2017 Media Manipulation and Disinformation Online . Data & Society Research Institute . A Marwick and R Lewis, 2017 Media Manipulation and Disinformation Online. Data & Society Research Institute."},{"volume-title":"2016 Trolling Aesthetics: The Lulz as Creative Practice (Dissertation)","author":"Knuttila L","key":"e_1_3_2_1_12_1","unstructured":"L Knuttila , 2016 Trolling Aesthetics: The Lulz as Creative Practice (Dissertation) . York University , Toronto, Ontario , Canada. L Knuttila, 2016 Trolling Aesthetics: The Lulz as Creative Practice (Dissertation). York University, Toronto, Ontario, Canada."},{"key":"e_1_3_2_1_13_1","unstructured":"M Goerzen 2016 Critical Trolling (MA Thesis). McGill University Montreal Qu\u00e9bec Canada.  M Goerzen 2016 Critical Trolling (MA Thesis). McGill University Montreal Qu\u00e9bec Canada."},{"volume-title":"2017 Hacking the Attention Economy. Points blog","key":"e_1_3_2_1_14_1","unstructured":"d boyd. 2017 Hacking the Attention Economy. Points blog , Data & Society Research Institute . d boyd. 2017 Hacking the Attention Economy. Points blog, Data & Society Research Institute."},{"volume-title":"2017 The Weaponization of Information. US Senate Testimony","author":"Waltzman R","key":"e_1_3_2_1_15_1","unstructured":"R Waltzman . 2017 The Weaponization of Information. US Senate Testimony , Rand Corporation . R Waltzman. 2017 The Weaponization of Information. US Senate Testimony, Rand Corporation."},{"key":"e_1_3_2_1_16_1","volume-title":"Common Knowledge Attacks on Democracy","author":"Schneier B","year":"2018","unstructured":"B Schneier and H Farrell , Common Knowledge Attacks on Democracy . Berkman Klein Center Research Publication No . 2018 -7. B Schneier and H Farrell, Common Knowledge Attacks on Democracy. Berkman Klein Center Research Publication No. 2018-7."},{"volume-title":"2018 Weaponizing the Digital Influence Machine","author":"Nadler A","key":"e_1_3_2_1_17_1","unstructured":"A Nadler , M Crain , and J Donovan . 2018 Weaponizing the Digital Influence Machine . Data & Society Research Institute . A Nadler, M Crain, and J Donovan. 2018 Weaponizing the Digital Influence Machine. Data & Society Research Institute."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1080\/21670811.2018.1556314"},{"key":"e_1_3_2_1_19_1","unstructured":"T Grugq. 2017 A Last Minute Influence Op by Data DDOS. Medium.  T Grugq. 2017 A Last Minute Influence Op by Data DDOS. Medium."},{"volume-title":"2018 Data Craft: the Manipulation of Social Media Metadata","author":"Acker A","key":"e_1_3_2_1_20_1","unstructured":"A Acker . 2018 Data Craft: the Manipulation of Social Media Metadata . Data & Society Research Institute . A Acker. 2018 Data Craft: the Manipulation of Social Media Metadata. Data & Society Research Institute."},{"key":"e_1_3_2_1_21_1","unstructured":"J Bartlett. 2014 OG Internet Trolls are Upset their Hobby's Been Ruined. Vice.  J Bartlett. 2014 OG Internet Trolls are Upset their Hobby's Been Ruined. Vice."},{"key":"e_1_3_2_1_22_1","unstructured":"W Phillips. 2016 Donald Trump is Not a Troll. Slate.  W Phillips. 2016 Donald Trump is Not a Troll. Slate."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/3144592.3144598"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1126\/science.aap9559"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1177\/0956797617714579"},{"volume-title":"Cheng. 2014 Rumor Cascades. In Eighth International AAAI Conference on Weblogs and Social Media.","author":"Friggeri A","key":"e_1_3_2_1_26_1","unstructured":"A Friggeri , L Adamic , D Eckles , and J Cheng. 2014 Rumor Cascades. In Eighth International AAAI Conference on Weblogs and Social Media. A Friggeri, L Adamic, D Eckles, and J Cheng. 2014 Rumor Cascades. In Eighth International AAAI Conference on Weblogs and Social Media."},{"volume-title":"2018 The Oxygen of Amplification: Better Practices for Reporting on Extremists, Antagonists, and Manipulators","author":"Phillips W","key":"e_1_3_2_1_27_1","unstructured":"W Phillips . 2018 The Oxygen of Amplification: Better Practices for Reporting on Extremists, Antagonists, and Manipulators . Data & Society Research Institute . W Phillips. 2018 The Oxygen of Amplification: Better Practices for Reporting on Extremists, Antagonists, and Manipulators. Data & Society Research Institute."},{"key":"e_1_3_2_1_28_1","unstructured":"J Donovan and d boyd. 2018 The Case for Quarantining Extremist Ideas. The Guardian.  J Donovan and d boyd. 2018 The Case for Quarantining Extremist Ideas. The Guardian."},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1080\/10350330.2012.719728"},{"volume-title":"Context Collapse, and the Imagined Audience.\u00a0New","author":"Marwick AE","key":"e_1_3_2_1_30_1","unstructured":"AE Marwick and d boyd. 2011 I Tweet Honestly , I Tweet Passionately: Twitter Users , Context Collapse, and the Imagined Audience.\u00a0New Media & Society ,\u00a013(1), 114-133. AE Marwick and d boyd. 2011 I Tweet Honestly, I Tweet Passionately: Twitter Users, Context Collapse, and the Imagined Audience.\u00a0New Media & Society,\u00a013(1), 114-133."},{"volume-title":"2018 Data Voids: Where Missing Data Can Easily Be Exploited","author":"Golebiewski M","key":"e_1_3_2_1_31_1","unstructured":"M Golebiewski and d boyd. 2018 Data Voids: Where Missing Data Can Easily Be Exploited . Data & Society Research Institute . M Golebiewski and d boyd. 2018 Data Voids: Where Missing Data Can Easily Be Exploited. Data & Society Research Institute."},{"key":"e_1_3_2_1_32_1","unstructured":"A Smith and V Banic. 2016 Fake News: How a Partying Macedonian Teen Earns Thousands Publishing Lies. NBC News.  A Smith and V Banic. 2016 Fake News: How a Partying Macedonian Teen Earns Thousands Publishing Lies. NBC News."},{"key":"e_1_3_2_1_33_1","unstructured":"PN Howard B Ganesh D Liotsiou J Kelly and C Fran\u00e7ois. \u201cThe IRA and Political Polarization in the United States 2012-2018.\u201d Computational Propaganda Research Project.  PN Howard B Ganesh D Liotsiou J Kelly and C Fran\u00e7ois. \u201cThe IRA and Political Polarization in the United States 2012-2018.\u201d Computational Propaganda Research Project."},{"key":"e_1_3_2_1_34_1","first-page":"1268","article-title":"Impact of Vulnerability Disclosure and Patch Availability-An Empirical Analysis","volume":"24","author":"Arora A","year":"2004","unstructured":"A Arora , R Krishnan , A Nandkumar , R Telang , and Y Yang . 2004 Impact of Vulnerability Disclosure and Patch Availability-An Empirical Analysis . Third Workshop on the Economics of Information Security 24 , 1268 - 1287 . A Arora, R Krishnan, A Nandkumar, R Telang, and Y Yang. 2004 Impact of Vulnerability Disclosure and Patch Availability-An Empirical Analysis. Third Workshop on the Economics of Information Security 24, 1268-1287.","journal-title":"Third Workshop on the Economics of Information Security"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"crossref","unstructured":"S Vegh. 2005 The Media's Portrayal of Hacking Hackers and Hacktivism Before and After September 11. First Monday 10(2).  S Vegh. 2005 The Media's Portrayal of Hacking Hackers and Hacktivism Before and After September 11. First Monday 10(2).","DOI":"10.5210\/fm.v10i2.1206"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1016\/S1361-3723(15)30094-4"},{"key":"e_1_3_2_1_37_1","first-page":"380","volume-title":"IEEE 2002 International Symposium on Technology and Society (ISTAS'02)","author":"Jayaswal V","unstructured":"V Jayaswal , W Yurcik , and D. Doss . 2002 Internet Hack Back: Counter Attacks as Self-Defense or Vigilantism? . IEEE 2002 International Symposium on Technology and Society (ISTAS'02) . Social Implications of Information and Communication Technology , 380 - 386 . V Jayaswal, W Yurcik, and D. Doss. 2002 Internet Hack Back: Counter Attacks as Self-Defense or Vigilantism?. IEEE 2002 International Symposium on Technology and Society (ISTAS'02). Social Implications of Information and Communication Technology, 380-386."},{"key":"e_1_3_2_1_38_1","unstructured":"Society of Professional Journalists. 2014 Code of Ethics.  Society of Professional Journalists. 2014 Code of Ethics."},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.5555\/1388316.1388329"},{"volume-title":"2018 Searching for Alternative Facts: Analyzing Scriptural Inference in Conservative News Practices","author":"Tripodi F","key":"e_1_3_2_1_40_1","unstructured":"F Tripodi . 2018 Searching for Alternative Facts: Analyzing Scriptural Inference in Conservative News Practices . Data & Society Research Institute . F Tripodi. 2018 Searching for Alternative Facts: Analyzing Scriptural Inference in Conservative News Practices. Data & Society Research Institute."},{"key":"e_1_3_2_1_41_1","unstructured":"R Caplan. 2018 Content or Context Moderation? Data & Society Research Institute.  R Caplan. 2018 Content or Context Moderation? Data & Society Research Institute."},{"issue":"10","key":"e_1_3_2_1_42_1","first-page":"10","article-title":"Meme, Counter-meme","volume":"2","author":"Godwin M","year":"1994","unstructured":"M Godwin . 1994 Meme, Counter-meme . Wired , 2 ( 10 ), 10 . M Godwin. 1994 Meme, Counter-meme. Wired, 2(10), 10.","journal-title":"Wired"},{"key":"e_1_3_2_1_43_1","unstructured":"M Vigil-Hayes J Matthews A Acker and D Carter. 2018\u00a0Reflections on Alternative Internet Models and How They Inform More Mindful Connectivity.\u00a0ITU Journal \u00a0ICT Discoveries Special Issue 2 Data for Good.  M Vigil-Hayes J Matthews A Acker and D Carter. 2018\u00a0Reflections on Alternative Internet Models and How They Inform More Mindful Connectivity.\u00a0ITU Journal \u00a0ICT Discoveries Special Issue 2 Data for Good."},{"volume-title":"2015 Non-participation in Digital Media: Toward a Framework of Mediated Political Action.\u00a0Media","author":"Casemajor N","key":"e_1_3_2_1_44_1","unstructured":"N Casemajor , S Couture , M Delfin , M Goerzen , and A Delfanti , 2015 Non-participation in Digital Media: Toward a Framework of Mediated Political Action.\u00a0Media , Culture & Society ,\u00a037(6), 850-866. N Casemajor, S Couture, M Delfin, M Goerzen, and A Delfanti, 2015 Non-participation in Digital Media: Toward a Framework of Mediated Political Action.\u00a0Media, Culture & Society,\u00a037(6), 850-866."},{"volume-title":"Publicity and the Canadian State, edited by K Kozolanka","author":"Barney D","key":"e_1_3_2_1_45_1","unstructured":"D Barney . 2014 Publics without Politics: Surplus Publicity as Depoliticization . In Publicity and the Canadian State, edited by K Kozolanka . University of Toronto Press , Toronto, Ontario , Canada. D Barney. 2014 Publics without Politics: Surplus Publicity as Depoliticization. In Publicity and the Canadian State, edited by K Kozolanka. University of Toronto Press, Toronto, Ontario, Canada."}],"event":{"name":"WWW '19: The Web Conference","sponsor":["IW3C2 International World Wide Web Conference Committee"],"location":"San Francisco USA","acronym":"WWW '19"},"container-title":["Companion Proceedings of The 2019 World Wide Web Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3308560.3317598","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3308560.3317598","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T23:53:35Z","timestamp":1750204415000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3308560.3317598"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,5,13]]},"references-count":45,"alternative-id":["10.1145\/3308560.3317598","10.1145\/3308560"],"URL":"https:\/\/doi.org\/10.1145\/3308560.3317598","relation":{},"subject":[],"published":{"date-parts":[[2019,5,13]]},"assertion":[{"value":"2019-05-13","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}